From f6801200a96301e6f7e857c847e603061939b548 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Fri, 20 Mar 2020 17:13:53 +0100 Subject: [PATCH 01/19] feat: add admin proto --- go.mod | 3 +- go.sum | 302 ++++++++++++++++++++++++++++++++ pkg/admin/api/grpc/generate.go | 7 + pkg/admin/api/proto/admin.proto | 100 +++++++++++ pkg/admin/api/proto/org.proto | 137 +++++++++++++++ 5 files changed, 547 insertions(+), 2 deletions(-) create mode 100644 pkg/admin/api/grpc/generate.go create mode 100644 pkg/admin/api/proto/admin.proto create mode 100644 pkg/admin/api/proto/org.proto diff --git a/go.mod b/go.mod index b2256cbd49..44b0278fb8 100644 --- a/go.mod +++ b/go.mod @@ -4,9 +4,8 @@ go 1.14 require ( github.com/BurntSushi/toml v0.3.1 + github.com/caos/citadel v0.37.8 // indirect github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a - github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e // indirect github.com/ghodss/yaml v1.0.0 golang.org/x/sys v0.0.0-20200317113312-5766fd39f98d // indirect - gopkg.in/yaml.v2 v2.2.8 // indirect ) diff --git a/go.sum b/go.sum index d0bf2fad7f..177ae9d7e2 100644 --- a/go.sum +++ b/go.sum @@ -1,3 +1,4 @@ +bazil.org/fuse v0.0.0-20180421153158-65cc252bf669/go.mod h1:Xbm+BRKSBEpa4q4hTSxohYNQpsxXPbPry4JJWOB3LB8= cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU= @@ -6,63 +7,131 @@ cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxK cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc= cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0= cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To= +cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4= cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M= +cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc= cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o= cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE= +cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc= cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= +cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk= cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I= cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw= +cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA= cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw= cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos= +cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk= contrib.go.opencensus.io/exporter/stackdriver v0.13.0/go.mod h1:z2tyTZtPmQ2HvWH4cOmVDgtY+1lomfKdbLnkJvZdc8c= dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= +github.com/BurntSushi/toml v0.3.0/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= +github.com/DATA-DOG/go-sqlmock v1.3.3/go.mod h1:f/Ixk793poVmq4qj/V1dPUg2JEAKC73Q5eFN3EC/SaM= +github.com/GoogleCloudPlatform/cloudsql-proxy v0.0.0-20200226203936-887a30e53f59/go.mod h1:Ea/RL9yv5P3ywzBLD00Ho3cXFm41q7DQf25Y4Kbg+nw= +github.com/Masterminds/goutils v1.1.0/go.mod h1:8cTjp+g8YejhMuvIA5y2vz3BpJxksy863GQaJW2MFNU= +github.com/Masterminds/semver v1.5.0/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y= +github.com/Masterminds/sprig v2.22.0+incompatible/go.mod h1:y6hNFY5UBTIWBxnzTeuNhlNS5hqE0NB0E6fgfo2Br3o= +github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= +github.com/VictoriaMetrics/fastcache v1.5.7 h1:4y6y0G8PRzszQUYIQHHssv/jgPHAb5qQuuDNdCbyAgw= github.com/VictoriaMetrics/fastcache v1.5.7/go.mod h1:ptDBkNMQI4RtmVo8VS/XwRY6RoTu1dAWCbrk+6WsEM8= +github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= +github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0= github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156/go.mod h1:Cb/ax3seSYIx7SuZdm2G2xzfwmv3TPSk2ucNfQESPXM= +github.com/allegro/bigcache v1.2.1 h1:hg1sY1raCwic3Vnsvje6TT7/pnZba83LeFck5NrFKSc= github.com/allegro/bigcache v1.2.1/go.mod h1:Cb/ax3seSYIx7SuZdm2G2xzfwmv3TPSk2ucNfQESPXM= github.com/antihax/optional v0.0.0-20180407024304-ca021399b1a6/go.mod h1:V8iCPQYkqmusNa815XgQio277wI47sdRh1dUOLdyC6Q= +github.com/armon/consul-api v0.0.0-20180202201655-eb2c6b5be1b6/go.mod h1:grANhF5doyWs3UAsr3K4I6qtAmlQcZDesFNEHPZAzj8= github.com/aws/aws-sdk-go v1.23.20/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo= github.com/aws/aws-sdk-go v1.29.16/go.mod h1:1KvfttTE3SPKMpo8g2c6jL3ZKfXtFvKscTgahTma5Xg= +github.com/aws/aws-sdk-go v1.29.19/go.mod h1:1KvfttTE3SPKMpo8g2c6jL3ZKfXtFvKscTgahTma5Xg= +github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q= +github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8= +github.com/boombuler/barcode v1.0.1-0.20190219062509-6c824513bacc h1:biVzkmvwrH8WK8raXaxBx6fRVTlJILwEwQGL1I/ByEI= +github.com/boombuler/barcode v1.0.1-0.20190219062509-6c824513bacc/go.mod h1:paBWMcWSl3LHKBqUq+rly7CNSldXjb2rDl3JlRe0mD8= +github.com/bxcodec/faker/v3 v3.2.0/go.mod h1:gF31YgnMSMKgkvl+fyEo1xuSMbEuieyqfeslGYFjneM= +github.com/caos/citadel v0.37.8 h1:ifv6M4XExPGPKvzBzx+L3TF981bqEfQ6iNskV1Abr2I= +github.com/caos/citadel v0.37.8/go.mod h1:4vpjhToT1+ebacoyzEk0jlpvLcH36A8MRgMxMNuDHJw= +github.com/caos/eventstore-lib v0.0.0-20200305061420-083a0ef6f74f h1:qOHyvOdoZgFkGxyEULI6Jbf+nDlop3jnHvaKSfRfrZI= +github.com/caos/eventstore-lib v0.0.0-20200305061420-083a0ef6f74f/go.mod h1:B8/7GC83FfpbgUGegHdpBco5N9lpH3Jll1ZG406h/+c= github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a h1:HOU/3xL/afsZ+2aCstfJlrzRkwYMTFR1TIEgps5ny8s= github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a/go.mod h1:9LKiDE2ChuGv6CHYif/kiugrfEXu9AwDiFWSreX7Wp0= +github.com/caos/oidc v0.5.0 h1:+EiZ3XNvuXAOdeLz9b5/kWetU+Rk/G25RnwJXWLQEtk= +github.com/caos/oidc v0.5.0/go.mod h1:D7pKt699prmvK5j677DE8Py4T3FiTKqjPgYK4+ibPxw= github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e h1:QSbTeoLPW7c1rWNJA2GOKunDJnRAfyg8+cb73qMYESM= github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e/go.mod h1:CLEkNe7rs12GkdBWZxadA/mFiKeF6HzuA1BOKq+fX+Y= github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= +github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko= +github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc= +github.com/cespare/xxhash/v2 v2.1.1 h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+qY= github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI= github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI= github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU= github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= +github.com/cockroachdb/apd v1.1.0/go.mod h1:8Sl8LxpKi29FqWXR16WEFZRNSz3SoPzUzeMeY4+DwBQ= +github.com/cockroachdb/cockroach-go v0.0.0-20190925194419-606b3d062051 h1:eApuUG8W2EtBVwxqLlY2wgoqDYOg3WvIHGvW4fUbbow= +github.com/cockroachdb/cockroach-go v0.0.0-20190925194419-606b3d062051/go.mod h1:XGLbWH/ujMcbPbhZq52Nv6UrCghb1yGn//133kEsvDk= +github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk= +github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= +github.com/coreos/go-semver v0.2.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk= +github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4= +github.com/coreos/go-systemd v0.0.0-20190719114852-fd7a80b32e1f/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4= +github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA= +github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU= +github.com/creack/pty v1.1.7/go.mod h1:lj5s0c3V2DBrqTV7llrYr5NG6My20zk30Fl46Y7DoTY= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= +github.com/deckarep/golang-set v1.7.1/go.mod h1:93vsz/8Wt4joVM7c2AVqh+YRMiUSc14yDtF28KmMOgQ= +github.com/denisenkom/go-mssqldb v0.0.0-20191124224453-732737034ffd/go.mod h1:xbL0rPBG9cCiLr28tMa8zpbdarY27NDyej4t/EjAShU= +github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= +github.com/dgryski/go-sip13 v0.0.0-20181026042036-e10d5fee7954/go.mod h1:vAd38F8PWV+bWy6jNmig1y/TA+kYO4g3RSRF0IAv0no= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= +github.com/envoyproxy/protoc-gen-validate v0.3.0 h1:Y2J74o+yAfcD8jpqtkLnUqRo+yshLr4eR1WPYGX0cic= +github.com/envoyproxy/protoc-gen-validate v0.3.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= +github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5/go.mod h1:a2zkGnVExMxdzMo3M0Hi/3sEU+cWnZpSni0O6/Yb/P0= +github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= +github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= +github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= +github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE= github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= +github.com/go-sql-driver/mysql v1.4.1/go.mod h1:zAC/RDZ24gD3HViQzih4MyKcchzm+sOG5ZlKdlhCg5w= github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg= +github.com/go-stack/stack v1.8.0 h1:5SgMzNM5HxrEjV0ww2lTmX6E2Izsfxas4+YHWRs3Lsk= github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= +github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4= +github.com/gogo/protobuf v1.3.0/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= +github.com/gogo/protobuf v1.3.1 h1:DqDEcV5aeaTmdFBePNpYsp3FlcVH/2ISVVM9Qf8PSls= +github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= +github.com/golang-sql/civil v0.0.0-20190719163853-cb61b32ac6fe/go.mod h1:8vg3r2VgvsThLBIFL93Qb5yWzgyZWhEmBwUJWevAkK0= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= +github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20191027212112-611e8accdfc9/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e h1:1r7pUrabqp18hOBcwBwiTsbnFeTZHV9eER/QT5JVZxY= github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y= github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= +github.com/golang/mock v1.4.1 h1:ocYkMQY5RrXTYgXl7ICpV0IXwlEQGwKIsery4gyXa1U= github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= +github.com/golang/protobuf v1.3.4 h1:87PNWwrRvUSnqS4dlcBU/ftvOIBep4sYuBLlh6rX2wk= github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= +github.com/golang/snappy v0.0.1 h1:Qgr9rKW7uDUkrbSmQeiDsGa8SjGyCOGtuasMWwvp2P4= github.com/golang/snappy v0.0.1/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= @@ -73,19 +142,93 @@ github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= +github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI= +github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg= github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk= +github.com/gorilla/handlers v1.4.2/go.mod h1:Qkdc/uu4tH4g6mTK6auzZ766c4CA0Ng8+o/OAirnOIQ= +github.com/gorilla/mux v1.7.3/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs= +github.com/gorilla/mux v1.7.4/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So= +github.com/gorilla/schema v1.1.0 h1:CamqUDOFUBqzrvxuz2vEwo8+SUdwsluFh7IlzJh30LY= +github.com/gorilla/schema v1.1.0/go.mod h1:kgLaKoK1FELgZqMAVxx/5cbj0kT+57qxUrAlIO2eleU= +github.com/gorilla/securecookie v1.1.1 h1:miw7JPhV+b/lAHSXz4qd/nN9jRiAFV5FwjeKyCS8BvQ= +github.com/gorilla/securecookie v1.1.1/go.mod h1:ra0sb63/xPlUeL+yeDciTfxMRAA+MP+HVt/4epWDjd4= +github.com/gorilla/websocket v1.4.0/go.mod h1:E7qHFY5m1UJ88s3WnNqhKjPHQ0heANvMoAMk2YaljkQ= +github.com/grpc-ecosystem/go-grpc-middleware v1.0.0/go.mod h1:FiyG127CGDf3tlThmgyCl78X/SZQqEOJBCDaAfeWzPs= +github.com/grpc-ecosystem/go-grpc-middleware v1.2.0 h1:0IKlLyQ3Hs9nDaiK5cSHAGmcQEIC8l2Ts1u6x5Dfrqg= github.com/grpc-ecosystem/go-grpc-middleware v1.2.0/go.mod h1:mJzapYve32yjrKlk9GbyCZHuPgZsrbyIbyKhSzOpg6s= +github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk= +github.com/grpc-ecosystem/grpc-gateway v1.9.0/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY= github.com/grpc-ecosystem/grpc-gateway v1.13.0/go.mod h1:8XEsbTttt/W+VvjtQhLACqCisSPWTxCZ7sBRjU6iH9c= +github.com/grpc-ecosystem/grpc-gateway v1.14.1 h1:YuM9SXYy583fxvSOkzCDyBPCtY+/IMSHEG1dKFMLZsA= +github.com/grpc-ecosystem/grpc-gateway v1.14.1/go.mod h1:6CwZWGDSPRJidgKAtJVvND6soZe6fT7iteq8wDPdhb0= github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= +github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ= +github.com/huandu/xstrings v1.3.0/go.mod h1:y5/lhBue+AyNmUVz9RLU9xbLR0o4KIIExikq4ovT0aE= github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= +github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= +github.com/inconshreveable/log15 v0.0.0-20200109203555-b30bc20e4fd1 h1:KUDFlmBg2buRWNzIcwLlKvfcnujcHQRQ1As1LoaCLAM= +github.com/inconshreveable/log15 v0.0.0-20200109203555-b30bc20e4fd1/go.mod h1:cOaXtrgN4ScfRrD9Bre7U1thNq5RtJ8ZoP4iXVGRj6o= +github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= +github.com/jackc/chunkreader v1.0.0 h1:4s39bBR8ByfqH+DKm8rQA3E1LHZWB9XWcrz8fqaZbe0= +github.com/jackc/chunkreader v1.0.0/go.mod h1:RT6O25fNZIuasFJRyZ4R/Y2BbhasbmZXF9QQ7T3kePo= +github.com/jackc/chunkreader/v2 v2.0.0/go.mod h1:odVSm741yZoC3dpHEUXIqA9tQRhFrgOHwnPIn9lDKlk= +github.com/jackc/chunkreader/v2 v2.0.1 h1:i+RDz65UE+mmpjTfyz0MoVTnzeYxroil2G82ki7MGG8= +github.com/jackc/chunkreader/v2 v2.0.1/go.mod h1:odVSm741yZoC3dpHEUXIqA9tQRhFrgOHwnPIn9lDKlk= +github.com/jackc/pgconn v0.0.0-20190420214824-7e0022ef6ba3/go.mod h1:jkELnwuX+w9qN5YIfX0fl88Ehu4XC3keFuOJJk9pcnA= +github.com/jackc/pgconn v0.0.0-20190824142844-760dd75542eb/go.mod h1:lLjNuW/+OfW9/pnVKPazfWOgNfH2aPem8YQ7ilXGvJE= +github.com/jackc/pgconn v0.0.0-20190831204454-2fabfa3c18b7/go.mod h1:ZJKsE/KZfsUgOEh9hBm+xYTstcNHg7UPMVJqRfQxq4s= +github.com/jackc/pgconn v1.4.0 h1:E82UBzFyD752mvI+4RIl1WSxfO2ug64T+sLjvDBWTpA= +github.com/jackc/pgconn v1.4.0/go.mod h1:Y2O3ZDF0q4mMacyWV3AstPJpeHXWGEetiFttmq5lahk= +github.com/jackc/pgio v1.0.0 h1:g12B9UwVnzGhueNavwioyEEpAmqMe1E/BN9ES+8ovkE= +github.com/jackc/pgio v1.0.0/go.mod h1:oP+2QK2wFfUWgr+gxjoBH9KGBb31Eio69xUb0w5bYf8= +github.com/jackc/pgmock v0.0.0-20190831213851-13a1b77aafa2/go.mod h1:fGZlG77KXmcq05nJLRkk0+p82V8B8Dw8KN2/V9c/OAE= +github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM= +github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg= +github.com/jackc/pgproto3 v1.1.0 h1:FYYE4yRw+AgI8wXIinMlNjBbp/UitDJwfj5LqqewP1A= +github.com/jackc/pgproto3 v1.1.0/go.mod h1:eR5FA3leWg7p9aeAqi37XOTgTIbkABlvcPB3E5rlc78= +github.com/jackc/pgproto3/v2 v2.0.0-alpha1.0.20190420180111-c116219b62db/go.mod h1:bhq50y+xrl9n5mRYyCBFKkpRVTLYJVWeCc+mEAI3yXA= +github.com/jackc/pgproto3/v2 v2.0.0-alpha1.0.20190609003834-432c2951c711/go.mod h1:uH0AWtUmuShn0bcesswc4aBTWGvw0cAxIJp+6OB//Wg= +github.com/jackc/pgproto3/v2 v2.0.0-rc3/go.mod h1:ryONWYqW6dqSg1Lw6vXNMXoBJhpzvWKnT95C46ckYeM= +github.com/jackc/pgproto3/v2 v2.0.0-rc3.0.20190831210041-4c03ce451f29/go.mod h1:ryONWYqW6dqSg1Lw6vXNMXoBJhpzvWKnT95C46ckYeM= +github.com/jackc/pgproto3/v2 v2.0.1 h1:Rdjp4NFjwHnEslx2b66FfCI2S0LhO4itac3hXz6WX9M= +github.com/jackc/pgproto3/v2 v2.0.1/go.mod h1:WfJCnwN3HIg9Ish/j3sgWXnAfK8A9Y0bwXYU5xKaEdA= +github.com/jackc/pgservicefile v0.0.0-20200307190119-3430c5407db8 h1:Q3tB+ExeflWUW7AFcAhXqk40s9mnNYLk1nOkKNZ5GnU= +github.com/jackc/pgservicefile v0.0.0-20200307190119-3430c5407db8/go.mod h1:vsD4gTJCa9TptPL8sPkXrLZ+hDuNrZCnj29CQpr4X1E= +github.com/jackc/pgtype v0.0.0-20190421001408-4ed0de4755e0/go.mod h1:hdSHsc1V01CGwFsrv11mJRHWJ6aifDLfdV3aVjFF0zg= +github.com/jackc/pgtype v0.0.0-20190824184912-ab885b375b90/go.mod h1:KcahbBH1nCMSo2DXpzsoWOAfFkdEtEJpPbVLq8eE+mc= +github.com/jackc/pgtype v0.0.0-20190828014616-a8802b16cc59/go.mod h1:MWlu30kVJrUS8lot6TQqcg7mtthZ9T0EoIBFiJcmcyw= +github.com/jackc/pgx/v4 v4.0.0-20190420224344-cc3461e65d96/go.mod h1:mdxmSJJuR08CZQyj1PVQBHy9XOp5p8/SHH6a0psbY9Y= +github.com/jackc/pgx/v4 v4.0.0-20190421002000-1b8f0016e912/go.mod h1:no/Y67Jkk/9WuGR0JG/JseM9irFbnEPbuWV2EELPNuM= +github.com/jackc/pgx/v4 v4.0.0-pre1.0.20190824185557-6972a5742186/go.mod h1:X+GQnOEnf1dqHGpw7JmHqHc1NxDoalibchSk9/RWuDc= +github.com/jackc/puddle v0.0.0-20190413234325-e4ced69a3a2b/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= +github.com/jackc/puddle v0.0.0-20190608224051-11cab39313c9/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= +github.com/jaytaylor/html2text v0.0.0-20200220170450-61d9dc4d7195 h1:j0UEFmS7wSjAwKEIkgKBn8PRDfjcuggzr93R9wk53nQ= +github.com/jaytaylor/html2text v0.0.0-20200220170450-61d9dc4d7195/go.mod h1:CVKlgaMiht+LXvHG173ujK6JUhZXKb2u/BQtjPDIvyk= +github.com/jinzhu/gorm v1.9.12 h1:Drgk1clyWT9t9ERbzHza6Mj/8FY/CqMyVzOiHviMo6Q= +github.com/jinzhu/gorm v1.9.12/go.mod h1:vhTjlKSJUTWNtcbQtrMBFCxy7eXTzeCAzfL5fBZT/Qs= +github.com/jinzhu/inflection v1.0.0 h1:K317FqzuhWc8YvSVlFMCCUb36O/S9MCKRDI7QkRKD/E= +github.com/jinzhu/inflection v1.0.0/go.mod h1:h+uFLlag+Qp1Va5pdKtLDYj+kHp5pxUVkryuEj+Srlc= +github.com/jinzhu/now v1.0.1/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= +github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk= +github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w= +github.com/kevinburke/go-types v0.0.0-20200309064045-f2d4aea18a7a h1:Z7+SSApKiwPjNic+NF9+j7h657Uyvdp/jA3iTKhpj4E= +github.com/kevinburke/go-types v0.0.0-20200309064045-f2d4aea18a7a/go.mod h1:/Pk5i/SqYdYv1cie5wGwoZ4P6TpgMi+Yf58mtJSHdOw= +github.com/kevinburke/go.uuid v1.2.0 h1:+1qP8NdkJfgOSTrrrUuA7h0djr1VY77HFXYjR+zUcUo= +github.com/kevinburke/go.uuid v1.2.0/go.mod h1:9gVngk1Hq1FjwewVAjsWEUT+xc6jP+p62CASaGmQ0NQ= +github.com/kevinburke/rest v0.0.0-20191030174917-82a468bd5192 h1:NVpN2RDbYOZzMUtseQTwk2vStPqISLj3Ld18Ci9M4po= +github.com/kevinburke/rest v0.0.0-20191030174917-82a468bd5192/go.mod h1:pD+iEcdAGVXld5foVN4e24zb/6fnb60tgZPZ3P/3T/I= +github.com/kevinburke/twilio-go v0.0.0-20200203063821-378e630e02da h1:FIobKqpdPtwqZU13WuIf4C68WPyVNDHmO1uK4fIcKNg= +github.com/kevinburke/twilio-go v0.0.0-20200203063821-378e630e02da/go.mod h1:Fm9alkN1/LPVY1eqD/psyMwPWE4VWl4P01/nTYZKzBk= github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q= +github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ= github.com/konsorten/go-windows-terminal-sequences v1.0.2 h1:DB17ag19krx9CFsz4o3enTrPXyIXCl+2iCXH/aMAp9s= @@ -93,38 +236,133 @@ github.com/konsorten/go-windows-terminal-sequences v1.0.2/go.mod h1:T0+1ngSBFLxv github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc= github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= +github.com/kr/pty v1.1.8/go.mod h1:O1sed60cT9XZ5uDucP5qwvh+TE3NnUj51EiZO/lmSfw= github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= +github.com/lib/pq v1.0.0/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= +github.com/lib/pq v1.1.0/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= +github.com/lib/pq v1.1.1/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= +github.com/lib/pq v1.2.0/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= +github.com/lib/pq v1.3.0 h1:/qkRGz8zljWiDcFvgpwUpwIAPu3r07TDvs3Rws+o/pU= +github.com/lib/pq v1.3.0/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= +github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ= +github.com/mattn/go-colorable v0.1.1/go.mod h1:FuOcm+DKB9mbwrcAfNl7/TZVBZ6rcnceauSikq3lYCQ= +github.com/mattn/go-colorable v0.1.6 h1:6Su7aK7lXmJ/U79bYtBjLNaha4Fs1Rg9plHpcH+vvnE= +github.com/mattn/go-colorable v0.1.6/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= +github.com/mattn/go-isatty v0.0.5/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s= +github.com/mattn/go-isatty v0.0.7/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s= +github.com/mattn/go-isatty v0.0.12 h1:wuysRhFDzyxgEmMf5xjvJ2M9dZoWAXNNr5LSBS7uHXY= +github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU= +github.com/mattn/go-runewidth v0.0.7/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI= +github.com/mattn/go-runewidth v0.0.8 h1:3tS41NlGYSmhhe/8fhGRzc+z3AYCw1Fe1WAyLuujKs0= +github.com/mattn/go-runewidth v0.0.8/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI= +github.com/mattn/go-sqlite3 v2.0.1+incompatible/go.mod h1:FPy6KqzDD04eiIsT53CuJW3U88zkxoIYsOqkbpncsNc= +github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= +github.com/mitchellh/copystructure v1.0.0/go.mod h1:SNtv71yrdKgLRyLFxmLdkAbkKEFWgYaq1OVrnRcwhnw= +github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0= +github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y= +github.com/mitchellh/reflectwalk v1.0.0/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw= +github.com/mitchellh/reflectwalk v1.0.1/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw= +github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= +github.com/mwitkow/go-proto-validators v0.3.0 h1:2WkInbIheqmDevK9h0S/K6f0Os/HlTPGJeRwDAeQE1w= +github.com/mwitkow/go-proto-validators v0.3.0/go.mod h1:ej0Qp0qMgHN/KtDyUt+Q1/tA7a5VarXUOUxD+oeD30w= +github.com/nicksnyder/go-i18n/v2 v2.0.3/go.mod h1:oDab7q8XCYMRlcrBnaY/7B1eOectbvj6B1UPBT+p5jo= +github.com/oklog/ulid v1.3.1/go.mod h1:CirwcVhetQ6Lv90oh/F+FBtV6XMibvdAFo93nm5qn4U= +github.com/olekukonko/tablewriter v0.0.4 h1:vHD/YYe1Wolo78koG299f7V/VAS08c6IpCLn+Ejf/w8= +github.com/olekukonko/tablewriter v0.0.4/go.mod h1:zq6QwlOf5SlnkVbMSr5EoBv3636FWnp+qbPhuoO21uA= github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o= +github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic= +github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= +github.com/pquerna/otp v1.2.0 h1:/A3+Jn+cagqayeR3iHs/L62m5ue7710D35zl1zJ1kok= +github.com/pquerna/otp v1.2.0/go.mod h1:dkJfzwRKNiegxyNb54X/3fLwhCynbMspSyWKnvi1AEg= +github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw= +github.com/prometheus/client_golang v0.9.3/go.mod h1:/TN21ttK/J9q6uSwhBd54HahCDft0ttaMvbicHlPoso= +github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo= +github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= +github.com/prometheus/common v0.0.0-20181113130724-41aa239b4cce/go.mod h1:daVV7qP5qjZbuso7PdcryaAu0sAZbrN9i7WWcTMWvro= +github.com/prometheus/common v0.4.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4= +github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= +github.com/prometheus/procfs v0.0.0-20190507164030-5867b95ac084/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA= +github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= +github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg= github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ= github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= +github.com/rs/cors v1.7.0 h1:+88SsELBHx5r+hZ8TCkggzSstaWNbDvThkVK8H6f9ik= github.com/rs/cors v1.7.0/go.mod h1:gFx+x8UowdsKA9AchylcLynDq+nNFfI8FkUZdN/jGCU= +github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ= +github.com/rs/zerolog v1.13.0/go.mod h1:YbFCdg8HfsridGWAh22vktObvhZbQsZXe4/zB0OKkWU= +github.com/rs/zerolog v1.15.0/go.mod h1:xYTKnLHcpfU2225ny5qZjxnj9NvkumZYjJHlAThCjNc= +github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= +github.com/satori/go.uuid v1.2.0/go.mod h1:dA0hQrYB0VpLJoorglMZABFdXlWrHn1NEOzdhQKdks0= +github.com/sethvargo/go-password v0.1.3/go.mod h1:2tyaaoHK/AlXwh5WWQDYjqQbHcq4cjPj5qb/ciYvu/Q= +github.com/shopspring/decimal v0.0.0-20180709203117-cd690d0c9e24/go.mod h1:M+9NzErvs504Cn4c5DxATwIqPbtswREoFCre64PpcG4= +github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc= +github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo= +github.com/sirupsen/logrus v1.4.1/go.mod h1:ni0Sbl8bgC9z8RoU9G6nDWqqs/fq4eDPysMBDgk/93Q= github.com/sirupsen/logrus v1.4.2 h1:SPIRibHv4MatM3XXNO2BJeFLZwZ2LvZgfQ5+UNI2im4= github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE= +github.com/skip2/go-qrcode v0.0.0-20191027152451-9434209cb086/go.mod h1:PLPIyL7ikehBD1OAjmKKiOEhbvWyHGaNDjquXMcYABo= +github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM= +github.com/sony/sonyflake v1.0.0 h1:MpU6Ro7tfXwgn2l5eluf9xQvQJDROTBImNCfRXn/YeM= +github.com/sony/sonyflake v1.0.0/go.mod h1:Jv3cfhf/UFtolOTTRd3q4Nl6ENqM+KfyZ5PseKfZGF4= +github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= +github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ= +github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE= +github.com/spf13/cobra v0.0.6/go.mod h1:/6GTrnGXV9HjY+aR4k0oJ5tcvakLuG6EuKReYlHNrgE= +github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo= +github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= +github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= +github.com/spf13/viper v1.4.0/go.mod h1:PTJ7Z/lr49W6bUbkmS1V3by4uWynFiR9p7+dSq/yZzE= +github.com/ssor/bom v0.0.0-20170718123548-6386211fdfcf h1:pvbZ0lM0XWPBqUKqFU8cmavspvIl9nulOYwdy6IFRRo= +github.com/ssor/bom v0.0.0-20170718123548-6386211fdfcf/go.mod h1:RJID2RhlZKId02nZ62WenDCkgHFerpIOmW0iT7GKmXM= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= +github.com/stretchr/objx v0.2.0/go.mod h1:qt09Ya8vawLte6SNmTgCsAVtYtaKzEcn8ATUoHMkEqE= github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w= github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= github.com/stretchr/testify v1.5.1 h1:nOGnQDM7FYENwehXlg/kFVnos3rEvtKTjRvOWSzb6H4= github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA= +github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U= +github.com/ttacon/builder v0.0.0-20170518171403-c099f663e1c2 h1:5u+EJUQiosu3JFX0XS0qTf5FznsMOzTjGqavBGuCbo0= +github.com/ttacon/builder v0.0.0-20170518171403-c099f663e1c2/go.mod h1:4kyMkleCiLkgY6z8gK5BkI01ChBtxR0ro3I1ZDcGM3w= +github.com/ttacon/libphonenumber v1.1.0 h1:tC6kE4t8UI4OqQVQjW5q8gSWhG2wnY5moEpSEORdYm4= +github.com/ttacon/libphonenumber v1.1.0/go.mod h1:E0TpmdVMq5dyVlQ7oenAkhsLu86OkUl+yR4OAxyEg/M= +github.com/ugorji/go v1.1.4/go.mod h1:uQMGLiO92mf5W77hV/PUCpI3pbzQx3CRekS0kk+RGrc= +github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU= +github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q= +github.com/zenazn/goji v0.9.0/go.mod h1:7S9M489iMyHBNxwZnk9/EHS098H4/F6TATF2mIxtB1Q= +go.etcd.io/bbolt v1.3.2/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU= go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU= go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8= go.opencensus.io v0.22.1/go.mod h1:Ap50jQcDJrx6rB6VgeeFPtuPIf3wMRvRfrfYDO6+BmA= go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +go.opencensus.io v0.22.3 h1:8sGtKOrtQqkN1bp2AtX+misvLIlOmsEsNd+9NIcPEm8= go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +go.uber.org/atomic v1.3.2/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0= +go.uber.org/zap v1.9.1/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= +golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= +golang.org/x/crypto v0.0.0-20190325154230-a5d413f7728c/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= +golang.org/x/crypto v0.0.0-20190411191339-88737f569e3a/go.mod h1:WFFai1msRO1wXaEeE5yQxYXgSfI8pQAWXbQop6sCtWE= +golang.org/x/crypto v0.0.0-20190506204251-e1dfcc566284/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20190820162420-60c769a6c586/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20191128160524-b544559bb6d1/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= +golang.org/x/crypto v0.0.0-20191205180655-e7c4368fe9dd/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= +golang.org/x/crypto v0.0.0-20191219195013-becbf705a915/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= +golang.org/x/crypto v0.0.0-20200302210943-78000ba7a073 h1:xMPOj6Pz6UipU1wXLkrtqpHbR0AVFnyPEQq/wRWz9lM= +golang.org/x/crypto v0.0.0-20200302210943-78000ba7a073/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -132,7 +370,9 @@ golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm0 golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY= golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM= +golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU= golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= @@ -144,42 +384,61 @@ golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHl golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs= golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= +golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE= golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc= golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= +golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20181220203305-927f97764cc3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190522155817-f3200d17e092/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20190813141303-74dc4d7220e7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191002035440-2ec189313ef0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20191126235420-ef20fe5d7933/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200301022130-244492dfa37a h1:GuSPYbZzB5/dcLNCwLQLsg3obCJtX9IJhpXkvY7kzk0= golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20191122200657-5d9234df094c/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d h1:TzXSXBo42m9gQenoE3b9BGiEpg5IG2JkU5FkPIawgtw= golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e h1:vcxGaoTs7kV8m5Np9uUNQin4BrLOthgV7252N8V+FwY= golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20181107165924-66b7b1311ac8/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190403152447-81d4e9dc473e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -187,34 +446,47 @@ golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190813064441-fde4db37ae7a/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191206220618-eeba5f6aabab h1:FvshnhkKW+LO3HWHodML8kuVX8rnJTxKm9dFPuI68UM= golang.org/x/sys v0.0.0-20191206220618-eeba5f6aabab/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191220142924-d4481acd189f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200116001909-b77594299b42/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200317113312-5766fd39f98d h1:62ap6LNOjDU6uGmKXHJbSfciMoV+FeI1sRXx/pLDL44= golang.org/x/sys v0.0.0-20200317113312-5766fd39f98d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= +golang.org/x/text v0.3.2 h1:tW2bmiBqwgJj/UpqtC8EpXEZVYOwU0yG4iWbprSVAcs= golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= +golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190425163242-31fd60d6bfdc/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20190823170909-c4a336ef6a2f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191010075000-0337d82405ff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= @@ -222,13 +494,23 @@ golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtn golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw= +golang.org/x/tools v0.0.0-20200308013534-11ec41452d41/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw= +golang.org/x/xerrors v0.0.0-20190410155217-1f06c39b4373/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20190513163551-3ee3066db522/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE= google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M= @@ -239,6 +521,7 @@ google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsb google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM= google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= @@ -258,21 +541,39 @@ google.golang.org/genproto v0.0.0-20190927181202-20e1ac93f88c/go.mod h1:IbNlFCBr google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191220162840-803ea799ed88/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA= google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= google.golang.org/genproto v0.0.0-20200303153909-beee998c1893/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200306153348-d950eab6f860 h1:QmnwU8dKvY8c/vZikd2jhBNwrrGS5qeyK/2Aeeh9Grk= +google.golang.org/genproto v0.0.0-20200306153348-d950eab6f860/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= +google.golang.org/grpc v1.21.0/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= google.golang.org/grpc v1.23.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= google.golang.org/grpc v1.24.0/go.mod h1:XDChyiUovWa60DnaeDeZmSW86xtLtjtZbwvSiRnRtcA= google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +google.golang.org/grpc v1.27.1 h1:zvIju4sqAGvwKspUQOhwnpcqSbzi7/H6QomNNjTL4sk= google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= +gopkg.in/inconshreveable/log15.v2 v2.0.0-20180818164646-67afb5ed74ec/go.mod h1:aPpfJ7XW+gOuirDoZ8gHhLh3kZ1B08FtV2bbmy7Jv3s= +gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo= +gopkg.in/square/go-jose.v2 v2.4.0/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI= +gopkg.in/square/go-jose.v2 v2.4.1 h1:H0TmLt7/KmzlrDOpa1F+zr0Tk90PbJYBfsVUmRLrf9Y= +gopkg.in/square/go-jose.v2 v2.4.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI= +gopkg.in/yaml.v2 v2.0.0-20170812160011-eb3733d160e7/go.mod h1:JAlM8MvJe8wmxCU4Bli9HhUf9+ttbYbLASfIpnQbh74= +gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.7 h1:VUgggvou5XRW9mHwD/yXxIYSMtY0zoKQf/v226p2nyo= @@ -284,6 +585,7 @@ honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWh honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= +honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= diff --git a/pkg/admin/api/grpc/generate.go b/pkg/admin/api/grpc/generate.go new file mode 100644 index 0000000000..8887324db4 --- /dev/null +++ b/pkg/admin/api/grpc/generate.go @@ -0,0 +1,7 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate --go_out=plugins=grpc:$GOPATH/src ../proto/org.proto +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto +//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/citadel/admin/api/grpc AdminServiceClient + +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto new file mode 100644 index 0000000000..bc852af121 --- /dev/null +++ b/pkg/admin/api/proto/admin.proto @@ -0,0 +1,100 @@ + +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/struct.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "authoption/options.proto"; +import "github.com/caos/zitadel/pkg/admin/api/proto/org.proto"; + +package zitadel.admin.api.v1; + +option go_package ="github.com/caos/zitadel/admin/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "admin service"; + version: "0.1"; + contact:{ + url: "https://github.com/caos/zitadel/admin" + }; + }; + + schemes: HTTPS; + + consumes: "application/json"; + consumes: "application/grpc"; + + produces: "application/json"; + produces: "application/grpc"; +}; + +service AdminService { + // --------- + // Probes + // --------- + + // Healthz returns status OK as soon as the service started + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + // Ready returns status OK as soon as all dependent services are available + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + +//ORG + rpc IsOrgUnique(zitadel.admin.v1.UniqueOrgRequest) returns (zitadel.admin.v1.UniqueOrgResponse) { + option (google.api.http) = { + get: "/orgs/_isunique" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc GetOrgByID(zitadel.admin.v1.OrgID) returns (zitadel.admin.v1.Org) { + option (google.api.http) = { + get: "/orgs/{id}" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc SearchOrgs(zitadel.admin.v1.OrgSearchRequest) returns (zitadel.admin.v1.OrgSearchResponse) { + option (google.api.http) = { + post: "/orgs/_search" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.read" + }; + } + + rpc SetUpOrg(zitadel.admin.v1.OrgSetUpRequest) returns (zitadel.admin.v1.OrgSetUpResponse) { + option (google.api.http) = { + post: "/orgs/_setup" + body: "*" + }; + + option (caos.zitadel.utils.v1.auth_option) = { + permission: "iam.write" + }; + } +} \ No newline at end of file diff --git a/pkg/admin/api/proto/org.proto b/pkg/admin/api/proto/org.proto new file mode 100644 index 0000000000..c8a54f4410 --- /dev/null +++ b/pkg/admin/api/proto/org.proto @@ -0,0 +1,137 @@ +syntax = "proto3"; + +import "google/protobuf/timestamp.proto"; +import "validate/validate.proto"; + +package zitadel.admin.v1; + +option go_package = "github.com/caos/zitadel/pkg/admin/api/grpc"; + +message OrgID { + string id = 1; +} + +message UniqueOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} + +message UniqueOrgResponse { + bool is_unique = 1; +} + +message Org { + string id = 1; + OrgState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + string domain = 6; +} + +enum OrgState { + ORGSTATE_UNSPECIFIED = 0; + ORGSTATE_ACTIVE = 1; + ORGSTATE_INACTIVE = 2; +} + +message OrgSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + OrgSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated OrgSearchQuery queries = 5; +} + +message OrgSearchQuery { + OrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + OrgSearchMethod method = 2; + string value = 3; +} + +enum OrgSearchKey { + ORGSEARCHKEY_UNSPECIFIED = 0; + ORGSEARCHKEY_ORG_NAME = 1; + ORGSEARCHKEY_DOMAIN = 2; + ORGSEARCHKEY_STATE = 3; +} + +message OrgSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Org result = 4; +} + +enum OrgSearchMethod { + ORGSEARCHMETHOD_EQUALS = 0; + ORGSEARCHMETHOD_STARTS_WITH = 1; + ORGSEARCHMETHOD_CONTAINS = 2; +} + +message OrgSetUpRequest { + CreateOrgRequest org = 1; + RegisterUserRequest user = 2; +} + +message OrgSetUpResponse { + Org org = 1; + User user = 2; +} + +message RegisterUserRequest { + string email = 1 [(validate.rules).string.email = true]; + string first_name = 2 [(validate.rules).string.min_len = 1]; + string last_name = 3 [(validate.rules).string.min_len = 1]; + string nick_name = 4; + string display_name = 5; + string preferred_language = 6; + Gender gender = 7; + string password = 8 [(validate.rules).string.min_len = 1]; + string org_id = 9 [(validate.rules).string.min_len = 1]; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string user_name = 5; + string first_name = 6; + string last_name = 7; + string nick_name = 8; + string display_name = 9; + string preferred_language = 10; + Gender gender = 11; + string email = 12; + bool isEmailVerified = 13; + string phone = 14; + bool isPhoneVerified = 15; + string country = 16; + string locality = 17; + string postal_code = 18; + string region = 19; + string street_address = 20; +} + +enum UserState { + USERSTATE_UNSPPECIFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message CreateOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} From 3c819e561a5d5db4b7adf8b213671fa0c84a5e36 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 10:50:40 +0100 Subject: [PATCH 02/19] feat: add proto files --- go.sum | 1 + pkg/admin/api/grpc/generate.go | 1 - pkg/admin/api/proto/admin.proto | 141 +- pkg/admin/api/proto/org.proto | 137 -- pkg/auth/api/grpc/generate.go | 5 + pkg/auth/api/proto/auth.proto | 1169 +++++++++++ pkg/management/api/grpc/generate.go | 6 + pkg/management/api/proto/management.proto | 2164 +++++++++++++++++++++ 8 files changed, 3480 insertions(+), 144 deletions(-) delete mode 100644 pkg/admin/api/proto/org.proto create mode 100644 pkg/auth/api/grpc/generate.go create mode 100644 pkg/auth/api/proto/auth.proto create mode 100644 pkg/management/api/grpc/generate.go create mode 100644 pkg/management/api/proto/management.proto diff --git a/go.sum b/go.sum index 177ae9d7e2..ebd09e2dd8 100644 --- a/go.sum +++ b/go.sum @@ -298,6 +298,7 @@ github.com/rs/zerolog v1.13.0/go.mod h1:YbFCdg8HfsridGWAh22vktObvhZbQsZXe4/zB0OK github.com/rs/zerolog v1.15.0/go.mod h1:xYTKnLHcpfU2225ny5qZjxnj9NvkumZYjJHlAThCjNc= github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= github.com/satori/go.uuid v1.2.0/go.mod h1:dA0hQrYB0VpLJoorglMZABFdXlWrHn1NEOzdhQKdks0= +github.com/sethvargo/go-password v0.1.3 h1:18KkbGDkw8SuzeohAbWqBLNSfRQblVwEHOLbPa0PvWM= github.com/sethvargo/go-password v0.1.3/go.mod h1:2tyaaoHK/AlXwh5WWQDYjqQbHcq4cjPj5qb/ciYvu/Q= github.com/shopspring/decimal v0.0.0-20180709203117-cd690d0c9e24/go.mod h1:M+9NzErvs504Cn4c5DxATwIqPbtswREoFCre64PpcG4= github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc= diff --git a/pkg/admin/api/grpc/generate.go b/pkg/admin/api/grpc/generate.go index 8887324db4..7632f53f8c 100644 --- a/pkg/admin/api/grpc/generate.go +++ b/pkg/admin/api/grpc/generate.go @@ -1,6 +1,5 @@ package grpc -//go:generate protoc -I$GOPATH/src -I../proto -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate --go_out=plugins=grpc:$GOPATH/src ../proto/org.proto //go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto //go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/citadel/admin/api/grpc AdminServiceClient diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto index bc852af121..f187dc913e 100644 --- a/pkg/admin/api/proto/admin.proto +++ b/pkg/admin/api/proto/admin.proto @@ -3,10 +3,10 @@ syntax = "proto3"; import "google/api/annotations.proto"; import "google/protobuf/empty.proto"; +import "google/protobuf/timestamp.proto"; import "google/protobuf/struct.proto"; import "protoc-gen-swagger/options/annotations.proto"; import "authoption/options.proto"; -import "github.com/caos/zitadel/pkg/admin/api/proto/org.proto"; package zitadel.admin.api.v1; @@ -56,7 +56,7 @@ service AdminService { } //ORG - rpc IsOrgUnique(zitadel.admin.v1.UniqueOrgRequest) returns (zitadel.admin.v1.UniqueOrgResponse) { + rpc IsOrgUnique(UniqueOrgRequest) returns (UniqueOrgResponse) { option (google.api.http) = { get: "/orgs/_isunique" }; @@ -66,7 +66,7 @@ service AdminService { }; } - rpc GetOrgByID(zitadel.admin.v1.OrgID) returns (zitadel.admin.v1.Org) { + rpc GetOrgByID(OrgID) returns (Org) { option (google.api.http) = { get: "/orgs/{id}" }; @@ -76,7 +76,7 @@ service AdminService { }; } - rpc SearchOrgs(zitadel.admin.v1.OrgSearchRequest) returns (zitadel.admin.v1.OrgSearchResponse) { + rpc SearchOrgs(OrgSearchRequest) returns (OrgSearchResponse) { option (google.api.http) = { post: "/orgs/_search" body: "*" @@ -87,7 +87,7 @@ service AdminService { }; } - rpc SetUpOrg(zitadel.admin.v1.OrgSetUpRequest) returns (zitadel.admin.v1.OrgSetUpResponse) { + rpc SetUpOrg(OrgSetUpRequest) returns (OrgSetUpResponse) { option (google.api.http) = { post: "/orgs/_setup" body: "*" @@ -97,4 +97,133 @@ service AdminService { permission: "iam.write" }; } -} \ No newline at end of file +} + +message OrgID { + string id = 1; +} + +message UniqueOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} + +message UniqueOrgResponse { + bool is_unique = 1; +} + +message Org { + string id = 1; + OrgState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + string domain = 6; +} + +enum OrgState { + ORGSTATE_UNSPECIFIED = 0; + ORGSTATE_ACTIVE = 1; + ORGSTATE_INACTIVE = 2; +} + +message OrgSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + OrgSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated OrgSearchQuery queries = 5; +} + +message OrgSearchQuery { + OrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + OrgSearchMethod method = 2; + string value = 3; +} + +enum OrgSearchKey { + ORGSEARCHKEY_UNSPECIFIED = 0; + ORGSEARCHKEY_ORG_NAME = 1; + ORGSEARCHKEY_DOMAIN = 2; + ORGSEARCHKEY_STATE = 3; +} + +message OrgSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Org result = 4; +} + +enum OrgSearchMethod { + ORGSEARCHMETHOD_EQUALS = 0; + ORGSEARCHMETHOD_STARTS_WITH = 1; + ORGSEARCHMETHOD_CONTAINS = 2; +} + +message OrgSetUpRequest { + CreateOrgRequest org = 1; + RegisterUserRequest user = 2; +} + +message OrgSetUpResponse { + Org org = 1; + User user = 2; +} + +message RegisterUserRequest { + string email = 1 [(validate.rules).string.email = true]; + string first_name = 2 [(validate.rules).string.min_len = 1]; + string last_name = 3 [(validate.rules).string.min_len = 1]; + string nick_name = 4; + string display_name = 5; + string preferred_language = 6; + Gender gender = 7; + string password = 8 [(validate.rules).string.min_len = 1]; + string org_id = 9 [(validate.rules).string.min_len = 1]; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string user_name = 5; + string first_name = 6; + string last_name = 7; + string nick_name = 8; + string display_name = 9; + string preferred_language = 10; + Gender gender = 11; + string email = 12; + bool isEmailVerified = 13; + string phone = 14; + bool isPhoneVerified = 15; + string country = 16; + string locality = 17; + string postal_code = 18; + string region = 19; + string street_address = 20; +} + +enum UserState { + USERSTATE_UNSPECIFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message CreateOrgRequest { + string name = 1 [(validate.rules).string.min_len = 1]; + string domain = 2 [(validate.rules).string.min_len = 1]; +} diff --git a/pkg/admin/api/proto/org.proto b/pkg/admin/api/proto/org.proto deleted file mode 100644 index c8a54f4410..0000000000 --- a/pkg/admin/api/proto/org.proto +++ /dev/null @@ -1,137 +0,0 @@ -syntax = "proto3"; - -import "google/protobuf/timestamp.proto"; -import "validate/validate.proto"; - -package zitadel.admin.v1; - -option go_package = "github.com/caos/zitadel/pkg/admin/api/grpc"; - -message OrgID { - string id = 1; -} - -message UniqueOrgRequest { - string name = 1 [(validate.rules).string.min_len = 1]; - string domain = 2 [(validate.rules).string.min_len = 1]; -} - -message UniqueOrgResponse { - bool is_unique = 1; -} - -message Org { - string id = 1; - OrgState state = 2; - google.protobuf.Timestamp creation_date = 3; - google.protobuf.Timestamp change_date = 4; - string name = 5; - string domain = 6; -} - -enum OrgState { - ORGSTATE_UNSPECIFIED = 0; - ORGSTATE_ACTIVE = 1; - ORGSTATE_INACTIVE = 2; -} - -message OrgSearchRequest { - uint64 offset = 1; - uint64 limit = 2; - OrgSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; - bool asc = 4; - repeated OrgSearchQuery queries = 5; -} - -message OrgSearchQuery { - OrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; - OrgSearchMethod method = 2; - string value = 3; -} - -enum OrgSearchKey { - ORGSEARCHKEY_UNSPECIFIED = 0; - ORGSEARCHKEY_ORG_NAME = 1; - ORGSEARCHKEY_DOMAIN = 2; - ORGSEARCHKEY_STATE = 3; -} - -message OrgSearchResponse { - uint64 offset = 1; - uint64 limit = 2; - uint64 total_result = 3; - repeated Org result = 4; -} - -enum OrgSearchMethod { - ORGSEARCHMETHOD_EQUALS = 0; - ORGSEARCHMETHOD_STARTS_WITH = 1; - ORGSEARCHMETHOD_CONTAINS = 2; -} - -message OrgSetUpRequest { - CreateOrgRequest org = 1; - RegisterUserRequest user = 2; -} - -message OrgSetUpResponse { - Org org = 1; - User user = 2; -} - -message RegisterUserRequest { - string email = 1 [(validate.rules).string.email = true]; - string first_name = 2 [(validate.rules).string.min_len = 1]; - string last_name = 3 [(validate.rules).string.min_len = 1]; - string nick_name = 4; - string display_name = 5; - string preferred_language = 6; - Gender gender = 7; - string password = 8 [(validate.rules).string.min_len = 1]; - string org_id = 9 [(validate.rules).string.min_len = 1]; -} - -message User { - string id = 1; - UserState state = 2; - google.protobuf.Timestamp creation_date = 3; - google.protobuf.Timestamp change_date = 4; - string user_name = 5; - string first_name = 6; - string last_name = 7; - string nick_name = 8; - string display_name = 9; - string preferred_language = 10; - Gender gender = 11; - string email = 12; - bool isEmailVerified = 13; - string phone = 14; - bool isPhoneVerified = 15; - string country = 16; - string locality = 17; - string postal_code = 18; - string region = 19; - string street_address = 20; -} - -enum UserState { - USERSTATE_UNSPPECIFIED = 0; - USERSTATE_ACTIVE = 1; - USERSTATE_INACTIVE = 2; - USERSTATE_DELETED = 3; - USERSTATE_LOCKED = 4; - USERSTATE_SUSPEND = 5; - USERSTATE_INITIAL= 6; -} - -enum Gender { - GENDER_UNSPECIFIED = 0; - GENDER_FEMALE = 1; - GENDER_MALE = 2; - GENDER_DIVERSE = 3; -} - -message CreateOrgRequest { - string name = 1 [(validate.rules).string.min_len = 1]; - string domain = 2 [(validate.rules).string.min_len = 1]; -} diff --git a/pkg/auth/api/grpc/generate.go b/pkg/auth/api/grpc/generate.go new file mode 100644 index 0000000000..37b24a85ef --- /dev/null +++ b/pkg/auth/api/grpc/generate.go @@ -0,0 +1,5 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto +//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/citadel/auth/api/grpc AuthServiceClient +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto new file mode 100644 index 0000000000..225403aaae --- /dev/null +++ b/pkg/auth/api/proto/auth.proto @@ -0,0 +1,1169 @@ +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/struct.proto"; +import "google/protobuf/timestamp.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "authoption/options.proto"; + +package zitadel.auth.api.v1; + +option go_package = "github.com/caos/citadel/auth/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "Auth API"; + version: "0.1"; + contact:{ + url: "https://github.com/caos/citadel/auth" + }; + }; + + schemes: HTTPS; + + consumes: "application/json"; + consumes: "application/grpc"; + + produces: "application/json"; + produces: "application/grpc"; +}; + +service AuthService { + // Readiness + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + + // Authorization + rpc GetUserAgent(UserAgentID) returns (UserAgent) { + option (google.api.http) = { + get: "/useragents/{id}" + }; + } + + rpc CreateUserAgent(UserAgentCreation) returns (UserAgent) { + option (google.api.http) = { + post: "/useragents" + body: "*" + }; + } + + rpc RevokeUserAgent(UserAgentID) returns (UserAgent) { + option (google.api.http) = { + put: "/useragents/{id}" + body: "*" + }; + } + + rpc CreateAuthSession(AuthSessionCreation) returns (AuthSessionResponse) { + option (google.api.http) = { + post: "/useragents/{agent_id}/authsessions" + body: "*" + }; + } + + rpc GetAuthSession(AuthSessionID) returns (AuthSessionResponse) { + option (google.api.http) = { + get: "/useragents/{agent_id}/authsessions/{id}" + }; + } + + rpc GetAuthSessionByTokenID(TokenID) returns (AuthSessionView) { + option (google.api.http) = { + get: "/tokens/{id}/authsession" + }; + } + + rpc SelectUser(SelectUserRequest) returns (AuthSessionResponse) { + option (google.api.http) = { + put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser" + body: "*" + }; + } + + rpc VerifyUser(VerifyUserRequest) returns (AuthSessionResponse) { + option (google.api.http) = { + put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser" + body: "*" + }; + } + + rpc VerifyPassword(VerifyPasswordRequest) returns (AuthSessionResponse) { + option (google.api.http) = { + put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword" + body: "*" + }; + } + + rpc VerifyMfa(VerifyMfaRequest) returns (AuthSessionResponse) { + option (google.api.http) = { + put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa" + body: "*" + }; + } + + rpc GetUserAgentSessions(UserAgentID) returns (UserSessions) { + option (google.api.http) = { + get: "/useragents/{id}/usersessions" + }; + } + + rpc GetUserSession(UserSessionID) returns (UserSession) { + option (google.api.http) = { + get: "/useragents/{agent_id}/usersessions/{id}" + }; + } + + rpc GetMyUserSessions(google.protobuf.Empty) returns (UserSessionViews) { + option (google.api.http) = { + get: "/me/usersessions" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc TerminateUserSession(UserSessionID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/useragents/{agent_id}/usersessions/{id}" + }; + } + + rpc CreateToken(CreateTokenRequest) returns (Token) { + option (google.api.http) = { + post: "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens" + body: "*" + }; + } + + //User + rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) { + option (google.api.http) = { + get: "/users/_isunique" + }; + } + + rpc RegisterUser(RegisterUserRequest) returns (User) { + option (google.api.http) = { + post: "/users/_register" + body: "*" + }; + } + + rpc RegisterUserWithExternal(RegisterUserExternalIDPRequest) returns (User) { + option (google.api.http) = { + post: "/users/_externalregister" + body: "*" + }; + } + + rpc GetMyUserProfile(google.protobuf.Empty) returns (UserProfile) { + option (google.api.http) = { + get: "/users/me/profile" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc UpdateMyUserProfile(UpdateUserProfileRequest) returns (UserProfile) { + option (google.api.http) = { + put: "/users/me/profile" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyUserEmail(google.protobuf.Empty) returns (UserEmail) { + option (google.api.http) = { + get: "/users/me/email" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ChangeMyUserEmail(UpdateUserEmailRequest) returns (UserEmail) { + option (google.api.http) = { + put: "/users/me/email" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMyUserEmail(VerifyMyUserEmailRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/email/_verify" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyUserEmail(VerifyUserEmailRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/email/_verify" + body: "*" + }; + + } + + rpc ResendMyEmailVerificationMail(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/email/_resendverification" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/email/_resendverification" + body: "*" + }; + + } + + rpc GetMyUserPhone(google.protobuf.Empty) returns (UserPhone) { + option (google.api.http) = { + get: "/users/me/phone" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ChangeMyUserPhone(UpdateUserPhoneRequest) returns (UserPhone) { + option (google.api.http) = { + put: "/users/me/phone" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMyUserPhone(VerifyUserPhoneRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/phone/_verify" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc ResendMyPhoneVerificationCode(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/me/phone/_resendverification" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyUserAddress(google.protobuf.Empty) returns (UserAddress) { + option (google.api.http) = { + get: "/users/me/address" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc UpdateMyUserAddress(UpdateUserAddressRequest) returns (UserAddress) { + option (google.api.http) = { + put: "/users/me/address" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc GetMyMfas(google.protobuf.Empty) returns (MultiFactors) { + option (google.api.http) = { + get: "/users/me/mfas" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + //Password + + rpc SetMyPassword(PasswordRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/users/me/passwords" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc RequestPasswordReset(ResetPasswordRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/passwords/_requestpwreset" + body: "*" + }; + } + + rpc PasswordReset(ResetPassword) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/passwords/_resetpw" + body: "*" + }; + } + + rpc ChangeMyPassword(PasswordChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/users/me/passwords/_change" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + // MFA + rpc AddMfaOTP(google.protobuf.Empty) returns (MfaOtpResponse) { + option (google.api.http) = { + post: "/users/me/mfa/otp" + body: "*" + }; + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc VerifyMfaOTP(VerifyMfaOtp) returns (MfaOtpResponse) { + option (google.api.http) = { + put: "/users/me/mfa/otp/_verify" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc RemoveMfaOTP(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/users/me/mfa/otp" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc SkipMfaInit(SkipMfaInitRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{user_id}/mfa/_skipinit" + body: "*" + }; + } + + + //TODO: Remove func only for tests + rpc GetUserByID(UserID) returns (User) { + option (google.api.http) = { + get: "/users/{id}" + }; + } + + //Application + rpc GetApplicationByID(ApplicationID) returns (Application) { + option (google.api.http) = { + get: "/applications/{id}" + }; + } + + rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) { + option (google.api.http) = { + post: "/applications/_search" + body: "*" + }; + } + + rpc AuthorizeApplication(ApplicationAuthorizeRequest) returns (Application) { + option (google.api.http) = { + post: "/applications/_authorize" + body: "*" + }; + } + + //Grant + rpc SearchGrant(GrantSearchRequest) returns (GrantSearchResponse) { + option (google.api.http) = { + post: "/grants/_search" + body: "*" + }; + } + + rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) { + option (google.api.http) = { + post: "/global/projectorgs/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + rpc IsIamAdmin(google.protobuf.Empty) returns (IsAdminResponse) { + option (google.api.http) = { + get: "/global/_isiamadmin" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } + + //Permission + rpc GetMyCitadelPermissions(google.protobuf.Empty) returns (MyPermissions) { + option (google.api.http) = { + get: "/permissions/zitadel/me" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "authenticated" + }; + } +} + + +message SessionRequest { + string user_id = 1; + BrowserInformation browser_info = 2; +} + +message UserAgent { + string id = 1; + BrowserInformation browser_info = 2; + UserAgentState state = 3; +} + + +enum UserAgentState { + USERAGENTSTATE_UNSPECIFIED = 0; + USERAGENTSTATE_ACTIVE = 1; + USERAGENTSTATE_TERMINATED = 2; +} + +message UserAgentID { + string id = 1; +} + +message UserAgentCreation { + BrowserInformation browser_info = 1 [(validate.rules).message.required = true]; +} + +message UserAgents { + repeated UserAgent sessions = 1; +} + +message AuthSessionCreation { + string agent_id = 1 [(validate.rules).string.min_len = 1]; + AuthSessionType type = 2; + BrowserInformation browser_info = 3 [(validate.rules).message.required = true]; + string client_id = 4 [(validate.rules).string.min_len = 1]; + string redirect_uri = 5 [(validate.rules).string.min_len = 1]; + string state = 6; + Prompt prompt = 7; + repeated string auth_context_class_reference = 8; + repeated string ui_locales = 9; + string login_hint = 10; + uint32 max_age = 11; + oneof type_info { + AuthRequestOIDC oidc = 12; + } + string preselected_user_id = 13; +} + +message AuthSessionResponse { + string agent_id = 1; + string id = 2; + AuthSessionType type = 3; + string client_id = 4; + string redirect_uri = 5; + string state = 6; + Prompt prompt = 7; + repeated string auth_context_class_reference = 8; + repeated string ui_locales = 9; + string login_hint = 10; + uint32 max_age = 11; + oneof type_info { + AuthRequestOIDC oidc = 12; + } + repeated NextStep possible_steps = 13; + repeated string project_client_ids = 14; + UserSession user_session = 15; +} + +message AuthSessionView { + string agent_id = 1; + string auth_session_id = 2; + AuthSessionType type = 3; + string client_id = 4; + string user_session_id = 5; + repeated string project_client_ids = 6; + string token_id = 7; + google.protobuf.Timestamp token_expiration = 8; + string user_id = 9; +} + +message TokenID { + string id = 1; +} + +message UserSessionID { + string id = 1; + string agent_id = 2; +} + +message UserSessions { + repeated UserSession user_sessions = 1; +} + +message UserSession { + string id = 1; + string agent_id = 2; + UserSessionState auth_state = 3; + AuthUser user = 4; + bool password_verified = 5; + MfaType mfa = 6; + bool mfa_verified = 7; + google.protobuf.Timestamp auth_time = 8; +} + +message UserSessionViews { + repeated UserSessionView user_sessions = 1; +} +message UserSessionView { + string id = 1; + string agent_id = 2; + UserSessionState auth_state = 3; + string user_id = 4; + string user_name = 5; +} + +message AuthUser { + string user_id = 1; + string user_name = 2; +} + +enum UserSessionState { + USERSESSIONSTATE_UNSPECIFIED = 0; + USERSESSIONSTATE_ACTIVE = 1; + USERSESSIONSTATE_TERMINATED = 2; +} + +message AuthSessionID { + string id = 1; + string agent_id = 2; + BrowserInformation browser_info = 3; +} + +message SelectUserRequest { + string agent_id = 1; + string auth_session_id = 2; + string user_session_id = 3; + BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; +} + +message VerifyUserRequest { + string agent_id = 1 [(validate.rules).string.min_len = 1]; + string auth_session_id = 2 [(validate.rules).string.min_len = 1]; + string user_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; +} + +message VerifyPasswordRequest { + string agent_id = 1 [(validate.rules).string.min_len = 1]; + string auth_session_id = 2 [(validate.rules).string.min_len = 1]; + string password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}]; + BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; +} + +message VerifyMfaRequest { + string agent_id = 1 [(validate.rules).string.min_len = 1]; + string auth_session_id = 2 [(validate.rules).string.min_len = 1]; + BrowserInformation browser_info = 3; + oneof mfa { + AuthSessionMultiFactorOTP otp = 4; + } +} + +message AuthSessionMultiFactorOTP { + string code = 1 [(validate.rules).string = {max_len: 200}]; +} + +message NextStep { + NextStepType type = 1; + oneof data { + LoginData login = 2; + PasswordData password = 3; + MfaVerifyData mfa_verify = 4; + MfaPromptData mfa_prompt = 5; + ChooseUserData choose_user = 6; + } +} + +enum NextStepType { + NEXTSTEP_UNSPECIFIED = 0; + NEXTSTEP_LOGIN = 1; + NEXTSTEP_PASSWORD = 2; + NEXTSTEP_CHANGE_PASSWORD = 3; + NEXTSTEP_MFA_PROMPT = 4; //TODO: ? + NEXTSTEP_MFA_INIT_CHOICE = 5; //TODO: ? + NEXTSTEP_MFA_INIT_CREATE = 6; + NEXTSTEP_MFA_INIT_VERIFY = 7; + NEXTSTEP_MFA_INIT_DONE = 8; + NEXTSTEP_MFA_VERIFY = 9; + NEXTSTEP_MFA_VERIFY_ASYNC = 10; + NEXTSTEP_VERIFY_EMAIL = 11; + NEXTSTEP_REDIRECT_TO_CALLBACK = 12; + NEXTSTEP_INIT_PASSWORD = 13; + NEXTSTEP_CHOOSE_USER = 14; +} + +message LoginData { + string err_msg = 1; +} + +message PasswordData { + string err_msg = 1; + uint32 failure_count = 2; +} + +message MfaVerifyData { + string err_msg = 1; + uint32 failure_count = 2; + repeated MfaType mfa_providers = 3; +} + +message MfaPromptData { + bool required = 1; + repeated MfaType mfa_providers = 2; +} + +message ChooseUserData { + repeated ChooseUser users = 1; +} + +message ChooseUser { + string user_session_id = 1; + string user_id = 2; + string user_name = 3; + UserSessionState user_session_state = 4; +} + +message SkipMfaInitRequest { + string user_id = 1; +} + +enum AuthSessionType { + AUTHSESSIONTYPE_UNSPECIFIED = 0; //TODO: necessary? + AUTHSESSIONTYPE_OIDC = 1; + AUTHSESSIONTYPE_SAML = 2; +} + +message BrowserInformation { + string user_agent = 1; + IP remote_ip = 2 [(validate.rules).message.required = true]; + string accept_language = 3; +} + +message IP { + string V4 = 1; + string V6 = 2; +} + +enum Prompt { + PROMPT_UNSPECIFIED = 0; + PROMPT_NONE = 1; + PROMPT_LOGIN = 2; + PROMPT_CONSENT = 3; + PROMPT_SELECT_ACCOUNT = 4; +} + +message AuthRequestOIDC { + repeated string scope = 1; + OIDCResponseType response_type = 2; + string nonce = 3; + CodeChallenge code_challenge = 4; +} + +enum OIDCResponseType { + OIDCRESPONSETYPE_CODE = 0; + OIDCRESPONSETYPE_ID_TOKEN = 1; + OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2; +} + +message CodeChallenge { + string challenge = 1; + CodeChallengeMethod method = 2; +} + +enum CodeChallengeMethod { + CODECHALLENGEMETHOD_PLAIN = 0; + CODECHALLENGEMETHOD_S256 = 1; +} + +message UserID { + string id = 1; +} + +message UniqueUserRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UniqueUserResponse { + bool is_unique = 1; +} + + +message RegisterUserRequest { + string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5 [(validate.rules).string = {max_len: 200}]; + string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; + Gender gender = 7; + string password = 8 [(validate.rules).string = {min_len: 1, max_len: 72}]; + string org_id = 9 [(validate.rules).string.min_len = 1]; +} + +message RegisterUserExternalIDPRequest { + string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5 [(validate.rules).string = {max_len: 200}]; + string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; + Gender gender = 7; + IDPProvider idp_provider = 8; + string org_id = 9 [(validate.rules).string.min_len = 1]; +} + +message IDPProvider { + string provider = 8; + string externalIdpID = 9; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp activation_date = 4; + google.protobuf.Timestamp change_date = 5; + google.protobuf.Timestamp last_login = 6; + google.protobuf.Timestamp password_changed = 7; + string user_name = 8; + string first_name = 9; + string last_name = 10; + string nick_name = 11; + string display_name = 12; + string preferred_language = 13; + Gender gender = 14; + string email = 15; + bool is_email_verified = 16; + string phone = 17; + bool is_phone_verified = 18; + string country = 19; + string locality = 20; + string postal_code = 21; + string region = 22; + string street_address = 23; + bool password_change_required = 24; +} + +enum UserState { + USERSTATE_UNSPECIEFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message UserProfile { + string id = 1; + string user_name = 2; + string first_name = 3; + string last_name = 4; + string nick_name = 5; + string display_name = 6; + string preferred_language = 7; + Gender gender = 8; +} + +message UpdateUserProfileRequest { + string first_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string display_name = 4 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string preferred_language = 5 [(validate.rules).string = {min_len: 1, max_len: 200}]; + Gender gender = 6; +} + +message UserEmail { + string id = 1; + string email = 2; + bool isEmailVerified = 3; +} + +message VerifyMyUserEmailRequest { + string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message VerifyUserEmailRequest { + string id = 1; + string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UpdateUserEmailRequest { + string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UserPhone { + string id = 1; + string phone = 2; + bool is_phone_verified = 3; +} + +message UpdateUserPhoneRequest { + string phone = 1 [(validate.rules).string = {min_len: 1, max_len: 20}]; +} + +message VerifyUserPhoneRequest { + string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UserAddress { + string id = 1; + string country = 2; + string locality = 3; + string postal_code = 4; + string region = 5; + string street_address = 6; +} + +message UpdateUserAddressRequest { + string country = 1 [(validate.rules).string = {max_len: 200}]; + string locality = 2 [(validate.rules).string = {max_len: 200}]; + string postal_code = 3 [(validate.rules).string = {max_len: 200}]; + string region = 4 [(validate.rules).string = {max_len: 200}]; + string street_address = 5 [(validate.rules).string = {max_len: 200}]; +} + +message PasswordID{ + string id = 1; +} + +message PasswordRequest { + string password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +message ResetPasswordRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + NotificationType type = 2; +} + +message ResetPassword { + string id = 1 [(validate.rules).string.min_len = 1]; + string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string new_password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +message SetPasswordNotificationRequest { + string id = 1; + NotificationType type = 2; +} + +enum NotificationType { + NOTIFICATIONTYPE_EMAIL = 0; + NOTIFICATIONTYPE_SMS = 1; +} + +message PasswordChange { + string old_password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; + string new_password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +enum MfaType { + MFATYPE_UNSPECIFIED = 0; + MFATYPE_SMS = 1; + MFATYPE_OTP = 2; +} + +message VerifyMfaOtp { + string code = 1; +} + +message MultiFactors { + repeated MultiFactor mfas = 1; +} + +message MultiFactor { + MfaType type = 1; + MFAState state = 2; +} + +message MfaOtpResponse { + string user_id = 1; + string url = 2; + string secret = 3; + MFAState state = 4; +} + +enum MFAState { + MFASTATE_UNSPECIFIED = 0; + MFASTATE_NOT_READY = 1; + MFASTATE_READY = 2; + MFASTATE_REMOVED = 3; +} + +message ApplicationID { + string id = 1; +} + +message Application { + string id = 1; + AppState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + oneof app_config { + OIDCConfig oidc_config = 8; + } +} + + +enum AppState { + APPSTATE_UNSPECIFIED = 0; + APPSTATE_ACTIVE = 1; + APPSTATE_INACTIVE = 2; + APPSTATE_DELETED = 3; +} + + +message OIDCConfig { + repeated string redirect_uris = 1; + repeated OIDCResponseType response_types = 2; + repeated OIDCGrantType grant_types = 3; + OIDCApplicationType application_type = 4; + string client_secret = 5; + string client_id = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +enum OIDCGrantType { + OIDCGRANTTYPE_AUTHORIZATION_CODE = 0; + OIDCGRANTTYPE_GRANT_TYPE_NONE = 1; + OIDCGRANTTYPE_REFRESH_TOKEN = 2; +} + +enum OIDCApplicationType { + OIDCAPPLICATIONTYPE_WEB = 0; + OIDCAPPLICATIONTYPE_USER_AGENT = 1; + OIDCAPPLICATIONTYPE_NATIVE = 2; +} + +enum OIDCAuthMethodType { + OIDCAUTHMETHODTYPE_BASIC = 0; + OIDCAUTHMETHODTYPE_POST = 1; + OIDCAUTHMETHODTYPE_NONE = 2; +} + +message ApplicationSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + ApplicationSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated ApplicationSearchQuery queries = 5; +} + +message ApplicationSearchQuery { + ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum ApplicationSearchKey { + APPLICATIONSEARCHKEY_UNSPECIFIED = 0; + APPLICATIONSEARCHKEY_APP_TYPE = 1; + APPLICATIONSEARCHKEY_STATE = 2; + APPLICATIONSEARCHKEY_CLIENT_ID = 3; + APPLICATIONSEARCHKEY_APP_NAME = 4; + APPLICATIONSEARCHKEY_PROJECT_ID = 5; +} + +message ApplicationSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Application result = 4; +} + +enum SearchMethod { + SEARCHMETHOD_EQUALS = 0; + SEARCHMETHOD_STARTS_WITH = 1; + SEARCHMETHOD_CONTAINS = 2; +} + +message ApplicationAuthorizeRequest { + oneof auth { + OIDCClientAuth oidc_client_auth = 1; + } +} + +message OIDCClientAuth { + string client_id = 1; + string client_secret = 2; +} + + +message GrantSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + GrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated GrantSearchQuery queries = 5; +} + +message GrantSearchQuery { + GrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum GrantSearchKey { + GRANTSEARCHKEY_UNSPECIFIED = 0; + GRANTSEARCHKEY_ORG_ID = 1; + GRANTSEARCHKEY_PROJECT_ID = 2; + GRANTSEARCHKEY_USER_ID = 3; +} + +message GrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Grant result = 4; +} + +message Grant { + string OrgId = 1; + string ProjectId = 2; + string UserId = 3; + repeated string Roles = 4; + string OrgName = 5; +} + +message MyProjectOrgSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + bool asc = 4; + repeated MyProjectOrgSearchQuery queries = 5; +} + +message MyProjectOrgSearchQuery { + MyProjectOrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum MyProjectOrgSearchKey { + MYPROJECTORGSEARCHKEY_UNSPECIFIED = 0; + MYPROJECTORGSEARCHKEY_ORG_NAME = 1; +} + +message MyProjectOrgSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Org result = 4; +} + +message IsAdminResponse { + bool is_admin = 1; +} + +message Org { + string id = 1; + string name = 2; +} + +message CreateTokenRequest { + string agent_id = 1 [(validate.rules).string.min_len = 1]; + string auth_session_id = 2 [(validate.rules).string.min_len = 1]; +} + +message Token { + string id = 1; + google.protobuf.Timestamp expiration = 8; +} + +message MyPermissions { + repeated string permissions = 1; +} + + +message VerifyUserInitRequest { + string id = 1; + string code = 2; + string password = 3; +} diff --git a/pkg/management/api/grpc/generate.go b/pkg/management/api/grpc/generate.go new file mode 100644 index 0000000000..9db2fd3585 --- /dev/null +++ b/pkg/management/api/grpc/generate.go @@ -0,0 +1,6 @@ +package grpc + +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto +//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/citadel/management/api/grpc ManagementServiceClient + +//go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/proto/management.proto b/pkg/management/api/proto/management.proto new file mode 100644 index 0000000000..0b7ed3da73 --- /dev/null +++ b/pkg/management/api/proto/management.proto @@ -0,0 +1,2164 @@ +syntax = "proto3"; + +import "google/api/annotations.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/struct.proto"; +import "google/protobuf/timestamp.proto"; +import "protoc-gen-swagger/options/annotations.proto"; +import "validate/validate.proto"; +import "google/protobuf/descriptor.proto"; +import "authoption/options.proto"; + +package caos.citadel.management.api.v1; + +option go_package = "github.com/caos/citadel/management/api/grpc"; + +option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { + info: { + title: "Management API"; +version: "0.1"; +contact:{ +url: "https://github.com/caos/citadel/management" +}; +}; + +schemes: HTTPS; + +consumes: "application/json"; +consumes: "application/grpc"; + +produces: "application/json"; +produces: "application/grpc"; +}; + +service ManagementService { + //READINESS + rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/healthz" + }; + } + + rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) { + option (google.api.http) = { + get: "/ready" + }; + } + + rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) { + option (google.api.http) = { + get: "/validate" + }; + } + + //USER + rpc GetUserByID(UserID) returns (User) { + option (google.api.http) = { + get: "/users/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc GetUserByEmailGlobal(UserEmailID) returns (User) { + option (google.api.http) = { + get: "/global/users/email/{email}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc SearchUsers(UserSearchRequest) returns (UserSearchResponse) { + option (google.api.http) = { + post: "/users/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) { + option (google.api.http) = { + get: "/users/_isunique" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc CreateUser(CreateUserRequest) returns (User) { + option (google.api.http) = { + post: "/users" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc DeactivateUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ReactivateUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc LockUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_lock" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc UnlockUser(UserID) returns (User) { + option (google.api.http) = { + put: "/users/{id}/_unlock" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc DeleteUser(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/users/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.delete" + }; + } + + rpc UserChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/users/{id}/changes" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ApplicationChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/applications/{id}/changes" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.read" + }; + } + + rpc OrgChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/orgs/{id}/changes" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc ProjectChanges(ChangeRequest) returns (Changes) { + option (google.api.http) = { + get: "/projects/{id}/changes" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + //USER_PROFILE + rpc GetUserProfile(UserID) returns (UserProfile) { + option (google.api.http) = { + get: "/users/{id}/profile" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc UpdateUserProfile(UpdateUserProfileRequest) returns (UserProfile) { + option (google.api.http) = { + put: "/users/{id}/profile" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_EMAIL + rpc GetUserEmail(UserID) returns (UserEmail) { + option (google.api.http) = { + get: "/users/{id}/email" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ChangeUserEmail(UpdateUserEmailRequest) returns (UserEmail) { + option (google.api.http) = { + put: "/users/{id}/email" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/email/_resendverification" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_PHONE + rpc GetUserPhone(UserID) returns (UserPhone) { + option (google.api.http) = { + get: "/users/{id}/phone" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc ChangeUserPhone(UpdateUserPhoneRequest) returns (UserPhone) { + option (google.api.http) = { + put: "/users/{id}/phone" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + rpc ResendPhoneVerificationCode(UserID) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/phone/_resendverification" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + //USER_ADDRESS + rpc GetUserAddress(UserID) returns (UserAddress) { + option (google.api.http) = { + get: "/users/{id}/address" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + rpc UpdateUserAddress(UpdateUserAddressRequest) returns (UserAddress) { + option (google.api.http) = { + put: "/users/{id}/address" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + //MFA + rpc GetUserMfas(UserID) returns (MultiFactors) { + option (google.api.http) = { + get: "/users/{id}/mfas" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.read" + }; + } + + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + rpc SendSetPasswordNotification(SetPasswordNotificationRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/_sendsetpwnotify" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + rpc SetInitialPassword(PasswordRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/users/{id}/_setinitialpw" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.write" + }; + } + + + //PASSWORD_COMPLEXITY_POLICY + rpc GetPasswordComplexityPolicy(google.protobuf.Empty) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + get: "/policies/passwords/complexity" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordComplexityPolicy(PasswordComplexityPolicyCreate) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + post: "/policies/passwords/complexity" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordComplexityPolicy(PasswordComplexityPolicyUpdate) returns (PasswordComplexityPolicy) { + option (google.api.http) = { + put: "/policies/passwords/complexity/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordComplexityPolicy(PasswordComplexityPolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/complexity/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //PASSWORD_AGE_POLICY + rpc GetPasswordAgePolicy(google.protobuf.Empty) returns (PasswordAgePolicy) { + option (google.api.http) = { + get: "/policies/passwords/age" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordAgePolicy(PasswordAgePolicyCreate) returns (PasswordAgePolicy) { + option (google.api.http) = { + post: "/policies/passwords/age" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordAgePolicy(PasswordAgePolicyUpdate) returns (PasswordAgePolicy) { + option (google.api.http) = { + put: "/policies/passwords/age/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordAgePolicy(PasswordAgePolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/age/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //PASSWORD_LOCKOUT_POLICY + rpc GetPasswordLockoutPolicy(google.protobuf.Empty) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + get: "/policies/passwords/lockout" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.read" + }; + } + + rpc CreatePasswordLockoutPolicy(PasswordLockoutPolicyCreate) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + post: "/policies/passwords/lockout" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc UpdatePasswordLockoutPolicy(PasswordLockoutPolicyUpdate) returns (PasswordLockoutPolicy) { + option (google.api.http) = { + put: "/policies/passwords/lockout/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.write" + }; + } + + rpc DeletePasswordLockoutPolicy(PasswordLockoutPolicyID) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/policies/passwords/lockout/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "policy.delete" + }; + } + + //ORG + rpc GetOrgByID(OrgID) returns (Org) { + option (google.api.http) = { + get: "/orgs/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc GetOrgByDomainGlobal(OrgDomain) returns (Org) { + option (google.api.http) = { + get: "/global/orgs/domain/{domain}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.read" + }; + } + + rpc DeactivateOrg(OrgID) returns (Org) { + option (google.api.http) = { + put: "/orgs/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.write" + }; + } + + rpc ReactivateOrg(OrgID) returns (Org) { + option (google.api.http) = { + put: "/orgs/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.write" + }; + } + + //ORG_MEMBERS + rpc GetOrgMemberRoles(google.protobuf.Empty) returns (OrgMemberRoles) { + option (google.api.http) = { + get: "/orgs/members/roles" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.member.read" + }; + } + + rpc AddOrgMember(AddOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/orgs/{org_id}/members" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.member.write" + }; + } + + rpc ChangeOrgMember(ChangeOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/orgs/{org_id}/members/{user_id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.member.write" + }; + } + + rpc RemoveOrgMember(RemoveOrgMemberRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/orgs/{org_id}/members/{user_id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.member.delete" + }; + } + + rpc SearchOrgMembers(OrgMemberSearchRequest) returns (OrgMemberSearchResponse) { + option (google.api.http) = { + post: "/orgs/{org_id}/members/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "org.member.read" + }; + } + + //PROJECTS + rpc SearchProjects(ProjectSearchRequest) returns (ProjectSearchResponse) { + option (google.api.http) = { + post: "/projects/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + rpc ProjectByID(ProjectID) returns (Project) { + option (google.api.http) = { + get: "/projects/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.read" + check_field_name: "Id" + }; + } + + rpc CreateProject(ProjectCreateRequest) returns (Project) { + option (google.api.http) = { + post: "/projects" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.write" + }; + } + + rpc UpdateProject(ProjectUpdateRequest) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + rpc DeactivateProject(ProjectID) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + rpc ReactivateProject(ProjectID) returns (Project) { + option (google.api.http) = { + put: "/projects/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.write" + check_field_name: "Id" + }; + } + + //GRANTED_PROJECT_GRANTS + rpc GetGrantedProjectGrantByID(GrantedGrantID) returns (ProjectGrant) { + option (google.api.http) = { + get: "/grants/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.read" + }; + } + + //PROJECT_MEMBERS + rpc GetProjectMemberRoles(google.protobuf.Empty) returns (ProjectMemberRoles) { + option (google.api.http) = { + get: "/projects/members/roles" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.member.read" + }; + } + + rpc SearchProjectMembers(ProjectMemberSearchRequest) returns (ProjectMemberSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/members/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.member.read" + check_field_name: "ProjectId" + }; + } + + rpc AddProjectMember(ProjectMemberAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{id}/members" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.member.write" + check_field_name: "Id" + }; + } + + rpc ChangeProjectMember(ProjectMemberChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/projects/{id}/members/{user_id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.member.write" + check_field_name: "Id" + }; + } + + rpc RemoveProjectMember(ProjectMemberRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{id}/members/{user_id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.member.delete" + check_field_name: "Id" + }; + } + + //PROJECT_ROLES + rpc SearchProjectRoles(ProjectRoleSearchRequest) returns (ProjectRoleSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/roles/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.role.read" + check_field_name: "ProjectId" + }; + } + + rpc AddProjectRole(ProjectRoleAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{id}/roles" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.role.write" + check_field_name: "Id" + }; + } + + rpc RemoveProjectRole(ProjectRoleRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{id}/roles/{name}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.role.delete" + check_field_name: "Id" + }; + } + + //APPLICATIONS + rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/applications/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.read" + check_field_name: "ProjectId" + }; + } + + rpc ApplicationByID(ApplicationID) returns (Application) { + option (google.api.http) = { + get: "/projects/{project_id}/applications/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.read" + check_field_name: "ProjectId" + }; + } + + rpc CreateOIDCApplication(OIDCApplicationCreate) returns (Application) { + option (google.api.http) = { + post: "/projects/{project_id}/oidcapplications" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateApplication(ApplicationUpdate) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc DeactivateApplication(ApplicationID) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc ReactivateApplication(ApplicationID) returns (Application) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateApplicationOIDCConfig(OIDCConfigUpdate) returns (OIDCConfig) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{application_id}/oidcconfig" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + rpc RegenerateOIDCClientSecret(ApplicationID) returns (ClientSecret) { + option (google.api.http) = { + put: "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.app.write" + check_field_name: "ProjectId" + }; + } + + //PROJECT_GRANT + rpc SearchProjectGrants(ProjectGrantSearchRequest) returns (ProjectGrantSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc ProjectGrantByID(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + get: "/projects/{project_id}/grants/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.read" + }; + } + + rpc CreateProjectGrant(ProjectGrantCreate) returns (ProjectGrant) { + option (google.api.http) = { + post: "/projects/{project_id}/grants" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc UpdateProjectGrant(ProjectGrantUpdate) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc DeactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + rpc ReactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.write" + }; + } + + + //PROJECT_GRANT_MEMBER + rpc GetProjectGrantMemberRoles(google.protobuf.Empty) returns (ProjectGrantMemberRoles) { + option (google.api.http) = { + get: "/projects/grants/members/roles" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.member.read" + }; + } + rpc SearchProjectGrantMembers(ProjectGrantMemberSearchRequest) returns (ProjectGrantMemberSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/{grant_id}/members/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.member.read" + }; + } + + rpc AddProjectGrantMember(ProjectGrantMemberAdd) returns (google.protobuf.Empty) { + option (google.api.http) = { + post: "/projects/{project_id}/grants/{grant_id}/members" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.member.write" + }; + } + + rpc ChangeProjectGrantMember(ProjectGrantMemberChange) returns (google.protobuf.Empty) { + option (google.api.http) = { + put: "/projects/{project_id}/grants/{grant_id}/members/{user_id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.member.write" + }; + } + + rpc RemoveProjectGrantMember(ProjectGrantMemberRemove) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.member.delete" + }; + } + + + //USER_GRANT + rpc SearchUserGrants(UserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/users/grants/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.read" + }; + } + + rpc UserGrantByID(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/users/{user_id}/grants/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.read" + }; + } + + rpc CreateUserGrant(UserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/users/{user_id}/grants" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc UpdateUserGrant(UserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc DeactivateUserGrant(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + rpc ReactivateUserGrant(UserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "user.grant.write" + }; + } + + //PROJECT_USER_GRANT + rpc SearchProjectUserGrants(ProjectUserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/projects/{project_id}/users/grants/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc ProjectUserGrantByID(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/projects/{project_id}/users/{user_id}/grants/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.read" + check_field_name: "ProjectId" + }; + } + + rpc CreateProjectUserGrant(UserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/projects/{project_id}/users/{user_id}/grants" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc UpdateProjectUserGrant(ProjectUserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc DeactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + + rpc ReactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.user.grant.write" + check_field_name: "ProjectId" + }; + } + //PROJECT_GRANT_USER_GRANT + rpc SearchProjectGrantUserGrants(ProjectGrantUserGrantSearchRequest) returns (UserGrantSearchResponse) { + option (google.api.http) = { + post: "/projectgrants/{project_grant_id}/users/grants/_search" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.read" + check_field_name: "ProjectGrantId" + }; + } + + rpc ProjectGrantUserGrantByID(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.read" + check_field_name: "ProjectGrantId" + }; + } + + rpc CreateProjectGrantUserGrant(ProjectGrantUserGrantCreate) returns (UserGrant) { + option (google.api.http) = { + post: "/projectgrants/{project_grant_id}/users/{user_id}/grants" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc UpdateProjectGrantUserGrant(ProjectGrantUserGrantUpdate) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc DeactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + + rpc ReactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) { + option (google.api.http) = { + put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate" + body: "*" + }; + + option (caos.citadel.utils.v1.auth_option) = { + permission: "project.grant.user.grant.write" + check_field_name: "ProjectGrantId" + }; + } + //Grant + rpc SearchAuthGrant(AuthGrantSearchRequest) returns (AuthGrantSearchResponse) { + option (google.api.http) = { + post: "/authgrants/_search" + body: "*" + }; + } +} + +message ChangeRequest { + string id = 1; + uint64 limit= 2; + uint64 sequence_offset = 3; +} + +message Changes { + repeated Change changes = 1; + uint64 offset = 2; + uint64 limit = 3; +} + +message Change { + google.protobuf.Timestamp change_date = 1; + string event_type = 2; + uint64 sequence = 3; + string modifier = 4; + google.protobuf.Struct data = 5; +} + +message ApplicationID { + string id = 1; + string project_id = 2; +} + +message ProjectID { + string id = 1; +} + +message UserID { + string id = 1; +} + +message UserEmailID { + string email = 1; +} + +message UniqueUserRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message UniqueUserResponse { + bool is_unique = 1; +} + +message CreateUserRequest { + string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5[(validate.rules).string = {max_len: 200}]; + string preferred_language = 6[(validate.rules).string = {max_len: 200}]; + Gender gender = 7; + string email = 8 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; + bool is_email_verified = 9; + string phone = 11 [(validate.rules).string = {max_len: 20}]; + bool is_phone_verified = 12; + string country = 13 [(validate.rules).string = {max_len: 200}]; + string locality = 14 [(validate.rules).string = {max_len: 200}]; + string postal_code = 15 [(validate.rules).string = {max_len: 200}]; + string region = 16 [(validate.rules).string = {max_len: 200}]; + string street_address = 17 [(validate.rules).string = {max_len: 200}]; + string password = 18 [(validate.rules).string = {max_len: 72}]; +} + +message User { + string id = 1; + UserState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + google.protobuf.Timestamp last_login = 5; + google.protobuf.Timestamp password_changed = 6; + string user_name = 7; + string first_name = 8; + string last_name = 9; + string display_name = 10; + string nick_name = 11; + string preferred_language = 12; + Gender gender = 13; + string email = 14; + bool is_email_verified = 15; + string phone = 16; + bool is_phone_verified = 17; + string country = 18; + string locality = 19; + string postal_code = 20; + string region = 21; + string street_address = 22; +} + +enum UserState { + USERSTATE_UNSPECIFIED = 0; + USERSTATE_ACTIVE = 1; + USERSTATE_INACTIVE = 2; + USERSTATE_DELETED = 3; + USERSTATE_LOCKED = 4; + USERSTATE_SUSPEND = 5; + USERSTATE_INITIAL= 6; +} + +enum Gender { + GENDER_UNSPECIFIED = 0; + GENDER_FEMALE = 1; + GENDER_MALE = 2; + GENDER_DIVERSE = 3; +} + +message UserSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + UserSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; + bool asc = 4; + repeated UserSearchQuery queries = 5; +} + +message UserSearchQuery { + UserSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; + SearchMethod method = 2; + string value = 3; +} + +enum UserSearchKey { + USERSEARCHKEY_UNSPECIFIED = 0; + USERSEARCHKEY_USER_NAME = 1; + USERSEARCHKEY_FIRST_NAME = 2; + USERSEARCHKEY_LAST_NAME = 3; + USERSEARCHKEY_NICK_NAME = 4; + USERSEARCHKEY_DISPLAY_NAME = 5; + USERSEARCHKEY_EMAIL = 6; + USERSEARCHKEY_STATE = 7; +} + +message UserSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated User result = 4; +} + +enum SearchMethod { + SEARCHMETHOD_EQUALS = 0; + SEARCHMETHOD_STARTS_WITH = 1; + SEARCHMETHOD_CONTAINS = 2; +} + + +message UserProfile { + string id = 1; + UserState state = 2; + string first_name = 3; + string last_name = 4; + string nick_name = 5; + string display_name = 6; + string preferred_language = 7; + Gender gender = 8; + string user_name = 9; +} + +message UpdateUserProfileRequest { + string id = 1; + string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; + string nick_name = 4 [(validate.rules).string = {max_len: 200}]; + string display_name = 5 [(validate.rules).string = {max_len: 200}]; + string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; + Gender gender = 7; +} + +message UserEmail { + string id = 1; + string email = 2; + bool is_email_verified = 3; +} + +message UpdateUserEmailRequest { + string id = 1; + string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + bool is_email_verified = 3; +} + +message UserPhone { + string id = 1; + string phone = 2; + bool is_phone_verified = 3; +} + +message UpdateUserPhoneRequest { + string id = 1; + string phone = 2 [(validate.rules).string = {min_len: 1, max_len: 20}]; + bool is_phone_verified = 3; +} + +message UserAddress { + string id = 1; + string country = 2; + string locality = 3; + string postal_code = 4; + string region = 5; + string street_address = 6; +} + +message UpdateUserAddressRequest { + string id = 1; + string country = 2 [(validate.rules).string = {max_len: 200}]; + string locality = 3 [(validate.rules).string = {max_len: 200}]; + string postal_code = 4 [(validate.rules).string = {max_len: 200}]; + string region = 5 [(validate.rules).string = {max_len: 200}]; + string street_address = 6 [(validate.rules).string = {max_len: 200}]; +} + +message MultiFactors { + repeated MultiFactor mfas = 1; +} + +message MultiFactor { + MfaType type = 1; + MFAState state = 2; +} + +enum MfaType { + MFATYPE_UNSPECIFIED = 0; + MFATYPE_SMS = 1; + MFATYPE_OTP = 2; +} + +enum MFAState { + MFASTATE_UNSPECIFIED = 0; + MFASTATE_NOT_READY = 1; + MFASTATE_READY = 2; + MFASTATE_REMOVED = 3; +} + +message PasswordID{ + string id = 1; +} + +message PasswordRequest { + string id = 1; + string password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}]; +} + +message ResetPasswordRequest { + string id = 1; +} + +message SetPasswordNotificationRequest { + string id = 1; + NotificationType type = 2; +} + +enum NotificationType { + NOTIFICATIONTYPE_EMAIL = 0; + NOTIFICATIONTYPE_SMS = 1; +} + +message PasswordComplexityPolicyID { + string id = 1; +} + +message PasswordComplexityPolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 min_length = 6; + bool has_lowercase = 7; + bool has_uppercase = 8; + bool has_number = 9; + bool has_symbol = 10; +} + +message PasswordComplexityPolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 min_length = 2; + bool has_lowercase = 3; + bool has_uppercase = 4; + bool has_number = 5; + bool has_symbol = 6; +} + +message PasswordComplexityPolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 min_length = 3; + bool has_lowercase = 4; + bool has_uppercase = 5; + bool has_number = 6; + bool has_symbol = 7; +} + +message PasswordAgePolicyID { + string id = 1; +} + +message PasswordAgePolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 max_age_days = 6; + uint64 expire_warn_days = 7; +} + +message PasswordAgePolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 max_age_days = 2; + uint64 expire_warn_days = 3; +} + +message PasswordAgePolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 max_age_days = 3; + uint64 expire_warn_days = 4; +} + +message PasswordLockoutPolicyID { + string id = 1; +} + +message PasswordLockoutPolicy { + string id = 1; + string description = 2; + PolicyState state = 3; + google.protobuf.Timestamp creation_date = 4; + google.protobuf.Timestamp change_date = 5; + uint64 max_attempts = 6; + bool show_lock_out_failures = 7; +} + +message PasswordLockoutPolicyCreate { + string description = 1 [(validate.rules).string = {max_len: 500}]; + uint64 max_attempts = 2; + bool show_lock_out_failures = 3; +} + +message PasswordLockoutPolicyUpdate { + string id = 1; + string description = 2 [(validate.rules).string = {max_len: 500}]; + uint64 max_attempts = 3; + bool show_lock_out_failures = 4; +} + +enum PolicyState { + POLICYSTATE_UNSPECIFIED = 0; + POLICYSTATE_ACTIVE = 1; + POLICYSTATE_INACTIVE = 2; + POLICYSTATE_DELETED = 3; +} + +message OrgID { + string id = 1; +} + +message OrgDomain { + string domain = 1; +} + +message Org { + string id = 1; + OrgState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + string domain = 6; +} + +enum OrgState { + ORGSTATE_UNSPECIFIED = 0; + ORGSTATE_ACTIVE = 1; + ORGSTATE_INACTIVE = 2; +} + +message OrgMemberRoles { + repeated string roles = 1; +} + +message OrgMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message AddOrgMemberRequest { + string org_id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ChangeOrgMemberRequest { + string org_id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message RemoveOrgMemberRequest { + string org_id = 1; + string user_id = 2; +} + +message OrgMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated OrgMember result = 4; +} + +message OrgMemberSearchRequest { + string org_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated OrgMemberSearchQuery queries = 4; +} + +message OrgMemberSearchQuery { + OrgMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum OrgMemberSearchKey { + ORGMEMBERSEARCHKEY_UNSPECIFIED = 0; + ORGMEMBERSEARCHKEY_FIRST_NAME = 1; + ORGMEMBERSEARCHKEY_LAST_NAME = 2; + ORGMEMBERSEARCHKEY_EMAIL = 3; + ORGMEMBERSEARCHKEY_USER_ID = 4; +} + +message ProjectCreateRequest { + string name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message ProjectUpdateRequest { + string id = 1; + string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + +message Projects { + repeated Project projects = 1; +} + +message Project { + string id = 1; + string name = 2; + ProjectState state = 3; + google.protobuf.Timestamp change_date = 4; + google.protobuf.Timestamp creation_date = 5; + ProjectType type = 6; + string resource_owner = 7; + string org_id = 8; + string org_name = 9; + string org_domain = 10; + string grant_id = 11; +} + +enum ProjectState { + PROJECTSTATE_UNSPECIFIED = 0; + PROJECTSTATE_ACTIVE = 1; + PROJECTSSTATE_INACTIVE = 2; +} + +enum ProjectType { + PROJECTTYPE_UNKNOWN = 0; + PROJECTTYPE_SELF = 1; + PROJECTTYPE_GRANTED = 2; +} + +message ProjectSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Project result = 4; +} + +message ProjectSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + repeated ProjectSearchQuery queries = 3; +} + +message ProjectSearchQuery { + ProjectSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectSearchKey { + PROJECTSEARCHKEY_UNSPECIFIED = 0; + PROJECTSEARCHKEY_PROJECT_NAME = 1; +} + +message ProjectMemberRoles { + repeated string roles = 1; +} + +message ProjectMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message ProjectMemberAdd { + string id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ProjectMemberChange { + string id = 1; + string user_id = 2; + repeated string roles = 3; +} + +message ProjectMemberRemove { + string id = 1; + string user_id = 2; +} + +message ProjectRoleAdd { + string id = 1; + string name = 2; + string display_name = 3; + string group = 4; +} + +message ProjectRole { + string project_id = 1; + string name = 2; + string display_name = 3; + google.protobuf.Timestamp creation_date = 4; + string group = 5; +} + +message ProjectRoleRemove { + string id = 1; + string name = 2; +} + +message ProjectRoleSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectRole result = 4; +} + +message ProjectRoleSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ProjectRoleSearchQuery queries = 4; +} + +message ProjectRoleSearchQuery { + ProjectRoleSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectRoleSearchKey { + PROJECTROLESEARCHKEY_UNSPECIFIED = 0; + PROJECTROLESEARCHKEY_NAME = 1; + PROJECTROLESEARCHKEY_DISPLAY_NAME = 2; +} + +message ProjectMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectMember result = 4; +} + +message ProjectMemberSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ProjectMemberSearchQuery queries = 4; +} + +message ProjectMemberSearchQuery { + ProjectMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectMemberSearchKey { + PROJECTMEMBERSEARCHKEY_UNSPECIFIED = 0; + PROJECTMEMBERSEARCHKEY_FIRST_NAME = 1; + PROJECTMEMBERSEARCHKEY_LAST_NAME = 2; + PROJECTMEMBERSEARCHKEY_EMAIL = 3; + PROJECTMEMBERSEARCHKEY_USER_ID = 4; +} + +enum AppState { + APPSTATE_UNSPECIFIED = 0; + APPSTATE_ACTIVE = 1; + APPSTATE_INACTIVE = 2; +} + +message Application { + string id = 1; + AppState state = 2; + google.protobuf.Timestamp creation_date = 3; + google.protobuf.Timestamp change_date = 4; + string name = 5; + oneof app_config { + OIDCConfig oidc_config = 8; + } +} + +message ApplicationUpdate { + string project_id = 1; + string id = 2; + string name = 5 [(validate.rules).string = {min_len: 1, max_len: 200}]; +} + + +message OIDCConfig { + repeated string redirect_uris = 1; + repeated OIDCResponseType response_types = 2; + repeated OIDCGrantType grant_types = 3; + OIDCApplicationType application_type = 4; + string client_id = 5; + string client_secret = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +message OIDCApplicationCreate { + string project_id = 1; + string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; + repeated string redirect_uris = 3; + repeated OIDCResponseType response_types = 4; + repeated OIDCGrantType grant_types = 5; + OIDCApplicationType application_type = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +message OIDCConfigUpdate { + string project_id = 1; + string application_id = 2; + repeated string redirect_uris = 3; + repeated OIDCResponseType response_types = 4; + repeated OIDCGrantType grant_types = 5; + OIDCApplicationType application_type = 6; + OIDCAuthMethodType auth_method_type = 7; + repeated string post_logout_redirect_uris = 8; +} + +enum OIDCResponseType { + OIDCRESPONSETYPE_CODE = 0; + OIDCRESPONSETYPE_ID_TOKEN = 1; + OIDCRESPONSETYPE_TOKEN_ID_TOKEN = 2; +} + +enum OIDCGrantType { + OIDCGRANTTYPE_AUTHORIZATION_CODE = 0; + OIDCGRANTTYPE_IMPLICIT = 1; + OIDCGRANTTYPE_REFRESH_TOKEN = 2; +} + +enum OIDCApplicationType { + OIDCAPPLICATIONTYPE_WEB = 0; + OIDCAPPLICATIONTYPE_USER_AGENT = 1; + OIDCAPPLICATIONTYPE_NATIVE = 2; +} + +enum OIDCAuthMethodType { + OIDCAUTHMETHODTYPE_BASIC = 0; + OIDCAUTHMETHODTYPE_POST = 1; + OIDCAUTHMETHODTYPE_NONE = 2; +} + +message ClientSecret { + string client_secret = 1; +} + +message ApplicationSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated Application result = 4; +} + +message ApplicationSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated ApplicationSearchQuery queries = 4; +} + +message ApplicationSearchQuery { + ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ApplicationSearchKey { + APPLICATIONSERACHKEY_UNSPECIFIED = 0; + APPLICATIONSEARCHKEY_APP_NAME = 1; +} + +message ProjectGrant { + string id = 1; + string project_id = 2; + string granted_org_id = 3; + string granted_org_name = 4; + string granted_org_domain = 5; + repeated string role_names = 6; + ProjectGrantState state = 7; + google.protobuf.Timestamp creation_date = 8; + google.protobuf.Timestamp change_date = 9; + string project_name = 10; +} + +message ProjectGrantCreate { + string project_id = 1; + string granted_org_id = 2; + repeated string role_names = 3; +} + +message ProjectGrantUpdate { + string project_id = 1; + string id = 2; + repeated string role_names = 3; +} + +message ProjectGrantID { + string project_id = 1; + string id = 2; +} + +message GrantedGrantID { + string id = 1; +} + +enum ProjectGrantState { + PROJECTGRANTSTATE_UNSPECIFIED = 0; + PROJECTGRANTSTATE_ACTIVE = 1; + PROJECTGRANTSTATE_INACTIVE = 2; +} + +message ProjectGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectGrant result = 4; +} + +message ProjectGrantSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; +} + +message ProjectGrantMemberRoles { + repeated string roles = 1; +} + +message ProjectGrantMember { + string user_id = 1; + string user_name = 2; + string email = 3; + string first_name = 4; + string last_name = 5; + repeated string roles = 6; + google.protobuf.Timestamp change_date = 7; + google.protobuf.Timestamp creation_date = 8; +} + +message ProjectGrantMemberAdd { + string project_id = 1; + string grant_id = 2; + string user_id = 3; + repeated string roles = 4; +} + +message ProjectGrantMemberChange { + string project_id = 1; + string grant_id = 2; + string user_id = 3; + repeated string roles = 4; +} + +message ProjectGrantMemberRemove { + string project_id = 1; + string grant_id = 2; + string user_id = 3; +} + +message ProjectGrantMemberSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated ProjectGrantMember result = 4; +} + +message ProjectGrantMemberSearchRequest { + string project_id = 1; + string grant_id = 2; + uint64 offset = 3; + uint64 limit = 4; + repeated ProjectGrantMemberSearchQuery queries = 5; +} + +message ProjectGrantMemberSearchQuery { + ProjectGrantMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2; + string value = 3; +} + +enum ProjectGrantMemberSearchKey { + PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED = 0; + PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME = 1; + PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME = 2; + PROJECTGRANTMEMBERSEARCHKEY_EMAIL = 3; + PROJECTGRANTMEMBERSEARCHKEY_USER_ID = 4; +} + +message UserGrant { + string id = 1; + string user_id = 2; + string org_id = 3; + string project_id = 4; + repeated string role_names = 5; + UserGrantState state = 6; + google.protobuf.Timestamp creation_date = 7; + google.protobuf.Timestamp change_date = 8; + string user_name = 9; + string first_name = 10; + string last_name = 11; + string email = 12; + string org_name = 13; + string org_domain = 14; + string project_name = 15; +} + +message UserGrantCreate { + string user_id = 1; + string org_id = 2; + string project_id = 3; + repeated string role_names = 4; +} + +message UserGrantUpdate { + string user_id = 1; + string id = 2; + repeated string role_names = 3; +} + +message UserGrantID { + string user_id = 1; + string id = 2; +} + +message ProjectUserGrantID { + string project_id = 1; + string user_id = 2; + string id = 3; +} + +message ProjectUserGrantUpdate { + string project_id = 1; + string user_id = 2; + string id = 3; + repeated string role_names = 4; +} + +message ProjectGrantUserGrantID { + string project_grant_id = 1; + string user_id = 2; + string id = 3; +} + +message ProjectGrantUserGrantCreate { + string user_id = 1; + string org_id = 2; + string project_grant_id = 3; + string project_id = 4 [(validate.rules).string.min_len = 1]; + repeated string role_names = 5; +} + +message ProjectGrantUserGrantUpdate { + string project_grant_id = 1; + string user_id = 2; + string id = 3; + repeated string role_names = 4; +} + +enum UserGrantState { + USERGRANTSTATE_UNSPECIFIED = 0; + USERGRANTSTATE_ACTIVE = 1; + USERGRANTSTATE_INACTIVE = 2; +} + + +message UserGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated UserGrant result = 4; +} + +message UserGrantSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + repeated UserGrantSearchQuery queries = 3; +} +message UserGrantSearchQuery { + UserGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2 [(validate.rules).enum = {in: [0]}]; + string value = 3; +} + +enum UserGrantSearchKey { + USERGRANTSEARCHKEY_UNSPECIFIED = 0; + USERGRANTSEARCHKEY_PROJECT_ID = 1; + USERGRANTSEARCHKEY_USER_ID = 2; + USERGRANTSEARCHKEY_ORG_ID = 3; +} + +message ProjectUserGrantSearchRequest { + string project_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated UserGrantSearchQuery queries = 4; +} + +message ProjectGrantUserGrantSearchRequest { + string project_grant_id = 1; + uint64 offset = 2; + uint64 limit = 3; + repeated UserGrantSearchQuery queries = 4; +} + +message AuthGrantSearchRequest { + uint64 offset = 1; + uint64 limit = 2; + AuthGrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}]; + bool asc = 4; + repeated AuthGrantSearchQuery queries = 5; +} + +message AuthGrantSearchQuery { + AuthGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}]; + SearchMethod method = 2 [(validate.rules).enum = {in: [0]}]; + string value = 3; +} + +enum AuthGrantSearchKey { + AUTHGRANTSEARCHKEY_UNSPECIFIED = 0; + AUTHGRANTSEARCHKEY_ORG_ID = 1; + AUTHGRANTSEARCHKEY_PROJECT_ID = 2; + AUTHGRANTSEARCHKEY_USER_ID = 3; +} + +message AuthGrantSearchResponse { + uint64 offset = 1; + uint64 limit = 2; + uint64 total_result = 3; + repeated AuthGrant result = 4; +} + +message AuthGrant { + string orgId = 1; + string projectId = 2; + string userId = 3; + repeated string roles = 4; +} From 43d45ab727f9dcad20e5d4afb30bbb58dde76ec6 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 10:52:06 +0100 Subject: [PATCH 03/19] fix: generated files --- pkg/admin/api/grpc/admin.pb.authoptions.go | 20 + pkg/admin/api/grpc/admin.swagger.json | 141 + pkg/admin/api/grpc/mock/admin.proto.mock.go | 178 + .../api/grpc/management.pb.authoptions.go | 521 ++ .../api/grpc/management.swagger.json | 5657 +++++++++++++++++ .../api/grpc/mock/management.proto.mock.go | 2118 ++++++ 6 files changed, 8635 insertions(+) create mode 100644 pkg/admin/api/grpc/admin.pb.authoptions.go create mode 100644 pkg/admin/api/grpc/admin.swagger.json create mode 100644 pkg/admin/api/grpc/mock/admin.proto.mock.go create mode 100644 pkg/management/api/grpc/management.pb.authoptions.go create mode 100644 pkg/management/api/grpc/management.swagger.json create mode 100644 pkg/management/api/grpc/mock/management.proto.mock.go diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go new file mode 100644 index 0000000000..c6e9605061 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -0,0 +1,20 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/citadel/utils/auth" + utils_grpc "github.com/caos/citadel/utils/grpc" +) + +/** + * AdminService + */ + +var AdminService_AuthMethods = utils_auth.AuthMethodMapping{} + +func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) +} diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json new file mode 100644 index 0000000000..cd274e4e42 --- /dev/null +++ b/pkg/admin/api/grpc/admin.swagger.json @@ -0,0 +1,141 @@ +{ + "swagger": "2.0", + "info": { + "title": "admin service", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/citadel/admin" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/healthz": { + "get": { + "summary": "Healthz returns status OK as soon as the service started", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/ready": { + "get": { + "summary": "Ready returns status OK as soon as all dependent services are available", + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AdminService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + } + } +} diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go new file mode 100644 index 0000000000..e590f7ca3f --- /dev/null +++ b/pkg/admin/api/grpc/mock/admin.proto.mock.go @@ -0,0 +1,178 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/citadel/admin/api/grpc (interfaces: AdminServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/citadel/admin/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAdminServiceClient is a mock of AdminServiceClient interface +type MockAdminServiceClient struct { + ctrl *gomock.Controller + recorder *MockAdminServiceClientMockRecorder +} + +// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient +type MockAdminServiceClientMockRecorder struct { + mock *MockAdminServiceClient +} + +// NewMockAdminServiceClient creates a new mock instance +func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient { + mock := &MockAdminServiceClient{ctrl: ctrl} + mock.recorder = &MockAdminServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder { + return m.recorder +} + +// GetOrgByID mocks base method +func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByID", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByID indicates an expected call of GetOrgByID +func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...) +} + +// Healthz mocks base method +func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...) +} + +// IsOrgUnique mocks base method +func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsOrgUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueOrgResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsOrgUnique indicates an expected call of IsOrgUnique +func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...) +} + +// Ready mocks base method +func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...) +} + +// SearchOrgs mocks base method +func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchOrgs", varargs...) + ret0, _ := ret[0].(*grpc.OrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchOrgs indicates an expected call of SearchOrgs +func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...) +} + +// SetUpOrg mocks base method +func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetUpOrg", varargs...) + ret0, _ := ret[0].(*grpc.OrgSetUpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetUpOrg indicates an expected call of SetUpOrg +func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...) +} + +// Validate mocks base method +func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...) +} diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go new file mode 100644 index 0000000000..4ec638da86 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -0,0 +1,521 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/citadel/utils/auth" + utils_grpc "github.com/caos/citadel/utils/grpc" +) + +/** + * ManagementService + */ + +var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{ + + "/caos.citadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{ + Permission: "user.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{ + Permission: "project.app.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{ + Permission: "org.member.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{ + Permission: "project.read", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{ + Permission: "project.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{ + Permission: "project.member.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{ + Permission: "project.member.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{ + Permission: "project.member.delete", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{ + Permission: "project.role.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{ + Permission: "project.role.write", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{ + Permission: "project.role.delete", + CheckParam: "Id", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{ + Permission: "project.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{ + Permission: "project.grant.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{ + Permission: "project.grant.member.delete", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.citadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, +} + +func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) +} diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json new file mode 100644 index 0000000000..59c6222d4d --- /dev/null +++ b/pkg/management/api/grpc/management.swagger.json @@ -0,0 +1,5657 @@ +{ + "swagger": "2.0", + "info": { + "title": "Management API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/citadel/management" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/{id}/changes": { + "get": { + "operationId": "ApplicationChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/authgrants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchAuthGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/orgs/domain/{domain}": { + "get": { + "operationId": "GetOrgByDomainGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "domain", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/users/email/{email}": { + "get": { + "operationId": "GetUserByEmailGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "email", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/grants/{id}": { + "get": { + "summary": "GRANTED_PROJECT_GRANTS", + "operationId": "GetGrantedProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/healthz": { + "get": { + "summary": "READINESS", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/members/roles": { + "get": { + "summary": "ORG_MEMBERS", + "operationId": "GetOrgMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}": { + "get": { + "summary": "ORG", + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_deactivate": { + "put": { + "operationId": "DeactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_reactivate": { + "put": { + "operationId": "ReactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/changes": { + "get": { + "operationId": "OrgChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members": { + "post": { + "operationId": "AddOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AddOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/_search": { + "post": { + "operationId": "SearchOrgMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ChangeOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age": { + "get": { + "summary": "PASSWORD_AGE_POLICY", + "operationId": "GetPasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age/{id}": { + "delete": { + "operationId": "DeletePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity": { + "get": { + "summary": "PASSWORD_COMPLEXITY_POLICY", + "operationId": "GetPasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity/{id}": { + "delete": { + "operationId": "DeletePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout": { + "get": { + "summary": "PASSWORD_LOCKOUT_POLICY", + "operationId": "GetPasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout/{id}": { + "delete": { + "operationId": "DeletePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_GRANT_USER_GRANT", + "operationId": "SearchProjectGrantUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects": { + "post": { + "operationId": "CreateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectCreateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/_search": { + "post": { + "summary": "PROJECTS", + "operationId": "SearchProjects", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/grants/members/roles": { + "get": { + "summary": "PROJECT_GRANT_MEMBER", + "operationId": "GetProjectGrantMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/members/roles": { + "get": { + "summary": "PROJECT_MEMBERS", + "operationId": "GetProjectMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}": { + "get": { + "operationId": "ProjectByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUpdateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/changes": { + "get": { + "operationId": "ProjectChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members": { + "post": { + "operationId": "AddProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles": { + "post": { + "operationId": "AddProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles/{name}": { + "delete": { + "operationId": "RemoveProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "name", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/_search": { + "post": { + "summary": "APPLICATIONS", + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{application_id}/oidcconfig": { + "put": { + "operationId": "UpdateApplicationOIDCConfig", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "application_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCConfigUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}": { + "get": { + "operationId": "ApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_deactivate": { + "put": { + "operationId": "DeactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_reactivate": { + "put": { + "operationId": "ReactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret": { + "put": { + "operationId": "RegenerateOIDCClientSecret", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ClientSecret" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants": { + "post": { + "operationId": "CreateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/_search": { + "post": { + "summary": "PROJECT_GRANT", + "operationId": "SearchProjectGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members": { + "post": { + "operationId": "AddProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/_search": { + "post": { + "operationId": "SearchProjectGrantMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/members/_search": { + "post": { + "operationId": "SearchProjectMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/oidcapplications": { + "post": { + "operationId": "CreateOIDCApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCApplicationCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/roles/_search": { + "post": { + "summary": "PROJECT_ROLES", + "operationId": "SearchProjectRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_USER_GRANT", + "operationId": "SearchProjectUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/users": { + "post": { + "operationId": "CreateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateUserRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_isunique": { + "get": { + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_search": { + "post": { + "operationId": "SearchUsers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/grants/_search": { + "post": { + "summary": "USER_GRANT", + "operationId": "SearchUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "USER", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "delete": { + "operationId": "DeleteUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_lock": { + "put": { + "operationId": "LockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_sendsetpwnotify": { + "post": { + "summary": "PASSWORD\nSends an Notification (Email/SMS) with a password reset Link", + "operationId": "SendSetPasswordNotification", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SetPasswordNotificationRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_setinitialpw": { + "post": { + "summary": "A Manager is only allowed to set an initial password, on the next login the user has to change his password", + "operationId": "SetInitialPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_unlock": { + "put": { + "operationId": "UnlockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/address": { + "get": { + "summary": "USER_ADDRESS", + "operationId": "GetUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/changes": { + "get": { + "operationId": "UserChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email": { + "get": { + "summary": "USER_EMAIL", + "operationId": "GetUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/mfas": { + "get": { + "summary": "MFA", + "operationId": "GetUserMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone": { + "get": { + "summary": "USER_PHONE", + "operationId": "GetUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone/_resendverification": { + "post": { + "operationId": "ResendPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/profile": { + "get": { + "summary": "USER_PROFILE", + "operationId": "GetUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants": { + "post": { + "operationId": "CreateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}": { + "get": { + "operationId": "UserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "ManagementService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AddOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationID": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSERACHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_NAME" + ], + "default": "APPLICATIONSERACHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1ApplicationUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1AuthGrant": { + "type": "object", + "properties": { + "orgId": { + "type": "string" + }, + "projectId": { + "type": "string" + }, + "userId": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AuthGrantSearchKey": { + "type": "string", + "enum": [ + "AUTHGRANTSEARCHKEY_UNSPECIFIED", + "AUTHGRANTSEARCHKEY_ORG_ID", + "AUTHGRANTSEARCHKEY_PROJECT_ID", + "AUTHGRANTSEARCHKEY_USER_ID" + ], + "default": "AUTHGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1AuthGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1AuthGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrantSearchQuery" + } + } + } + }, + "v1AuthGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrant" + } + } + } + }, + "v1Change": { + "type": "object", + "properties": { + "change_date": { + "type": "string", + "format": "date-time" + }, + "event_type": { + "type": "string" + }, + "sequence": { + "type": "string", + "format": "uint64" + }, + "modifier": { + "type": "string" + }, + "data": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "v1ChangeOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1Changes": { + "type": "object", + "properties": { + "changes": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Change" + } + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ClientSecret": { + "type": "object", + "properties": { + "client_secret": { + "type": "string" + } + } + }, + "v1CreateUserRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCConfigUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "application_id": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_IMPLICIT", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1OrgMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1OrgMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OrgMemberSearchKey": { + "type": "string", + "enum": [ + "ORGMEMBERSEARCHKEY_UNSPECIFIED", + "ORGMEMBERSEARCHKEY_FIRST_NAME", + "ORGMEMBERSEARCHKEY_LAST_NAME", + "ORGMEMBERSEARCHKEY_EMAIL", + "ORGMEMBERSEARCHKEY_USER_ID" + ], + "default": "ORGMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1OrgMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgMemberSearchRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMemberSearchQuery" + } + } + } + }, + "v1OrgMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMember" + } + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1PasswordAgePolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordComplexityPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1PolicyState": { + "type": "string", + "enum": [ + "POLICYSTATE_UNSPECIFIED", + "POLICYSTATE_ACTIVE", + "POLICYSTATE_INACTIVE", + "POLICYSTATE_DELETED" + ], + "default": "POLICYSTATE_UNSPECIFIED" + }, + "v1Project": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1ProjectState" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "type": { + "$ref": "#/definitions/v1ProjectType" + }, + "resource_owner": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "grant_id": { + "type": "string" + } + } + }, + "v1ProjectCreateRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + } + } + }, + "v1ProjectGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "granted_org_name": { + "type": "string" + }, + "granted_org_domain": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1ProjectGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "project_name": { + "type": "string" + } + } + }, + "v1ProjectGrantCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectGrantMemberAdd": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberChange": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectGrantMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectGrantMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchQuery" + } + } + } + }, + "v1ProjectGrantMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMember" + } + } + } + }, + "v1ProjectGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ProjectGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + } + }, + "v1ProjectGrantState": { + "type": "string", + "enum": [ + "PROJECTGRANTSTATE_UNSPECIFIED", + "PROJECTGRANTSTATE_ACTIVE", + "PROJECTGRANTSTATE_INACTIVE" + ], + "default": "PROJECTGRANTSTATE_UNSPECIFIED" + }, + "v1ProjectGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_grant_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantID": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectGrantUserGrantUpdate": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1ProjectMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectMemberAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberChange": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTMEMBERSEARCHKEY_EMAIL", + "PROJECTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMemberSearchQuery" + } + } + } + }, + "v1ProjectMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMember" + } + } + } + }, + "v1ProjectRole": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchKey": { + "type": "string", + "enum": [ + "PROJECTROLESEARCHKEY_UNSPECIFIED", + "PROJECTROLESEARCHKEY_NAME", + "PROJECTROLESEARCHKEY_DISPLAY_NAME" + ], + "default": "PROJECTROLESEARCHKEY_UNSPECIFIED" + }, + "v1ProjectRoleSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectRoleSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRoleSearchQuery" + } + } + } + }, + "v1ProjectRoleSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRole" + } + } + } + }, + "v1ProjectSearchKey": { + "type": "string", + "enum": [ + "PROJECTSEARCHKEY_UNSPECIFIED", + "PROJECTSEARCHKEY_PROJECT_NAME" + ], + "default": "PROJECTSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectSearchQuery" + } + } + } + }, + "v1ProjectSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Project" + } + } + } + }, + "v1ProjectState": { + "type": "string", + "enum": [ + "PROJECTSTATE_UNSPECIFIED", + "PROJECTSTATE_ACTIVE", + "PROJECTSSTATE_INACTIVE" + ], + "default": "PROJECTSTATE_UNSPECIFIED" + }, + "v1ProjectType": { + "type": "string", + "enum": [ + "PROJECTTYPE_UNKNOWN", + "PROJECTTYPE_SELF", + "PROJECTTYPE_GRANTED" + ], + "default": "PROJECTTYPE_UNKNOWN" + }, + "v1ProjectUpdateRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1ProjectUserGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectUserGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SetPasswordNotificationRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1UserGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "project_name": { + "type": "string" + } + } + }, + "v1UserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserGrantID": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1UserGrantSearchKey": { + "type": "string", + "enum": [ + "USERGRANTSEARCHKEY_UNSPECIFIED", + "USERGRANTSEARCHKEY_PROJECT_ID", + "USERGRANTSEARCHKEY_USER_ID", + "USERGRANTSEARCHKEY_ORG_ID" + ], + "default": "USERGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1UserGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1UserGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrant" + } + } + } + }, + "v1UserGrantState": { + "type": "string", + "enum": [ + "USERGRANTSTATE_UNSPECIFIED", + "USERGRANTSTATE_ACTIVE", + "USERGRANTSTATE_INACTIVE" + ], + "default": "USERGRANTSTATE_UNSPECIFIED" + }, + "v1UserGrantUpdate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSearchKey": { + "type": "string", + "enum": [ + "USERSEARCHKEY_UNSPECIFIED", + "USERSEARCHKEY_USER_NAME", + "USERSEARCHKEY_FIRST_NAME", + "USERSEARCHKEY_LAST_NAME", + "USERSEARCHKEY_NICK_NAME", + "USERSEARCHKEY_DISPLAY_NAME", + "USERSEARCHKEY_EMAIL", + "USERSEARCHKEY_STATE" + ], + "default": "USERSEARCHKEY_UNSPECIFIED" + }, + "v1UserSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSearchQuery" + } + } + } + }, + "v1UserSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1User" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/management/api/grpc/mock/management.proto.mock.go b/pkg/management/api/grpc/mock/management.proto.mock.go new file mode 100644 index 0000000000..6b1afffa8c --- /dev/null +++ b/pkg/management/api/grpc/mock/management.proto.mock.go @@ -0,0 +1,2118 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/citadel/management/api/grpc (interfaces: ManagementServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/citadel/management/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockManagementServiceClient is a mock of ManagementServiceClient interface +type MockManagementServiceClient struct { + ctrl *gomock.Controller + recorder *MockManagementServiceClientMockRecorder +} + +// MockManagementServiceClientMockRecorder is the mock recorder for MockManagementServiceClient +type MockManagementServiceClientMockRecorder struct { + mock *MockManagementServiceClient +} + +// NewMockManagementServiceClient creates a new mock instance +func NewMockManagementServiceClient(ctrl *gomock.Controller) *MockManagementServiceClient { + mock := &MockManagementServiceClient{ctrl: ctrl} + mock.recorder = &MockManagementServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockManagementServiceClient) EXPECT() *MockManagementServiceClientMockRecorder { + return m.recorder +} + +// AddOrgMember mocks base method +func (m *MockManagementServiceClient) AddOrgMember(arg0 context.Context, arg1 *grpc.AddOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddOrgMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddOrgMember indicates an expected call of AddOrgMember +func (mr *MockManagementServiceClientMockRecorder) AddOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddOrgMember), varargs...) +} + +// AddProjectGrantMember mocks base method +func (m *MockManagementServiceClient) AddProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddProjectGrantMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddProjectGrantMember indicates an expected call of AddProjectGrantMember +func (mr *MockManagementServiceClientMockRecorder) AddProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectGrantMember), varargs...) +} + +// AddProjectMember mocks base method +func (m *MockManagementServiceClient) AddProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddProjectMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddProjectMember indicates an expected call of AddProjectMember +func (mr *MockManagementServiceClientMockRecorder) AddProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectMember), varargs...) +} + +// AddProjectRole mocks base method +func (m *MockManagementServiceClient) AddProjectRole(arg0 context.Context, arg1 *grpc.ProjectRoleAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddProjectRole", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddProjectRole indicates an expected call of AddProjectRole +func (mr *MockManagementServiceClientMockRecorder) AddProjectRole(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectRole", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectRole), varargs...) +} + +// ApplicationByID mocks base method +func (m *MockManagementServiceClient) ApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ApplicationByID", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ApplicationByID indicates an expected call of ApplicationByID +func (mr *MockManagementServiceClientMockRecorder) ApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplicationByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ApplicationByID), varargs...) +} + +// ApplicationChanges mocks base method +func (m *MockManagementServiceClient) ApplicationChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ApplicationChanges", varargs...) + ret0, _ := ret[0].(*grpc.Changes) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ApplicationChanges indicates an expected call of ApplicationChanges +func (mr *MockManagementServiceClientMockRecorder) ApplicationChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplicationChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).ApplicationChanges), varargs...) +} + +// ChangeOrgMember mocks base method +func (m *MockManagementServiceClient) ChangeOrgMember(arg0 context.Context, arg1 *grpc.ChangeOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeOrgMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeOrgMember indicates an expected call of ChangeOrgMember +func (mr *MockManagementServiceClientMockRecorder) ChangeOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeOrgMember), varargs...) +} + +// ChangeProjectGrantMember mocks base method +func (m *MockManagementServiceClient) ChangeProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeProjectGrantMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeProjectGrantMember indicates an expected call of ChangeProjectGrantMember +func (mr *MockManagementServiceClientMockRecorder) ChangeProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeProjectGrantMember), varargs...) +} + +// ChangeProjectMember mocks base method +func (m *MockManagementServiceClient) ChangeProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeProjectMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeProjectMember indicates an expected call of ChangeProjectMember +func (mr *MockManagementServiceClientMockRecorder) ChangeProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeProjectMember), varargs...) +} + +// ChangeUserEmail mocks base method +func (m *MockManagementServiceClient) ChangeUserEmail(arg0 context.Context, arg1 *grpc.UpdateUserEmailRequest, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeUserEmail indicates an expected call of ChangeUserEmail +func (mr *MockManagementServiceClientMockRecorder) ChangeUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeUserEmail", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeUserEmail), varargs...) +} + +// ChangeUserPhone mocks base method +func (m *MockManagementServiceClient) ChangeUserPhone(arg0 context.Context, arg1 *grpc.UpdateUserPhoneRequest, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeUserPhone indicates an expected call of ChangeUserPhone +func (mr *MockManagementServiceClientMockRecorder) ChangeUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeUserPhone", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeUserPhone), varargs...) +} + +// CreateOIDCApplication mocks base method +func (m *MockManagementServiceClient) CreateOIDCApplication(arg0 context.Context, arg1 *grpc.OIDCApplicationCreate, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateOIDCApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateOIDCApplication indicates an expected call of CreateOIDCApplication +func (mr *MockManagementServiceClientMockRecorder) CreateOIDCApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateOIDCApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateOIDCApplication), varargs...) +} + +// CreatePasswordAgePolicy mocks base method +func (m *MockManagementServiceClient) CreatePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreatePasswordAgePolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordAgePolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreatePasswordAgePolicy indicates an expected call of CreatePasswordAgePolicy +func (mr *MockManagementServiceClientMockRecorder) CreatePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordAgePolicy), varargs...) +} + +// CreatePasswordComplexityPolicy mocks base method +func (m *MockManagementServiceClient) CreatePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreatePasswordComplexityPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreatePasswordComplexityPolicy indicates an expected call of CreatePasswordComplexityPolicy +func (mr *MockManagementServiceClientMockRecorder) CreatePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordComplexityPolicy), varargs...) +} + +// CreatePasswordLockoutPolicy mocks base method +func (m *MockManagementServiceClient) CreatePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreatePasswordLockoutPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreatePasswordLockoutPolicy indicates an expected call of CreatePasswordLockoutPolicy +func (mr *MockManagementServiceClientMockRecorder) CreatePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordLockoutPolicy), varargs...) +} + +// CreateProject mocks base method +func (m *MockManagementServiceClient) CreateProject(arg0 context.Context, arg1 *grpc.ProjectCreateRequest, arg2 ...grpc0.CallOption) (*grpc.Project, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateProject", varargs...) + ret0, _ := ret[0].(*grpc.Project) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateProject indicates an expected call of CreateProject +func (mr *MockManagementServiceClientMockRecorder) CreateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProject), varargs...) +} + +// CreateProjectGrant mocks base method +func (m *MockManagementServiceClient) CreateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantCreate, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateProjectGrant", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateProjectGrant indicates an expected call of CreateProjectGrant +func (mr *MockManagementServiceClientMockRecorder) CreateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectGrant), varargs...) +} + +// CreateProjectGrantUserGrant mocks base method +func (m *MockManagementServiceClient) CreateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateProjectGrantUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateProjectGrantUserGrant indicates an expected call of CreateProjectGrantUserGrant +func (mr *MockManagementServiceClientMockRecorder) CreateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectGrantUserGrant), varargs...) +} + +// CreateProjectUserGrant mocks base method +func (m *MockManagementServiceClient) CreateProjectUserGrant(arg0 context.Context, arg1 *grpc.UserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateProjectUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateProjectUserGrant indicates an expected call of CreateProjectUserGrant +func (mr *MockManagementServiceClientMockRecorder) CreateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectUserGrant), varargs...) +} + +// CreateUser mocks base method +func (m *MockManagementServiceClient) CreateUser(arg0 context.Context, arg1 *grpc.CreateUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateUser indicates an expected call of CreateUser +func (mr *MockManagementServiceClientMockRecorder) CreateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateUser), varargs...) +} + +// CreateUserGrant mocks base method +func (m *MockManagementServiceClient) CreateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateUserGrant indicates an expected call of CreateUserGrant +func (mr *MockManagementServiceClientMockRecorder) CreateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateUserGrant), varargs...) +} + +// DeactivateApplication mocks base method +func (m *MockManagementServiceClient) DeactivateApplication(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateApplication indicates an expected call of DeactivateApplication +func (mr *MockManagementServiceClientMockRecorder) DeactivateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateApplication), varargs...) +} + +// DeactivateOrg mocks base method +func (m *MockManagementServiceClient) DeactivateOrg(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateOrg", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateOrg indicates an expected call of DeactivateOrg +func (mr *MockManagementServiceClientMockRecorder) DeactivateOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateOrg", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateOrg), varargs...) +} + +// DeactivateProject mocks base method +func (m *MockManagementServiceClient) DeactivateProject(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateProject", varargs...) + ret0, _ := ret[0].(*grpc.Project) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateProject indicates an expected call of DeactivateProject +func (mr *MockManagementServiceClientMockRecorder) DeactivateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProject), varargs...) +} + +// DeactivateProjectGrant mocks base method +func (m *MockManagementServiceClient) DeactivateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateProjectGrant", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateProjectGrant indicates an expected call of DeactivateProjectGrant +func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectGrant), varargs...) +} + +// DeactivateProjectGrantUserGrant mocks base method +func (m *MockManagementServiceClient) DeactivateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateProjectGrantUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateProjectGrantUserGrant indicates an expected call of DeactivateProjectGrantUserGrant +func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectGrantUserGrant), varargs...) +} + +// DeactivateProjectUserGrant mocks base method +func (m *MockManagementServiceClient) DeactivateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateProjectUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateProjectUserGrant indicates an expected call of DeactivateProjectUserGrant +func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectUserGrant), varargs...) +} + +// DeactivateUser mocks base method +func (m *MockManagementServiceClient) DeactivateUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateUser indicates an expected call of DeactivateUser +func (mr *MockManagementServiceClientMockRecorder) DeactivateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateUser), varargs...) +} + +// DeactivateUserGrant mocks base method +func (m *MockManagementServiceClient) DeactivateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeactivateUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeactivateUserGrant indicates an expected call of DeactivateUserGrant +func (mr *MockManagementServiceClientMockRecorder) DeactivateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateUserGrant), varargs...) +} + +// DeletePasswordAgePolicy mocks base method +func (m *MockManagementServiceClient) DeletePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeletePasswordAgePolicy", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeletePasswordAgePolicy indicates an expected call of DeletePasswordAgePolicy +func (mr *MockManagementServiceClientMockRecorder) DeletePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordAgePolicy), varargs...) +} + +// DeletePasswordComplexityPolicy mocks base method +func (m *MockManagementServiceClient) DeletePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeletePasswordComplexityPolicy", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeletePasswordComplexityPolicy indicates an expected call of DeletePasswordComplexityPolicy +func (mr *MockManagementServiceClientMockRecorder) DeletePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordComplexityPolicy), varargs...) +} + +// DeletePasswordLockoutPolicy mocks base method +func (m *MockManagementServiceClient) DeletePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeletePasswordLockoutPolicy", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeletePasswordLockoutPolicy indicates an expected call of DeletePasswordLockoutPolicy +func (mr *MockManagementServiceClientMockRecorder) DeletePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordLockoutPolicy), varargs...) +} + +// DeleteUser mocks base method +func (m *MockManagementServiceClient) DeleteUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "DeleteUser", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// DeleteUser indicates an expected call of DeleteUser +func (mr *MockManagementServiceClientMockRecorder) DeleteUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteUser", reflect.TypeOf((*MockManagementServiceClient)(nil).DeleteUser), varargs...) +} + +// GetGrantedProjectGrantByID mocks base method +func (m *MockManagementServiceClient) GetGrantedProjectGrantByID(arg0 context.Context, arg1 *grpc.GrantedGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetGrantedProjectGrantByID", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetGrantedProjectGrantByID indicates an expected call of GetGrantedProjectGrantByID +func (mr *MockManagementServiceClientMockRecorder) GetGrantedProjectGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetGrantedProjectGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetGrantedProjectGrantByID), varargs...) +} + +// GetOrgByDomainGlobal mocks base method +func (m *MockManagementServiceClient) GetOrgByDomainGlobal(arg0 context.Context, arg1 *grpc.OrgDomain, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByDomainGlobal", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByDomainGlobal indicates an expected call of GetOrgByDomainGlobal +func (mr *MockManagementServiceClientMockRecorder) GetOrgByDomainGlobal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByDomainGlobal", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgByDomainGlobal), varargs...) +} + +// GetOrgByID mocks base method +func (m *MockManagementServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByID", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByID indicates an expected call of GetOrgByID +func (mr *MockManagementServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgByID), varargs...) +} + +// GetOrgMemberRoles mocks base method +func (m *MockManagementServiceClient) GetOrgMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.OrgMemberRoles, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgMemberRoles", varargs...) + ret0, _ := ret[0].(*grpc.OrgMemberRoles) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgMemberRoles indicates an expected call of GetOrgMemberRoles +func (mr *MockManagementServiceClientMockRecorder) GetOrgMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgMemberRoles), varargs...) +} + +// GetPasswordAgePolicy mocks base method +func (m *MockManagementServiceClient) GetPasswordAgePolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetPasswordAgePolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordAgePolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetPasswordAgePolicy indicates an expected call of GetPasswordAgePolicy +func (mr *MockManagementServiceClientMockRecorder) GetPasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordAgePolicy), varargs...) +} + +// GetPasswordComplexityPolicy mocks base method +func (m *MockManagementServiceClient) GetPasswordComplexityPolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetPasswordComplexityPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetPasswordComplexityPolicy indicates an expected call of GetPasswordComplexityPolicy +func (mr *MockManagementServiceClientMockRecorder) GetPasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordComplexityPolicy), varargs...) +} + +// GetPasswordLockoutPolicy mocks base method +func (m *MockManagementServiceClient) GetPasswordLockoutPolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetPasswordLockoutPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetPasswordLockoutPolicy indicates an expected call of GetPasswordLockoutPolicy +func (mr *MockManagementServiceClientMockRecorder) GetPasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordLockoutPolicy), varargs...) +} + +// GetProjectGrantMemberRoles mocks base method +func (m *MockManagementServiceClient) GetProjectGrantMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantMemberRoles, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetProjectGrantMemberRoles", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrantMemberRoles) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetProjectGrantMemberRoles indicates an expected call of GetProjectGrantMemberRoles +func (mr *MockManagementServiceClientMockRecorder) GetProjectGrantMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetProjectGrantMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetProjectGrantMemberRoles), varargs...) +} + +// GetProjectMemberRoles mocks base method +func (m *MockManagementServiceClient) GetProjectMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.ProjectMemberRoles, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetProjectMemberRoles", varargs...) + ret0, _ := ret[0].(*grpc.ProjectMemberRoles) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetProjectMemberRoles indicates an expected call of GetProjectMemberRoles +func (mr *MockManagementServiceClientMockRecorder) GetProjectMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetProjectMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetProjectMemberRoles), varargs...) +} + +// GetUserAddress mocks base method +func (m *MockManagementServiceClient) GetUserAddress(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserAddress indicates an expected call of GetUserAddress +func (mr *MockManagementServiceClientMockRecorder) GetUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAddress", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserAddress), varargs...) +} + +// GetUserByEmailGlobal mocks base method +func (m *MockManagementServiceClient) GetUserByEmailGlobal(arg0 context.Context, arg1 *grpc.UserEmailID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserByEmailGlobal", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserByEmailGlobal indicates an expected call of GetUserByEmailGlobal +func (mr *MockManagementServiceClientMockRecorder) GetUserByEmailGlobal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByEmailGlobal", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserByEmailGlobal), varargs...) +} + +// GetUserByID mocks base method +func (m *MockManagementServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserByID", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserByID indicates an expected call of GetUserByID +func (mr *MockManagementServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserByID), varargs...) +} + +// GetUserEmail mocks base method +func (m *MockManagementServiceClient) GetUserEmail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserEmail indicates an expected call of GetUserEmail +func (mr *MockManagementServiceClientMockRecorder) GetUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserEmail", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserEmail), varargs...) +} + +// GetUserMfas mocks base method +func (m *MockManagementServiceClient) GetUserMfas(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserMfas", varargs...) + ret0, _ := ret[0].(*grpc.MultiFactors) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserMfas indicates an expected call of GetUserMfas +func (mr *MockManagementServiceClientMockRecorder) GetUserMfas(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserMfas", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserMfas), varargs...) +} + +// GetUserPhone mocks base method +func (m *MockManagementServiceClient) GetUserPhone(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserPhone indicates an expected call of GetUserPhone +func (mr *MockManagementServiceClientMockRecorder) GetUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserPhone", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserPhone), varargs...) +} + +// GetUserProfile mocks base method +func (m *MockManagementServiceClient) GetUserProfile(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserProfile indicates an expected call of GetUserProfile +func (mr *MockManagementServiceClientMockRecorder) GetUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserProfile", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserProfile), varargs...) +} + +// Healthz mocks base method +func (m *MockManagementServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockManagementServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockManagementServiceClient)(nil).Healthz), varargs...) +} + +// IsUserUnique mocks base method +func (m *MockManagementServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsUserUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueUserResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsUserUnique indicates an expected call of IsUserUnique +func (mr *MockManagementServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockManagementServiceClient)(nil).IsUserUnique), varargs...) +} + +// LockUser mocks base method +func (m *MockManagementServiceClient) LockUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "LockUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// LockUser indicates an expected call of LockUser +func (mr *MockManagementServiceClientMockRecorder) LockUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LockUser", reflect.TypeOf((*MockManagementServiceClient)(nil).LockUser), varargs...) +} + +// OrgChanges mocks base method +func (m *MockManagementServiceClient) OrgChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "OrgChanges", varargs...) + ret0, _ := ret[0].(*grpc.Changes) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// OrgChanges indicates an expected call of OrgChanges +func (mr *MockManagementServiceClientMockRecorder) OrgChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "OrgChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).OrgChanges), varargs...) +} + +// ProjectByID mocks base method +func (m *MockManagementServiceClient) ProjectByID(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ProjectByID", varargs...) + ret0, _ := ret[0].(*grpc.Project) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ProjectByID indicates an expected call of ProjectByID +func (mr *MockManagementServiceClientMockRecorder) ProjectByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectByID), varargs...) +} + +// ProjectChanges mocks base method +func (m *MockManagementServiceClient) ProjectChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ProjectChanges", varargs...) + ret0, _ := ret[0].(*grpc.Changes) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ProjectChanges indicates an expected call of ProjectChanges +func (mr *MockManagementServiceClientMockRecorder) ProjectChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectChanges), varargs...) +} + +// ProjectGrantByID mocks base method +func (m *MockManagementServiceClient) ProjectGrantByID(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ProjectGrantByID", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ProjectGrantByID indicates an expected call of ProjectGrantByID +func (mr *MockManagementServiceClientMockRecorder) ProjectGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectGrantByID), varargs...) +} + +// ProjectGrantUserGrantByID mocks base method +func (m *MockManagementServiceClient) ProjectGrantUserGrantByID(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ProjectGrantUserGrantByID", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ProjectGrantUserGrantByID indicates an expected call of ProjectGrantUserGrantByID +func (mr *MockManagementServiceClientMockRecorder) ProjectGrantUserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectGrantUserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectGrantUserGrantByID), varargs...) +} + +// ProjectUserGrantByID mocks base method +func (m *MockManagementServiceClient) ProjectUserGrantByID(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ProjectUserGrantByID", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ProjectUserGrantByID indicates an expected call of ProjectUserGrantByID +func (mr *MockManagementServiceClientMockRecorder) ProjectUserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectUserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectUserGrantByID), varargs...) +} + +// ReactivateApplication mocks base method +func (m *MockManagementServiceClient) ReactivateApplication(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateApplication indicates an expected call of ReactivateApplication +func (mr *MockManagementServiceClientMockRecorder) ReactivateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateApplication), varargs...) +} + +// ReactivateOrg mocks base method +func (m *MockManagementServiceClient) ReactivateOrg(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateOrg", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateOrg indicates an expected call of ReactivateOrg +func (mr *MockManagementServiceClientMockRecorder) ReactivateOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateOrg", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateOrg), varargs...) +} + +// ReactivateProject mocks base method +func (m *MockManagementServiceClient) ReactivateProject(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateProject", varargs...) + ret0, _ := ret[0].(*grpc.Project) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateProject indicates an expected call of ReactivateProject +func (mr *MockManagementServiceClientMockRecorder) ReactivateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProject), varargs...) +} + +// ReactivateProjectGrant mocks base method +func (m *MockManagementServiceClient) ReactivateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateProjectGrant", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateProjectGrant indicates an expected call of ReactivateProjectGrant +func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectGrant), varargs...) +} + +// ReactivateProjectGrantUserGrant mocks base method +func (m *MockManagementServiceClient) ReactivateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateProjectGrantUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateProjectGrantUserGrant indicates an expected call of ReactivateProjectGrantUserGrant +func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectGrantUserGrant), varargs...) +} + +// ReactivateProjectUserGrant mocks base method +func (m *MockManagementServiceClient) ReactivateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateProjectUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateProjectUserGrant indicates an expected call of ReactivateProjectUserGrant +func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectUserGrant), varargs...) +} + +// ReactivateUser mocks base method +func (m *MockManagementServiceClient) ReactivateUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateUser indicates an expected call of ReactivateUser +func (mr *MockManagementServiceClientMockRecorder) ReactivateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateUser), varargs...) +} + +// ReactivateUserGrant mocks base method +func (m *MockManagementServiceClient) ReactivateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ReactivateUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ReactivateUserGrant indicates an expected call of ReactivateUserGrant +func (mr *MockManagementServiceClientMockRecorder) ReactivateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateUserGrant), varargs...) +} + +// Ready mocks base method +func (m *MockManagementServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockManagementServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockManagementServiceClient)(nil).Ready), varargs...) +} + +// RegenerateOIDCClientSecret mocks base method +func (m *MockManagementServiceClient) RegenerateOIDCClientSecret(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.ClientSecret, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RegenerateOIDCClientSecret", varargs...) + ret0, _ := ret[0].(*grpc.ClientSecret) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RegenerateOIDCClientSecret indicates an expected call of RegenerateOIDCClientSecret +func (mr *MockManagementServiceClientMockRecorder) RegenerateOIDCClientSecret(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegenerateOIDCClientSecret", reflect.TypeOf((*MockManagementServiceClient)(nil).RegenerateOIDCClientSecret), varargs...) +} + +// RemoveOrgMember mocks base method +func (m *MockManagementServiceClient) RemoveOrgMember(arg0 context.Context, arg1 *grpc.RemoveOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveOrgMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveOrgMember indicates an expected call of RemoveOrgMember +func (mr *MockManagementServiceClientMockRecorder) RemoveOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveOrgMember), varargs...) +} + +// RemoveProjectGrantMember mocks base method +func (m *MockManagementServiceClient) RemoveProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveProjectGrantMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveProjectGrantMember indicates an expected call of RemoveProjectGrantMember +func (mr *MockManagementServiceClientMockRecorder) RemoveProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectGrantMember), varargs...) +} + +// RemoveProjectMember mocks base method +func (m *MockManagementServiceClient) RemoveProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveProjectMember", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveProjectMember indicates an expected call of RemoveProjectMember +func (mr *MockManagementServiceClientMockRecorder) RemoveProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectMember), varargs...) +} + +// RemoveProjectRole mocks base method +func (m *MockManagementServiceClient) RemoveProjectRole(arg0 context.Context, arg1 *grpc.ProjectRoleRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveProjectRole", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveProjectRole indicates an expected call of RemoveProjectRole +func (mr *MockManagementServiceClientMockRecorder) RemoveProjectRole(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectRole", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectRole), varargs...) +} + +// ResendEmailVerificationMail mocks base method +func (m *MockManagementServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail +func (mr *MockManagementServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockManagementServiceClient)(nil).ResendEmailVerificationMail), varargs...) +} + +// ResendPhoneVerificationCode mocks base method +func (m *MockManagementServiceClient) ResendPhoneVerificationCode(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendPhoneVerificationCode", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendPhoneVerificationCode indicates an expected call of ResendPhoneVerificationCode +func (mr *MockManagementServiceClientMockRecorder) ResendPhoneVerificationCode(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendPhoneVerificationCode", reflect.TypeOf((*MockManagementServiceClient)(nil).ResendPhoneVerificationCode), varargs...) +} + +// SearchApplications mocks base method +func (m *MockManagementServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchApplications", varargs...) + ret0, _ := ret[0].(*grpc.ApplicationSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchApplications indicates an expected call of SearchApplications +func (mr *MockManagementServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchApplications), varargs...) +} + +// SearchAuthGrant mocks base method +func (m *MockManagementServiceClient) SearchAuthGrant(arg0 context.Context, arg1 *grpc.AuthGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.AuthGrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchAuthGrant", varargs...) + ret0, _ := ret[0].(*grpc.AuthGrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchAuthGrant indicates an expected call of SearchAuthGrant +func (mr *MockManagementServiceClientMockRecorder) SearchAuthGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchAuthGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchAuthGrant), varargs...) +} + +// SearchOrgMembers mocks base method +func (m *MockManagementServiceClient) SearchOrgMembers(arg0 context.Context, arg1 *grpc.OrgMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgMemberSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchOrgMembers", varargs...) + ret0, _ := ret[0].(*grpc.OrgMemberSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchOrgMembers indicates an expected call of SearchOrgMembers +func (mr *MockManagementServiceClientMockRecorder) SearchOrgMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchOrgMembers), varargs...) +} + +// SearchProjectGrantMembers mocks base method +func (m *MockManagementServiceClient) SearchProjectGrantMembers(arg0 context.Context, arg1 *grpc.ProjectGrantMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantMemberSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectGrantMembers", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrantMemberSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectGrantMembers indicates an expected call of SearchProjectGrantMembers +func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrantMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrantMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrantMembers), varargs...) +} + +// SearchProjectGrantUserGrants mocks base method +func (m *MockManagementServiceClient) SearchProjectGrantUserGrants(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectGrantUserGrants", varargs...) + ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectGrantUserGrants indicates an expected call of SearchProjectGrantUserGrants +func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrantUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrantUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrantUserGrants), varargs...) +} + +// SearchProjectGrants mocks base method +func (m *MockManagementServiceClient) SearchProjectGrants(arg0 context.Context, arg1 *grpc.ProjectGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectGrants", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectGrants indicates an expected call of SearchProjectGrants +func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrants), varargs...) +} + +// SearchProjectMembers mocks base method +func (m *MockManagementServiceClient) SearchProjectMembers(arg0 context.Context, arg1 *grpc.ProjectMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectMemberSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectMembers", varargs...) + ret0, _ := ret[0].(*grpc.ProjectMemberSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectMembers indicates an expected call of SearchProjectMembers +func (mr *MockManagementServiceClientMockRecorder) SearchProjectMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectMembers), varargs...) +} + +// SearchProjectRoles mocks base method +func (m *MockManagementServiceClient) SearchProjectRoles(arg0 context.Context, arg1 *grpc.ProjectRoleSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectRoleSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectRoles", varargs...) + ret0, _ := ret[0].(*grpc.ProjectRoleSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectRoles indicates an expected call of SearchProjectRoles +func (mr *MockManagementServiceClientMockRecorder) SearchProjectRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectRoles), varargs...) +} + +// SearchProjectUserGrants mocks base method +func (m *MockManagementServiceClient) SearchProjectUserGrants(arg0 context.Context, arg1 *grpc.ProjectUserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjectUserGrants", varargs...) + ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjectUserGrants indicates an expected call of SearchProjectUserGrants +func (mr *MockManagementServiceClientMockRecorder) SearchProjectUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectUserGrants), varargs...) +} + +// SearchProjects mocks base method +func (m *MockManagementServiceClient) SearchProjects(arg0 context.Context, arg1 *grpc.ProjectSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchProjects", varargs...) + ret0, _ := ret[0].(*grpc.ProjectSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchProjects indicates an expected call of SearchProjects +func (mr *MockManagementServiceClientMockRecorder) SearchProjects(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjects", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjects), varargs...) +} + +// SearchUserGrants mocks base method +func (m *MockManagementServiceClient) SearchUserGrants(arg0 context.Context, arg1 *grpc.UserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchUserGrants", varargs...) + ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchUserGrants indicates an expected call of SearchUserGrants +func (mr *MockManagementServiceClientMockRecorder) SearchUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchUserGrants), varargs...) +} + +// SearchUsers mocks base method +func (m *MockManagementServiceClient) SearchUsers(arg0 context.Context, arg1 *grpc.UserSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchUsers", varargs...) + ret0, _ := ret[0].(*grpc.UserSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchUsers indicates an expected call of SearchUsers +func (mr *MockManagementServiceClientMockRecorder) SearchUsers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchUsers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchUsers), varargs...) +} + +// SendSetPasswordNotification mocks base method +func (m *MockManagementServiceClient) SendSetPasswordNotification(arg0 context.Context, arg1 *grpc.SetPasswordNotificationRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SendSetPasswordNotification", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SendSetPasswordNotification indicates an expected call of SendSetPasswordNotification +func (mr *MockManagementServiceClientMockRecorder) SendSetPasswordNotification(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SendSetPasswordNotification", reflect.TypeOf((*MockManagementServiceClient)(nil).SendSetPasswordNotification), varargs...) +} + +// SetInitialPassword mocks base method +func (m *MockManagementServiceClient) SetInitialPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetInitialPassword", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetInitialPassword indicates an expected call of SetInitialPassword +func (mr *MockManagementServiceClientMockRecorder) SetInitialPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetInitialPassword", reflect.TypeOf((*MockManagementServiceClient)(nil).SetInitialPassword), varargs...) +} + +// UnlockUser mocks base method +func (m *MockManagementServiceClient) UnlockUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UnlockUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UnlockUser indicates an expected call of UnlockUser +func (mr *MockManagementServiceClientMockRecorder) UnlockUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UnlockUser", reflect.TypeOf((*MockManagementServiceClient)(nil).UnlockUser), varargs...) +} + +// UpdateApplication mocks base method +func (m *MockManagementServiceClient) UpdateApplication(arg0 context.Context, arg1 *grpc.ApplicationUpdate, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateApplication indicates an expected call of UpdateApplication +func (mr *MockManagementServiceClientMockRecorder) UpdateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateApplication), varargs...) +} + +// UpdateApplicationOIDCConfig mocks base method +func (m *MockManagementServiceClient) UpdateApplicationOIDCConfig(arg0 context.Context, arg1 *grpc.OIDCConfigUpdate, arg2 ...grpc0.CallOption) (*grpc.OIDCConfig, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateApplicationOIDCConfig", varargs...) + ret0, _ := ret[0].(*grpc.OIDCConfig) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateApplicationOIDCConfig indicates an expected call of UpdateApplicationOIDCConfig +func (mr *MockManagementServiceClientMockRecorder) UpdateApplicationOIDCConfig(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplicationOIDCConfig", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateApplicationOIDCConfig), varargs...) +} + +// UpdatePasswordAgePolicy mocks base method +func (m *MockManagementServiceClient) UpdatePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdatePasswordAgePolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordAgePolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdatePasswordAgePolicy indicates an expected call of UpdatePasswordAgePolicy +func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordAgePolicy), varargs...) +} + +// UpdatePasswordComplexityPolicy mocks base method +func (m *MockManagementServiceClient) UpdatePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdatePasswordComplexityPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdatePasswordComplexityPolicy indicates an expected call of UpdatePasswordComplexityPolicy +func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordComplexityPolicy), varargs...) +} + +// UpdatePasswordLockoutPolicy mocks base method +func (m *MockManagementServiceClient) UpdatePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdatePasswordLockoutPolicy", varargs...) + ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdatePasswordLockoutPolicy indicates an expected call of UpdatePasswordLockoutPolicy +func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordLockoutPolicy), varargs...) +} + +// UpdateProject mocks base method +func (m *MockManagementServiceClient) UpdateProject(arg0 context.Context, arg1 *grpc.ProjectUpdateRequest, arg2 ...grpc0.CallOption) (*grpc.Project, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateProject", varargs...) + ret0, _ := ret[0].(*grpc.Project) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateProject indicates an expected call of UpdateProject +func (mr *MockManagementServiceClientMockRecorder) UpdateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProject), varargs...) +} + +// UpdateProjectGrant mocks base method +func (m *MockManagementServiceClient) UpdateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateProjectGrant", varargs...) + ret0, _ := ret[0].(*grpc.ProjectGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateProjectGrant indicates an expected call of UpdateProjectGrant +func (mr *MockManagementServiceClientMockRecorder) UpdateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectGrant), varargs...) +} + +// UpdateProjectGrantUserGrant mocks base method +func (m *MockManagementServiceClient) UpdateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateProjectGrantUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateProjectGrantUserGrant indicates an expected call of UpdateProjectGrantUserGrant +func (mr *MockManagementServiceClientMockRecorder) UpdateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectGrantUserGrant), varargs...) +} + +// UpdateProjectUserGrant mocks base method +func (m *MockManagementServiceClient) UpdateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateProjectUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateProjectUserGrant indicates an expected call of UpdateProjectUserGrant +func (mr *MockManagementServiceClientMockRecorder) UpdateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectUserGrant), varargs...) +} + +// UpdateUserAddress mocks base method +func (m *MockManagementServiceClient) UpdateUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateUserAddress indicates an expected call of UpdateUserAddress +func (mr *MockManagementServiceClientMockRecorder) UpdateUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserAddress", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserAddress), varargs...) +} + +// UpdateUserGrant mocks base method +func (m *MockManagementServiceClient) UpdateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateUserGrant", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateUserGrant indicates an expected call of UpdateUserGrant +func (mr *MockManagementServiceClientMockRecorder) UpdateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserGrant), varargs...) +} + +// UpdateUserProfile mocks base method +func (m *MockManagementServiceClient) UpdateUserProfile(arg0 context.Context, arg1 *grpc.UpdateUserProfileRequest, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateUserProfile indicates an expected call of UpdateUserProfile +func (mr *MockManagementServiceClientMockRecorder) UpdateUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserProfile", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserProfile), varargs...) +} + +// UserChanges mocks base method +func (m *MockManagementServiceClient) UserChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UserChanges", varargs...) + ret0, _ := ret[0].(*grpc.Changes) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UserChanges indicates an expected call of UserChanges +func (mr *MockManagementServiceClientMockRecorder) UserChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UserChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).UserChanges), varargs...) +} + +// UserGrantByID mocks base method +func (m *MockManagementServiceClient) UserGrantByID(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UserGrantByID", varargs...) + ret0, _ := ret[0].(*grpc.UserGrant) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UserGrantByID indicates an expected call of UserGrantByID +func (mr *MockManagementServiceClientMockRecorder) UserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).UserGrantByID), varargs...) +} + +// Validate mocks base method +func (m *MockManagementServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockManagementServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockManagementServiceClient)(nil).Validate), varargs...) +} From c5a5b65a0372b6906b67df529e7f2880c9722bad Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 12:25:16 +0100 Subject: [PATCH 04/19] fix: generated files --- go.mod | 3 +- go.sum | 1 + .../protoc/protoc-gen-authoption/templates.go | 2 +- pkg/admin/api/grpc/admin.pb.authoptions.go | 27 +- pkg/admin/api/grpc/admin.swagger.json | 391 +++++++++++++++++- pkg/admin/api/grpc/generate.go | 4 +- pkg/admin/api/grpc/mock/admin.proto.mock.go | 4 +- pkg/admin/api/proto/admin.proto | 1 + pkg/auth/api/grpc/generate.go | 4 +- pkg/auth/api/proto/auth.proto | 51 +-- pkg/management/api/grpc/generate.go | 4 +- .../api/grpc/management.pb.authoptions.go | 204 ++++----- .../api/grpc/management.swagger.json | 2 +- .../api/grpc/mock/management.proto.mock.go | 4 +- pkg/management/api/proto/management.proto | 224 +++++----- 15 files changed, 670 insertions(+), 256 deletions(-) diff --git a/go.mod b/go.mod index e38a3449d6..69f1c7ab4f 100644 --- a/go.mod +++ b/go.mod @@ -8,6 +8,7 @@ require ( github.com/Masterminds/semver v1.5.0 // indirect github.com/Masterminds/sprig v2.22.0+incompatible github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a + github.com/envoyproxy/protoc-gen-validate v0.1.0 github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 @@ -29,7 +30,7 @@ require ( golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae // indirect golang.org/x/text v0.3.2 // indirect golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135 - google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c // indirect + google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect gopkg.in/yaml.v2 v2.2.8 // indirect diff --git a/go.sum b/go.sum index 8b4fb19b9b..1a19be8e54 100644 --- a/go.sum +++ b/go.sum @@ -19,6 +19,7 @@ github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSs github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= +github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrpgBZ1R8UNe3ddc+A= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index 9daad6521c..c7d51a59df 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584960713, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584961378, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go index c6e9605061..5ba347148a 100644 --- a/pkg/admin/api/grpc/admin.pb.authoptions.go +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -5,15 +5,36 @@ package grpc import ( "google.golang.org/grpc" - utils_auth "github.com/caos/citadel/utils/auth" - utils_grpc "github.com/caos/citadel/utils/grpc" + utils_auth "github.com/caos/zitadel/internal/auth" + utils_grpc "github.com/caos/zitadel/internal/grpc" ) /** * AdminService */ -var AdminService_AuthMethods = utils_auth.AuthMethodMapping{} +var AdminService_AuthMethods = utils_auth.AuthMethodMapping{ + + "/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.AuthOption{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.AuthOption{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.AuthOption{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.AuthOption{ + Permission: "iam.write", + CheckParam: "", + }, +} func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json index cd274e4e42..cabb3c0244 100644 --- a/pkg/admin/api/grpc/admin.swagger.json +++ b/pkg/admin/api/grpc/admin.swagger.json @@ -4,7 +4,7 @@ "title": "admin service", "version": "0.1", "contact": { - "url": "https://github.com/caos/citadel/admin" + "url": "https://github.com/caos/zitadel/admin" } }, "schemes": [ @@ -36,6 +36,113 @@ ] } }, + "/orgs/_isunique": { + "get": { + "summary": "ORG", + "operationId": "IsOrgUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueOrgResponse" + } + } + }, + "parameters": [ + { + "name": "name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "domain", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_search": { + "post": { + "operationId": "SearchOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSearchRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_setup": { + "post": { + "operationId": "SetUpOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSetUpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSetUpRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/{id}": { + "get": { + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, "/ready": { "get": { "summary": "Ready returns status OK as soon as all dependent services are available", @@ -136,6 +243,288 @@ } }, "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1CreateOrgRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgSearchKey": { + "type": "string", + "enum": [ + "ORGSEARCHKEY_UNSPECIFIED", + "ORGSEARCHKEY_ORG_NAME", + "ORGSEARCHKEY_DOMAIN", + "ORGSEARCHKEY_STATE" + ], + "default": "ORGSEARCHKEY_UNSPECIFIED" + }, + "v1OrgSearchMethod": { + "type": "string", + "enum": [ + "ORGSEARCHMETHOD_EQUALS", + "ORGSEARCHMETHOD_STARTS_WITH", + "ORGSEARCHMETHOD_CONTAINS" + ], + "default": "ORGSEARCHMETHOD_EQUALS" + }, + "v1OrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1OrgSearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgSearchQuery" + } + } + } + }, + "v1OrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1OrgSetUpRequest": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1CreateOrgRequest" + }, + "user": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + }, + "v1OrgSetUpResponse": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1Org" + }, + "user": { + "$ref": "#/definitions/v1User" + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1UniqueOrgResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "isPhoneVerified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" } } } diff --git a/pkg/admin/api/grpc/generate.go b/pkg/admin/api/grpc/generate.go index 7632f53f8c..2f4abaaf24 100644 --- a/pkg/admin/api/grpc/generate.go +++ b/pkg/admin/api/grpc/generate.go @@ -1,6 +1,6 @@ package grpc -//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto -//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/citadel/admin/api/grpc AdminServiceClient +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto +//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/zitadel/admin/api/grpc AdminServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go index e590f7ca3f..237c445508 100644 --- a/pkg/admin/api/grpc/mock/admin.proto.mock.go +++ b/pkg/admin/api/grpc/mock/admin.proto.mock.go @@ -1,12 +1,12 @@ // Code generated by MockGen. DO NOT EDIT. -// Source: github.com/caos/citadel/admin/api/grpc (interfaces: AdminServiceClient) +// Source: github.com/caos/zitadel/admin/api/grpc (interfaces: AdminServiceClient) // Package api is a generated GoMock package. package api import ( context "context" - grpc "github.com/caos/citadel/admin/api/grpc" + grpc "github.com/caos/zitadel/admin/api/grpc" gomock "github.com/golang/mock/gomock" empty "github.com/golang/protobuf/ptypes/empty" struct0 "github.com/golang/protobuf/ptypes/struct" diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto index f187dc913e..ddacca88b9 100644 --- a/pkg/admin/api/proto/admin.proto +++ b/pkg/admin/api/proto/admin.proto @@ -5,6 +5,7 @@ import "google/api/annotations.proto"; import "google/protobuf/empty.proto"; import "google/protobuf/timestamp.proto"; import "google/protobuf/struct.proto"; +import "validate/validate.proto"; import "protoc-gen-swagger/options/annotations.proto"; import "authoption/options.proto"; diff --git a/pkg/auth/api/grpc/generate.go b/pkg/auth/api/grpc/generate.go index 37b24a85ef..58fbc3f56c 100644 --- a/pkg/auth/api/grpc/generate.go +++ b/pkg/auth/api/grpc/generate.go @@ -1,5 +1,5 @@ package grpc -//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto -//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/citadel/auth/api/grpc AuthServiceClient +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto +//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/zitadel/auth/api/grpc AuthServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto index 225403aaae..3c47b5b543 100644 --- a/pkg/auth/api/proto/auth.proto +++ b/pkg/auth/api/proto/auth.proto @@ -4,19 +4,20 @@ import "google/api/annotations.proto"; import "google/protobuf/empty.proto"; import "google/protobuf/struct.proto"; import "google/protobuf/timestamp.proto"; +import "validate/validate.proto"; import "protoc-gen-swagger/options/annotations.proto"; import "authoption/options.proto"; package zitadel.auth.api.v1; -option go_package = "github.com/caos/citadel/auth/api/grpc"; +option go_package = "github.com/caos/zitadel/auth/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Auth API"; version: "0.1"; contact:{ - url: "https://github.com/caos/citadel/auth" + url: "https://github.com/caos/zitadel/auth" }; }; @@ -134,7 +135,7 @@ service AuthService { get: "/me/usersessions" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -178,7 +179,7 @@ service AuthService { get: "/users/me/profile" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -189,7 +190,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -199,7 +200,7 @@ service AuthService { get: "/users/me/email" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -210,7 +211,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -221,7 +222,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -240,7 +241,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -258,7 +259,7 @@ service AuthService { get: "/users/me/phone" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -269,7 +270,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -280,7 +281,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -291,7 +292,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -301,7 +302,7 @@ service AuthService { get: "/users/me/address" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -312,7 +313,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -322,7 +323,7 @@ service AuthService { get: "/users/me/mfas" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -334,7 +335,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -359,7 +360,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -370,7 +371,7 @@ service AuthService { post: "/users/me/mfa/otp" body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -381,7 +382,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -391,7 +392,7 @@ service AuthService { delete: "/users/me/mfa/otp" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -446,7 +447,7 @@ service AuthService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } @@ -456,18 +457,18 @@ service AuthService { get: "/global/_isiamadmin" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } //Permission - rpc GetMyCitadelPermissions(google.protobuf.Empty) returns (MyPermissions) { + rpc GetMyZitadelPermissions(google.protobuf.Empty) returns (MyPermissions) { option (google.api.http) = { get: "/permissions/zitadel/me" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "authenticated" }; } diff --git a/pkg/management/api/grpc/generate.go b/pkg/management/api/grpc/generate.go index 9db2fd3585..7217c62cfb 100644 --- a/pkg/management/api/grpc/generate.go +++ b/pkg/management/api/grpc/generate.go @@ -1,6 +1,6 @@ package grpc -//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/citadel/utils/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto -//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/citadel/management/api/grpc ManagementServiceClient +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto +//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/management/api/grpc ManagementServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go index 4ec638da86..f00feb2850 100644 --- a/pkg/management/api/grpc/management.pb.authoptions.go +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -5,8 +5,8 @@ package grpc import ( "google.golang.org/grpc" - utils_auth "github.com/caos/citadel/utils/auth" - utils_grpc "github.com/caos/citadel/utils/grpc" + utils_auth "github.com/caos/zitadel/internal/auth" + utils_grpc "github.com/caos/zitadel/internal/grpc" ) /** @@ -15,502 +15,502 @@ import ( var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{ - "/caos.citadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{ Permission: "user.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{ Permission: "project.app.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{ Permission: "org.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{ Permission: "project.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{ Permission: "user.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{ Permission: "user.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{ Permission: "policy.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{ Permission: "policy.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{ Permission: "policy.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{ Permission: "policy.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{ Permission: "policy.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{ Permission: "policy.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{ Permission: "policy.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{ Permission: "org.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{ Permission: "org.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{ Permission: "org.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{ Permission: "org.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{ Permission: "org.member.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{ Permission: "org.member.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{ Permission: "org.member.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{ Permission: "org.member.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{ Permission: "org.member.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{ Permission: "project.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{ Permission: "project.read", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{ Permission: "project.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{ Permission: "project.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{ Permission: "project.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{ Permission: "project.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{ Permission: "project.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{ Permission: "project.member.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{ Permission: "project.member.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{ Permission: "project.member.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{ Permission: "project.member.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{ Permission: "project.member.delete", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{ Permission: "project.role.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{ Permission: "project.role.write", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{ Permission: "project.role.delete", CheckParam: "Id", }, - "/caos.citadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{ Permission: "project.app.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{ Permission: "project.app.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{ Permission: "project.app.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{ Permission: "project.grant.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{ Permission: "project.grant.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{ Permission: "project.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{ Permission: "project.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{ Permission: "project.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{ Permission: "project.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{ Permission: "project.grant.member.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{ Permission: "project.grant.member.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{ Permission: "project.grant.member.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{ Permission: "project.grant.member.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{ Permission: "project.grant.member.delete", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{ Permission: "user.grant.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{ Permission: "user.grant.read", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{ Permission: "user.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{ Permission: "user.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{ Permission: "user.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{ Permission: "user.grant.write", CheckParam: "", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{ Permission: "project.user.grant.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{ Permission: "project.user.grant.read", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{ Permission: "project.user.grant.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{ Permission: "project.user.grant.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{ Permission: "project.user.grant.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{ Permission: "project.user.grant.write", CheckParam: "ProjectId", }, - "/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{ Permission: "project.grant.user.grant.read", CheckParam: "ProjectGrantId", }, - "/caos.citadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{ Permission: "project.grant.user.grant.read", CheckParam: "ProjectGrantId", }, - "/caos.citadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{ Permission: "project.grant.user.grant.write", CheckParam: "ProjectGrantId", }, - "/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{ Permission: "project.grant.user.grant.write", CheckParam: "ProjectGrantId", }, - "/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{ Permission: "project.grant.user.grant.write", CheckParam: "ProjectGrantId", }, - "/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{ + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{ Permission: "project.grant.user.grant.write", CheckParam: "ProjectGrantId", }, diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json index 59c6222d4d..57adde4771 100644 --- a/pkg/management/api/grpc/management.swagger.json +++ b/pkg/management/api/grpc/management.swagger.json @@ -4,7 +4,7 @@ "title": "Management API", "version": "0.1", "contact": { - "url": "https://github.com/caos/citadel/management" + "url": "https://github.com/caos/zitadel/management" } }, "schemes": [ diff --git a/pkg/management/api/grpc/mock/management.proto.mock.go b/pkg/management/api/grpc/mock/management.proto.mock.go index 6b1afffa8c..f5352b36ce 100644 --- a/pkg/management/api/grpc/mock/management.proto.mock.go +++ b/pkg/management/api/grpc/mock/management.proto.mock.go @@ -1,12 +1,12 @@ // Code generated by MockGen. DO NOT EDIT. -// Source: github.com/caos/citadel/management/api/grpc (interfaces: ManagementServiceClient) +// Source: github.com/caos/zitadel/management/api/grpc (interfaces: ManagementServiceClient) // Package api is a generated GoMock package. package api import ( context "context" - grpc "github.com/caos/citadel/management/api/grpc" + grpc "github.com/caos/zitadel/management/api/grpc" gomock "github.com/golang/mock/gomock" empty "github.com/golang/protobuf/ptypes/empty" struct0 "github.com/golang/protobuf/ptypes/struct" diff --git a/pkg/management/api/proto/management.proto b/pkg/management/api/proto/management.proto index 0b7ed3da73..b9d3854c99 100644 --- a/pkg/management/api/proto/management.proto +++ b/pkg/management/api/proto/management.proto @@ -9,26 +9,26 @@ import "validate/validate.proto"; import "google/protobuf/descriptor.proto"; import "authoption/options.proto"; -package caos.citadel.management.api.v1; +package caos.zitadel.management.api.v1; -option go_package = "github.com/caos/citadel/management/api/grpc"; +option go_package = "github.com/caos/zitadel/management/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Management API"; -version: "0.1"; -contact:{ -url: "https://github.com/caos/citadel/management" -}; -}; + version: "0.1"; + contact:{ + url: "https://github.com/caos/zitadel/management" + }; + }; -schemes: HTTPS; + schemes: HTTPS; -consumes: "application/json"; -consumes: "application/grpc"; + consumes: "application/json"; + consumes: "application/grpc"; -produces: "application/json"; -produces: "application/grpc"; + produces: "application/json"; + produces: "application/grpc"; }; service ManagementService { @@ -57,7 +57,7 @@ service ManagementService { get: "/users/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -67,7 +67,7 @@ service ManagementService { get: "/global/users/email/{email}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -78,7 +78,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -88,7 +88,7 @@ service ManagementService { get: "/users/_isunique" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -99,7 +99,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -110,7 +110,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -121,7 +121,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -132,7 +132,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -143,7 +143,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -153,7 +153,7 @@ service ManagementService { delete: "/users/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.delete" }; } @@ -163,7 +163,7 @@ service ManagementService { get: "/users/{id}/changes" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -173,7 +173,7 @@ service ManagementService { get: "/applications/{id}/changes" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.read" }; } @@ -183,7 +183,7 @@ service ManagementService { get: "/orgs/{id}/changes" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.read" }; } @@ -193,7 +193,7 @@ service ManagementService { get: "/projects/{id}/changes" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.read" }; } @@ -204,7 +204,7 @@ service ManagementService { get: "/users/{id}/profile" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -215,7 +215,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -226,7 +226,7 @@ service ManagementService { get: "/users/{id}/email" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -237,7 +237,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -248,7 +248,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -259,7 +259,7 @@ service ManagementService { get: "/users/{id}/phone" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -270,7 +270,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -281,7 +281,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -292,7 +292,7 @@ service ManagementService { get: "/users/{id}/address" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -303,7 +303,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -313,7 +313,7 @@ service ManagementService { get: "/users/{id}/mfas" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.read" }; } @@ -326,7 +326,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -338,7 +338,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.write" }; } @@ -350,7 +350,7 @@ service ManagementService { get: "/policies/passwords/complexity" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.read" }; } @@ -361,7 +361,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -372,7 +372,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -382,7 +382,7 @@ service ManagementService { delete: "/policies/passwords/complexity/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.delete" }; } @@ -393,7 +393,7 @@ service ManagementService { get: "/policies/passwords/age" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.read" }; } @@ -404,7 +404,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -415,7 +415,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -425,7 +425,7 @@ service ManagementService { delete: "/policies/passwords/age/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.delete" }; } @@ -436,7 +436,7 @@ service ManagementService { get: "/policies/passwords/lockout" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.read" }; } @@ -447,7 +447,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -458,7 +458,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.write" }; } @@ -468,7 +468,7 @@ service ManagementService { delete: "/policies/passwords/lockout/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "policy.delete" }; } @@ -479,7 +479,7 @@ service ManagementService { get: "/orgs/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.read" }; } @@ -489,7 +489,7 @@ service ManagementService { get: "/global/orgs/domain/{domain}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.read" }; } @@ -500,7 +500,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.write" }; } @@ -511,7 +511,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.write" }; } @@ -522,7 +522,7 @@ service ManagementService { get: "/orgs/members/roles" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.member.read" }; } @@ -533,7 +533,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.member.write" }; } @@ -544,7 +544,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.member.write" }; } @@ -554,7 +554,7 @@ service ManagementService { delete: "/orgs/{org_id}/members/{user_id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.member.delete" }; } @@ -565,7 +565,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "org.member.read" }; } @@ -577,7 +577,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.read" }; } @@ -587,7 +587,7 @@ service ManagementService { get: "/projects/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.read" check_field_name: "Id" }; @@ -599,7 +599,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.write" }; } @@ -610,7 +610,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.write" check_field_name: "Id" }; @@ -622,7 +622,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.write" check_field_name: "Id" }; @@ -634,7 +634,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.write" check_field_name: "Id" }; @@ -646,7 +646,7 @@ service ManagementService { get: "/grants/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.read" }; } @@ -657,7 +657,7 @@ service ManagementService { get: "/projects/members/roles" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.member.read" }; } @@ -668,7 +668,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.member.read" check_field_name: "ProjectId" }; @@ -680,7 +680,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.member.write" check_field_name: "Id" }; @@ -692,7 +692,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.member.write" check_field_name: "Id" }; @@ -703,7 +703,7 @@ service ManagementService { delete: "/projects/{id}/members/{user_id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.member.delete" check_field_name: "Id" }; @@ -716,7 +716,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.role.read" check_field_name: "ProjectId" }; @@ -728,7 +728,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.role.write" check_field_name: "Id" }; @@ -739,7 +739,7 @@ service ManagementService { delete: "/projects/{id}/roles/{name}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.role.delete" check_field_name: "Id" }; @@ -752,7 +752,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.read" check_field_name: "ProjectId" }; @@ -763,7 +763,7 @@ service ManagementService { get: "/projects/{project_id}/applications/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.read" check_field_name: "ProjectId" }; @@ -775,7 +775,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -787,7 +787,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -799,7 +799,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -811,7 +811,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -823,7 +823,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -835,7 +835,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.app.write" check_field_name: "ProjectId" }; @@ -848,7 +848,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.read" check_field_name: "ProjectId" }; @@ -859,7 +859,7 @@ service ManagementService { get: "/projects/{project_id}/grants/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.read" }; } @@ -870,7 +870,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.write" }; } @@ -881,7 +881,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.write" }; } @@ -892,7 +892,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.write" }; } @@ -903,7 +903,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.write" }; } @@ -915,7 +915,7 @@ service ManagementService { get: "/projects/grants/members/roles" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.member.read" }; } @@ -925,7 +925,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.member.read" }; } @@ -936,7 +936,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.member.write" }; } @@ -947,7 +947,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.member.write" }; } @@ -957,7 +957,7 @@ service ManagementService { delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.member.delete" }; } @@ -970,7 +970,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.read" }; } @@ -980,7 +980,7 @@ service ManagementService { get: "/users/{user_id}/grants/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.read" }; } @@ -991,7 +991,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.write" }; } @@ -1002,7 +1002,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.write" }; } @@ -1013,7 +1013,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.write" }; } @@ -1024,7 +1024,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "user.grant.write" }; } @@ -1036,7 +1036,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.read" check_field_name: "ProjectId" }; @@ -1047,7 +1047,7 @@ service ManagementService { get: "/projects/{project_id}/users/{user_id}/grants/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.read" check_field_name: "ProjectId" }; @@ -1059,7 +1059,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.write" check_field_name: "ProjectId" }; @@ -1071,7 +1071,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.write" check_field_name: "ProjectId" }; @@ -1083,7 +1083,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.write" check_field_name: "ProjectId" }; @@ -1095,7 +1095,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.user.grant.write" check_field_name: "ProjectId" }; @@ -1107,7 +1107,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.read" check_field_name: "ProjectGrantId" }; @@ -1118,7 +1118,7 @@ service ManagementService { get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.read" check_field_name: "ProjectGrantId" }; @@ -1130,7 +1130,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.write" check_field_name: "ProjectGrantId" }; @@ -1142,7 +1142,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.write" check_field_name: "ProjectGrantId" }; @@ -1154,7 +1154,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.write" check_field_name: "ProjectGrantId" }; @@ -1166,7 +1166,7 @@ service ManagementService { body: "*" }; - option (caos.citadel.utils.v1.auth_option) = { + option (caos.zitadel.utils.v1.auth_option) = { permission: "project.grant.user.grant.write" check_field_name: "ProjectGrantId" }; From bf3b770700dc6a7ebb2cbde8268d6d84212e026d Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 16:28:35 +0100 Subject: [PATCH 05/19] fix: remove generated files --- .../protoc/protoc-gen-authoption/templates.go | 4 +- .../templates/auth_method_mapping.go.tmpl | 4 +- pkg/admin/api/grpc/admin.pb.authoptions.go | 41 - pkg/admin/api/grpc/admin.swagger.json | 530 -- pkg/admin/api/grpc/generate.go | 4 +- pkg/admin/api/grpc/mock/admin.proto.mock.go | 178 - pkg/auth/api/grpc/generate.go | 2 +- .../api/grpc/management.pb.authoptions.go | 521 -- .../api/grpc/management.swagger.json | 5657 ----------------- .../api/grpc/mock/management.proto.mock.go | 2118 ------ 10 files changed, 7 insertions(+), 9052 deletions(-) delete mode 100644 pkg/admin/api/grpc/admin.pb.authoptions.go delete mode 100644 pkg/admin/api/grpc/admin.swagger.json delete mode 100644 pkg/admin/api/grpc/mock/admin.proto.mock.go delete mode 100644 pkg/management/api/grpc/management.pb.authoptions.go delete mode 100644 pkg/management/api/grpc/management.swagger.json delete mode 100644 pkg/management/api/grpc/mock/management.proto.mock.go diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index c7d51a59df..00bb05a07c 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -68,7 +68,7 @@ func (fi bindataFileInfo) Sys() interface{} { return nil } -var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x52\xc1\x6a\xe3\x30\x10\x3d\xaf\xbe\x62\x30\x3e\xb4\x21\x95\xd8\x6b\xa0\x87\x25\xdd\x2e\x3d\xb4\x09\x6c\x76\xaf\x41\xb5\x27\xb2\x88\x2d\x19\x49\x0e\xb4\x42\xff\xbe\x8c\xed\xac\x9d\xb4\x0b\xeb\x93\xac\x99\x37\xef\xbd\xd1\x13\x02\xd6\xb6\x44\x50\x68\xd0\xc9\x80\x25\xbc\xbe\x41\xeb\x6c\xb0\xc5\x9d\x42\x73\x27\xbb\x50\x35\x18\x2a\x5b\x72\x78\xd8\xc0\xcb\x66\x07\xdf\x1f\x9e\x76\x9c\xb1\x56\x16\x47\xa9\x10\x62\xe4\x8f\xba\x46\xfe\xc3\x6e\x8f\x8a\xbf\xc8\x06\x53\x62\x8c\xe9\xa6\xb5\x2e\xc0\x0d\x03\x00\xc8\x94\xb5\xaa\x46\xae\x6c\x2d\x8d\xe2\xd6\x29\xa1\x5c\x5b\x64\x7d\x91\x7d\xe9\x82\xae\xfd\x9e\xa8\x20\x53\x3a\x54\xdd\x2b\x2f\x6c\x23\x0a\x69\xbd\x78\xd7\x41\x96\x58\x0b\x6d\x02\x3a\x23\x6b\x41\x6d\xd9\x19\x43\x53\xfe\x03\x33\x90\xdd\x32\x16\x23\x38\x69\x14\x42\xee\x61\x75\x0f\x83\xf2\x9f\xe8\x4e\xba\x40\x0f\x24\x5c\x2c\x16\x0c\x16\x10\x63\xee\xcf\x66\x60\x21\x18\x3b\x49\x37\xbf\xdc\x7f\xeb\x42\xf5\xdc\x2f\xc6\xc3\x3d\x4c\x0e\xf8\x54\x78\x96\x6d\xab\x8d\x82\xd8\xdb\x9c\xa8\x1b\xa2\xce\x3d\x1f\xba\x88\x60\xfc\x62\x84\xbc\x21\xfc\xa6\x0d\xd4\x63\xdb\xa0\xad\x81\xbc\xe1\x9b\xfe\xe4\x21\x23\x7f\x7c\xf4\xc7\x7b\x56\x7e\xfa\xca\x89\x78\x3f\x74\x67\x70\x39\x50\x1f\x40\x9a\x72\x36\xf7\xef\x89\x6f\xd1\x35\xda\x7b\xa2\x98\x61\xfa\xf7\x12\x31\xe6\xc3\x72\xb6\xc3\x33\xa7\xc4\x67\xee\x45\x8c\xe3\x29\x5b\x5d\x7b\x1f\xa4\xc6\x8b\x79\xf4\x4d\x6c\x2b\xc8\x62\xfc\x4c\x46\x4a\xd9\xf2\x03\x6e\x5d\x61\x71\xdc\x4a\x27\x9b\x2b\x5c\x5f\x78\xd4\x58\x97\xa3\x94\x4b\x6c\x5a\xce\xd6\x80\xe6\xbc\xe7\x18\x61\xf8\x49\x8c\x1d\x3a\x53\x7c\x78\x54\xeb\xf4\xbb\x24\x0b\xfb\x27\x8a\x4f\x81\x6d\xb0\xee\xe6\x84\x4e\x1f\x34\xba\xb9\xdb\x9d\x3d\xa2\xf9\x3d\x16\x96\x40\x77\x6b\x6b\x0e\xb0\xb8\xda\x08\x5d\x6a\x75\x0b\x94\x42\xfe\xcb\x48\xf7\x46\x89\x43\x37\x9b\x3f\x66\xc4\x61\xe8\x9c\x81\x29\xdb\xfc\x42\xd1\x67\x82\x26\xde\xe5\xbf\xf2\x79\x4b\x5e\x07\xdf\x90\xd2\x9f\x00\x00\x00\xff\xff\xbf\x91\xbb\x3b\xf2\x03\x00\x00") +var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x8d\x91\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x59\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x83\x6c\x67\x76\xd2\x0c\x98\x4f\xb2\xc8\x9f\x3f\x3f\x8a\x8c\xc1\x5a\x57\x08\x02\x15\x5a\xee\xb1\x82\xb7\x77\x30\x56\x7b\x5d\xde\x0b\x54\xf7\xbc\xf3\x75\x8b\xbe\xd6\x15\x85\xc7\x0d\xbc\x6e\x76\xf0\xfd\xf1\x79\x47\x09\x31\xbc\x3c\x72\x81\x10\x02\x7d\x92\x0d\xd2\x1f\x7a\x7b\x14\xf4\x95\xb7\x18\x23\x21\x44\xb6\x46\x5b\x0f\x77\x04\x00\x20\x13\x5a\x8b\x06\xa9\xd0\x0d\x57\x82\x6a\x2b\x98\xb0\xa6\xcc\xfa\x20\xf9\xd2\x79\xd9\xb8\x7d\xb2\x82\x4c\x48\x5f\x77\x6f\xb4\xd4\x2d\x2b\xb9\x76\xec\x43\x7a\x5e\x61\xc3\xa4\xf2\x68\x15\x6f\x18\x37\x92\xb1\x94\x9b\x9d\x85\xa9\xd4\x7f\x0a\x07\xd7\x05\x21\x21\x80\xe5\x4a\x20\xe4\x0e\x56\x0f\x30\x20\xfc\x44\x7b\x92\x25\x3a\x48\x04\xac\x28\x08\x14\x10\x42\xee\xce\x54\x50\x30\x42\x4e\xdc\xce\x2f\xf7\xdf\x3a\x5f\xbf\xf4\x13\x72\xf0\x00\x13\x0a\x9d\x02\x2f\xdc\x18\xa9\x04\x84\x9e\x77\xb2\x6e\x93\x75\xee\xe8\x90\x95\x0c\xc6\x2f\x04\xc8\xdb\xa4\xdf\x18\x9f\x72\xb4\xf1\x52\x2b\xc8\x5b\xba\xe9\x4f\x0e\xb2\xc4\x48\x47\x46\xda\xbb\xd2\xd3\x57\x9a\x8c\xf7\x43\x76\x06\x97\x05\xe5\x01\xb8\xaa\x66\x75\xff\x9e\xe8\x16\x6d\x2b\x9d\x4b\x16\x33\x4d\xff\x70\x2c\x84\x7c\x18\xce\x76\x78\xef\x18\xe9\x8c\x9e\x85\x30\x9e\xb2\xd5\x35\xfb\xd0\x6a\xb8\xa8\x97\xbe\xc9\x6d\x05\x59\x08\xb7\xda\x88\x31\x5b\x7e\xd2\xad\x6b\x2c\x8f\x5b\x6e\x79\x7b\xa5\xeb\x03\x4f\x12\x9b\x6a\x6c\xe5\x52\x1b\x97\xb3\x31\xa0\x3a\xcf\x39\x04\x18\x7e\x22\x21\x87\x4e\x95\x9f\x1e\x55\x5b\xf9\xc1\x13\xc2\xfe\x39\xad\x50\x89\xc6\x6b\x7b\x77\x42\x2b\x0f\x12\xed\x9c\x76\xa7\x8f\xa8\x7e\x8f\x81\x25\xa4\xbb\xb5\x56\x07\x28\xae\x26\x92\x2e\xa5\x58\x40\xda\x42\xfa\x4b\x71\xfb\x9e\x36\x0e\xed\xac\xfe\xb8\x23\x16\x7d\x67\x15\x4c\xfb\x4d\x2f\x3a\xba\xd5\xd0\xe4\xbb\xfc\xd7\x7e\x2e\x12\xeb\xc0\x0d\x31\xfe\x09\x00\x00\xff\xff\x12\xdf\x14\x2b\xfb\x03\x00\x00") func templatesAuth_method_mappingGoTmplBytes() ([]byte, error) { return bindataRead( @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1010, mode: os.FileMode(420), modTime: time.Unix(1584961378, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1019, mode: os.FileMode(420), modTime: time.Unix(1584977173, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl index 031dae21ee..b2b33042d1 100644 --- a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl +++ b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl @@ -6,8 +6,8 @@ package {{.File.GoPkg.Name}} import ( "google.golang.org/grpc" - utils_auth "github.com/caos/zitadel/internal/auth" - utils_grpc "github.com/caos/zitadel/internal/grpc" + utils_auth "github.com/caos/zitadel/internal/api//auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" ) {{ range $s := .File.Services }} diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go deleted file mode 100644 index 5ba347148a..0000000000 --- a/pkg/admin/api/grpc/admin.pb.authoptions.go +++ /dev/null @@ -1,41 +0,0 @@ -// Code generated by protoc-gen-authmethod. DO NOT EDIT. - -package grpc - -import ( - "google.golang.org/grpc" - - utils_auth "github.com/caos/zitadel/internal/auth" - utils_grpc "github.com/caos/zitadel/internal/grpc" -) - -/** - * AdminService - */ - -var AdminService_AuthMethods = utils_auth.AuthMethodMapping{ - - "/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.AuthOption{ - Permission: "iam.read", - CheckParam: "", - }, - - "/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.AuthOption{ - Permission: "iam.read", - CheckParam: "", - }, - - "/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.AuthOption{ - Permission: "iam.read", - CheckParam: "", - }, - - "/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.AuthOption{ - Permission: "iam.write", - CheckParam: "", - }, -} - -func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) -} diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json deleted file mode 100644 index cabb3c0244..0000000000 --- a/pkg/admin/api/grpc/admin.swagger.json +++ /dev/null @@ -1,530 +0,0 @@ -{ - "swagger": "2.0", - "info": { - "title": "admin service", - "version": "0.1", - "contact": { - "url": "https://github.com/caos/zitadel/admin" - } - }, - "schemes": [ - "https" - ], - "consumes": [ - "application/json", - "application/grpc" - ], - "produces": [ - "application/json", - "application/grpc" - ], - "paths": { - "/healthz": { - "get": { - "summary": "Healthz returns status OK as soon as the service started", - "operationId": "Healthz", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "tags": [ - "AdminService" - ] - } - }, - "/orgs/_isunique": { - "get": { - "summary": "ORG", - "operationId": "IsOrgUnique", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UniqueOrgResponse" - } - } - }, - "parameters": [ - { - "name": "name", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "domain", - "in": "query", - "required": false, - "type": "string" - } - ], - "tags": [ - "AdminService" - ] - } - }, - "/orgs/_search": { - "post": { - "operationId": "SearchOrgs", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1OrgSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OrgSearchRequest" - } - } - ], - "tags": [ - "AdminService" - ] - } - }, - "/orgs/_setup": { - "post": { - "operationId": "SetUpOrg", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1OrgSetUpResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OrgSetUpRequest" - } - } - ], - "tags": [ - "AdminService" - ] - } - }, - "/orgs/{id}": { - "get": { - "operationId": "GetOrgByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Org" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AdminService" - ] - } - }, - "/ready": { - "get": { - "summary": "Ready returns status OK as soon as all dependent services are available", - "operationId": "Ready", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "tags": [ - "AdminService" - ] - } - }, - "/validate": { - "get": { - "operationId": "Validate", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/protobufStruct" - } - } - }, - "tags": [ - "AdminService" - ] - } - } - }, - "definitions": { - "protobufListValue": { - "type": "object", - "properties": { - "values": { - "type": "array", - "items": { - "$ref": "#/definitions/protobufValue" - }, - "description": "Repeated field of dynamically typed values." - } - }, - "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." - }, - "protobufNullValue": { - "type": "string", - "enum": [ - "NULL_VALUE" - ], - "default": "NULL_VALUE", - "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." - }, - "protobufStruct": { - "type": "object", - "properties": { - "fields": { - "type": "object", - "additionalProperties": { - "$ref": "#/definitions/protobufValue" - }, - "description": "Unordered map of dynamically typed values." - } - }, - "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." - }, - "protobufValue": { - "type": "object", - "properties": { - "null_value": { - "$ref": "#/definitions/protobufNullValue", - "description": "Represents a null value." - }, - "number_value": { - "type": "number", - "format": "double", - "description": "Represents a double value." - }, - "string_value": { - "type": "string", - "description": "Represents a string value." - }, - "bool_value": { - "type": "boolean", - "format": "boolean", - "description": "Represents a boolean value." - }, - "struct_value": { - "$ref": "#/definitions/protobufStruct", - "description": "Represents a structured value." - }, - "list_value": { - "$ref": "#/definitions/protobufListValue", - "description": "Represents a repeated `Value`." - } - }, - "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." - }, - "v1CreateOrgRequest": { - "type": "object", - "properties": { - "name": { - "type": "string" - }, - "domain": { - "type": "string" - } - } - }, - "v1Gender": { - "type": "string", - "enum": [ - "GENDER_UNSPECIFIED", - "GENDER_FEMALE", - "GENDER_MALE", - "GENDER_DIVERSE" - ], - "default": "GENDER_UNSPECIFIED" - }, - "v1Org": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1OrgState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "name": { - "type": "string" - }, - "domain": { - "type": "string" - } - } - }, - "v1OrgSearchKey": { - "type": "string", - "enum": [ - "ORGSEARCHKEY_UNSPECIFIED", - "ORGSEARCHKEY_ORG_NAME", - "ORGSEARCHKEY_DOMAIN", - "ORGSEARCHKEY_STATE" - ], - "default": "ORGSEARCHKEY_UNSPECIFIED" - }, - "v1OrgSearchMethod": { - "type": "string", - "enum": [ - "ORGSEARCHMETHOD_EQUALS", - "ORGSEARCHMETHOD_STARTS_WITH", - "ORGSEARCHMETHOD_CONTAINS" - ], - "default": "ORGSEARCHMETHOD_EQUALS" - }, - "v1OrgSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1OrgSearchKey" - }, - "method": { - "$ref": "#/definitions/v1OrgSearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1OrgSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "sorting_column": { - "$ref": "#/definitions/v1OrgSearchKey" - }, - "asc": { - "type": "boolean", - "format": "boolean" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OrgSearchQuery" - } - } - } - }, - "v1OrgSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Org" - } - } - } - }, - "v1OrgSetUpRequest": { - "type": "object", - "properties": { - "org": { - "$ref": "#/definitions/v1CreateOrgRequest" - }, - "user": { - "$ref": "#/definitions/v1RegisterUserRequest" - } - } - }, - "v1OrgSetUpResponse": { - "type": "object", - "properties": { - "org": { - "$ref": "#/definitions/v1Org" - }, - "user": { - "$ref": "#/definitions/v1User" - } - } - }, - "v1OrgState": { - "type": "string", - "enum": [ - "ORGSTATE_UNSPECIFIED", - "ORGSTATE_ACTIVE", - "ORGSTATE_INACTIVE" - ], - "default": "ORGSTATE_UNSPECIFIED" - }, - "v1RegisterUserRequest": { - "type": "object", - "properties": { - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "password": { - "type": "string" - }, - "org_id": { - "type": "string" - } - } - }, - "v1UniqueOrgResponse": { - "type": "object", - "properties": { - "is_unique": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1User": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1UserState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "user_name": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "email": { - "type": "string" - }, - "isEmailVerified": { - "type": "boolean", - "format": "boolean" - }, - "phone": { - "type": "string" - }, - "isPhoneVerified": { - "type": "boolean", - "format": "boolean" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - } - } - }, - "v1UserState": { - "type": "string", - "enum": [ - "USERSTATE_UNSPECIFIED", - "USERSTATE_ACTIVE", - "USERSTATE_INACTIVE", - "USERSTATE_DELETED", - "USERSTATE_LOCKED", - "USERSTATE_SUSPEND", - "USERSTATE_INITIAL" - ], - "default": "USERSTATE_UNSPECIFIED" - } - } -} diff --git a/pkg/admin/api/grpc/generate.go b/pkg/admin/api/grpc/generate.go index 2f4abaaf24..cfbffbf3b5 100644 --- a/pkg/admin/api/grpc/generate.go +++ b/pkg/admin/api/grpc/generate.go @@ -1,6 +1,6 @@ package grpc -//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:${GOPATH}/src --grpc-gateway_out=logtostderr=true:${GOPATH}/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto -//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/zitadel/admin/api/grpc AdminServiceClient +//go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I$GOPATH/src/github.com/envoyproxy/protoc-gen-validate -I$GOPATH/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/admin.proto +//go:generate mockgen -package api -destination ./mock/admin.proto.mock.go github.com/caos/zitadel/pkg/admin/api/grpc AdminServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go deleted file mode 100644 index 237c445508..0000000000 --- a/pkg/admin/api/grpc/mock/admin.proto.mock.go +++ /dev/null @@ -1,178 +0,0 @@ -// Code generated by MockGen. DO NOT EDIT. -// Source: github.com/caos/zitadel/admin/api/grpc (interfaces: AdminServiceClient) - -// Package api is a generated GoMock package. -package api - -import ( - context "context" - grpc "github.com/caos/zitadel/admin/api/grpc" - gomock "github.com/golang/mock/gomock" - empty "github.com/golang/protobuf/ptypes/empty" - struct0 "github.com/golang/protobuf/ptypes/struct" - grpc0 "google.golang.org/grpc" - reflect "reflect" -) - -// MockAdminServiceClient is a mock of AdminServiceClient interface -type MockAdminServiceClient struct { - ctrl *gomock.Controller - recorder *MockAdminServiceClientMockRecorder -} - -// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient -type MockAdminServiceClientMockRecorder struct { - mock *MockAdminServiceClient -} - -// NewMockAdminServiceClient creates a new mock instance -func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient { - mock := &MockAdminServiceClient{ctrl: ctrl} - mock.recorder = &MockAdminServiceClientMockRecorder{mock} - return mock -} - -// EXPECT returns an object that allows the caller to indicate expected use -func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder { - return m.recorder -} - -// GetOrgByID mocks base method -func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetOrgByID", varargs...) - ret0, _ := ret[0].(*grpc.Org) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetOrgByID indicates an expected call of GetOrgByID -func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...) -} - -// Healthz mocks base method -func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Healthz", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Healthz indicates an expected call of Healthz -func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...) -} - -// IsOrgUnique mocks base method -func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "IsOrgUnique", varargs...) - ret0, _ := ret[0].(*grpc.UniqueOrgResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// IsOrgUnique indicates an expected call of IsOrgUnique -func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...) -} - -// Ready mocks base method -func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Ready", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Ready indicates an expected call of Ready -func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...) -} - -// SearchOrgs mocks base method -func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchOrgs", varargs...) - ret0, _ := ret[0].(*grpc.OrgSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchOrgs indicates an expected call of SearchOrgs -func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...) -} - -// SetUpOrg mocks base method -func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SetUpOrg", varargs...) - ret0, _ := ret[0].(*grpc.OrgSetUpResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SetUpOrg indicates an expected call of SetUpOrg -func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...) -} - -// Validate mocks base method -func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Validate", varargs...) - ret0, _ := ret[0].(*struct0.Struct) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Validate indicates an expected call of Validate -func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...) -} diff --git a/pkg/auth/api/grpc/generate.go b/pkg/auth/api/grpc/generate.go index 58fbc3f56c..fa48cd13ab 100644 --- a/pkg/auth/api/grpc/generate.go +++ b/pkg/auth/api/grpc/generate.go @@ -1,5 +1,5 @@ package grpc //go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/auth.proto -//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/zitadel/auth/api/grpc AuthServiceClient +//go:generate mockgen -package api -destination ./mock/auth.proto.mock.go github.com/caos/zitadel/pkg/auth/api/grpc AuthServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go deleted file mode 100644 index f00feb2850..0000000000 --- a/pkg/management/api/grpc/management.pb.authoptions.go +++ /dev/null @@ -1,521 +0,0 @@ -// Code generated by protoc-gen-authmethod. DO NOT EDIT. - -package grpc - -import ( - "google.golang.org/grpc" - - utils_auth "github.com/caos/zitadel/internal/auth" - utils_grpc "github.com/caos/zitadel/internal/grpc" -) - -/** - * ManagementService - */ - -var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{ - - "/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{ - Permission: "user.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{ - Permission: "project.app.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{ - Permission: "org.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{ - Permission: "project.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{ - Permission: "user.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{ - Permission: "user.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{ - Permission: "policy.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{ - Permission: "policy.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{ - Permission: "policy.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{ - Permission: "policy.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{ - Permission: "policy.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{ - Permission: "policy.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{ - Permission: "policy.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{ - Permission: "org.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{ - Permission: "org.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{ - Permission: "org.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{ - Permission: "org.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{ - Permission: "org.member.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{ - Permission: "org.member.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{ - Permission: "org.member.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{ - Permission: "org.member.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{ - Permission: "org.member.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{ - Permission: "project.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{ - Permission: "project.read", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{ - Permission: "project.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{ - Permission: "project.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{ - Permission: "project.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{ - Permission: "project.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{ - Permission: "project.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{ - Permission: "project.member.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{ - Permission: "project.member.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{ - Permission: "project.member.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{ - Permission: "project.member.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{ - Permission: "project.member.delete", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{ - Permission: "project.role.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{ - Permission: "project.role.write", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{ - Permission: "project.role.delete", - CheckParam: "Id", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{ - Permission: "project.app.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{ - Permission: "project.app.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{ - Permission: "project.app.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{ - Permission: "project.grant.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{ - Permission: "project.grant.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{ - Permission: "project.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{ - Permission: "project.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{ - Permission: "project.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{ - Permission: "project.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{ - Permission: "project.grant.member.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{ - Permission: "project.grant.member.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{ - Permission: "project.grant.member.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{ - Permission: "project.grant.member.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{ - Permission: "project.grant.member.delete", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{ - Permission: "user.grant.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{ - Permission: "user.grant.read", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{ - Permission: "user.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{ - Permission: "user.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{ - Permission: "user.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{ - Permission: "user.grant.write", - CheckParam: "", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{ - Permission: "project.user.grant.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{ - Permission: "project.user.grant.read", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{ - Permission: "project.user.grant.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{ - Permission: "project.user.grant.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{ - Permission: "project.user.grant.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{ - Permission: "project.user.grant.write", - CheckParam: "ProjectId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.read", - CheckParam: "ProjectGrantId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.read", - CheckParam: "ProjectGrantId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.write", - CheckParam: "ProjectGrantId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.write", - CheckParam: "ProjectGrantId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.write", - CheckParam: "ProjectGrantId", - }, - - "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{ - Permission: "project.grant.user.grant.write", - CheckParam: "ProjectGrantId", - }, -} - -func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) -} diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json deleted file mode 100644 index 57adde4771..0000000000 --- a/pkg/management/api/grpc/management.swagger.json +++ /dev/null @@ -1,5657 +0,0 @@ -{ - "swagger": "2.0", - "info": { - "title": "Management API", - "version": "0.1", - "contact": { - "url": "https://github.com/caos/zitadel/management" - } - }, - "schemes": [ - "https" - ], - "consumes": [ - "application/json", - "application/grpc" - ], - "produces": [ - "application/json", - "application/grpc" - ], - "paths": { - "/applications/{id}/changes": { - "get": { - "operationId": "ApplicationChanges", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Changes" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "limit", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - }, - { - "name": "sequence_offset", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/authgrants/_search": { - "post": { - "summary": "Grant", - "operationId": "SearchAuthGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthGrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1AuthGrantSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/global/orgs/domain/{domain}": { - "get": { - "operationId": "GetOrgByDomainGlobal", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Org" - } - } - }, - "parameters": [ - { - "name": "domain", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/global/users/email/{email}": { - "get": { - "operationId": "GetUserByEmailGlobal", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "email", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/grants/{id}": { - "get": { - "summary": "GRANTED_PROJECT_GRANTS", - "operationId": "GetGrantedProjectGrantByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/healthz": { - "get": { - "summary": "READINESS", - "operationId": "Healthz", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/members/roles": { - "get": { - "summary": "ORG_MEMBERS", - "operationId": "GetOrgMemberRoles", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1OrgMemberRoles" - } - } - }, - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{id}": { - "get": { - "summary": "ORG", - "operationId": "GetOrgByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Org" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{id}/_deactivate": { - "put": { - "operationId": "DeactivateOrg", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Org" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OrgID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{id}/_reactivate": { - "put": { - "operationId": "ReactivateOrg", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Org" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OrgID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{id}/changes": { - "get": { - "operationId": "OrgChanges", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Changes" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "limit", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - }, - { - "name": "sequence_offset", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{org_id}/members": { - "post": { - "operationId": "AddOrgMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "org_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1AddOrgMemberRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{org_id}/members/_search": { - "post": { - "operationId": "SearchOrgMembers", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1OrgMemberSearchResponse" - } - } - }, - "parameters": [ - { - "name": "org_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OrgMemberSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/orgs/{org_id}/members/{user_id}": { - "delete": { - "operationId": "RemoveOrgMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "org_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "ChangeOrgMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "org_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ChangeOrgMemberRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/age": { - "get": { - "summary": "PASSWORD_AGE_POLICY", - "operationId": "GetPasswordAgePolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordAgePolicy" - } - } - }, - "tags": [ - "ManagementService" - ] - }, - "post": { - "operationId": "CreatePasswordAgePolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordAgePolicy" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordAgePolicyCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/age/{id}": { - "delete": { - "operationId": "DeletePasswordAgePolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdatePasswordAgePolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordAgePolicy" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordAgePolicyUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/complexity": { - "get": { - "summary": "PASSWORD_COMPLEXITY_POLICY", - "operationId": "GetPasswordComplexityPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordComplexityPolicy" - } - } - }, - "tags": [ - "ManagementService" - ] - }, - "post": { - "operationId": "CreatePasswordComplexityPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordComplexityPolicy" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordComplexityPolicyCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/complexity/{id}": { - "delete": { - "operationId": "DeletePasswordComplexityPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdatePasswordComplexityPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordComplexityPolicy" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordComplexityPolicyUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/lockout": { - "get": { - "summary": "PASSWORD_LOCKOUT_POLICY", - "operationId": "GetPasswordLockoutPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordLockoutPolicy" - } - } - }, - "tags": [ - "ManagementService" - ] - }, - "post": { - "operationId": "CreatePasswordLockoutPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordLockoutPolicy" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordLockoutPolicyCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/policies/passwords/lockout/{id}": { - "delete": { - "operationId": "DeletePasswordLockoutPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdatePasswordLockoutPolicy", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1PasswordLockoutPolicy" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordLockoutPolicyUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projectgrants/{project_grant_id}/users/grants/_search": { - "post": { - "summary": "PROJECT_GRANT_USER_GRANT", - "operationId": "SearchProjectGrantUserGrants", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUserGrantSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projectgrants/{project_grant_id}/users/{user_id}/grants": { - "post": { - "operationId": "CreateProjectGrantUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUserGrantCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}": { - "get": { - "operationId": "ProjectGrantUserGrantByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateProjectGrantUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUserGrantUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate": { - "put": { - "operationId": "DeactivateProjectGrantUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate": { - "put": { - "operationId": "ReactivateProjectGrantUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects": { - "post": { - "operationId": "CreateProject", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Project" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectCreateRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/_search": { - "post": { - "summary": "PROJECTS", - "operationId": "SearchProjects", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/grants/members/roles": { - "get": { - "summary": "PROJECT_GRANT_MEMBER", - "operationId": "GetProjectGrantMemberRoles", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrantMemberRoles" - } - } - }, - "tags": [ - "ManagementService" - ] - } - }, - "/projects/members/roles": { - "get": { - "summary": "PROJECT_MEMBERS", - "operationId": "GetProjectMemberRoles", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectMemberRoles" - } - } - }, - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}": { - "get": { - "operationId": "ProjectByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Project" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateProject", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Project" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectUpdateRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/_deactivate": { - "put": { - "operationId": "DeactivateProject", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Project" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/_reactivate": { - "put": { - "operationId": "ReactivateProject", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Project" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/changes": { - "get": { - "operationId": "ProjectChanges", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Changes" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "limit", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - }, - { - "name": "sequence_offset", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/members": { - "post": { - "operationId": "AddProjectMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectMemberAdd" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/members/{user_id}": { - "delete": { - "operationId": "RemoveProjectMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "ChangeProjectMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectMemberChange" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/roles": { - "post": { - "operationId": "AddProjectRole", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectRoleAdd" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{id}/roles/{name}": { - "delete": { - "operationId": "RemoveProjectRole", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "name", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/_search": { - "post": { - "summary": "APPLICATIONS", - "operationId": "SearchApplications", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ApplicationSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/{application_id}/oidcconfig": { - "put": { - "operationId": "UpdateApplicationOIDCConfig", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1OIDCConfig" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "application_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OIDCConfigUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/{id}": { - "get": { - "operationId": "ApplicationByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateApplication", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/{id}/_deactivate": { - "put": { - "operationId": "DeactivateApplication", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/{id}/_reactivate": { - "put": { - "operationId": "ReactivateApplication", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret": { - "put": { - "operationId": "RegenerateOIDCClientSecret", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ClientSecret" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants": { - "post": { - "operationId": "CreateProjectGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/_search": { - "post": { - "summary": "PROJECT_GRANT", - "operationId": "SearchProjectGrants", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{grant_id}/members": { - "post": { - "operationId": "AddProjectGrantMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantMemberAdd" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{grant_id}/members/_search": { - "post": { - "operationId": "SearchProjectGrantMembers", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrantMemberSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantMemberSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{grant_id}/members/{user_id}": { - "delete": { - "operationId": "RemoveProjectGrantMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "ChangeProjectGrantMember", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "grant_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantMemberChange" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{id}": { - "get": { - "operationId": "ProjectGrantByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateProjectGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{id}/_deactivate": { - "put": { - "operationId": "DeactivateProjectGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/grants/{id}/_reactivate": { - "put": { - "operationId": "ReactivateProjectGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/members/_search": { - "post": { - "operationId": "SearchProjectMembers", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectMemberSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectMemberSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/oidcapplications": { - "post": { - "operationId": "CreateOIDCApplication", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1OIDCApplicationCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/roles/_search": { - "post": { - "summary": "PROJECT_ROLES", - "operationId": "SearchProjectRoles", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ProjectRoleSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectRoleSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/users/grants/_search": { - "post": { - "summary": "PROJECT_USER_GRANT", - "operationId": "SearchProjectUserGrants", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectUserGrantSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/users/{user_id}/grants": { - "post": { - "operationId": "CreateProjectUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/users/{user_id}/grants/{id}": { - "get": { - "operationId": "ProjectUserGrantByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateProjectUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectUserGrantUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate": { - "put": { - "operationId": "DeactivateProjectUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectUserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate": { - "put": { - "operationId": "ReactivateProjectUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "project_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ProjectUserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/ready": { - "get": { - "operationId": "Ready", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "tags": [ - "ManagementService" - ] - } - }, - "/users": { - "post": { - "operationId": "CreateUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1CreateUserRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/_isunique": { - "get": { - "operationId": "IsUserUnique", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UniqueUserResponse" - } - } - }, - "parameters": [ - { - "name": "user_name", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "email", - "in": "query", - "required": false, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/_search": { - "post": { - "operationId": "SearchUsers", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/grants/_search": { - "post": { - "summary": "USER_GRANT", - "operationId": "SearchUserGrants", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantSearchRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}": { - "get": { - "summary": "USER", - "operationId": "GetUserByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "delete": { - "operationId": "DeleteUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_deactivate": { - "put": { - "operationId": "DeactivateUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_lock": { - "put": { - "operationId": "LockUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_reactivate": { - "put": { - "operationId": "ReactivateUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_sendsetpwnotify": { - "post": { - "summary": "PASSWORD\nSends an Notification (Email/SMS) with a password reset Link", - "operationId": "SendSetPasswordNotification", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1SetPasswordNotificationRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_setinitialpw": { - "post": { - "summary": "A Manager is only allowed to set an initial password, on the next login the user has to change his password", - "operationId": "SetInitialPassword", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1PasswordRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/_unlock": { - "put": { - "operationId": "UnlockUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/address": { - "get": { - "summary": "USER_ADDRESS", - "operationId": "GetUserAddress", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserAddress" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateUserAddress", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserAddress" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UpdateUserAddressRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/changes": { - "get": { - "operationId": "UserChanges", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Changes" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "limit", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - }, - { - "name": "sequence_offset", - "in": "query", - "required": false, - "type": "string", - "format": "uint64" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/email": { - "get": { - "summary": "USER_EMAIL", - "operationId": "GetUserEmail", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserEmail" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "ChangeUserEmail", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserEmail" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UpdateUserEmailRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/email/_resendverification": { - "post": { - "operationId": "ResendEmailVerificationMail", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/mfas": { - "get": { - "summary": "MFA", - "operationId": "GetUserMfas", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1MultiFactors" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/phone": { - "get": { - "summary": "USER_PHONE", - "operationId": "GetUserPhone", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserPhone" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "ChangeUserPhone", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserPhone" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UpdateUserPhoneRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/phone/_resendverification": { - "post": { - "operationId": "ResendPhoneVerificationCode", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{id}/profile": { - "get": { - "summary": "USER_PROFILE", - "operationId": "GetUserProfile", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserProfile" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateUserProfile", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserProfile" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UpdateUserProfileRequest" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{user_id}/grants": { - "post": { - "operationId": "CreateUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantCreate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{user_id}/grants/{id}": { - "get": { - "operationId": "UserGrantByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "ManagementService" - ] - }, - "put": { - "operationId": "UpdateUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantUpdate" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{user_id}/grants/{id}/_deactivate": { - "put": { - "operationId": "DeactivateUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/users/{user_id}/grants/{id}/_reactivate": { - "put": { - "operationId": "ReactivateUserGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserGrant" - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserGrantID" - } - } - ], - "tags": [ - "ManagementService" - ] - } - }, - "/validate": { - "get": { - "operationId": "Validate", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/protobufStruct" - } - } - }, - "tags": [ - "ManagementService" - ] - } - } - }, - "definitions": { - "protobufListValue": { - "type": "object", - "properties": { - "values": { - "type": "array", - "items": { - "$ref": "#/definitions/protobufValue" - }, - "description": "Repeated field of dynamically typed values." - } - }, - "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." - }, - "protobufNullValue": { - "type": "string", - "enum": [ - "NULL_VALUE" - ], - "default": "NULL_VALUE", - "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." - }, - "protobufStruct": { - "type": "object", - "properties": { - "fields": { - "type": "object", - "additionalProperties": { - "$ref": "#/definitions/protobufValue" - }, - "description": "Unordered map of dynamically typed values." - } - }, - "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." - }, - "protobufValue": { - "type": "object", - "properties": { - "null_value": { - "$ref": "#/definitions/protobufNullValue", - "description": "Represents a null value." - }, - "number_value": { - "type": "number", - "format": "double", - "description": "Represents a double value." - }, - "string_value": { - "type": "string", - "description": "Represents a string value." - }, - "bool_value": { - "type": "boolean", - "format": "boolean", - "description": "Represents a boolean value." - }, - "struct_value": { - "$ref": "#/definitions/protobufStruct", - "description": "Represents a structured value." - }, - "list_value": { - "$ref": "#/definitions/protobufListValue", - "description": "Represents a repeated `Value`." - } - }, - "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." - }, - "v1AddOrgMemberRequest": { - "type": "object", - "properties": { - "org_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1AppState": { - "type": "string", - "enum": [ - "APPSTATE_UNSPECIFIED", - "APPSTATE_ACTIVE", - "APPSTATE_INACTIVE" - ], - "default": "APPSTATE_UNSPECIFIED" - }, - "v1Application": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1AppState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "name": { - "type": "string" - }, - "oidc_config": { - "$ref": "#/definitions/v1OIDCConfig" - } - } - }, - "v1ApplicationID": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "project_id": { - "type": "string" - } - } - }, - "v1ApplicationSearchKey": { - "type": "string", - "enum": [ - "APPLICATIONSERACHKEY_UNSPECIFIED", - "APPLICATIONSEARCHKEY_APP_NAME" - ], - "default": "APPLICATIONSERACHKEY_UNSPECIFIED" - }, - "v1ApplicationSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ApplicationSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ApplicationSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ApplicationSearchQuery" - } - } - } - }, - "v1ApplicationSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Application" - } - } - } - }, - "v1ApplicationUpdate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "name": { - "type": "string" - } - } - }, - "v1AuthGrant": { - "type": "object", - "properties": { - "orgId": { - "type": "string" - }, - "projectId": { - "type": "string" - }, - "userId": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1AuthGrantSearchKey": { - "type": "string", - "enum": [ - "AUTHGRANTSEARCHKEY_UNSPECIFIED", - "AUTHGRANTSEARCHKEY_ORG_ID", - "AUTHGRANTSEARCHKEY_PROJECT_ID", - "AUTHGRANTSEARCHKEY_USER_ID" - ], - "default": "AUTHGRANTSEARCHKEY_UNSPECIFIED" - }, - "v1AuthGrantSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1AuthGrantSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1AuthGrantSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "sorting_column": { - "$ref": "#/definitions/v1AuthGrantSearchKey" - }, - "asc": { - "type": "boolean", - "format": "boolean" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1AuthGrantSearchQuery" - } - } - } - }, - "v1AuthGrantSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1AuthGrant" - } - } - } - }, - "v1Change": { - "type": "object", - "properties": { - "change_date": { - "type": "string", - "format": "date-time" - }, - "event_type": { - "type": "string" - }, - "sequence": { - "type": "string", - "format": "uint64" - }, - "modifier": { - "type": "string" - }, - "data": { - "$ref": "#/definitions/protobufStruct" - } - } - }, - "v1ChangeOrgMemberRequest": { - "type": "object", - "properties": { - "org_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1Changes": { - "type": "object", - "properties": { - "changes": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Change" - } - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - } - } - }, - "v1ClientSecret": { - "type": "object", - "properties": { - "client_secret": { - "type": "string" - } - } - }, - "v1CreateUserRequest": { - "type": "object", - "properties": { - "user_name": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "email": { - "type": "string" - }, - "is_email_verified": { - "type": "boolean", - "format": "boolean" - }, - "phone": { - "type": "string" - }, - "is_phone_verified": { - "type": "boolean", - "format": "boolean" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - }, - "password": { - "type": "string" - } - } - }, - "v1Gender": { - "type": "string", - "enum": [ - "GENDER_UNSPECIFIED", - "GENDER_FEMALE", - "GENDER_MALE", - "GENDER_DIVERSE" - ], - "default": "GENDER_UNSPECIFIED" - }, - "v1MFAState": { - "type": "string", - "enum": [ - "MFASTATE_UNSPECIFIED", - "MFASTATE_NOT_READY", - "MFASTATE_READY", - "MFASTATE_REMOVED" - ], - "default": "MFASTATE_UNSPECIFIED" - }, - "v1MfaType": { - "type": "string", - "enum": [ - "MFATYPE_UNSPECIFIED", - "MFATYPE_SMS", - "MFATYPE_OTP" - ], - "default": "MFATYPE_UNSPECIFIED" - }, - "v1MultiFactor": { - "type": "object", - "properties": { - "type": { - "$ref": "#/definitions/v1MfaType" - }, - "state": { - "$ref": "#/definitions/v1MFAState" - } - } - }, - "v1MultiFactors": { - "type": "object", - "properties": { - "mfas": { - "type": "array", - "items": { - "$ref": "#/definitions/v1MultiFactor" - } - } - } - }, - "v1NotificationType": { - "type": "string", - "enum": [ - "NOTIFICATIONTYPE_EMAIL", - "NOTIFICATIONTYPE_SMS" - ], - "default": "NOTIFICATIONTYPE_EMAIL" - }, - "v1OIDCApplicationCreate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "name": { - "type": "string" - }, - "redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - }, - "response_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCResponseType" - } - }, - "grant_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCGrantType" - } - }, - "application_type": { - "$ref": "#/definitions/v1OIDCApplicationType" - }, - "auth_method_type": { - "$ref": "#/definitions/v1OIDCAuthMethodType" - }, - "post_logout_redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1OIDCApplicationType": { - "type": "string", - "enum": [ - "OIDCAPPLICATIONTYPE_WEB", - "OIDCAPPLICATIONTYPE_USER_AGENT", - "OIDCAPPLICATIONTYPE_NATIVE" - ], - "default": "OIDCAPPLICATIONTYPE_WEB" - }, - "v1OIDCAuthMethodType": { - "type": "string", - "enum": [ - "OIDCAUTHMETHODTYPE_BASIC", - "OIDCAUTHMETHODTYPE_POST", - "OIDCAUTHMETHODTYPE_NONE" - ], - "default": "OIDCAUTHMETHODTYPE_BASIC" - }, - "v1OIDCConfig": { - "type": "object", - "properties": { - "redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - }, - "response_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCResponseType" - } - }, - "grant_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCGrantType" - } - }, - "application_type": { - "$ref": "#/definitions/v1OIDCApplicationType" - }, - "client_id": { - "type": "string" - }, - "client_secret": { - "type": "string" - }, - "auth_method_type": { - "$ref": "#/definitions/v1OIDCAuthMethodType" - }, - "post_logout_redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1OIDCConfigUpdate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "application_id": { - "type": "string" - }, - "redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - }, - "response_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCResponseType" - } - }, - "grant_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCGrantType" - } - }, - "application_type": { - "$ref": "#/definitions/v1OIDCApplicationType" - }, - "auth_method_type": { - "$ref": "#/definitions/v1OIDCAuthMethodType" - }, - "post_logout_redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1OIDCGrantType": { - "type": "string", - "enum": [ - "OIDCGRANTTYPE_AUTHORIZATION_CODE", - "OIDCGRANTTYPE_IMPLICIT", - "OIDCGRANTTYPE_REFRESH_TOKEN" - ], - "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" - }, - "v1OIDCResponseType": { - "type": "string", - "enum": [ - "OIDCRESPONSETYPE_CODE", - "OIDCRESPONSETYPE_ID_TOKEN", - "OIDCRESPONSETYPE_TOKEN_ID_TOKEN" - ], - "default": "OIDCRESPONSETYPE_CODE" - }, - "v1Org": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1OrgState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "name": { - "type": "string" - }, - "domain": { - "type": "string" - } - } - }, - "v1OrgID": { - "type": "object", - "properties": { - "id": { - "type": "string" - } - } - }, - "v1OrgMember": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "user_name": { - "type": "string" - }, - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "creation_date": { - "type": "string", - "format": "date-time" - } - } - }, - "v1OrgMemberRoles": { - "type": "object", - "properties": { - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1OrgMemberSearchKey": { - "type": "string", - "enum": [ - "ORGMEMBERSEARCHKEY_UNSPECIFIED", - "ORGMEMBERSEARCHKEY_FIRST_NAME", - "ORGMEMBERSEARCHKEY_LAST_NAME", - "ORGMEMBERSEARCHKEY_EMAIL", - "ORGMEMBERSEARCHKEY_USER_ID" - ], - "default": "ORGMEMBERSEARCHKEY_UNSPECIFIED" - }, - "v1OrgMemberSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1OrgMemberSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1OrgMemberSearchRequest": { - "type": "object", - "properties": { - "org_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OrgMemberSearchQuery" - } - } - } - }, - "v1OrgMemberSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OrgMember" - } - } - } - }, - "v1OrgState": { - "type": "string", - "enum": [ - "ORGSTATE_UNSPECIFIED", - "ORGSTATE_ACTIVE", - "ORGSTATE_INACTIVE" - ], - "default": "ORGSTATE_UNSPECIFIED" - }, - "v1PasswordAgePolicy": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1PolicyState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "max_age_days": { - "type": "string", - "format": "uint64" - }, - "expire_warn_days": { - "type": "string", - "format": "uint64" - } - } - }, - "v1PasswordAgePolicyCreate": { - "type": "object", - "properties": { - "description": { - "type": "string" - }, - "max_age_days": { - "type": "string", - "format": "uint64" - }, - "expire_warn_days": { - "type": "string", - "format": "uint64" - } - } - }, - "v1PasswordAgePolicyUpdate": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "max_age_days": { - "type": "string", - "format": "uint64" - }, - "expire_warn_days": { - "type": "string", - "format": "uint64" - } - } - }, - "v1PasswordComplexityPolicy": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1PolicyState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "min_length": { - "type": "string", - "format": "uint64" - }, - "has_lowercase": { - "type": "boolean", - "format": "boolean" - }, - "has_uppercase": { - "type": "boolean", - "format": "boolean" - }, - "has_number": { - "type": "boolean", - "format": "boolean" - }, - "has_symbol": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordComplexityPolicyCreate": { - "type": "object", - "properties": { - "description": { - "type": "string" - }, - "min_length": { - "type": "string", - "format": "uint64" - }, - "has_lowercase": { - "type": "boolean", - "format": "boolean" - }, - "has_uppercase": { - "type": "boolean", - "format": "boolean" - }, - "has_number": { - "type": "boolean", - "format": "boolean" - }, - "has_symbol": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordComplexityPolicyUpdate": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "min_length": { - "type": "string", - "format": "uint64" - }, - "has_lowercase": { - "type": "boolean", - "format": "boolean" - }, - "has_uppercase": { - "type": "boolean", - "format": "boolean" - }, - "has_number": { - "type": "boolean", - "format": "boolean" - }, - "has_symbol": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordLockoutPolicy": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1PolicyState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "max_attempts": { - "type": "string", - "format": "uint64" - }, - "show_lock_out_failures": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordLockoutPolicyCreate": { - "type": "object", - "properties": { - "description": { - "type": "string" - }, - "max_attempts": { - "type": "string", - "format": "uint64" - }, - "show_lock_out_failures": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordLockoutPolicyUpdate": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "description": { - "type": "string" - }, - "max_attempts": { - "type": "string", - "format": "uint64" - }, - "show_lock_out_failures": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1PasswordRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "password": { - "type": "string" - } - } - }, - "v1PolicyState": { - "type": "string", - "enum": [ - "POLICYSTATE_UNSPECIFIED", - "POLICYSTATE_ACTIVE", - "POLICYSTATE_INACTIVE", - "POLICYSTATE_DELETED" - ], - "default": "POLICYSTATE_UNSPECIFIED" - }, - "v1Project": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "name": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1ProjectState" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "type": { - "$ref": "#/definitions/v1ProjectType" - }, - "resource_owner": { - "type": "string" - }, - "org_id": { - "type": "string" - }, - "org_name": { - "type": "string" - }, - "org_domain": { - "type": "string" - }, - "grant_id": { - "type": "string" - } - } - }, - "v1ProjectCreateRequest": { - "type": "object", - "properties": { - "name": { - "type": "string" - } - } - }, - "v1ProjectGrant": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "project_id": { - "type": "string" - }, - "granted_org_id": { - "type": "string" - }, - "granted_org_name": { - "type": "string" - }, - "granted_org_domain": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - }, - "state": { - "$ref": "#/definitions/v1ProjectGrantState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "project_name": { - "type": "string" - } - } - }, - "v1ProjectGrantCreate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "granted_org_id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantID": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "id": { - "type": "string" - } - } - }, - "v1ProjectGrantMember": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "user_name": { - "type": "string" - }, - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "creation_date": { - "type": "string", - "format": "date-time" - } - } - }, - "v1ProjectGrantMemberAdd": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "grant_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantMemberChange": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "grant_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantMemberRoles": { - "type": "object", - "properties": { - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantMemberSearchKey": { - "type": "string", - "enum": [ - "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", - "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", - "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", - "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", - "PROJECTGRANTMEMBERSEARCHKEY_USER_ID" - ], - "default": "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED" - }, - "v1ProjectGrantMemberSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ProjectGrantMemberSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ProjectGrantMemberSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "grant_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectGrantMemberSearchQuery" - } - } - } - }, - "v1ProjectGrantMemberSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectGrantMember" - } - } - } - }, - "v1ProjectGrantSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - } - } - }, - "v1ProjectGrantSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectGrant" - } - } - } - }, - "v1ProjectGrantState": { - "type": "string", - "enum": [ - "PROJECTGRANTSTATE_UNSPECIFIED", - "PROJECTGRANTSTATE_ACTIVE", - "PROJECTGRANTSTATE_INACTIVE" - ], - "default": "PROJECTGRANTSTATE_UNSPECIFIED" - }, - "v1ProjectGrantUpdate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantUserGrantCreate": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "org_id": { - "type": "string" - }, - "project_grant_id": { - "type": "string" - }, - "project_id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectGrantUserGrantID": { - "type": "object", - "properties": { - "project_grant_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - } - } - }, - "v1ProjectGrantUserGrantSearchRequest": { - "type": "object", - "properties": { - "project_grant_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserGrantSearchQuery" - } - } - } - }, - "v1ProjectGrantUserGrantUpdate": { - "type": "object", - "properties": { - "project_grant_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectID": { - "type": "object", - "properties": { - "id": { - "type": "string" - } - } - }, - "v1ProjectMember": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "user_name": { - "type": "string" - }, - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "creation_date": { - "type": "string", - "format": "date-time" - } - } - }, - "v1ProjectMemberAdd": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectMemberChange": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectMemberRoles": { - "type": "object", - "properties": { - "roles": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1ProjectMemberSearchKey": { - "type": "string", - "enum": [ - "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", - "PROJECTMEMBERSEARCHKEY_FIRST_NAME", - "PROJECTMEMBERSEARCHKEY_LAST_NAME", - "PROJECTMEMBERSEARCHKEY_EMAIL", - "PROJECTMEMBERSEARCHKEY_USER_ID" - ], - "default": "PROJECTMEMBERSEARCHKEY_UNSPECIFIED" - }, - "v1ProjectMemberSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ProjectMemberSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ProjectMemberSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectMemberSearchQuery" - } - } - } - }, - "v1ProjectMemberSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectMember" - } - } - } - }, - "v1ProjectRole": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "group": { - "type": "string" - } - } - }, - "v1ProjectRoleAdd": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "group": { - "type": "string" - } - } - }, - "v1ProjectRoleSearchKey": { - "type": "string", - "enum": [ - "PROJECTROLESEARCHKEY_UNSPECIFIED", - "PROJECTROLESEARCHKEY_NAME", - "PROJECTROLESEARCHKEY_DISPLAY_NAME" - ], - "default": "PROJECTROLESEARCHKEY_UNSPECIFIED" - }, - "v1ProjectRoleSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ProjectRoleSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ProjectRoleSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectRoleSearchQuery" - } - } - } - }, - "v1ProjectRoleSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectRole" - } - } - } - }, - "v1ProjectSearchKey": { - "type": "string", - "enum": [ - "PROJECTSEARCHKEY_UNSPECIFIED", - "PROJECTSEARCHKEY_PROJECT_NAME" - ], - "default": "PROJECTSEARCHKEY_UNSPECIFIED" - }, - "v1ProjectSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ProjectSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ProjectSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ProjectSearchQuery" - } - } - } - }, - "v1ProjectSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Project" - } - } - } - }, - "v1ProjectState": { - "type": "string", - "enum": [ - "PROJECTSTATE_UNSPECIFIED", - "PROJECTSTATE_ACTIVE", - "PROJECTSSTATE_INACTIVE" - ], - "default": "PROJECTSTATE_UNSPECIFIED" - }, - "v1ProjectType": { - "type": "string", - "enum": [ - "PROJECTTYPE_UNKNOWN", - "PROJECTTYPE_SELF", - "PROJECTTYPE_GRANTED" - ], - "default": "PROJECTTYPE_UNKNOWN" - }, - "v1ProjectUpdateRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "name": { - "type": "string" - } - } - }, - "v1ProjectUserGrantID": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - } - } - }, - "v1ProjectUserGrantSearchRequest": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserGrantSearchQuery" - } - } - } - }, - "v1ProjectUserGrantUpdate": { - "type": "object", - "properties": { - "project_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1SearchMethod": { - "type": "string", - "enum": [ - "SEARCHMETHOD_EQUALS", - "SEARCHMETHOD_STARTS_WITH", - "SEARCHMETHOD_CONTAINS" - ], - "default": "SEARCHMETHOD_EQUALS" - }, - "v1SetPasswordNotificationRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "type": { - "$ref": "#/definitions/v1NotificationType" - } - } - }, - "v1UniqueUserResponse": { - "type": "object", - "properties": { - "is_unique": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1UpdateUserAddressRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - } - } - }, - "v1UpdateUserEmailRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "email": { - "type": "string" - }, - "is_email_verified": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1UpdateUserPhoneRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "phone": { - "type": "string" - }, - "is_phone_verified": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1UpdateUserProfileRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - } - } - }, - "v1User": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1UserState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "last_login": { - "type": "string", - "format": "date-time" - }, - "password_changed": { - "type": "string", - "format": "date-time" - }, - "user_name": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "email": { - "type": "string" - }, - "is_email_verified": { - "type": "boolean", - "format": "boolean" - }, - "phone": { - "type": "string" - }, - "is_phone_verified": { - "type": "boolean", - "format": "boolean" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - } - } - }, - "v1UserAddress": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - } - } - }, - "v1UserEmail": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "email": { - "type": "string" - }, - "is_email_verified": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1UserGrant": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "org_id": { - "type": "string" - }, - "project_id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - }, - "state": { - "$ref": "#/definitions/v1UserGrantState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "user_name": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "email": { - "type": "string" - }, - "org_name": { - "type": "string" - }, - "org_domain": { - "type": "string" - }, - "project_name": { - "type": "string" - } - } - }, - "v1UserGrantCreate": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "org_id": { - "type": "string" - }, - "project_id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1UserGrantID": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - } - } - }, - "v1UserGrantSearchKey": { - "type": "string", - "enum": [ - "USERGRANTSEARCHKEY_UNSPECIFIED", - "USERGRANTSEARCHKEY_PROJECT_ID", - "USERGRANTSEARCHKEY_USER_ID", - "USERGRANTSEARCHKEY_ORG_ID" - ], - "default": "USERGRANTSEARCHKEY_UNSPECIFIED" - }, - "v1UserGrantSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1UserGrantSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1UserGrantSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserGrantSearchQuery" - } - } - } - }, - "v1UserGrantSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserGrant" - } - } - } - }, - "v1UserGrantState": { - "type": "string", - "enum": [ - "USERGRANTSTATE_UNSPECIFIED", - "USERGRANTSTATE_ACTIVE", - "USERGRANTSTATE_INACTIVE" - ], - "default": "USERGRANTSTATE_UNSPECIFIED" - }, - "v1UserGrantUpdate": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "role_names": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1UserID": { - "type": "object", - "properties": { - "id": { - "type": "string" - } - } - }, - "v1UserPhone": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "phone": { - "type": "string" - }, - "is_phone_verified": { - "type": "boolean", - "format": "boolean" - } - } - }, - "v1UserProfile": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1UserState" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "user_name": { - "type": "string" - } - } - }, - "v1UserSearchKey": { - "type": "string", - "enum": [ - "USERSEARCHKEY_UNSPECIFIED", - "USERSEARCHKEY_USER_NAME", - "USERSEARCHKEY_FIRST_NAME", - "USERSEARCHKEY_LAST_NAME", - "USERSEARCHKEY_NICK_NAME", - "USERSEARCHKEY_DISPLAY_NAME", - "USERSEARCHKEY_EMAIL", - "USERSEARCHKEY_STATE" - ], - "default": "USERSEARCHKEY_UNSPECIFIED" - }, - "v1UserSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1UserSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1UserSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "sorting_column": { - "$ref": "#/definitions/v1UserSearchKey" - }, - "asc": { - "type": "boolean", - "format": "boolean" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserSearchQuery" - } - } - } - }, - "v1UserSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1User" - } - } - } - }, - "v1UserState": { - "type": "string", - "enum": [ - "USERSTATE_UNSPECIFIED", - "USERSTATE_ACTIVE", - "USERSTATE_INACTIVE", - "USERSTATE_DELETED", - "USERSTATE_LOCKED", - "USERSTATE_SUSPEND", - "USERSTATE_INITIAL" - ], - "default": "USERSTATE_UNSPECIFIED" - } - } -} diff --git a/pkg/management/api/grpc/mock/management.proto.mock.go b/pkg/management/api/grpc/mock/management.proto.mock.go deleted file mode 100644 index f5352b36ce..0000000000 --- a/pkg/management/api/grpc/mock/management.proto.mock.go +++ /dev/null @@ -1,2118 +0,0 @@ -// Code generated by MockGen. DO NOT EDIT. -// Source: github.com/caos/zitadel/management/api/grpc (interfaces: ManagementServiceClient) - -// Package api is a generated GoMock package. -package api - -import ( - context "context" - grpc "github.com/caos/zitadel/management/api/grpc" - gomock "github.com/golang/mock/gomock" - empty "github.com/golang/protobuf/ptypes/empty" - struct0 "github.com/golang/protobuf/ptypes/struct" - grpc0 "google.golang.org/grpc" - reflect "reflect" -) - -// MockManagementServiceClient is a mock of ManagementServiceClient interface -type MockManagementServiceClient struct { - ctrl *gomock.Controller - recorder *MockManagementServiceClientMockRecorder -} - -// MockManagementServiceClientMockRecorder is the mock recorder for MockManagementServiceClient -type MockManagementServiceClientMockRecorder struct { - mock *MockManagementServiceClient -} - -// NewMockManagementServiceClient creates a new mock instance -func NewMockManagementServiceClient(ctrl *gomock.Controller) *MockManagementServiceClient { - mock := &MockManagementServiceClient{ctrl: ctrl} - mock.recorder = &MockManagementServiceClientMockRecorder{mock} - return mock -} - -// EXPECT returns an object that allows the caller to indicate expected use -func (m *MockManagementServiceClient) EXPECT() *MockManagementServiceClientMockRecorder { - return m.recorder -} - -// AddOrgMember mocks base method -func (m *MockManagementServiceClient) AddOrgMember(arg0 context.Context, arg1 *grpc.AddOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "AddOrgMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// AddOrgMember indicates an expected call of AddOrgMember -func (mr *MockManagementServiceClientMockRecorder) AddOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddOrgMember), varargs...) -} - -// AddProjectGrantMember mocks base method -func (m *MockManagementServiceClient) AddProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "AddProjectGrantMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// AddProjectGrantMember indicates an expected call of AddProjectGrantMember -func (mr *MockManagementServiceClientMockRecorder) AddProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectGrantMember), varargs...) -} - -// AddProjectMember mocks base method -func (m *MockManagementServiceClient) AddProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "AddProjectMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// AddProjectMember indicates an expected call of AddProjectMember -func (mr *MockManagementServiceClientMockRecorder) AddProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectMember), varargs...) -} - -// AddProjectRole mocks base method -func (m *MockManagementServiceClient) AddProjectRole(arg0 context.Context, arg1 *grpc.ProjectRoleAdd, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "AddProjectRole", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// AddProjectRole indicates an expected call of AddProjectRole -func (mr *MockManagementServiceClientMockRecorder) AddProjectRole(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddProjectRole", reflect.TypeOf((*MockManagementServiceClient)(nil).AddProjectRole), varargs...) -} - -// ApplicationByID mocks base method -func (m *MockManagementServiceClient) ApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ApplicationByID", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ApplicationByID indicates an expected call of ApplicationByID -func (mr *MockManagementServiceClientMockRecorder) ApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplicationByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ApplicationByID), varargs...) -} - -// ApplicationChanges mocks base method -func (m *MockManagementServiceClient) ApplicationChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ApplicationChanges", varargs...) - ret0, _ := ret[0].(*grpc.Changes) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ApplicationChanges indicates an expected call of ApplicationChanges -func (mr *MockManagementServiceClientMockRecorder) ApplicationChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplicationChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).ApplicationChanges), varargs...) -} - -// ChangeOrgMember mocks base method -func (m *MockManagementServiceClient) ChangeOrgMember(arg0 context.Context, arg1 *grpc.ChangeOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ChangeOrgMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ChangeOrgMember indicates an expected call of ChangeOrgMember -func (mr *MockManagementServiceClientMockRecorder) ChangeOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeOrgMember), varargs...) -} - -// ChangeProjectGrantMember mocks base method -func (m *MockManagementServiceClient) ChangeProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ChangeProjectGrantMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ChangeProjectGrantMember indicates an expected call of ChangeProjectGrantMember -func (mr *MockManagementServiceClientMockRecorder) ChangeProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeProjectGrantMember), varargs...) -} - -// ChangeProjectMember mocks base method -func (m *MockManagementServiceClient) ChangeProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ChangeProjectMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ChangeProjectMember indicates an expected call of ChangeProjectMember -func (mr *MockManagementServiceClientMockRecorder) ChangeProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeProjectMember), varargs...) -} - -// ChangeUserEmail mocks base method -func (m *MockManagementServiceClient) ChangeUserEmail(arg0 context.Context, arg1 *grpc.UpdateUserEmailRequest, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ChangeUserEmail", varargs...) - ret0, _ := ret[0].(*grpc.UserEmail) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ChangeUserEmail indicates an expected call of ChangeUserEmail -func (mr *MockManagementServiceClientMockRecorder) ChangeUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeUserEmail", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeUserEmail), varargs...) -} - -// ChangeUserPhone mocks base method -func (m *MockManagementServiceClient) ChangeUserPhone(arg0 context.Context, arg1 *grpc.UpdateUserPhoneRequest, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ChangeUserPhone", varargs...) - ret0, _ := ret[0].(*grpc.UserPhone) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ChangeUserPhone indicates an expected call of ChangeUserPhone -func (mr *MockManagementServiceClientMockRecorder) ChangeUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeUserPhone", reflect.TypeOf((*MockManagementServiceClient)(nil).ChangeUserPhone), varargs...) -} - -// CreateOIDCApplication mocks base method -func (m *MockManagementServiceClient) CreateOIDCApplication(arg0 context.Context, arg1 *grpc.OIDCApplicationCreate, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateOIDCApplication", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateOIDCApplication indicates an expected call of CreateOIDCApplication -func (mr *MockManagementServiceClientMockRecorder) CreateOIDCApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateOIDCApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateOIDCApplication), varargs...) -} - -// CreatePasswordAgePolicy mocks base method -func (m *MockManagementServiceClient) CreatePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreatePasswordAgePolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordAgePolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreatePasswordAgePolicy indicates an expected call of CreatePasswordAgePolicy -func (mr *MockManagementServiceClientMockRecorder) CreatePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordAgePolicy), varargs...) -} - -// CreatePasswordComplexityPolicy mocks base method -func (m *MockManagementServiceClient) CreatePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreatePasswordComplexityPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreatePasswordComplexityPolicy indicates an expected call of CreatePasswordComplexityPolicy -func (mr *MockManagementServiceClientMockRecorder) CreatePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordComplexityPolicy), varargs...) -} - -// CreatePasswordLockoutPolicy mocks base method -func (m *MockManagementServiceClient) CreatePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyCreate, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreatePasswordLockoutPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreatePasswordLockoutPolicy indicates an expected call of CreatePasswordLockoutPolicy -func (mr *MockManagementServiceClientMockRecorder) CreatePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).CreatePasswordLockoutPolicy), varargs...) -} - -// CreateProject mocks base method -func (m *MockManagementServiceClient) CreateProject(arg0 context.Context, arg1 *grpc.ProjectCreateRequest, arg2 ...grpc0.CallOption) (*grpc.Project, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateProject", varargs...) - ret0, _ := ret[0].(*grpc.Project) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateProject indicates an expected call of CreateProject -func (mr *MockManagementServiceClientMockRecorder) CreateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProject), varargs...) -} - -// CreateProjectGrant mocks base method -func (m *MockManagementServiceClient) CreateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantCreate, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateProjectGrant", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateProjectGrant indicates an expected call of CreateProjectGrant -func (mr *MockManagementServiceClientMockRecorder) CreateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectGrant), varargs...) -} - -// CreateProjectGrantUserGrant mocks base method -func (m *MockManagementServiceClient) CreateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateProjectGrantUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateProjectGrantUserGrant indicates an expected call of CreateProjectGrantUserGrant -func (mr *MockManagementServiceClientMockRecorder) CreateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectGrantUserGrant), varargs...) -} - -// CreateProjectUserGrant mocks base method -func (m *MockManagementServiceClient) CreateProjectUserGrant(arg0 context.Context, arg1 *grpc.UserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateProjectUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateProjectUserGrant indicates an expected call of CreateProjectUserGrant -func (mr *MockManagementServiceClientMockRecorder) CreateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateProjectUserGrant), varargs...) -} - -// CreateUser mocks base method -func (m *MockManagementServiceClient) CreateUser(arg0 context.Context, arg1 *grpc.CreateUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateUser indicates an expected call of CreateUser -func (mr *MockManagementServiceClientMockRecorder) CreateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateUser), varargs...) -} - -// CreateUserGrant mocks base method -func (m *MockManagementServiceClient) CreateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantCreate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateUserGrant indicates an expected call of CreateUserGrant -func (mr *MockManagementServiceClientMockRecorder) CreateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).CreateUserGrant), varargs...) -} - -// DeactivateApplication mocks base method -func (m *MockManagementServiceClient) DeactivateApplication(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateApplication", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateApplication indicates an expected call of DeactivateApplication -func (mr *MockManagementServiceClientMockRecorder) DeactivateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateApplication), varargs...) -} - -// DeactivateOrg mocks base method -func (m *MockManagementServiceClient) DeactivateOrg(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateOrg", varargs...) - ret0, _ := ret[0].(*grpc.Org) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateOrg indicates an expected call of DeactivateOrg -func (mr *MockManagementServiceClientMockRecorder) DeactivateOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateOrg", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateOrg), varargs...) -} - -// DeactivateProject mocks base method -func (m *MockManagementServiceClient) DeactivateProject(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateProject", varargs...) - ret0, _ := ret[0].(*grpc.Project) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateProject indicates an expected call of DeactivateProject -func (mr *MockManagementServiceClientMockRecorder) DeactivateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProject), varargs...) -} - -// DeactivateProjectGrant mocks base method -func (m *MockManagementServiceClient) DeactivateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateProjectGrant", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateProjectGrant indicates an expected call of DeactivateProjectGrant -func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectGrant), varargs...) -} - -// DeactivateProjectGrantUserGrant mocks base method -func (m *MockManagementServiceClient) DeactivateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateProjectGrantUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateProjectGrantUserGrant indicates an expected call of DeactivateProjectGrantUserGrant -func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectGrantUserGrant), varargs...) -} - -// DeactivateProjectUserGrant mocks base method -func (m *MockManagementServiceClient) DeactivateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateProjectUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateProjectUserGrant indicates an expected call of DeactivateProjectUserGrant -func (mr *MockManagementServiceClientMockRecorder) DeactivateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateProjectUserGrant), varargs...) -} - -// DeactivateUser mocks base method -func (m *MockManagementServiceClient) DeactivateUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateUser indicates an expected call of DeactivateUser -func (mr *MockManagementServiceClientMockRecorder) DeactivateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateUser), varargs...) -} - -// DeactivateUserGrant mocks base method -func (m *MockManagementServiceClient) DeactivateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeactivateUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeactivateUserGrant indicates an expected call of DeactivateUserGrant -func (mr *MockManagementServiceClientMockRecorder) DeactivateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeactivateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).DeactivateUserGrant), varargs...) -} - -// DeletePasswordAgePolicy mocks base method -func (m *MockManagementServiceClient) DeletePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeletePasswordAgePolicy", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeletePasswordAgePolicy indicates an expected call of DeletePasswordAgePolicy -func (mr *MockManagementServiceClientMockRecorder) DeletePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordAgePolicy), varargs...) -} - -// DeletePasswordComplexityPolicy mocks base method -func (m *MockManagementServiceClient) DeletePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeletePasswordComplexityPolicy", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeletePasswordComplexityPolicy indicates an expected call of DeletePasswordComplexityPolicy -func (mr *MockManagementServiceClientMockRecorder) DeletePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordComplexityPolicy), varargs...) -} - -// DeletePasswordLockoutPolicy mocks base method -func (m *MockManagementServiceClient) DeletePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeletePasswordLockoutPolicy", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeletePasswordLockoutPolicy indicates an expected call of DeletePasswordLockoutPolicy -func (mr *MockManagementServiceClientMockRecorder) DeletePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).DeletePasswordLockoutPolicy), varargs...) -} - -// DeleteUser mocks base method -func (m *MockManagementServiceClient) DeleteUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "DeleteUser", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// DeleteUser indicates an expected call of DeleteUser -func (mr *MockManagementServiceClientMockRecorder) DeleteUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteUser", reflect.TypeOf((*MockManagementServiceClient)(nil).DeleteUser), varargs...) -} - -// GetGrantedProjectGrantByID mocks base method -func (m *MockManagementServiceClient) GetGrantedProjectGrantByID(arg0 context.Context, arg1 *grpc.GrantedGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetGrantedProjectGrantByID", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetGrantedProjectGrantByID indicates an expected call of GetGrantedProjectGrantByID -func (mr *MockManagementServiceClientMockRecorder) GetGrantedProjectGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetGrantedProjectGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetGrantedProjectGrantByID), varargs...) -} - -// GetOrgByDomainGlobal mocks base method -func (m *MockManagementServiceClient) GetOrgByDomainGlobal(arg0 context.Context, arg1 *grpc.OrgDomain, arg2 ...grpc0.CallOption) (*grpc.Org, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetOrgByDomainGlobal", varargs...) - ret0, _ := ret[0].(*grpc.Org) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetOrgByDomainGlobal indicates an expected call of GetOrgByDomainGlobal -func (mr *MockManagementServiceClientMockRecorder) GetOrgByDomainGlobal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByDomainGlobal", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgByDomainGlobal), varargs...) -} - -// GetOrgByID mocks base method -func (m *MockManagementServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetOrgByID", varargs...) - ret0, _ := ret[0].(*grpc.Org) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetOrgByID indicates an expected call of GetOrgByID -func (mr *MockManagementServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgByID), varargs...) -} - -// GetOrgMemberRoles mocks base method -func (m *MockManagementServiceClient) GetOrgMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.OrgMemberRoles, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetOrgMemberRoles", varargs...) - ret0, _ := ret[0].(*grpc.OrgMemberRoles) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetOrgMemberRoles indicates an expected call of GetOrgMemberRoles -func (mr *MockManagementServiceClientMockRecorder) GetOrgMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetOrgMemberRoles), varargs...) -} - -// GetPasswordAgePolicy mocks base method -func (m *MockManagementServiceClient) GetPasswordAgePolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetPasswordAgePolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordAgePolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetPasswordAgePolicy indicates an expected call of GetPasswordAgePolicy -func (mr *MockManagementServiceClientMockRecorder) GetPasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordAgePolicy), varargs...) -} - -// GetPasswordComplexityPolicy mocks base method -func (m *MockManagementServiceClient) GetPasswordComplexityPolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetPasswordComplexityPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetPasswordComplexityPolicy indicates an expected call of GetPasswordComplexityPolicy -func (mr *MockManagementServiceClientMockRecorder) GetPasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordComplexityPolicy), varargs...) -} - -// GetPasswordLockoutPolicy mocks base method -func (m *MockManagementServiceClient) GetPasswordLockoutPolicy(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetPasswordLockoutPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetPasswordLockoutPolicy indicates an expected call of GetPasswordLockoutPolicy -func (mr *MockManagementServiceClientMockRecorder) GetPasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).GetPasswordLockoutPolicy), varargs...) -} - -// GetProjectGrantMemberRoles mocks base method -func (m *MockManagementServiceClient) GetProjectGrantMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantMemberRoles, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetProjectGrantMemberRoles", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrantMemberRoles) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetProjectGrantMemberRoles indicates an expected call of GetProjectGrantMemberRoles -func (mr *MockManagementServiceClientMockRecorder) GetProjectGrantMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetProjectGrantMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetProjectGrantMemberRoles), varargs...) -} - -// GetProjectMemberRoles mocks base method -func (m *MockManagementServiceClient) GetProjectMemberRoles(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.ProjectMemberRoles, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetProjectMemberRoles", varargs...) - ret0, _ := ret[0].(*grpc.ProjectMemberRoles) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetProjectMemberRoles indicates an expected call of GetProjectMemberRoles -func (mr *MockManagementServiceClientMockRecorder) GetProjectMemberRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetProjectMemberRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).GetProjectMemberRoles), varargs...) -} - -// GetUserAddress mocks base method -func (m *MockManagementServiceClient) GetUserAddress(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserAddress", varargs...) - ret0, _ := ret[0].(*grpc.UserAddress) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserAddress indicates an expected call of GetUserAddress -func (mr *MockManagementServiceClientMockRecorder) GetUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAddress", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserAddress), varargs...) -} - -// GetUserByEmailGlobal mocks base method -func (m *MockManagementServiceClient) GetUserByEmailGlobal(arg0 context.Context, arg1 *grpc.UserEmailID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserByEmailGlobal", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserByEmailGlobal indicates an expected call of GetUserByEmailGlobal -func (mr *MockManagementServiceClientMockRecorder) GetUserByEmailGlobal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByEmailGlobal", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserByEmailGlobal), varargs...) -} - -// GetUserByID mocks base method -func (m *MockManagementServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserByID", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserByID indicates an expected call of GetUserByID -func (mr *MockManagementServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserByID), varargs...) -} - -// GetUserEmail mocks base method -func (m *MockManagementServiceClient) GetUserEmail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserEmail", varargs...) - ret0, _ := ret[0].(*grpc.UserEmail) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserEmail indicates an expected call of GetUserEmail -func (mr *MockManagementServiceClientMockRecorder) GetUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserEmail", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserEmail), varargs...) -} - -// GetUserMfas mocks base method -func (m *MockManagementServiceClient) GetUserMfas(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserMfas", varargs...) - ret0, _ := ret[0].(*grpc.MultiFactors) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserMfas indicates an expected call of GetUserMfas -func (mr *MockManagementServiceClientMockRecorder) GetUserMfas(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserMfas", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserMfas), varargs...) -} - -// GetUserPhone mocks base method -func (m *MockManagementServiceClient) GetUserPhone(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserPhone", varargs...) - ret0, _ := ret[0].(*grpc.UserPhone) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserPhone indicates an expected call of GetUserPhone -func (mr *MockManagementServiceClientMockRecorder) GetUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserPhone", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserPhone), varargs...) -} - -// GetUserProfile mocks base method -func (m *MockManagementServiceClient) GetUserProfile(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserProfile", varargs...) - ret0, _ := ret[0].(*grpc.UserProfile) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserProfile indicates an expected call of GetUserProfile -func (mr *MockManagementServiceClientMockRecorder) GetUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserProfile", reflect.TypeOf((*MockManagementServiceClient)(nil).GetUserProfile), varargs...) -} - -// Healthz mocks base method -func (m *MockManagementServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Healthz", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Healthz indicates an expected call of Healthz -func (mr *MockManagementServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockManagementServiceClient)(nil).Healthz), varargs...) -} - -// IsUserUnique mocks base method -func (m *MockManagementServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "IsUserUnique", varargs...) - ret0, _ := ret[0].(*grpc.UniqueUserResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// IsUserUnique indicates an expected call of IsUserUnique -func (mr *MockManagementServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockManagementServiceClient)(nil).IsUserUnique), varargs...) -} - -// LockUser mocks base method -func (m *MockManagementServiceClient) LockUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "LockUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// LockUser indicates an expected call of LockUser -func (mr *MockManagementServiceClientMockRecorder) LockUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LockUser", reflect.TypeOf((*MockManagementServiceClient)(nil).LockUser), varargs...) -} - -// OrgChanges mocks base method -func (m *MockManagementServiceClient) OrgChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "OrgChanges", varargs...) - ret0, _ := ret[0].(*grpc.Changes) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// OrgChanges indicates an expected call of OrgChanges -func (mr *MockManagementServiceClientMockRecorder) OrgChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "OrgChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).OrgChanges), varargs...) -} - -// ProjectByID mocks base method -func (m *MockManagementServiceClient) ProjectByID(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ProjectByID", varargs...) - ret0, _ := ret[0].(*grpc.Project) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ProjectByID indicates an expected call of ProjectByID -func (mr *MockManagementServiceClientMockRecorder) ProjectByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectByID), varargs...) -} - -// ProjectChanges mocks base method -func (m *MockManagementServiceClient) ProjectChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ProjectChanges", varargs...) - ret0, _ := ret[0].(*grpc.Changes) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ProjectChanges indicates an expected call of ProjectChanges -func (mr *MockManagementServiceClientMockRecorder) ProjectChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectChanges), varargs...) -} - -// ProjectGrantByID mocks base method -func (m *MockManagementServiceClient) ProjectGrantByID(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ProjectGrantByID", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ProjectGrantByID indicates an expected call of ProjectGrantByID -func (mr *MockManagementServiceClientMockRecorder) ProjectGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectGrantByID), varargs...) -} - -// ProjectGrantUserGrantByID mocks base method -func (m *MockManagementServiceClient) ProjectGrantUserGrantByID(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ProjectGrantUserGrantByID", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ProjectGrantUserGrantByID indicates an expected call of ProjectGrantUserGrantByID -func (mr *MockManagementServiceClientMockRecorder) ProjectGrantUserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectGrantUserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectGrantUserGrantByID), varargs...) -} - -// ProjectUserGrantByID mocks base method -func (m *MockManagementServiceClient) ProjectUserGrantByID(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ProjectUserGrantByID", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ProjectUserGrantByID indicates an expected call of ProjectUserGrantByID -func (mr *MockManagementServiceClientMockRecorder) ProjectUserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProjectUserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).ProjectUserGrantByID), varargs...) -} - -// ReactivateApplication mocks base method -func (m *MockManagementServiceClient) ReactivateApplication(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateApplication", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateApplication indicates an expected call of ReactivateApplication -func (mr *MockManagementServiceClientMockRecorder) ReactivateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateApplication), varargs...) -} - -// ReactivateOrg mocks base method -func (m *MockManagementServiceClient) ReactivateOrg(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateOrg", varargs...) - ret0, _ := ret[0].(*grpc.Org) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateOrg indicates an expected call of ReactivateOrg -func (mr *MockManagementServiceClientMockRecorder) ReactivateOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateOrg", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateOrg), varargs...) -} - -// ReactivateProject mocks base method -func (m *MockManagementServiceClient) ReactivateProject(arg0 context.Context, arg1 *grpc.ProjectID, arg2 ...grpc0.CallOption) (*grpc.Project, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateProject", varargs...) - ret0, _ := ret[0].(*grpc.Project) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateProject indicates an expected call of ReactivateProject -func (mr *MockManagementServiceClientMockRecorder) ReactivateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProject), varargs...) -} - -// ReactivateProjectGrant mocks base method -func (m *MockManagementServiceClient) ReactivateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantID, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateProjectGrant", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateProjectGrant indicates an expected call of ReactivateProjectGrant -func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectGrant), varargs...) -} - -// ReactivateProjectGrantUserGrant mocks base method -func (m *MockManagementServiceClient) ReactivateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateProjectGrantUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateProjectGrantUserGrant indicates an expected call of ReactivateProjectGrantUserGrant -func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectGrantUserGrant), varargs...) -} - -// ReactivateProjectUserGrant mocks base method -func (m *MockManagementServiceClient) ReactivateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateProjectUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateProjectUserGrant indicates an expected call of ReactivateProjectUserGrant -func (mr *MockManagementServiceClientMockRecorder) ReactivateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateProjectUserGrant), varargs...) -} - -// ReactivateUser mocks base method -func (m *MockManagementServiceClient) ReactivateUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateUser indicates an expected call of ReactivateUser -func (mr *MockManagementServiceClientMockRecorder) ReactivateUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateUser", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateUser), varargs...) -} - -// ReactivateUserGrant mocks base method -func (m *MockManagementServiceClient) ReactivateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ReactivateUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ReactivateUserGrant indicates an expected call of ReactivateUserGrant -func (mr *MockManagementServiceClientMockRecorder) ReactivateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReactivateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).ReactivateUserGrant), varargs...) -} - -// Ready mocks base method -func (m *MockManagementServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Ready", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Ready indicates an expected call of Ready -func (mr *MockManagementServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockManagementServiceClient)(nil).Ready), varargs...) -} - -// RegenerateOIDCClientSecret mocks base method -func (m *MockManagementServiceClient) RegenerateOIDCClientSecret(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.ClientSecret, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RegenerateOIDCClientSecret", varargs...) - ret0, _ := ret[0].(*grpc.ClientSecret) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RegenerateOIDCClientSecret indicates an expected call of RegenerateOIDCClientSecret -func (mr *MockManagementServiceClientMockRecorder) RegenerateOIDCClientSecret(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegenerateOIDCClientSecret", reflect.TypeOf((*MockManagementServiceClient)(nil).RegenerateOIDCClientSecret), varargs...) -} - -// RemoveOrgMember mocks base method -func (m *MockManagementServiceClient) RemoveOrgMember(arg0 context.Context, arg1 *grpc.RemoveOrgMemberRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RemoveOrgMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RemoveOrgMember indicates an expected call of RemoveOrgMember -func (mr *MockManagementServiceClientMockRecorder) RemoveOrgMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveOrgMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveOrgMember), varargs...) -} - -// RemoveProjectGrantMember mocks base method -func (m *MockManagementServiceClient) RemoveProjectGrantMember(arg0 context.Context, arg1 *grpc.ProjectGrantMemberRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RemoveProjectGrantMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RemoveProjectGrantMember indicates an expected call of RemoveProjectGrantMember -func (mr *MockManagementServiceClientMockRecorder) RemoveProjectGrantMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectGrantMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectGrantMember), varargs...) -} - -// RemoveProjectMember mocks base method -func (m *MockManagementServiceClient) RemoveProjectMember(arg0 context.Context, arg1 *grpc.ProjectMemberRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RemoveProjectMember", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RemoveProjectMember indicates an expected call of RemoveProjectMember -func (mr *MockManagementServiceClientMockRecorder) RemoveProjectMember(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectMember", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectMember), varargs...) -} - -// RemoveProjectRole mocks base method -func (m *MockManagementServiceClient) RemoveProjectRole(arg0 context.Context, arg1 *grpc.ProjectRoleRemove, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RemoveProjectRole", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RemoveProjectRole indicates an expected call of RemoveProjectRole -func (mr *MockManagementServiceClientMockRecorder) RemoveProjectRole(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveProjectRole", reflect.TypeOf((*MockManagementServiceClient)(nil).RemoveProjectRole), varargs...) -} - -// ResendEmailVerificationMail mocks base method -func (m *MockManagementServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail -func (mr *MockManagementServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockManagementServiceClient)(nil).ResendEmailVerificationMail), varargs...) -} - -// ResendPhoneVerificationCode mocks base method -func (m *MockManagementServiceClient) ResendPhoneVerificationCode(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ResendPhoneVerificationCode", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ResendPhoneVerificationCode indicates an expected call of ResendPhoneVerificationCode -func (mr *MockManagementServiceClientMockRecorder) ResendPhoneVerificationCode(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendPhoneVerificationCode", reflect.TypeOf((*MockManagementServiceClient)(nil).ResendPhoneVerificationCode), varargs...) -} - -// SearchApplications mocks base method -func (m *MockManagementServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchApplications", varargs...) - ret0, _ := ret[0].(*grpc.ApplicationSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchApplications indicates an expected call of SearchApplications -func (mr *MockManagementServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchApplications), varargs...) -} - -// SearchAuthGrant mocks base method -func (m *MockManagementServiceClient) SearchAuthGrant(arg0 context.Context, arg1 *grpc.AuthGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.AuthGrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchAuthGrant", varargs...) - ret0, _ := ret[0].(*grpc.AuthGrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchAuthGrant indicates an expected call of SearchAuthGrant -func (mr *MockManagementServiceClientMockRecorder) SearchAuthGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchAuthGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchAuthGrant), varargs...) -} - -// SearchOrgMembers mocks base method -func (m *MockManagementServiceClient) SearchOrgMembers(arg0 context.Context, arg1 *grpc.OrgMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgMemberSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchOrgMembers", varargs...) - ret0, _ := ret[0].(*grpc.OrgMemberSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchOrgMembers indicates an expected call of SearchOrgMembers -func (mr *MockManagementServiceClientMockRecorder) SearchOrgMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchOrgMembers), varargs...) -} - -// SearchProjectGrantMembers mocks base method -func (m *MockManagementServiceClient) SearchProjectGrantMembers(arg0 context.Context, arg1 *grpc.ProjectGrantMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantMemberSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectGrantMembers", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrantMemberSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectGrantMembers indicates an expected call of SearchProjectGrantMembers -func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrantMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrantMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrantMembers), varargs...) -} - -// SearchProjectGrantUserGrants mocks base method -func (m *MockManagementServiceClient) SearchProjectGrantUserGrants(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectGrantUserGrants", varargs...) - ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectGrantUserGrants indicates an expected call of SearchProjectGrantUserGrants -func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrantUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrantUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrantUserGrants), varargs...) -} - -// SearchProjectGrants mocks base method -func (m *MockManagementServiceClient) SearchProjectGrants(arg0 context.Context, arg1 *grpc.ProjectGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectGrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectGrants", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectGrants indicates an expected call of SearchProjectGrants -func (mr *MockManagementServiceClientMockRecorder) SearchProjectGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectGrants), varargs...) -} - -// SearchProjectMembers mocks base method -func (m *MockManagementServiceClient) SearchProjectMembers(arg0 context.Context, arg1 *grpc.ProjectMemberSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectMemberSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectMembers", varargs...) - ret0, _ := ret[0].(*grpc.ProjectMemberSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectMembers indicates an expected call of SearchProjectMembers -func (mr *MockManagementServiceClientMockRecorder) SearchProjectMembers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectMembers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectMembers), varargs...) -} - -// SearchProjectRoles mocks base method -func (m *MockManagementServiceClient) SearchProjectRoles(arg0 context.Context, arg1 *grpc.ProjectRoleSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectRoleSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectRoles", varargs...) - ret0, _ := ret[0].(*grpc.ProjectRoleSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectRoles indicates an expected call of SearchProjectRoles -func (mr *MockManagementServiceClientMockRecorder) SearchProjectRoles(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectRoles", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectRoles), varargs...) -} - -// SearchProjectUserGrants mocks base method -func (m *MockManagementServiceClient) SearchProjectUserGrants(arg0 context.Context, arg1 *grpc.ProjectUserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjectUserGrants", varargs...) - ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjectUserGrants indicates an expected call of SearchProjectUserGrants -func (mr *MockManagementServiceClientMockRecorder) SearchProjectUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjectUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjectUserGrants), varargs...) -} - -// SearchProjects mocks base method -func (m *MockManagementServiceClient) SearchProjects(arg0 context.Context, arg1 *grpc.ProjectSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ProjectSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchProjects", varargs...) - ret0, _ := ret[0].(*grpc.ProjectSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchProjects indicates an expected call of SearchProjects -func (mr *MockManagementServiceClientMockRecorder) SearchProjects(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchProjects", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchProjects), varargs...) -} - -// SearchUserGrants mocks base method -func (m *MockManagementServiceClient) SearchUserGrants(arg0 context.Context, arg1 *grpc.UserGrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserGrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchUserGrants", varargs...) - ret0, _ := ret[0].(*grpc.UserGrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchUserGrants indicates an expected call of SearchUserGrants -func (mr *MockManagementServiceClientMockRecorder) SearchUserGrants(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchUserGrants", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchUserGrants), varargs...) -} - -// SearchUsers mocks base method -func (m *MockManagementServiceClient) SearchUsers(arg0 context.Context, arg1 *grpc.UserSearchRequest, arg2 ...grpc0.CallOption) (*grpc.UserSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchUsers", varargs...) - ret0, _ := ret[0].(*grpc.UserSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchUsers indicates an expected call of SearchUsers -func (mr *MockManagementServiceClientMockRecorder) SearchUsers(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchUsers", reflect.TypeOf((*MockManagementServiceClient)(nil).SearchUsers), varargs...) -} - -// SendSetPasswordNotification mocks base method -func (m *MockManagementServiceClient) SendSetPasswordNotification(arg0 context.Context, arg1 *grpc.SetPasswordNotificationRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SendSetPasswordNotification", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SendSetPasswordNotification indicates an expected call of SendSetPasswordNotification -func (mr *MockManagementServiceClientMockRecorder) SendSetPasswordNotification(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SendSetPasswordNotification", reflect.TypeOf((*MockManagementServiceClient)(nil).SendSetPasswordNotification), varargs...) -} - -// SetInitialPassword mocks base method -func (m *MockManagementServiceClient) SetInitialPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SetInitialPassword", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SetInitialPassword indicates an expected call of SetInitialPassword -func (mr *MockManagementServiceClientMockRecorder) SetInitialPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetInitialPassword", reflect.TypeOf((*MockManagementServiceClient)(nil).SetInitialPassword), varargs...) -} - -// UnlockUser mocks base method -func (m *MockManagementServiceClient) UnlockUser(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UnlockUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UnlockUser indicates an expected call of UnlockUser -func (mr *MockManagementServiceClientMockRecorder) UnlockUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UnlockUser", reflect.TypeOf((*MockManagementServiceClient)(nil).UnlockUser), varargs...) -} - -// UpdateApplication mocks base method -func (m *MockManagementServiceClient) UpdateApplication(arg0 context.Context, arg1 *grpc.ApplicationUpdate, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateApplication", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateApplication indicates an expected call of UpdateApplication -func (mr *MockManagementServiceClientMockRecorder) UpdateApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateApplication), varargs...) -} - -// UpdateApplicationOIDCConfig mocks base method -func (m *MockManagementServiceClient) UpdateApplicationOIDCConfig(arg0 context.Context, arg1 *grpc.OIDCConfigUpdate, arg2 ...grpc0.CallOption) (*grpc.OIDCConfig, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateApplicationOIDCConfig", varargs...) - ret0, _ := ret[0].(*grpc.OIDCConfig) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateApplicationOIDCConfig indicates an expected call of UpdateApplicationOIDCConfig -func (mr *MockManagementServiceClientMockRecorder) UpdateApplicationOIDCConfig(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplicationOIDCConfig", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateApplicationOIDCConfig), varargs...) -} - -// UpdatePasswordAgePolicy mocks base method -func (m *MockManagementServiceClient) UpdatePasswordAgePolicy(arg0 context.Context, arg1 *grpc.PasswordAgePolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordAgePolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdatePasswordAgePolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordAgePolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdatePasswordAgePolicy indicates an expected call of UpdatePasswordAgePolicy -func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordAgePolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordAgePolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordAgePolicy), varargs...) -} - -// UpdatePasswordComplexityPolicy mocks base method -func (m *MockManagementServiceClient) UpdatePasswordComplexityPolicy(arg0 context.Context, arg1 *grpc.PasswordComplexityPolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordComplexityPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdatePasswordComplexityPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordComplexityPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdatePasswordComplexityPolicy indicates an expected call of UpdatePasswordComplexityPolicy -func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordComplexityPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordComplexityPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordComplexityPolicy), varargs...) -} - -// UpdatePasswordLockoutPolicy mocks base method -func (m *MockManagementServiceClient) UpdatePasswordLockoutPolicy(arg0 context.Context, arg1 *grpc.PasswordLockoutPolicyUpdate, arg2 ...grpc0.CallOption) (*grpc.PasswordLockoutPolicy, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdatePasswordLockoutPolicy", varargs...) - ret0, _ := ret[0].(*grpc.PasswordLockoutPolicy) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdatePasswordLockoutPolicy indicates an expected call of UpdatePasswordLockoutPolicy -func (mr *MockManagementServiceClientMockRecorder) UpdatePasswordLockoutPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePasswordLockoutPolicy", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdatePasswordLockoutPolicy), varargs...) -} - -// UpdateProject mocks base method -func (m *MockManagementServiceClient) UpdateProject(arg0 context.Context, arg1 *grpc.ProjectUpdateRequest, arg2 ...grpc0.CallOption) (*grpc.Project, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateProject", varargs...) - ret0, _ := ret[0].(*grpc.Project) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateProject indicates an expected call of UpdateProject -func (mr *MockManagementServiceClientMockRecorder) UpdateProject(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProject", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProject), varargs...) -} - -// UpdateProjectGrant mocks base method -func (m *MockManagementServiceClient) UpdateProjectGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.ProjectGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateProjectGrant", varargs...) - ret0, _ := ret[0].(*grpc.ProjectGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateProjectGrant indicates an expected call of UpdateProjectGrant -func (mr *MockManagementServiceClientMockRecorder) UpdateProjectGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectGrant), varargs...) -} - -// UpdateProjectGrantUserGrant mocks base method -func (m *MockManagementServiceClient) UpdateProjectGrantUserGrant(arg0 context.Context, arg1 *grpc.ProjectGrantUserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateProjectGrantUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateProjectGrantUserGrant indicates an expected call of UpdateProjectGrantUserGrant -func (mr *MockManagementServiceClientMockRecorder) UpdateProjectGrantUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectGrantUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectGrantUserGrant), varargs...) -} - -// UpdateProjectUserGrant mocks base method -func (m *MockManagementServiceClient) UpdateProjectUserGrant(arg0 context.Context, arg1 *grpc.ProjectUserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateProjectUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateProjectUserGrant indicates an expected call of UpdateProjectUserGrant -func (mr *MockManagementServiceClientMockRecorder) UpdateProjectUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateProjectUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateProjectUserGrant), varargs...) -} - -// UpdateUserAddress mocks base method -func (m *MockManagementServiceClient) UpdateUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateUserAddress", varargs...) - ret0, _ := ret[0].(*grpc.UserAddress) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateUserAddress indicates an expected call of UpdateUserAddress -func (mr *MockManagementServiceClientMockRecorder) UpdateUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserAddress", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserAddress), varargs...) -} - -// UpdateUserGrant mocks base method -func (m *MockManagementServiceClient) UpdateUserGrant(arg0 context.Context, arg1 *grpc.UserGrantUpdate, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateUserGrant", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateUserGrant indicates an expected call of UpdateUserGrant -func (mr *MockManagementServiceClientMockRecorder) UpdateUserGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserGrant", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserGrant), varargs...) -} - -// UpdateUserProfile mocks base method -func (m *MockManagementServiceClient) UpdateUserProfile(arg0 context.Context, arg1 *grpc.UpdateUserProfileRequest, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UpdateUserProfile", varargs...) - ret0, _ := ret[0].(*grpc.UserProfile) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UpdateUserProfile indicates an expected call of UpdateUserProfile -func (mr *MockManagementServiceClientMockRecorder) UpdateUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateUserProfile", reflect.TypeOf((*MockManagementServiceClient)(nil).UpdateUserProfile), varargs...) -} - -// UserChanges mocks base method -func (m *MockManagementServiceClient) UserChanges(arg0 context.Context, arg1 *grpc.ChangeRequest, arg2 ...grpc0.CallOption) (*grpc.Changes, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UserChanges", varargs...) - ret0, _ := ret[0].(*grpc.Changes) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UserChanges indicates an expected call of UserChanges -func (mr *MockManagementServiceClientMockRecorder) UserChanges(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UserChanges", reflect.TypeOf((*MockManagementServiceClient)(nil).UserChanges), varargs...) -} - -// UserGrantByID mocks base method -func (m *MockManagementServiceClient) UserGrantByID(arg0 context.Context, arg1 *grpc.UserGrantID, arg2 ...grpc0.CallOption) (*grpc.UserGrant, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "UserGrantByID", varargs...) - ret0, _ := ret[0].(*grpc.UserGrant) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// UserGrantByID indicates an expected call of UserGrantByID -func (mr *MockManagementServiceClientMockRecorder) UserGrantByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UserGrantByID", reflect.TypeOf((*MockManagementServiceClient)(nil).UserGrantByID), varargs...) -} - -// Validate mocks base method -func (m *MockManagementServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "Validate", varargs...) - ret0, _ := ret[0].(*struct0.Struct) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// Validate indicates an expected call of Validate -func (mr *MockManagementServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockManagementServiceClient)(nil).Validate), varargs...) -} From e55b137455afbe861a591b37004e2afc41493426 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 16:56:02 +0100 Subject: [PATCH 06/19] fix: generate proto files --- .../protoc/protoc-gen-authoption/templates.go | 4 +- .../templates/auth_method_mapping.go.tmpl | 8 +- pkg/admin/api/grpc/admin.pb.authoptions.go | 41 + pkg/admin/api/grpc/admin.pb.go | 1451 ++ pkg/admin/api/grpc/admin.pb.gw.go | 348 + pkg/admin/api/grpc/admin.swagger.json | 530 + pkg/admin/api/grpc/mock/admin.proto.mock.go | 178 + pkg/admin/api/proto/admin.proto | 4 +- pkg/auth/api/grpc/auth.pb.authoptions.go | 131 + pkg/auth/api/grpc/auth.pb.go | 8128 ++++++++++ pkg/auth/api/grpc/auth.pb.gw.go | 2485 +++ pkg/auth/api/grpc/auth.swagger.json | 2938 ++++ pkg/auth/api/grpc/mock/auth.proto.mock.go | 1078 ++ pkg/auth/api/proto/auth.proto | 4 +- pkg/management/api/grpc/generate.go | 2 +- .../api/grpc/management.pb.authoptions.go | 521 + pkg/management/api/grpc/management.pb.go | 12569 ++++++++++++++++ pkg/management/api/grpc/management.pb.gw.go | 6078 ++++++++ .../api/grpc/management.swagger.json | 5657 +++++++ pkg/management/api/proto/management.proto | 4 +- 20 files changed, 42146 insertions(+), 13 deletions(-) create mode 100644 pkg/admin/api/grpc/admin.pb.authoptions.go create mode 100644 pkg/admin/api/grpc/admin.pb.go create mode 100644 pkg/admin/api/grpc/admin.pb.gw.go create mode 100644 pkg/admin/api/grpc/admin.swagger.json create mode 100644 pkg/admin/api/grpc/mock/admin.proto.mock.go create mode 100644 pkg/auth/api/grpc/auth.pb.authoptions.go create mode 100644 pkg/auth/api/grpc/auth.pb.go create mode 100644 pkg/auth/api/grpc/auth.pb.gw.go create mode 100644 pkg/auth/api/grpc/auth.swagger.json create mode 100644 pkg/auth/api/grpc/mock/auth.proto.mock.go create mode 100644 pkg/management/api/grpc/management.pb.authoptions.go create mode 100644 pkg/management/api/grpc/management.pb.go create mode 100644 pkg/management/api/grpc/management.pb.gw.go create mode 100644 pkg/management/api/grpc/management.swagger.json diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index 00bb05a07c..579ed1367b 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -68,7 +68,7 @@ func (fi bindataFileInfo) Sys() interface{} { return nil } -var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x8d\x91\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x59\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x83\x6c\x67\x76\xd2\x0c\x98\x4f\xb2\xc8\x9f\x3f\x3f\x8a\x8c\xc1\x5a\x57\x08\x02\x15\x5a\xee\xb1\x82\xb7\x77\x30\x56\x7b\x5d\xde\x0b\x54\xf7\xbc\xf3\x75\x8b\xbe\xd6\x15\x85\xc7\x0d\xbc\x6e\x76\xf0\xfd\xf1\x79\x47\x09\x31\xbc\x3c\x72\x81\x10\x02\x7d\x92\x0d\xd2\x1f\x7a\x7b\x14\xf4\x95\xb7\x18\x23\x21\x44\xb6\x46\x5b\x0f\x77\x04\x00\x20\x13\x5a\x8b\x06\xa9\xd0\x0d\x57\x82\x6a\x2b\x98\xb0\xa6\xcc\xfa\x20\xf9\xd2\x79\xd9\xb8\x7d\xb2\x82\x4c\x48\x5f\x77\x6f\xb4\xd4\x2d\x2b\xb9\x76\xec\x43\x7a\x5e\x61\xc3\xa4\xf2\x68\x15\x6f\x18\x37\x92\xb1\x94\x9b\x9d\x85\xa9\xd4\x7f\x0a\x07\xd7\x05\x21\x21\x80\xe5\x4a\x20\xe4\x0e\x56\x0f\x30\x20\xfc\x44\x7b\x92\x25\x3a\x48\x04\xac\x28\x08\x14\x10\x42\xee\xce\x54\x50\x30\x42\x4e\xdc\xce\x2f\xf7\xdf\x3a\x5f\xbf\xf4\x13\x72\xf0\x00\x13\x0a\x9d\x02\x2f\xdc\x18\xa9\x04\x84\x9e\x77\xb2\x6e\x93\x75\xee\xe8\x90\x95\x0c\xc6\x2f\x04\xc8\xdb\xa4\xdf\x18\x9f\x72\xb4\xf1\x52\x2b\xc8\x5b\xba\xe9\x4f\x0e\xb2\xc4\x48\x47\x46\xda\xbb\xd2\xd3\x57\x9a\x8c\xf7\x43\x76\x06\x97\x05\xe5\x01\xb8\xaa\x66\x75\xff\x9e\xe8\x16\x6d\x2b\x9d\x4b\x16\x33\x4d\xff\x70\x2c\x84\x7c\x18\xce\x76\x78\xef\x18\xe9\x8c\x9e\x85\x30\x9e\xb2\xd5\x35\xfb\xd0\x6a\xb8\xa8\x97\xbe\xc9\x6d\x05\x59\x08\xb7\xda\x88\x31\x5b\x7e\xd2\xad\x6b\x2c\x8f\x5b\x6e\x79\x7b\xa5\xeb\x03\x4f\x12\x9b\x6a\x6c\xe5\x52\x1b\x97\xb3\x31\xa0\x3a\xcf\x39\x04\x18\x7e\x22\x21\x87\x4e\x95\x9f\x1e\x55\x5b\xf9\xc1\x13\xc2\xfe\x39\xad\x50\x89\xc6\x6b\x7b\x77\x42\x2b\x0f\x12\xed\x9c\x76\xa7\x8f\xa8\x7e\x8f\x81\x25\xa4\xbb\xb5\x56\x07\x28\xae\x26\x92\x2e\xa5\x58\x40\xda\x42\xfa\x4b\x71\xfb\x9e\x36\x0e\xed\xac\xfe\xb8\x23\x16\x7d\x67\x15\x4c\xfb\x4d\x2f\x3a\xba\xd5\xd0\xe4\xbb\xfc\xd7\x7e\x2e\x12\xeb\xc0\x0d\x31\xfe\x09\x00\x00\xff\xff\x12\xdf\x14\x2b\xfb\x03\x00\x00") +var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x4d\x90\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x45\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x03\x6d\x67\x71\xd6\x0e\xa8\x4f\x32\x45\xfe\x3f\x3f\x8a\x42\xc0\xca\xd6\x08\x0a\x0d\x7a\x19\xb1\x86\x97\x57\x70\xde\x46\x5b\xdd\x2a\x34\xb7\xb2\x8b\x87\x16\xe3\xc1\xd6\x1c\xee\xd7\xf0\xbc\xde\xc2\xf7\xfb\xc7\x2d\x67\xcc\xc9\xea\x28\x15\x42\x4a\xfc\x41\x37\xc8\x7f\xd8\xcd\x51\xf1\x67\xd9\x62\xce\x8c\x31\xdd\x3a\xeb\x23\xdc\x30\x00\x80\x42\x59\xab\x1a\xe4\xca\x36\xd2\x28\x6e\xbd\x12\xca\xbb\xaa\xe8\x2f\xd9\x97\x2e\xea\x26\xec\xc8\x0a\x0a\xa5\xe3\xa1\x7b\xe1\x95\x6d\x45\x25\x6d\x10\x6f\x3a\xca\x1a\x1b\xa1\x4d\x44\x6f\x64\x23\xa4\xd3\x82\x52\x8b\x73\x1d\x29\x7d\xb2\x6e\x30\x9d\x31\x96\x12\x78\x69\x14\x42\x19\x60\x79\x07\x03\xc1\x4f\xf4\x27\x5d\x61\x00\x02\x10\xf3\x39\x83\x39\xa4\x54\x86\x33\x14\xcc\x05\x63\x27\xe9\xa7\xc1\xdd\xb7\x2e\x1e\x9e\xfa\x01\x05\xb8\x83\x0b\x09\x1f\x82\x4f\xd2\x39\x6d\x14\xa4\x1e\xf5\x62\xdb\x92\x6d\x19\xc6\x2c\x12\x1f\xbf\x94\xa0\x6c\x49\x74\xed\x22\xe5\x58\x17\xb5\x35\x50\xb6\x7c\xdd\x9f\x02\x14\xc4\xc7\x47\x3e\xde\x3b\xf2\xd3\x57\x4e\xa6\xbb\x21\xbb\x80\x6b\x41\xbd\x07\x69\xea\x89\xee\xdf\x13\xdf\xa0\x6f\x75\x08\x64\x31\xa9\xe9\xdf\x4c\xa4\x54\x0e\x83\xd9\x0c\x4f\x9d\x33\x9f\x90\x8b\x94\xc6\x53\xb1\x9c\x72\x0f\x6d\xa6\x2b\x2d\xfa\x2e\x4e\x4b\x28\x52\xfa\xa8\x85\x9c\x8b\xc5\xbb\xba\xd5\x01\xab\xe3\x46\x7a\xd9\xfe\x53\xd7\x5f\x3c\x68\x6c\xea\xb1\x8d\xeb\xda\xbc\x98\x8c\x00\xcd\x79\xc6\x29\xc1\xf0\x93\x19\xdb\x77\xa6\x7a\xf7\x98\xd6\xeb\x37\x49\x08\xbb\x47\x5a\x9d\x0a\x5d\xb4\xfe\xe6\x84\x5e\xef\x35\xfa\x29\xe9\xd6\x1e\xd1\xfc\x1e\x2f\x16\x40\xb1\x95\x35\x7b\x98\x4f\x72\x28\xa0\xd5\x0c\x68\xf3\xf8\x2f\x23\xfd\x2b\x6d\x19\xfa\x89\xf6\xb8\x1b\x1e\x63\xe7\x0d\x5c\x76\x9a\x5f\x75\xf3\x51\x33\x17\xcf\xc5\xff\x76\x72\x46\x9c\x03\x33\xe4\xfc\x27\x00\x00\xff\xff\xb4\x5d\x04\x73\xee\x03\x00\x00") func templatesAuth_method_mappingGoTmplBytes() ([]byte, error) { return bindataRead( @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1019, mode: os.FileMode(420), modTime: time.Unix(1584977173, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1006, mode: os.FileMode(420), modTime: time.Unix(1584978801, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl index b2b33042d1..4240a0dffd 100644 --- a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl +++ b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl @@ -6,7 +6,7 @@ package {{.File.GoPkg.Name}} import ( "google.golang.org/grpc" - utils_auth "github.com/caos/zitadel/internal/api//auth" + utils_auth "github.com/caos/zitadel/internal/api/auth" utils_grpc "github.com/caos/zitadel/internal/api/grpc" ) @@ -16,11 +16,11 @@ import ( * {{$s.Name}} */ -var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { +var {{$s.Name}}_AuthMethods = utils_auth.MethodMapping { {{ range $m := $s.Method}} {{ $mAuthOpt := option $m.Options "caos.zitadel.utils.v1.auth_option" }} {{ if and $mAuthOpt $mAuthOpt.Permission }} - "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.AuthOption{ + "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.Option{ Permission: "{{$mAuthOpt.Permission}}", CheckParam: "{{$mAuthOpt.CheckFieldName}}", }, @@ -28,7 +28,7 @@ var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { {{ end}} } -func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { +func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { return utils_grpc.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) } diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go new file mode 100644 index 0000000000..5dc2d20c11 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -0,0 +1,41 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * AdminService + */ + +var AdminService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.Option{ + Permission: "iam.write", + CheckParam: "", + }, +} + +func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) +} diff --git a/pkg/admin/api/grpc/admin.pb.go b/pkg/admin/api/grpc/admin.pb.go new file mode 100644 index 0000000000..2b22bc25b2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.go @@ -0,0 +1,1451 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: admin.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +type OrgSearchKey int32 + +const ( + OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED OrgSearchKey = 0 + OrgSearchKey_ORGSEARCHKEY_ORG_NAME OrgSearchKey = 1 + OrgSearchKey_ORGSEARCHKEY_DOMAIN OrgSearchKey = 2 + OrgSearchKey_ORGSEARCHKEY_STATE OrgSearchKey = 3 +) + +var OrgSearchKey_name = map[int32]string{ + 0: "ORGSEARCHKEY_UNSPECIFIED", + 1: "ORGSEARCHKEY_ORG_NAME", + 2: "ORGSEARCHKEY_DOMAIN", + 3: "ORGSEARCHKEY_STATE", +} + +var OrgSearchKey_value = map[string]int32{ + "ORGSEARCHKEY_UNSPECIFIED": 0, + "ORGSEARCHKEY_ORG_NAME": 1, + "ORGSEARCHKEY_DOMAIN": 2, + "ORGSEARCHKEY_STATE": 3, +} + +func (x OrgSearchKey) String() string { + return proto.EnumName(OrgSearchKey_name, int32(x)) +} + +func (OrgSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +type OrgSearchMethod int32 + +const ( + OrgSearchMethod_ORGSEARCHMETHOD_EQUALS OrgSearchMethod = 0 + OrgSearchMethod_ORGSEARCHMETHOD_STARTS_WITH OrgSearchMethod = 1 + OrgSearchMethod_ORGSEARCHMETHOD_CONTAINS OrgSearchMethod = 2 +) + +var OrgSearchMethod_name = map[int32]string{ + 0: "ORGSEARCHMETHOD_EQUALS", + 1: "ORGSEARCHMETHOD_STARTS_WITH", + 2: "ORGSEARCHMETHOD_CONTAINS", +} + +var OrgSearchMethod_value = map[string]int32{ + "ORGSEARCHMETHOD_EQUALS": 0, + "ORGSEARCHMETHOD_STARTS_WITH": 1, + "ORGSEARCHMETHOD_CONTAINS": 2, +} + +func (x OrgSearchMethod) String() string { + return proto.EnumName(OrgSearchMethod_name, int32(x)) +} + +func (OrgSearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UniqueOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgRequest) Reset() { *m = UniqueOrgRequest{} } +func (m *UniqueOrgRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgRequest) ProtoMessage() {} +func (*UniqueOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +func (m *UniqueOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgRequest.Unmarshal(m, b) +} +func (m *UniqueOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgRequest.Marshal(b, m, deterministic) +} +func (m *UniqueOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgRequest.Merge(m, src) +} +func (m *UniqueOrgRequest) XXX_Size() int { + return xxx_messageInfo_UniqueOrgRequest.Size(m) +} +func (m *UniqueOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgRequest proto.InternalMessageInfo + +func (m *UniqueOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *UniqueOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type UniqueOrgResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgResponse) Reset() { *m = UniqueOrgResponse{} } +func (m *UniqueOrgResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgResponse) ProtoMessage() {} +func (*UniqueOrgResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +func (m *UniqueOrgResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgResponse.Unmarshal(m, b) +} +func (m *UniqueOrgResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgResponse.Marshal(b, m, deterministic) +} +func (m *UniqueOrgResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgResponse.Merge(m, src) +} +func (m *UniqueOrgResponse) XXX_Size() int { + return xxx_messageInfo_UniqueOrgResponse.Size(m) +} +func (m *UniqueOrgResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgResponse proto.InternalMessageInfo + +func (m *UniqueOrgResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn OrgSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*OrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchRequest) Reset() { *m = OrgSearchRequest{} } +func (m *OrgSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSearchRequest) ProtoMessage() {} +func (*OrgSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +func (m *OrgSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchRequest.Unmarshal(m, b) +} +func (m *OrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchRequest.Merge(m, src) +} +func (m *OrgSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgSearchRequest.Size(m) +} +func (m *OrgSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchRequest proto.InternalMessageInfo + +func (m *OrgSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchRequest) GetSortingColumn() OrgSearchKey { + if m != nil { + return m.SortingColumn + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *OrgSearchRequest) GetQueries() []*OrgSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgSearchQuery struct { + Key OrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"key,omitempty"` + Method OrgSearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.admin.api.v1.OrgSearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchQuery) Reset() { *m = OrgSearchQuery{} } +func (m *OrgSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgSearchQuery) ProtoMessage() {} +func (*OrgSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{5} +} + +func (m *OrgSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchQuery.Unmarshal(m, b) +} +func (m *OrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchQuery.Merge(m, src) +} +func (m *OrgSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgSearchQuery.Size(m) +} +func (m *OrgSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchQuery proto.InternalMessageInfo + +func (m *OrgSearchQuery) GetKey() OrgSearchKey { + if m != nil { + return m.Key + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchQuery) GetMethod() OrgSearchMethod { + if m != nil { + return m.Method + } + return OrgSearchMethod_ORGSEARCHMETHOD_EQUALS +} + +func (m *OrgSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type OrgSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchResponse) Reset() { *m = OrgSearchResponse{} } +func (m *OrgSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSearchResponse) ProtoMessage() {} +func (*OrgSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{6} +} + +func (m *OrgSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchResponse.Unmarshal(m, b) +} +func (m *OrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchResponse.Merge(m, src) +} +func (m *OrgSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgSearchResponse.Size(m) +} +func (m *OrgSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchResponse proto.InternalMessageInfo + +func (m *OrgSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgSearchResponse) GetResult() []*Org { + if m != nil { + return m.Result + } + return nil +} + +type OrgSetUpRequest struct { + Org *CreateOrgRequest `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *RegisterUserRequest `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpRequest) Reset() { *m = OrgSetUpRequest{} } +func (m *OrgSetUpRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpRequest) ProtoMessage() {} +func (*OrgSetUpRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{7} +} + +func (m *OrgSetUpRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpRequest.Unmarshal(m, b) +} +func (m *OrgSetUpRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpRequest.Marshal(b, m, deterministic) +} +func (m *OrgSetUpRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpRequest.Merge(m, src) +} +func (m *OrgSetUpRequest) XXX_Size() int { + return xxx_messageInfo_OrgSetUpRequest.Size(m) +} +func (m *OrgSetUpRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpRequest proto.InternalMessageInfo + +func (m *OrgSetUpRequest) GetOrg() *CreateOrgRequest { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpRequest) GetUser() *RegisterUserRequest { + if m != nil { + return m.User + } + return nil +} + +type OrgSetUpResponse struct { + Org *Org `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *User `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpResponse) Reset() { *m = OrgSetUpResponse{} } +func (m *OrgSetUpResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpResponse) ProtoMessage() {} +func (*OrgSetUpResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{8} +} + +func (m *OrgSetUpResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpResponse.Unmarshal(m, b) +} +func (m *OrgSetUpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpResponse.Marshal(b, m, deterministic) +} +func (m *OrgSetUpResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpResponse.Merge(m, src) +} +func (m *OrgSetUpResponse) XXX_Size() int { + return xxx_messageInfo_OrgSetUpResponse.Size(m) +} +func (m *OrgSetUpResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpResponse proto.InternalMessageInfo + +func (m *OrgSetUpResponse) GetOrg() *Org { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpResponse) GetUser() *User { + if m != nil { + return m.User + } + return nil +} + +type RegisterUserRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } +func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserRequest) ProtoMessage() {} +func (*RegisterUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{9} +} + +func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) +} +func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserRequest.Merge(m, src) +} +func (m *RegisterUserRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserRequest.Size(m) +} +func (m *RegisterUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo + +func (m *RegisterUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *RegisterUserRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,6,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,7,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,8,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,9,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,10,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,11,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,13,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` + Phone string `protobuf:"bytes,14,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,15,opt,name=isPhoneVerified,proto3" json:"isPhoneVerified,omitempty"` + Country string `protobuf:"bytes,16,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,17,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,18,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,19,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,20,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type CreateOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateOrgRequest) Reset() { *m = CreateOrgRequest{} } +func (m *CreateOrgRequest) String() string { return proto.CompactTextString(m) } +func (*CreateOrgRequest) ProtoMessage() {} +func (*CreateOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{11} +} + +func (m *CreateOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateOrgRequest.Unmarshal(m, b) +} +func (m *CreateOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateOrgRequest.Marshal(b, m, deterministic) +} +func (m *CreateOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateOrgRequest.Merge(m, src) +} +func (m *CreateOrgRequest) XXX_Size() int { + return xxx_messageInfo_CreateOrgRequest.Size(m) +} +func (m *CreateOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateOrgRequest proto.InternalMessageInfo + +func (m *CreateOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *CreateOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +func init() { + proto.RegisterEnum("zitadel.admin.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchKey", OrgSearchKey_name, OrgSearchKey_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchMethod", OrgSearchMethod_name, OrgSearchMethod_value) + proto.RegisterEnum("zitadel.admin.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("zitadel.admin.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterType((*OrgID)(nil), "zitadel.admin.api.v1.OrgID") + proto.RegisterType((*UniqueOrgRequest)(nil), "zitadel.admin.api.v1.UniqueOrgRequest") + proto.RegisterType((*UniqueOrgResponse)(nil), "zitadel.admin.api.v1.UniqueOrgResponse") + proto.RegisterType((*Org)(nil), "zitadel.admin.api.v1.Org") + proto.RegisterType((*OrgSearchRequest)(nil), "zitadel.admin.api.v1.OrgSearchRequest") + proto.RegisterType((*OrgSearchQuery)(nil), "zitadel.admin.api.v1.OrgSearchQuery") + proto.RegisterType((*OrgSearchResponse)(nil), "zitadel.admin.api.v1.OrgSearchResponse") + proto.RegisterType((*OrgSetUpRequest)(nil), "zitadel.admin.api.v1.OrgSetUpRequest") + proto.RegisterType((*OrgSetUpResponse)(nil), "zitadel.admin.api.v1.OrgSetUpResponse") + proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.admin.api.v1.RegisterUserRequest") + proto.RegisterType((*User)(nil), "zitadel.admin.api.v1.User") + proto.RegisterType((*CreateOrgRequest)(nil), "zitadel.admin.api.v1.CreateOrgRequest") +} + +func init() { proto.RegisterFile("admin.proto", fileDescriptor_73a7fc70dcc2027c) } + +var fileDescriptor_73a7fc70dcc2027c = []byte{ + // 1667 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x58, 0x4f, 0x73, 0x1b, 0x49, + 0x15, 0xcf, 0xe8, 0x9f, 0x47, 0x4f, 0xfe, 0x33, 0xee, 0x78, 0x9d, 0x59, 0x39, 0xbb, 0xf6, 0x0e, + 0x9b, 0x90, 0xd5, 0x12, 0x69, 0x23, 0x96, 0x2a, 0xca, 0xd4, 0x2e, 0x25, 0x5b, 0xb3, 0x8e, 0x2a, + 0xb6, 0xe4, 0x1d, 0xc9, 0xe1, 0xcf, 0x45, 0x4c, 0x34, 0xed, 0x51, 0x93, 0xd1, 0xcc, 0xa4, 0xbb, + 0x95, 0xa0, 0xa5, 0x38, 0x90, 0x2a, 0x2e, 0x1c, 0x38, 0xc0, 0x81, 0x4f, 0xc0, 0x99, 0x13, 0x57, + 0xbe, 0x04, 0x1f, 0x80, 0x0b, 0x55, 0x5c, 0x38, 0x70, 0xe1, 0xb2, 0x27, 0xaa, 0xbb, 0x47, 0xb2, + 0x46, 0x96, 0x62, 0x52, 0x5c, 0xf6, 0x64, 0xf5, 0xef, 0xf7, 0x7b, 0xaf, 0x5f, 0xbf, 0x7e, 0xfd, + 0xa6, 0xdb, 0x50, 0x72, 0xbd, 0x11, 0x09, 0xab, 0x31, 0x8d, 0x78, 0x84, 0x76, 0xbe, 0x22, 0xdc, + 0xf5, 0x70, 0x50, 0x55, 0xa0, 0x1b, 0x93, 0xea, 0xcb, 0x47, 0xe5, 0xbb, 0x7e, 0x14, 0xf9, 0x01, + 0xae, 0xb9, 0x31, 0xa9, 0xb9, 0x61, 0x18, 0x71, 0x97, 0x93, 0x28, 0x64, 0xca, 0xa6, 0xbc, 0x97, + 0xb0, 0x72, 0xf4, 0x6c, 0x7c, 0x59, 0xc3, 0xa3, 0x98, 0x4f, 0x12, 0x72, 0x7f, 0x91, 0xe4, 0x64, + 0x84, 0x19, 0x77, 0x47, 0x71, 0x22, 0xb8, 0xbb, 0x28, 0x60, 0x9c, 0x8e, 0x07, 0x3c, 0x61, 0xef, + 0xbc, 0x74, 0x03, 0xe2, 0xb9, 0x1c, 0xd7, 0xa6, 0x3f, 0x12, 0xe2, 0x3b, 0xf2, 0xcf, 0xe0, 0xa1, + 0x8f, 0xc3, 0x87, 0xec, 0x95, 0xeb, 0xfb, 0x98, 0xd6, 0xa2, 0x58, 0x86, 0xb5, 0x24, 0x44, 0xd3, + 0x1d, 0xf3, 0xa1, 0xa2, 0xa7, 0x2a, 0xc5, 0x58, 0x77, 0x20, 0xdf, 0xa1, 0x7e, 0xab, 0x89, 0x36, + 0x21, 0x43, 0x3c, 0x53, 0x3b, 0xd0, 0x1e, 0x14, 0x9d, 0x0c, 0xf1, 0xac, 0x73, 0x30, 0x2e, 0x42, + 0xf2, 0x62, 0x8c, 0x3b, 0xd4, 0x77, 0xf0, 0x8b, 0x31, 0x66, 0x1c, 0xed, 0x41, 0x2e, 0x74, 0x47, + 0x58, 0xa9, 0x8e, 0xd6, 0xbe, 0x3e, 0xca, 0xd1, 0x8c, 0xa1, 0x39, 0x12, 0x44, 0xfb, 0x50, 0xf0, + 0xa2, 0x91, 0x4b, 0x42, 0x33, 0x93, 0xa6, 0x13, 0xd8, 0xfa, 0x04, 0xb6, 0xe7, 0x3c, 0xb2, 0x38, + 0x0a, 0x19, 0x46, 0x7b, 0x50, 0x24, 0xac, 0x3f, 0x96, 0xb8, 0xf4, 0xab, 0x3b, 0x3a, 0x61, 0x4a, + 0x67, 0xfd, 0x47, 0x83, 0x6c, 0x87, 0xfa, 0x8b, 0xb1, 0xa1, 0x4f, 0x21, 0xcf, 0xb8, 0xcb, 0xb1, + 0x9c, 0x69, 0xb3, 0xfe, 0x7e, 0x75, 0xd9, 0xae, 0x55, 0x3b, 0xd4, 0xef, 0x0a, 0x95, 0xa3, 0xc4, + 0xe8, 0x87, 0xb0, 0x31, 0xa0, 0x58, 0xe6, 0xa5, 0x2f, 0x32, 0x69, 0x66, 0x0f, 0xb4, 0x07, 0xa5, + 0x7a, 0xb9, 0xaa, 0x76, 0xa0, 0x3a, 0xdd, 0x81, 0x6a, 0x6f, 0xba, 0x45, 0xce, 0xfa, 0xd4, 0xa0, + 0x29, 0x1c, 0xfc, 0x00, 0x4a, 0x83, 0xa1, 0x1b, 0xfa, 0x58, 0x99, 0xe7, 0x6e, 0x34, 0x07, 0x25, + 0x97, 0xc6, 0x28, 0xc9, 0x5d, 0x5e, 0xae, 0x42, 0xa5, 0x6c, 0x77, 0x96, 0xb2, 0x82, 0x44, 0xa7, + 0x99, 0xfa, 0xa7, 0x06, 0x86, 0x88, 0x1e, 0xbb, 0x74, 0x30, 0x9c, 0x26, 0x7f, 0x17, 0x0a, 0xd1, + 0xe5, 0x25, 0xc3, 0x5c, 0x26, 0x22, 0xe7, 0x24, 0x23, 0xb4, 0x03, 0xf9, 0x80, 0x8c, 0x08, 0x97, + 0xc9, 0xc8, 0x39, 0x6a, 0x80, 0xba, 0xb0, 0xc9, 0x22, 0xca, 0x49, 0xe8, 0xf7, 0x07, 0x51, 0x30, + 0x1e, 0x85, 0x72, 0xb5, 0x9b, 0x75, 0x6b, 0x75, 0xae, 0xe4, 0x6c, 0x4f, 0xf0, 0xe4, 0x48, 0xff, + 0xfa, 0x28, 0xff, 0x5a, 0xcb, 0x1c, 0xdc, 0x72, 0x36, 0x12, 0x1f, 0xc7, 0xd2, 0x05, 0x32, 0x20, + 0xeb, 0xb2, 0x81, 0x5c, 0xb8, 0xee, 0x88, 0x9f, 0xe8, 0x73, 0x58, 0x7b, 0x31, 0xc6, 0x94, 0x60, + 0x66, 0xe6, 0x0f, 0xb2, 0x0f, 0x4a, 0xf5, 0x0f, 0x6f, 0xf0, 0xff, 0xe5, 0x18, 0xd3, 0x89, 0x33, + 0x35, 0xb2, 0xfe, 0xa4, 0xc1, 0x66, 0x9a, 0x43, 0x9f, 0x43, 0xf6, 0x39, 0x9e, 0xc8, 0x45, 0xbe, + 0x6d, 0xb8, 0xc2, 0x10, 0x7d, 0x06, 0x85, 0x11, 0xe6, 0xc3, 0xc8, 0x4b, 0xaa, 0xe3, 0xde, 0x0d, + 0x2e, 0xce, 0xa4, 0xd8, 0x49, 0x8c, 0x44, 0x3a, 0x5f, 0xba, 0xc1, 0x58, 0x55, 0x47, 0xd1, 0x51, + 0x03, 0xeb, 0x8f, 0x1a, 0x6c, 0xcf, 0xed, 0x48, 0x52, 0xbc, 0x6f, 0xb7, 0x25, 0x1f, 0xc0, 0x3a, + 0x8f, 0xb8, 0x1b, 0xf4, 0x29, 0x66, 0xe3, 0x80, 0xcb, 0x09, 0x72, 0x4e, 0x49, 0x62, 0x8e, 0x84, + 0xd0, 0x23, 0x28, 0x24, 0x64, 0x4e, 0x66, 0xf3, 0xdd, 0x95, 0xb1, 0x3b, 0x89, 0xd0, 0xfa, 0xad, + 0x06, 0x5b, 0x32, 0x32, 0x7e, 0x11, 0x4f, 0x4b, 0xe5, 0xfb, 0x90, 0x8d, 0xa8, 0x2f, 0x83, 0x2a, + 0xd5, 0xef, 0x2f, 0xf7, 0x71, 0x2c, 0x2a, 0x7b, 0xee, 0x70, 0x3b, 0xc2, 0x04, 0x7d, 0x06, 0xb9, + 0x31, 0xc3, 0x54, 0x06, 0x5e, 0xaa, 0x7f, 0xb4, 0xdc, 0xd4, 0xc1, 0x3e, 0x61, 0x1c, 0xd3, 0x0b, + 0x86, 0xe9, 0xd4, 0x5a, 0x9a, 0x59, 0x51, 0x52, 0xb7, 0x32, 0x96, 0x24, 0x49, 0x1f, 0xcf, 0x07, + 0xf3, 0x86, 0x05, 0xc9, 0xf9, 0xab, 0xa9, 0xf9, 0xcb, 0xcb, 0xd5, 0x72, 0x5e, 0x35, 0xe1, 0xbf, + 0x32, 0x70, 0x7b, 0x49, 0x38, 0xe8, 0x3d, 0xc8, 0xe3, 0x91, 0x4b, 0x82, 0x54, 0xab, 0xfa, 0x99, + 0xe6, 0x28, 0x14, 0xdd, 0x07, 0xb8, 0x24, 0x94, 0xf1, 0xbe, 0x3c, 0x92, 0x0b, 0xfd, 0xaa, 0x28, + 0xa9, 0xb6, 0x38, 0xa0, 0x1f, 0x42, 0x31, 0x70, 0xa7, 0xb2, 0x6c, 0x5a, 0xa6, 0x0b, 0x46, 0xaa, + 0xf6, 0xa0, 0x18, 0x92, 0xc1, 0x73, 0xa5, 0xca, 0xc9, 0xb2, 0xd1, 0x05, 0x20, 0xc9, 0x0f, 0x60, + 0xdd, 0x23, 0x2c, 0x0e, 0xdc, 0x49, 0x7f, 0xee, 0xfc, 0x97, 0x12, 0x4c, 0x4a, 0x1e, 0x02, 0x8a, + 0x29, 0xbe, 0xc4, 0x94, 0x62, 0xaf, 0x1f, 0xb8, 0xa1, 0x3f, 0x76, 0x7d, 0x9c, 0xb4, 0x84, 0xed, + 0x19, 0x73, 0x9a, 0x10, 0xe8, 0x53, 0x28, 0xf8, 0x38, 0xf4, 0x30, 0x35, 0xd7, 0x64, 0x81, 0xdf, + 0x5d, 0x9e, 0xa5, 0x13, 0xa9, 0x71, 0x12, 0x2d, 0xfa, 0x16, 0xe8, 0xb1, 0xcb, 0xd8, 0xab, 0x88, + 0x7a, 0xa6, 0xbe, 0xb0, 0x92, 0x29, 0x81, 0xde, 0x87, 0x42, 0x44, 0xfd, 0x3e, 0xf1, 0xcc, 0x62, + 0x5a, 0x92, 0x8f, 0xa8, 0xdf, 0xf2, 0xac, 0xbf, 0xe7, 0x21, 0x27, 0xd2, 0x7c, 0xad, 0x23, 0x7f, + 0x2f, 0xdd, 0x91, 0xf7, 0x57, 0x6f, 0xdc, 0x37, 0xa8, 0x25, 0xef, 0x41, 0x51, 0x14, 0xd1, 0xfc, + 0xbe, 0xe8, 0x02, 0x90, 0x9b, 0xf2, 0x5e, 0xaa, 0x44, 0xd4, 0x66, 0xcc, 0x55, 0xc6, 0xde, 0x7c, + 0x65, 0xac, 0x29, 0xdb, 0xe5, 0x05, 0xa1, 0xdf, 0x50, 0x10, 0xc5, 0xff, 0xb5, 0x20, 0xe0, 0xe6, + 0x82, 0x28, 0xbd, 0x45, 0x41, 0xec, 0x4c, 0x8f, 0xc8, 0xba, 0x6a, 0x74, 0xea, 0x64, 0x3c, 0x80, + 0x2d, 0xc2, 0x6c, 0xf1, 0xf3, 0x29, 0xa6, 0xe4, 0x92, 0x60, 0xcf, 0xdc, 0x90, 0xed, 0x7e, 0x11, + 0x16, 0xf6, 0xf1, 0x30, 0x0a, 0xb1, 0xb9, 0xa9, 0xec, 0xe5, 0x40, 0xd9, 0x9f, 0x8b, 0x9f, 0x33, + 0xfb, 0xad, 0xa9, 0x7d, 0x0a, 0x46, 0x26, 0xac, 0x0d, 0xa2, 0x71, 0xc8, 0xe9, 0xc4, 0x34, 0xa4, + 0x87, 0xe9, 0x10, 0x95, 0x41, 0x0f, 0xa2, 0x81, 0x1b, 0x10, 0x3e, 0x31, 0xb7, 0x93, 0xd4, 0x26, + 0x63, 0xb4, 0x0f, 0xa5, 0x38, 0x62, 0xa2, 0x8b, 0x0e, 0x22, 0x0f, 0x9b, 0x48, 0xd2, 0xa0, 0xa0, + 0xe3, 0xc8, 0x93, 0x3d, 0x99, 0x62, 0x9f, 0x44, 0xa1, 0x79, 0x5b, 0x7d, 0x53, 0xd5, 0x08, 0xdd, + 0x83, 0x4d, 0xc6, 0x29, 0xc6, 0xbc, 0xef, 0x7a, 0x1e, 0xc5, 0x8c, 0x99, 0x3b, 0x92, 0xdf, 0x50, + 0x68, 0x43, 0x81, 0xe2, 0xda, 0xb3, 0xd8, 0x19, 0xff, 0xbf, 0x6b, 0x4f, 0xe5, 0x1c, 0xf4, 0xe9, + 0x4d, 0x04, 0x99, 0xb0, 0xd3, 0x71, 0x4e, 0xba, 0xbd, 0x46, 0xcf, 0xee, 0x5f, 0xb4, 0xbb, 0xe7, + 0xf6, 0x71, 0xeb, 0x8b, 0x96, 0xdd, 0x34, 0x6e, 0xa1, 0xdb, 0xb0, 0x35, 0x63, 0x1a, 0xc7, 0xbd, + 0xd6, 0x53, 0xdb, 0xd0, 0xd0, 0x3b, 0xb0, 0x3d, 0x03, 0x5b, 0xed, 0x04, 0xce, 0x54, 0x7e, 0x01, + 0xeb, 0xf3, 0x1f, 0x40, 0x74, 0x17, 0x4c, 0x21, 0xb3, 0x1b, 0xce, 0xf1, 0xe3, 0x27, 0xf6, 0x4f, + 0x16, 0x3c, 0xbf, 0x0b, 0xef, 0xa4, 0xd8, 0x8e, 0x73, 0xd2, 0x6f, 0x37, 0xce, 0x84, 0xff, 0x3b, + 0x70, 0x3b, 0x45, 0x35, 0x3b, 0x67, 0x8d, 0x56, 0xdb, 0xc8, 0xa0, 0x5d, 0x40, 0x29, 0x42, 0x86, + 0x60, 0x64, 0x2b, 0x41, 0xf2, 0xad, 0xb9, 0xfa, 0x6e, 0xa2, 0x32, 0xec, 0xce, 0xa4, 0x67, 0x76, + 0xef, 0x71, 0xa7, 0xd9, 0xb7, 0xbf, 0xbc, 0x68, 0x9c, 0x76, 0x8d, 0x5b, 0x68, 0x1f, 0xf6, 0x16, + 0xb9, 0x6e, 0xaf, 0xe1, 0xf4, 0xba, 0xfd, 0x1f, 0xb5, 0x7a, 0x8f, 0x0d, 0x2d, 0x15, 0x79, 0x22, + 0x38, 0xee, 0xb4, 0x7b, 0x8d, 0x56, 0xbb, 0x6b, 0x64, 0x2a, 0x7f, 0xd6, 0xa0, 0x38, 0x6b, 0x19, + 0x62, 0x1d, 0x17, 0x5d, 0xdb, 0x59, 0x96, 0xbc, 0x1d, 0x30, 0xae, 0xa8, 0x59, 0xf6, 0x76, 0x01, + 0x5d, 0xa1, 0x57, 0xe9, 0x13, 0x59, 0xbd, 0xc2, 0x9b, 0xf6, 0xa9, 0xdd, 0xb3, 0x9b, 0x46, 0x36, + 0xed, 0xe4, 0xb4, 0x73, 0xfc, 0xc4, 0x6e, 0x1a, 0xb9, 0xb4, 0xb8, 0x7b, 0xd1, 0x3d, 0xb7, 0xdb, + 0x4d, 0x23, 0x9f, 0x86, 0x5b, 0xed, 0x56, 0xaf, 0xd5, 0x38, 0x35, 0x0a, 0x95, 0x1f, 0x43, 0x41, + 0x9d, 0x32, 0x31, 0xf9, 0x89, 0xdd, 0x6e, 0xda, 0xce, 0x42, 0xa8, 0xdb, 0xb0, 0x91, 0xe0, 0x5f, + 0xd8, 0x67, 0x8d, 0x53, 0x11, 0xe7, 0x16, 0x94, 0x12, 0x48, 0x02, 0x19, 0x84, 0x60, 0x33, 0x01, + 0x9a, 0xad, 0xa7, 0xb6, 0xd3, 0xb5, 0x8d, 0x6c, 0xfd, 0xdf, 0x79, 0x58, 0x6f, 0x88, 0xd3, 0xdc, + 0xc5, 0xf4, 0x25, 0x19, 0x60, 0xf4, 0x04, 0xd6, 0x1e, 0x63, 0x37, 0xe0, 0xc3, 0xaf, 0xd0, 0xee, + 0xb5, 0x7e, 0x67, 0x8b, 0x17, 0x48, 0x79, 0x05, 0x6e, 0x19, 0xaf, 0xff, 0xf6, 0x8f, 0x3f, 0x64, + 0x00, 0xe9, 0xb5, 0x61, 0xe2, 0xe1, 0x04, 0xf2, 0x0e, 0x76, 0xbd, 0xc9, 0x5b, 0xbb, 0xda, 0x94, + 0xae, 0x74, 0x54, 0xa8, 0x51, 0x69, 0xdf, 0x06, 0xfd, 0x69, 0xf2, 0x50, 0x59, 0xe9, 0xeb, 0xce, + 0x35, 0xbc, 0x2b, 0x9f, 0x3c, 0xd6, 0xb6, 0x74, 0x56, 0x42, 0xc5, 0xd9, 0x63, 0x07, 0xfd, 0x46, + 0x83, 0x52, 0x8b, 0x75, 0xa8, 0xaf, 0x5e, 0x04, 0x68, 0xc5, 0x65, 0x66, 0xf1, 0xa5, 0x52, 0xfe, + 0xf6, 0x8d, 0x3a, 0x75, 0x3b, 0xb1, 0xee, 0xbd, 0xfe, 0x8b, 0x09, 0xa0, 0x13, 0x77, 0x54, 0x15, + 0x2b, 0x90, 0x11, 0x6c, 0xa3, 0xad, 0x5a, 0x44, 0x7d, 0x56, 0xeb, 0x13, 0xa6, 0x5e, 0x26, 0xe8, + 0x12, 0xe0, 0x04, 0xf3, 0x0e, 0xf5, 0x8f, 0x26, 0xad, 0x26, 0xda, 0x5b, 0x79, 0x8b, 0x69, 0x35, + 0xcb, 0xab, 0xaf, 0x38, 0xd6, 0xc1, 0x92, 0xc9, 0xd6, 0x11, 0xa8, 0xc9, 0x7e, 0x49, 0xbc, 0x5f, + 0x89, 0xf5, 0x82, 0x3a, 0x5e, 0x1d, 0xea, 0xb3, 0x55, 0xcb, 0x5d, 0x7c, 0x1b, 0xac, 0x5a, 0xee, + 0xb5, 0x1b, 0xab, 0x75, 0x7f, 0x49, 0x04, 0xc8, 0xda, 0x48, 0x96, 0xcb, 0xa4, 0xf8, 0x50, 0xab, + 0xa0, 0x5f, 0x6b, 0xa0, 0xcb, 0x6b, 0x9c, 0x78, 0x7e, 0xbd, 0xe9, 0x06, 0x7d, 0x75, 0xeb, 0x2c, + 0xdf, 0xbf, 0x49, 0x36, 0x17, 0x43, 0x09, 0x8a, 0x22, 0x86, 0x57, 0x94, 0x70, 0xac, 0x72, 0x6e, + 0xad, 0xcf, 0x82, 0xe0, 0xe3, 0xf8, 0x50, 0xab, 0x1c, 0xfd, 0x55, 0xfb, 0x7d, 0xe3, 0x77, 0x1a, + 0x6a, 0xc0, 0x86, 0xf4, 0x77, 0xc0, 0x54, 0xe5, 0x5b, 0x1f, 0xa3, 0x8f, 0x86, 0x9c, 0xc7, 0xec, + 0xb0, 0x56, 0xf3, 0x09, 0x1f, 0x8e, 0x9f, 0x55, 0x07, 0xd1, 0xa8, 0x36, 0x70, 0x23, 0x56, 0x4b, + 0x02, 0xa8, 0xc5, 0xcf, 0xfd, 0x9a, 0x34, 0xaa, 0x67, 0x3f, 0xa9, 0x3e, 0xaa, 0x68, 0x99, 0xba, + 0xe1, 0xc6, 0x71, 0x40, 0x06, 0xf2, 0xe6, 0x50, 0xfb, 0x39, 0x8b, 0xc2, 0x34, 0xe2, 0xd3, 0x78, + 0x70, 0x78, 0x4d, 0x73, 0x78, 0x4d, 0xf3, 0xd3, 0xca, 0x8d, 0x53, 0xca, 0xff, 0x12, 0x08, 0xed, + 0xb3, 0x82, 0x2c, 0xf0, 0xef, 0xfe, 0x37, 0x00, 0x00, 0xff, 0xff, 0x70, 0xfd, 0x92, 0x95, 0x62, + 0x10, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AdminServiceClient is the client API for AdminService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AdminServiceClient interface { + // Healthz returns status OK as soon as the service started + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //ORG + IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) + SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) +} + +type adminServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAdminServiceClient(cc grpc.ClientConnInterface) AdminServiceClient { + return &adminServiceClient{cc} +} + +func (c *adminServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) { + out := new(UniqueOrgResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/IsOrgUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) { + out := new(OrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SearchOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) { + out := new(OrgSetUpResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SetUpOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AdminServiceServer is the server API for AdminService service. +type AdminServiceServer interface { + // Healthz returns status OK as soon as the service started + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //ORG + IsOrgUnique(context.Context, *UniqueOrgRequest) (*UniqueOrgResponse, error) + GetOrgByID(context.Context, *OrgID) (*Org, error) + SearchOrgs(context.Context, *OrgSearchRequest) (*OrgSearchResponse, error) + SetUpOrg(context.Context, *OrgSetUpRequest) (*OrgSetUpResponse, error) +} + +// UnimplementedAdminServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAdminServiceServer struct { +} + +func (*UnimplementedAdminServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAdminServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAdminServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAdminServiceServer) IsOrgUnique(ctx context.Context, req *UniqueOrgRequest) (*UniqueOrgResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsOrgUnique not implemented") +} +func (*UnimplementedAdminServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedAdminServiceServer) SearchOrgs(ctx context.Context, req *OrgSearchRequest) (*OrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgs not implemented") +} +func (*UnimplementedAdminServiceServer) SetUpOrg(ctx context.Context, req *OrgSetUpRequest) (*OrgSetUpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetUpOrg not implemented") +} + +func RegisterAdminServiceServer(s *grpc.Server, srv AdminServiceServer) { + s.RegisterService(&_AdminService_serviceDesc, srv) +} + +func _AdminService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_IsOrgUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueOrgRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).IsOrgUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/IsOrgUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).IsOrgUnique(ctx, req.(*UniqueOrgRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SearchOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SearchOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SearchOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SearchOrgs(ctx, req.(*OrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SetUpOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSetUpRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SetUpOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SetUpOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SetUpOrg(ctx, req.(*OrgSetUpRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _AdminService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.admin.api.v1.AdminService", + HandlerType: (*AdminServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AdminService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AdminService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AdminService_Validate_Handler, + }, + { + MethodName: "IsOrgUnique", + Handler: _AdminService_IsOrgUnique_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _AdminService_GetOrgByID_Handler, + }, + { + MethodName: "SearchOrgs", + Handler: _AdminService_SearchOrgs_Handler, + }, + { + MethodName: "SetUpOrg", + Handler: _AdminService_SetUpOrg_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "admin.proto", +} diff --git a/pkg/admin/api/grpc/admin.pb.gw.go b/pkg/admin/api/grpc/admin.pb.gw.go new file mode 100644 index 0000000000..d5c56470e2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.gw.go @@ -0,0 +1,348 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: admin.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AdminService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AdminService_IsOrgUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_AdminService_IsOrgUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueOrgRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AdminService_IsOrgUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsOrgUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SearchOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SetUpOrg_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSetUpRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetUpOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAdminServiceHandlerFromEndpoint is same as RegisterAdminServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAdminServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAdminServiceHandler(ctx, mux, conn) +} + +// RegisterAdminServiceHandler registers the http handlers for service AdminService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAdminServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAdminServiceHandlerClient(ctx, mux, NewAdminServiceClient(conn)) +} + +// RegisterAdminServiceHandlerClient registers the http handlers for service AdminService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AdminServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AdminServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AdminServiceClient" to call the correct interceptors. +func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AdminServiceClient) error { + + mux.Handle("GET", pattern_AdminService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_IsOrgUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_IsOrgUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_IsOrgUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SearchOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SearchOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SearchOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SetUpOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SetUpOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SetUpOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AdminService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AdminService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AdminService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AdminService_IsOrgUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_isunique"}, "")) + + pattern_AdminService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_AdminService_SearchOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_search"}, "")) + + pattern_AdminService_SetUpOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_setup"}, "")) +) + +var ( + forward_AdminService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AdminService_Ready_0 = runtime.ForwardResponseMessage + + forward_AdminService_Validate_0 = runtime.ForwardResponseMessage + + forward_AdminService_IsOrgUnique_0 = runtime.ForwardResponseMessage + + forward_AdminService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_AdminService_SearchOrgs_0 = runtime.ForwardResponseMessage + + forward_AdminService_SetUpOrg_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json new file mode 100644 index 0000000000..c312a23b6f --- /dev/null +++ b/pkg/admin/api/grpc/admin.swagger.json @@ -0,0 +1,530 @@ +{ + "swagger": "2.0", + "info": { + "title": "admin service", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/admin" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/healthz": { + "get": { + "summary": "Healthz returns status OK as soon as the service started", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_isunique": { + "get": { + "summary": "ORG", + "operationId": "IsOrgUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueOrgResponse" + } + } + }, + "parameters": [ + { + "name": "name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "domain", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_search": { + "post": { + "operationId": "SearchOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSearchRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_setup": { + "post": { + "operationId": "SetUpOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSetUpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSetUpRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/{id}": { + "get": { + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/ready": { + "get": { + "summary": "Ready returns status OK as soon as all dependent services are available", + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AdminService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1CreateOrgRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgSearchKey": { + "type": "string", + "enum": [ + "ORGSEARCHKEY_UNSPECIFIED", + "ORGSEARCHKEY_ORG_NAME", + "ORGSEARCHKEY_DOMAIN", + "ORGSEARCHKEY_STATE" + ], + "default": "ORGSEARCHKEY_UNSPECIFIED" + }, + "v1OrgSearchMethod": { + "type": "string", + "enum": [ + "ORGSEARCHMETHOD_EQUALS", + "ORGSEARCHMETHOD_STARTS_WITH", + "ORGSEARCHMETHOD_CONTAINS" + ], + "default": "ORGSEARCHMETHOD_EQUALS" + }, + "v1OrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1OrgSearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgSearchQuery" + } + } + } + }, + "v1OrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1OrgSetUpRequest": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1CreateOrgRequest" + }, + "user": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + }, + "v1OrgSetUpResponse": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1Org" + }, + "user": { + "$ref": "#/definitions/v1User" + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1UniqueOrgResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "isPhoneVerified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go new file mode 100644 index 0000000000..253d6aee69 --- /dev/null +++ b/pkg/admin/api/grpc/mock/admin.proto.mock.go @@ -0,0 +1,178 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/admin/api/grpc (interfaces: AdminServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/admin/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAdminServiceClient is a mock of AdminServiceClient interface +type MockAdminServiceClient struct { + ctrl *gomock.Controller + recorder *MockAdminServiceClientMockRecorder +} + +// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient +type MockAdminServiceClientMockRecorder struct { + mock *MockAdminServiceClient +} + +// NewMockAdminServiceClient creates a new mock instance +func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient { + mock := &MockAdminServiceClient{ctrl: ctrl} + mock.recorder = &MockAdminServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder { + return m.recorder +} + +// GetOrgByID mocks base method +func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByID", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByID indicates an expected call of GetOrgByID +func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...) +} + +// Healthz mocks base method +func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...) +} + +// IsOrgUnique mocks base method +func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsOrgUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueOrgResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsOrgUnique indicates an expected call of IsOrgUnique +func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...) +} + +// Ready mocks base method +func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...) +} + +// SearchOrgs mocks base method +func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchOrgs", varargs...) + ret0, _ := ret[0].(*grpc.OrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchOrgs indicates an expected call of SearchOrgs +func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...) +} + +// SetUpOrg mocks base method +func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetUpOrg", varargs...) + ret0, _ := ret[0].(*grpc.OrgSetUpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetUpOrg indicates an expected call of SetUpOrg +func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...) +} + +// Validate mocks base method +func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...) +} diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto index ddacca88b9..89a511e792 100644 --- a/pkg/admin/api/proto/admin.proto +++ b/pkg/admin/api/proto/admin.proto @@ -11,14 +11,14 @@ import "authoption/options.proto"; package zitadel.admin.api.v1; -option go_package ="github.com/caos/zitadel/admin/api/grpc"; +option go_package ="github.com/caos/zitadel/pkg/admin/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "admin service"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/admin" + url: "https://github.com/caos/zitadel/pkg/admin" }; }; diff --git a/pkg/auth/api/grpc/auth.pb.authoptions.go b/pkg/auth/api/grpc/auth.pb.authoptions.go new file mode 100644 index 0000000000..669a2836b9 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.authoptions.go @@ -0,0 +1,131 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * AuthService + */ + +var AuthService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.auth.api.v1.AuthService/GetMyUserSessions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyMfas": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SetMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/AddMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/IsIamAdmin": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, +} + +func AuthService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, AuthService_AuthMethods) +} diff --git a/pkg/auth/api/grpc/auth.pb.go b/pkg/auth/api/grpc/auth.pb.go new file mode 100644 index 0000000000..523d941590 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.go @@ -0,0 +1,8128 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: auth.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type UserAgentState int32 + +const ( + UserAgentState_USERAGENTSTATE_UNSPECIFIED UserAgentState = 0 + UserAgentState_USERAGENTSTATE_ACTIVE UserAgentState = 1 + UserAgentState_USERAGENTSTATE_TERMINATED UserAgentState = 2 +) + +var UserAgentState_name = map[int32]string{ + 0: "USERAGENTSTATE_UNSPECIFIED", + 1: "USERAGENTSTATE_ACTIVE", + 2: "USERAGENTSTATE_TERMINATED", +} + +var UserAgentState_value = map[string]int32{ + "USERAGENTSTATE_UNSPECIFIED": 0, + "USERAGENTSTATE_ACTIVE": 1, + "USERAGENTSTATE_TERMINATED": 2, +} + +func (x UserAgentState) String() string { + return proto.EnumName(UserAgentState_name, int32(x)) +} + +func (UserAgentState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{0} +} + +type UserSessionState int32 + +const ( + UserSessionState_USERSESSIONSTATE_UNSPECIFIED UserSessionState = 0 + UserSessionState_USERSESSIONSTATE_ACTIVE UserSessionState = 1 + UserSessionState_USERSESSIONSTATE_TERMINATED UserSessionState = 2 +) + +var UserSessionState_name = map[int32]string{ + 0: "USERSESSIONSTATE_UNSPECIFIED", + 1: "USERSESSIONSTATE_ACTIVE", + 2: "USERSESSIONSTATE_TERMINATED", +} + +var UserSessionState_value = map[string]int32{ + "USERSESSIONSTATE_UNSPECIFIED": 0, + "USERSESSIONSTATE_ACTIVE": 1, + "USERSESSIONSTATE_TERMINATED": 2, +} + +func (x UserSessionState) String() string { + return proto.EnumName(UserSessionState_name, int32(x)) +} + +func (UserSessionState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{1} +} + +type NextStepType int32 + +const ( + NextStepType_NEXTSTEP_UNSPECIFIED NextStepType = 0 + NextStepType_NEXTSTEP_LOGIN NextStepType = 1 + NextStepType_NEXTSTEP_PASSWORD NextStepType = 2 + NextStepType_NEXTSTEP_CHANGE_PASSWORD NextStepType = 3 + NextStepType_NEXTSTEP_MFA_PROMPT NextStepType = 4 + NextStepType_NEXTSTEP_MFA_INIT_CHOICE NextStepType = 5 + NextStepType_NEXTSTEP_MFA_INIT_CREATE NextStepType = 6 + NextStepType_NEXTSTEP_MFA_INIT_VERIFY NextStepType = 7 + NextStepType_NEXTSTEP_MFA_INIT_DONE NextStepType = 8 + NextStepType_NEXTSTEP_MFA_VERIFY NextStepType = 9 + NextStepType_NEXTSTEP_MFA_VERIFY_ASYNC NextStepType = 10 + NextStepType_NEXTSTEP_VERIFY_EMAIL NextStepType = 11 + NextStepType_NEXTSTEP_REDIRECT_TO_CALLBACK NextStepType = 12 + NextStepType_NEXTSTEP_INIT_PASSWORD NextStepType = 13 + NextStepType_NEXTSTEP_CHOOSE_USER NextStepType = 14 +) + +var NextStepType_name = map[int32]string{ + 0: "NEXTSTEP_UNSPECIFIED", + 1: "NEXTSTEP_LOGIN", + 2: "NEXTSTEP_PASSWORD", + 3: "NEXTSTEP_CHANGE_PASSWORD", + 4: "NEXTSTEP_MFA_PROMPT", + 5: "NEXTSTEP_MFA_INIT_CHOICE", + 6: "NEXTSTEP_MFA_INIT_CREATE", + 7: "NEXTSTEP_MFA_INIT_VERIFY", + 8: "NEXTSTEP_MFA_INIT_DONE", + 9: "NEXTSTEP_MFA_VERIFY", + 10: "NEXTSTEP_MFA_VERIFY_ASYNC", + 11: "NEXTSTEP_VERIFY_EMAIL", + 12: "NEXTSTEP_REDIRECT_TO_CALLBACK", + 13: "NEXTSTEP_INIT_PASSWORD", + 14: "NEXTSTEP_CHOOSE_USER", +} + +var NextStepType_value = map[string]int32{ + "NEXTSTEP_UNSPECIFIED": 0, + "NEXTSTEP_LOGIN": 1, + "NEXTSTEP_PASSWORD": 2, + "NEXTSTEP_CHANGE_PASSWORD": 3, + "NEXTSTEP_MFA_PROMPT": 4, + "NEXTSTEP_MFA_INIT_CHOICE": 5, + "NEXTSTEP_MFA_INIT_CREATE": 6, + "NEXTSTEP_MFA_INIT_VERIFY": 7, + "NEXTSTEP_MFA_INIT_DONE": 8, + "NEXTSTEP_MFA_VERIFY": 9, + "NEXTSTEP_MFA_VERIFY_ASYNC": 10, + "NEXTSTEP_VERIFY_EMAIL": 11, + "NEXTSTEP_REDIRECT_TO_CALLBACK": 12, + "NEXTSTEP_INIT_PASSWORD": 13, + "NEXTSTEP_CHOOSE_USER": 14, +} + +func (x NextStepType) String() string { + return proto.EnumName(NextStepType_name, int32(x)) +} + +func (NextStepType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{2} +} + +type AuthSessionType int32 + +const ( + AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED AuthSessionType = 0 + AuthSessionType_AUTHSESSIONTYPE_OIDC AuthSessionType = 1 + AuthSessionType_AUTHSESSIONTYPE_SAML AuthSessionType = 2 +) + +var AuthSessionType_name = map[int32]string{ + 0: "AUTHSESSIONTYPE_UNSPECIFIED", + 1: "AUTHSESSIONTYPE_OIDC", + 2: "AUTHSESSIONTYPE_SAML", +} + +var AuthSessionType_value = map[string]int32{ + "AUTHSESSIONTYPE_UNSPECIFIED": 0, + "AUTHSESSIONTYPE_OIDC": 1, + "AUTHSESSIONTYPE_SAML": 2, +} + +func (x AuthSessionType) String() string { + return proto.EnumName(AuthSessionType_name, int32(x)) +} + +func (AuthSessionType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{3} +} + +type Prompt int32 + +const ( + Prompt_PROMPT_UNSPECIFIED Prompt = 0 + Prompt_PROMPT_NONE Prompt = 1 + Prompt_PROMPT_LOGIN Prompt = 2 + Prompt_PROMPT_CONSENT Prompt = 3 + Prompt_PROMPT_SELECT_ACCOUNT Prompt = 4 +) + +var Prompt_name = map[int32]string{ + 0: "PROMPT_UNSPECIFIED", + 1: "PROMPT_NONE", + 2: "PROMPT_LOGIN", + 3: "PROMPT_CONSENT", + 4: "PROMPT_SELECT_ACCOUNT", +} + +var Prompt_value = map[string]int32{ + "PROMPT_UNSPECIFIED": 0, + "PROMPT_NONE": 1, + "PROMPT_LOGIN": 2, + "PROMPT_CONSENT": 3, + "PROMPT_SELECT_ACCOUNT": 4, +} + +func (x Prompt) String() string { + return proto.EnumName(Prompt_name, int32(x)) +} + +func (Prompt) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{4} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN_TOKEN OIDCResponseType = 2 +) + +var OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_ID_TOKEN_TOKEN", +} + +var OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN": 2, +} + +func (x OIDCResponseType) String() string { + return proto.EnumName(OIDCResponseType_name, int32(x)) +} + +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{5} +} + +type CodeChallengeMethod int32 + +const ( + CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN CodeChallengeMethod = 0 + CodeChallengeMethod_CODECHALLENGEMETHOD_S256 CodeChallengeMethod = 1 +) + +var CodeChallengeMethod_name = map[int32]string{ + 0: "CODECHALLENGEMETHOD_PLAIN", + 1: "CODECHALLENGEMETHOD_S256", +} + +var CodeChallengeMethod_value = map[string]int32{ + "CODECHALLENGEMETHOD_PLAIN": 0, + "CODECHALLENGEMETHOD_S256": 1, +} + +func (x CodeChallengeMethod) String() string { + return proto.EnumName(CodeChallengeMethod_name, int32(x)) +} + +func (CodeChallengeMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{6} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIEFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIEFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIEFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{7} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{8} +} + +type NotificationType int32 + +const ( + NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 + NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 +) + +var NotificationType_name = map[int32]string{ + 0: "NOTIFICATIONTYPE_EMAIL", + 1: "NOTIFICATIONTYPE_SMS", +} + +var NotificationType_value = map[string]int32{ + "NOTIFICATIONTYPE_EMAIL": 0, + "NOTIFICATIONTYPE_SMS": 1, +} + +func (x NotificationType) String() string { + return proto.EnumName(NotificationType_name, int32(x)) +} + +func (NotificationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{9} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +var MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", +} + +var MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, +} + +func (x MfaType) String() string { + return proto.EnumName(MfaType_name, int32(x)) +} + +func (MfaType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{10} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +var MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", +} + +var MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, +} + +func (x MFAState) String() string { + return proto.EnumName(MFAState_name, int32(x)) +} + +func (MFAState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{11} +} + +type AppState int32 + +const ( + AppState_APPSTATE_UNSPECIFIED AppState = 0 + AppState_APPSTATE_ACTIVE AppState = 1 + AppState_APPSTATE_INACTIVE AppState = 2 + AppState_APPSTATE_DELETED AppState = 3 +) + +var AppState_name = map[int32]string{ + 0: "APPSTATE_UNSPECIFIED", + 1: "APPSTATE_ACTIVE", + 2: "APPSTATE_INACTIVE", + 3: "APPSTATE_DELETED", +} + +var AppState_value = map[string]int32{ + "APPSTATE_UNSPECIFIED": 0, + "APPSTATE_ACTIVE": 1, + "APPSTATE_INACTIVE": 2, + "APPSTATE_DELETED": 3, +} + +func (x AppState) String() string { + return proto.EnumName(AppState_name, int32(x)) +} + +func (AppState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{12} +} + +type OIDCGrantType int32 + +const ( + OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 + OIDCGrantType_OIDCGRANTTYPE_GRANT_TYPE_NONE OIDCGrantType = 1 + OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +) + +var OIDCGrantType_name = map[int32]string{ + 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", + 1: "OIDCGRANTTYPE_GRANT_TYPE_NONE", + 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +} + +var OIDCGrantType_value = map[string]int32{ + "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, + "OIDCGRANTTYPE_GRANT_TYPE_NONE": 1, + "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +} + +func (x OIDCGrantType) String() string { + return proto.EnumName(OIDCGrantType_name, int32(x)) +} + +func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{13} +} + +type OIDCApplicationType int32 + +const ( + OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 + OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 + OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 +) + +var OIDCApplicationType_name = map[int32]string{ + 0: "OIDCAPPLICATIONTYPE_WEB", + 1: "OIDCAPPLICATIONTYPE_USER_AGENT", + 2: "OIDCAPPLICATIONTYPE_NATIVE", +} + +var OIDCApplicationType_value = map[string]int32{ + "OIDCAPPLICATIONTYPE_WEB": 0, + "OIDCAPPLICATIONTYPE_USER_AGENT": 1, + "OIDCAPPLICATIONTYPE_NATIVE": 2, +} + +func (x OIDCApplicationType) String() string { + return proto.EnumName(OIDCApplicationType_name, int32(x)) +} + +func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{14} +} + +type OIDCAuthMethodType int32 + +const ( + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 +) + +var OIDCAuthMethodType_name = map[int32]string{ + 0: "OIDCAUTHMETHODTYPE_BASIC", + 1: "OIDCAUTHMETHODTYPE_POST", + 2: "OIDCAUTHMETHODTYPE_NONE", +} + +var OIDCAuthMethodType_value = map[string]int32{ + "OIDCAUTHMETHODTYPE_BASIC": 0, + "OIDCAUTHMETHODTYPE_POST": 1, + "OIDCAUTHMETHODTYPE_NONE": 2, +} + +func (x OIDCAuthMethodType) String() string { + return proto.EnumName(OIDCAuthMethodType_name, int32(x)) +} + +func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{15} +} + +type ApplicationSearchKey int32 + +const ( + ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED ApplicationSearchKey = 0 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_TYPE ApplicationSearchKey = 1 + ApplicationSearchKey_APPLICATIONSEARCHKEY_STATE ApplicationSearchKey = 2 + ApplicationSearchKey_APPLICATIONSEARCHKEY_CLIENT_ID ApplicationSearchKey = 3 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 4 + ApplicationSearchKey_APPLICATIONSEARCHKEY_PROJECT_ID ApplicationSearchKey = 5 +) + +var ApplicationSearchKey_name = map[int32]string{ + 0: "APPLICATIONSEARCHKEY_UNSPECIFIED", + 1: "APPLICATIONSEARCHKEY_APP_TYPE", + 2: "APPLICATIONSEARCHKEY_STATE", + 3: "APPLICATIONSEARCHKEY_CLIENT_ID", + 4: "APPLICATIONSEARCHKEY_APP_NAME", + 5: "APPLICATIONSEARCHKEY_PROJECT_ID", +} + +var ApplicationSearchKey_value = map[string]int32{ + "APPLICATIONSEARCHKEY_UNSPECIFIED": 0, + "APPLICATIONSEARCHKEY_APP_TYPE": 1, + "APPLICATIONSEARCHKEY_STATE": 2, + "APPLICATIONSEARCHKEY_CLIENT_ID": 3, + "APPLICATIONSEARCHKEY_APP_NAME": 4, + "APPLICATIONSEARCHKEY_PROJECT_ID": 5, +} + +func (x ApplicationSearchKey) String() string { + return proto.EnumName(ApplicationSearchKey_name, int32(x)) +} + +func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{16} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +var SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", +} + +var SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, +} + +func (x SearchMethod) String() string { + return proto.EnumName(SearchMethod_name, int32(x)) +} + +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{17} +} + +type GrantSearchKey int32 + +const ( + GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED GrantSearchKey = 0 + GrantSearchKey_GRANTSEARCHKEY_ORG_ID GrantSearchKey = 1 + GrantSearchKey_GRANTSEARCHKEY_PROJECT_ID GrantSearchKey = 2 + GrantSearchKey_GRANTSEARCHKEY_USER_ID GrantSearchKey = 3 +) + +var GrantSearchKey_name = map[int32]string{ + 0: "GRANTSEARCHKEY_UNSPECIFIED", + 1: "GRANTSEARCHKEY_ORG_ID", + 2: "GRANTSEARCHKEY_PROJECT_ID", + 3: "GRANTSEARCHKEY_USER_ID", +} + +var GrantSearchKey_value = map[string]int32{ + "GRANTSEARCHKEY_UNSPECIFIED": 0, + "GRANTSEARCHKEY_ORG_ID": 1, + "GRANTSEARCHKEY_PROJECT_ID": 2, + "GRANTSEARCHKEY_USER_ID": 3, +} + +func (x GrantSearchKey) String() string { + return proto.EnumName(GrantSearchKey_name, int32(x)) +} + +func (GrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{18} +} + +type MyProjectOrgSearchKey int32 + +const ( + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED MyProjectOrgSearchKey = 0 + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_ORG_NAME MyProjectOrgSearchKey = 1 +) + +var MyProjectOrgSearchKey_name = map[int32]string{ + 0: "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + 1: "MYPROJECTORGSEARCHKEY_ORG_NAME", +} + +var MyProjectOrgSearchKey_value = map[string]int32{ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED": 0, + "MYPROJECTORGSEARCHKEY_ORG_NAME": 1, +} + +func (x MyProjectOrgSearchKey) String() string { + return proto.EnumName(MyProjectOrgSearchKey_name, int32(x)) +} + +func (MyProjectOrgSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{19} +} + +type SessionRequest struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SessionRequest) Reset() { *m = SessionRequest{} } +func (m *SessionRequest) String() string { return proto.CompactTextString(m) } +func (*SessionRequest) ProtoMessage() {} +func (*SessionRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{0} +} + +func (m *SessionRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SessionRequest.Unmarshal(m, b) +} +func (m *SessionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SessionRequest.Marshal(b, m, deterministic) +} +func (m *SessionRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SessionRequest.Merge(m, src) +} +func (m *SessionRequest) XXX_Size() int { + return xxx_messageInfo_SessionRequest.Size(m) +} +func (m *SessionRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SessionRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SessionRequest proto.InternalMessageInfo + +func (m *SessionRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *SessionRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type UserAgent struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + State UserAgentState `protobuf:"varint,3,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserAgentState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgent) Reset() { *m = UserAgent{} } +func (m *UserAgent) String() string { return proto.CompactTextString(m) } +func (*UserAgent) ProtoMessage() {} +func (*UserAgent) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{1} +} + +func (m *UserAgent) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgent.Unmarshal(m, b) +} +func (m *UserAgent) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgent.Marshal(b, m, deterministic) +} +func (m *UserAgent) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgent.Merge(m, src) +} +func (m *UserAgent) XXX_Size() int { + return xxx_messageInfo_UserAgent.Size(m) +} +func (m *UserAgent) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgent.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgent proto.InternalMessageInfo + +func (m *UserAgent) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAgent) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +func (m *UserAgent) GetState() UserAgentState { + if m != nil { + return m.State + } + return UserAgentState_USERAGENTSTATE_UNSPECIFIED +} + +type UserAgentID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgentID) Reset() { *m = UserAgentID{} } +func (m *UserAgentID) String() string { return proto.CompactTextString(m) } +func (*UserAgentID) ProtoMessage() {} +func (*UserAgentID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{2} +} + +func (m *UserAgentID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgentID.Unmarshal(m, b) +} +func (m *UserAgentID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgentID.Marshal(b, m, deterministic) +} +func (m *UserAgentID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgentID.Merge(m, src) +} +func (m *UserAgentID) XXX_Size() int { + return xxx_messageInfo_UserAgentID.Size(m) +} +func (m *UserAgentID) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgentID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgentID proto.InternalMessageInfo + +func (m *UserAgentID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserAgentCreation struct { + BrowserInfo *BrowserInformation `protobuf:"bytes,1,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgentCreation) Reset() { *m = UserAgentCreation{} } +func (m *UserAgentCreation) String() string { return proto.CompactTextString(m) } +func (*UserAgentCreation) ProtoMessage() {} +func (*UserAgentCreation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{3} +} + +func (m *UserAgentCreation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgentCreation.Unmarshal(m, b) +} +func (m *UserAgentCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgentCreation.Marshal(b, m, deterministic) +} +func (m *UserAgentCreation) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgentCreation.Merge(m, src) +} +func (m *UserAgentCreation) XXX_Size() int { + return xxx_messageInfo_UserAgentCreation.Size(m) +} +func (m *UserAgentCreation) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgentCreation.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgentCreation proto.InternalMessageInfo + +func (m *UserAgentCreation) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type UserAgents struct { + Sessions []*UserAgent `protobuf:"bytes,1,rep,name=sessions,proto3" json:"sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgents) Reset() { *m = UserAgents{} } +func (m *UserAgents) String() string { return proto.CompactTextString(m) } +func (*UserAgents) ProtoMessage() {} +func (*UserAgents) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{4} +} + +func (m *UserAgents) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgents.Unmarshal(m, b) +} +func (m *UserAgents) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgents.Marshal(b, m, deterministic) +} +func (m *UserAgents) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgents.Merge(m, src) +} +func (m *UserAgents) XXX_Size() int { + return xxx_messageInfo_UserAgents.Size(m) +} +func (m *UserAgents) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgents.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgents proto.InternalMessageInfo + +func (m *UserAgents) GetSessions() []*UserAgent { + if m != nil { + return m.Sessions + } + return nil +} + +type AuthSessionCreation struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + Type AuthSessionType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` + State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` + Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` + AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` + UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` + LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` + MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` + // Types that are valid to be assigned to TypeInfo: + // *AuthSessionCreation_Oidc + TypeInfo isAuthSessionCreation_TypeInfo `protobuf_oneof:"type_info"` + PreselectedUserId string `protobuf:"bytes,13,opt,name=preselected_user_id,json=preselectedUserId,proto3" json:"preselected_user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionCreation) Reset() { *m = AuthSessionCreation{} } +func (m *AuthSessionCreation) String() string { return proto.CompactTextString(m) } +func (*AuthSessionCreation) ProtoMessage() {} +func (*AuthSessionCreation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{5} +} + +func (m *AuthSessionCreation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionCreation.Unmarshal(m, b) +} +func (m *AuthSessionCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionCreation.Marshal(b, m, deterministic) +} +func (m *AuthSessionCreation) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionCreation.Merge(m, src) +} +func (m *AuthSessionCreation) XXX_Size() int { + return xxx_messageInfo_AuthSessionCreation.Size(m) +} +func (m *AuthSessionCreation) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionCreation.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionCreation proto.InternalMessageInfo + +func (m *AuthSessionCreation) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionCreation) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionCreation) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +func (m *AuthSessionCreation) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionCreation) GetRedirectUri() string { + if m != nil { + return m.RedirectUri + } + return "" +} + +func (m *AuthSessionCreation) GetState() string { + if m != nil { + return m.State + } + return "" +} + +func (m *AuthSessionCreation) GetPrompt() Prompt { + if m != nil { + return m.Prompt + } + return Prompt_PROMPT_UNSPECIFIED +} + +func (m *AuthSessionCreation) GetAuthContextClassReference() []string { + if m != nil { + return m.AuthContextClassReference + } + return nil +} + +func (m *AuthSessionCreation) GetUiLocales() []string { + if m != nil { + return m.UiLocales + } + return nil +} + +func (m *AuthSessionCreation) GetLoginHint() string { + if m != nil { + return m.LoginHint + } + return "" +} + +func (m *AuthSessionCreation) GetMaxAge() uint32 { + if m != nil { + return m.MaxAge + } + return 0 +} + +type isAuthSessionCreation_TypeInfo interface { + isAuthSessionCreation_TypeInfo() +} + +type AuthSessionCreation_Oidc struct { + Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` +} + +func (*AuthSessionCreation_Oidc) isAuthSessionCreation_TypeInfo() {} + +func (m *AuthSessionCreation) GetTypeInfo() isAuthSessionCreation_TypeInfo { + if m != nil { + return m.TypeInfo + } + return nil +} + +func (m *AuthSessionCreation) GetOidc() *AuthRequestOIDC { + if x, ok := m.GetTypeInfo().(*AuthSessionCreation_Oidc); ok { + return x.Oidc + } + return nil +} + +func (m *AuthSessionCreation) GetPreselectedUserId() string { + if m != nil { + return m.PreselectedUserId + } + return "" +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*AuthSessionCreation) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*AuthSessionCreation_Oidc)(nil), + } +} + +type AuthSessionResponse struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` + State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` + Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` + AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` + UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` + LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` + MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` + // Types that are valid to be assigned to TypeInfo: + // *AuthSessionResponse_Oidc + TypeInfo isAuthSessionResponse_TypeInfo `protobuf_oneof:"type_info"` + PossibleSteps []*NextStep `protobuf:"bytes,13,rep,name=possible_steps,json=possibleSteps,proto3" json:"possible_steps,omitempty"` + ProjectClientIds []string `protobuf:"bytes,14,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` + UserSession *UserSession `protobuf:"bytes,15,opt,name=user_session,json=userSession,proto3" json:"user_session,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionResponse) Reset() { *m = AuthSessionResponse{} } +func (m *AuthSessionResponse) String() string { return proto.CompactTextString(m) } +func (*AuthSessionResponse) ProtoMessage() {} +func (*AuthSessionResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{6} +} + +func (m *AuthSessionResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionResponse.Unmarshal(m, b) +} +func (m *AuthSessionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionResponse.Marshal(b, m, deterministic) +} +func (m *AuthSessionResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionResponse.Merge(m, src) +} +func (m *AuthSessionResponse) XXX_Size() int { + return xxx_messageInfo_AuthSessionResponse.Size(m) +} +func (m *AuthSessionResponse) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionResponse proto.InternalMessageInfo + +func (m *AuthSessionResponse) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionResponse) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *AuthSessionResponse) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionResponse) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionResponse) GetRedirectUri() string { + if m != nil { + return m.RedirectUri + } + return "" +} + +func (m *AuthSessionResponse) GetState() string { + if m != nil { + return m.State + } + return "" +} + +func (m *AuthSessionResponse) GetPrompt() Prompt { + if m != nil { + return m.Prompt + } + return Prompt_PROMPT_UNSPECIFIED +} + +func (m *AuthSessionResponse) GetAuthContextClassReference() []string { + if m != nil { + return m.AuthContextClassReference + } + return nil +} + +func (m *AuthSessionResponse) GetUiLocales() []string { + if m != nil { + return m.UiLocales + } + return nil +} + +func (m *AuthSessionResponse) GetLoginHint() string { + if m != nil { + return m.LoginHint + } + return "" +} + +func (m *AuthSessionResponse) GetMaxAge() uint32 { + if m != nil { + return m.MaxAge + } + return 0 +} + +type isAuthSessionResponse_TypeInfo interface { + isAuthSessionResponse_TypeInfo() +} + +type AuthSessionResponse_Oidc struct { + Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` +} + +func (*AuthSessionResponse_Oidc) isAuthSessionResponse_TypeInfo() {} + +func (m *AuthSessionResponse) GetTypeInfo() isAuthSessionResponse_TypeInfo { + if m != nil { + return m.TypeInfo + } + return nil +} + +func (m *AuthSessionResponse) GetOidc() *AuthRequestOIDC { + if x, ok := m.GetTypeInfo().(*AuthSessionResponse_Oidc); ok { + return x.Oidc + } + return nil +} + +func (m *AuthSessionResponse) GetPossibleSteps() []*NextStep { + if m != nil { + return m.PossibleSteps + } + return nil +} + +func (m *AuthSessionResponse) GetProjectClientIds() []string { + if m != nil { + return m.ProjectClientIds + } + return nil +} + +func (m *AuthSessionResponse) GetUserSession() *UserSession { + if m != nil { + return m.UserSession + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*AuthSessionResponse) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*AuthSessionResponse_Oidc)(nil), + } +} + +type AuthSessionView struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + UserSessionId string `protobuf:"bytes,5,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + ProjectClientIds []string `protobuf:"bytes,6,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` + TokenId string `protobuf:"bytes,7,opt,name=token_id,json=tokenId,proto3" json:"token_id,omitempty"` + TokenExpiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=token_expiration,json=tokenExpiration,proto3" json:"token_expiration,omitempty"` + UserId string `protobuf:"bytes,9,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionView) Reset() { *m = AuthSessionView{} } +func (m *AuthSessionView) String() string { return proto.CompactTextString(m) } +func (*AuthSessionView) ProtoMessage() {} +func (*AuthSessionView) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{7} +} + +func (m *AuthSessionView) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionView.Unmarshal(m, b) +} +func (m *AuthSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionView.Marshal(b, m, deterministic) +} +func (m *AuthSessionView) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionView.Merge(m, src) +} +func (m *AuthSessionView) XXX_Size() int { + return xxx_messageInfo_AuthSessionView.Size(m) +} +func (m *AuthSessionView) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionView.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionView proto.InternalMessageInfo + +func (m *AuthSessionView) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionView) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *AuthSessionView) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionView) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionView) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *AuthSessionView) GetProjectClientIds() []string { + if m != nil { + return m.ProjectClientIds + } + return nil +} + +func (m *AuthSessionView) GetTokenId() string { + if m != nil { + return m.TokenId + } + return "" +} + +func (m *AuthSessionView) GetTokenExpiration() *timestamp.Timestamp { + if m != nil { + return m.TokenExpiration + } + return nil +} + +func (m *AuthSessionView) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type TokenID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *TokenID) Reset() { *m = TokenID{} } +func (m *TokenID) String() string { return proto.CompactTextString(m) } +func (*TokenID) ProtoMessage() {} +func (*TokenID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{8} +} + +func (m *TokenID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_TokenID.Unmarshal(m, b) +} +func (m *TokenID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_TokenID.Marshal(b, m, deterministic) +} +func (m *TokenID) XXX_Merge(src proto.Message) { + xxx_messageInfo_TokenID.Merge(m, src) +} +func (m *TokenID) XXX_Size() int { + return xxx_messageInfo_TokenID.Size(m) +} +func (m *TokenID) XXX_DiscardUnknown() { + xxx_messageInfo_TokenID.DiscardUnknown(m) +} + +var xxx_messageInfo_TokenID proto.InternalMessageInfo + +func (m *TokenID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserSessionID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionID) Reset() { *m = UserSessionID{} } +func (m *UserSessionID) String() string { return proto.CompactTextString(m) } +func (*UserSessionID) ProtoMessage() {} +func (*UserSessionID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{9} +} + +func (m *UserSessionID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionID.Unmarshal(m, b) +} +func (m *UserSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionID.Marshal(b, m, deterministic) +} +func (m *UserSessionID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionID.Merge(m, src) +} +func (m *UserSessionID) XXX_Size() int { + return xxx_messageInfo_UserSessionID.Size(m) +} +func (m *UserSessionID) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionID proto.InternalMessageInfo + +func (m *UserSessionID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSessionID) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +type UserSessions struct { + UserSessions []*UserSession `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessions) Reset() { *m = UserSessions{} } +func (m *UserSessions) String() string { return proto.CompactTextString(m) } +func (*UserSessions) ProtoMessage() {} +func (*UserSessions) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{10} +} + +func (m *UserSessions) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessions.Unmarshal(m, b) +} +func (m *UserSessions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessions.Marshal(b, m, deterministic) +} +func (m *UserSessions) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessions.Merge(m, src) +} +func (m *UserSessions) XXX_Size() int { + return xxx_messageInfo_UserSessions.Size(m) +} +func (m *UserSessions) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessions.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessions proto.InternalMessageInfo + +func (m *UserSessions) GetUserSessions() []*UserSession { + if m != nil { + return m.UserSessions + } + return nil +} + +type UserSession struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + User *AuthUser `protobuf:"bytes,4,opt,name=user,proto3" json:"user,omitempty"` + PasswordVerified bool `protobuf:"varint,5,opt,name=password_verified,json=passwordVerified,proto3" json:"password_verified,omitempty"` + Mfa MfaType `protobuf:"varint,6,opt,name=mfa,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa,omitempty"` + MfaVerified bool `protobuf:"varint,7,opt,name=mfa_verified,json=mfaVerified,proto3" json:"mfa_verified,omitempty"` + AuthTime *timestamp.Timestamp `protobuf:"bytes,8,opt,name=auth_time,json=authTime,proto3" json:"auth_time,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSession) Reset() { *m = UserSession{} } +func (m *UserSession) String() string { return proto.CompactTextString(m) } +func (*UserSession) ProtoMessage() {} +func (*UserSession) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{11} +} + +func (m *UserSession) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSession.Unmarshal(m, b) +} +func (m *UserSession) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSession.Marshal(b, m, deterministic) +} +func (m *UserSession) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSession.Merge(m, src) +} +func (m *UserSession) XXX_Size() int { + return xxx_messageInfo_UserSession.Size(m) +} +func (m *UserSession) XXX_DiscardUnknown() { + xxx_messageInfo_UserSession.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSession proto.InternalMessageInfo + +func (m *UserSession) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSession) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *UserSession) GetAuthState() UserSessionState { + if m != nil { + return m.AuthState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +func (m *UserSession) GetUser() *AuthUser { + if m != nil { + return m.User + } + return nil +} + +func (m *UserSession) GetPasswordVerified() bool { + if m != nil { + return m.PasswordVerified + } + return false +} + +func (m *UserSession) GetMfa() MfaType { + if m != nil { + return m.Mfa + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *UserSession) GetMfaVerified() bool { + if m != nil { + return m.MfaVerified + } + return false +} + +func (m *UserSession) GetAuthTime() *timestamp.Timestamp { + if m != nil { + return m.AuthTime + } + return nil +} + +type UserSessionViews struct { + UserSessions []*UserSessionView `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionViews) Reset() { *m = UserSessionViews{} } +func (m *UserSessionViews) String() string { return proto.CompactTextString(m) } +func (*UserSessionViews) ProtoMessage() {} +func (*UserSessionViews) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{12} +} + +func (m *UserSessionViews) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionViews.Unmarshal(m, b) +} +func (m *UserSessionViews) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionViews.Marshal(b, m, deterministic) +} +func (m *UserSessionViews) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionViews.Merge(m, src) +} +func (m *UserSessionViews) XXX_Size() int { + return xxx_messageInfo_UserSessionViews.Size(m) +} +func (m *UserSessionViews) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionViews.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionViews proto.InternalMessageInfo + +func (m *UserSessionViews) GetUserSessions() []*UserSessionView { + if m != nil { + return m.UserSessions + } + return nil +} + +type UserSessionView struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + UserId string `protobuf:"bytes,4,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionView) Reset() { *m = UserSessionView{} } +func (m *UserSessionView) String() string { return proto.CompactTextString(m) } +func (*UserSessionView) ProtoMessage() {} +func (*UserSessionView) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{13} +} + +func (m *UserSessionView) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionView.Unmarshal(m, b) +} +func (m *UserSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionView.Marshal(b, m, deterministic) +} +func (m *UserSessionView) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionView.Merge(m, src) +} +func (m *UserSessionView) XXX_Size() int { + return xxx_messageInfo_UserSessionView.Size(m) +} +func (m *UserSessionView) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionView.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionView proto.InternalMessageInfo + +func (m *UserSessionView) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSessionView) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *UserSessionView) GetAuthState() UserSessionState { + if m != nil { + return m.AuthState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +func (m *UserSessionView) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserSessionView) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type AuthUser struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthUser) Reset() { *m = AuthUser{} } +func (m *AuthUser) String() string { return proto.CompactTextString(m) } +func (*AuthUser) ProtoMessage() {} +func (*AuthUser) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{14} +} + +func (m *AuthUser) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthUser.Unmarshal(m, b) +} +func (m *AuthUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthUser.Marshal(b, m, deterministic) +} +func (m *AuthUser) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthUser.Merge(m, src) +} +func (m *AuthUser) XXX_Size() int { + return xxx_messageInfo_AuthUser.Size(m) +} +func (m *AuthUser) XXX_DiscardUnknown() { + xxx_messageInfo_AuthUser.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthUser proto.InternalMessageInfo + +func (m *AuthUser) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AuthUser) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type AuthSessionID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionID) Reset() { *m = AuthSessionID{} } +func (m *AuthSessionID) String() string { return proto.CompactTextString(m) } +func (*AuthSessionID) ProtoMessage() {} +func (*AuthSessionID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{15} +} + +func (m *AuthSessionID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionID.Unmarshal(m, b) +} +func (m *AuthSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionID.Marshal(b, m, deterministic) +} +func (m *AuthSessionID) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionID.Merge(m, src) +} +func (m *AuthSessionID) XXX_Size() int { + return xxx_messageInfo_AuthSessionID.Size(m) +} +func (m *AuthSessionID) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionID.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionID proto.InternalMessageInfo + +func (m *AuthSessionID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *AuthSessionID) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionID) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type SelectUserRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + UserSessionId string `protobuf:"bytes,3,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SelectUserRequest) Reset() { *m = SelectUserRequest{} } +func (m *SelectUserRequest) String() string { return proto.CompactTextString(m) } +func (*SelectUserRequest) ProtoMessage() {} +func (*SelectUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{16} +} + +func (m *SelectUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SelectUserRequest.Unmarshal(m, b) +} +func (m *SelectUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SelectUserRequest.Marshal(b, m, deterministic) +} +func (m *SelectUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SelectUserRequest.Merge(m, src) +} +func (m *SelectUserRequest) XXX_Size() int { + return xxx_messageInfo_SelectUserRequest.Size(m) +} +func (m *SelectUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SelectUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SelectUserRequest proto.InternalMessageInfo + +func (m *SelectUserRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *SelectUserRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *SelectUserRequest) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *SelectUserRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyUserRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserRequest) Reset() { *m = VerifyUserRequest{} } +func (m *VerifyUserRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserRequest) ProtoMessage() {} +func (*VerifyUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{17} +} + +func (m *VerifyUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserRequest.Unmarshal(m, b) +} +func (m *VerifyUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserRequest.Merge(m, src) +} +func (m *VerifyUserRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserRequest.Size(m) +} +func (m *VerifyUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserRequest proto.InternalMessageInfo + +func (m *VerifyUserRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyUserRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *VerifyUserRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyPasswordRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyPasswordRequest) Reset() { *m = VerifyPasswordRequest{} } +func (m *VerifyPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyPasswordRequest) ProtoMessage() {} +func (*VerifyPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{18} +} + +func (m *VerifyPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyPasswordRequest.Unmarshal(m, b) +} +func (m *VerifyPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyPasswordRequest.Marshal(b, m, deterministic) +} +func (m *VerifyPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyPasswordRequest.Merge(m, src) +} +func (m *VerifyPasswordRequest) XXX_Size() int { + return xxx_messageInfo_VerifyPasswordRequest.Size(m) +} +func (m *VerifyPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyPasswordRequest proto.InternalMessageInfo + +func (m *VerifyPasswordRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyPasswordRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyPasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *VerifyPasswordRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyMfaRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + // Types that are valid to be assigned to Mfa: + // *VerifyMfaRequest_Otp + Mfa isVerifyMfaRequest_Mfa `protobuf_oneof:"mfa"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMfaRequest) Reset() { *m = VerifyMfaRequest{} } +func (m *VerifyMfaRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyMfaRequest) ProtoMessage() {} +func (*VerifyMfaRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{19} +} + +func (m *VerifyMfaRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMfaRequest.Unmarshal(m, b) +} +func (m *VerifyMfaRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMfaRequest.Marshal(b, m, deterministic) +} +func (m *VerifyMfaRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMfaRequest.Merge(m, src) +} +func (m *VerifyMfaRequest) XXX_Size() int { + return xxx_messageInfo_VerifyMfaRequest.Size(m) +} +func (m *VerifyMfaRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMfaRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMfaRequest proto.InternalMessageInfo + +func (m *VerifyMfaRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyMfaRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyMfaRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type isVerifyMfaRequest_Mfa interface { + isVerifyMfaRequest_Mfa() +} + +type VerifyMfaRequest_Otp struct { + Otp *AuthSessionMultiFactorOTP `protobuf:"bytes,4,opt,name=otp,proto3,oneof"` +} + +func (*VerifyMfaRequest_Otp) isVerifyMfaRequest_Mfa() {} + +func (m *VerifyMfaRequest) GetMfa() isVerifyMfaRequest_Mfa { + if m != nil { + return m.Mfa + } + return nil +} + +func (m *VerifyMfaRequest) GetOtp() *AuthSessionMultiFactorOTP { + if x, ok := m.GetMfa().(*VerifyMfaRequest_Otp); ok { + return x.Otp + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*VerifyMfaRequest) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*VerifyMfaRequest_Otp)(nil), + } +} + +type AuthSessionMultiFactorOTP struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionMultiFactorOTP) Reset() { *m = AuthSessionMultiFactorOTP{} } +func (m *AuthSessionMultiFactorOTP) String() string { return proto.CompactTextString(m) } +func (*AuthSessionMultiFactorOTP) ProtoMessage() {} +func (*AuthSessionMultiFactorOTP) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{20} +} + +func (m *AuthSessionMultiFactorOTP) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Unmarshal(m, b) +} +func (m *AuthSessionMultiFactorOTP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Marshal(b, m, deterministic) +} +func (m *AuthSessionMultiFactorOTP) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionMultiFactorOTP.Merge(m, src) +} +func (m *AuthSessionMultiFactorOTP) XXX_Size() int { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Size(m) +} +func (m *AuthSessionMultiFactorOTP) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionMultiFactorOTP.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionMultiFactorOTP proto.InternalMessageInfo + +func (m *AuthSessionMultiFactorOTP) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type NextStep struct { + Type NextStepType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.NextStepType" json:"type,omitempty"` + // Types that are valid to be assigned to Data: + // *NextStep_Login + // *NextStep_Password + // *NextStep_MfaVerify + // *NextStep_MfaPrompt + // *NextStep_ChooseUser + Data isNextStep_Data `protobuf_oneof:"data"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *NextStep) Reset() { *m = NextStep{} } +func (m *NextStep) String() string { return proto.CompactTextString(m) } +func (*NextStep) ProtoMessage() {} +func (*NextStep) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{21} +} + +func (m *NextStep) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_NextStep.Unmarshal(m, b) +} +func (m *NextStep) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_NextStep.Marshal(b, m, deterministic) +} +func (m *NextStep) XXX_Merge(src proto.Message) { + xxx_messageInfo_NextStep.Merge(m, src) +} +func (m *NextStep) XXX_Size() int { + return xxx_messageInfo_NextStep.Size(m) +} +func (m *NextStep) XXX_DiscardUnknown() { + xxx_messageInfo_NextStep.DiscardUnknown(m) +} + +var xxx_messageInfo_NextStep proto.InternalMessageInfo + +func (m *NextStep) GetType() NextStepType { + if m != nil { + return m.Type + } + return NextStepType_NEXTSTEP_UNSPECIFIED +} + +type isNextStep_Data interface { + isNextStep_Data() +} + +type NextStep_Login struct { + Login *LoginData `protobuf:"bytes,2,opt,name=login,proto3,oneof"` +} + +type NextStep_Password struct { + Password *PasswordData `protobuf:"bytes,3,opt,name=password,proto3,oneof"` +} + +type NextStep_MfaVerify struct { + MfaVerify *MfaVerifyData `protobuf:"bytes,4,opt,name=mfa_verify,json=mfaVerify,proto3,oneof"` +} + +type NextStep_MfaPrompt struct { + MfaPrompt *MfaPromptData `protobuf:"bytes,5,opt,name=mfa_prompt,json=mfaPrompt,proto3,oneof"` +} + +type NextStep_ChooseUser struct { + ChooseUser *ChooseUserData `protobuf:"bytes,6,opt,name=choose_user,json=chooseUser,proto3,oneof"` +} + +func (*NextStep_Login) isNextStep_Data() {} + +func (*NextStep_Password) isNextStep_Data() {} + +func (*NextStep_MfaVerify) isNextStep_Data() {} + +func (*NextStep_MfaPrompt) isNextStep_Data() {} + +func (*NextStep_ChooseUser) isNextStep_Data() {} + +func (m *NextStep) GetData() isNextStep_Data { + if m != nil { + return m.Data + } + return nil +} + +func (m *NextStep) GetLogin() *LoginData { + if x, ok := m.GetData().(*NextStep_Login); ok { + return x.Login + } + return nil +} + +func (m *NextStep) GetPassword() *PasswordData { + if x, ok := m.GetData().(*NextStep_Password); ok { + return x.Password + } + return nil +} + +func (m *NextStep) GetMfaVerify() *MfaVerifyData { + if x, ok := m.GetData().(*NextStep_MfaVerify); ok { + return x.MfaVerify + } + return nil +} + +func (m *NextStep) GetMfaPrompt() *MfaPromptData { + if x, ok := m.GetData().(*NextStep_MfaPrompt); ok { + return x.MfaPrompt + } + return nil +} + +func (m *NextStep) GetChooseUser() *ChooseUserData { + if x, ok := m.GetData().(*NextStep_ChooseUser); ok { + return x.ChooseUser + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*NextStep) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*NextStep_Login)(nil), + (*NextStep_Password)(nil), + (*NextStep_MfaVerify)(nil), + (*NextStep_MfaPrompt)(nil), + (*NextStep_ChooseUser)(nil), + } +} + +type LoginData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *LoginData) Reset() { *m = LoginData{} } +func (m *LoginData) String() string { return proto.CompactTextString(m) } +func (*LoginData) ProtoMessage() {} +func (*LoginData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{22} +} + +func (m *LoginData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_LoginData.Unmarshal(m, b) +} +func (m *LoginData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_LoginData.Marshal(b, m, deterministic) +} +func (m *LoginData) XXX_Merge(src proto.Message) { + xxx_messageInfo_LoginData.Merge(m, src) +} +func (m *LoginData) XXX_Size() int { + return xxx_messageInfo_LoginData.Size(m) +} +func (m *LoginData) XXX_DiscardUnknown() { + xxx_messageInfo_LoginData.DiscardUnknown(m) +} + +var xxx_messageInfo_LoginData proto.InternalMessageInfo + +func (m *LoginData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +type PasswordData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordData) Reset() { *m = PasswordData{} } +func (m *PasswordData) String() string { return proto.CompactTextString(m) } +func (*PasswordData) ProtoMessage() {} +func (*PasswordData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{23} +} + +func (m *PasswordData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordData.Unmarshal(m, b) +} +func (m *PasswordData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordData.Marshal(b, m, deterministic) +} +func (m *PasswordData) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordData.Merge(m, src) +} +func (m *PasswordData) XXX_Size() int { + return xxx_messageInfo_PasswordData.Size(m) +} +func (m *PasswordData) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordData.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordData proto.InternalMessageInfo + +func (m *PasswordData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +func (m *PasswordData) GetFailureCount() uint32 { + if m != nil { + return m.FailureCount + } + return 0 +} + +type MfaVerifyData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` + MfaProviders []MfaType `protobuf:"varint,3,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaVerifyData) Reset() { *m = MfaVerifyData{} } +func (m *MfaVerifyData) String() string { return proto.CompactTextString(m) } +func (*MfaVerifyData) ProtoMessage() {} +func (*MfaVerifyData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{24} +} + +func (m *MfaVerifyData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaVerifyData.Unmarshal(m, b) +} +func (m *MfaVerifyData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaVerifyData.Marshal(b, m, deterministic) +} +func (m *MfaVerifyData) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaVerifyData.Merge(m, src) +} +func (m *MfaVerifyData) XXX_Size() int { + return xxx_messageInfo_MfaVerifyData.Size(m) +} +func (m *MfaVerifyData) XXX_DiscardUnknown() { + xxx_messageInfo_MfaVerifyData.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaVerifyData proto.InternalMessageInfo + +func (m *MfaVerifyData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +func (m *MfaVerifyData) GetFailureCount() uint32 { + if m != nil { + return m.FailureCount + } + return 0 +} + +func (m *MfaVerifyData) GetMfaProviders() []MfaType { + if m != nil { + return m.MfaProviders + } + return nil +} + +type MfaPromptData struct { + Required bool `protobuf:"varint,1,opt,name=required,proto3" json:"required,omitempty"` + MfaProviders []MfaType `protobuf:"varint,2,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaPromptData) Reset() { *m = MfaPromptData{} } +func (m *MfaPromptData) String() string { return proto.CompactTextString(m) } +func (*MfaPromptData) ProtoMessage() {} +func (*MfaPromptData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{25} +} + +func (m *MfaPromptData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaPromptData.Unmarshal(m, b) +} +func (m *MfaPromptData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaPromptData.Marshal(b, m, deterministic) +} +func (m *MfaPromptData) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaPromptData.Merge(m, src) +} +func (m *MfaPromptData) XXX_Size() int { + return xxx_messageInfo_MfaPromptData.Size(m) +} +func (m *MfaPromptData) XXX_DiscardUnknown() { + xxx_messageInfo_MfaPromptData.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaPromptData proto.InternalMessageInfo + +func (m *MfaPromptData) GetRequired() bool { + if m != nil { + return m.Required + } + return false +} + +func (m *MfaPromptData) GetMfaProviders() []MfaType { + if m != nil { + return m.MfaProviders + } + return nil +} + +type ChooseUserData struct { + Users []*ChooseUser `protobuf:"bytes,1,rep,name=users,proto3" json:"users,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChooseUserData) Reset() { *m = ChooseUserData{} } +func (m *ChooseUserData) String() string { return proto.CompactTextString(m) } +func (*ChooseUserData) ProtoMessage() {} +func (*ChooseUserData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{26} +} + +func (m *ChooseUserData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChooseUserData.Unmarshal(m, b) +} +func (m *ChooseUserData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChooseUserData.Marshal(b, m, deterministic) +} +func (m *ChooseUserData) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChooseUserData.Merge(m, src) +} +func (m *ChooseUserData) XXX_Size() int { + return xxx_messageInfo_ChooseUserData.Size(m) +} +func (m *ChooseUserData) XXX_DiscardUnknown() { + xxx_messageInfo_ChooseUserData.DiscardUnknown(m) +} + +var xxx_messageInfo_ChooseUserData proto.InternalMessageInfo + +func (m *ChooseUserData) GetUsers() []*ChooseUser { + if m != nil { + return m.Users + } + return nil +} + +type ChooseUser struct { + UserSessionId string `protobuf:"bytes,1,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + UserSessionState UserSessionState `protobuf:"varint,4,opt,name=user_session_state,json=userSessionState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"user_session_state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChooseUser) Reset() { *m = ChooseUser{} } +func (m *ChooseUser) String() string { return proto.CompactTextString(m) } +func (*ChooseUser) ProtoMessage() {} +func (*ChooseUser) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{27} +} + +func (m *ChooseUser) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChooseUser.Unmarshal(m, b) +} +func (m *ChooseUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChooseUser.Marshal(b, m, deterministic) +} +func (m *ChooseUser) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChooseUser.Merge(m, src) +} +func (m *ChooseUser) XXX_Size() int { + return xxx_messageInfo_ChooseUser.Size(m) +} +func (m *ChooseUser) XXX_DiscardUnknown() { + xxx_messageInfo_ChooseUser.DiscardUnknown(m) +} + +var xxx_messageInfo_ChooseUser proto.InternalMessageInfo + +func (m *ChooseUser) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *ChooseUser) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ChooseUser) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ChooseUser) GetUserSessionState() UserSessionState { + if m != nil { + return m.UserSessionState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +type SkipMfaInitRequest struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SkipMfaInitRequest) Reset() { *m = SkipMfaInitRequest{} } +func (m *SkipMfaInitRequest) String() string { return proto.CompactTextString(m) } +func (*SkipMfaInitRequest) ProtoMessage() {} +func (*SkipMfaInitRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{28} +} + +func (m *SkipMfaInitRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SkipMfaInitRequest.Unmarshal(m, b) +} +func (m *SkipMfaInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SkipMfaInitRequest.Marshal(b, m, deterministic) +} +func (m *SkipMfaInitRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SkipMfaInitRequest.Merge(m, src) +} +func (m *SkipMfaInitRequest) XXX_Size() int { + return xxx_messageInfo_SkipMfaInitRequest.Size(m) +} +func (m *SkipMfaInitRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SkipMfaInitRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SkipMfaInitRequest proto.InternalMessageInfo + +func (m *SkipMfaInitRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type BrowserInformation struct { + UserAgent string `protobuf:"bytes,1,opt,name=user_agent,json=userAgent,proto3" json:"user_agent,omitempty"` + RemoteIp *IP `protobuf:"bytes,2,opt,name=remote_ip,json=remoteIp,proto3" json:"remote_ip,omitempty"` + AcceptLanguage string `protobuf:"bytes,3,opt,name=accept_language,json=acceptLanguage,proto3" json:"accept_language,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *BrowserInformation) Reset() { *m = BrowserInformation{} } +func (m *BrowserInformation) String() string { return proto.CompactTextString(m) } +func (*BrowserInformation) ProtoMessage() {} +func (*BrowserInformation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{29} +} + +func (m *BrowserInformation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_BrowserInformation.Unmarshal(m, b) +} +func (m *BrowserInformation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_BrowserInformation.Marshal(b, m, deterministic) +} +func (m *BrowserInformation) XXX_Merge(src proto.Message) { + xxx_messageInfo_BrowserInformation.Merge(m, src) +} +func (m *BrowserInformation) XXX_Size() int { + return xxx_messageInfo_BrowserInformation.Size(m) +} +func (m *BrowserInformation) XXX_DiscardUnknown() { + xxx_messageInfo_BrowserInformation.DiscardUnknown(m) +} + +var xxx_messageInfo_BrowserInformation proto.InternalMessageInfo + +func (m *BrowserInformation) GetUserAgent() string { + if m != nil { + return m.UserAgent + } + return "" +} + +func (m *BrowserInformation) GetRemoteIp() *IP { + if m != nil { + return m.RemoteIp + } + return nil +} + +func (m *BrowserInformation) GetAcceptLanguage() string { + if m != nil { + return m.AcceptLanguage + } + return "" +} + +type IP struct { + V4 string `protobuf:"bytes,1,opt,name=V4,proto3" json:"V4,omitempty"` + V6 string `protobuf:"bytes,2,opt,name=V6,proto3" json:"V6,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IP) Reset() { *m = IP{} } +func (m *IP) String() string { return proto.CompactTextString(m) } +func (*IP) ProtoMessage() {} +func (*IP) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{30} +} + +func (m *IP) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IP.Unmarshal(m, b) +} +func (m *IP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IP.Marshal(b, m, deterministic) +} +func (m *IP) XXX_Merge(src proto.Message) { + xxx_messageInfo_IP.Merge(m, src) +} +func (m *IP) XXX_Size() int { + return xxx_messageInfo_IP.Size(m) +} +func (m *IP) XXX_DiscardUnknown() { + xxx_messageInfo_IP.DiscardUnknown(m) +} + +var xxx_messageInfo_IP proto.InternalMessageInfo + +func (m *IP) GetV4() string { + if m != nil { + return m.V4 + } + return "" +} + +func (m *IP) GetV6() string { + if m != nil { + return m.V6 + } + return "" +} + +type AuthRequestOIDC struct { + Scope []string `protobuf:"bytes,1,rep,name=scope,proto3" json:"scope,omitempty"` + ResponseType OIDCResponseType `protobuf:"varint,2,opt,name=response_type,json=responseType,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_type,omitempty"` + Nonce string `protobuf:"bytes,3,opt,name=nonce,proto3" json:"nonce,omitempty"` + CodeChallenge *CodeChallenge `protobuf:"bytes,4,opt,name=code_challenge,json=codeChallenge,proto3" json:"code_challenge,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthRequestOIDC) Reset() { *m = AuthRequestOIDC{} } +func (m *AuthRequestOIDC) String() string { return proto.CompactTextString(m) } +func (*AuthRequestOIDC) ProtoMessage() {} +func (*AuthRequestOIDC) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{31} +} + +func (m *AuthRequestOIDC) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthRequestOIDC.Unmarshal(m, b) +} +func (m *AuthRequestOIDC) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthRequestOIDC.Marshal(b, m, deterministic) +} +func (m *AuthRequestOIDC) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthRequestOIDC.Merge(m, src) +} +func (m *AuthRequestOIDC) XXX_Size() int { + return xxx_messageInfo_AuthRequestOIDC.Size(m) +} +func (m *AuthRequestOIDC) XXX_DiscardUnknown() { + xxx_messageInfo_AuthRequestOIDC.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthRequestOIDC proto.InternalMessageInfo + +func (m *AuthRequestOIDC) GetScope() []string { + if m != nil { + return m.Scope + } + return nil +} + +func (m *AuthRequestOIDC) GetResponseType() OIDCResponseType { + if m != nil { + return m.ResponseType + } + return OIDCResponseType_OIDCRESPONSETYPE_CODE +} + +func (m *AuthRequestOIDC) GetNonce() string { + if m != nil { + return m.Nonce + } + return "" +} + +func (m *AuthRequestOIDC) GetCodeChallenge() *CodeChallenge { + if m != nil { + return m.CodeChallenge + } + return nil +} + +type CodeChallenge struct { + Challenge string `protobuf:"bytes,1,opt,name=challenge,proto3" json:"challenge,omitempty"` + Method CodeChallengeMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.CodeChallengeMethod" json:"method,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CodeChallenge) Reset() { *m = CodeChallenge{} } +func (m *CodeChallenge) String() string { return proto.CompactTextString(m) } +func (*CodeChallenge) ProtoMessage() {} +func (*CodeChallenge) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{32} +} + +func (m *CodeChallenge) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CodeChallenge.Unmarshal(m, b) +} +func (m *CodeChallenge) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CodeChallenge.Marshal(b, m, deterministic) +} +func (m *CodeChallenge) XXX_Merge(src proto.Message) { + xxx_messageInfo_CodeChallenge.Merge(m, src) +} +func (m *CodeChallenge) XXX_Size() int { + return xxx_messageInfo_CodeChallenge.Size(m) +} +func (m *CodeChallenge) XXX_DiscardUnknown() { + xxx_messageInfo_CodeChallenge.DiscardUnknown(m) +} + +var xxx_messageInfo_CodeChallenge proto.InternalMessageInfo + +func (m *CodeChallenge) GetChallenge() string { + if m != nil { + return m.Challenge + } + return "" +} + +func (m *CodeChallenge) GetMethod() CodeChallengeMethod { + if m != nil { + return m.Method + } + return CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN +} + +type UserID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserID) Reset() { *m = UserID{} } +func (m *UserID) String() string { return proto.CompactTextString(m) } +func (*UserID) ProtoMessage() {} +func (*UserID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{33} +} + +func (m *UserID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserID.Unmarshal(m, b) +} +func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserID.Marshal(b, m, deterministic) +} +func (m *UserID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserID.Merge(m, src) +} +func (m *UserID) XXX_Size() int { + return xxx_messageInfo_UserID.Size(m) +} +func (m *UserID) XXX_DiscardUnknown() { + xxx_messageInfo_UserID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserID proto.InternalMessageInfo + +func (m *UserID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UniqueUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } +func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueUserRequest) ProtoMessage() {} +func (*UniqueUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{34} +} + +func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) +} +func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) +} +func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserRequest.Merge(m, src) +} +func (m *UniqueUserRequest) XXX_Size() int { + return xxx_messageInfo_UniqueUserRequest.Size(m) +} +func (m *UniqueUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo + +func (m *UniqueUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UniqueUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } +func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueUserResponse) ProtoMessage() {} +func (*UniqueUserResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{35} +} + +func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) +} +func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) +} +func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserResponse.Merge(m, src) +} +func (m *UniqueUserResponse) XXX_Size() int { + return xxx_messageInfo_UniqueUserResponse.Size(m) +} +func (m *UniqueUserResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo + +func (m *UniqueUserResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type RegisterUserRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } +func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserRequest) ProtoMessage() {} +func (*RegisterUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{36} +} + +func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) +} +func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserRequest.Merge(m, src) +} +func (m *RegisterUserRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserRequest.Size(m) +} +func (m *RegisterUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo + +func (m *RegisterUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *RegisterUserRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type RegisterUserExternalIDPRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + IdpProvider *IDPProvider `protobuf:"bytes,8,opt,name=idp_provider,json=idpProvider,proto3" json:"idp_provider,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserExternalIDPRequest) Reset() { *m = RegisterUserExternalIDPRequest{} } +func (m *RegisterUserExternalIDPRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserExternalIDPRequest) ProtoMessage() {} +func (*RegisterUserExternalIDPRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{37} +} + +func (m *RegisterUserExternalIDPRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Unmarshal(m, b) +} +func (m *RegisterUserExternalIDPRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserExternalIDPRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserExternalIDPRequest.Merge(m, src) +} +func (m *RegisterUserExternalIDPRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Size(m) +} +func (m *RegisterUserExternalIDPRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserExternalIDPRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserExternalIDPRequest proto.InternalMessageInfo + +func (m *RegisterUserExternalIDPRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserExternalIDPRequest) GetIdpProvider() *IDPProvider { + if m != nil { + return m.IdpProvider + } + return nil +} + +func (m *RegisterUserExternalIDPRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type IDPProvider struct { + Provider string `protobuf:"bytes,8,opt,name=provider,proto3" json:"provider,omitempty"` + ExternalIdpID string `protobuf:"bytes,9,opt,name=externalIdpID,proto3" json:"externalIdpID,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IDPProvider) Reset() { *m = IDPProvider{} } +func (m *IDPProvider) String() string { return proto.CompactTextString(m) } +func (*IDPProvider) ProtoMessage() {} +func (*IDPProvider) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{38} +} + +func (m *IDPProvider) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IDPProvider.Unmarshal(m, b) +} +func (m *IDPProvider) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IDPProvider.Marshal(b, m, deterministic) +} +func (m *IDPProvider) XXX_Merge(src proto.Message) { + xxx_messageInfo_IDPProvider.Merge(m, src) +} +func (m *IDPProvider) XXX_Size() int { + return xxx_messageInfo_IDPProvider.Size(m) +} +func (m *IDPProvider) XXX_DiscardUnknown() { + xxx_messageInfo_IDPProvider.DiscardUnknown(m) +} + +var xxx_messageInfo_IDPProvider proto.InternalMessageInfo + +func (m *IDPProvider) GetProvider() string { + if m != nil { + return m.Provider + } + return "" +} + +func (m *IDPProvider) GetExternalIdpID() string { + if m != nil { + return m.ExternalIdpID + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ActivationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=activation_date,json=activationDate,proto3" json:"activation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,6,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,7,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,8,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,9,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,10,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,12,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,13,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,14,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,15,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,16,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,17,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,18,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,19,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,20,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,21,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,22,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,23,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + PasswordChangeRequired bool `protobuf:"varint,24,opt,name=password_change_required,json=passwordChangeRequired,proto3" json:"password_change_required,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{39} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIEFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetActivationDate() *timestamp.Timestamp { + if m != nil { + return m.ActivationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetLastLogin() *timestamp.Timestamp { + if m != nil { + return m.LastLogin + } + return nil +} + +func (m *User) GetPasswordChanged() *timestamp.Timestamp { + if m != nil { + return m.PasswordChanged + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +func (m *User) GetPasswordChangeRequired() bool { + if m != nil { + return m.PasswordChangeRequired + } + return false +} + +type UserProfile struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserProfile) Reset() { *m = UserProfile{} } +func (m *UserProfile) String() string { return proto.CompactTextString(m) } +func (*UserProfile) ProtoMessage() {} +func (*UserProfile) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{40} +} + +func (m *UserProfile) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserProfile.Unmarshal(m, b) +} +func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) +} +func (m *UserProfile) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserProfile.Merge(m, src) +} +func (m *UserProfile) XXX_Size() int { + return xxx_messageInfo_UserProfile.Size(m) +} +func (m *UserProfile) XXX_DiscardUnknown() { + xxx_messageInfo_UserProfile.DiscardUnknown(m) +} + +var xxx_messageInfo_UserProfile proto.InternalMessageInfo + +func (m *UserProfile) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserProfile) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UserProfile) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserProfile) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserProfile) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UserProfile) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UserProfile) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UserProfile) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UpdateUserProfileRequest struct { + FirstName string `protobuf:"bytes,1,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,2,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,3,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,4,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,5,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,6,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } +func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserProfileRequest) ProtoMessage() {} +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{41} +} + +func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) +} +func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) +} +func (m *UpdateUserProfileRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserProfileRequest.Size(m) +} +func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo + +func (m *UpdateUserProfileRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UpdateUserProfileRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmail) Reset() { *m = UserEmail{} } +func (m *UserEmail) String() string { return proto.CompactTextString(m) } +func (*UserEmail) ProtoMessage() {} +func (*UserEmail) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{42} +} + +func (m *UserEmail) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmail.Unmarshal(m, b) +} +func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) +} +func (m *UserEmail) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmail.Merge(m, src) +} +func (m *UserEmail) XXX_Size() int { + return xxx_messageInfo_UserEmail.Size(m) +} +func (m *UserEmail) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmail.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmail proto.InternalMessageInfo + +func (m *UserEmail) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserEmail) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserEmail) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type VerifyMyUserEmailRequest struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMyUserEmailRequest) Reset() { *m = VerifyMyUserEmailRequest{} } +func (m *VerifyMyUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyMyUserEmailRequest) ProtoMessage() {} +func (*VerifyMyUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{43} +} + +func (m *VerifyMyUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMyUserEmailRequest.Unmarshal(m, b) +} +func (m *VerifyMyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMyUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *VerifyMyUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMyUserEmailRequest.Merge(m, src) +} +func (m *VerifyMyUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_VerifyMyUserEmailRequest.Size(m) +} +func (m *VerifyMyUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMyUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMyUserEmailRequest proto.InternalMessageInfo + +func (m *VerifyMyUserEmailRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type VerifyUserEmailRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserEmailRequest) Reset() { *m = VerifyUserEmailRequest{} } +func (m *VerifyUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserEmailRequest) ProtoMessage() {} +func (*VerifyUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{44} +} + +func (m *VerifyUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserEmailRequest.Unmarshal(m, b) +} +func (m *VerifyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserEmailRequest.Merge(m, src) +} +func (m *VerifyUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserEmailRequest.Size(m) +} +func (m *VerifyUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserEmailRequest proto.InternalMessageInfo + +func (m *VerifyUserEmailRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *VerifyUserEmailRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type UpdateUserEmailRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } +func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserEmailRequest) ProtoMessage() {} +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{45} +} + +func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) +} +func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) +} +func (m *UpdateUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserEmailRequest.Size(m) +} +func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo + +func (m *UpdateUserEmailRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UserPhone struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserPhone) Reset() { *m = UserPhone{} } +func (m *UserPhone) String() string { return proto.CompactTextString(m) } +func (*UserPhone) ProtoMessage() {} +func (*UserPhone) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{46} +} + +func (m *UserPhone) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserPhone.Unmarshal(m, b) +} +func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) +} +func (m *UserPhone) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserPhone.Merge(m, src) +} +func (m *UserPhone) XXX_Size() int { + return xxx_messageInfo_UserPhone.Size(m) +} +func (m *UserPhone) XXX_DiscardUnknown() { + xxx_messageInfo_UserPhone.DiscardUnknown(m) +} + +var xxx_messageInfo_UserPhone proto.InternalMessageInfo + +func (m *UserPhone) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserPhone) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UserPhone) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + Phone string `protobuf:"bytes,1,opt,name=phone,proto3" json:"phone,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } +func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{47} +} + +func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) +} +func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) +} +func (m *UpdateUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) +} +func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo + +func (m *UpdateUserPhoneRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +type VerifyUserPhoneRequest struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserPhoneRequest) Reset() { *m = VerifyUserPhoneRequest{} } +func (m *VerifyUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserPhoneRequest) ProtoMessage() {} +func (*VerifyUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{48} +} + +func (m *VerifyUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserPhoneRequest.Unmarshal(m, b) +} +func (m *VerifyUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserPhoneRequest.Merge(m, src) +} +func (m *VerifyUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserPhoneRequest.Size(m) +} +func (m *VerifyUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserPhoneRequest proto.InternalMessageInfo + +func (m *VerifyUserPhoneRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type UserAddress struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAddress) Reset() { *m = UserAddress{} } +func (m *UserAddress) String() string { return proto.CompactTextString(m) } +func (*UserAddress) ProtoMessage() {} +func (*UserAddress) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{49} +} + +func (m *UserAddress) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAddress.Unmarshal(m, b) +} +func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) +} +func (m *UserAddress) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAddress.Merge(m, src) +} +func (m *UserAddress) XXX_Size() int { + return xxx_messageInfo_UserAddress.Size(m) +} +func (m *UserAddress) XXX_DiscardUnknown() { + xxx_messageInfo_UserAddress.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAddress proto.InternalMessageInfo + +func (m *UserAddress) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAddress) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UserAddress) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UserAddress) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UserAddress) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UserAddress) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + Country string `protobuf:"bytes,1,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,2,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,3,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,4,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,5,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } +func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserAddressRequest) ProtoMessage() {} +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{50} +} + +func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) +} +func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) +} +func (m *UpdateUserAddressRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserAddressRequest.Size(m) +} +func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo + +func (m *UpdateUserAddressRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UpdateUserAddressRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UpdateUserAddressRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UpdateUserAddressRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UpdateUserAddressRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type PasswordID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordID) Reset() { *m = PasswordID{} } +func (m *PasswordID) String() string { return proto.CompactTextString(m) } +func (*PasswordID) ProtoMessage() {} +func (*PasswordID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{51} +} + +func (m *PasswordID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordID.Unmarshal(m, b) +} +func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) +} +func (m *PasswordID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordID.Merge(m, src) +} +func (m *PasswordID) XXX_Size() int { + return xxx_messageInfo_PasswordID.Size(m) +} +func (m *PasswordID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordID proto.InternalMessageInfo + +func (m *PasswordID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordRequest struct { + Password string `protobuf:"bytes,1,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } +func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } +func (*PasswordRequest) ProtoMessage() {} +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{52} +} + +func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) +} +func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) +} +func (m *PasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordRequest.Merge(m, src) +} +func (m *PasswordRequest) XXX_Size() int { + return xxx_messageInfo_PasswordRequest.Size(m) +} +func (m *PasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo + +func (m *PasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type ResetPasswordRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } +func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*ResetPasswordRequest) ProtoMessage() {} +func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{53} +} + +func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) +} +func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) +} +func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPasswordRequest.Merge(m, src) +} +func (m *ResetPasswordRequest) XXX_Size() int { + return xxx_messageInfo_ResetPasswordRequest.Size(m) +} +func (m *ResetPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo + +func (m *ResetPasswordRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ResetPasswordRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type ResetPassword struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + NewPassword string `protobuf:"bytes,3,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPassword) Reset() { *m = ResetPassword{} } +func (m *ResetPassword) String() string { return proto.CompactTextString(m) } +func (*ResetPassword) ProtoMessage() {} +func (*ResetPassword) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{54} +} + +func (m *ResetPassword) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPassword.Unmarshal(m, b) +} +func (m *ResetPassword) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPassword.Marshal(b, m, deterministic) +} +func (m *ResetPassword) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPassword.Merge(m, src) +} +func (m *ResetPassword) XXX_Size() int { + return xxx_messageInfo_ResetPassword.Size(m) +} +func (m *ResetPassword) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPassword.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPassword proto.InternalMessageInfo + +func (m *ResetPassword) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ResetPassword) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +func (m *ResetPassword) GetNewPassword() string { + if m != nil { + return m.NewPassword + } + return "" +} + +type SetPasswordNotificationRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } +func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } +func (*SetPasswordNotificationRequest) ProtoMessage() {} +func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{55} +} + +func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) +} +func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) +} +func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) +} +func (m *SetPasswordNotificationRequest) XXX_Size() int { + return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) +} +func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo + +func (m *SetPasswordNotificationRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *SetPasswordNotificationRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type PasswordChange struct { + OldPassword string `protobuf:"bytes,1,opt,name=old_password,json=oldPassword,proto3" json:"old_password,omitempty"` + NewPassword string `protobuf:"bytes,2,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordChange) Reset() { *m = PasswordChange{} } +func (m *PasswordChange) String() string { return proto.CompactTextString(m) } +func (*PasswordChange) ProtoMessage() {} +func (*PasswordChange) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{56} +} + +func (m *PasswordChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordChange.Unmarshal(m, b) +} +func (m *PasswordChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordChange.Marshal(b, m, deterministic) +} +func (m *PasswordChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordChange.Merge(m, src) +} +func (m *PasswordChange) XXX_Size() int { + return xxx_messageInfo_PasswordChange.Size(m) +} +func (m *PasswordChange) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordChange.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordChange proto.InternalMessageInfo + +func (m *PasswordChange) GetOldPassword() string { + if m != nil { + return m.OldPassword + } + return "" +} + +func (m *PasswordChange) GetNewPassword() string { + if m != nil { + return m.NewPassword + } + return "" +} + +type VerifyMfaOtp struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMfaOtp) Reset() { *m = VerifyMfaOtp{} } +func (m *VerifyMfaOtp) String() string { return proto.CompactTextString(m) } +func (*VerifyMfaOtp) ProtoMessage() {} +func (*VerifyMfaOtp) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{57} +} + +func (m *VerifyMfaOtp) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMfaOtp.Unmarshal(m, b) +} +func (m *VerifyMfaOtp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMfaOtp.Marshal(b, m, deterministic) +} +func (m *VerifyMfaOtp) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMfaOtp.Merge(m, src) +} +func (m *VerifyMfaOtp) XXX_Size() int { + return xxx_messageInfo_VerifyMfaOtp.Size(m) +} +func (m *VerifyMfaOtp) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMfaOtp.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMfaOtp proto.InternalMessageInfo + +func (m *VerifyMfaOtp) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type MultiFactors struct { + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactors) Reset() { *m = MultiFactors{} } +func (m *MultiFactors) String() string { return proto.CompactTextString(m) } +func (*MultiFactors) ProtoMessage() {} +func (*MultiFactors) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{58} +} + +func (m *MultiFactors) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactors.Unmarshal(m, b) +} +func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) +} +func (m *MultiFactors) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactors.Merge(m, src) +} +func (m *MultiFactors) XXX_Size() int { + return xxx_messageInfo_MultiFactors.Size(m) +} +func (m *MultiFactors) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactors.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactors proto.InternalMessageInfo + +func (m *MultiFactors) GetMfas() []*MultiFactor { + if m != nil { + return m.Mfas + } + return nil +} + +type MultiFactor struct { + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactor) Reset() { *m = MultiFactor{} } +func (m *MultiFactor) String() string { return proto.CompactTextString(m) } +func (*MultiFactor) ProtoMessage() {} +func (*MultiFactor) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{59} +} + +func (m *MultiFactor) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactor.Unmarshal(m, b) +} +func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) +} +func (m *MultiFactor) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactor.Merge(m, src) +} +func (m *MultiFactor) XXX_Size() int { + return xxx_messageInfo_MultiFactor.Size(m) +} +func (m *MultiFactor) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactor.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactor proto.InternalMessageInfo + +func (m *MultiFactor) GetType() MfaType { + if m != nil { + return m.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *MultiFactor) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type MfaOtpResponse struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"` + Secret string `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` + State MFAState `protobuf:"varint,4,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaOtpResponse) Reset() { *m = MfaOtpResponse{} } +func (m *MfaOtpResponse) String() string { return proto.CompactTextString(m) } +func (*MfaOtpResponse) ProtoMessage() {} +func (*MfaOtpResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{60} +} + +func (m *MfaOtpResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaOtpResponse.Unmarshal(m, b) +} +func (m *MfaOtpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaOtpResponse.Marshal(b, m, deterministic) +} +func (m *MfaOtpResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaOtpResponse.Merge(m, src) +} +func (m *MfaOtpResponse) XXX_Size() int { + return xxx_messageInfo_MfaOtpResponse.Size(m) +} +func (m *MfaOtpResponse) XXX_DiscardUnknown() { + xxx_messageInfo_MfaOtpResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaOtpResponse proto.InternalMessageInfo + +func (m *MfaOtpResponse) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *MfaOtpResponse) GetUrl() string { + if m != nil { + return m.Url + } + return "" +} + +func (m *MfaOtpResponse) GetSecret() string { + if m != nil { + return m.Secret + } + return "" +} + +func (m *MfaOtpResponse) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type ApplicationID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationID) Reset() { *m = ApplicationID{} } +func (m *ApplicationID) String() string { return proto.CompactTextString(m) } +func (*ApplicationID) ProtoMessage() {} +func (*ApplicationID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{61} +} + +func (m *ApplicationID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationID.Unmarshal(m, b) +} +func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) +} +func (m *ApplicationID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationID.Merge(m, src) +} +func (m *ApplicationID) XXX_Size() int { + return xxx_messageInfo_ApplicationID.Size(m) +} +func (m *ApplicationID) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationID.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationID proto.InternalMessageInfo + +func (m *ApplicationID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type Application struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.AppState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + // Types that are valid to be assigned to AppConfig: + // *Application_OidcConfig + AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Application) Reset() { *m = Application{} } +func (m *Application) String() string { return proto.CompactTextString(m) } +func (*Application) ProtoMessage() {} +func (*Application) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{62} +} + +func (m *Application) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Application.Unmarshal(m, b) +} +func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Application.Marshal(b, m, deterministic) +} +func (m *Application) XXX_Merge(src proto.Message) { + xxx_messageInfo_Application.Merge(m, src) +} +func (m *Application) XXX_Size() int { + return xxx_messageInfo_Application.Size(m) +} +func (m *Application) XXX_DiscardUnknown() { + xxx_messageInfo_Application.DiscardUnknown(m) +} + +var xxx_messageInfo_Application proto.InternalMessageInfo + +func (m *Application) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Application) GetState() AppState { + if m != nil { + return m.State + } + return AppState_APPSTATE_UNSPECIFIED +} + +func (m *Application) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Application) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Application) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type isApplication_AppConfig interface { + isApplication_AppConfig() +} + +type Application_OidcConfig struct { + OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` +} + +func (*Application_OidcConfig) isApplication_AppConfig() {} + +func (m *Application) GetAppConfig() isApplication_AppConfig { + if m != nil { + return m.AppConfig + } + return nil +} + +func (m *Application) GetOidcConfig() *OIDCConfig { + if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { + return x.OidcConfig + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*Application) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*Application_OidcConfig)(nil), + } +} + +type OIDCConfig struct { + RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=zitadel.auth.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=zitadel.auth.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + ClientSecret string `protobuf:"bytes,5,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + ClientId string `protobuf:"bytes,6,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=zitadel.auth.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } +func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } +func (*OIDCConfig) ProtoMessage() {} +func (*OIDCConfig) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{63} +} + +func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) +} +func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) +} +func (m *OIDCConfig) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfig.Merge(m, src) +} +func (m *OIDCConfig) XXX_Size() int { + return xxx_messageInfo_OIDCConfig.Size(m) +} +func (m *OIDCConfig) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfig.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo + +func (m *OIDCConfig) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfig) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +func (m *OIDCConfig) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type ApplicationSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn ApplicationSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*ApplicationSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } +func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchRequest) ProtoMessage() {} +func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{64} +} + +func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) +} +func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) +} +func (m *ApplicationSearchRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchRequest.Size(m) +} +func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo + +func (m *ApplicationSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchRequest) GetSortingColumn() ApplicationSearchKey { + if m != nil { + return m.SortingColumn + } + return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ApplicationSearchQuery struct { + Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } +func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchQuery) ProtoMessage() {} +func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{65} +} + +func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) +} +func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) +} +func (m *ApplicationSearchQuery) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchQuery.Size(m) +} +func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo + +func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { + if m != nil { + return m.Key + } + return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ApplicationSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ApplicationSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } +func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchResponse) ProtoMessage() {} +func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{66} +} + +func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) +} +func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) +} +func (m *ApplicationSearchResponse) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchResponse.Size(m) +} +func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo + +func (m *ApplicationSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ApplicationSearchResponse) GetResult() []*Application { + if m != nil { + return m.Result + } + return nil +} + +type ApplicationAuthorizeRequest struct { + // Types that are valid to be assigned to Auth: + // *ApplicationAuthorizeRequest_OidcClientAuth + Auth isApplicationAuthorizeRequest_Auth `protobuf_oneof:"auth"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationAuthorizeRequest) Reset() { *m = ApplicationAuthorizeRequest{} } +func (m *ApplicationAuthorizeRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationAuthorizeRequest) ProtoMessage() {} +func (*ApplicationAuthorizeRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{67} +} + +func (m *ApplicationAuthorizeRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationAuthorizeRequest.Unmarshal(m, b) +} +func (m *ApplicationAuthorizeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationAuthorizeRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationAuthorizeRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationAuthorizeRequest.Merge(m, src) +} +func (m *ApplicationAuthorizeRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationAuthorizeRequest.Size(m) +} +func (m *ApplicationAuthorizeRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationAuthorizeRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationAuthorizeRequest proto.InternalMessageInfo + +type isApplicationAuthorizeRequest_Auth interface { + isApplicationAuthorizeRequest_Auth() +} + +type ApplicationAuthorizeRequest_OidcClientAuth struct { + OidcClientAuth *OIDCClientAuth `protobuf:"bytes,1,opt,name=oidc_client_auth,json=oidcClientAuth,proto3,oneof"` +} + +func (*ApplicationAuthorizeRequest_OidcClientAuth) isApplicationAuthorizeRequest_Auth() {} + +func (m *ApplicationAuthorizeRequest) GetAuth() isApplicationAuthorizeRequest_Auth { + if m != nil { + return m.Auth + } + return nil +} + +func (m *ApplicationAuthorizeRequest) GetOidcClientAuth() *OIDCClientAuth { + if x, ok := m.GetAuth().(*ApplicationAuthorizeRequest_OidcClientAuth); ok { + return x.OidcClientAuth + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*ApplicationAuthorizeRequest) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*ApplicationAuthorizeRequest_OidcClientAuth)(nil), + } +} + +type OIDCClientAuth struct { + ClientId string `protobuf:"bytes,1,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,2,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCClientAuth) Reset() { *m = OIDCClientAuth{} } +func (m *OIDCClientAuth) String() string { return proto.CompactTextString(m) } +func (*OIDCClientAuth) ProtoMessage() {} +func (*OIDCClientAuth) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{68} +} + +func (m *OIDCClientAuth) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCClientAuth.Unmarshal(m, b) +} +func (m *OIDCClientAuth) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCClientAuth.Marshal(b, m, deterministic) +} +func (m *OIDCClientAuth) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCClientAuth.Merge(m, src) +} +func (m *OIDCClientAuth) XXX_Size() int { + return xxx_messageInfo_OIDCClientAuth.Size(m) +} +func (m *OIDCClientAuth) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCClientAuth.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCClientAuth proto.InternalMessageInfo + +func (m *OIDCClientAuth) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCClientAuth) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +type GrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn GrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*GrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchRequest) Reset() { *m = GrantSearchRequest{} } +func (m *GrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*GrantSearchRequest) ProtoMessage() {} +func (*GrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{69} +} + +func (m *GrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchRequest.Unmarshal(m, b) +} +func (m *GrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *GrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchRequest.Merge(m, src) +} +func (m *GrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_GrantSearchRequest.Size(m) +} +func (m *GrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchRequest proto.InternalMessageInfo + +func (m *GrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *GrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *GrantSearchRequest) GetSortingColumn() GrantSearchKey { + if m != nil { + return m.SortingColumn + } + return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED +} + +func (m *GrantSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *GrantSearchRequest) GetQueries() []*GrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type GrantSearchQuery struct { + Key GrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchQuery) Reset() { *m = GrantSearchQuery{} } +func (m *GrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*GrantSearchQuery) ProtoMessage() {} +func (*GrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{70} +} + +func (m *GrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchQuery.Unmarshal(m, b) +} +func (m *GrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *GrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchQuery.Merge(m, src) +} +func (m *GrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_GrantSearchQuery.Size(m) +} +func (m *GrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchQuery proto.InternalMessageInfo + +func (m *GrantSearchQuery) GetKey() GrantSearchKey { + if m != nil { + return m.Key + } + return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED +} + +func (m *GrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *GrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type GrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Grant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchResponse) Reset() { *m = GrantSearchResponse{} } +func (m *GrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*GrantSearchResponse) ProtoMessage() {} +func (*GrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{71} +} + +func (m *GrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchResponse.Unmarshal(m, b) +} +func (m *GrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *GrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchResponse.Merge(m, src) +} +func (m *GrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_GrantSearchResponse.Size(m) +} +func (m *GrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchResponse proto.InternalMessageInfo + +func (m *GrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *GrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *GrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *GrantSearchResponse) GetResult() []*Grant { + if m != nil { + return m.Result + } + return nil +} + +type Grant struct { + OrgId string `protobuf:"bytes,1,opt,name=OrgId,proto3" json:"OrgId,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=ProjectId,proto3" json:"ProjectId,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=UserId,proto3" json:"UserId,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=Roles,proto3" json:"Roles,omitempty"` + OrgName string `protobuf:"bytes,5,opt,name=OrgName,proto3" json:"OrgName,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Grant) Reset() { *m = Grant{} } +func (m *Grant) String() string { return proto.CompactTextString(m) } +func (*Grant) ProtoMessage() {} +func (*Grant) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{72} +} + +func (m *Grant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Grant.Unmarshal(m, b) +} +func (m *Grant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Grant.Marshal(b, m, deterministic) +} +func (m *Grant) XXX_Merge(src proto.Message) { + xxx_messageInfo_Grant.Merge(m, src) +} +func (m *Grant) XXX_Size() int { + return xxx_messageInfo_Grant.Size(m) +} +func (m *Grant) XXX_DiscardUnknown() { + xxx_messageInfo_Grant.DiscardUnknown(m) +} + +var xxx_messageInfo_Grant proto.InternalMessageInfo + +func (m *Grant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *Grant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *Grant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *Grant) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *Grant) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +type MyProjectOrgSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*MyProjectOrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchRequest) Reset() { *m = MyProjectOrgSearchRequest{} } +func (m *MyProjectOrgSearchRequest) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchRequest) ProtoMessage() {} +func (*MyProjectOrgSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{73} +} + +func (m *MyProjectOrgSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchRequest.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchRequest.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchRequest.Merge(m, src) +} +func (m *MyProjectOrgSearchRequest) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchRequest.Size(m) +} +func (m *MyProjectOrgSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchRequest proto.InternalMessageInfo + +func (m *MyProjectOrgSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *MyProjectOrgSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *MyProjectOrgSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *MyProjectOrgSearchRequest) GetQueries() []*MyProjectOrgSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type MyProjectOrgSearchQuery struct { + Key MyProjectOrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.MyProjectOrgSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchQuery) Reset() { *m = MyProjectOrgSearchQuery{} } +func (m *MyProjectOrgSearchQuery) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchQuery) ProtoMessage() {} +func (*MyProjectOrgSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{74} +} + +func (m *MyProjectOrgSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchQuery.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchQuery.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchQuery.Merge(m, src) +} +func (m *MyProjectOrgSearchQuery) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchQuery.Size(m) +} +func (m *MyProjectOrgSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchQuery proto.InternalMessageInfo + +func (m *MyProjectOrgSearchQuery) GetKey() MyProjectOrgSearchKey { + if m != nil { + return m.Key + } + return MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED +} + +func (m *MyProjectOrgSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *MyProjectOrgSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type MyProjectOrgSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchResponse) Reset() { *m = MyProjectOrgSearchResponse{} } +func (m *MyProjectOrgSearchResponse) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchResponse) ProtoMessage() {} +func (*MyProjectOrgSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{75} +} + +func (m *MyProjectOrgSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchResponse.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchResponse.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchResponse.Merge(m, src) +} +func (m *MyProjectOrgSearchResponse) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchResponse.Size(m) +} +func (m *MyProjectOrgSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchResponse proto.InternalMessageInfo + +func (m *MyProjectOrgSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetResult() []*Org { + if m != nil { + return m.Result + } + return nil +} + +type IsAdminResponse struct { + IsAdmin bool `protobuf:"varint,1,opt,name=is_admin,json=isAdmin,proto3" json:"is_admin,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IsAdminResponse) Reset() { *m = IsAdminResponse{} } +func (m *IsAdminResponse) String() string { return proto.CompactTextString(m) } +func (*IsAdminResponse) ProtoMessage() {} +func (*IsAdminResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{76} +} + +func (m *IsAdminResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IsAdminResponse.Unmarshal(m, b) +} +func (m *IsAdminResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IsAdminResponse.Marshal(b, m, deterministic) +} +func (m *IsAdminResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_IsAdminResponse.Merge(m, src) +} +func (m *IsAdminResponse) XXX_Size() int { + return xxx_messageInfo_IsAdminResponse.Size(m) +} +func (m *IsAdminResponse) XXX_DiscardUnknown() { + xxx_messageInfo_IsAdminResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_IsAdminResponse proto.InternalMessageInfo + +func (m *IsAdminResponse) GetIsAdmin() bool { + if m != nil { + return m.IsAdmin + } + return false +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{77} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type CreateTokenRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateTokenRequest) Reset() { *m = CreateTokenRequest{} } +func (m *CreateTokenRequest) String() string { return proto.CompactTextString(m) } +func (*CreateTokenRequest) ProtoMessage() {} +func (*CreateTokenRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{78} +} + +func (m *CreateTokenRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateTokenRequest.Unmarshal(m, b) +} +func (m *CreateTokenRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateTokenRequest.Marshal(b, m, deterministic) +} +func (m *CreateTokenRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateTokenRequest.Merge(m, src) +} +func (m *CreateTokenRequest) XXX_Size() int { + return xxx_messageInfo_CreateTokenRequest.Size(m) +} +func (m *CreateTokenRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateTokenRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateTokenRequest proto.InternalMessageInfo + +func (m *CreateTokenRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *CreateTokenRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +type Token struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Expiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=expiration,proto3" json:"expiration,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Token) Reset() { *m = Token{} } +func (m *Token) String() string { return proto.CompactTextString(m) } +func (*Token) ProtoMessage() {} +func (*Token) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{79} +} + +func (m *Token) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Token.Unmarshal(m, b) +} +func (m *Token) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Token.Marshal(b, m, deterministic) +} +func (m *Token) XXX_Merge(src proto.Message) { + xxx_messageInfo_Token.Merge(m, src) +} +func (m *Token) XXX_Size() int { + return xxx_messageInfo_Token.Size(m) +} +func (m *Token) XXX_DiscardUnknown() { + xxx_messageInfo_Token.DiscardUnknown(m) +} + +var xxx_messageInfo_Token proto.InternalMessageInfo + +func (m *Token) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Token) GetExpiration() *timestamp.Timestamp { + if m != nil { + return m.Expiration + } + return nil +} + +type MyPermissions struct { + Permissions []string `protobuf:"bytes,1,rep,name=permissions,proto3" json:"permissions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyPermissions) Reset() { *m = MyPermissions{} } +func (m *MyPermissions) String() string { return proto.CompactTextString(m) } +func (*MyPermissions) ProtoMessage() {} +func (*MyPermissions) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{80} +} + +func (m *MyPermissions) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyPermissions.Unmarshal(m, b) +} +func (m *MyPermissions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyPermissions.Marshal(b, m, deterministic) +} +func (m *MyPermissions) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyPermissions.Merge(m, src) +} +func (m *MyPermissions) XXX_Size() int { + return xxx_messageInfo_MyPermissions.Size(m) +} +func (m *MyPermissions) XXX_DiscardUnknown() { + xxx_messageInfo_MyPermissions.DiscardUnknown(m) +} + +var xxx_messageInfo_MyPermissions proto.InternalMessageInfo + +func (m *MyPermissions) GetPermissions() []string { + if m != nil { + return m.Permissions + } + return nil +} + +type VerifyUserInitRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserInitRequest) Reset() { *m = VerifyUserInitRequest{} } +func (m *VerifyUserInitRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserInitRequest) ProtoMessage() {} +func (*VerifyUserInitRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{81} +} + +func (m *VerifyUserInitRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserInitRequest.Unmarshal(m, b) +} +func (m *VerifyUserInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserInitRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserInitRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserInitRequest.Merge(m, src) +} +func (m *VerifyUserInitRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserInitRequest.Size(m) +} +func (m *VerifyUserInitRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserInitRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserInitRequest proto.InternalMessageInfo + +func (m *VerifyUserInitRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *VerifyUserInitRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +func (m *VerifyUserInitRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func init() { + proto.RegisterEnum("zitadel.auth.api.v1.UserAgentState", UserAgentState_name, UserAgentState_value) + proto.RegisterEnum("zitadel.auth.api.v1.UserSessionState", UserSessionState_name, UserSessionState_value) + proto.RegisterEnum("zitadel.auth.api.v1.NextStepType", NextStepType_name, NextStepType_value) + proto.RegisterEnum("zitadel.auth.api.v1.AuthSessionType", AuthSessionType_name, AuthSessionType_value) + proto.RegisterEnum("zitadel.auth.api.v1.Prompt", Prompt_name, Prompt_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) + proto.RegisterEnum("zitadel.auth.api.v1.CodeChallengeMethod", CodeChallengeMethod_name, CodeChallengeMethod_value) + proto.RegisterEnum("zitadel.auth.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("zitadel.auth.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterEnum("zitadel.auth.api.v1.NotificationType", NotificationType_name, NotificationType_value) + proto.RegisterEnum("zitadel.auth.api.v1.MfaType", MfaType_name, MfaType_value) + proto.RegisterEnum("zitadel.auth.api.v1.MFAState", MFAState_name, MFAState_value) + proto.RegisterEnum("zitadel.auth.api.v1.AppState", AppState_name, AppState_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) + proto.RegisterEnum("zitadel.auth.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) + proto.RegisterEnum("zitadel.auth.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) + proto.RegisterEnum("zitadel.auth.api.v1.GrantSearchKey", GrantSearchKey_name, GrantSearchKey_value) + proto.RegisterEnum("zitadel.auth.api.v1.MyProjectOrgSearchKey", MyProjectOrgSearchKey_name, MyProjectOrgSearchKey_value) + proto.RegisterType((*SessionRequest)(nil), "zitadel.auth.api.v1.SessionRequest") + proto.RegisterType((*UserAgent)(nil), "zitadel.auth.api.v1.UserAgent") + proto.RegisterType((*UserAgentID)(nil), "zitadel.auth.api.v1.UserAgentID") + proto.RegisterType((*UserAgentCreation)(nil), "zitadel.auth.api.v1.UserAgentCreation") + proto.RegisterType((*UserAgents)(nil), "zitadel.auth.api.v1.UserAgents") + proto.RegisterType((*AuthSessionCreation)(nil), "zitadel.auth.api.v1.AuthSessionCreation") + proto.RegisterType((*AuthSessionResponse)(nil), "zitadel.auth.api.v1.AuthSessionResponse") + proto.RegisterType((*AuthSessionView)(nil), "zitadel.auth.api.v1.AuthSessionView") + proto.RegisterType((*TokenID)(nil), "zitadel.auth.api.v1.TokenID") + proto.RegisterType((*UserSessionID)(nil), "zitadel.auth.api.v1.UserSessionID") + proto.RegisterType((*UserSessions)(nil), "zitadel.auth.api.v1.UserSessions") + proto.RegisterType((*UserSession)(nil), "zitadel.auth.api.v1.UserSession") + proto.RegisterType((*UserSessionViews)(nil), "zitadel.auth.api.v1.UserSessionViews") + proto.RegisterType((*UserSessionView)(nil), "zitadel.auth.api.v1.UserSessionView") + proto.RegisterType((*AuthUser)(nil), "zitadel.auth.api.v1.AuthUser") + proto.RegisterType((*AuthSessionID)(nil), "zitadel.auth.api.v1.AuthSessionID") + proto.RegisterType((*SelectUserRequest)(nil), "zitadel.auth.api.v1.SelectUserRequest") + proto.RegisterType((*VerifyUserRequest)(nil), "zitadel.auth.api.v1.VerifyUserRequest") + proto.RegisterType((*VerifyPasswordRequest)(nil), "zitadel.auth.api.v1.VerifyPasswordRequest") + proto.RegisterType((*VerifyMfaRequest)(nil), "zitadel.auth.api.v1.VerifyMfaRequest") + proto.RegisterType((*AuthSessionMultiFactorOTP)(nil), "zitadel.auth.api.v1.AuthSessionMultiFactorOTP") + proto.RegisterType((*NextStep)(nil), "zitadel.auth.api.v1.NextStep") + proto.RegisterType((*LoginData)(nil), "zitadel.auth.api.v1.LoginData") + proto.RegisterType((*PasswordData)(nil), "zitadel.auth.api.v1.PasswordData") + proto.RegisterType((*MfaVerifyData)(nil), "zitadel.auth.api.v1.MfaVerifyData") + proto.RegisterType((*MfaPromptData)(nil), "zitadel.auth.api.v1.MfaPromptData") + proto.RegisterType((*ChooseUserData)(nil), "zitadel.auth.api.v1.ChooseUserData") + proto.RegisterType((*ChooseUser)(nil), "zitadel.auth.api.v1.ChooseUser") + proto.RegisterType((*SkipMfaInitRequest)(nil), "zitadel.auth.api.v1.SkipMfaInitRequest") + proto.RegisterType((*BrowserInformation)(nil), "zitadel.auth.api.v1.BrowserInformation") + proto.RegisterType((*IP)(nil), "zitadel.auth.api.v1.IP") + proto.RegisterType((*AuthRequestOIDC)(nil), "zitadel.auth.api.v1.AuthRequestOIDC") + proto.RegisterType((*CodeChallenge)(nil), "zitadel.auth.api.v1.CodeChallenge") + proto.RegisterType((*UserID)(nil), "zitadel.auth.api.v1.UserID") + proto.RegisterType((*UniqueUserRequest)(nil), "zitadel.auth.api.v1.UniqueUserRequest") + proto.RegisterType((*UniqueUserResponse)(nil), "zitadel.auth.api.v1.UniqueUserResponse") + proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.auth.api.v1.RegisterUserRequest") + proto.RegisterType((*RegisterUserExternalIDPRequest)(nil), "zitadel.auth.api.v1.RegisterUserExternalIDPRequest") + proto.RegisterType((*IDPProvider)(nil), "zitadel.auth.api.v1.IDPProvider") + proto.RegisterType((*User)(nil), "zitadel.auth.api.v1.User") + proto.RegisterType((*UserProfile)(nil), "zitadel.auth.api.v1.UserProfile") + proto.RegisterType((*UpdateUserProfileRequest)(nil), "zitadel.auth.api.v1.UpdateUserProfileRequest") + proto.RegisterType((*UserEmail)(nil), "zitadel.auth.api.v1.UserEmail") + proto.RegisterType((*VerifyMyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyMyUserEmailRequest") + proto.RegisterType((*VerifyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyUserEmailRequest") + proto.RegisterType((*UpdateUserEmailRequest)(nil), "zitadel.auth.api.v1.UpdateUserEmailRequest") + proto.RegisterType((*UserPhone)(nil), "zitadel.auth.api.v1.UserPhone") + proto.RegisterType((*UpdateUserPhoneRequest)(nil), "zitadel.auth.api.v1.UpdateUserPhoneRequest") + proto.RegisterType((*VerifyUserPhoneRequest)(nil), "zitadel.auth.api.v1.VerifyUserPhoneRequest") + proto.RegisterType((*UserAddress)(nil), "zitadel.auth.api.v1.UserAddress") + proto.RegisterType((*UpdateUserAddressRequest)(nil), "zitadel.auth.api.v1.UpdateUserAddressRequest") + proto.RegisterType((*PasswordID)(nil), "zitadel.auth.api.v1.PasswordID") + proto.RegisterType((*PasswordRequest)(nil), "zitadel.auth.api.v1.PasswordRequest") + proto.RegisterType((*ResetPasswordRequest)(nil), "zitadel.auth.api.v1.ResetPasswordRequest") + proto.RegisterType((*ResetPassword)(nil), "zitadel.auth.api.v1.ResetPassword") + proto.RegisterType((*SetPasswordNotificationRequest)(nil), "zitadel.auth.api.v1.SetPasswordNotificationRequest") + proto.RegisterType((*PasswordChange)(nil), "zitadel.auth.api.v1.PasswordChange") + proto.RegisterType((*VerifyMfaOtp)(nil), "zitadel.auth.api.v1.VerifyMfaOtp") + proto.RegisterType((*MultiFactors)(nil), "zitadel.auth.api.v1.MultiFactors") + proto.RegisterType((*MultiFactor)(nil), "zitadel.auth.api.v1.MultiFactor") + proto.RegisterType((*MfaOtpResponse)(nil), "zitadel.auth.api.v1.MfaOtpResponse") + proto.RegisterType((*ApplicationID)(nil), "zitadel.auth.api.v1.ApplicationID") + proto.RegisterType((*Application)(nil), "zitadel.auth.api.v1.Application") + proto.RegisterType((*OIDCConfig)(nil), "zitadel.auth.api.v1.OIDCConfig") + proto.RegisterType((*ApplicationSearchRequest)(nil), "zitadel.auth.api.v1.ApplicationSearchRequest") + proto.RegisterType((*ApplicationSearchQuery)(nil), "zitadel.auth.api.v1.ApplicationSearchQuery") + proto.RegisterType((*ApplicationSearchResponse)(nil), "zitadel.auth.api.v1.ApplicationSearchResponse") + proto.RegisterType((*ApplicationAuthorizeRequest)(nil), "zitadel.auth.api.v1.ApplicationAuthorizeRequest") + proto.RegisterType((*OIDCClientAuth)(nil), "zitadel.auth.api.v1.OIDCClientAuth") + proto.RegisterType((*GrantSearchRequest)(nil), "zitadel.auth.api.v1.GrantSearchRequest") + proto.RegisterType((*GrantSearchQuery)(nil), "zitadel.auth.api.v1.GrantSearchQuery") + proto.RegisterType((*GrantSearchResponse)(nil), "zitadel.auth.api.v1.GrantSearchResponse") + proto.RegisterType((*Grant)(nil), "zitadel.auth.api.v1.Grant") + proto.RegisterType((*MyProjectOrgSearchRequest)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchRequest") + proto.RegisterType((*MyProjectOrgSearchQuery)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchQuery") + proto.RegisterType((*MyProjectOrgSearchResponse)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchResponse") + proto.RegisterType((*IsAdminResponse)(nil), "zitadel.auth.api.v1.IsAdminResponse") + proto.RegisterType((*Org)(nil), "zitadel.auth.api.v1.Org") + proto.RegisterType((*CreateTokenRequest)(nil), "zitadel.auth.api.v1.CreateTokenRequest") + proto.RegisterType((*Token)(nil), "zitadel.auth.api.v1.Token") + proto.RegisterType((*MyPermissions)(nil), "zitadel.auth.api.v1.MyPermissions") + proto.RegisterType((*VerifyUserInitRequest)(nil), "zitadel.auth.api.v1.VerifyUserInitRequest") +} + +func init() { proto.RegisterFile("auth.proto", fileDescriptor_8bbd6f3875b0e874) } + +var fileDescriptor_8bbd6f3875b0e874 = []byte{ + // 6219 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7c, 0xdd, 0x6f, 0x1b, 0xd9, + 0x75, 0xb8, 0x87, 0xa4, 0x3e, 0x78, 0x48, 0x4a, 0xa3, 0x2b, 0x59, 0xa6, 0x28, 0x7f, 0xc8, 0x63, + 0x3b, 0xb6, 0xb5, 0x6b, 0x71, 0xd7, 0xfb, 0x91, 0xb5, 0xf3, 0xc3, 0x6f, 0x43, 0x91, 0x63, 0x89, + 0x6b, 0x89, 0x64, 0x86, 0xb4, 0x37, 0xbb, 0x45, 0xca, 0x8c, 0xc9, 0x2b, 0x7a, 0xd6, 0x24, 0x87, + 0x9e, 0x19, 0xca, 0xab, 0x6d, 0x17, 0x2d, 0xb6, 0x41, 0x90, 0xe6, 0x25, 0x69, 0xfa, 0x11, 0x20, + 0x2d, 0x10, 0xa0, 0x2d, 0x0a, 0x14, 0x08, 0xd0, 0xb4, 0x45, 0xd3, 0xbc, 0xe5, 0xb5, 0xef, 0xed, + 0x5f, 0x10, 0x14, 0x28, 0xd2, 0xfc, 0x01, 0x05, 0x16, 0x6d, 0x51, 0xdc, 0x8f, 0x19, 0xde, 0x19, + 0xce, 0x90, 0x54, 0x6c, 0xe7, 0x29, 0x4f, 0xd2, 0xdc, 0x7b, 0xee, 0x39, 0xe7, 0x9e, 0xaf, 0x7b, + 0xee, 0x99, 0x33, 0x04, 0xd0, 0x87, 0xce, 0xe3, 0x9d, 0x81, 0x65, 0x3a, 0x26, 0x5a, 0xfd, 0xc4, + 0x70, 0xf4, 0x36, 0xee, 0xee, 0xd0, 0x31, 0x7d, 0x60, 0xec, 0x1c, 0xbf, 0x9e, 0x3b, 0xdf, 0x31, + 0xcd, 0x4e, 0x17, 0xe7, 0xf5, 0x81, 0x91, 0xd7, 0xfb, 0x7d, 0xd3, 0xd1, 0x1d, 0xc3, 0xec, 0xdb, + 0x6c, 0x49, 0x6e, 0x93, 0xcf, 0xd2, 0xa7, 0x47, 0xc3, 0xa3, 0x3c, 0xee, 0x0d, 0x9c, 0x13, 0x3e, + 0x79, 0x3e, 0x38, 0x69, 0x3b, 0xd6, 0xb0, 0xe5, 0xf0, 0xd9, 0x4b, 0xc1, 0x59, 0xc7, 0xe8, 0x61, + 0xdb, 0xd1, 0x7b, 0x03, 0x0e, 0x70, 0xee, 0x58, 0xef, 0x1a, 0x6d, 0xdd, 0xc1, 0x79, 0xf7, 0x1f, + 0x3e, 0xf1, 0x2a, 0xfd, 0xd3, 0xba, 0xd5, 0xc1, 0xfd, 0x5b, 0xf6, 0x33, 0xbd, 0xd3, 0xc1, 0x56, + 0xde, 0x1c, 0x50, 0xb6, 0x42, 0x58, 0xcc, 0x92, 0xdd, 0xb0, 0x69, 0x17, 0x8a, 0xcd, 0x28, 0x43, + 0x58, 0xaa, 0x63, 0xdb, 0x36, 0xcc, 0xbe, 0x86, 0x9f, 0x0e, 0xb1, 0xed, 0xa0, 0x73, 0xb0, 0x30, + 0xb4, 0xb1, 0xd5, 0x34, 0xda, 0x59, 0x69, 0x4b, 0xba, 0x91, 0xd4, 0xe6, 0xc9, 0x63, 0xb9, 0x8d, + 0xde, 0x83, 0xf4, 0x23, 0xcb, 0x7c, 0x46, 0xe7, 0xfa, 0x47, 0x66, 0x36, 0xb6, 0x25, 0xdd, 0x48, + 0xdd, 0xbe, 0xbe, 0x13, 0x22, 0xb1, 0x9d, 0x5d, 0x06, 0x58, 0xee, 0x1f, 0x99, 0x56, 0x8f, 0xb2, + 0xa2, 0xa5, 0x1e, 0x8d, 0xc6, 0x94, 0xbf, 0x94, 0x20, 0xf9, 0xc0, 0xc6, 0x56, 0xa1, 0x83, 0xfb, + 0x0e, 0x5a, 0x82, 0x98, 0x47, 0x2d, 0x66, 0xbc, 0x50, 0x4a, 0xe8, 0x0e, 0xcc, 0xd9, 0x8e, 0xee, + 0xe0, 0x6c, 0x7c, 0x4b, 0xba, 0xb1, 0x74, 0xfb, 0x4a, 0x28, 0x12, 0x8f, 0x95, 0x3a, 0x01, 0xd5, + 0xd8, 0x0a, 0xe5, 0x02, 0xa4, 0xbc, 0x89, 0x72, 0x29, 0xc8, 0xa5, 0x62, 0xc0, 0x8a, 0x37, 0x5d, + 0xb4, 0x30, 0xa5, 0x8d, 0x1a, 0x01, 0xd6, 0xa5, 0x53, 0xb1, 0xbe, 0xbb, 0xf8, 0xf9, 0xee, 0xdc, + 0xb7, 0xa5, 0x98, 0x2c, 0xf9, 0xc5, 0xb5, 0x0f, 0xe0, 0x91, 0xb2, 0xd1, 0x5d, 0x58, 0xb4, 0x99, + 0xce, 0xec, 0xac, 0xb4, 0x15, 0xbf, 0x91, 0xba, 0x7d, 0x71, 0xf2, 0xae, 0x34, 0x0f, 0x5e, 0xf9, + 0xaf, 0x04, 0xac, 0x16, 0x86, 0xce, 0x63, 0xae, 0x74, 0x8f, 0x6f, 0x05, 0x16, 0x75, 0x02, 0xea, + 0xa9, 0x7d, 0x77, 0xe1, 0xf3, 0xdd, 0x84, 0x45, 0x38, 0x59, 0xa0, 0x13, 0xe5, 0x36, 0x7a, 0x07, + 0x12, 0xce, 0xc9, 0x00, 0x53, 0x75, 0x2c, 0xdd, 0xbe, 0x1a, 0x4a, 0x53, 0xc0, 0xdd, 0x38, 0x19, + 0x60, 0x8d, 0xae, 0x18, 0x93, 0x4a, 0xfc, 0x45, 0x48, 0x05, 0x5d, 0x85, 0x64, 0xab, 0x6b, 0x70, + 0xa6, 0x13, 0x7e, 0xa6, 0x17, 0xd9, 0x4c, 0xb9, 0x8d, 0xb6, 0x21, 0x6d, 0xe1, 0xb6, 0x61, 0xe1, + 0x96, 0xd3, 0x1c, 0x5a, 0x46, 0x76, 0xce, 0x0f, 0x98, 0x72, 0x27, 0x1f, 0x58, 0x06, 0x5a, 0x73, + 0x8d, 0x65, 0x9e, 0x6a, 0x99, 0x3d, 0xa0, 0x37, 0x60, 0x7e, 0x60, 0x99, 0xbd, 0x81, 0x93, 0x5d, + 0xa0, 0x3b, 0xdf, 0x0c, 0xe5, 0xbb, 0x46, 0x41, 0x34, 0x0e, 0x8a, 0xde, 0x85, 0xf3, 0x64, 0xb6, + 0xd9, 0x32, 0xfb, 0x0e, 0xfe, 0xd8, 0x69, 0xb6, 0xba, 0xba, 0x6d, 0x37, 0x2d, 0x7c, 0x84, 0x2d, + 0xdc, 0x6f, 0xe1, 0xec, 0xe2, 0x56, 0xfc, 0x46, 0x52, 0xdb, 0x20, 0x30, 0x45, 0x06, 0x52, 0x24, + 0x10, 0x9a, 0x0b, 0x80, 0x2e, 0x00, 0x0c, 0x8d, 0x66, 0xd7, 0x6c, 0xe9, 0x5d, 0x6c, 0x67, 0x93, + 0x14, 0x3c, 0x39, 0x34, 0x0e, 0xd8, 0x00, 0x99, 0xee, 0x9a, 0x1d, 0xa3, 0xdf, 0x7c, 0x6c, 0xf4, + 0x9d, 0x2c, 0x50, 0x7e, 0x93, 0x74, 0x64, 0xdf, 0xe8, 0x53, 0x2f, 0xee, 0xe9, 0x1f, 0x37, 0xf5, + 0x0e, 0xce, 0xa6, 0xb6, 0xa4, 0x1b, 0x19, 0x6d, 0xbe, 0xa7, 0x7f, 0x5c, 0xe8, 0x60, 0x74, 0x17, + 0x12, 0xa6, 0xd1, 0x6e, 0x65, 0xd3, 0x54, 0x05, 0xd1, 0x4a, 0xe4, 0xe1, 0xa0, 0x5a, 0x2e, 0x15, + 0xf7, 0xcf, 0x68, 0x74, 0x0d, 0xda, 0x81, 0xd5, 0x81, 0x85, 0x6d, 0xdc, 0xc5, 0x2d, 0x07, 0xb7, + 0x9b, 0x6e, 0x98, 0xc8, 0x50, 0xe2, 0x2b, 0xc2, 0xd4, 0x03, 0x1a, 0x31, 0x76, 0x53, 0x90, 0x24, + 0xea, 0xa7, 0x3a, 0x57, 0x7e, 0x38, 0xe7, 0xb3, 0x3c, 0x0d, 0xdb, 0x03, 0xb3, 0x6f, 0x63, 0xb4, + 0x11, 0xb4, 0xbc, 0x91, 0xc1, 0x31, 0x8f, 0x8b, 0x79, 0x71, 0xc1, 0x35, 0xc0, 0xf8, 0xa9, 0x0d, + 0x70, 0x73, 0xcc, 0x54, 0x04, 0x0b, 0xb9, 0x1c, 0x66, 0x21, 0xbf, 0x31, 0x8c, 0x53, 0x18, 0x46, + 0x09, 0x96, 0x06, 0xa6, 0x6d, 0x1b, 0x8f, 0xba, 0xb8, 0x69, 0x3b, 0x78, 0x60, 0x67, 0x33, 0x34, + 0x2e, 0x5d, 0x08, 0xc5, 0x52, 0xc1, 0x1f, 0x3b, 0x75, 0x07, 0x0f, 0xb4, 0x8c, 0xbb, 0x88, 0x3c, + 0xd9, 0xe8, 0x55, 0x40, 0x03, 0xcb, 0xfc, 0x88, 0xa8, 0xc1, 0x53, 0x96, 0x9d, 0x5d, 0xa2, 0x1b, + 0x94, 0xf9, 0x4c, 0x91, 0x2b, 0xcd, 0x46, 0x45, 0x48, 0x53, 0x03, 0xe4, 0xa1, 0x2d, 0xbb, 0x4c, + 0xf9, 0xde, 0x8a, 0x8c, 0x84, 0xae, 0xdd, 0xa5, 0x86, 0xa3, 0x07, 0xbf, 0x85, 0xfe, 0x77, 0x0c, + 0x96, 0x05, 0xf3, 0x79, 0x68, 0xe0, 0x67, 0x93, 0xac, 0xf3, 0x0b, 0xb0, 0x4c, 0x15, 0xc9, 0x19, + 0x68, 0x7a, 0xa6, 0x9a, 0xd1, 0x47, 0x48, 0xca, 0x2f, 0xcd, 0x6a, 0xbf, 0x00, 0xcb, 0xe2, 0xfe, + 0x09, 0x08, 0x33, 0xdc, 0x8c, 0xb0, 0xc1, 0x72, 0x3b, 0x42, 0xaa, 0xf3, 0x11, 0x52, 0xdd, 0x80, + 0x45, 0xc7, 0x7c, 0x82, 0x29, 0xba, 0x05, 0xb6, 0x5f, 0xfa, 0x5c, 0x6e, 0x23, 0x15, 0x64, 0x36, + 0x85, 0x3f, 0x1e, 0x18, 0x16, 0x8d, 0xcc, 0xd9, 0x45, 0x2a, 0xf4, 0xdc, 0x0e, 0xcb, 0x63, 0x76, + 0xdc, 0x3c, 0x66, 0xa7, 0xe1, 0xe6, 0x31, 0xda, 0x32, 0x5d, 0xa3, 0x7a, 0x4b, 0xc4, 0xfc, 0x22, + 0x29, 0xe6, 0x17, 0xca, 0x06, 0x2c, 0x34, 0x28, 0xa9, 0xf1, 0xa3, 0xf6, 0x2e, 0x64, 0x04, 0x15, + 0x8e, 0x03, 0xf8, 0xd4, 0x14, 0xf3, 0xa9, 0x49, 0x79, 0x00, 0x69, 0x61, 0xad, 0x8d, 0x54, 0xc8, + 0x88, 0x72, 0x73, 0x8f, 0xd0, 0xe9, 0x86, 0x93, 0x16, 0xe4, 0x6a, 0x2b, 0xff, 0x19, 0x63, 0xd9, + 0x01, 0x1f, 0x38, 0x05, 0x47, 0xa8, 0xc4, 0x32, 0xce, 0xa6, 0x98, 0x97, 0x5c, 0x9b, 0x46, 0x9e, + 0x65, 0x26, 0x49, 0x6a, 0x5a, 0x34, 0xf8, 0xbc, 0x0e, 0x09, 0xc2, 0x10, 0xb5, 0x8b, 0x28, 0x4f, + 0x23, 0x66, 0x45, 0x70, 0x68, 0x14, 0x14, 0xbd, 0x02, 0x2b, 0x03, 0xdd, 0xb6, 0x9f, 0x99, 0x56, + 0xbb, 0x79, 0x8c, 0x2d, 0xe3, 0xc8, 0xc0, 0xcc, 0x68, 0x16, 0x35, 0xd9, 0x9d, 0x78, 0xc8, 0xc7, + 0xd1, 0x0e, 0xc4, 0x7b, 0x47, 0x3a, 0x0d, 0x78, 0x4b, 0xb7, 0xcf, 0x87, 0xa2, 0x3f, 0x3c, 0xd2, + 0xa9, 0xb5, 0x12, 0x40, 0x12, 0x45, 0x7b, 0x47, 0xfa, 0x08, 0xef, 0x02, 0xc5, 0x9b, 0xea, 0x1d, + 0xe9, 0x1e, 0xca, 0x2f, 0x02, 0xe5, 0xbf, 0x49, 0xb2, 0xdc, 0x19, 0x4c, 0x67, 0x91, 0x00, 0x93, + 0x47, 0xe5, 0x6b, 0x20, 0x0b, 0xa2, 0x20, 0x8e, 0x69, 0xa3, 0x72, 0xb8, 0x1e, 0xaf, 0x4e, 0x13, + 0x24, 0x59, 0x1d, 0xd0, 0xe5, 0x4f, 0x25, 0x58, 0x0e, 0x40, 0xfc, 0xfa, 0xf5, 0x29, 0xf8, 0x45, + 0xc2, 0x97, 0x77, 0x6f, 0x42, 0x92, 0x4e, 0xf4, 0xf5, 0x1e, 0xe6, 0x2e, 0xbe, 0x48, 0x06, 0x2a, + 0x7a, 0x0f, 0x2b, 0x5f, 0x86, 0x45, 0x57, 0xc9, 0xd1, 0x99, 0xbb, 0x0f, 0x43, 0x2c, 0x80, 0xe1, + 0x9b, 0x12, 0x64, 0x84, 0xf0, 0x73, 0x2a, 0xe7, 0x1a, 0xcb, 0xd4, 0xe3, 0xcf, 0x71, 0x27, 0xf8, + 0x37, 0x09, 0x56, 0xea, 0x34, 0x81, 0xa0, 0x26, 0xcb, 0xaf, 0x23, 0x2f, 0x20, 0x00, 0x87, 0x44, + 0xca, 0x78, 0x58, 0xa4, 0x0c, 0x66, 0xa9, 0x89, 0x17, 0x92, 0xbb, 0xff, 0x87, 0x04, 0x2b, 0xd4, + 0x03, 0x4e, 0xc4, 0x6d, 0xcd, 0x92, 0x6f, 0xe7, 0x23, 0xf6, 0x37, 0x02, 0x0d, 0x6c, 0xf4, 0xba, + 0xa8, 0x67, 0xba, 0xc5, 0x5d, 0xf8, 0x7c, 0x77, 0xc1, 0x9a, 0x93, 0xa5, 0xec, 0xbf, 0x48, 0x23, + 0x9d, 0xbf, 0xa4, 0x9d, 0xfe, 0x42, 0x82, 0xb3, 0x6c, 0xa7, 0x35, 0x1e, 0x4c, 0x5e, 0xea, 0x6e, + 0xaf, 0xc1, 0xa2, 0x1b, 0xb4, 0xf8, 0x66, 0x93, 0x9f, 0xef, 0xce, 0x5b, 0x09, 0x59, 0xca, 0xee, + 0x6b, 0xde, 0xd4, 0x4b, 0xda, 0xeb, 0xff, 0x4a, 0x20, 0xb3, 0xbd, 0x1e, 0x1e, 0xe9, 0x2f, 0x75, + 0x9b, 0x2f, 0xd0, 0xc5, 0xd0, 0x2e, 0xc4, 0x4d, 0x67, 0xc0, 0x45, 0xb0, 0x33, 0x2d, 0x13, 0x39, + 0x1c, 0x76, 0x1d, 0xe3, 0x9e, 0xde, 0x72, 0x4c, 0xab, 0xda, 0xa8, 0xed, 0x9f, 0xd1, 0xc8, 0xe2, + 0xdd, 0x39, 0x7a, 0x2e, 0x28, 0x77, 0x60, 0x23, 0x12, 0x14, 0x9d, 0x87, 0x44, 0xcb, 0x6c, 0x63, + 0x2e, 0x04, 0x22, 0x42, 0x2b, 0x4e, 0x2c, 0x90, 0x8e, 0x2a, 0x7f, 0x12, 0x87, 0x45, 0x37, 0x07, + 0x44, 0x6f, 0xf1, 0xec, 0x48, 0xa2, 0x61, 0xf3, 0xf2, 0xc4, 0x84, 0x51, 0x48, 0x8d, 0xde, 0x86, + 0x39, 0x9a, 0xd3, 0xf2, 0xda, 0x40, 0xf8, 0x05, 0xf8, 0x80, 0x40, 0x94, 0x74, 0x47, 0xdf, 0x3f, + 0xa3, 0x31, 0x70, 0xf4, 0x6e, 0xc0, 0x68, 0x52, 0x11, 0x24, 0x5d, 0x0b, 0xe6, 0xab, 0x47, 0xe6, + 0x54, 0x04, 0xf0, 0x8e, 0xb9, 0x13, 0x2e, 0x49, 0x25, 0xea, 0x74, 0x64, 0x16, 0xc2, 0x71, 0x24, + 0xdd, 0xa3, 0xf0, 0xc4, 0x45, 0xc2, 0x2f, 0x0f, 0x73, 0x93, 0x91, 0xb0, 0xfb, 0x83, 0x80, 0x84, + 0x0d, 0xa0, 0x7b, 0x90, 0x6a, 0x3d, 0x36, 0x4d, 0x1b, 0xd3, 0x8b, 0x18, 0x3d, 0xa8, 0x53, 0x11, + 0xf5, 0x8d, 0x22, 0x85, 0x23, 0xf1, 0x87, 0xa3, 0x81, 0x96, 0x37, 0xb2, 0x3b, 0x0f, 0x89, 0xb6, + 0xee, 0xe8, 0xca, 0x55, 0x48, 0x7a, 0x02, 0x23, 0x67, 0x09, 0xb6, 0xac, 0x66, 0xcf, 0xee, 0xb8, + 0x67, 0x09, 0xb6, 0xac, 0x43, 0xbb, 0xa3, 0x1c, 0x40, 0x5a, 0x94, 0x4d, 0x24, 0x20, 0xba, 0x02, + 0x99, 0x23, 0xdd, 0xe8, 0x0e, 0x2d, 0xdc, 0x6c, 0x99, 0xc3, 0xbe, 0x43, 0x35, 0x95, 0xd1, 0xd2, + 0x7c, 0xb0, 0x48, 0xc6, 0x94, 0xef, 0x4a, 0x90, 0xf1, 0xc9, 0xe9, 0xf9, 0xf0, 0xa1, 0x02, 0x64, + 0xb8, 0x60, 0x8f, 0x8d, 0x36, 0xb6, 0xec, 0x6c, 0x7c, 0x2b, 0x3e, 0x35, 0x7d, 0x49, 0x33, 0x99, + 0xb2, 0x15, 0x4a, 0x9f, 0x72, 0x34, 0x12, 0x3a, 0xca, 0xc1, 0xa2, 0x85, 0x9f, 0x0e, 0x0d, 0x0b, + 0x33, 0xaf, 0x5e, 0xd4, 0xbc, 0xe7, 0x71, 0x7a, 0xb1, 0x53, 0xd3, 0xdb, 0x83, 0x25, 0xbf, 0x7a, + 0xd0, 0x5b, 0x30, 0x47, 0x34, 0xea, 0x66, 0x34, 0x97, 0xa6, 0xa8, 0x54, 0x63, 0xd0, 0xca, 0xcf, + 0x24, 0x80, 0xd1, 0x68, 0xd8, 0xa9, 0x27, 0x85, 0x9d, 0x7a, 0x42, 0xd6, 0x10, 0x8b, 0xce, 0x1a, + 0xe2, 0xfe, 0xac, 0x01, 0xd5, 0x01, 0xf9, 0xb0, 0xb3, 0xdc, 0x27, 0x71, 0x9a, 0xdc, 0x47, 0x1e, + 0x06, 0x46, 0x94, 0x5b, 0x80, 0xea, 0x4f, 0x8c, 0xc1, 0xe1, 0x91, 0x5e, 0xee, 0x1b, 0xce, 0xb4, + 0x82, 0xa4, 0xf2, 0x17, 0x12, 0xa0, 0xf1, 0x88, 0x47, 0xef, 0xc7, 0x04, 0x9e, 0x46, 0x5c, 0xbe, + 0x84, 0xee, 0x84, 0x15, 0x1b, 0xff, 0x3f, 0x24, 0x2d, 0xdc, 0x33, 0x1d, 0xdc, 0x34, 0x06, 0x3c, + 0x7a, 0x9c, 0x0b, 0x65, 0xb8, 0x5c, 0x13, 0x82, 0xff, 0x22, 0x5b, 0x53, 0x1e, 0xa0, 0xeb, 0xb0, + 0xac, 0xb7, 0x5a, 0x78, 0xe0, 0x34, 0xbb, 0x7a, 0xbf, 0x33, 0x24, 0x17, 0x69, 0x26, 0x9c, 0x25, + 0x36, 0x7c, 0xc0, 0x47, 0x95, 0xab, 0x10, 0x2b, 0xd7, 0x48, 0x32, 0xf5, 0xf0, 0x4d, 0x37, 0x99, + 0x7a, 0xf8, 0x26, 0x7d, 0x7e, 0xdb, 0xad, 0x69, 0x3c, 0x7c, 0x9b, 0x64, 0x3d, 0xcb, 0x81, 0x6b, + 0x35, 0xad, 0x36, 0xb4, 0x4c, 0x1a, 0x14, 0xe3, 0xb4, 0xda, 0x40, 0x1e, 0xd0, 0x7b, 0x90, 0xb1, + 0x78, 0xd1, 0xa4, 0x29, 0xd4, 0xe1, 0xc2, 0xa5, 0x4d, 0xf0, 0xb8, 0x25, 0x16, 0x66, 0x74, 0x96, + 0xf0, 0x44, 0x28, 0xf4, 0xcd, 0x7e, 0xcb, 0x65, 0x9d, 0x3d, 0xa0, 0x32, 0x2c, 0x91, 0x00, 0xdd, + 0x6c, 0x3d, 0xd6, 0xbb, 0x5d, 0xdc, 0xef, 0xe0, 0x89, 0xf1, 0xad, 0x68, 0xb6, 0x71, 0xd1, 0x85, + 0xd4, 0x32, 0x2d, 0xf1, 0x51, 0x31, 0x21, 0xe3, 0x9b, 0x47, 0xe7, 0x21, 0x39, 0x42, 0xcb, 0x95, + 0xe2, 0x0d, 0xa0, 0x2f, 0xc3, 0x7c, 0x0f, 0x3b, 0x8f, 0xcd, 0x36, 0xdf, 0xd4, 0x8d, 0xe9, 0x14, + 0x0f, 0x29, 0xbc, 0xc6, 0xd7, 0x29, 0x59, 0x98, 0xa7, 0x55, 0xa7, 0xf1, 0xcb, 0xe3, 0x6f, 0xc3, + 0xca, 0x83, 0xbe, 0xf1, 0x74, 0x88, 0xc5, 0xfc, 0xcb, 0x97, 0x2a, 0x49, 0x13, 0x52, 0xa5, 0x2d, + 0x98, 0xc3, 0x3d, 0xdd, 0xe8, 0xf2, 0x53, 0x5a, 0x04, 0x62, 0x13, 0xca, 0xeb, 0x80, 0x44, 0xfc, + 0xbc, 0xac, 0xb5, 0x09, 0x49, 0xc3, 0x6e, 0x0e, 0xe9, 0x84, 0x1b, 0x36, 0x0c, 0x9b, 0x01, 0x2a, + 0x7f, 0x16, 0x87, 0x55, 0x0d, 0x77, 0x0c, 0xdb, 0xc1, 0x96, 0x3f, 0x2b, 0xe4, 0xc4, 0x18, 0x47, + 0xe9, 0xcf, 0x77, 0x93, 0xd6, 0x02, 0x25, 0xf6, 0x75, 0x97, 0x1c, 0xba, 0x09, 0x70, 0x64, 0x58, + 0xb6, 0x23, 0x64, 0xf3, 0x3e, 0xae, 0x92, 0x74, 0x96, 0xf2, 0x7e, 0x1d, 0x92, 0x5d, 0xdd, 0x85, + 0x0c, 0xc9, 0x07, 0xc9, 0x24, 0x05, 0xbc, 0x06, 0xc9, 0xbe, 0xd1, 0x7a, 0xc2, 0x00, 0x13, 0x81, + 0x43, 0x7b, 0x91, 0x4c, 0x51, 0xb0, 0x57, 0x20, 0xdd, 0x36, 0xec, 0x41, 0x57, 0x3f, 0x11, 0x2e, + 0x23, 0x02, 0x64, 0x8a, 0xcf, 0x52, 0xe0, 0x2f, 0x02, 0x1a, 0xd0, 0xaa, 0x96, 0x85, 0xdb, 0x23, + 0x57, 0x99, 0x0f, 0x2c, 0x59, 0xf1, 0x60, 0x5c, 0xbf, 0x41, 0x6f, 0xc0, 0x7c, 0x07, 0xf7, 0xdb, + 0xd8, 0x9a, 0x58, 0x55, 0xdb, 0xa3, 0x20, 0x1a, 0x07, 0xf5, 0x25, 0x83, 0x8b, 0xd1, 0xc9, 0xe0, + 0x45, 0x98, 0x37, 0xad, 0x8e, 0x57, 0x7b, 0x18, 0x25, 0x5d, 0x73, 0xa6, 0xd5, 0x29, 0xb7, 0x95, + 0x9f, 0xc5, 0xe1, 0xa2, 0xa8, 0x18, 0xf5, 0x63, 0x07, 0x5b, 0x7d, 0xbd, 0x5b, 0x2e, 0xd5, 0x7e, + 0xa3, 0xa3, 0xe7, 0xd5, 0x51, 0x11, 0xd2, 0x46, 0x7b, 0xe0, 0x1d, 0x96, 0xbc, 0x02, 0x10, 0x5e, + 0x78, 0x29, 0x97, 0x6a, 0xee, 0x11, 0xa9, 0xa5, 0x8c, 0xf6, 0xc0, 0x7d, 0x98, 0xaa, 0xc1, 0x2a, + 0xa4, 0x84, 0xb5, 0xe4, 0xf0, 0xf6, 0xd1, 0x4b, 0x6a, 0xde, 0x33, 0xba, 0x0a, 0x19, 0xec, 0xea, + 0xb7, 0x3d, 0x28, 0x97, 0x78, 0x3d, 0xca, 0x3f, 0xa8, 0xfc, 0x7c, 0x01, 0x12, 0xf4, 0x40, 0x0d, + 0x5e, 0x8b, 0xdf, 0x74, 0x6b, 0xc2, 0x2c, 0x64, 0x45, 0xbf, 0x83, 0x11, 0x5f, 0x2a, 0xa1, 0x77, + 0x21, 0xd3, 0xe2, 0x2f, 0x5d, 0x9a, 0x6d, 0xb7, 0x5e, 0x30, 0xb9, 0x0e, 0x92, 0x76, 0x17, 0x94, + 0x08, 0x82, 0x22, 0x39, 0x7f, 0x1c, 0xe3, 0x58, 0x40, 0x91, 0x98, 0x8a, 0x62, 0x69, 0xb4, 0x84, + 0x22, 0xf9, 0x12, 0xc9, 0x1d, 0xf5, 0x7e, 0x07, 0x33, 0x04, 0x73, 0x53, 0x11, 0x00, 0x03, 0xa7, + 0x8b, 0xef, 0x00, 0x50, 0x93, 0x65, 0x09, 0xf8, 0xfc, 0xd4, 0xb5, 0xd4, 0xc0, 0x69, 0x6a, 0x89, + 0x54, 0xf0, 0x0a, 0x4d, 0x4d, 0x86, 0x91, 0x15, 0x8a, 0xa6, 0xd4, 0x10, 0xdd, 0x35, 0x45, 0xb6, + 0xc4, 0x9f, 0x9a, 0x2c, 0x06, 0x52, 0x93, 0x0b, 0x3e, 0xe7, 0x63, 0x3a, 0x15, 0x1c, 0x6e, 0x53, + 0x74, 0x38, 0x56, 0x1e, 0x1f, 0x39, 0xd9, 0xa6, 0xe8, 0x64, 0x29, 0x36, 0xe9, 0xb9, 0xd6, 0xe5, + 0x80, 0x6b, 0xa5, 0xd9, 0x7b, 0x02, 0xd1, 0xa1, 0x6e, 0x85, 0x3a, 0xd4, 0xe8, 0x05, 0x49, 0xa4, + 0x1b, 0x2d, 0xcd, 0xee, 0x46, 0x6b, 0x6e, 0x00, 0x5a, 0x66, 0x67, 0x37, 0x0b, 0x39, 0xdb, 0xb0, + 0x62, 0xd8, 0x4d, 0xfa, 0xff, 0xa8, 0x06, 0x27, 0xd3, 0x73, 0x67, 0xd9, 0xb0, 0x55, 0x32, 0xee, + 0xd5, 0xe1, 0xd6, 0x60, 0x6e, 0xf0, 0xd8, 0xec, 0xe3, 0xec, 0x0a, 0xc3, 0x40, 0x1f, 0x38, 0x06, + 0xfa, 0xff, 0x08, 0x03, 0x72, 0x31, 0xd4, 0xc8, 0xb8, 0x87, 0x21, 0x0b, 0x0b, 0x34, 0x09, 0xb7, + 0x4e, 0xb2, 0xab, 0xac, 0x28, 0xc3, 0x1f, 0x89, 0xc3, 0xd1, 0x57, 0x13, 0x86, 0x73, 0x92, 0x5d, + 0xe3, 0xd2, 0xe5, 0xcf, 0xe8, 0x12, 0xa4, 0x06, 0xa6, 0xed, 0xe8, 0xdd, 0x26, 0xbd, 0x1d, 0x9e, + 0xa5, 0xd3, 0xc0, 0x86, 0xc8, 0xd9, 0x8e, 0xd6, 0x61, 0xde, 0xc2, 0x1d, 0xc3, 0xec, 0x67, 0xd7, + 0x59, 0xa6, 0xc7, 0x9e, 0xd0, 0x35, 0x58, 0xb2, 0x1d, 0x0b, 0x63, 0xa7, 0xa9, 0xb7, 0xdb, 0x16, + 0xb6, 0xed, 0xec, 0x39, 0xe6, 0xaa, 0x6c, 0xb4, 0xc0, 0x06, 0xd1, 0x3b, 0x90, 0x0d, 0x58, 0x57, + 0xd3, 0xcb, 0xdc, 0xb3, 0x74, 0x23, 0xeb, 0x7e, 0x4b, 0xd2, 0xf8, 0xac, 0xf2, 0x03, 0x5e, 0xcd, + 0xad, 0x59, 0xe6, 0x91, 0xd1, 0xc5, 0x63, 0xbe, 0x3e, 0xa9, 0x82, 0x16, 0x30, 0xb8, 0xf8, 0x44, + 0x83, 0x4b, 0x4c, 0x32, 0xb8, 0xb9, 0x29, 0x06, 0x37, 0x3f, 0xab, 0xc1, 0x2d, 0x4c, 0x37, 0xb8, + 0xc5, 0x99, 0x0d, 0x4e, 0xf9, 0x49, 0x0c, 0xb2, 0x0f, 0x06, 0x24, 0x50, 0x08, 0x22, 0x72, 0x8f, + 0x43, 0xff, 0x51, 0x27, 0xcd, 0x7c, 0xd4, 0xc5, 0x26, 0x1c, 0x75, 0xd7, 0x45, 0xa1, 0x84, 0x9c, + 0x89, 0x9e, 0x80, 0x6e, 0x05, 0x04, 0x94, 0x18, 0x83, 0xf5, 0x09, 0xeb, 0x4e, 0xa8, 0xb0, 0xe6, + 0xc6, 0x16, 0x4d, 0x14, 0xdc, 0xfc, 0xec, 0x82, 0xfb, 0x2d, 0xd6, 0xe4, 0x40, 0x9d, 0x6f, 0xcc, + 0xa4, 0xd6, 0x7c, 0x89, 0xa5, 0xeb, 0xc6, 0x37, 0x20, 0xe8, 0xad, 0x54, 0x00, 0xe3, 0x4e, 0xac, + 0xdc, 0x85, 0x2c, 0x2f, 0x40, 0x9d, 0x78, 0x44, 0x5c, 0xa5, 0x5c, 0xf4, 0xd5, 0x5f, 0xc4, 0xad, + 0xb1, 0x0a, 0xcc, 0x3e, 0xac, 0x8f, 0x4a, 0x92, 0xbe, 0x95, 0x41, 0x2e, 0x5d, 0x4c, 0xb1, 0x08, + 0x4c, 0x77, 0x61, 0x7d, 0x64, 0x1a, 0x3e, 0x4c, 0x5b, 0xfe, 0x3c, 0x29, 0x24, 0x71, 0xfe, 0x1a, + 0x13, 0x0f, 0x8d, 0x2c, 0x61, 0xe2, 0x61, 0x31, 0x2a, 0x36, 0x35, 0x46, 0xc5, 0x43, 0x63, 0x94, + 0x72, 0x47, 0x64, 0x8d, 0x4e, 0xb9, 0xac, 0x5d, 0x72, 0x71, 0x4b, 0xfe, 0x4c, 0x71, 0x8d, 0x93, + 0x51, 0xde, 0x11, 0xe5, 0xe3, 0x5b, 0x3a, 0x4d, 0xb2, 0xff, 0x28, 0xf1, 0xa6, 0x11, 0x1e, 0x92, + 0x82, 0xdb, 0x12, 0x02, 0x67, 0x2c, 0x3a, 0x70, 0xc6, 0x27, 0x07, 0xce, 0xc4, 0x84, 0xc0, 0x39, + 0x37, 0x25, 0x70, 0xce, 0x87, 0x04, 0x4e, 0xe5, 0xe7, 0x92, 0xe8, 0xe1, 0x7c, 0x74, 0x94, 0xf0, + 0x7a, 0x2c, 0x07, 0xeb, 0x79, 0x1e, 0xf3, 0x57, 0x05, 0xe6, 0x63, 0xc1, 0xdc, 0xd4, 0xdb, 0xc6, + 0x4d, 0xff, 0x36, 0xe2, 0x01, 0x40, 0x71, 0x43, 0x5b, 0xde, 0x86, 0x82, 0xa9, 0xae, 0xbb, 0xb5, + 0xfc, 0xd8, 0xd6, 0x82, 0xa9, 0x6e, 0x60, 0x93, 0xe7, 0x01, 0xdc, 0xca, 0x55, 0xc8, 0x2d, 0xf1, + 0x1d, 0x58, 0x0e, 0x56, 0xad, 0xc5, 0x3b, 0x85, 0x14, 0x79, 0xa7, 0x50, 0x3e, 0x81, 0x35, 0x0d, + 0xdb, 0xd8, 0x09, 0x2e, 0x9f, 0xf9, 0x8a, 0x79, 0xc7, 0xd7, 0x57, 0x13, 0x7e, 0x9f, 0xaf, 0x98, + 0x8e, 0x71, 0x64, 0xb4, 0x68, 0x06, 0x37, 0x2a, 0x83, 0x2a, 0xc7, 0x90, 0xf1, 0xd1, 0x46, 0xe7, + 0x46, 0xdb, 0x1a, 0xa5, 0xc6, 0x33, 0x38, 0x32, 0x7a, 0x15, 0xd2, 0x7d, 0xfc, 0xac, 0x19, 0x5d, + 0x51, 0x4f, 0xf5, 0xf1, 0x33, 0x97, 0x8c, 0xf2, 0x04, 0x2e, 0xd6, 0x47, 0x54, 0x45, 0xe6, 0xa2, + 0x02, 0xc9, 0x73, 0x6c, 0xb2, 0x0b, 0x4b, 0x35, 0xdf, 0xb1, 0x4d, 0x98, 0x35, 0xbb, 0xed, 0x66, + 0xb4, 0x76, 0x52, 0x66, 0xb7, 0xed, 0xc9, 0x24, 0xb8, 0xb5, 0xd8, 0xc4, 0xad, 0x29, 0x90, 0xf6, + 0x0a, 0xfb, 0x55, 0x67, 0x80, 0x90, 0xe8, 0xf1, 0xdc, 0xcb, 0x4b, 0x90, 0x16, 0x2a, 0xde, 0x36, + 0x7a, 0x13, 0x12, 0xbd, 0x23, 0x7d, 0xf2, 0xab, 0x64, 0x61, 0x81, 0x46, 0xa1, 0x15, 0x07, 0x52, + 0xc2, 0x20, 0x7a, 0xcd, 0x57, 0x09, 0x9f, 0x5c, 0x42, 0x64, 0x45, 0xf0, 0x37, 0xfc, 0x37, 0x90, + 0xf0, 0x77, 0xc0, 0x87, 0xf7, 0x0a, 0xbe, 0xae, 0xb6, 0x6f, 0x49, 0xb0, 0xc4, 0xb6, 0xe6, 0xd5, + 0x2a, 0x22, 0x5f, 0x1c, 0xca, 0x10, 0x1f, 0x5a, 0xee, 0x09, 0x45, 0xfe, 0x25, 0x81, 0xc6, 0xc6, + 0x2d, 0x0b, 0x3b, 0x3c, 0x46, 0xf1, 0xa7, 0x11, 0x2b, 0x89, 0x53, 0xb0, 0x72, 0x09, 0x32, 0x85, + 0xc1, 0xa0, 0xcb, 0x35, 0x1e, 0xe2, 0x94, 0x3f, 0x89, 0x41, 0x4a, 0x80, 0x18, 0x33, 0xaa, 0x99, + 0x04, 0x50, 0x18, 0x0c, 0x5e, 0xec, 0x0d, 0x2c, 0x70, 0x79, 0x4a, 0x9c, 0xea, 0xf2, 0x84, 0x20, + 0x21, 0xe4, 0x7a, 0xf4, 0x7f, 0xb4, 0x0b, 0x29, 0xd3, 0x68, 0xb7, 0x9a, 0x2d, 0xb3, 0x7f, 0x64, + 0x74, 0xf8, 0xbd, 0xf8, 0x52, 0x64, 0x5d, 0xaf, 0x48, 0xc1, 0xf6, 0xcf, 0x68, 0x40, 0x56, 0xb1, + 0xa7, 0xdd, 0x34, 0x80, 0x3e, 0x18, 0x70, 0x14, 0xca, 0x2f, 0xe2, 0x00, 0x23, 0x50, 0x74, 0x05, + 0x32, 0x62, 0x87, 0x93, 0xcd, 0x0b, 0x8b, 0x69, 0xa1, 0xc5, 0xc9, 0x46, 0x07, 0xb0, 0xe4, 0xab, + 0x2f, 0xba, 0xc5, 0xec, 0x19, 0x0b, 0x8c, 0x19, 0xb1, 0xc0, 0x68, 0xa3, 0x22, 0xa4, 0x3a, 0x96, + 0xde, 0x77, 0x38, 0x2a, 0x56, 0x87, 0x57, 0x22, 0x51, 0xed, 0x11, 0x58, 0x8a, 0x07, 0x3a, 0xee, + 0xbf, 0x36, 0xaa, 0x83, 0xac, 0x8f, 0xd4, 0xcf, 0xaa, 0x9e, 0x89, 0x09, 0x05, 0x42, 0x82, 0x49, + 0xb0, 0x17, 0x8a, 0x6f, 0x59, 0xf7, 0x0f, 0x10, 0x61, 0xf0, 0x46, 0x18, 0x6e, 0xc9, 0x4c, 0x15, + 0x69, 0x36, 0x58, 0x67, 0xf6, 0xec, 0x6b, 0xbd, 0x99, 0x0f, 0xb4, 0xde, 0x7c, 0x05, 0x64, 0xfa, + 0x0e, 0x8f, 0x95, 0x1e, 0x19, 0x5b, 0xac, 0x0e, 0x72, 0x3d, 0x9a, 0xad, 0xa1, 0xf3, 0x98, 0x95, + 0x2c, 0x29, 0x57, 0x4b, 0xba, 0xef, 0x19, 0xdd, 0x81, 0x0d, 0x72, 0xfa, 0x91, 0x3b, 0xb5, 0x39, + 0x74, 0x9a, 0x7e, 0x6d, 0xb1, 0x96, 0xb0, 0x75, 0x02, 0x70, 0x40, 0xe7, 0x35, 0x41, 0x6f, 0xca, + 0xff, 0x48, 0x90, 0x15, 0x36, 0x5d, 0xc7, 0xba, 0xd5, 0x72, 0xcb, 0xc9, 0xc4, 0x5f, 0xcd, 0xa3, + 0x23, 0x1b, 0xb3, 0x42, 0x78, 0x42, 0xe3, 0x4f, 0x24, 0xbd, 0xea, 0x1a, 0x3d, 0x83, 0xbd, 0x45, + 0x49, 0x68, 0xec, 0x01, 0x7d, 0x08, 0x4b, 0xb6, 0x69, 0x39, 0x46, 0xbf, 0xd3, 0x6c, 0x99, 0xdd, + 0x61, 0xaf, 0xcf, 0xbb, 0x19, 0x6e, 0x46, 0x39, 0x96, 0x9f, 0xe8, 0x7d, 0x7c, 0x42, 0x8f, 0xdf, + 0xcf, 0xa4, 0xd8, 0xd6, 0x19, 0x2d, 0xc3, 0x51, 0x15, 0x29, 0x26, 0x12, 0x4b, 0x74, 0xbb, 0x45, + 0xd5, 0xb7, 0xa8, 0x91, 0x7f, 0x91, 0x0a, 0x0b, 0x4f, 0x87, 0xd8, 0x32, 0x30, 0x39, 0xba, 0x49, + 0xe0, 0x7c, 0x65, 0x36, 0x32, 0x5f, 0x19, 0x62, 0xeb, 0x44, 0x73, 0xd7, 0x2a, 0x3f, 0x96, 0x60, + 0x3d, 0x1c, 0x06, 0xa9, 0x10, 0x7f, 0x82, 0x4f, 0x78, 0x44, 0xfd, 0x95, 0x36, 0x41, 0xd6, 0xa3, + 0x3b, 0x81, 0xea, 0x74, 0xf8, 0x2b, 0x43, 0xb6, 0xdc, 0x5f, 0x96, 0x26, 0x72, 0x3e, 0xd6, 0xbb, + 0x43, 0xaf, 0xd0, 0x4e, 0x1f, 0x94, 0xbf, 0x91, 0x60, 0x23, 0x44, 0x65, 0x3c, 0x1c, 0x9f, 0x4e, + 0x67, 0x97, 0x21, 0xed, 0x98, 0x24, 0xa7, 0xb2, 0xb0, 0x3d, 0xec, 0xb2, 0xb8, 0x9c, 0xd0, 0x52, + 0x74, 0x4c, 0xa3, 0x43, 0xe8, 0x1d, 0x92, 0x4c, 0xd1, 0xc9, 0xc4, 0x84, 0x03, 0x4a, 0x60, 0x48, + 0xe3, 0xf0, 0xca, 0x31, 0x6c, 0x0a, 0xc3, 0xc4, 0x86, 0x4d, 0xcb, 0xf8, 0xc4, 0xcb, 0x86, 0xab, + 0x20, 0xb3, 0xc0, 0xc5, 0x5c, 0x85, 0x60, 0xe3, 0x1d, 0xcf, 0x57, 0xa2, 0xa3, 0x17, 0x85, 0x25, + 0xa8, 0xf6, 0xcf, 0x68, 0x4b, 0x34, 0x82, 0x79, 0x23, 0xbb, 0xf3, 0x90, 0x20, 0xf0, 0x8a, 0x06, + 0x4b, 0x7e, 0x58, 0xbf, 0x43, 0x4a, 0x01, 0x87, 0x1c, 0x73, 0xe9, 0xd8, 0xb8, 0x4b, 0x2b, 0xbf, + 0x94, 0x00, 0xd1, 0x30, 0xf3, 0x3c, 0x1e, 0xd2, 0x88, 0xf0, 0x90, 0xf0, 0xfd, 0x0a, 0xe4, 0x4e, + 0xe9, 0x1b, 0xef, 0x06, 0x7d, 0xe3, 0xda, 0x34, 0x02, 0x01, 0xaf, 0xf8, 0x6b, 0x09, 0xe4, 0xe0, + 0x2c, 0x7a, 0x57, 0xf4, 0x87, 0x53, 0xb2, 0xfc, 0x72, 0x3c, 0xe1, 0x07, 0x12, 0xac, 0xfa, 0x94, + 0xf2, 0xb2, 0x7c, 0xe0, 0x76, 0xc0, 0x07, 0x72, 0xd1, 0xbb, 0xf7, 0xac, 0xff, 0x0f, 0x24, 0x98, + 0xa3, 0x23, 0x84, 0x6c, 0xd5, 0xea, 0x94, 0x5d, 0xcb, 0x63, 0x0f, 0xe8, 0x3c, 0x24, 0x6b, 0xac, + 0x81, 0xb2, 0xec, 0xbe, 0x3c, 0x1d, 0x0d, 0x90, 0x2d, 0xb0, 0x3e, 0x68, 0x37, 0x55, 0x62, 0x4f, + 0x04, 0x97, 0x66, 0x76, 0xb1, 0x4d, 0x19, 0x49, 0x6a, 0xec, 0x81, 0x5c, 0x0c, 0xab, 0x56, 0xa7, + 0x32, 0x4a, 0x0d, 0xdc, 0x47, 0xe5, 0xaf, 0x24, 0xd8, 0x38, 0x3c, 0xe1, 0x78, 0xab, 0x56, 0xe7, + 0x79, 0xcc, 0x77, 0xdc, 0xd0, 0xee, 0x05, 0x0d, 0xed, 0xd5, 0xf0, 0xd4, 0x6d, 0x8c, 0x81, 0x80, + 0xbd, 0xfd, 0x83, 0x04, 0xe7, 0x22, 0x80, 0xd0, 0x3d, 0xd1, 0xec, 0xb6, 0x67, 0xc4, 0xff, 0xeb, + 0xb0, 0xbe, 0x1f, 0x4a, 0x90, 0x0b, 0x13, 0xed, 0xcb, 0x32, 0xc2, 0xd7, 0x02, 0x46, 0x98, 0x0d, + 0x8f, 0x92, 0x56, 0xc7, 0x33, 0xc1, 0x57, 0x61, 0xb9, 0x6c, 0x17, 0xda, 0x3d, 0xc3, 0xd7, 0x30, + 0x6f, 0xd8, 0x4d, 0x9d, 0x8c, 0xf1, 0x17, 0x8b, 0x0b, 0x06, 0x03, 0x51, 0x6e, 0x42, 0xbc, 0x6a, + 0x75, 0xc6, 0xd2, 0x64, 0x37, 0xe7, 0x8c, 0x8d, 0x72, 0x4e, 0xc5, 0x00, 0x44, 0x3f, 0xfe, 0xc0, + 0xb4, 0xe7, 0xf6, 0x65, 0x76, 0x30, 0x29, 0x75, 0x98, 0xa3, 0x44, 0xc6, 0xf8, 0xba, 0x0b, 0x70, + 0xaa, 0x5e, 0x62, 0x01, 0x5a, 0x79, 0x1d, 0x32, 0x87, 0x27, 0x35, 0x6c, 0xf5, 0x0c, 0xde, 0xd7, + 0xbb, 0x05, 0xa9, 0xc1, 0xe8, 0x91, 0x67, 0xb8, 0xe2, 0x90, 0xf2, 0xbe, 0xdb, 0x9e, 0x46, 0x1d, + 0x51, 0xe8, 0x30, 0x08, 0x91, 0xd7, 0xe8, 0xae, 0xcc, 0xef, 0xc7, 0xb9, 0x60, 0xb7, 0xd9, 0xa8, + 0x02, 0xb0, 0xfd, 0x11, 0x2c, 0xf9, 0xbf, 0x20, 0x42, 0x17, 0x21, 0xf7, 0xa0, 0xae, 0x6a, 0x85, + 0x3d, 0xb5, 0xd2, 0xa8, 0x37, 0x0a, 0x0d, 0xb5, 0xf9, 0xa0, 0x52, 0xaf, 0xa9, 0xc5, 0xf2, 0xbd, + 0xb2, 0x5a, 0x92, 0xcf, 0xa0, 0x0d, 0x38, 0x1b, 0x98, 0x2f, 0x14, 0x1b, 0xe5, 0x87, 0xaa, 0x2c, + 0xa1, 0x0b, 0xb0, 0x11, 0x98, 0x6a, 0xa8, 0xda, 0x61, 0xb9, 0x52, 0x68, 0xa8, 0x25, 0x39, 0xb6, + 0x6d, 0xf9, 0x5a, 0x61, 0x19, 0xb5, 0x2d, 0x38, 0x4f, 0x96, 0xd4, 0xd5, 0x7a, 0xbd, 0x5c, 0xad, + 0x84, 0xd1, 0xdb, 0x84, 0x73, 0x63, 0x10, 0x1e, 0xc5, 0x4b, 0xb0, 0x39, 0x36, 0xe9, 0xa3, 0xf9, + 0xa3, 0x38, 0xa4, 0xc5, 0x1e, 0x2c, 0x94, 0x85, 0xb5, 0x8a, 0xfa, 0xd5, 0x46, 0xbd, 0xa1, 0xd6, + 0x02, 0x84, 0x10, 0x2c, 0x79, 0x33, 0x07, 0xd5, 0xbd, 0x72, 0x45, 0x96, 0xd0, 0x59, 0x58, 0xf1, + 0xc6, 0x6a, 0x85, 0x7a, 0xfd, 0xfd, 0xaa, 0x56, 0x92, 0x63, 0xe8, 0x3c, 0x64, 0xbd, 0xe1, 0xe2, + 0x7e, 0xa1, 0xb2, 0xa7, 0x8e, 0x66, 0xe3, 0xe8, 0x1c, 0xac, 0x7a, 0xb3, 0x87, 0xf7, 0x0a, 0xcd, + 0x9a, 0x56, 0x3d, 0xac, 0x35, 0xe4, 0x84, 0x6f, 0x19, 0x99, 0x28, 0x57, 0xca, 0x8d, 0x66, 0x71, + 0xbf, 0x5a, 0x2e, 0xaa, 0xf2, 0x5c, 0xc4, 0xac, 0xa6, 0x16, 0x1a, 0xaa, 0x3c, 0x1f, 0x3e, 0xfb, + 0x50, 0xd5, 0xca, 0xf7, 0x3e, 0x90, 0x17, 0x50, 0x0e, 0xd6, 0xc7, 0x67, 0x4b, 0xd5, 0x8a, 0x2a, + 0x2f, 0x8e, 0xb1, 0xc3, 0x17, 0x25, 0x89, 0xba, 0x42, 0x26, 0x9a, 0x85, 0xfa, 0x07, 0x95, 0xa2, + 0x0c, 0x44, 0xd1, 0xde, 0x34, 0x9f, 0x52, 0x0f, 0x0b, 0xe5, 0x03, 0x39, 0x85, 0x2e, 0xc3, 0x05, + 0x6f, 0x4a, 0x53, 0x4b, 0x65, 0x4d, 0x2d, 0x36, 0x9a, 0x8d, 0x6a, 0xb3, 0x58, 0x38, 0x38, 0xd8, + 0x2d, 0x14, 0xef, 0xcb, 0x69, 0x1f, 0x47, 0x94, 0x1b, 0x4f, 0x40, 0x19, 0x9f, 0x0e, 0x8a, 0xfb, + 0xd5, 0x6a, 0x5d, 0x6d, 0x12, 0x2d, 0xca, 0x4b, 0xdb, 0x47, 0xbe, 0xcf, 0x18, 0xa8, 0xc2, 0x2e, + 0xc1, 0x66, 0xe1, 0x41, 0x63, 0x9f, 0xab, 0xb8, 0xf1, 0x41, 0x2d, 0x68, 0x20, 0x59, 0x58, 0x0b, + 0x02, 0x90, 0x04, 0x4c, 0x96, 0xc2, 0x66, 0xea, 0x85, 0xc3, 0x03, 0x6a, 0x8a, 0xf3, 0xbc, 0x15, + 0x6d, 0x1d, 0x10, 0xd3, 0x4f, 0x00, 0xeb, 0x32, 0xa4, 0xf8, 0x78, 0x85, 0x88, 0x51, 0x42, 0x32, + 0xa4, 0xf9, 0x00, 0x33, 0x8e, 0x18, 0x31, 0x18, 0x3e, 0x52, 0xac, 0x56, 0xea, 0x6a, 0xa5, 0x21, + 0xc7, 0x89, 0xd0, 0xf8, 0x58, 0x5d, 0x3d, 0x20, 0x52, 0x29, 0x14, 0x8b, 0xd5, 0x07, 0x95, 0x86, + 0x9c, 0xd8, 0x7e, 0x0a, 0x72, 0xf0, 0xe6, 0x49, 0xc0, 0xe9, 0x98, 0x5a, 0xaf, 0x11, 0x14, 0x94, + 0xc5, 0x62, 0xb5, 0xa4, 0xca, 0x67, 0x88, 0x76, 0xc6, 0xa6, 0xca, 0xa5, 0x66, 0xa3, 0x7a, 0x5f, + 0x25, 0x96, 0x79, 0x05, 0x2e, 0x45, 0x4e, 0x73, 0xa0, 0xd8, 0xb6, 0x06, 0xab, 0x21, 0x8d, 0x27, + 0x04, 0x35, 0x21, 0x52, 0xdc, 0x2f, 0x1c, 0x1c, 0xa8, 0x95, 0x3d, 0xf5, 0x50, 0x6d, 0xec, 0x57, + 0x4b, 0xcd, 0xda, 0x41, 0xa1, 0x5c, 0x91, 0xcf, 0x10, 0x53, 0x0b, 0x9b, 0xae, 0xdf, 0x7e, 0xeb, + 0x6d, 0x59, 0xda, 0xfe, 0x31, 0xff, 0xfe, 0x91, 0xf9, 0x6f, 0x0e, 0xd6, 0xa9, 0x03, 0x8a, 0x8e, + 0xab, 0x72, 0x11, 0xae, 0x81, 0x3c, 0x9a, 0xf3, 0x5c, 0x76, 0x1d, 0xd0, 0x68, 0xb4, 0x5c, 0xe1, + 0xe3, 0x31, 0xe2, 0x6a, 0xa3, 0xf1, 0x92, 0x7a, 0xa0, 0x12, 0x07, 0x8e, 0xfb, 0x91, 0x1c, 0x54, + 0x8b, 0xf7, 0xd5, 0x92, 0x9c, 0xf0, 0x03, 0xd7, 0x1f, 0xd4, 0x6b, 0x6a, 0xa5, 0x24, 0xcf, 0xf9, + 0x87, 0x89, 0xd5, 0x95, 0x0b, 0x07, 0xf2, 0xfc, 0xf6, 0x57, 0x61, 0x9e, 0xbd, 0xde, 0x20, 0xc4, + 0xf7, 0xd4, 0x4a, 0x49, 0xd5, 0x02, 0xda, 0x5e, 0x81, 0x0c, 0x1f, 0xbf, 0xa7, 0x1e, 0x16, 0x0e, + 0x08, 0x9f, 0xcb, 0x90, 0xe2, 0x43, 0x74, 0x80, 0xaa, 0x9b, 0x0f, 0x94, 0xca, 0x0f, 0x49, 0xcc, + 0x91, 0xe3, 0xdb, 0xfb, 0x20, 0x07, 0x2b, 0x7f, 0xd4, 0xf2, 0xab, 0x8d, 0xf2, 0xbd, 0x72, 0xb1, + 0xd0, 0x70, 0xcd, 0x8e, 0x39, 0x0e, 0xb5, 0xd5, 0xb1, 0xb9, 0xfa, 0x61, 0x5d, 0x96, 0xb6, 0x4b, + 0xb0, 0xc0, 0x2b, 0x64, 0xc4, 0x61, 0x0f, 0xef, 0x15, 0x42, 0x2c, 0x7d, 0x19, 0x52, 0xee, 0x04, + 0x5d, 0x24, 0x0e, 0x54, 0x1b, 0x35, 0x39, 0xb6, 0x7d, 0x04, 0x8b, 0x6e, 0xa5, 0x8a, 0xd0, 0x22, + 0xff, 0x87, 0x84, 0xd4, 0x75, 0x40, 0xde, 0x4c, 0xa5, 0xda, 0x68, 0x6a, 0x6a, 0xa1, 0xf4, 0x81, + 0x2c, 0x91, 0x1d, 0x7a, 0xe3, 0x6c, 0x2c, 0x46, 0xe4, 0x2f, 0x8c, 0x1d, 0x56, 0x1f, 0x12, 0xad, + 0x10, 0x3a, 0x6e, 0x6d, 0x8a, 0x7a, 0x59, 0xad, 0x16, 0x46, 0x67, 0x15, 0x96, 0xbd, 0x19, 0x4f, + 0xff, 0x67, 0x61, 0xc5, 0x1b, 0x14, 0xd4, 0xbf, 0x06, 0xb2, 0x37, 0xec, 0x69, 0x7f, 0xfb, 0x04, + 0x32, 0xbe, 0x12, 0x0b, 0xba, 0x0a, 0x5b, 0x74, 0x40, 0x2b, 0x54, 0x1a, 0x74, 0xdf, 0xc4, 0xc1, + 0xab, 0x5a, 0xf9, 0x43, 0x2a, 0x4f, 0xd7, 0x77, 0x2e, 0xc3, 0x05, 0x3f, 0x14, 0xfd, 0xaf, 0x49, + 0xff, 0xe5, 0xee, 0x7c, 0x09, 0x36, 0xfd, 0x20, 0x9a, 0x7a, 0x4f, 0x53, 0xeb, 0xfb, 0x9e, 0xef, + 0x1c, 0xc3, 0x6a, 0x48, 0x4d, 0x86, 0x1c, 0x47, 0x74, 0xb8, 0x56, 0x3b, 0x10, 0x95, 0xf8, 0xbe, + 0xba, 0x2b, 0x9f, 0x41, 0x0a, 0x5c, 0x0c, 0x9b, 0x24, 0x36, 0xd9, 0xa4, 0xa7, 0xa2, 0x2c, 0x91, + 0xf3, 0x35, 0x0c, 0xa6, 0x52, 0x60, 0x82, 0xd8, 0xee, 0x02, 0x1a, 0x2f, 0xba, 0x10, 0x9f, 0xa4, + 0xa3, 0x0f, 0x1a, 0xfb, 0xcc, 0x1d, 0xe9, 0xa2, 0xdd, 0x42, 0xbd, 0x5c, 0x64, 0x67, 0x64, 0xc8, + 0x6c, 0xad, 0x5a, 0x27, 0x04, 0xc3, 0x27, 0xa9, 0x18, 0x62, 0xdb, 0xbf, 0x94, 0x60, 0x2d, 0xac, + 0x8e, 0x40, 0x04, 0x2d, 0xb0, 0x58, 0x57, 0x0b, 0x5a, 0x71, 0xff, 0xbe, 0xfa, 0x41, 0x40, 0xc3, + 0x97, 0xe1, 0x42, 0x28, 0x54, 0xa1, 0x56, 0xa3, 0xd2, 0x66, 0xfb, 0x0d, 0x05, 0xa1, 0xaa, 0x96, + 0x63, 0x44, 0x66, 0xa1, 0xf3, 0xc5, 0x83, 0xb2, 0x5a, 0x69, 0x34, 0xcb, 0x24, 0x08, 0x4c, 0x22, + 0x53, 0x29, 0x1c, 0xaa, 0x72, 0x82, 0xc4, 0xc3, 0x50, 0x90, 0x9a, 0x56, 0x7d, 0x8f, 0xc4, 0xe1, + 0x72, 0x49, 0x9e, 0xdb, 0xfe, 0x3a, 0xa4, 0xc5, 0x14, 0x9b, 0x78, 0x1a, 0x83, 0xe4, 0x21, 0x4e, + 0xfd, 0xca, 0x83, 0xc2, 0x41, 0x9d, 0x85, 0x40, 0xdf, 0x44, 0xbd, 0x51, 0xd0, 0x1a, 0xf5, 0xe6, + 0xfb, 0xe5, 0xc6, 0xbe, 0x2c, 0x91, 0xa8, 0xed, 0x9b, 0x2d, 0x56, 0x2b, 0x8d, 0x42, 0xb9, 0x52, + 0x97, 0x63, 0xdb, 0xdf, 0x94, 0x60, 0xc9, 0x7f, 0x0f, 0x25, 0x02, 0xa0, 0x56, 0x16, 0x25, 0xc3, + 0x0d, 0x38, 0x1b, 0x98, 0xaf, 0x6a, 0x7b, 0x84, 0x5f, 0x9a, 0x50, 0x05, 0xa6, 0x84, 0xed, 0xc4, + 0x48, 0xa4, 0x09, 0x62, 0x26, 0x96, 0x46, 0x44, 0xb6, 0xfd, 0x08, 0xce, 0x86, 0x5e, 0x4c, 0xd0, + 0x35, 0xb8, 0x7c, 0xf8, 0x01, 0x47, 0x53, 0xd5, 0xf6, 0xa2, 0xb8, 0x52, 0xe0, 0x62, 0x38, 0x18, + 0x61, 0x8e, 0xca, 0x5c, 0xba, 0xfd, 0x77, 0x6f, 0x43, 0x8a, 0x1d, 0xd7, 0xd6, 0xb1, 0xd1, 0xc2, + 0xe8, 0x3e, 0x2c, 0xec, 0x63, 0xbd, 0xeb, 0x3c, 0xfe, 0x04, 0xad, 0x8f, 0xe5, 0xc2, 0x6a, 0x6f, + 0xe0, 0x9c, 0xe4, 0x22, 0xc6, 0x15, 0xf9, 0xb3, 0x7f, 0xfd, 0xf7, 0x3f, 0x8e, 0x01, 0x5a, 0xcc, + 0x3f, 0xe6, 0x18, 0xf6, 0x60, 0x4e, 0xc3, 0x7a, 0xfb, 0xe4, 0xd4, 0xa8, 0x96, 0x28, 0xaa, 0x45, + 0x34, 0x9f, 0xb7, 0xe8, 0xfa, 0x0a, 0x2c, 0x3e, 0xe4, 0xbf, 0x40, 0x10, 0x89, 0xeb, 0xdc, 0xd8, + 0x78, 0x9d, 0xfe, 0xd8, 0x81, 0xb2, 0x42, 0x91, 0xa5, 0x50, 0xd2, 0xfb, 0x15, 0x03, 0xf4, 0x11, + 0xa4, 0xf7, 0xb0, 0x33, 0xfa, 0x09, 0x80, 0xad, 0xc9, 0x5f, 0xb0, 0x97, 0x4b, 0xb9, 0x29, 0xdf, + 0xb8, 0x2b, 0x59, 0x4a, 0x04, 0x21, 0x39, 0x3f, 0xb4, 0xb1, 0x45, 0x2f, 0x2b, 0x76, 0xfe, 0x77, + 0x8c, 0xf6, 0xa7, 0xe8, 0x29, 0x2c, 0xb3, 0xab, 0xce, 0x88, 0xdc, 0x17, 0x26, 0x23, 0x73, 0x3f, + 0x8b, 0x9f, 0x4a, 0x74, 0x9d, 0x12, 0x95, 0x95, 0x94, 0x40, 0xf4, 0xae, 0xb4, 0x8d, 0x06, 0xb0, + 0xac, 0xe1, 0x63, 0xf3, 0x09, 0x7e, 0x91, 0x3b, 0xdc, 0xa4, 0xc4, 0xce, 0xe6, 0xc6, 0x76, 0x48, + 0x28, 0x7e, 0x5f, 0x82, 0x15, 0xb6, 0x4b, 0x21, 0xf7, 0x43, 0x37, 0xa6, 0x7d, 0xe3, 0xe1, 0xed, + 0x74, 0x2a, 0xa4, 0x9b, 0x72, 0x29, 0x3b, 0x94, 0x8d, 0x1b, 0xca, 0x15, 0x1f, 0x1b, 0xee, 0xb5, + 0xf1, 0xd3, 0x3c, 0x59, 0xef, 0x7e, 0x94, 0x47, 0x38, 0xfb, 0x2e, 0xf1, 0x66, 0xec, 0x88, 0x6c, + 0x29, 0xd3, 0x88, 0x95, 0x4b, 0xa7, 0x60, 0xe8, 0x35, 0xca, 0xd0, 0x36, 0xba, 0x31, 0x03, 0x43, + 0xcc, 0x22, 0x7e, 0x0f, 0xce, 0xf9, 0x39, 0xda, 0x3d, 0x71, 0x3f, 0x3d, 0x0d, 0x7f, 0xef, 0xc6, + 0x67, 0x73, 0x53, 0xbf, 0xde, 0x7d, 0x68, 0xe0, 0x67, 0xca, 0x16, 0x65, 0x28, 0x87, 0xb2, 0x79, + 0xfa, 0xf1, 0x2b, 0x23, 0x2a, 0xb2, 0x81, 0x7e, 0x24, 0x01, 0x8c, 0xbe, 0x75, 0x8b, 0x30, 0xc7, + 0xb1, 0x8f, 0xe1, 0x4e, 0x21, 0x93, 0x03, 0xca, 0xc2, 0xbd, 0x5c, 0x61, 0x26, 0x99, 0x04, 0xee, + 0xf3, 0x9f, 0xe6, 0x9b, 0xec, 0x4b, 0x7e, 0xb2, 0x96, 0xa8, 0x90, 0xb0, 0x3b, 0xba, 0x3a, 0x47, + 0xb0, 0x3b, 0xf6, 0x91, 0xdb, 0xaf, 0x91, 0x5d, 0xf6, 0x39, 0x8e, 0xcb, 0xee, 0x4f, 0x25, 0x58, + 0xf2, 0x7f, 0x88, 0x86, 0xb6, 0x27, 0xb0, 0x1c, 0x78, 0x71, 0x7f, 0x0a, 0xb6, 0x6b, 0x94, 0xed, + 0xf7, 0x72, 0xea, 0x73, 0xb1, 0xed, 0xd6, 0x11, 0x08, 0xeb, 0x7f, 0x2b, 0x41, 0xd2, 0x7b, 0xfd, + 0x8c, 0xae, 0x4d, 0xe0, 0x7a, 0xf4, 0xdd, 0xd9, 0x29, 0x18, 0xbe, 0x4f, 0x19, 0x56, 0x73, 0x5f, + 0x7e, 0x2e, 0x86, 0x7b, 0x47, 0x3a, 0xe1, 0xf5, 0x33, 0x09, 0xd6, 0xc4, 0x20, 0xee, 0x7d, 0x62, + 0x3d, 0x3d, 0xd4, 0x5d, 0x9e, 0xf6, 0x89, 0x88, 0xad, 0x5c, 0xa3, 0xac, 0x5e, 0x42, 0x17, 0x82, + 0xd1, 0x8e, 0x3e, 0xbb, 0x4c, 0xa2, 0x6f, 0xb1, 0xe8, 0x22, 0x7e, 0x8a, 0xad, 0x4c, 0x43, 0x5e, + 0x2e, 0xe5, 0xa6, 0x7e, 0xee, 0x3d, 0x35, 0xaa, 0x88, 0x5c, 0xb8, 0x51, 0x65, 0x65, 0x0f, 0x3b, + 0xac, 0x1d, 0xcb, 0x93, 0x45, 0xd4, 0x61, 0x79, 0x6d, 0x96, 0xef, 0x94, 0x6d, 0xe5, 0x95, 0xcf, + 0xfe, 0x29, 0xbb, 0x0c, 0xb4, 0xa0, 0x86, 0xfb, 0x0e, 0x49, 0x30, 0x71, 0xdb, 0x3b, 0xe8, 0x7a, + 0xd8, 0x2f, 0x8b, 0x6f, 0x48, 0xb0, 0xd6, 0xc0, 0x56, 0xcf, 0xe8, 0xf3, 0xc3, 0xee, 0x34, 0x12, + 0x89, 0xca, 0x04, 0xb8, 0x1c, 0xb6, 0x67, 0x97, 0xc3, 0x9f, 0x4b, 0x90, 0x12, 0x6a, 0x8b, 0x28, + 0xfc, 0xa5, 0xe8, 0x78, 0xf5, 0x31, 0x97, 0x8b, 0x8e, 0xbd, 0xca, 0x1e, 0x65, 0xa3, 0xa0, 0xfc, + 0xbf, 0x5f, 0xcd, 0x72, 0x59, 0x20, 0x26, 0x56, 0x7b, 0x02, 0xe9, 0xb2, 0x4d, 0xb6, 0xce, 0xbe, + 0xc5, 0x88, 0x4a, 0x05, 0x82, 0x5f, 0x8c, 0xe4, 0xae, 0x4f, 0x85, 0xe3, 0x3e, 0xe6, 0x4f, 0x44, + 0xec, 0x7c, 0xd3, 0xb0, 0xd9, 0x67, 0x20, 0x68, 0x00, 0x69, 0xf1, 0xe3, 0x82, 0x88, 0xd3, 0x39, + 0xe4, 0xc3, 0x90, 0xdc, 0x46, 0xa4, 0x02, 0xdd, 0xac, 0x40, 0xf1, 0xc8, 0x59, 0x7c, 0x3d, 0xd9, + 0xec, 0x77, 0x24, 0xc8, 0x8a, 0xf8, 0xde, 0x37, 0x9c, 0xc7, 0xee, 0x37, 0x0d, 0xe8, 0x8d, 0xa9, + 0xe4, 0xc7, 0x3f, 0x7f, 0x98, 0xc4, 0xc9, 0x15, 0xca, 0xc9, 0x05, 0x25, 0xeb, 0x72, 0xe2, 0x36, + 0xd2, 0x8b, 0x1c, 0x7d, 0x02, 0xb2, 0xe7, 0x24, 0x6e, 0xb7, 0x6d, 0x94, 0x8f, 0x44, 0x3b, 0x29, + 0x5f, 0xa9, 0xbc, 0x1a, 0xe5, 0x1e, 0xab, 0x68, 0x85, 0x73, 0xd1, 0xa3, 0x3f, 0xaf, 0x45, 0xe9, + 0x7c, 0x5f, 0x82, 0x55, 0xd6, 0xe6, 0xe6, 0xa7, 0x7f, 0x2b, 0x9c, 0x4e, 0x44, 0xcb, 0xeb, 0x0c, + 0x6c, 0xe5, 0xa3, 0xd8, 0x5a, 0xcf, 0x8d, 0xb3, 0x45, 0xa4, 0xe2, 0xd0, 0x20, 0x26, 0x74, 0x72, + 0x46, 0xca, 0x24, 0x3a, 0x49, 0xa4, 0xeb, 0x94, 0xed, 0x28, 0xd2, 0x2b, 0x68, 0x79, 0x44, 0x9a, + 0x35, 0x9b, 0x7e, 0x87, 0xe4, 0x8c, 0xb4, 0x35, 0x45, 0xa4, 0xfc, 0xca, 0x14, 0x69, 0x88, 0x5d, + 0x9e, 0x53, 0xd9, 0xb9, 0x15, 0xc5, 0xce, 0x5a, 0x2e, 0xc8, 0x0e, 0x91, 0xc3, 0x1f, 0x79, 0x1f, + 0xcb, 0x8b, 0x1c, 0xdd, 0x9a, 0x74, 0x0c, 0x8e, 0xf5, 0xb0, 0x46, 0x46, 0xb2, 0xb7, 0xa2, 0x78, + 0x39, 0xaf, 0x9c, 0x0b, 0xf0, 0xe2, 0x9e, 0x74, 0x84, 0xa7, 0xdf, 0x85, 0xe5, 0x40, 0xb3, 0x6c, + 0x84, 0x88, 0xc2, 0x5b, 0x6a, 0x23, 0xd9, 0xb9, 0x4a, 0x69, 0x5f, 0x54, 0x36, 0x38, 0x6d, 0x7a, + 0xb6, 0x8d, 0x51, 0xff, 0x9e, 0x04, 0x17, 0x34, 0x6c, 0xe3, 0x7e, 0xfb, 0xf0, 0x44, 0x68, 0x00, + 0x66, 0x95, 0x86, 0xc3, 0x49, 0x96, 0x12, 0x45, 0xb7, 0x10, 0x25, 0x06, 0x37, 0xa5, 0x17, 0xc5, + 0x60, 0x51, 0xd2, 0xc7, 0x02, 0x4d, 0xc2, 0xd4, 0x37, 0x24, 0xd8, 0x64, 0x4c, 0x85, 0xb3, 0xb4, + 0x19, 0x69, 0x15, 0xd3, 0x0f, 0x1a, 0xe5, 0x5a, 0x88, 0x3c, 0xc2, 0xd9, 0x10, 0xbd, 0x86, 0x75, + 0x11, 0x9f, 0xde, 0x6b, 0xe8, 0xba, 0x19, 0xbd, 0x86, 0xf5, 0x20, 0x07, 0xbd, 0x86, 0x51, 0x9e, + 0xe6, 0x35, 0x62, 0x17, 0xf1, 0x54, 0x76, 0x66, 0xf3, 0x1a, 0xca, 0x0e, 0x8f, 0xf2, 0x3e, 0xaf, + 0x99, 0xc4, 0x51, 0x78, 0x5f, 0xf3, 0x73, 0xfa, 0x0c, 0xe5, 0x24, 0xca, 0x6a, 0x85, 0xae, 0x6c, + 0xa6, 0x3a, 0xd6, 0xb1, 0xfc, 0x52, 0xac, 0x96, 0x33, 0x12, 0x6e, 0x2e, 0xe2, 0xd1, 0xe3, 0xf6, + 0x67, 0x9f, 0xfe, 0xe8, 0x71, 0xdb, 0x89, 0x67, 0x3b, 0x7a, 0x78, 0x6f, 0xf2, 0xd8, 0xd1, 0xe3, + 0xd2, 0x9f, 0x76, 0xf4, 0xf8, 0x7b, 0xb1, 0x67, 0x60, 0x6b, 0xb6, 0xa3, 0x87, 0xb3, 0x45, 0xa4, + 0xf2, 0x14, 0x92, 0x54, 0x2a, 0x87, 0x47, 0x7a, 0xb4, 0x38, 0x2e, 0x4f, 0x6b, 0x69, 0xb5, 0x95, + 0x9b, 0x51, 0x84, 0x65, 0xb4, 0x34, 0x22, 0xdc, 0x23, 0x54, 0x7e, 0x5f, 0x82, 0x4c, 0x9d, 0xd0, + 0xf4, 0xae, 0x67, 0x57, 0x27, 0xfe, 0x08, 0xc3, 0x34, 0x23, 0x7d, 0x3d, 0x8a, 0x74, 0x36, 0xb7, + 0x2a, 0xd8, 0x06, 0xc7, 0x46, 0x77, 0xfd, 0x4d, 0x09, 0xd6, 0x38, 0xda, 0x11, 0x15, 0x1b, 0x3b, + 0xe8, 0x66, 0x44, 0x52, 0x34, 0xde, 0xe0, 0x1d, 0xc9, 0xce, 0x2b, 0x94, 0xf6, 0x35, 0x65, 0x8b, + 0xd3, 0xf6, 0x08, 0xe7, 0xe9, 0xe7, 0x48, 0xd8, 0x76, 0x06, 0xcf, 0x88, 0x85, 0x3a, 0x84, 0x91, + 0x63, 0xc8, 0xf8, 0x19, 0x50, 0xa6, 0x33, 0x10, 0x49, 0xf9, 0x26, 0xa5, 0x7c, 0x45, 0xb9, 0x28, + 0x86, 0x50, 0x1f, 0x79, 0x1b, 0x3b, 0x83, 0x67, 0x84, 0xee, 0xb7, 0x25, 0x90, 0xdd, 0x28, 0xe6, + 0xa9, 0xe1, 0xca, 0x44, 0x35, 0x30, 0xf0, 0x48, 0xe2, 0x77, 0xa2, 0xb4, 0xb0, 0x95, 0xdb, 0x0c, + 0xd1, 0x42, 0x9e, 0x7f, 0xa2, 0xc5, 0x72, 0xf2, 0x64, 0xa1, 0xdd, 0x3e, 0x3c, 0xd2, 0xab, 0x8d, + 0x5a, 0xa4, 0x0d, 0x5e, 0x89, 0xea, 0x88, 0x16, 0x5a, 0x99, 0x27, 0x98, 0xbf, 0xb2, 0xe2, 0xb3, + 0xc2, 0xbc, 0xe9, 0x0c, 0x78, 0xec, 0x14, 0xfa, 0xbd, 0x1b, 0x35, 0x74, 0x79, 0xf2, 0x9d, 0xbb, + 0xea, 0x0c, 0x66, 0xe3, 0xe4, 0x8b, 0x51, 0x9c, 0x5c, 0xcc, 0x6d, 0x8c, 0x71, 0x22, 0xc6, 0xce, + 0x2e, 0xb9, 0x25, 0xf4, 0xcc, 0x63, 0x3c, 0x45, 0x1e, 0x51, 0x7a, 0x88, 0x0e, 0x4c, 0xdb, 0xe3, + 0x22, 0x40, 0x27, 0x90, 0x12, 0x7e, 0x73, 0x21, 0xe2, 0xae, 0x36, 0xfe, 0xab, 0x0c, 0xb3, 0x9b, + 0x20, 0xef, 0x2c, 0xff, 0x94, 0x52, 0x6c, 0xda, 0x4f, 0x8c, 0x81, 0xd1, 0x37, 0xa8, 0xe9, 0x7f, + 0x08, 0x29, 0x7e, 0x73, 0xdf, 0x3d, 0x29, 0x97, 0x26, 0x27, 0x0d, 0x13, 0xae, 0x1d, 0xab, 0x94, + 0x62, 0x06, 0xa5, 0x04, 0xa3, 0x47, 0xc7, 0x80, 0xf6, 0xb0, 0x23, 0xbc, 0x94, 0xa1, 0x24, 0x94, + 0x69, 0x8d, 0x8f, 0x91, 0x95, 0x01, 0x01, 0x46, 0xc9, 0xb1, 0xa3, 0x18, 0xa1, 0xbc, 0xd0, 0x5a, + 0xcc, 0xe9, 0xfe, 0xa9, 0x04, 0x88, 0xbd, 0x26, 0x10, 0x56, 0x44, 0x85, 0xf9, 0xa8, 0xae, 0xdd, + 0xdc, 0xce, 0xac, 0xe0, 0xdc, 0xd6, 0x78, 0xc1, 0x51, 0x39, 0xeb, 0xe7, 0xa8, 0x69, 0x53, 0x30, + 0x6e, 0xe6, 0x6b, 0x5e, 0xfb, 0xa6, 0xd8, 0x52, 0xff, 0xda, 0x34, 0x52, 0xc1, 0xa6, 0xcf, 0x19, + 0x04, 0x34, 0xba, 0x08, 0xfa, 0xd9, 0xd1, 0x5d, 0x54, 0x2c, 0xad, 0x4e, 0xb1, 0x5d, 0xb0, 0x0e, + 0xbb, 0xeb, 0xd3, 0xba, 0x11, 0x27, 0x17, 0xbb, 0x42, 0x7a, 0x08, 0x5d, 0x3d, 0x29, 0xcb, 0x79, + 0xda, 0x52, 0xee, 0x93, 0xc7, 0xdf, 0x4b, 0xb0, 0xca, 0xdf, 0x62, 0x09, 0x2f, 0x78, 0x6c, 0xb4, + 0x33, 0x63, 0x77, 0x9a, 0xcb, 0x4d, 0x7e, 0x66, 0x78, 0xce, 0x54, 0x74, 0x94, 0x54, 0x36, 0xf3, + 0x9d, 0xae, 0xf9, 0x48, 0xef, 0xe6, 0xf9, 0xaf, 0x32, 0x9a, 0x56, 0xc7, 0xc7, 0xf3, 0x27, 0x00, + 0x65, 0xbb, 0xac, 0xf7, 0x68, 0xaf, 0x57, 0x64, 0x58, 0x08, 0x3f, 0x4a, 0x03, 0x4d, 0x64, 0xca, + 0x4e, 0x14, 0x1b, 0x67, 0xd1, 0xaa, 0xcb, 0x46, 0xd3, 0xb0, 0x0d, 0xbd, 0x47, 0x1b, 0xcd, 0xd0, + 0x1f, 0x4a, 0xb4, 0x64, 0x7e, 0x78, 0xf2, 0x21, 0x43, 0x2e, 0x76, 0x5e, 0x45, 0x71, 0xa2, 0x44, + 0xc9, 0x46, 0xe8, 0xc9, 0xba, 0x1d, 0xc5, 0xc7, 0x06, 0x3a, 0x97, 0x17, 0x9a, 0xb7, 0xf2, 0x1c, + 0x55, 0xbe, 0x87, 0x77, 0xff, 0x59, 0xfa, 0x5e, 0xe1, 0x5b, 0x12, 0xfa, 0x12, 0xfb, 0xe9, 0xbb, + 0xad, 0x42, 0xad, 0xac, 0x6c, 0xa3, 0x1b, 0x8f, 0x1d, 0x67, 0x60, 0xdf, 0xcd, 0xe7, 0x3b, 0x86, + 0xf3, 0x78, 0xf8, 0x68, 0xa7, 0x65, 0xf6, 0xf2, 0x2d, 0xdd, 0x1c, 0x2d, 0x1c, 0x3c, 0xe9, 0xd0, + 0x22, 0xd1, 0xed, 0xf8, 0x6b, 0x3b, 0xaf, 0x6f, 0x4b, 0xb1, 0xdb, 0xe2, 0xa7, 0x05, 0xf9, 0x8f, + 0x6c, 0xb3, 0xef, 0x1f, 0xe9, 0x58, 0x83, 0xd6, 0xdd, 0x31, 0x98, 0xbb, 0x63, 0x30, 0x1f, 0xde, + 0x9c, 0x46, 0x91, 0xfe, 0x6e, 0x38, 0x01, 0x7d, 0x34, 0x4f, 0x25, 0xf4, 0xc6, 0xff, 0x05, 0x00, + 0x00, 0xff, 0xff, 0xa5, 0x71, 0x9e, 0x99, 0x72, 0x5c, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AuthServiceClient is the client API for AuthService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AuthServiceClient interface { + // Readiness + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + // Authorization + GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) + CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) + RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) + CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) + SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) + GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) + GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) + TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) + CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) + //User + IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) + RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) + RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) + GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) + UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) + ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) + VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) + ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) + UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) + SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) + // MFA + AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) + VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) + RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) + //TODO: Remove func only for tests + GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + //Application + GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) + AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) + //Grant + SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) + SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) +} + +type authServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAuthServiceClient(cc grpc.ClientConnInterface) AuthServiceClient { + return &authServiceClient{cc} +} + +func (c *authServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateAuthSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) { + out := new(AuthSessionView) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SelectUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfa", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) { + out := new(UserSessions) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) { + out := new(UserSession) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) { + out := new(UserSessionViews) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/TerminateUserSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) { + out := new(Token) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateToken", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { + out := new(UniqueUserResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsUserUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SetMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/PasswordReset", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AddMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SkipMfaInit", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetApplicationByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { + out := new(ApplicationSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchApplications", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) { + out := new(GrantSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) { + out := new(MyProjectOrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) { + out := new(IsAdminResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsIamAdmin", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) { + out := new(MyPermissions) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AuthServiceServer is the server API for AuthService service. +type AuthServiceServer interface { + // Readiness + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + // Authorization + GetUserAgent(context.Context, *UserAgentID) (*UserAgent, error) + CreateUserAgent(context.Context, *UserAgentCreation) (*UserAgent, error) + RevokeUserAgent(context.Context, *UserAgentID) (*UserAgent, error) + CreateAuthSession(context.Context, *AuthSessionCreation) (*AuthSessionResponse, error) + GetAuthSession(context.Context, *AuthSessionID) (*AuthSessionResponse, error) + GetAuthSessionByTokenID(context.Context, *TokenID) (*AuthSessionView, error) + SelectUser(context.Context, *SelectUserRequest) (*AuthSessionResponse, error) + VerifyUser(context.Context, *VerifyUserRequest) (*AuthSessionResponse, error) + VerifyPassword(context.Context, *VerifyPasswordRequest) (*AuthSessionResponse, error) + VerifyMfa(context.Context, *VerifyMfaRequest) (*AuthSessionResponse, error) + GetUserAgentSessions(context.Context, *UserAgentID) (*UserSessions, error) + GetUserSession(context.Context, *UserSessionID) (*UserSession, error) + GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) + TerminateUserSession(context.Context, *UserSessionID) (*empty.Empty, error) + CreateToken(context.Context, *CreateTokenRequest) (*Token, error) + //User + IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) + RegisterUser(context.Context, *RegisterUserRequest) (*User, error) + RegisterUserWithExternal(context.Context, *RegisterUserExternalIDPRequest) (*User, error) + GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) + UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) + ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) + VerifyUserEmail(context.Context, *VerifyUserEmailRequest) (*empty.Empty, error) + ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) + ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) + GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) + ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) + ResendMyPhoneVerificationCode(context.Context, *empty.Empty) (*empty.Empty, error) + GetMyUserAddress(context.Context, *empty.Empty) (*UserAddress, error) + UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) + SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + RequestPasswordReset(context.Context, *ResetPasswordRequest) (*empty.Empty, error) + PasswordReset(context.Context, *ResetPassword) (*empty.Empty, error) + ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) + // MFA + AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) + VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) + RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) + SkipMfaInit(context.Context, *SkipMfaInitRequest) (*empty.Empty, error) + //TODO: Remove func only for tests + GetUserByID(context.Context, *UserID) (*User, error) + //Application + GetApplicationByID(context.Context, *ApplicationID) (*Application, error) + SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) + AuthorizeApplication(context.Context, *ApplicationAuthorizeRequest) (*Application, error) + //Grant + SearchGrant(context.Context, *GrantSearchRequest) (*GrantSearchResponse, error) + SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(context.Context, *empty.Empty) (*MyPermissions, error) +} + +// UnimplementedAuthServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAuthServiceServer struct { +} + +func (*UnimplementedAuthServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAuthServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAuthServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) CreateUserAgent(ctx context.Context, req *UserAgentCreation) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) RevokeUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method RevokeUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) CreateAuthSession(ctx context.Context, req *AuthSessionCreation) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateAuthSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetAuthSession(ctx context.Context, req *AuthSessionID) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetAuthSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetAuthSessionByTokenID(ctx context.Context, req *TokenID) (*AuthSessionView, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetAuthSessionByTokenID not implemented") +} +func (*UnimplementedAuthServiceServer) SelectUser(ctx context.Context, req *SelectUserRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SelectUser not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyUser(ctx context.Context, req *VerifyUserRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyUser not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyPassword(ctx context.Context, req *VerifyPasswordRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMfa(ctx context.Context, req *VerifyMfaRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMfa not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserAgentSessions(ctx context.Context, req *UserAgentID) (*UserSessions, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAgentSessions not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserSession(ctx context.Context, req *UserSessionID) (*UserSession, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserSessions(ctx context.Context, req *empty.Empty) (*UserSessionViews, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserSessions not implemented") +} +func (*UnimplementedAuthServiceServer) TerminateUserSession(ctx context.Context, req *UserSessionID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method TerminateUserSession not implemented") +} +func (*UnimplementedAuthServiceServer) CreateToken(ctx context.Context, req *CreateTokenRequest) (*Token, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateToken not implemented") +} +func (*UnimplementedAuthServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") +} +func (*UnimplementedAuthServiceServer) RegisterUser(ctx context.Context, req *RegisterUserRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegisterUser not implemented") +} +func (*UnimplementedAuthServiceServer) RegisterUserWithExternal(ctx context.Context, req *RegisterUserExternalIDPRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegisterUserWithExternal not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserProfile(ctx context.Context, req *empty.Empty) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserEmail(ctx context.Context, req *empty.Empty) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserEmail(ctx context.Context, req *VerifyMyUserEmailRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyUserEmail(ctx context.Context, req *VerifyUserEmailRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyEmailVerificationMail(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyEmailVerificationMail not implemented") +} +func (*UnimplementedAuthServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserPhone(ctx context.Context, req *empty.Empty) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserPhone(ctx context.Context, req *VerifyUserPhoneRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyPhoneVerificationCode(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyPhoneVerificationCode not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserAddress(ctx context.Context, req *empty.Empty) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyMfas(ctx context.Context, req *empty.Empty) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyMfas not implemented") +} +func (*UnimplementedAuthServiceServer) SetMyPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) RequestPasswordReset(ctx context.Context, req *ResetPasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RequestPasswordReset not implemented") +} +func (*UnimplementedAuthServiceServer) PasswordReset(ctx context.Context, req *ResetPassword) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method PasswordReset not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyPassword(ctx context.Context, req *PasswordChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) AddMfaOTP(ctx context.Context, req *empty.Empty) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMfaOTP(ctx context.Context, req *VerifyMfaOtp) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) RemoveMfaOTP(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) SkipMfaInit(ctx context.Context, req *SkipMfaInitRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SkipMfaInit not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") +} +func (*UnimplementedAuthServiceServer) GetApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetApplicationByID not implemented") +} +func (*UnimplementedAuthServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") +} +func (*UnimplementedAuthServiceServer) AuthorizeApplication(ctx context.Context, req *ApplicationAuthorizeRequest) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method AuthorizeApplication not implemented") +} +func (*UnimplementedAuthServiceServer) SearchGrant(ctx context.Context, req *GrantSearchRequest) (*GrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchGrant not implemented") +} +func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(ctx context.Context, req *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchMyProjectOrgs not implemented") +} +func (*UnimplementedAuthServiceServer) IsIamAdmin(ctx context.Context, req *empty.Empty) (*IsAdminResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsIamAdmin not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyZitadelPermissions(ctx context.Context, req *empty.Empty) (*MyPermissions, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyZitadelPermissions not implemented") +} + +func RegisterAuthServiceServer(s *grpc.Server, srv AuthServiceServer) { + s.RegisterService(&_AuthService_serviceDesc, srv) +} + +func _AuthService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserAgent(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentCreation) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateUserAgent(ctx, req.(*UserAgentCreation)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RevokeUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RevokeUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RevokeUserAgent(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthSessionCreation) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateAuthSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateAuthSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateAuthSession(ctx, req.(*AuthSessionCreation)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetAuthSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetAuthSession(ctx, req.(*AuthSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetAuthSessionByTokenID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(TokenID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, req.(*TokenID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SelectUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SelectUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SelectUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SelectUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SelectUser(ctx, req.(*SelectUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyUser(ctx, req.(*VerifyUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyPasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyPassword(ctx, req.(*VerifyPasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMfa_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMfaRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMfa(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfa", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMfa(ctx, req.(*VerifyMfaRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserAgentSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserAgentSessions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserAgentSessions(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserSession(ctx, req.(*UserSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_TerminateUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).TerminateUserSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/TerminateUserSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).TerminateUserSession(ctx, req.(*UserSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateToken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateTokenRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateToken(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateToken", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateToken(ctx, req.(*CreateTokenRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).IsUserUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/IsUserUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RegisterUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RegisterUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RegisterUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RegisterUser(ctx, req.(*RegisterUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RegisterUserWithExternal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RegisterUserExternalIDPRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, req.(*RegisterUserExternalIDPRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMyUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, req.(*VerifyMyUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyUserEmail(ctx, req.(*VerifyUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, req.(*VerifyUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyMfas(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SetMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SetMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SetMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SetMyPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RequestPasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ResetPasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RequestPasswordReset(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RequestPasswordReset(ctx, req.(*ResetPasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_PasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ResetPassword) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).PasswordReset(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/PasswordReset", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).PasswordReset(ctx, req.(*ResetPassword)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, req.(*PasswordChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_AddMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).AddMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/AddMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).AddMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMfaOtp) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, req.(*VerifyMfaOtp)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RemoveMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SkipMfaInit_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SkipMfaInitRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SkipMfaInit(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SkipMfaInit", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SkipMfaInit(ctx, req.(*SkipMfaInitRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserByID(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetApplicationByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetApplicationByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetApplicationByID(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchApplications(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchApplications", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_AuthorizeApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationAuthorizeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).AuthorizeApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).AuthorizeApplication(ctx, req.(*ApplicationAuthorizeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(GrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchGrant(ctx, req.(*GrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchMyProjectOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(MyProjectOrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, req.(*MyProjectOrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_IsIamAdmin_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).IsIamAdmin(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/IsIamAdmin", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).IsIamAdmin(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyZitadelPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +var _AuthService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.auth.api.v1.AuthService", + HandlerType: (*AuthServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AuthService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AuthService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AuthService_Validate_Handler, + }, + { + MethodName: "GetUserAgent", + Handler: _AuthService_GetUserAgent_Handler, + }, + { + MethodName: "CreateUserAgent", + Handler: _AuthService_CreateUserAgent_Handler, + }, + { + MethodName: "RevokeUserAgent", + Handler: _AuthService_RevokeUserAgent_Handler, + }, + { + MethodName: "CreateAuthSession", + Handler: _AuthService_CreateAuthSession_Handler, + }, + { + MethodName: "GetAuthSession", + Handler: _AuthService_GetAuthSession_Handler, + }, + { + MethodName: "GetAuthSessionByTokenID", + Handler: _AuthService_GetAuthSessionByTokenID_Handler, + }, + { + MethodName: "SelectUser", + Handler: _AuthService_SelectUser_Handler, + }, + { + MethodName: "VerifyUser", + Handler: _AuthService_VerifyUser_Handler, + }, + { + MethodName: "VerifyPassword", + Handler: _AuthService_VerifyPassword_Handler, + }, + { + MethodName: "VerifyMfa", + Handler: _AuthService_VerifyMfa_Handler, + }, + { + MethodName: "GetUserAgentSessions", + Handler: _AuthService_GetUserAgentSessions_Handler, + }, + { + MethodName: "GetUserSession", + Handler: _AuthService_GetUserSession_Handler, + }, + { + MethodName: "GetMyUserSessions", + Handler: _AuthService_GetMyUserSessions_Handler, + }, + { + MethodName: "TerminateUserSession", + Handler: _AuthService_TerminateUserSession_Handler, + }, + { + MethodName: "CreateToken", + Handler: _AuthService_CreateToken_Handler, + }, + { + MethodName: "IsUserUnique", + Handler: _AuthService_IsUserUnique_Handler, + }, + { + MethodName: "RegisterUser", + Handler: _AuthService_RegisterUser_Handler, + }, + { + MethodName: "RegisterUserWithExternal", + Handler: _AuthService_RegisterUserWithExternal_Handler, + }, + { + MethodName: "GetMyUserProfile", + Handler: _AuthService_GetMyUserProfile_Handler, + }, + { + MethodName: "UpdateMyUserProfile", + Handler: _AuthService_UpdateMyUserProfile_Handler, + }, + { + MethodName: "GetMyUserEmail", + Handler: _AuthService_GetMyUserEmail_Handler, + }, + { + MethodName: "ChangeMyUserEmail", + Handler: _AuthService_ChangeMyUserEmail_Handler, + }, + { + MethodName: "VerifyMyUserEmail", + Handler: _AuthService_VerifyMyUserEmail_Handler, + }, + { + MethodName: "VerifyUserEmail", + Handler: _AuthService_VerifyUserEmail_Handler, + }, + { + MethodName: "ResendMyEmailVerificationMail", + Handler: _AuthService_ResendMyEmailVerificationMail_Handler, + }, + { + MethodName: "ResendEmailVerificationMail", + Handler: _AuthService_ResendEmailVerificationMail_Handler, + }, + { + MethodName: "GetMyUserPhone", + Handler: _AuthService_GetMyUserPhone_Handler, + }, + { + MethodName: "ChangeMyUserPhone", + Handler: _AuthService_ChangeMyUserPhone_Handler, + }, + { + MethodName: "VerifyMyUserPhone", + Handler: _AuthService_VerifyMyUserPhone_Handler, + }, + { + MethodName: "ResendMyPhoneVerificationCode", + Handler: _AuthService_ResendMyPhoneVerificationCode_Handler, + }, + { + MethodName: "GetMyUserAddress", + Handler: _AuthService_GetMyUserAddress_Handler, + }, + { + MethodName: "UpdateMyUserAddress", + Handler: _AuthService_UpdateMyUserAddress_Handler, + }, + { + MethodName: "GetMyMfas", + Handler: _AuthService_GetMyMfas_Handler, + }, + { + MethodName: "SetMyPassword", + Handler: _AuthService_SetMyPassword_Handler, + }, + { + MethodName: "RequestPasswordReset", + Handler: _AuthService_RequestPasswordReset_Handler, + }, + { + MethodName: "PasswordReset", + Handler: _AuthService_PasswordReset_Handler, + }, + { + MethodName: "ChangeMyPassword", + Handler: _AuthService_ChangeMyPassword_Handler, + }, + { + MethodName: "AddMfaOTP", + Handler: _AuthService_AddMfaOTP_Handler, + }, + { + MethodName: "VerifyMfaOTP", + Handler: _AuthService_VerifyMfaOTP_Handler, + }, + { + MethodName: "RemoveMfaOTP", + Handler: _AuthService_RemoveMfaOTP_Handler, + }, + { + MethodName: "SkipMfaInit", + Handler: _AuthService_SkipMfaInit_Handler, + }, + { + MethodName: "GetUserByID", + Handler: _AuthService_GetUserByID_Handler, + }, + { + MethodName: "GetApplicationByID", + Handler: _AuthService_GetApplicationByID_Handler, + }, + { + MethodName: "SearchApplications", + Handler: _AuthService_SearchApplications_Handler, + }, + { + MethodName: "AuthorizeApplication", + Handler: _AuthService_AuthorizeApplication_Handler, + }, + { + MethodName: "SearchGrant", + Handler: _AuthService_SearchGrant_Handler, + }, + { + MethodName: "SearchMyProjectOrgs", + Handler: _AuthService_SearchMyProjectOrgs_Handler, + }, + { + MethodName: "IsIamAdmin", + Handler: _AuthService_IsIamAdmin_Handler, + }, + { + MethodName: "GetMyZitadelPermissions", + Handler: _AuthService_GetMyZitadelPermissions_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "auth.proto", +} diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go new file mode 100644 index 0000000000..00607cd705 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.gw.go @@ -0,0 +1,2485 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: auth.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AuthService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentCreation + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RevokeUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.RevokeUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthSessionCreation + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + msg, err := client.CreateAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AuthService_GetAuthSession_0 = &utilities.DoubleArray{Encoding: map[string]int{"agent_id": 0, "id": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} +) + +func request_AuthService_GetAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_GetAuthSession_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.GetAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetAuthSessionByTokenID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq TokenID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetAuthSessionByTokenID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SelectUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SelectUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.SelectUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyPasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfa_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyMfa(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserAgentSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAgentSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_TerminateUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.TerminateUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateToken_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateTokenRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.CreateToken(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AuthService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_AuthService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueUserRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_IsUserUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RegisterUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RegisterUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RegisterUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RegisterUserWithExternal_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RegisterUserExternalIDPRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RegisterUserWithExternal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.VerifyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyMfas_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SetMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RequestPasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ResetPasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RequestPasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_PasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ResetPassword + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.PasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AddMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AddMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaOtp + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.RemoveMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SkipMfaInit_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SkipMfaInitRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.SkipMfaInit(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AuthorizeApplication_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationAuthorizeRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AuthorizeApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchGrant_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq GrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq MyProjectOrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchMyProjectOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_IsIamAdmin_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.IsIamAdmin(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyZitadelPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyZitadelPermissions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAuthServiceHandler(ctx, mux, conn) +} + +// RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn)) +} + +// RegisterAuthServiceHandlerClient registers the http handlers for service AuthService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AuthServiceClient" to call the correct interceptors. +func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error { + + mux.Handle("GET", pattern_AuthService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_RevokeUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RevokeUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RevokeUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetAuthSessionByTokenID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetAuthSessionByTokenID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetAuthSessionByTokenID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SelectUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SelectUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SelectUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfa_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfa_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfa_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserAgentSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserAgentSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserAgentSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_TerminateUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_TerminateUserSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_TerminateUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateToken_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateToken_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RegisterUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RegisterUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RegisterUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RegisterUserWithExternal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RegisterUserWithExternal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RegisterUserWithExternal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SetMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SetMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SetMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RequestPasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RequestPasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RequestPasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_PasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_PasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_PasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AddMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AddMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AddMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_RemoveMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RemoveMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RemoveMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SkipMfaInit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SkipMfaInit_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SkipMfaInit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AuthorizeApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AuthorizeApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AuthorizeApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchMyProjectOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchMyProjectOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsIamAdmin_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsIamAdmin_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsIamAdmin_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyZitadelPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyZitadelPermissions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyZitadelPermissions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AuthService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AuthService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AuthService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AuthService_GetUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) + + pattern_AuthService_CreateUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"useragents"}, "")) + + pattern_AuthService_RevokeUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) + + pattern_AuthService_CreateAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "agent_id", "authsessions"}, "")) + + pattern_AuthService_GetAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "authsessions", "id"}, "")) + + pattern_AuthService_GetAuthSessionByTokenID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"tokens", "id", "authsession"}, "")) + + pattern_AuthService_SelectUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_selectuser"}, "")) + + pattern_AuthService_VerifyUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifyuser"}, "")) + + pattern_AuthService_VerifyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifypassword"}, "")) + + pattern_AuthService_VerifyMfa_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifymfa"}, "")) + + pattern_AuthService_GetUserAgentSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "id", "usersessions"}, "")) + + pattern_AuthService_GetUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) + + pattern_AuthService_GetMyUserSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"me", "usersessions"}, "")) + + pattern_AuthService_TerminateUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) + + pattern_AuthService_CreateToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "tokens"}, "")) + + pattern_AuthService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) + + pattern_AuthService_RegisterUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_register"}, "")) + + pattern_AuthService_RegisterUserWithExternal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_externalregister"}, "")) + + pattern_AuthService_GetMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_UpdateMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_GetMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_ChangeMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_VerifyMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_verify"}, "")) + + pattern_AuthService_VerifyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_verify"}, "")) + + pattern_AuthService_ResendMyEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_resendverification"}, "")) + + pattern_AuthService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_ChangeMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_VerifyMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_verify"}, "")) + + pattern_AuthService_ResendMyPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_UpdateMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_GetMyMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "mfas"}, "")) + + pattern_AuthService_SetMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "passwords"}, "")) + + pattern_AuthService_RequestPasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "passwords", "_requestpwreset"}, "")) + + pattern_AuthService_PasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "passwords", "_resetpw"}, "")) + + pattern_AuthService_ChangeMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "passwords", "_change"}, "")) + + pattern_AuthService_AddMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_VerifyMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"users", "me", "mfa", "otp", "_verify"}, "")) + + pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_SkipMfaInit_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "user_id", "mfa", "_skipinit"}, "")) + + pattern_AuthService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_AuthService_GetApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"applications", "id"}, "")) + + pattern_AuthService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_search"}, "")) + + pattern_AuthService_AuthorizeApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_authorize"}, "")) + + pattern_AuthService_SearchGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"grants", "_search"}, "")) + + pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) + + pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) + + pattern_AuthService_GetMyZitadelPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"permissions", "zitadel", "me"}, "")) +) + +var ( + forward_AuthService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AuthService_Ready_0 = runtime.ForwardResponseMessage + + forward_AuthService_Validate_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_RevokeUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateAuthSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetAuthSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetAuthSessionByTokenID_0 = runtime.ForwardResponseMessage + + forward_AuthService_SelectUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfa_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserAgentSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_TerminateUserSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateToken_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsUserUnique_0 = runtime.ForwardResponseMessage + + forward_AuthService_RegisterUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_RegisterUserWithExternal_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyMfas_0 = runtime.ForwardResponseMessage + + forward_AuthService_SetMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_RequestPasswordReset_0 = runtime.ForwardResponseMessage + + forward_AuthService_PasswordReset_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_AddMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_SkipMfaInit_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetApplicationByID_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchApplications_0 = runtime.ForwardResponseMessage + + forward_AuthService_AuthorizeApplication_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchGrant_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyZitadelPermissions_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/auth/api/grpc/auth.swagger.json b/pkg/auth/api/grpc/auth.swagger.json new file mode 100644 index 0000000000..a90c611941 --- /dev/null +++ b/pkg/auth/api/grpc/auth.swagger.json @@ -0,0 +1,2938 @@ +{ + "swagger": "2.0", + "info": { + "title": "Auth API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/auth" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/_authorize": { + "post": { + "operationId": "AuthorizeApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationAuthorizeRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/applications/_search": { + "post": { + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/applications/{id}": { + "get": { + "summary": "Application", + "operationId": "GetApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/global/_isiamadmin": { + "get": { + "operationId": "IsIamAdmin", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1IsAdminResponse" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/global/projectorgs/_search": { + "post": { + "operationId": "SearchMyProjectOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/grants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1GrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1GrantSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/healthz": { + "get": { + "summary": "Readiness", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/me/usersessions": { + "get": { + "operationId": "GetMyUserSessions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSessionViews" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/permissions/zitadel/me": { + "get": { + "summary": "Permission", + "operationId": "GetMyZitadelPermissions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyPermissions" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/tokens/{id}/authsession": { + "get": { + "operationId": "GetAuthSessionByTokenID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionView" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents": { + "post": { + "operationId": "CreateUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserAgentCreation" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions": { + "post": { + "operationId": "CreateAuthSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthSessionCreation" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser": { + "put": { + "operationId": "SelectUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SelectUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa": { + "put": { + "operationId": "VerifyMfa", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMfaRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword": { + "put": { + "operationId": "VerifyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyPasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser": { + "put": { + "operationId": "VerifyUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens": { + "post": { + "operationId": "CreateToken", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Token" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateTokenRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{id}": { + "get": { + "operationId": "GetAuthSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "browser_info.user_agent", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.remote_ip.V4", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.remote_ip.V6", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.accept_language", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/usersessions/{id}": { + "get": { + "operationId": "GetUserSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSession" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + }, + "delete": { + "operationId": "TerminateUserSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{id}": { + "get": { + "summary": "Authorization", + "operationId": "GetUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "RevokeUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserAgentID" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{id}/usersessions": { + "get": { + "operationId": "GetUserAgentSessions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSessions" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_externalregister": { + "post": { + "operationId": "RegisterUserWithExternal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1RegisterUserExternalIDPRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_isunique": { + "get": { + "summary": "User", + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_register": { + "post": { + "operationId": "RegisterUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/address": { + "get": { + "operationId": "GetMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email": { + "get": { + "operationId": "GetMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_resendverification": { + "post": { + "operationId": "ResendMyEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_verify": { + "post": { + "operationId": "VerifyMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMyUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp": { + "delete": { + "operationId": "RemoveMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + }, + "post": { + "summary": "MFA", + "operationId": "AddMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp/_verify": { + "put": { + "operationId": "VerifyMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMfaOtp" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfas": { + "get": { + "operationId": "GetMyMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords": { + "put": { + "operationId": "SetMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords/_change": { + "put": { + "operationId": "ChangeMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordChange" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone": { + "get": { + "operationId": "GetMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_resendverification": { + "post": { + "operationId": "ResendMyPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_verify": { + "post": { + "operationId": "VerifyMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/profile": { + "get": { + "operationId": "GetMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/passwords/_requestpwreset": { + "post": { + "operationId": "RequestPasswordReset", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ResetPasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "TODO: Remove func only for tests", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/email/_verify": { + "post": { + "operationId": "VerifyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/passwords/_resetpw": { + "post": { + "operationId": "PasswordReset", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ResetPassword" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{user_id}/mfa/_skipinit": { + "post": { + "operationId": "SkipMfaInit", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SkipMfaInitRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AuthService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE", + "APPSTATE_DELETED" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationAuthorizeRequest": { + "type": "object", + "properties": { + "oidc_client_auth": { + "$ref": "#/definitions/v1OIDCClientAuth" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSEARCHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_TYPE", + "APPLICATIONSEARCHKEY_STATE", + "APPLICATIONSEARCHKEY_CLIENT_ID", + "APPLICATIONSEARCHKEY_APP_NAME", + "APPLICATIONSEARCHKEY_PROJECT_ID" + ], + "default": "APPLICATIONSEARCHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1AuthRequestOIDC": { + "type": "object", + "properties": { + "scope": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_type": { + "$ref": "#/definitions/v1OIDCResponseType" + }, + "nonce": { + "type": "string" + }, + "code_challenge": { + "$ref": "#/definitions/v1CodeChallenge" + } + } + }, + "v1AuthSessionCreation": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "client_id": { + "type": "string" + }, + "redirect_uri": { + "type": "string" + }, + "state": { + "type": "string" + }, + "prompt": { + "$ref": "#/definitions/v1Prompt" + }, + "auth_context_class_reference": { + "type": "array", + "items": { + "type": "string" + } + }, + "ui_locales": { + "type": "array", + "items": { + "type": "string" + } + }, + "login_hint": { + "type": "string" + }, + "max_age": { + "type": "integer", + "format": "int64" + }, + "oidc": { + "$ref": "#/definitions/v1AuthRequestOIDC" + }, + "preselected_user_id": { + "type": "string" + } + } + }, + "v1AuthSessionMultiFactorOTP": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1AuthSessionResponse": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "client_id": { + "type": "string" + }, + "redirect_uri": { + "type": "string" + }, + "state": { + "type": "string" + }, + "prompt": { + "$ref": "#/definitions/v1Prompt" + }, + "auth_context_class_reference": { + "type": "array", + "items": { + "type": "string" + } + }, + "ui_locales": { + "type": "array", + "items": { + "type": "string" + } + }, + "login_hint": { + "type": "string" + }, + "max_age": { + "type": "integer", + "format": "int64" + }, + "oidc": { + "$ref": "#/definitions/v1AuthRequestOIDC" + }, + "possible_steps": { + "type": "array", + "items": { + "$ref": "#/definitions/v1NextStep" + } + }, + "project_client_ids": { + "type": "array", + "items": { + "type": "string" + } + }, + "user_session": { + "$ref": "#/definitions/v1UserSession" + } + } + }, + "v1AuthSessionType": { + "type": "string", + "enum": [ + "AUTHSESSIONTYPE_UNSPECIFIED", + "AUTHSESSIONTYPE_OIDC", + "AUTHSESSIONTYPE_SAML" + ], + "default": "AUTHSESSIONTYPE_UNSPECIFIED" + }, + "v1AuthSessionView": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "client_id": { + "type": "string" + }, + "user_session_id": { + "type": "string" + }, + "project_client_ids": { + "type": "array", + "items": { + "type": "string" + } + }, + "token_id": { + "type": "string" + }, + "token_expiration": { + "type": "string", + "format": "date-time" + }, + "user_id": { + "type": "string" + } + } + }, + "v1AuthUser": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + } + } + }, + "v1BrowserInformation": { + "type": "object", + "properties": { + "user_agent": { + "type": "string" + }, + "remote_ip": { + "$ref": "#/definitions/v1IP" + }, + "accept_language": { + "type": "string" + } + } + }, + "v1ChooseUser": { + "type": "object", + "properties": { + "user_session_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "user_session_state": { + "$ref": "#/definitions/v1UserSessionState" + } + } + }, + "v1ChooseUserData": { + "type": "object", + "properties": { + "users": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ChooseUser" + } + } + } + }, + "v1CodeChallenge": { + "type": "object", + "properties": { + "challenge": { + "type": "string" + }, + "method": { + "$ref": "#/definitions/v1CodeChallengeMethod" + } + } + }, + "v1CodeChallengeMethod": { + "type": "string", + "enum": [ + "CODECHALLENGEMETHOD_PLAIN", + "CODECHALLENGEMETHOD_S256" + ], + "default": "CODECHALLENGEMETHOD_PLAIN" + }, + "v1CreateTokenRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Grant": { + "type": "object", + "properties": { + "OrgId": { + "type": "string" + }, + "ProjectId": { + "type": "string" + }, + "UserId": { + "type": "string" + }, + "Roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "OrgName": { + "type": "string" + } + } + }, + "v1GrantSearchKey": { + "type": "string", + "enum": [ + "GRANTSEARCHKEY_UNSPECIFIED", + "GRANTSEARCHKEY_ORG_ID", + "GRANTSEARCHKEY_PROJECT_ID", + "GRANTSEARCHKEY_USER_ID" + ], + "default": "GRANTSEARCHKEY_UNSPECIFIED" + }, + "v1GrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1GrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1GrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1GrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1GrantSearchQuery" + } + } + } + }, + "v1GrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Grant" + } + } + } + }, + "v1IDPProvider": { + "type": "object", + "properties": { + "provider": { + "type": "string" + }, + "externalIdpID": { + "type": "string" + } + } + }, + "v1IP": { + "type": "object", + "properties": { + "V4": { + "type": "string" + }, + "V6": { + "type": "string" + } + } + }, + "v1IsAdminResponse": { + "type": "object", + "properties": { + "is_admin": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1LoginData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + } + } + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaOtpResponse": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "url": { + "type": "string" + }, + "secret": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MfaPromptData": { + "type": "object", + "properties": { + "required": { + "type": "boolean", + "format": "boolean" + }, + "mfa_providers": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MfaType" + } + } + } + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MfaVerifyData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + }, + "failure_count": { + "type": "integer", + "format": "int64" + }, + "mfa_providers": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MfaType" + } + } + } + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1MyPermissions": { + "type": "object", + "properties": { + "permissions": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1MyProjectOrgSearchKey": { + "type": "string", + "enum": [ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + "MYPROJECTORGSEARCHKEY_ORG_NAME" + ], + "default": "MYPROJECTORGSEARCHKEY_UNSPECIFIED" + }, + "v1MyProjectOrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1MyProjectOrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1MyProjectOrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MyProjectOrgSearchQuery" + } + } + } + }, + "v1MyProjectOrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1NextStep": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1NextStepType" + }, + "login": { + "$ref": "#/definitions/v1LoginData" + }, + "password": { + "$ref": "#/definitions/v1PasswordData" + }, + "mfa_verify": { + "$ref": "#/definitions/v1MfaVerifyData" + }, + "mfa_prompt": { + "$ref": "#/definitions/v1MfaPromptData" + }, + "choose_user": { + "$ref": "#/definitions/v1ChooseUserData" + } + } + }, + "v1NextStepType": { + "type": "string", + "enum": [ + "NEXTSTEP_UNSPECIFIED", + "NEXTSTEP_LOGIN", + "NEXTSTEP_PASSWORD", + "NEXTSTEP_CHANGE_PASSWORD", + "NEXTSTEP_MFA_PROMPT", + "NEXTSTEP_MFA_INIT_CHOICE", + "NEXTSTEP_MFA_INIT_CREATE", + "NEXTSTEP_MFA_INIT_VERIFY", + "NEXTSTEP_MFA_INIT_DONE", + "NEXTSTEP_MFA_VERIFY", + "NEXTSTEP_MFA_VERIFY_ASYNC", + "NEXTSTEP_VERIFY_EMAIL", + "NEXTSTEP_REDIRECT_TO_CALLBACK", + "NEXTSTEP_INIT_PASSWORD", + "NEXTSTEP_CHOOSE_USER" + ], + "default": "NEXTSTEP_UNSPECIFIED" + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCClientAuth": { + "type": "object", + "properties": { + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + } + } + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_secret": { + "type": "string" + }, + "client_id": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_GRANT_TYPE_NONE", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1PasswordChange": { + "type": "object", + "properties": { + "old_password": { + "type": "string" + }, + "new_password": { + "type": "string" + } + } + }, + "v1PasswordData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + }, + "failure_count": { + "type": "integer", + "format": "int64" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "password": { + "type": "string" + } + } + }, + "v1Prompt": { + "type": "string", + "enum": [ + "PROMPT_UNSPECIFIED", + "PROMPT_NONE", + "PROMPT_LOGIN", + "PROMPT_CONSENT", + "PROMPT_SELECT_ACCOUNT" + ], + "default": "PROMPT_UNSPECIFIED" + }, + "v1RegisterUserExternalIDPRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "idp_provider": { + "$ref": "#/definitions/v1IDPProvider" + }, + "org_id": { + "type": "string" + } + } + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1ResetPassword": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "code": { + "type": "string" + }, + "new_password": { + "type": "string" + } + } + }, + "v1ResetPasswordRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SelectUserRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "user_session_id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1SkipMfaInitRequest": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + } + } + }, + "v1Token": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "expiration": { + "type": "string", + "format": "date-time" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "phone": { + "type": "string" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "activation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password_change_required": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAgent": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "state": { + "$ref": "#/definitions/v1UserAgentState" + } + } + }, + "v1UserAgentCreation": { + "type": "object", + "properties": { + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1UserAgentID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserAgentState": { + "type": "string", + "enum": [ + "USERAGENTSTATE_UNSPECIFIED", + "USERAGENTSTATE_ACTIVE", + "USERAGENTSTATE_TERMINATED" + ], + "default": "USERAGENTSTATE_UNSPECIFIED" + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1UserSession": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "agent_id": { + "type": "string" + }, + "auth_state": { + "$ref": "#/definitions/v1UserSessionState" + }, + "user": { + "$ref": "#/definitions/v1AuthUser" + }, + "password_verified": { + "type": "boolean", + "format": "boolean" + }, + "mfa": { + "$ref": "#/definitions/v1MfaType" + }, + "mfa_verified": { + "type": "boolean", + "format": "boolean" + }, + "auth_time": { + "type": "string", + "format": "date-time" + } + } + }, + "v1UserSessionState": { + "type": "string", + "enum": [ + "USERSESSIONSTATE_UNSPECIFIED", + "USERSESSIONSTATE_ACTIVE", + "USERSESSIONSTATE_TERMINATED" + ], + "default": "USERSESSIONSTATE_UNSPECIFIED" + }, + "v1UserSessionView": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "agent_id": { + "type": "string" + }, + "auth_state": { + "$ref": "#/definitions/v1UserSessionState" + }, + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSessionViews": { + "type": "object", + "properties": { + "user_sessions": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSessionView" + } + } + } + }, + "v1UserSessions": { + "type": "object", + "properties": { + "user_sessions": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSession" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIEFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIEFIED" + }, + "v1VerifyMfaOtp": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyMfaRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "otp": { + "$ref": "#/definitions/v1AuthSessionMultiFactorOTP" + } + } + }, + "v1VerifyMyUserEmailRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyPasswordRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "password": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1VerifyUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "code": { + "type": "string" + } + } + }, + "v1VerifyUserPhoneRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyUserRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + } + } +} diff --git a/pkg/auth/api/grpc/mock/auth.proto.mock.go b/pkg/auth/api/grpc/mock/auth.proto.mock.go new file mode 100644 index 0000000000..f74e7ad52e --- /dev/null +++ b/pkg/auth/api/grpc/mock/auth.proto.mock.go @@ -0,0 +1,1078 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/auth/api/grpc (interfaces: AuthServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/auth/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAuthServiceClient is a mock of AuthServiceClient interface +type MockAuthServiceClient struct { + ctrl *gomock.Controller + recorder *MockAuthServiceClientMockRecorder +} + +// MockAuthServiceClientMockRecorder is the mock recorder for MockAuthServiceClient +type MockAuthServiceClientMockRecorder struct { + mock *MockAuthServiceClient +} + +// NewMockAuthServiceClient creates a new mock instance +func NewMockAuthServiceClient(ctrl *gomock.Controller) *MockAuthServiceClient { + mock := &MockAuthServiceClient{ctrl: ctrl} + mock.recorder = &MockAuthServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAuthServiceClient) EXPECT() *MockAuthServiceClientMockRecorder { + return m.recorder +} + +// AddMfaOTP mocks base method +func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddMfaOTP indicates an expected call of AddMfaOTP +func (mr *MockAuthServiceClientMockRecorder) AddMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).AddMfaOTP), varargs...) +} + +// AuthorizeApplication mocks base method +func (m *MockAuthServiceClient) AuthorizeApplication(arg0 context.Context, arg1 *grpc.ApplicationAuthorizeRequest, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AuthorizeApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AuthorizeApplication indicates an expected call of AuthorizeApplication +func (mr *MockAuthServiceClientMockRecorder) AuthorizeApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AuthorizeApplication", reflect.TypeOf((*MockAuthServiceClient)(nil).AuthorizeApplication), varargs...) +} + +// ChangeMyPassword mocks base method +func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyPassword", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyPassword indicates an expected call of ChangeMyPassword +func (mr *MockAuthServiceClientMockRecorder) ChangeMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyPassword), varargs...) +} + +// ChangeMyUserEmail mocks base method +func (m *MockAuthServiceClient) ChangeMyUserEmail(arg0 context.Context, arg1 *grpc.UpdateUserEmailRequest, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserEmail indicates an expected call of ChangeMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserEmail), varargs...) +} + +// ChangeMyUserPhone mocks base method +func (m *MockAuthServiceClient) ChangeMyUserPhone(arg0 context.Context, arg1 *grpc.UpdateUserPhoneRequest, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserPhone indicates an expected call of ChangeMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserPhone), varargs...) +} + +// CreateAuthSession mocks base method +func (m *MockAuthServiceClient) CreateAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionCreation, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateAuthSession", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateAuthSession indicates an expected call of CreateAuthSession +func (mr *MockAuthServiceClientMockRecorder) CreateAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateAuthSession), varargs...) +} + +// CreateToken mocks base method +func (m *MockAuthServiceClient) CreateToken(arg0 context.Context, arg1 *grpc.CreateTokenRequest, arg2 ...grpc0.CallOption) (*grpc.Token, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateToken", varargs...) + ret0, _ := ret[0].(*grpc.Token) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateToken indicates an expected call of CreateToken +func (mr *MockAuthServiceClientMockRecorder) CreateToken(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateToken", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateToken), varargs...) +} + +// CreateUserAgent mocks base method +func (m *MockAuthServiceClient) CreateUserAgent(arg0 context.Context, arg1 *grpc.UserAgentCreation, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateUserAgent indicates an expected call of CreateUserAgent +func (mr *MockAuthServiceClientMockRecorder) CreateUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateUserAgent), varargs...) +} + +// GetApplicationByID mocks base method +func (m *MockAuthServiceClient) GetApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetApplicationByID", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetApplicationByID indicates an expected call of GetApplicationByID +func (mr *MockAuthServiceClientMockRecorder) GetApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplicationByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetApplicationByID), varargs...) +} + +// GetAuthSession mocks base method +func (m *MockAuthServiceClient) GetAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetAuthSession", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetAuthSession indicates an expected call of GetAuthSession +func (mr *MockAuthServiceClientMockRecorder) GetAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSession), varargs...) +} + +// GetAuthSessionByTokenID mocks base method +func (m *MockAuthServiceClient) GetAuthSessionByTokenID(arg0 context.Context, arg1 *grpc.TokenID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionView, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetAuthSessionByTokenID", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionView) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetAuthSessionByTokenID indicates an expected call of GetAuthSessionByTokenID +func (mr *MockAuthServiceClientMockRecorder) GetAuthSessionByTokenID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSessionByTokenID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSessionByTokenID), varargs...) +} + +// GetMyMfas mocks base method +func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyMfas", varargs...) + ret0, _ := ret[0].(*grpc.MultiFactors) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyMfas indicates an expected call of GetMyMfas +func (mr *MockAuthServiceClientMockRecorder) GetMyMfas(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyMfas", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyMfas), varargs...) +} + +// GetMyUserAddress mocks base method +func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserAddress indicates an expected call of GetMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) GetMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserAddress), varargs...) +} + +// GetMyUserEmail mocks base method +func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserEmail indicates an expected call of GetMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) GetMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserEmail), varargs...) +} + +// GetMyUserPhone mocks base method +func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserPhone indicates an expected call of GetMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) GetMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserPhone), varargs...) +} + +// GetMyUserProfile mocks base method +func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserProfile indicates an expected call of GetMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) GetMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserProfile), varargs...) +} + +// GetMyUserSessions mocks base method +func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserSessions", varargs...) + ret0, _ := ret[0].(*grpc.UserSessionViews) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserSessions indicates an expected call of GetMyUserSessions +func (mr *MockAuthServiceClientMockRecorder) GetMyUserSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserSessions), varargs...) +} + +// GetMyZitadelPermissions mocks base method +func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyZitadelPermissions", varargs...) + ret0, _ := ret[0].(*grpc.MyPermissions) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyZitadelPermissions indicates an expected call of GetMyZitadelPermissions +func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...) +} + +// GetUserAgent mocks base method +func (m *MockAuthServiceClient) GetUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserAgent indicates an expected call of GetUserAgent +func (mr *MockAuthServiceClientMockRecorder) GetUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgent), varargs...) +} + +// GetUserAgentSessions mocks base method +func (m *MockAuthServiceClient) GetUserAgentSessions(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserSessions, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserAgentSessions", varargs...) + ret0, _ := ret[0].(*grpc.UserSessions) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserAgentSessions indicates an expected call of GetUserAgentSessions +func (mr *MockAuthServiceClientMockRecorder) GetUserAgentSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgentSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgentSessions), varargs...) +} + +// GetUserByID mocks base method +func (m *MockAuthServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserByID", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserByID indicates an expected call of GetUserByID +func (mr *MockAuthServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserByID), varargs...) +} + +// GetUserSession mocks base method +func (m *MockAuthServiceClient) GetUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*grpc.UserSession, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserSession", varargs...) + ret0, _ := ret[0].(*grpc.UserSession) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserSession indicates an expected call of GetUserSession +func (mr *MockAuthServiceClientMockRecorder) GetUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserSession), varargs...) +} + +// Healthz mocks base method +func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAuthServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAuthServiceClient)(nil).Healthz), varargs...) +} + +// IsIamAdmin mocks base method +func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsIamAdmin", varargs...) + ret0, _ := ret[0].(*grpc.IsAdminResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsIamAdmin indicates an expected call of IsIamAdmin +func (mr *MockAuthServiceClientMockRecorder) IsIamAdmin(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsIamAdmin", reflect.TypeOf((*MockAuthServiceClient)(nil).IsIamAdmin), varargs...) +} + +// IsUserUnique mocks base method +func (m *MockAuthServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsUserUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueUserResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsUserUnique indicates an expected call of IsUserUnique +func (mr *MockAuthServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockAuthServiceClient)(nil).IsUserUnique), varargs...) +} + +// PasswordReset mocks base method +func (m *MockAuthServiceClient) PasswordReset(arg0 context.Context, arg1 *grpc.ResetPassword, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "PasswordReset", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// PasswordReset indicates an expected call of PasswordReset +func (mr *MockAuthServiceClientMockRecorder) PasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).PasswordReset), varargs...) +} + +// Ready mocks base method +func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAuthServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAuthServiceClient)(nil).Ready), varargs...) +} + +// RegisterUser mocks base method +func (m *MockAuthServiceClient) RegisterUser(arg0 context.Context, arg1 *grpc.RegisterUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RegisterUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RegisterUser indicates an expected call of RegisterUser +func (mr *MockAuthServiceClientMockRecorder) RegisterUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUser", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUser), varargs...) +} + +// RegisterUserWithExternal mocks base method +func (m *MockAuthServiceClient) RegisterUserWithExternal(arg0 context.Context, arg1 *grpc.RegisterUserExternalIDPRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RegisterUserWithExternal", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RegisterUserWithExternal indicates an expected call of RegisterUserWithExternal +func (mr *MockAuthServiceClientMockRecorder) RegisterUserWithExternal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUserWithExternal", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUserWithExternal), varargs...) +} + +// RemoveMfaOTP mocks base method +func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveMfaOTP", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveMfaOTP indicates an expected call of RemoveMfaOTP +func (mr *MockAuthServiceClientMockRecorder) RemoveMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).RemoveMfaOTP), varargs...) +} + +// RequestPasswordReset mocks base method +func (m *MockAuthServiceClient) RequestPasswordReset(arg0 context.Context, arg1 *grpc.ResetPasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RequestPasswordReset", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RequestPasswordReset indicates an expected call of RequestPasswordReset +func (mr *MockAuthServiceClientMockRecorder) RequestPasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RequestPasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).RequestPasswordReset), varargs...) +} + +// ResendEmailVerificationMail mocks base method +func (m *MockAuthServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail +func (mr *MockAuthServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendEmailVerificationMail), varargs...) +} + +// ResendMyEmailVerificationMail mocks base method +func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyEmailVerificationMail indicates an expected call of ResendMyEmailVerificationMail +func (mr *MockAuthServiceClientMockRecorder) ResendMyEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyEmailVerificationMail), varargs...) +} + +// ResendMyPhoneVerificationCode mocks base method +func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyPhoneVerificationCode", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyPhoneVerificationCode indicates an expected call of ResendMyPhoneVerificationCode +func (mr *MockAuthServiceClientMockRecorder) ResendMyPhoneVerificationCode(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyPhoneVerificationCode", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyPhoneVerificationCode), varargs...) +} + +// RevokeUserAgent mocks base method +func (m *MockAuthServiceClient) RevokeUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RevokeUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RevokeUserAgent indicates an expected call of RevokeUserAgent +func (mr *MockAuthServiceClientMockRecorder) RevokeUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RevokeUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).RevokeUserAgent), varargs...) +} + +// SearchApplications mocks base method +func (m *MockAuthServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchApplications", varargs...) + ret0, _ := ret[0].(*grpc.ApplicationSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchApplications indicates an expected call of SearchApplications +func (mr *MockAuthServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchApplications), varargs...) +} + +// SearchGrant mocks base method +func (m *MockAuthServiceClient) SearchGrant(arg0 context.Context, arg1 *grpc.GrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.GrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchGrant", varargs...) + ret0, _ := ret[0].(*grpc.GrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchGrant indicates an expected call of SearchGrant +func (mr *MockAuthServiceClientMockRecorder) SearchGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchGrant", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchGrant), varargs...) +} + +// SearchMyProjectOrgs mocks base method +func (m *MockAuthServiceClient) SearchMyProjectOrgs(arg0 context.Context, arg1 *grpc.MyProjectOrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.MyProjectOrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchMyProjectOrgs", varargs...) + ret0, _ := ret[0].(*grpc.MyProjectOrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchMyProjectOrgs indicates an expected call of SearchMyProjectOrgs +func (mr *MockAuthServiceClientMockRecorder) SearchMyProjectOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMyProjectOrgs", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchMyProjectOrgs), varargs...) +} + +// SelectUser mocks base method +func (m *MockAuthServiceClient) SelectUser(arg0 context.Context, arg1 *grpc.SelectUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SelectUser", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SelectUser indicates an expected call of SelectUser +func (mr *MockAuthServiceClientMockRecorder) SelectUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectUser", reflect.TypeOf((*MockAuthServiceClient)(nil).SelectUser), varargs...) +} + +// SetMyPassword mocks base method +func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetMyPassword", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetMyPassword indicates an expected call of SetMyPassword +func (mr *MockAuthServiceClientMockRecorder) SetMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).SetMyPassword), varargs...) +} + +// SkipMfaInit mocks base method +func (m *MockAuthServiceClient) SkipMfaInit(arg0 context.Context, arg1 *grpc.SkipMfaInitRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SkipMfaInit", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SkipMfaInit indicates an expected call of SkipMfaInit +func (mr *MockAuthServiceClientMockRecorder) SkipMfaInit(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SkipMfaInit", reflect.TypeOf((*MockAuthServiceClient)(nil).SkipMfaInit), varargs...) +} + +// TerminateUserSession mocks base method +func (m *MockAuthServiceClient) TerminateUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "TerminateUserSession", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// TerminateUserSession indicates an expected call of TerminateUserSession +func (mr *MockAuthServiceClientMockRecorder) TerminateUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TerminateUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).TerminateUserSession), varargs...) +} + +// UpdateMyUserAddress mocks base method +func (m *MockAuthServiceClient) UpdateMyUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserAddress indicates an expected call of UpdateMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserAddress), varargs...) +} + +// UpdateMyUserProfile mocks base method +func (m *MockAuthServiceClient) UpdateMyUserProfile(arg0 context.Context, arg1 *grpc.UpdateUserProfileRequest, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserProfile indicates an expected call of UpdateMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserProfile), varargs...) +} + +// Validate mocks base method +func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAuthServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAuthServiceClient)(nil).Validate), varargs...) +} + +// VerifyMfa mocks base method +func (m *MockAuthServiceClient) VerifyMfa(arg0 context.Context, arg1 *grpc.VerifyMfaRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMfa", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMfa indicates an expected call of VerifyMfa +func (mr *MockAuthServiceClientMockRecorder) VerifyMfa(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfa", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfa), varargs...) +} + +// VerifyMfaOTP mocks base method +func (m *MockAuthServiceClient) VerifyMfaOTP(arg0 context.Context, arg1 *grpc.VerifyMfaOtp, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMfaOTP indicates an expected call of VerifyMfaOTP +func (mr *MockAuthServiceClientMockRecorder) VerifyMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfaOTP), varargs...) +} + +// VerifyMyUserEmail mocks base method +func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserEmail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserEmail indicates an expected call of VerifyMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserEmail), varargs...) +} + +// VerifyMyUserPhone mocks base method +func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserPhone", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserPhone indicates an expected call of VerifyMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserPhone), varargs...) +} + +// VerifyPassword mocks base method +func (m *MockAuthServiceClient) VerifyPassword(arg0 context.Context, arg1 *grpc.VerifyPasswordRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyPassword", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyPassword indicates an expected call of VerifyPassword +func (mr *MockAuthServiceClientMockRecorder) VerifyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyPassword), varargs...) +} + +// VerifyUser mocks base method +func (m *MockAuthServiceClient) VerifyUser(arg0 context.Context, arg1 *grpc.VerifyUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyUser", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyUser indicates an expected call of VerifyUser +func (mr *MockAuthServiceClientMockRecorder) VerifyUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUser", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUser), varargs...) +} + +// VerifyUserEmail mocks base method +func (m *MockAuthServiceClient) VerifyUserEmail(arg0 context.Context, arg1 *grpc.VerifyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyUserEmail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyUserEmail indicates an expected call of VerifyUserEmail +func (mr *MockAuthServiceClientMockRecorder) VerifyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUserEmail), varargs...) +} diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto index 3c47b5b543..dd6c399ab2 100644 --- a/pkg/auth/api/proto/auth.proto +++ b/pkg/auth/api/proto/auth.proto @@ -10,14 +10,14 @@ import "authoption/options.proto"; package zitadel.auth.api.v1; -option go_package = "github.com/caos/zitadel/auth/api/grpc"; +option go_package = "github.com/caos/zitadel/pkg/auth/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Auth API"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/auth" + url: "https://github.com/caos/zitadel/pkg/auth" }; }; diff --git a/pkg/management/api/grpc/generate.go b/pkg/management/api/grpc/generate.go index 7217c62cfb..b9067afe7b 100644 --- a/pkg/management/api/grpc/generate.go +++ b/pkg/management/api/grpc/generate.go @@ -1,6 +1,6 @@ package grpc //go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto -//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/management/api/grpc ManagementServiceClient +//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/pkg/management/api/grpc ManagementServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go new file mode 100644 index 0000000000..11207192ee --- /dev/null +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -0,0 +1,521 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * ManagementService + */ + +var ManagementService_AuthMethods = utils_auth.MethodMapping{ + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.Option{ + Permission: "user.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.Option{ + Permission: "org.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.Option{ + Permission: "project.member.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.Option{ + Permission: "project.role.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.Option{ + Permission: "project.role.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.Option{ + Permission: "project.role.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, +} + +func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) +} diff --git a/pkg/management/api/grpc/management.pb.go b/pkg/management/api/grpc/management.pb.go new file mode 100644 index 0000000000..81e574c5c5 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.go @@ -0,0 +1,12569 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: management.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + _ "github.com/golang/protobuf/protoc-gen-go/descriptor" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +type UserSearchKey int32 + +const ( + UserSearchKey_USERSEARCHKEY_UNSPECIFIED UserSearchKey = 0 + UserSearchKey_USERSEARCHKEY_USER_NAME UserSearchKey = 1 + UserSearchKey_USERSEARCHKEY_FIRST_NAME UserSearchKey = 2 + UserSearchKey_USERSEARCHKEY_LAST_NAME UserSearchKey = 3 + UserSearchKey_USERSEARCHKEY_NICK_NAME UserSearchKey = 4 + UserSearchKey_USERSEARCHKEY_DISPLAY_NAME UserSearchKey = 5 + UserSearchKey_USERSEARCHKEY_EMAIL UserSearchKey = 6 + UserSearchKey_USERSEARCHKEY_STATE UserSearchKey = 7 +) + +var UserSearchKey_name = map[int32]string{ + 0: "USERSEARCHKEY_UNSPECIFIED", + 1: "USERSEARCHKEY_USER_NAME", + 2: "USERSEARCHKEY_FIRST_NAME", + 3: "USERSEARCHKEY_LAST_NAME", + 4: "USERSEARCHKEY_NICK_NAME", + 5: "USERSEARCHKEY_DISPLAY_NAME", + 6: "USERSEARCHKEY_EMAIL", + 7: "USERSEARCHKEY_STATE", +} + +var UserSearchKey_value = map[string]int32{ + "USERSEARCHKEY_UNSPECIFIED": 0, + "USERSEARCHKEY_USER_NAME": 1, + "USERSEARCHKEY_FIRST_NAME": 2, + "USERSEARCHKEY_LAST_NAME": 3, + "USERSEARCHKEY_NICK_NAME": 4, + "USERSEARCHKEY_DISPLAY_NAME": 5, + "USERSEARCHKEY_EMAIL": 6, + "USERSEARCHKEY_STATE": 7, +} + +func (x UserSearchKey) String() string { + return proto.EnumName(UserSearchKey_name, int32(x)) +} + +func (UserSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +var SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", +} + +var SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, +} + +func (x SearchMethod) String() string { + return proto.EnumName(SearchMethod_name, int32(x)) +} + +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +var MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", +} + +var MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, +} + +func (x MfaType) String() string { + return proto.EnumName(MfaType_name, int32(x)) +} + +func (MfaType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +var MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", +} + +var MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, +} + +func (x MFAState) String() string { + return proto.EnumName(MFAState_name, int32(x)) +} + +func (MFAState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +type NotificationType int32 + +const ( + NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 + NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 +) + +var NotificationType_name = map[int32]string{ + 0: "NOTIFICATIONTYPE_EMAIL", + 1: "NOTIFICATIONTYPE_SMS", +} + +var NotificationType_value = map[string]int32{ + "NOTIFICATIONTYPE_EMAIL": 0, + "NOTIFICATIONTYPE_SMS": 1, +} + +func (x NotificationType) String() string { + return proto.EnumName(NotificationType_name, int32(x)) +} + +func (NotificationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +type PolicyState int32 + +const ( + PolicyState_POLICYSTATE_UNSPECIFIED PolicyState = 0 + PolicyState_POLICYSTATE_ACTIVE PolicyState = 1 + PolicyState_POLICYSTATE_INACTIVE PolicyState = 2 + PolicyState_POLICYSTATE_DELETED PolicyState = 3 +) + +var PolicyState_name = map[int32]string{ + 0: "POLICYSTATE_UNSPECIFIED", + 1: "POLICYSTATE_ACTIVE", + 2: "POLICYSTATE_INACTIVE", + 3: "POLICYSTATE_DELETED", +} + +var PolicyState_value = map[string]int32{ + "POLICYSTATE_UNSPECIFIED": 0, + "POLICYSTATE_ACTIVE": 1, + "POLICYSTATE_INACTIVE": 2, + "POLICYSTATE_DELETED": 3, +} + +func (x PolicyState) String() string { + return proto.EnumName(PolicyState_name, int32(x)) +} + +func (PolicyState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +type OrgMemberSearchKey int32 + +const ( + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED OrgMemberSearchKey = 0 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_FIRST_NAME OrgMemberSearchKey = 1 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_LAST_NAME OrgMemberSearchKey = 2 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_EMAIL OrgMemberSearchKey = 3 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_USER_ID OrgMemberSearchKey = 4 +) + +var OrgMemberSearchKey_name = map[int32]string{ + 0: "ORGMEMBERSEARCHKEY_UNSPECIFIED", + 1: "ORGMEMBERSEARCHKEY_FIRST_NAME", + 2: "ORGMEMBERSEARCHKEY_LAST_NAME", + 3: "ORGMEMBERSEARCHKEY_EMAIL", + 4: "ORGMEMBERSEARCHKEY_USER_ID", +} + +var OrgMemberSearchKey_value = map[string]int32{ + "ORGMEMBERSEARCHKEY_UNSPECIFIED": 0, + "ORGMEMBERSEARCHKEY_FIRST_NAME": 1, + "ORGMEMBERSEARCHKEY_LAST_NAME": 2, + "ORGMEMBERSEARCHKEY_EMAIL": 3, + "ORGMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x OrgMemberSearchKey) String() string { + return proto.EnumName(OrgMemberSearchKey_name, int32(x)) +} + +func (OrgMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +type ProjectState int32 + +const ( + ProjectState_PROJECTSTATE_UNSPECIFIED ProjectState = 0 + ProjectState_PROJECTSTATE_ACTIVE ProjectState = 1 + ProjectState_PROJECTSSTATE_INACTIVE ProjectState = 2 +) + +var ProjectState_name = map[int32]string{ + 0: "PROJECTSTATE_UNSPECIFIED", + 1: "PROJECTSTATE_ACTIVE", + 2: "PROJECTSSTATE_INACTIVE", +} + +var ProjectState_value = map[string]int32{ + "PROJECTSTATE_UNSPECIFIED": 0, + "PROJECTSTATE_ACTIVE": 1, + "PROJECTSSTATE_INACTIVE": 2, +} + +func (x ProjectState) String() string { + return proto.EnumName(ProjectState_name, int32(x)) +} + +func (ProjectState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +type ProjectType int32 + +const ( + ProjectType_PROJECTTYPE_UNKNOWN ProjectType = 0 + ProjectType_PROJECTTYPE_SELF ProjectType = 1 + ProjectType_PROJECTTYPE_GRANTED ProjectType = 2 +) + +var ProjectType_name = map[int32]string{ + 0: "PROJECTTYPE_UNKNOWN", + 1: "PROJECTTYPE_SELF", + 2: "PROJECTTYPE_GRANTED", +} + +var ProjectType_value = map[string]int32{ + "PROJECTTYPE_UNKNOWN": 0, + "PROJECTTYPE_SELF": 1, + "PROJECTTYPE_GRANTED": 2, +} + +func (x ProjectType) String() string { + return proto.EnumName(ProjectType_name, int32(x)) +} + +func (ProjectType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +type ProjectSearchKey int32 + +const ( + ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED ProjectSearchKey = 0 + ProjectSearchKey_PROJECTSEARCHKEY_PROJECT_NAME ProjectSearchKey = 1 +) + +var ProjectSearchKey_name = map[int32]string{ + 0: "PROJECTSEARCHKEY_UNSPECIFIED", + 1: "PROJECTSEARCHKEY_PROJECT_NAME", +} + +var ProjectSearchKey_value = map[string]int32{ + "PROJECTSEARCHKEY_UNSPECIFIED": 0, + "PROJECTSEARCHKEY_PROJECT_NAME": 1, +} + +func (x ProjectSearchKey) String() string { + return proto.EnumName(ProjectSearchKey_name, int32(x)) +} + +func (ProjectSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +type ProjectRoleSearchKey int32 + +const ( + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED ProjectRoleSearchKey = 0 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_NAME ProjectRoleSearchKey = 1 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_DISPLAY_NAME ProjectRoleSearchKey = 2 +) + +var ProjectRoleSearchKey_name = map[int32]string{ + 0: "PROJECTROLESEARCHKEY_UNSPECIFIED", + 1: "PROJECTROLESEARCHKEY_NAME", + 2: "PROJECTROLESEARCHKEY_DISPLAY_NAME", +} + +var ProjectRoleSearchKey_value = map[string]int32{ + "PROJECTROLESEARCHKEY_UNSPECIFIED": 0, + "PROJECTROLESEARCHKEY_NAME": 1, + "PROJECTROLESEARCHKEY_DISPLAY_NAME": 2, +} + +func (x ProjectRoleSearchKey) String() string { + return proto.EnumName(ProjectRoleSearchKey_name, int32(x)) +} + +func (ProjectRoleSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +type ProjectMemberSearchKey int32 + +const ( + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED ProjectMemberSearchKey = 0 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_FIRST_NAME ProjectMemberSearchKey = 1 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_LAST_NAME ProjectMemberSearchKey = 2 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_EMAIL ProjectMemberSearchKey = 3 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_USER_ID ProjectMemberSearchKey = 4 +) + +var ProjectMemberSearchKey_name = map[int32]string{ + 0: "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectMemberSearchKey_value = map[string]int32{ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectMemberSearchKey) String() string { + return proto.EnumName(ProjectMemberSearchKey_name, int32(x)) +} + +func (ProjectMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +type AppState int32 + +const ( + AppState_APPSTATE_UNSPECIFIED AppState = 0 + AppState_APPSTATE_ACTIVE AppState = 1 + AppState_APPSTATE_INACTIVE AppState = 2 +) + +var AppState_name = map[int32]string{ + 0: "APPSTATE_UNSPECIFIED", + 1: "APPSTATE_ACTIVE", + 2: "APPSTATE_INACTIVE", +} + +var AppState_value = map[string]int32{ + "APPSTATE_UNSPECIFIED": 0, + "APPSTATE_ACTIVE": 1, + "APPSTATE_INACTIVE": 2, +} + +func (x AppState) String() string { + return proto.EnumName(AppState_name, int32(x)) +} + +func (AppState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_TOKEN_ID_TOKEN OIDCResponseType = 2 +) + +var OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_TOKEN_ID_TOKEN", +} + +var OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN": 2, +} + +func (x OIDCResponseType) String() string { + return proto.EnumName(OIDCResponseType_name, int32(x)) +} + +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +type OIDCGrantType int32 + +const ( + OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 + OIDCGrantType_OIDCGRANTTYPE_IMPLICIT OIDCGrantType = 1 + OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +) + +var OIDCGrantType_name = map[int32]string{ + 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", + 1: "OIDCGRANTTYPE_IMPLICIT", + 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +} + +var OIDCGrantType_value = map[string]int32{ + "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, + "OIDCGRANTTYPE_IMPLICIT": 1, + "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +} + +func (x OIDCGrantType) String() string { + return proto.EnumName(OIDCGrantType_name, int32(x)) +} + +func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +type OIDCApplicationType int32 + +const ( + OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 + OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 + OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 +) + +var OIDCApplicationType_name = map[int32]string{ + 0: "OIDCAPPLICATIONTYPE_WEB", + 1: "OIDCAPPLICATIONTYPE_USER_AGENT", + 2: "OIDCAPPLICATIONTYPE_NATIVE", +} + +var OIDCApplicationType_value = map[string]int32{ + "OIDCAPPLICATIONTYPE_WEB": 0, + "OIDCAPPLICATIONTYPE_USER_AGENT": 1, + "OIDCAPPLICATIONTYPE_NATIVE": 2, +} + +func (x OIDCApplicationType) String() string { + return proto.EnumName(OIDCApplicationType_name, int32(x)) +} + +func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +type OIDCAuthMethodType int32 + +const ( + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 +) + +var OIDCAuthMethodType_name = map[int32]string{ + 0: "OIDCAUTHMETHODTYPE_BASIC", + 1: "OIDCAUTHMETHODTYPE_POST", + 2: "OIDCAUTHMETHODTYPE_NONE", +} + +var OIDCAuthMethodType_value = map[string]int32{ + "OIDCAUTHMETHODTYPE_BASIC": 0, + "OIDCAUTHMETHODTYPE_POST": 1, + "OIDCAUTHMETHODTYPE_NONE": 2, +} + +func (x OIDCAuthMethodType) String() string { + return proto.EnumName(OIDCAuthMethodType_name, int32(x)) +} + +func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +type ApplicationSearchKey int32 + +const ( + ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED ApplicationSearchKey = 0 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 1 +) + +var ApplicationSearchKey_name = map[int32]string{ + 0: "APPLICATIONSERACHKEY_UNSPECIFIED", + 1: "APPLICATIONSEARCHKEY_APP_NAME", +} + +var ApplicationSearchKey_value = map[string]int32{ + "APPLICATIONSERACHKEY_UNSPECIFIED": 0, + "APPLICATIONSEARCHKEY_APP_NAME": 1, +} + +func (x ApplicationSearchKey) String() string { + return proto.EnumName(ApplicationSearchKey_name, int32(x)) +} + +func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +type ProjectGrantState int32 + +const ( + ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED ProjectGrantState = 0 + ProjectGrantState_PROJECTGRANTSTATE_ACTIVE ProjectGrantState = 1 + ProjectGrantState_PROJECTGRANTSTATE_INACTIVE ProjectGrantState = 2 +) + +var ProjectGrantState_name = map[int32]string{ + 0: "PROJECTGRANTSTATE_UNSPECIFIED", + 1: "PROJECTGRANTSTATE_ACTIVE", + 2: "PROJECTGRANTSTATE_INACTIVE", +} + +var ProjectGrantState_value = map[string]int32{ + "PROJECTGRANTSTATE_UNSPECIFIED": 0, + "PROJECTGRANTSTATE_ACTIVE": 1, + "PROJECTGRANTSTATE_INACTIVE": 2, +} + +func (x ProjectGrantState) String() string { + return proto.EnumName(ProjectGrantState_name, int32(x)) +} + +func (ProjectGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +type ProjectGrantMemberSearchKey int32 + +const ( + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED ProjectGrantMemberSearchKey = 0 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME ProjectGrantMemberSearchKey = 1 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME ProjectGrantMemberSearchKey = 2 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_EMAIL ProjectGrantMemberSearchKey = 3 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_USER_ID ProjectGrantMemberSearchKey = 4 +) + +var ProjectGrantMemberSearchKey_name = map[int32]string{ + 0: "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTGRANTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectGrantMemberSearchKey_value = map[string]int32{ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectGrantMemberSearchKey) String() string { + return proto.EnumName(ProjectGrantMemberSearchKey_name, int32(x)) +} + +func (ProjectGrantMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +type UserGrantState int32 + +const ( + UserGrantState_USERGRANTSTATE_UNSPECIFIED UserGrantState = 0 + UserGrantState_USERGRANTSTATE_ACTIVE UserGrantState = 1 + UserGrantState_USERGRANTSTATE_INACTIVE UserGrantState = 2 +) + +var UserGrantState_name = map[int32]string{ + 0: "USERGRANTSTATE_UNSPECIFIED", + 1: "USERGRANTSTATE_ACTIVE", + 2: "USERGRANTSTATE_INACTIVE", +} + +var UserGrantState_value = map[string]int32{ + "USERGRANTSTATE_UNSPECIFIED": 0, + "USERGRANTSTATE_ACTIVE": 1, + "USERGRANTSTATE_INACTIVE": 2, +} + +func (x UserGrantState) String() string { + return proto.EnumName(UserGrantState_name, int32(x)) +} + +func (UserGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +type UserGrantSearchKey int32 + +const ( + UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED UserGrantSearchKey = 0 + UserGrantSearchKey_USERGRANTSEARCHKEY_PROJECT_ID UserGrantSearchKey = 1 + UserGrantSearchKey_USERGRANTSEARCHKEY_USER_ID UserGrantSearchKey = 2 + UserGrantSearchKey_USERGRANTSEARCHKEY_ORG_ID UserGrantSearchKey = 3 +) + +var UserGrantSearchKey_name = map[int32]string{ + 0: "USERGRANTSEARCHKEY_UNSPECIFIED", + 1: "USERGRANTSEARCHKEY_PROJECT_ID", + 2: "USERGRANTSEARCHKEY_USER_ID", + 3: "USERGRANTSEARCHKEY_ORG_ID", +} + +var UserGrantSearchKey_value = map[string]int32{ + "USERGRANTSEARCHKEY_UNSPECIFIED": 0, + "USERGRANTSEARCHKEY_PROJECT_ID": 1, + "USERGRANTSEARCHKEY_USER_ID": 2, + "USERGRANTSEARCHKEY_ORG_ID": 3, +} + +func (x UserGrantSearchKey) String() string { + return proto.EnumName(UserGrantSearchKey_name, int32(x)) +} + +func (UserGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +type AuthGrantSearchKey int32 + +const ( + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED AuthGrantSearchKey = 0 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_ORG_ID AuthGrantSearchKey = 1 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_PROJECT_ID AuthGrantSearchKey = 2 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_USER_ID AuthGrantSearchKey = 3 +) + +var AuthGrantSearchKey_name = map[int32]string{ + 0: "AUTHGRANTSEARCHKEY_UNSPECIFIED", + 1: "AUTHGRANTSEARCHKEY_ORG_ID", + 2: "AUTHGRANTSEARCHKEY_PROJECT_ID", + 3: "AUTHGRANTSEARCHKEY_USER_ID", +} + +var AuthGrantSearchKey_value = map[string]int32{ + "AUTHGRANTSEARCHKEY_UNSPECIFIED": 0, + "AUTHGRANTSEARCHKEY_ORG_ID": 1, + "AUTHGRANTSEARCHKEY_PROJECT_ID": 2, + "AUTHGRANTSEARCHKEY_USER_ID": 3, +} + +func (x AuthGrantSearchKey) String() string { + return proto.EnumName(AuthGrantSearchKey_name, int32(x)) +} + +func (AuthGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +type ChangeRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SequenceOffset uint64 `protobuf:"varint,3,opt,name=sequence_offset,json=sequenceOffset,proto3" json:"sequence_offset,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeRequest) Reset() { *m = ChangeRequest{} } +func (m *ChangeRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeRequest) ProtoMessage() {} +func (*ChangeRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +func (m *ChangeRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeRequest.Unmarshal(m, b) +} +func (m *ChangeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeRequest.Marshal(b, m, deterministic) +} +func (m *ChangeRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeRequest.Merge(m, src) +} +func (m *ChangeRequest) XXX_Size() int { + return xxx_messageInfo_ChangeRequest.Size(m) +} +func (m *ChangeRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeRequest proto.InternalMessageInfo + +func (m *ChangeRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ChangeRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ChangeRequest) GetSequenceOffset() uint64 { + if m != nil { + return m.SequenceOffset + } + return 0 +} + +type Changes struct { + Changes []*Change `protobuf:"bytes,1,rep,name=changes,proto3" json:"changes,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Changes) Reset() { *m = Changes{} } +func (m *Changes) String() string { return proto.CompactTextString(m) } +func (*Changes) ProtoMessage() {} +func (*Changes) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +func (m *Changes) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Changes.Unmarshal(m, b) +} +func (m *Changes) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Changes.Marshal(b, m, deterministic) +} +func (m *Changes) XXX_Merge(src proto.Message) { + xxx_messageInfo_Changes.Merge(m, src) +} +func (m *Changes) XXX_Size() int { + return xxx_messageInfo_Changes.Size(m) +} +func (m *Changes) XXX_DiscardUnknown() { + xxx_messageInfo_Changes.DiscardUnknown(m) +} + +var xxx_messageInfo_Changes proto.InternalMessageInfo + +func (m *Changes) GetChanges() []*Change { + if m != nil { + return m.Changes + } + return nil +} + +func (m *Changes) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *Changes) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type Change struct { + ChangeDate *timestamp.Timestamp `protobuf:"bytes,1,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + EventType string `protobuf:"bytes,2,opt,name=event_type,json=eventType,proto3" json:"event_type,omitempty"` + Sequence uint64 `protobuf:"varint,3,opt,name=sequence,proto3" json:"sequence,omitempty"` + Modifier string `protobuf:"bytes,4,opt,name=modifier,proto3" json:"modifier,omitempty"` + Data *_struct.Struct `protobuf:"bytes,5,opt,name=data,proto3" json:"data,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Change) Reset() { *m = Change{} } +func (m *Change) String() string { return proto.CompactTextString(m) } +func (*Change) ProtoMessage() {} +func (*Change) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +func (m *Change) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Change.Unmarshal(m, b) +} +func (m *Change) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Change.Marshal(b, m, deterministic) +} +func (m *Change) XXX_Merge(src proto.Message) { + xxx_messageInfo_Change.Merge(m, src) +} +func (m *Change) XXX_Size() int { + return xxx_messageInfo_Change.Size(m) +} +func (m *Change) XXX_DiscardUnknown() { + xxx_messageInfo_Change.DiscardUnknown(m) +} + +var xxx_messageInfo_Change proto.InternalMessageInfo + +func (m *Change) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Change) GetEventType() string { + if m != nil { + return m.EventType + } + return "" +} + +func (m *Change) GetSequence() uint64 { + if m != nil { + return m.Sequence + } + return 0 +} + +func (m *Change) GetModifier() string { + if m != nil { + return m.Modifier + } + return "" +} + +func (m *Change) GetData() *_struct.Struct { + if m != nil { + return m.Data + } + return nil +} + +type ApplicationID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationID) Reset() { *m = ApplicationID{} } +func (m *ApplicationID) String() string { return proto.CompactTextString(m) } +func (*ApplicationID) ProtoMessage() {} +func (*ApplicationID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +func (m *ApplicationID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationID.Unmarshal(m, b) +} +func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) +} +func (m *ApplicationID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationID.Merge(m, src) +} +func (m *ApplicationID) XXX_Size() int { + return xxx_messageInfo_ApplicationID.Size(m) +} +func (m *ApplicationID) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationID.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationID proto.InternalMessageInfo + +func (m *ApplicationID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +type ProjectID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectID) Reset() { *m = ProjectID{} } +func (m *ProjectID) String() string { return proto.CompactTextString(m) } +func (*ProjectID) ProtoMessage() {} +func (*ProjectID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +func (m *ProjectID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectID.Unmarshal(m, b) +} +func (m *ProjectID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectID.Marshal(b, m, deterministic) +} +func (m *ProjectID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectID.Merge(m, src) +} +func (m *ProjectID) XXX_Size() int { + return xxx_messageInfo_ProjectID.Size(m) +} +func (m *ProjectID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectID proto.InternalMessageInfo + +func (m *ProjectID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserID) Reset() { *m = UserID{} } +func (m *UserID) String() string { return proto.CompactTextString(m) } +func (*UserID) ProtoMessage() {} +func (*UserID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +func (m *UserID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserID.Unmarshal(m, b) +} +func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserID.Marshal(b, m, deterministic) +} +func (m *UserID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserID.Merge(m, src) +} +func (m *UserID) XXX_Size() int { + return xxx_messageInfo_UserID.Size(m) +} +func (m *UserID) XXX_DiscardUnknown() { + xxx_messageInfo_UserID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserID proto.InternalMessageInfo + +func (m *UserID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserEmailID struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmailID) Reset() { *m = UserEmailID{} } +func (m *UserEmailID) String() string { return proto.CompactTextString(m) } +func (*UserEmailID) ProtoMessage() {} +func (*UserEmailID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +func (m *UserEmailID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmailID.Unmarshal(m, b) +} +func (m *UserEmailID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmailID.Marshal(b, m, deterministic) +} +func (m *UserEmailID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmailID.Merge(m, src) +} +func (m *UserEmailID) XXX_Size() int { + return xxx_messageInfo_UserEmailID.Size(m) +} +func (m *UserEmailID) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmailID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmailID proto.InternalMessageInfo + +func (m *UserEmailID) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } +func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueUserRequest) ProtoMessage() {} +func (*UniqueUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) +} +func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) +} +func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserRequest.Merge(m, src) +} +func (m *UniqueUserRequest) XXX_Size() int { + return xxx_messageInfo_UniqueUserRequest.Size(m) +} +func (m *UniqueUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo + +func (m *UniqueUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UniqueUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } +func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueUserResponse) ProtoMessage() {} +func (*UniqueUserResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) +} +func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) +} +func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserResponse.Merge(m, src) +} +func (m *UniqueUserResponse) XXX_Size() int { + return xxx_messageInfo_UniqueUserResponse.Size(m) +} +func (m *UniqueUserResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo + +func (m *UniqueUserResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type CreateUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,8,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,9,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,11,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,12,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,13,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,14,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,15,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,16,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,17,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + Password string `protobuf:"bytes,18,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateUserRequest) Reset() { *m = CreateUserRequest{} } +func (m *CreateUserRequest) String() string { return proto.CompactTextString(m) } +func (*CreateUserRequest) ProtoMessage() {} +func (*CreateUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +func (m *CreateUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateUserRequest.Unmarshal(m, b) +} +func (m *CreateUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateUserRequest.Marshal(b, m, deterministic) +} +func (m *CreateUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateUserRequest.Merge(m, src) +} +func (m *CreateUserRequest) XXX_Size() int { + return xxx_messageInfo_CreateUserRequest.Size(m) +} +func (m *CreateUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateUserRequest proto.InternalMessageInfo + +func (m *CreateUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *CreateUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *CreateUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *CreateUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *CreateUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *CreateUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *CreateUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *CreateUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *CreateUserRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *CreateUserRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *CreateUserRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *CreateUserRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *CreateUserRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *CreateUserRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *CreateUserRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *CreateUserRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +func (m *CreateUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,5,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,6,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,7,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,8,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,9,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + DisplayName string `protobuf:"bytes,10,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,12,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,13,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,14,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,15,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,16,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,17,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,18,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,19,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,20,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,21,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,22,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetLastLogin() *timestamp.Timestamp { + if m != nil { + return m.LastLogin + } + return nil +} + +func (m *User) GetPasswordChanged() *timestamp.Timestamp { + if m != nil { + return m.PasswordChanged + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UserSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn UserSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*UserSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchRequest) Reset() { *m = UserSearchRequest{} } +func (m *UserSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserSearchRequest) ProtoMessage() {} +func (*UserSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +func (m *UserSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchRequest.Unmarshal(m, b) +} +func (m *UserSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchRequest.Merge(m, src) +} +func (m *UserSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserSearchRequest.Size(m) +} +func (m *UserSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchRequest proto.InternalMessageInfo + +func (m *UserSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchRequest) GetSortingColumn() UserSearchKey { + if m != nil { + return m.SortingColumn + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *UserSearchRequest) GetQueries() []*UserSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserSearchQuery struct { + Key UserSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchQuery) Reset() { *m = UserSearchQuery{} } +func (m *UserSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserSearchQuery) ProtoMessage() {} +func (*UserSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +func (m *UserSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchQuery.Unmarshal(m, b) +} +func (m *UserSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchQuery.Merge(m, src) +} +func (m *UserSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserSearchQuery.Size(m) +} +func (m *UserSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchQuery proto.InternalMessageInfo + +func (m *UserSearchQuery) GetKey() UserSearchKey { + if m != nil { + return m.Key + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*User `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchResponse) Reset() { *m = UserSearchResponse{} } +func (m *UserSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserSearchResponse) ProtoMessage() {} +func (*UserSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +func (m *UserSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchResponse.Unmarshal(m, b) +} +func (m *UserSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchResponse.Merge(m, src) +} +func (m *UserSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserSearchResponse.Size(m) +} +func (m *UserSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchResponse proto.InternalMessageInfo + +func (m *UserSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserSearchResponse) GetResult() []*User { + if m != nil { + return m.Result + } + return nil +} + +type UserProfile struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserProfile) Reset() { *m = UserProfile{} } +func (m *UserProfile) String() string { return proto.CompactTextString(m) } +func (*UserProfile) ProtoMessage() {} +func (*UserProfile) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +func (m *UserProfile) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserProfile.Unmarshal(m, b) +} +func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) +} +func (m *UserProfile) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserProfile.Merge(m, src) +} +func (m *UserProfile) XXX_Size() int { + return xxx_messageInfo_UserProfile.Size(m) +} +func (m *UserProfile) XXX_DiscardUnknown() { + xxx_messageInfo_UserProfile.DiscardUnknown(m) +} + +var xxx_messageInfo_UserProfile proto.InternalMessageInfo + +func (m *UserProfile) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserProfile) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *UserProfile) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserProfile) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserProfile) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UserProfile) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UserProfile) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UserProfile) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *UserProfile) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type UpdateUserProfileRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } +func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserProfileRequest) ProtoMessage() {} +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) +} +func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) +} +func (m *UpdateUserProfileRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserProfileRequest.Size(m) +} +func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo + +func (m *UpdateUserProfileRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserProfileRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UpdateUserProfileRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmail) Reset() { *m = UserEmail{} } +func (m *UserEmail) String() string { return proto.CompactTextString(m) } +func (*UserEmail) ProtoMessage() {} +func (*UserEmail) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +func (m *UserEmail) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmail.Unmarshal(m, b) +} +func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) +} +func (m *UserEmail) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmail.Merge(m, src) +} +func (m *UserEmail) XXX_Size() int { + return xxx_messageInfo_UserEmail.Size(m) +} +func (m *UserEmail) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmail.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmail proto.InternalMessageInfo + +func (m *UserEmail) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserEmail) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserEmail) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UpdateUserEmailRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } +func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserEmailRequest) ProtoMessage() {} +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) +} +func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) +} +func (m *UpdateUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserEmailRequest.Size(m) +} +func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo + +func (m *UpdateUserEmailRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserEmailRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UpdateUserEmailRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UserPhone struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserPhone) Reset() { *m = UserPhone{} } +func (m *UserPhone) String() string { return proto.CompactTextString(m) } +func (*UserPhone) ProtoMessage() {} +func (*UserPhone) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +func (m *UserPhone) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserPhone.Unmarshal(m, b) +} +func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) +} +func (m *UserPhone) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserPhone.Merge(m, src) +} +func (m *UserPhone) XXX_Size() int { + return xxx_messageInfo_UserPhone.Size(m) +} +func (m *UserPhone) XXX_DiscardUnknown() { + xxx_messageInfo_UserPhone.DiscardUnknown(m) +} + +var xxx_messageInfo_UserPhone proto.InternalMessageInfo + +func (m *UserPhone) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserPhone) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UserPhone) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } +func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) +} +func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) +} +func (m *UpdateUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) +} +func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo + +func (m *UpdateUserPhoneRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UserAddress struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAddress) Reset() { *m = UserAddress{} } +func (m *UserAddress) String() string { return proto.CompactTextString(m) } +func (*UserAddress) ProtoMessage() {} +func (*UserAddress) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +func (m *UserAddress) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAddress.Unmarshal(m, b) +} +func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) +} +func (m *UserAddress) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAddress.Merge(m, src) +} +func (m *UserAddress) XXX_Size() int { + return xxx_messageInfo_UserAddress.Size(m) +} +func (m *UserAddress) XXX_DiscardUnknown() { + xxx_messageInfo_UserAddress.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAddress proto.InternalMessageInfo + +func (m *UserAddress) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAddress) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UserAddress) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UserAddress) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UserAddress) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UserAddress) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } +func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserAddressRequest) ProtoMessage() {} +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) +} +func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) +} +func (m *UpdateUserAddressRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserAddressRequest.Size(m) +} +func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo + +func (m *UpdateUserAddressRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserAddressRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UpdateUserAddressRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UpdateUserAddressRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UpdateUserAddressRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UpdateUserAddressRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type MultiFactors struct { + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactors) Reset() { *m = MultiFactors{} } +func (m *MultiFactors) String() string { return proto.CompactTextString(m) } +func (*MultiFactors) ProtoMessage() {} +func (*MultiFactors) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +func (m *MultiFactors) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactors.Unmarshal(m, b) +} +func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) +} +func (m *MultiFactors) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactors.Merge(m, src) +} +func (m *MultiFactors) XXX_Size() int { + return xxx_messageInfo_MultiFactors.Size(m) +} +func (m *MultiFactors) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactors.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactors proto.InternalMessageInfo + +func (m *MultiFactors) GetMfas() []*MultiFactor { + if m != nil { + return m.Mfas + } + return nil +} + +type MultiFactor struct { + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactor) Reset() { *m = MultiFactor{} } +func (m *MultiFactor) String() string { return proto.CompactTextString(m) } +func (*MultiFactor) ProtoMessage() {} +func (*MultiFactor) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +func (m *MultiFactor) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactor.Unmarshal(m, b) +} +func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) +} +func (m *MultiFactor) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactor.Merge(m, src) +} +func (m *MultiFactor) XXX_Size() int { + return xxx_messageInfo_MultiFactor.Size(m) +} +func (m *MultiFactor) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactor.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactor proto.InternalMessageInfo + +func (m *MultiFactor) GetType() MfaType { + if m != nil { + return m.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *MultiFactor) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type PasswordID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordID) Reset() { *m = PasswordID{} } +func (m *PasswordID) String() string { return proto.CompactTextString(m) } +func (*PasswordID) ProtoMessage() {} +func (*PasswordID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +func (m *PasswordID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordID.Unmarshal(m, b) +} +func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) +} +func (m *PasswordID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordID.Merge(m, src) +} +func (m *PasswordID) XXX_Size() int { + return xxx_messageInfo_PasswordID.Size(m) +} +func (m *PasswordID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordID proto.InternalMessageInfo + +func (m *PasswordID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Password string `protobuf:"bytes,2,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } +func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } +func (*PasswordRequest) ProtoMessage() {} +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) +} +func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) +} +func (m *PasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordRequest.Merge(m, src) +} +func (m *PasswordRequest) XXX_Size() int { + return xxx_messageInfo_PasswordRequest.Size(m) +} +func (m *PasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo + +func (m *PasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type ResetPasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } +func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*ResetPasswordRequest) ProtoMessage() {} +func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{26} +} + +func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) +} +func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) +} +func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPasswordRequest.Merge(m, src) +} +func (m *ResetPasswordRequest) XXX_Size() int { + return xxx_messageInfo_ResetPasswordRequest.Size(m) +} +func (m *ResetPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo + +func (m *ResetPasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type SetPasswordNotificationRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } +func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } +func (*SetPasswordNotificationRequest) ProtoMessage() {} +func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{27} +} + +func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) +} +func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) +} +func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) +} +func (m *SetPasswordNotificationRequest) XXX_Size() int { + return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) +} +func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo + +func (m *SetPasswordNotificationRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *SetPasswordNotificationRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type PasswordComplexityPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyID) Reset() { *m = PasswordComplexityPolicyID{} } +func (m *PasswordComplexityPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyID) ProtoMessage() {} +func (*PasswordComplexityPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{28} +} + +func (m *PasswordComplexityPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyID.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyID.Merge(m, src) +} +func (m *PasswordComplexityPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyID.Size(m) +} +func (m *PasswordComplexityPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyID proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordComplexityPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MinLength uint64 `protobuf:"varint,6,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,7,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,8,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,9,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,10,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicy) Reset() { *m = PasswordComplexityPolicy{} } +func (m *PasswordComplexityPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicy) ProtoMessage() {} +func (*PasswordComplexityPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{29} +} + +func (m *PasswordComplexityPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicy.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicy.Merge(m, src) +} +func (m *PasswordComplexityPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicy.Size(m) +} +func (m *PasswordComplexityPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicy proto.InternalMessageInfo + +func (m *PasswordComplexityPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordComplexityPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicy) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,2,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,3,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,4,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,5,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,6,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyCreate) Reset() { *m = PasswordComplexityPolicyCreate{} } +func (m *PasswordComplexityPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyCreate) ProtoMessage() {} +func (*PasswordComplexityPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{30} +} + +func (m *PasswordComplexityPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyCreate.Merge(m, src) +} +func (m *PasswordComplexityPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Size(m) +} +func (m *PasswordComplexityPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyCreate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyCreate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyCreate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,3,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,4,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,5,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,6,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,7,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyUpdate) Reset() { *m = PasswordComplexityPolicyUpdate{} } +func (m *PasswordComplexityPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyUpdate) ProtoMessage() {} +func (*PasswordComplexityPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{31} +} + +func (m *PasswordComplexityPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyUpdate.Merge(m, src) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Size(m) +} +func (m *PasswordComplexityPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyUpdate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordAgePolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyID) Reset() { *m = PasswordAgePolicyID{} } +func (m *PasswordAgePolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyID) ProtoMessage() {} +func (*PasswordAgePolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{32} +} + +func (m *PasswordAgePolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyID.Unmarshal(m, b) +} +func (m *PasswordAgePolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyID.Merge(m, src) +} +func (m *PasswordAgePolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyID.Size(m) +} +func (m *PasswordAgePolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyID proto.InternalMessageInfo + +func (m *PasswordAgePolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordAgePolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,6,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,7,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicy) Reset() { *m = PasswordAgePolicy{} } +func (m *PasswordAgePolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicy) ProtoMessage() {} +func (*PasswordAgePolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{33} +} + +func (m *PasswordAgePolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicy.Unmarshal(m, b) +} +func (m *PasswordAgePolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicy.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicy.Merge(m, src) +} +func (m *PasswordAgePolicy) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicy.Size(m) +} +func (m *PasswordAgePolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicy proto.InternalMessageInfo + +func (m *PasswordAgePolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordAgePolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordAgePolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordAgePolicy) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicy) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,2,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,3,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyCreate) Reset() { *m = PasswordAgePolicyCreate{} } +func (m *PasswordAgePolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyCreate) ProtoMessage() {} +func (*PasswordAgePolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{34} +} + +func (m *PasswordAgePolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyCreate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyCreate.Merge(m, src) +} +func (m *PasswordAgePolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyCreate.Size(m) +} +func (m *PasswordAgePolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyCreate proto.InternalMessageInfo + +func (m *PasswordAgePolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyCreate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyCreate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,3,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,4,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyUpdate) Reset() { *m = PasswordAgePolicyUpdate{} } +func (m *PasswordAgePolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyUpdate) ProtoMessage() {} +func (*PasswordAgePolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{35} +} + +func (m *PasswordAgePolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyUpdate.Merge(m, src) +} +func (m *PasswordAgePolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyUpdate.Size(m) +} +func (m *PasswordAgePolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyUpdate proto.InternalMessageInfo + +func (m *PasswordAgePolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyUpdate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordLockoutPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyID) Reset() { *m = PasswordLockoutPolicyID{} } +func (m *PasswordLockoutPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyID) ProtoMessage() {} +func (*PasswordLockoutPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{36} +} + +func (m *PasswordLockoutPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyID.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyID.Merge(m, src) +} +func (m *PasswordLockoutPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyID.Size(m) +} +func (m *PasswordLockoutPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyID proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordLockoutPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAttempts uint64 `protobuf:"varint,6,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,7,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicy) Reset() { *m = PasswordLockoutPolicy{} } +func (m *PasswordLockoutPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicy) ProtoMessage() {} +func (*PasswordLockoutPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{37} +} + +func (m *PasswordLockoutPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicy.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicy.Merge(m, src) +} +func (m *PasswordLockoutPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicy.Size(m) +} +func (m *PasswordLockoutPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicy proto.InternalMessageInfo + +func (m *PasswordLockoutPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordLockoutPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicy) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,2,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,3,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyCreate) Reset() { *m = PasswordLockoutPolicyCreate{} } +func (m *PasswordLockoutPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyCreate) ProtoMessage() {} +func (*PasswordLockoutPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{38} +} + +func (m *PasswordLockoutPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyCreate.Merge(m, src) +} +func (m *PasswordLockoutPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Size(m) +} +func (m *PasswordLockoutPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyCreate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyCreate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyCreate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,3,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,4,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyUpdate) Reset() { *m = PasswordLockoutPolicyUpdate{} } +func (m *PasswordLockoutPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyUpdate) ProtoMessage() {} +func (*PasswordLockoutPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{39} +} + +func (m *PasswordLockoutPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyUpdate.Merge(m, src) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Size(m) +} +func (m *PasswordLockoutPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyUpdate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{40} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type OrgDomain struct { + Domain string `protobuf:"bytes,1,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgDomain) Reset() { *m = OrgDomain{} } +func (m *OrgDomain) String() string { return proto.CompactTextString(m) } +func (*OrgDomain) ProtoMessage() {} +func (*OrgDomain) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{41} +} + +func (m *OrgDomain) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgDomain.Unmarshal(m, b) +} +func (m *OrgDomain) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgDomain.Marshal(b, m, deterministic) +} +func (m *OrgDomain) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgDomain.Merge(m, src) +} +func (m *OrgDomain) XXX_Size() int { + return xxx_messageInfo_OrgDomain.Size(m) +} +func (m *OrgDomain) XXX_DiscardUnknown() { + xxx_messageInfo_OrgDomain.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgDomain proto.InternalMessageInfo + +func (m *OrgDomain) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{42} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberRoles) Reset() { *m = OrgMemberRoles{} } +func (m *OrgMemberRoles) String() string { return proto.CompactTextString(m) } +func (*OrgMemberRoles) ProtoMessage() {} +func (*OrgMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{43} +} + +func (m *OrgMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberRoles.Unmarshal(m, b) +} +func (m *OrgMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberRoles.Marshal(b, m, deterministic) +} +func (m *OrgMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberRoles.Merge(m, src) +} +func (m *OrgMemberRoles) XXX_Size() int { + return xxx_messageInfo_OrgMemberRoles.Size(m) +} +func (m *OrgMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberRoles proto.InternalMessageInfo + +func (m *OrgMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type OrgMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMember) Reset() { *m = OrgMember{} } +func (m *OrgMember) String() string { return proto.CompactTextString(m) } +func (*OrgMember) ProtoMessage() {} +func (*OrgMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{44} +} + +func (m *OrgMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMember.Unmarshal(m, b) +} +func (m *OrgMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMember.Marshal(b, m, deterministic) +} +func (m *OrgMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMember.Merge(m, src) +} +func (m *OrgMember) XXX_Size() int { + return xxx_messageInfo_OrgMember.Size(m) +} +func (m *OrgMember) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMember.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMember proto.InternalMessageInfo + +func (m *OrgMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *OrgMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *OrgMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *OrgMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *OrgMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *OrgMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *OrgMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *OrgMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type AddOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AddOrgMemberRequest) Reset() { *m = AddOrgMemberRequest{} } +func (m *AddOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*AddOrgMemberRequest) ProtoMessage() {} +func (*AddOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{45} +} + +func (m *AddOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AddOrgMemberRequest.Unmarshal(m, b) +} +func (m *AddOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AddOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *AddOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AddOrgMemberRequest.Merge(m, src) +} +func (m *AddOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_AddOrgMemberRequest.Size(m) +} +func (m *AddOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AddOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AddOrgMemberRequest proto.InternalMessageInfo + +func (m *AddOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AddOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AddOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ChangeOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeOrgMemberRequest) Reset() { *m = ChangeOrgMemberRequest{} } +func (m *ChangeOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeOrgMemberRequest) ProtoMessage() {} +func (*ChangeOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{46} +} + +func (m *ChangeOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeOrgMemberRequest.Unmarshal(m, b) +} +func (m *ChangeOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *ChangeOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeOrgMemberRequest.Merge(m, src) +} +func (m *ChangeOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_ChangeOrgMemberRequest.Size(m) +} +func (m *ChangeOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeOrgMemberRequest proto.InternalMessageInfo + +func (m *ChangeOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type RemoveOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RemoveOrgMemberRequest) Reset() { *m = RemoveOrgMemberRequest{} } +func (m *RemoveOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*RemoveOrgMemberRequest) ProtoMessage() {} +func (*RemoveOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{47} +} + +func (m *RemoveOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RemoveOrgMemberRequest.Unmarshal(m, b) +} +func (m *RemoveOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RemoveOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *RemoveOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RemoveOrgMemberRequest.Merge(m, src) +} +func (m *RemoveOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_RemoveOrgMemberRequest.Size(m) +} +func (m *RemoveOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RemoveOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RemoveOrgMemberRequest proto.InternalMessageInfo + +func (m *RemoveOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *RemoveOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type OrgMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*OrgMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchResponse) Reset() { *m = OrgMemberSearchResponse{} } +func (m *OrgMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchResponse) ProtoMessage() {} +func (*OrgMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{48} +} + +func (m *OrgMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchResponse.Unmarshal(m, b) +} +func (m *OrgMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchResponse.Merge(m, src) +} +func (m *OrgMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchResponse.Size(m) +} +func (m *OrgMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchResponse proto.InternalMessageInfo + +func (m *OrgMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetResult() []*OrgMember { + if m != nil { + return m.Result + } + return nil +} + +type OrgMemberSearchRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*OrgMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchRequest) Reset() { *m = OrgMemberSearchRequest{} } +func (m *OrgMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchRequest) ProtoMessage() {} +func (*OrgMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{49} +} + +func (m *OrgMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchRequest.Unmarshal(m, b) +} +func (m *OrgMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchRequest.Merge(m, src) +} +func (m *OrgMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchRequest.Size(m) +} +func (m *OrgMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchRequest proto.InternalMessageInfo + +func (m *OrgMemberSearchRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *OrgMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetQueries() []*OrgMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgMemberSearchQuery struct { + Key OrgMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.OrgMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchQuery) Reset() { *m = OrgMemberSearchQuery{} } +func (m *OrgMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchQuery) ProtoMessage() {} +func (*OrgMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{50} +} + +func (m *OrgMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchQuery.Unmarshal(m, b) +} +func (m *OrgMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchQuery.Merge(m, src) +} +func (m *OrgMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchQuery.Size(m) +} +func (m *OrgMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchQuery proto.InternalMessageInfo + +func (m *OrgMemberSearchQuery) GetKey() OrgMemberSearchKey { + if m != nil { + return m.Key + } + return OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *OrgMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *OrgMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectCreateRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectCreateRequest) Reset() { *m = ProjectCreateRequest{} } +func (m *ProjectCreateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectCreateRequest) ProtoMessage() {} +func (*ProjectCreateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{51} +} + +func (m *ProjectCreateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectCreateRequest.Unmarshal(m, b) +} +func (m *ProjectCreateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectCreateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectCreateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectCreateRequest.Merge(m, src) +} +func (m *ProjectCreateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectCreateRequest.Size(m) +} +func (m *ProjectCreateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectCreateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectCreateRequest proto.InternalMessageInfo + +func (m *ProjectCreateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectUpdateRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUpdateRequest) Reset() { *m = ProjectUpdateRequest{} } +func (m *ProjectUpdateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUpdateRequest) ProtoMessage() {} +func (*ProjectUpdateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{52} +} + +func (m *ProjectUpdateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUpdateRequest.Unmarshal(m, b) +} +func (m *ProjectUpdateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUpdateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUpdateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUpdateRequest.Merge(m, src) +} +func (m *ProjectUpdateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUpdateRequest.Size(m) +} +func (m *ProjectUpdateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUpdateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUpdateRequest proto.InternalMessageInfo + +func (m *ProjectUpdateRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUpdateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type Projects struct { + Projects []*Project `protobuf:"bytes,1,rep,name=projects,proto3" json:"projects,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Projects) Reset() { *m = Projects{} } +func (m *Projects) String() string { return proto.CompactTextString(m) } +func (*Projects) ProtoMessage() {} +func (*Projects) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{53} +} + +func (m *Projects) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Projects.Unmarshal(m, b) +} +func (m *Projects) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Projects.Marshal(b, m, deterministic) +} +func (m *Projects) XXX_Merge(src proto.Message) { + xxx_messageInfo_Projects.Merge(m, src) +} +func (m *Projects) XXX_Size() int { + return xxx_messageInfo_Projects.Size(m) +} +func (m *Projects) XXX_DiscardUnknown() { + xxx_messageInfo_Projects.DiscardUnknown(m) +} + +var xxx_messageInfo_Projects proto.InternalMessageInfo + +func (m *Projects) GetProjects() []*Project { + if m != nil { + return m.Projects + } + return nil +} + +type Project struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + State ProjectState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectState" json:"state,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Type ProjectType `protobuf:"varint,6,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.ProjectType" json:"type,omitempty"` + ResourceOwner string `protobuf:"bytes,7,opt,name=resource_owner,json=resourceOwner,proto3" json:"resource_owner,omitempty"` + OrgId string `protobuf:"bytes,8,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + OrgName string `protobuf:"bytes,9,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,10,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + GrantId string `protobuf:"bytes,11,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Project) Reset() { *m = Project{} } +func (m *Project) String() string { return proto.CompactTextString(m) } +func (*Project) ProtoMessage() {} +func (*Project) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{54} +} + +func (m *Project) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Project.Unmarshal(m, b) +} +func (m *Project) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Project.Marshal(b, m, deterministic) +} +func (m *Project) XXX_Merge(src proto.Message) { + xxx_messageInfo_Project.Merge(m, src) +} +func (m *Project) XXX_Size() int { + return xxx_messageInfo_Project.Size(m) +} +func (m *Project) XXX_DiscardUnknown() { + xxx_messageInfo_Project.DiscardUnknown(m) +} + +var xxx_messageInfo_Project proto.InternalMessageInfo + +func (m *Project) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Project) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Project) GetState() ProjectState { + if m != nil { + return m.State + } + return ProjectState_PROJECTSTATE_UNSPECIFIED +} + +func (m *Project) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Project) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Project) GetType() ProjectType { + if m != nil { + return m.Type + } + return ProjectType_PROJECTTYPE_UNKNOWN +} + +func (m *Project) GetResourceOwner() string { + if m != nil { + return m.ResourceOwner + } + return "" +} + +func (m *Project) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *Project) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *Project) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *Project) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +type ProjectSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Project `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchResponse) Reset() { *m = ProjectSearchResponse{} } +func (m *ProjectSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchResponse) ProtoMessage() {} +func (*ProjectSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{55} +} + +func (m *ProjectSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchResponse.Unmarshal(m, b) +} +func (m *ProjectSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchResponse.Merge(m, src) +} +func (m *ProjectSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectSearchResponse.Size(m) +} +func (m *ProjectSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchResponse proto.InternalMessageInfo + +func (m *ProjectSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectSearchResponse) GetResult() []*Project { + if m != nil { + return m.Result + } + return nil +} + +type ProjectSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchRequest) Reset() { *m = ProjectSearchRequest{} } +func (m *ProjectSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchRequest) ProtoMessage() {} +func (*ProjectSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{56} +} + +func (m *ProjectSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchRequest.Unmarshal(m, b) +} +func (m *ProjectSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchRequest.Merge(m, src) +} +func (m *ProjectSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectSearchRequest.Size(m) +} +func (m *ProjectSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchRequest proto.InternalMessageInfo + +func (m *ProjectSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchRequest) GetQueries() []*ProjectSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectSearchQuery struct { + Key ProjectSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchQuery) Reset() { *m = ProjectSearchQuery{} } +func (m *ProjectSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchQuery) ProtoMessage() {} +func (*ProjectSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{57} +} + +func (m *ProjectSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchQuery.Unmarshal(m, b) +} +func (m *ProjectSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchQuery.Merge(m, src) +} +func (m *ProjectSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectSearchQuery.Size(m) +} +func (m *ProjectSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchQuery proto.InternalMessageInfo + +func (m *ProjectSearchQuery) GetKey() ProjectSearchKey { + if m != nil { + return m.Key + } + return ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRoles) Reset() { *m = ProjectMemberRoles{} } +func (m *ProjectMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRoles) ProtoMessage() {} +func (*ProjectMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{58} +} + +func (m *ProjectMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRoles.Unmarshal(m, b) +} +func (m *ProjectMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRoles.Merge(m, src) +} +func (m *ProjectMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRoles.Size(m) +} +func (m *ProjectMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRoles proto.InternalMessageInfo + +func (m *ProjectMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMember) Reset() { *m = ProjectMember{} } +func (m *ProjectMember) String() string { return proto.CompactTextString(m) } +func (*ProjectMember) ProtoMessage() {} +func (*ProjectMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{59} +} + +func (m *ProjectMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMember.Unmarshal(m, b) +} +func (m *ProjectMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMember.Marshal(b, m, deterministic) +} +func (m *ProjectMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMember.Merge(m, src) +} +func (m *ProjectMember) XXX_Size() int { + return xxx_messageInfo_ProjectMember.Size(m) +} +func (m *ProjectMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMember proto.InternalMessageInfo + +func (m *ProjectMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectMemberAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberAdd) Reset() { *m = ProjectMemberAdd{} } +func (m *ProjectMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberAdd) ProtoMessage() {} +func (*ProjectMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{60} +} + +func (m *ProjectMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberAdd.Unmarshal(m, b) +} +func (m *ProjectMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberAdd.Merge(m, src) +} +func (m *ProjectMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectMemberAdd.Size(m) +} +func (m *ProjectMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberAdd proto.InternalMessageInfo + +func (m *ProjectMemberAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberChange struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberChange) Reset() { *m = ProjectMemberChange{} } +func (m *ProjectMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberChange) ProtoMessage() {} +func (*ProjectMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{61} +} + +func (m *ProjectMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberChange.Unmarshal(m, b) +} +func (m *ProjectMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberChange.Merge(m, src) +} +func (m *ProjectMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectMemberChange.Size(m) +} +func (m *ProjectMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberChange proto.InternalMessageInfo + +func (m *ProjectMemberChange) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRemove) Reset() { *m = ProjectMemberRemove{} } +func (m *ProjectMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRemove) ProtoMessage() {} +func (*ProjectMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{62} +} + +func (m *ProjectMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRemove.Unmarshal(m, b) +} +func (m *ProjectMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRemove.Merge(m, src) +} +func (m *ProjectMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRemove.Size(m) +} +func (m *ProjectMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRemove proto.InternalMessageInfo + +func (m *ProjectMemberRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectRoleAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + Group string `protobuf:"bytes,4,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleAdd) Reset() { *m = ProjectRoleAdd{} } +func (m *ProjectRoleAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleAdd) ProtoMessage() {} +func (*ProjectRoleAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{63} +} + +func (m *ProjectRoleAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleAdd.Unmarshal(m, b) +} +func (m *ProjectRoleAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleAdd.Marshal(b, m, deterministic) +} +func (m *ProjectRoleAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleAdd.Merge(m, src) +} +func (m *ProjectRoleAdd) XXX_Size() int { + return xxx_messageInfo_ProjectRoleAdd.Size(m) +} +func (m *ProjectRoleAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleAdd proto.InternalMessageInfo + +func (m *ProjectRoleAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleAdd) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRoleAdd) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRoleAdd) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRole struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Group string `protobuf:"bytes,5,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRole) Reset() { *m = ProjectRole{} } +func (m *ProjectRole) String() string { return proto.CompactTextString(m) } +func (*ProjectRole) ProtoMessage() {} +func (*ProjectRole) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{64} +} + +func (m *ProjectRole) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRole.Unmarshal(m, b) +} +func (m *ProjectRole) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRole.Marshal(b, m, deterministic) +} +func (m *ProjectRole) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRole.Merge(m, src) +} +func (m *ProjectRole) XXX_Size() int { + return xxx_messageInfo_ProjectRole.Size(m) +} +func (m *ProjectRole) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRole.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRole proto.InternalMessageInfo + +func (m *ProjectRole) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRole) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRole) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRole) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectRole) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRoleRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleRemove) Reset() { *m = ProjectRoleRemove{} } +func (m *ProjectRoleRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleRemove) ProtoMessage() {} +func (*ProjectRoleRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{65} +} + +func (m *ProjectRoleRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleRemove.Unmarshal(m, b) +} +func (m *ProjectRoleRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleRemove.Marshal(b, m, deterministic) +} +func (m *ProjectRoleRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleRemove.Merge(m, src) +} +func (m *ProjectRoleRemove) XXX_Size() int { + return xxx_messageInfo_ProjectRoleRemove.Size(m) +} +func (m *ProjectRoleRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleRemove proto.InternalMessageInfo + +func (m *ProjectRoleRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleRemove) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectRoleSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectRole `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchResponse) Reset() { *m = ProjectRoleSearchResponse{} } +func (m *ProjectRoleSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchResponse) ProtoMessage() {} +func (*ProjectRoleSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{66} +} + +func (m *ProjectRoleSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchResponse.Unmarshal(m, b) +} +func (m *ProjectRoleSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchResponse.Merge(m, src) +} +func (m *ProjectRoleSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchResponse.Size(m) +} +func (m *ProjectRoleSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchResponse proto.InternalMessageInfo + +func (m *ProjectRoleSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetResult() []*ProjectRole { + if m != nil { + return m.Result + } + return nil +} + +type ProjectRoleSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectRoleSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchRequest) Reset() { *m = ProjectRoleSearchRequest{} } +func (m *ProjectRoleSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchRequest) ProtoMessage() {} +func (*ProjectRoleSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{67} +} + +func (m *ProjectRoleSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchRequest.Unmarshal(m, b) +} +func (m *ProjectRoleSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchRequest.Merge(m, src) +} +func (m *ProjectRoleSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchRequest.Size(m) +} +func (m *ProjectRoleSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchRequest proto.InternalMessageInfo + +func (m *ProjectRoleSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRoleSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetQueries() []*ProjectRoleSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectRoleSearchQuery struct { + Key ProjectRoleSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectRoleSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchQuery) Reset() { *m = ProjectRoleSearchQuery{} } +func (m *ProjectRoleSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchQuery) ProtoMessage() {} +func (*ProjectRoleSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{68} +} + +func (m *ProjectRoleSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchQuery.Unmarshal(m, b) +} +func (m *ProjectRoleSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchQuery.Merge(m, src) +} +func (m *ProjectRoleSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchQuery.Size(m) +} +func (m *ProjectRoleSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchQuery proto.InternalMessageInfo + +func (m *ProjectRoleSearchQuery) GetKey() ProjectRoleSearchKey { + if m != nil { + return m.Key + } + return ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED +} + +func (m *ProjectRoleSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectRoleSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchResponse) Reset() { *m = ProjectMemberSearchResponse{} } +func (m *ProjectMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchResponse) ProtoMessage() {} +func (*ProjectMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{69} +} + +func (m *ProjectMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchResponse.Merge(m, src) +} +func (m *ProjectMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchResponse.Size(m) +} +func (m *ProjectMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetResult() []*ProjectMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchRequest) Reset() { *m = ProjectMemberSearchRequest{} } +func (m *ProjectMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchRequest) ProtoMessage() {} +func (*ProjectMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{70} +} + +func (m *ProjectMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchRequest.Merge(m, src) +} +func (m *ProjectMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchRequest.Size(m) +} +func (m *ProjectMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetQueries() []*ProjectMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectMemberSearchQuery struct { + Key ProjectMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchQuery) Reset() { *m = ProjectMemberSearchQuery{} } +func (m *ProjectMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchQuery) ProtoMessage() {} +func (*ProjectMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{71} +} + +func (m *ProjectMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchQuery.Merge(m, src) +} +func (m *ProjectMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchQuery.Size(m) +} +func (m *ProjectMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectMemberSearchQuery) GetKey() ProjectMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type Application struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.AppState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + // Types that are valid to be assigned to AppConfig: + // *Application_OidcConfig + AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Application) Reset() { *m = Application{} } +func (m *Application) String() string { return proto.CompactTextString(m) } +func (*Application) ProtoMessage() {} +func (*Application) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{72} +} + +func (m *Application) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Application.Unmarshal(m, b) +} +func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Application.Marshal(b, m, deterministic) +} +func (m *Application) XXX_Merge(src proto.Message) { + xxx_messageInfo_Application.Merge(m, src) +} +func (m *Application) XXX_Size() int { + return xxx_messageInfo_Application.Size(m) +} +func (m *Application) XXX_DiscardUnknown() { + xxx_messageInfo_Application.DiscardUnknown(m) +} + +var xxx_messageInfo_Application proto.InternalMessageInfo + +func (m *Application) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Application) GetState() AppState { + if m != nil { + return m.State + } + return AppState_APPSTATE_UNSPECIFIED +} + +func (m *Application) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Application) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Application) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type isApplication_AppConfig interface { + isApplication_AppConfig() +} + +type Application_OidcConfig struct { + OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` +} + +func (*Application_OidcConfig) isApplication_AppConfig() {} + +func (m *Application) GetAppConfig() isApplication_AppConfig { + if m != nil { + return m.AppConfig + } + return nil +} + +func (m *Application) GetOidcConfig() *OIDCConfig { + if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { + return x.OidcConfig + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*Application) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*Application_OidcConfig)(nil), + } +} + +type ApplicationUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationUpdate) Reset() { *m = ApplicationUpdate{} } +func (m *ApplicationUpdate) String() string { return proto.CompactTextString(m) } +func (*ApplicationUpdate) ProtoMessage() {} +func (*ApplicationUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{73} +} + +func (m *ApplicationUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationUpdate.Unmarshal(m, b) +} +func (m *ApplicationUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationUpdate.Marshal(b, m, deterministic) +} +func (m *ApplicationUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationUpdate.Merge(m, src) +} +func (m *ApplicationUpdate) XXX_Size() int { + return xxx_messageInfo_ApplicationUpdate.Size(m) +} +func (m *ApplicationUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationUpdate proto.InternalMessageInfo + +func (m *ApplicationUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationUpdate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type OIDCConfig struct { + RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + ClientId string `protobuf:"bytes,5,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,6,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } +func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } +func (*OIDCConfig) ProtoMessage() {} +func (*OIDCConfig) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{74} +} + +func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) +} +func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) +} +func (m *OIDCConfig) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfig.Merge(m, src) +} +func (m *OIDCConfig) XXX_Size() int { + return xxx_messageInfo_OIDCConfig.Size(m) +} +func (m *OIDCConfig) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfig.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo + +func (m *OIDCConfig) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfig) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCConfig) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCApplicationCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCApplicationCreate) Reset() { *m = OIDCApplicationCreate{} } +func (m *OIDCApplicationCreate) String() string { return proto.CompactTextString(m) } +func (*OIDCApplicationCreate) ProtoMessage() {} +func (*OIDCApplicationCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{75} +} + +func (m *OIDCApplicationCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCApplicationCreate.Unmarshal(m, b) +} +func (m *OIDCApplicationCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCApplicationCreate.Marshal(b, m, deterministic) +} +func (m *OIDCApplicationCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCApplicationCreate.Merge(m, src) +} +func (m *OIDCApplicationCreate) XXX_Size() int { + return xxx_messageInfo_OIDCApplicationCreate.Size(m) +} +func (m *OIDCApplicationCreate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCApplicationCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCApplicationCreate proto.InternalMessageInfo + +func (m *OIDCApplicationCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCApplicationCreate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *OIDCApplicationCreate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCApplicationCreate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCApplicationCreate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCApplicationCreate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCConfigUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + ApplicationId string `protobuf:"bytes,2,opt,name=application_id,json=applicationId,proto3" json:"application_id,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfigUpdate) Reset() { *m = OIDCConfigUpdate{} } +func (m *OIDCConfigUpdate) String() string { return proto.CompactTextString(m) } +func (*OIDCConfigUpdate) ProtoMessage() {} +func (*OIDCConfigUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{76} +} + +func (m *OIDCConfigUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfigUpdate.Unmarshal(m, b) +} +func (m *OIDCConfigUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfigUpdate.Marshal(b, m, deterministic) +} +func (m *OIDCConfigUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfigUpdate.Merge(m, src) +} +func (m *OIDCConfigUpdate) XXX_Size() int { + return xxx_messageInfo_OIDCConfigUpdate.Size(m) +} +func (m *OIDCConfigUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfigUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfigUpdate proto.InternalMessageInfo + +func (m *OIDCConfigUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCConfigUpdate) GetApplicationId() string { + if m != nil { + return m.ApplicationId + } + return "" +} + +func (m *OIDCConfigUpdate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfigUpdate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfigUpdate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfigUpdate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type ClientSecret struct { + ClientSecret string `protobuf:"bytes,1,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ClientSecret) Reset() { *m = ClientSecret{} } +func (m *ClientSecret) String() string { return proto.CompactTextString(m) } +func (*ClientSecret) ProtoMessage() {} +func (*ClientSecret) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{77} +} + +func (m *ClientSecret) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ClientSecret.Unmarshal(m, b) +} +func (m *ClientSecret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ClientSecret.Marshal(b, m, deterministic) +} +func (m *ClientSecret) XXX_Merge(src proto.Message) { + xxx_messageInfo_ClientSecret.Merge(m, src) +} +func (m *ClientSecret) XXX_Size() int { + return xxx_messageInfo_ClientSecret.Size(m) +} +func (m *ClientSecret) XXX_DiscardUnknown() { + xxx_messageInfo_ClientSecret.DiscardUnknown(m) +} + +var xxx_messageInfo_ClientSecret proto.InternalMessageInfo + +func (m *ClientSecret) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +type ApplicationSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } +func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchResponse) ProtoMessage() {} +func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{78} +} + +func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) +} +func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) +} +func (m *ApplicationSearchResponse) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchResponse.Size(m) +} +func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo + +func (m *ApplicationSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ApplicationSearchResponse) GetResult() []*Application { + if m != nil { + return m.Result + } + return nil +} + +type ApplicationSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ApplicationSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } +func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchRequest) ProtoMessage() {} +func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{79} +} + +func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) +} +func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) +} +func (m *ApplicationSearchRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchRequest.Size(m) +} +func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo + +func (m *ApplicationSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ApplicationSearchQuery struct { + Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ApplicationSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } +func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchQuery) ProtoMessage() {} +func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{80} +} + +func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) +} +func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) +} +func (m *ApplicationSearchQuery) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchQuery.Size(m) +} +func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo + +func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { + if m != nil { + return m.Key + } + return ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ApplicationSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,3,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + GrantedOrgName string `protobuf:"bytes,4,opt,name=granted_org_name,json=grantedOrgName,proto3" json:"granted_org_name,omitempty"` + GrantedOrgDomain string `protobuf:"bytes,5,opt,name=granted_org_domain,json=grantedOrgDomain,proto3" json:"granted_org_domain,omitempty"` + RoleNames []string `protobuf:"bytes,6,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State ProjectGrantState `protobuf:"varint,7,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,9,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + ProjectName string `protobuf:"bytes,10,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrant) Reset() { *m = ProjectGrant{} } +func (m *ProjectGrant) String() string { return proto.CompactTextString(m) } +func (*ProjectGrant) ProtoMessage() {} +func (*ProjectGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{81} +} + +func (m *ProjectGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrant.Unmarshal(m, b) +} +func (m *ProjectGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrant.Marshal(b, m, deterministic) +} +func (m *ProjectGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrant.Merge(m, src) +} +func (m *ProjectGrant) XXX_Size() int { + return xxx_messageInfo_ProjectGrant.Size(m) +} +func (m *ProjectGrant) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrant proto.InternalMessageInfo + +func (m *ProjectGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgName() string { + if m != nil { + return m.GrantedOrgName + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgDomain() string { + if m != nil { + return m.GrantedOrgDomain + } + return "" +} + +func (m *ProjectGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *ProjectGrant) GetState() ProjectGrantState { + if m != nil { + return m.State + } + return ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED +} + +func (m *ProjectGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type ProjectGrantCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,2,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantCreate) Reset() { *m = ProjectGrantCreate{} } +func (m *ProjectGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantCreate) ProtoMessage() {} +func (*ProjectGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{82} +} + +func (m *ProjectGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantCreate.Merge(m, src) +} +func (m *ProjectGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantCreate.Size(m) +} +func (m *ProjectGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantCreate) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUpdate) Reset() { *m = ProjectGrantUpdate{} } +func (m *ProjectGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{83} +} + +func (m *ProjectGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUpdate.Size(m) +} +func (m *ProjectGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantID) Reset() { *m = ProjectGrantID{} } +func (m *ProjectGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantID) ProtoMessage() {} +func (*ProjectGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{84} +} + +func (m *ProjectGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantID.Merge(m, src) +} +func (m *ProjectGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantID.Size(m) +} +func (m *ProjectGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantID proto.InternalMessageInfo + +func (m *ProjectGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type GrantedGrantID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantedGrantID) Reset() { *m = GrantedGrantID{} } +func (m *GrantedGrantID) String() string { return proto.CompactTextString(m) } +func (*GrantedGrantID) ProtoMessage() {} +func (*GrantedGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{85} +} + +func (m *GrantedGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantedGrantID.Unmarshal(m, b) +} +func (m *GrantedGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantedGrantID.Marshal(b, m, deterministic) +} +func (m *GrantedGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantedGrantID.Merge(m, src) +} +func (m *GrantedGrantID) XXX_Size() int { + return xxx_messageInfo_GrantedGrantID.Size(m) +} +func (m *GrantedGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_GrantedGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantedGrantID proto.InternalMessageInfo + +func (m *GrantedGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchResponse) Reset() { *m = ProjectGrantSearchResponse{} } +func (m *ProjectGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchResponse) ProtoMessage() {} +func (*ProjectGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{86} +} + +func (m *ProjectGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchResponse.Merge(m, src) +} +func (m *ProjectGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchResponse.Size(m) +} +func (m *ProjectGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetResult() []*ProjectGrant { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchRequest) Reset() { *m = ProjectGrantSearchRequest{} } +func (m *ProjectGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{87} +} + +func (m *ProjectGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchRequest.Size(m) +} +func (m *ProjectGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type ProjectGrantMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRoles) Reset() { *m = ProjectGrantMemberRoles{} } +func (m *ProjectGrantMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRoles) ProtoMessage() {} +func (*ProjectGrantMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{88} +} + +func (m *ProjectGrantMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRoles.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRoles.Merge(m, src) +} +func (m *ProjectGrantMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRoles.Size(m) +} +func (m *ProjectGrantMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRoles proto.InternalMessageInfo + +func (m *ProjectGrantMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMember) Reset() { *m = ProjectGrantMember{} } +func (m *ProjectGrantMember) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMember) ProtoMessage() {} +func (*ProjectGrantMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{89} +} + +func (m *ProjectGrantMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMember.Unmarshal(m, b) +} +func (m *ProjectGrantMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMember.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMember.Merge(m, src) +} +func (m *ProjectGrantMember) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMember.Size(m) +} +func (m *ProjectGrantMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMember proto.InternalMessageInfo + +func (m *ProjectGrantMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectGrantMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectGrantMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectGrantMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectGrantMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectGrantMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrantMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectGrantMemberAdd struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberAdd) Reset() { *m = ProjectGrantMemberAdd{} } +func (m *ProjectGrantMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberAdd) ProtoMessage() {} +func (*ProjectGrantMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{90} +} + +func (m *ProjectGrantMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberAdd.Unmarshal(m, b) +} +func (m *ProjectGrantMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberAdd.Merge(m, src) +} +func (m *ProjectGrantMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberAdd.Size(m) +} +func (m *ProjectGrantMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberAdd proto.InternalMessageInfo + +func (m *ProjectGrantMemberAdd) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberChange struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberChange) Reset() { *m = ProjectGrantMemberChange{} } +func (m *ProjectGrantMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberChange) ProtoMessage() {} +func (*ProjectGrantMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{91} +} + +func (m *ProjectGrantMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberChange.Unmarshal(m, b) +} +func (m *ProjectGrantMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberChange.Merge(m, src) +} +func (m *ProjectGrantMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberChange.Size(m) +} +func (m *ProjectGrantMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberChange proto.InternalMessageInfo + +func (m *ProjectGrantMemberChange) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberRemove struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRemove) Reset() { *m = ProjectGrantMemberRemove{} } +func (m *ProjectGrantMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRemove) ProtoMessage() {} +func (*ProjectGrantMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{92} +} + +func (m *ProjectGrantMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRemove.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRemove.Merge(m, src) +} +func (m *ProjectGrantMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRemove.Size(m) +} +func (m *ProjectGrantMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRemove proto.InternalMessageInfo + +func (m *ProjectGrantMemberRemove) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectGrantMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrantMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchResponse) Reset() { *m = ProjectGrantMemberSearchResponse{} } +func (m *ProjectGrantMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchResponse) ProtoMessage() {} +func (*ProjectGrantMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{93} +} + +func (m *ProjectGrantMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchResponse.Merge(m, src) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Size(m) +} +func (m *ProjectGrantMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetResult() []*ProjectGrantMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + Offset uint64 `protobuf:"varint,3,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,4,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectGrantMemberSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchRequest) Reset() { *m = ProjectGrantMemberSearchRequest{} } +func (m *ProjectGrantMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchRequest) ProtoMessage() {} +func (*ProjectGrantMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{94} +} + +func (m *ProjectGrantMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchRequest.Merge(m, src) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Size(m) +} +func (m *ProjectGrantMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetQueries() []*ProjectGrantMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantMemberSearchQuery struct { + Key ProjectGrantMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchQuery) Reset() { *m = ProjectGrantMemberSearchQuery{} } +func (m *ProjectGrantMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchQuery) ProtoMessage() {} +func (*ProjectGrantMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{95} +} + +func (m *ProjectGrantMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchQuery.Merge(m, src) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Size(m) +} +func (m *ProjectGrantMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchQuery) GetKey() ProjectGrantMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectGrantMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectGrantMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,3,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State UserGrantState `protobuf:"varint,6,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,10,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,11,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + OrgName string `protobuf:"bytes,13,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,14,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + ProjectName string `protobuf:"bytes,15,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrant) Reset() { *m = UserGrant{} } +func (m *UserGrant) String() string { return proto.CompactTextString(m) } +func (*UserGrant) ProtoMessage() {} +func (*UserGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{96} +} + +func (m *UserGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrant.Unmarshal(m, b) +} +func (m *UserGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrant.Marshal(b, m, deterministic) +} +func (m *UserGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrant.Merge(m, src) +} +func (m *UserGrant) XXX_Size() int { + return xxx_messageInfo_UserGrant.Size(m) +} +func (m *UserGrant) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrant proto.InternalMessageInfo + +func (m *UserGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *UserGrant) GetState() UserGrantState { + if m != nil { + return m.State + } + return UserGrantState_USERGRANTSTATE_UNSPECIFIED +} + +func (m *UserGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *UserGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *UserGrant) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UserGrant) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserGrant) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserGrant) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserGrant) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *UserGrant) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *UserGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type UserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,3,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantCreate) Reset() { *m = UserGrantCreate{} } +func (m *UserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*UserGrantCreate) ProtoMessage() {} +func (*UserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{97} +} + +func (m *UserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantCreate.Unmarshal(m, b) +} +func (m *UserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantCreate.Marshal(b, m, deterministic) +} +func (m *UserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantCreate.Merge(m, src) +} +func (m *UserGrantCreate) XXX_Size() int { + return xxx_messageInfo_UserGrantCreate.Size(m) +} +func (m *UserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantCreate proto.InternalMessageInfo + +func (m *UserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantUpdate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantUpdate) Reset() { *m = UserGrantUpdate{} } +func (m *UserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*UserGrantUpdate) ProtoMessage() {} +func (*UserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{98} +} + +func (m *UserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantUpdate.Unmarshal(m, b) +} +func (m *UserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *UserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantUpdate.Merge(m, src) +} +func (m *UserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_UserGrantUpdate.Size(m) +} +func (m *UserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantUpdate proto.InternalMessageInfo + +func (m *UserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantID struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantID) Reset() { *m = UserGrantID{} } +func (m *UserGrantID) String() string { return proto.CompactTextString(m) } +func (*UserGrantID) ProtoMessage() {} +func (*UserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{99} +} + +func (m *UserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantID.Unmarshal(m, b) +} +func (m *UserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantID.Marshal(b, m, deterministic) +} +func (m *UserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantID.Merge(m, src) +} +func (m *UserGrantID) XXX_Size() int { + return xxx_messageInfo_UserGrantID.Size(m) +} +func (m *UserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantID proto.InternalMessageInfo + +func (m *UserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantID) Reset() { *m = ProjectUserGrantID{} } +func (m *ProjectUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantID) ProtoMessage() {} +func (*ProjectUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{100} +} + +func (m *ProjectUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantID.Unmarshal(m, b) +} +func (m *ProjectUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantID.Merge(m, src) +} +func (m *ProjectUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantID.Size(m) +} +func (m *ProjectUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantID proto.InternalMessageInfo + +func (m *ProjectUserGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantUpdate) Reset() { *m = ProjectUserGrantUpdate{} } +func (m *ProjectUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantUpdate) ProtoMessage() {} +func (*ProjectUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{101} +} + +func (m *ProjectUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantUpdate.Merge(m, src) +} +func (m *ProjectUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantUpdate.Size(m) +} +func (m *ProjectUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectUserGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantID struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantID) Reset() { *m = ProjectGrantUserGrantID{} } +func (m *ProjectGrantUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantID) ProtoMessage() {} +func (*ProjectGrantUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{102} +} + +func (m *ProjectGrantUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantID.Merge(m, src) +} +func (m *ProjectGrantUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantID.Size(m) +} +func (m *ProjectGrantUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantID proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantID) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantUserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectGrantId string `protobuf:"bytes,3,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantCreate) Reset() { *m = ProjectGrantUserGrantCreate{} } +func (m *ProjectGrantUserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantCreate) ProtoMessage() {} +func (*ProjectGrantUserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{103} +} + +func (m *ProjectGrantUserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantCreate.Merge(m, src) +} +func (m *ProjectGrantUserGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Size(m) +} +func (m *ProjectGrantUserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantUpdate struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantUpdate) Reset() { *m = ProjectGrantUserGrantUpdate{} } +func (m *ProjectGrantUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{104} +} + +func (m *ProjectGrantUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Size(m) +} +func (m *ProjectGrantUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantUpdate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*UserGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchResponse) Reset() { *m = UserGrantSearchResponse{} } +func (m *UserGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchResponse) ProtoMessage() {} +func (*UserGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{105} +} + +func (m *UserGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchResponse.Unmarshal(m, b) +} +func (m *UserGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchResponse.Merge(m, src) +} +func (m *UserGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchResponse.Size(m) +} +func (m *UserGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchResponse proto.InternalMessageInfo + +func (m *UserGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserGrantSearchResponse) GetResult() []*UserGrant { + if m != nil { + return m.Result + } + return nil +} + +type UserGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchRequest) Reset() { *m = UserGrantSearchRequest{} } +func (m *UserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchRequest) ProtoMessage() {} +func (*UserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{106} +} + +func (m *UserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchRequest.Unmarshal(m, b) +} +func (m *UserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchRequest.Merge(m, src) +} +func (m *UserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchRequest.Size(m) +} +func (m *UserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchRequest proto.InternalMessageInfo + +func (m *UserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserGrantSearchQuery struct { + Key UserGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchQuery) Reset() { *m = UserGrantSearchQuery{} } +func (m *UserGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchQuery) ProtoMessage() {} +func (*UserGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{107} +} + +func (m *UserGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchQuery.Unmarshal(m, b) +} +func (m *UserGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchQuery.Merge(m, src) +} +func (m *UserGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchQuery.Size(m) +} +func (m *UserGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchQuery proto.InternalMessageInfo + +func (m *UserGrantSearchQuery) GetKey() UserGrantSearchKey { + if m != nil { + return m.Key + } + return UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *UserGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectUserGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantSearchRequest) Reset() { *m = ProjectUserGrantSearchRequest{} } +func (m *ProjectUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{108} +} + +func (m *ProjectUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Size(m) +} +func (m *ProjectUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectUserGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantUserGrantSearchRequest struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantSearchRequest) Reset() { *m = ProjectGrantUserGrantSearchRequest{} } +func (m *ProjectGrantUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{109} +} + +func (m *ProjectGrantUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Size(m) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantSearchRequest) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn AuthGrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*AuthGrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchRequest) Reset() { *m = AuthGrantSearchRequest{} } +func (m *AuthGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchRequest) ProtoMessage() {} +func (*AuthGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{110} +} + +func (m *AuthGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchRequest.Unmarshal(m, b) +} +func (m *AuthGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchRequest.Merge(m, src) +} +func (m *AuthGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchRequest.Size(m) +} +func (m *AuthGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchRequest proto.InternalMessageInfo + +func (m *AuthGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetSortingColumn() AuthGrantSearchKey { + if m != nil { + return m.SortingColumn + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *AuthGrantSearchRequest) GetQueries() []*AuthGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchQuery struct { + Key AuthGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchQuery) Reset() { *m = AuthGrantSearchQuery{} } +func (m *AuthGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchQuery) ProtoMessage() {} +func (*AuthGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{111} +} + +func (m *AuthGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchQuery.Unmarshal(m, b) +} +func (m *AuthGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchQuery.Merge(m, src) +} +func (m *AuthGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchQuery.Size(m) +} +func (m *AuthGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchQuery proto.InternalMessageInfo + +func (m *AuthGrantSearchQuery) GetKey() AuthGrantSearchKey { + if m != nil { + return m.Key + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *AuthGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type AuthGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*AuthGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchResponse) Reset() { *m = AuthGrantSearchResponse{} } +func (m *AuthGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchResponse) ProtoMessage() {} +func (*AuthGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{112} +} + +func (m *AuthGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchResponse.Unmarshal(m, b) +} +func (m *AuthGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchResponse.Merge(m, src) +} +func (m *AuthGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchResponse.Size(m) +} +func (m *AuthGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchResponse proto.InternalMessageInfo + +func (m *AuthGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetResult() []*AuthGrant { + if m != nil { + return m.Result + } + return nil +} + +type AuthGrant struct { + OrgId string `protobuf:"bytes,1,opt,name=orgId,proto3" json:"orgId,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=projectId,proto3" json:"projectId,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=userId,proto3" json:"userId,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrant) Reset() { *m = AuthGrant{} } +func (m *AuthGrant) String() string { return proto.CompactTextString(m) } +func (*AuthGrant) ProtoMessage() {} +func (*AuthGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{113} +} + +func (m *AuthGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrant.Unmarshal(m, b) +} +func (m *AuthGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrant.Marshal(b, m, deterministic) +} +func (m *AuthGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrant.Merge(m, src) +} +func (m *AuthGrant) XXX_Size() int { + return xxx_messageInfo_AuthGrant.Size(m) +} +func (m *AuthGrant) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrant proto.InternalMessageInfo + +func (m *AuthGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AuthGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *AuthGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AuthGrant) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func init() { + proto.RegisterEnum("caos.zitadel.management.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserSearchKey", UserSearchKey_name, UserSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MfaType", MfaType_name, MfaType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MFAState", MFAState_name, MFAState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.NotificationType", NotificationType_name, NotificationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.PolicyState", PolicyState_name, PolicyState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgMemberSearchKey", OrgMemberSearchKey_name, OrgMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectState", ProjectState_name, ProjectState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectType", ProjectType_name, ProjectType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectSearchKey", ProjectSearchKey_name, ProjectSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectRoleSearchKey", ProjectRoleSearchKey_name, ProjectRoleSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectMemberSearchKey", ProjectMemberSearchKey_name, ProjectMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AppState", AppState_name, AppState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantState", ProjectGrantState_name, ProjectGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey", ProjectGrantMemberSearchKey_name, ProjectGrantMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantState", UserGrantState_name, UserGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantSearchKey", UserGrantSearchKey_name, UserGrantSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AuthGrantSearchKey", AuthGrantSearchKey_name, AuthGrantSearchKey_value) + proto.RegisterType((*ChangeRequest)(nil), "caos.zitadel.management.api.v1.ChangeRequest") + proto.RegisterType((*Changes)(nil), "caos.zitadel.management.api.v1.Changes") + proto.RegisterType((*Change)(nil), "caos.zitadel.management.api.v1.Change") + proto.RegisterType((*ApplicationID)(nil), "caos.zitadel.management.api.v1.ApplicationID") + proto.RegisterType((*ProjectID)(nil), "caos.zitadel.management.api.v1.ProjectID") + proto.RegisterType((*UserID)(nil), "caos.zitadel.management.api.v1.UserID") + proto.RegisterType((*UserEmailID)(nil), "caos.zitadel.management.api.v1.UserEmailID") + proto.RegisterType((*UniqueUserRequest)(nil), "caos.zitadel.management.api.v1.UniqueUserRequest") + proto.RegisterType((*UniqueUserResponse)(nil), "caos.zitadel.management.api.v1.UniqueUserResponse") + proto.RegisterType((*CreateUserRequest)(nil), "caos.zitadel.management.api.v1.CreateUserRequest") + proto.RegisterType((*User)(nil), "caos.zitadel.management.api.v1.User") + proto.RegisterType((*UserSearchRequest)(nil), "caos.zitadel.management.api.v1.UserSearchRequest") + proto.RegisterType((*UserSearchQuery)(nil), "caos.zitadel.management.api.v1.UserSearchQuery") + proto.RegisterType((*UserSearchResponse)(nil), "caos.zitadel.management.api.v1.UserSearchResponse") + proto.RegisterType((*UserProfile)(nil), "caos.zitadel.management.api.v1.UserProfile") + proto.RegisterType((*UpdateUserProfileRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserProfileRequest") + proto.RegisterType((*UserEmail)(nil), "caos.zitadel.management.api.v1.UserEmail") + proto.RegisterType((*UpdateUserEmailRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserEmailRequest") + proto.RegisterType((*UserPhone)(nil), "caos.zitadel.management.api.v1.UserPhone") + proto.RegisterType((*UpdateUserPhoneRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserPhoneRequest") + proto.RegisterType((*UserAddress)(nil), "caos.zitadel.management.api.v1.UserAddress") + proto.RegisterType((*UpdateUserAddressRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserAddressRequest") + proto.RegisterType((*MultiFactors)(nil), "caos.zitadel.management.api.v1.MultiFactors") + proto.RegisterType((*MultiFactor)(nil), "caos.zitadel.management.api.v1.MultiFactor") + proto.RegisterType((*PasswordID)(nil), "caos.zitadel.management.api.v1.PasswordID") + proto.RegisterType((*PasswordRequest)(nil), "caos.zitadel.management.api.v1.PasswordRequest") + proto.RegisterType((*ResetPasswordRequest)(nil), "caos.zitadel.management.api.v1.ResetPasswordRequest") + proto.RegisterType((*SetPasswordNotificationRequest)(nil), "caos.zitadel.management.api.v1.SetPasswordNotificationRequest") + proto.RegisterType((*PasswordComplexityPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyID") + proto.RegisterType((*PasswordComplexityPolicy)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicy") + proto.RegisterType((*PasswordComplexityPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyCreate") + proto.RegisterType((*PasswordComplexityPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyUpdate") + proto.RegisterType((*PasswordAgePolicyID)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyID") + proto.RegisterType((*PasswordAgePolicy)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicy") + proto.RegisterType((*PasswordAgePolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyCreate") + proto.RegisterType((*PasswordAgePolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyUpdate") + proto.RegisterType((*PasswordLockoutPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyID") + proto.RegisterType((*PasswordLockoutPolicy)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicy") + proto.RegisterType((*PasswordLockoutPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyCreate") + proto.RegisterType((*PasswordLockoutPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyUpdate") + proto.RegisterType((*OrgID)(nil), "caos.zitadel.management.api.v1.OrgID") + proto.RegisterType((*OrgDomain)(nil), "caos.zitadel.management.api.v1.OrgDomain") + proto.RegisterType((*Org)(nil), "caos.zitadel.management.api.v1.Org") + proto.RegisterType((*OrgMemberRoles)(nil), "caos.zitadel.management.api.v1.OrgMemberRoles") + proto.RegisterType((*OrgMember)(nil), "caos.zitadel.management.api.v1.OrgMember") + proto.RegisterType((*AddOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.AddOrgMemberRequest") + proto.RegisterType((*ChangeOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.ChangeOrgMemberRequest") + proto.RegisterType((*RemoveOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.RemoveOrgMemberRequest") + proto.RegisterType((*OrgMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchResponse") + proto.RegisterType((*OrgMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchRequest") + proto.RegisterType((*OrgMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchQuery") + proto.RegisterType((*ProjectCreateRequest)(nil), "caos.zitadel.management.api.v1.ProjectCreateRequest") + proto.RegisterType((*ProjectUpdateRequest)(nil), "caos.zitadel.management.api.v1.ProjectUpdateRequest") + proto.RegisterType((*Projects)(nil), "caos.zitadel.management.api.v1.Projects") + proto.RegisterType((*Project)(nil), "caos.zitadel.management.api.v1.Project") + proto.RegisterType((*ProjectSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectSearchResponse") + proto.RegisterType((*ProjectSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectSearchRequest") + proto.RegisterType((*ProjectSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectSearchQuery") + proto.RegisterType((*ProjectMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectMemberRoles") + proto.RegisterType((*ProjectMember)(nil), "caos.zitadel.management.api.v1.ProjectMember") + proto.RegisterType((*ProjectMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectMemberAdd") + proto.RegisterType((*ProjectMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectMemberChange") + proto.RegisterType((*ProjectMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectMemberRemove") + proto.RegisterType((*ProjectRoleAdd)(nil), "caos.zitadel.management.api.v1.ProjectRoleAdd") + proto.RegisterType((*ProjectRole)(nil), "caos.zitadel.management.api.v1.ProjectRole") + proto.RegisterType((*ProjectRoleRemove)(nil), "caos.zitadel.management.api.v1.ProjectRoleRemove") + proto.RegisterType((*ProjectRoleSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchResponse") + proto.RegisterType((*ProjectRoleSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchRequest") + proto.RegisterType((*ProjectRoleSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchQuery") + proto.RegisterType((*ProjectMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchResponse") + proto.RegisterType((*ProjectMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchRequest") + proto.RegisterType((*ProjectMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchQuery") + proto.RegisterType((*Application)(nil), "caos.zitadel.management.api.v1.Application") + proto.RegisterType((*ApplicationUpdate)(nil), "caos.zitadel.management.api.v1.ApplicationUpdate") + proto.RegisterType((*OIDCConfig)(nil), "caos.zitadel.management.api.v1.OIDCConfig") + proto.RegisterType((*OIDCApplicationCreate)(nil), "caos.zitadel.management.api.v1.OIDCApplicationCreate") + proto.RegisterType((*OIDCConfigUpdate)(nil), "caos.zitadel.management.api.v1.OIDCConfigUpdate") + proto.RegisterType((*ClientSecret)(nil), "caos.zitadel.management.api.v1.ClientSecret") + proto.RegisterType((*ApplicationSearchResponse)(nil), "caos.zitadel.management.api.v1.ApplicationSearchResponse") + proto.RegisterType((*ApplicationSearchRequest)(nil), "caos.zitadel.management.api.v1.ApplicationSearchRequest") + proto.RegisterType((*ApplicationSearchQuery)(nil), "caos.zitadel.management.api.v1.ApplicationSearchQuery") + proto.RegisterType((*ProjectGrant)(nil), "caos.zitadel.management.api.v1.ProjectGrant") + proto.RegisterType((*ProjectGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantCreate") + proto.RegisterType((*ProjectGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUpdate") + proto.RegisterType((*ProjectGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantID") + proto.RegisterType((*GrantedGrantID)(nil), "caos.zitadel.management.api.v1.GrantedGrantID") + proto.RegisterType((*ProjectGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchResponse") + proto.RegisterType((*ProjectGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchRequest") + proto.RegisterType((*ProjectGrantMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRoles") + proto.RegisterType((*ProjectGrantMember)(nil), "caos.zitadel.management.api.v1.ProjectGrantMember") + proto.RegisterType((*ProjectGrantMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberAdd") + proto.RegisterType((*ProjectGrantMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberChange") + proto.RegisterType((*ProjectGrantMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRemove") + proto.RegisterType((*ProjectGrantMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchResponse") + proto.RegisterType((*ProjectGrantMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchRequest") + proto.RegisterType((*ProjectGrantMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchQuery") + proto.RegisterType((*UserGrant)(nil), "caos.zitadel.management.api.v1.UserGrant") + proto.RegisterType((*UserGrantCreate)(nil), "caos.zitadel.management.api.v1.UserGrantCreate") + proto.RegisterType((*UserGrantUpdate)(nil), "caos.zitadel.management.api.v1.UserGrantUpdate") + proto.RegisterType((*UserGrantID)(nil), "caos.zitadel.management.api.v1.UserGrantID") + proto.RegisterType((*ProjectUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantID") + proto.RegisterType((*ProjectUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantUpdate") + proto.RegisterType((*ProjectGrantUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantID") + proto.RegisterType((*ProjectGrantUserGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantCreate") + proto.RegisterType((*ProjectGrantUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantUpdate") + proto.RegisterType((*UserGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.UserGrantSearchResponse") + proto.RegisterType((*UserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.UserGrantSearchRequest") + proto.RegisterType((*UserGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.UserGrantSearchQuery") + proto.RegisterType((*ProjectUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantSearchRequest") + proto.RegisterType((*ProjectGrantUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchQuery") + proto.RegisterType((*AuthGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchResponse") + proto.RegisterType((*AuthGrant)(nil), "caos.zitadel.management.api.v1.AuthGrant") +} + +func init() { proto.RegisterFile("management.proto", fileDescriptor_edc174f991dc0a25) } + +var fileDescriptor_edc174f991dc0a25 = []byte{ + // 7935 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7d, 0x6b, 0x70, 0x1b, 0x59, + 0x76, 0xde, 0x34, 0x00, 0xbe, 0x0e, 0x5f, 0xe0, 0xe5, 0x0b, 0x02, 0x1f, 0xa2, 0x5a, 0x6f, 0x48, + 0x22, 0x24, 0x8e, 0x46, 0x9a, 0x91, 0x76, 0xa4, 0x01, 0x09, 0x88, 0x82, 0x87, 0x04, 0xb8, 0x20, + 0x35, 0xca, 0xd8, 0xce, 0xc0, 0x2d, 0xa0, 0x05, 0xc2, 0x03, 0xa2, 0xb1, 0xdd, 0x0d, 0x69, 0xb8, + 0x93, 0xa9, 0x4d, 0x71, 0xab, 0x52, 0x2e, 0x27, 0x8e, 0xbd, 0xbb, 0x71, 0x52, 0xd9, 0xaa, 0xcd, + 0x26, 0x9b, 0x87, 0x93, 0x6c, 0x26, 0x8f, 0xf2, 0xb0, 0x6a, 0x6d, 0x27, 0x1b, 0x57, 0x36, 0x49, + 0x25, 0xb6, 0x7f, 0xc4, 0xd9, 0x54, 0x5c, 0xa9, 0xf2, 0x9f, 0x6c, 0x12, 0x57, 0xe5, 0x57, 0xca, + 0x79, 0xfc, 0xf0, 0xfc, 0x70, 0x5c, 0xf7, 0xd1, 0xdd, 0xb7, 0x5f, 0x40, 0x37, 0x48, 0x6a, 0xb5, + 0xde, 0xf9, 0x25, 0xe2, 0x3e, 0xbf, 0x73, 0xee, 0x39, 0xe7, 0x9e, 0x7b, 0xee, 0xed, 0x23, 0x88, + 0xef, 0x49, 0x4d, 0xa9, 0x26, 0xef, 0xc9, 0x4d, 0x7d, 0xb9, 0xa5, 0x2a, 0xba, 0x82, 0x16, 0x2b, + 0x92, 0xa2, 0x2d, 0x7f, 0xb1, 0xae, 0x4b, 0x55, 0xb9, 0xb1, 0xcc, 0x55, 0x4b, 0xad, 0xfa, 0xf2, + 0xb3, 0x1b, 0xc9, 0xf9, 0x9a, 0xa2, 0xd4, 0x1a, 0x72, 0x5a, 0x6a, 0xd5, 0xd3, 0x52, 0xb3, 0xa9, + 0xe8, 0x92, 0x5e, 0x57, 0x9a, 0x1a, 0xed, 0x9d, 0x9c, 0x63, 0xb5, 0xe4, 0xd7, 0x93, 0xf6, 0xd3, + 0xb4, 0xbc, 0xd7, 0xd2, 0xf7, 0x59, 0xe5, 0xbc, 0xb3, 0x52, 0xd3, 0xd5, 0x76, 0x85, 0x4d, 0x9c, + 0x3c, 0xed, 0xac, 0xd5, 0xeb, 0x7b, 0xb2, 0xa6, 0x4b, 0x7b, 0x2d, 0xd6, 0xe0, 0x2a, 0xf9, 0xa7, + 0x72, 0xad, 0x26, 0x37, 0xaf, 0x69, 0xcf, 0xa5, 0x5a, 0x4d, 0x56, 0xd3, 0x4a, 0x8b, 0xcc, 0xee, + 0x81, 0x64, 0xf6, 0x99, 0xd4, 0xa8, 0x57, 0x25, 0x5d, 0x4e, 0x1b, 0x7f, 0xb0, 0x8a, 0x25, 0xe7, + 0x3c, 0x55, 0x59, 0xab, 0xa8, 0xf5, 0x96, 0xae, 0xa8, 0xac, 0x45, 0x42, 0x6a, 0xeb, 0xbb, 0x74, + 0x64, 0x63, 0x02, 0x5a, 0x23, 0xbe, 0x07, 0xa3, 0x6b, 0xbb, 0x52, 0xb3, 0x26, 0x97, 0xe4, 0x2f, + 0xb4, 0x65, 0x4d, 0x47, 0x63, 0x10, 0xa9, 0x57, 0x13, 0xc2, 0x92, 0x70, 0x69, 0xa8, 0x14, 0xa9, + 0x57, 0xd1, 0x14, 0xf4, 0x35, 0xea, 0x7b, 0x75, 0x3d, 0x11, 0x59, 0x12, 0x2e, 0xc5, 0x4a, 0xf4, + 0x07, 0xba, 0x08, 0xe3, 0x1a, 0xee, 0xd0, 0xac, 0xc8, 0x65, 0xe5, 0xe9, 0x53, 0x4d, 0xd6, 0x13, + 0x51, 0x52, 0x3f, 0x66, 0x14, 0x17, 0x49, 0xa9, 0xb8, 0x0f, 0x03, 0x74, 0x7c, 0x0d, 0xbd, 0x05, + 0x03, 0x15, 0xfa, 0x67, 0x42, 0x58, 0x8a, 0x5e, 0x1a, 0x5e, 0xb9, 0xb0, 0xdc, 0x79, 0x65, 0x96, + 0x19, 0x32, 0xa3, 0x1b, 0x9a, 0x81, 0x7e, 0x36, 0x19, 0x05, 0xc3, 0x7e, 0x59, 0x18, 0xa3, 0x1c, + 0x46, 0xf1, 0xdf, 0x0b, 0xd0, 0x4f, 0x47, 0x40, 0x77, 0x61, 0x98, 0x8e, 0x51, 0xc6, 0x6c, 0x23, + 0xd4, 0x0d, 0xaf, 0x24, 0x97, 0x29, 0xdf, 0x96, 0x0d, 0xbe, 0x2d, 0xef, 0x18, 0xeb, 0x53, 0x02, + 0xda, 0x3c, 0x2b, 0xe9, 0x32, 0x5a, 0x00, 0x90, 0x9f, 0xc9, 0x4d, 0xbd, 0xac, 0xef, 0xb7, 0x64, + 0x32, 0xf3, 0x50, 0x69, 0x88, 0x94, 0xec, 0xec, 0xb7, 0x64, 0x94, 0x84, 0x41, 0x83, 0x66, 0x36, + 0xbf, 0xf9, 0x1b, 0xd7, 0xed, 0x29, 0xd5, 0xfa, 0xd3, 0xba, 0xac, 0x26, 0x62, 0xa4, 0xa3, 0xf9, + 0x1b, 0x5d, 0x81, 0x58, 0x55, 0xd2, 0xa5, 0x44, 0x1f, 0x01, 0x33, 0xeb, 0x02, 0xb3, 0x4d, 0x44, + 0xa9, 0x44, 0x1a, 0x89, 0xf7, 0x60, 0x34, 0xd3, 0x6a, 0x35, 0xea, 0x15, 0x22, 0x11, 0xf9, 0xac, + 0x6b, 0x99, 0x16, 0x00, 0x5a, 0xaa, 0xf2, 0xb3, 0x72, 0x45, 0x2f, 0xd7, 0xab, 0x06, 0x48, 0x56, + 0x92, 0xaf, 0x8a, 0x73, 0x30, 0xb4, 0xc5, 0x7e, 0xb8, 0xfa, 0x8a, 0x09, 0xe8, 0x7f, 0xa4, 0xc9, + 0xaa, 0x47, 0xcd, 0x59, 0x18, 0xc6, 0x35, 0xb9, 0x3d, 0xa9, 0xde, 0xc8, 0x67, 0x31, 0x9f, 0x65, + 0xfc, 0x27, 0x6b, 0x41, 0x7f, 0x88, 0xef, 0xc1, 0xc4, 0xa3, 0x66, 0xfd, 0x0b, 0x6d, 0x19, 0x37, + 0x35, 0xc4, 0xe8, 0x22, 0x0c, 0xb5, 0x35, 0x59, 0x2d, 0x37, 0xa5, 0x3d, 0xca, 0xef, 0xa1, 0x55, + 0xf8, 0x74, 0x75, 0x40, 0xed, 0x8b, 0x0b, 0x89, 0x7f, 0x27, 0x94, 0x06, 0x71, 0x65, 0x41, 0xda, + 0x93, 0xd1, 0x92, 0x31, 0x66, 0xc4, 0xd5, 0x88, 0x8d, 0x7f, 0x03, 0x10, 0x3f, 0xbe, 0xd6, 0x52, + 0x9a, 0x9a, 0x8c, 0xe6, 0x60, 0xa8, 0xae, 0x95, 0xdb, 0xa4, 0x82, 0x4c, 0x30, 0x58, 0x1a, 0xac, + 0x6b, 0xb4, 0xa1, 0xf8, 0x3f, 0xfa, 0x60, 0x62, 0x4d, 0x95, 0x25, 0xbd, 0x37, 0x4c, 0x97, 0x01, + 0x9e, 0xd6, 0x55, 0x4d, 0xa7, 0x2d, 0xdd, 0xc0, 0x86, 0x48, 0x2d, 0x69, 0x7a, 0x11, 0x86, 0x1a, + 0x92, 0xd1, 0x32, 0xea, 0x1e, 0x13, 0x57, 0x92, 0x86, 0xe7, 0x61, 0xa8, 0x59, 0xaf, 0xbc, 0x4f, + 0x1b, 0x12, 0x59, 0x58, 0x1d, 0xfc, 0x74, 0xb5, 0x4f, 0x8d, 0x92, 0x66, 0xb8, 0x8a, 0x34, 0xbb, + 0x02, 0x23, 0xd5, 0xba, 0xd6, 0x6a, 0x48, 0xfb, 0xb4, 0x65, 0x9f, 0xa3, 0xe5, 0x30, 0xab, 0x25, + 0x8d, 0x6f, 0x03, 0x6a, 0xa9, 0xf2, 0x53, 0x59, 0x55, 0xe5, 0x6a, 0xb9, 0x21, 0x35, 0x6b, 0x6d, + 0xa9, 0x26, 0x27, 0xfa, 0x1d, 0x5d, 0x26, 0xcc, 0x36, 0x1b, 0xac, 0x09, 0xba, 0x07, 0xfd, 0x35, + 0xb9, 0x59, 0x95, 0xd5, 0xc4, 0xc0, 0x92, 0x70, 0x69, 0xac, 0xbb, 0x26, 0xae, 0x93, 0xd6, 0x25, + 0xd6, 0x0b, 0x89, 0xc6, 0xa2, 0x0d, 0x92, 0xb9, 0x46, 0x3e, 0x5d, 0x1d, 0x52, 0x07, 0x08, 0xc5, + 0x3f, 0x63, 0x2c, 0x1b, 0x4a, 0xc1, 0x44, 0x5d, 0x2b, 0x93, 0xbf, 0xcb, 0xcf, 0x64, 0x15, 0x0b, + 0x7d, 0x35, 0x31, 0x44, 0x16, 0x6a, 0xbc, 0xae, 0x11, 0x91, 0x7a, 0x87, 0x15, 0xa3, 0x05, 0xe8, + 0x6b, 0xed, 0x2a, 0x4d, 0x39, 0x31, 0x4c, 0xc6, 0x1b, 0xf8, 0x74, 0x35, 0xa6, 0x46, 0x12, 0x53, + 0x25, 0x5a, 0xca, 0x86, 0x22, 0x7f, 0x5b, 0x43, 0x8d, 0x18, 0x43, 0x6d, 0xe1, 0x72, 0x73, 0x28, + 0x11, 0x06, 0x2a, 0x4a, 0xbb, 0xa9, 0xab, 0xfb, 0x89, 0x51, 0x07, 0x23, 0x8c, 0x0a, 0x74, 0x0e, + 0x06, 0x1b, 0x4a, 0x45, 0x6a, 0xd4, 0xf5, 0xfd, 0xc4, 0x98, 0x73, 0x29, 0x8c, 0x1a, 0x74, 0x19, + 0x86, 0x5b, 0x8a, 0xa6, 0x4b, 0x8d, 0x72, 0x45, 0xa9, 0xca, 0x89, 0x71, 0x47, 0x43, 0xa0, 0x95, + 0x6b, 0x4a, 0x15, 0x0b, 0x71, 0xbf, 0x2a, 0xd7, 0xea, 0x4a, 0x33, 0x11, 0x77, 0xb4, 0x62, 0xe5, + 0x28, 0x0d, 0x63, 0x9a, 0xae, 0xca, 0xb2, 0x5e, 0x96, 0xaa, 0x55, 0x55, 0xd6, 0xb4, 0xc4, 0x84, + 0xa3, 0xe5, 0x28, 0xad, 0xcf, 0xd0, 0x6a, 0x74, 0x16, 0x06, 0x5b, 0x92, 0xa6, 0x3d, 0x57, 0xd4, + 0x6a, 0x02, 0xf1, 0x5c, 0x79, 0x58, 0x32, 0x2b, 0xc4, 0x3f, 0xea, 0x87, 0x18, 0x96, 0x70, 0x97, + 0x39, 0xb8, 0x0f, 0x7d, 0x9a, 0x8e, 0x4d, 0x5d, 0x84, 0xac, 0xef, 0xe5, 0x6e, 0xeb, 0x8b, 0x07, + 0xd9, 0xc6, 0x1d, 0x4a, 0xb4, 0x1f, 0xba, 0x0f, 0xa3, 0x15, 0xac, 0x40, 0x75, 0xa5, 0x49, 0x6d, + 0x66, 0xb4, 0xab, 0xcd, 0x1c, 0x31, 0x3a, 0x10, 0xab, 0xe9, 0x30, 0xb9, 0xb1, 0x50, 0x26, 0xf7, + 0x0d, 0x00, 0xa2, 0x55, 0x0d, 0xa5, 0x56, 0x6f, 0x32, 0x0b, 0xd9, 0xa9, 0x2f, 0xd1, 0xc1, 0x0d, + 0xdc, 0x18, 0xe5, 0x20, 0x6e, 0xb0, 0xa7, 0x4c, 0x47, 0xac, 0x12, 0x8d, 0xe8, 0x3c, 0xc0, 0xb8, + 0xd1, 0x87, 0x6e, 0x18, 0x55, 0x6c, 0x5e, 0x2c, 0x5b, 0x31, 0x40, 0x4d, 0xb7, 0x69, 0x1f, 0x16, + 0x6c, 0xf6, 0x61, 0x90, 0x1a, 0x5b, 0xcb, 0x26, 0xcc, 0xf1, 0x36, 0x61, 0x88, 0xf6, 0x35, 0xed, + 0xc0, 0x19, 0x87, 0x82, 0x03, 0xa9, 0xb7, 0xa9, 0xf5, 0x1c, 0x6f, 0x2a, 0x86, 0x69, 0x7f, 0xd3, + 0x40, 0x5c, 0xf3, 0xd4, 0xf9, 0x11, 0xd2, 0xaa, 0xa3, 0xa6, 0x8f, 0xf6, 0xa4, 0xe9, 0xa6, 0xc9, + 0x1f, 0xe3, 0x4c, 0xbe, 0xb7, 0x6e, 0x8f, 0x7b, 0xeb, 0xf6, 0x94, 0xa1, 0xdb, 0x71, 0x3a, 0x42, + 0x07, 0x95, 0x9e, 0xf0, 0x56, 0xe9, 0x84, 0xa5, 0xd2, 0x44, 0x13, 0x2c, 0x45, 0x4e, 0x72, 0x8a, + 0x3c, 0xc9, 0x18, 0x6d, 0xa8, 0xef, 0x69, 0xbb, 0xfa, 0x4e, 0x91, 0x6a, 0x5e, 0x69, 0x67, 0x4c, + 0xa5, 0x9d, 0x26, 0x75, 0x86, 0xaa, 0x9e, 0x77, 0xa9, 0xea, 0x0c, 0xa9, 0xb7, 0x2b, 0xa8, 0xf8, + 0xc7, 0x02, 0x4c, 0x10, 0xb5, 0x91, 0x25, 0xb5, 0xb2, 0x6b, 0xec, 0x31, 0x96, 0x8b, 0x22, 0x78, + 0xbb, 0x28, 0x36, 0x37, 0xea, 0x3d, 0x18, 0xd3, 0x14, 0x55, 0xaf, 0x37, 0x6b, 0xe5, 0x8a, 0xd2, + 0x68, 0xef, 0x35, 0x89, 0x9a, 0x8d, 0xad, 0x5c, 0x0b, 0xa4, 0xaf, 0x64, 0xe2, 0xb7, 0xe5, 0x7d, + 0x62, 0x44, 0x0e, 0x84, 0xc8, 0xd2, 0x2b, 0xa5, 0x51, 0x36, 0xdc, 0x1a, 0x19, 0x0d, 0xc5, 0x21, + 0x2a, 0x69, 0x15, 0xa2, 0x7c, 0x83, 0x25, 0xfc, 0x27, 0xca, 0xc3, 0xc0, 0x17, 0xda, 0xb2, 0x5a, + 0x97, 0xb5, 0x44, 0x1f, 0x71, 0xc2, 0xd2, 0xc1, 0xa7, 0xfa, 0x7c, 0x5b, 0x56, 0xf7, 0x4b, 0x46, + 0x7f, 0xf1, 0x3b, 0x02, 0x8c, 0x3b, 0x2a, 0x51, 0x1e, 0xa2, 0xef, 0xcb, 0xfb, 0x84, 0xf6, 0x23, + 0x50, 0x81, 0xc7, 0x40, 0x59, 0xe8, 0xdf, 0x93, 0xf5, 0x5d, 0xa5, 0xca, 0x6c, 0xd8, 0xd5, 0x6e, + 0xa3, 0xd1, 0x91, 0x36, 0x49, 0x9f, 0x12, 0xeb, 0x8b, 0xf9, 0xfe, 0x4c, 0x6a, 0xb4, 0xd9, 0xde, + 0x5c, 0xa2, 0x3f, 0xc4, 0xbf, 0x2d, 0x00, 0xe2, 0xd7, 0x8e, 0xf9, 0x14, 0xe1, 0x16, 0xef, 0x0c, + 0x8c, 0xe8, 0x0a, 0x96, 0x2f, 0x55, 0xd6, 0xda, 0x0d, 0xc3, 0xf9, 0x1c, 0x26, 0x65, 0x25, 0x52, + 0x84, 0x3e, 0x87, 0x45, 0x8c, 0x54, 0xc6, 0x08, 0xb3, 0xcf, 0x05, 0xe1, 0x48, 0x89, 0xf5, 0x11, + 0xff, 0x20, 0x42, 0xdd, 0xaf, 0x2d, 0x55, 0x79, 0x5a, 0x6f, 0xc8, 0xc7, 0x6f, 0xe4, 0xed, 0x76, + 0x2c, 0xda, 0xd1, 0x8e, 0xc5, 0x1c, 0x76, 0xcc, 0x66, 0xa4, 0xfa, 0x1c, 0x46, 0xca, 0x69, 0xe4, + 0xfa, 0xdd, 0x46, 0xce, 0xdb, 0x8e, 0x0d, 0x74, 0xb7, 0x63, 0x83, 0x3d, 0xd9, 0x31, 0x9b, 0x3d, + 0x1f, 0xb2, 0xdb, 0x73, 0xf1, 0xb7, 0x23, 0x90, 0x78, 0xd4, 0xaa, 0x32, 0x77, 0x91, 0xb1, 0xdb, + 0xef, 0x40, 0xf4, 0x99, 0x73, 0xd8, 0x99, 0xd5, 0xe2, 0x9f, 0x85, 0x21, 0xf3, 0xd0, 0xe0, 0x75, + 0x9c, 0xe4, 0xdc, 0xfd, 0x8e, 0xfb, 0x49, 0xd4, 0x73, 0x3f, 0x11, 0x9f, 0xc1, 0x8c, 0xb5, 0x56, + 0xa4, 0xca, 0x6f, 0xa5, 0xba, 0x1e, 0x2d, 0x42, 0xcd, 0xcb, 0xc8, 0x22, 0x5b, 0x93, 0x17, 0x59, + 0x74, 0x93, 0x8b, 0x74, 0xdd, 0xe4, 0xa2, 0x9e, 0x9b, 0x9c, 0xd8, 0xe6, 0xc9, 0x22, 0x55, 0x7e, + 0x64, 0x9d, 0xb6, 0xcd, 0xb5, 0x3a, 0xf4, 0xe9, 0x6a, 0xbf, 0x1a, 0x8b, 0x0b, 0x5d, 0xdc, 0x65, + 0x9f, 0x69, 0x7f, 0x55, 0xa0, 0x36, 0xc6, 0x70, 0x3b, 0x9d, 0x93, 0x71, 0x7b, 0x6f, 0xc4, 0x7f, + 0xef, 0x8d, 0x76, 0xde, 0x7b, 0x63, 0x1d, 0xf6, 0xde, 0xbe, 0x2e, 0x7b, 0x6f, 0xbf, 0xd7, 0xde, + 0xfb, 0xbf, 0x05, 0x5e, 0x61, 0x59, 0xa9, 0x1f, 0xbf, 0x44, 0x07, 0x09, 0xdd, 0x4e, 0x04, 0xd1, + 0xa0, 0x27, 0x82, 0x58, 0xa0, 0x13, 0x41, 0x5f, 0xe0, 0x13, 0x41, 0x7f, 0xc7, 0x13, 0x81, 0x58, + 0x84, 0x91, 0xcd, 0x76, 0x43, 0xaf, 0x3f, 0x90, 0x2a, 0xba, 0xa2, 0x6a, 0xe8, 0x3e, 0xc4, 0xf6, + 0x9e, 0x4a, 0x46, 0x30, 0xe5, 0x4a, 0x37, 0x2d, 0xe5, 0xfa, 0x96, 0x48, 0x47, 0xf1, 0xe7, 0x05, + 0x18, 0xe6, 0x4a, 0xd1, 0x5d, 0x88, 0x91, 0x10, 0x07, 0xdd, 0xbd, 0x2f, 0x76, 0x1d, 0xf0, 0xa9, + 0xb4, 0xb3, 0xdf, 0x92, 0x4b, 0xa4, 0x13, 0xba, 0x67, 0xdf, 0x8c, 0x2e, 0x75, 0xed, 0xfd, 0x20, + 0xc3, 0xef, 0x45, 0xe2, 0x3c, 0xc0, 0x16, 0xf3, 0xc1, 0x3d, 0x02, 0x11, 0x0f, 0x61, 0xdc, 0xa8, + 0xf5, 0x5b, 0xe6, 0xf3, 0xdc, 0x81, 0xc9, 0xa1, 0x19, 0xfc, 0x91, 0xe9, 0x02, 0x4c, 0x95, 0x64, + 0x4d, 0xd6, 0xbb, 0x0c, 0x27, 0x3e, 0x83, 0xc5, 0x6d, 0xab, 0x55, 0x41, 0xd1, 0xeb, 0x4f, 0x59, + 0xf4, 0xc5, 0x0f, 0x40, 0x96, 0xb1, 0x8f, 0x32, 0xe0, 0x7a, 0x37, 0x06, 0xf0, 0x43, 0x5a, 0x7c, + 0x14, 0xaf, 0x42, 0xd2, 0x98, 0x74, 0x4d, 0xd9, 0x6b, 0x35, 0xe4, 0x0f, 0xea, 0xfa, 0xfe, 0x96, + 0xd2, 0xa8, 0x57, 0xf6, 0x3d, 0xf8, 0xf2, 0x49, 0x14, 0x12, 0x7e, 0xcd, 0x3d, 0xec, 0xe1, 0xb0, + 0x11, 0x19, 0xc4, 0x82, 0x19, 0x61, 0x9b, 0xb2, 0x55, 0x84, 0x32, 0xc6, 0x22, 0x52, 0x37, 0xb4, + 0xab, 0x4c, 0xd1, 0x89, 0x3a, 0x1f, 0x1c, 0x63, 0x47, 0x3b, 0x38, 0xf6, 0x85, 0x8d, 0xd5, 0xed, + 0xd5, 0x9b, 0xe5, 0x86, 0xdc, 0xac, 0xe9, 0xbb, 0x44, 0xa1, 0x62, 0xa5, 0xa1, 0xbd, 0x7a, 0x73, + 0x83, 0x14, 0xa0, 0xb3, 0x30, 0xba, 0x2b, 0x69, 0xe5, 0x86, 0xf2, 0x5c, 0x56, 0x2b, 0x92, 0x46, + 0xfd, 0x8d, 0xc1, 0xd2, 0xc8, 0xae, 0xa4, 0x6d, 0x18, 0x65, 0x46, 0xa3, 0x76, 0xab, 0xc5, 0x1a, + 0x0d, 0x9a, 0x8d, 0x1e, 0x19, 0x65, 0x78, 0x22, 0xdc, 0xa8, 0xd9, 0xde, 0x7b, 0x22, 0xab, 0x2c, + 0xac, 0x31, 0xb4, 0x2b, 0x69, 0x05, 0x52, 0x60, 0x54, 0x6b, 0xfb, 0x7b, 0x4f, 0x94, 0x06, 0x39, + 0xe3, 0xd1, 0xea, 0x6d, 0x52, 0x20, 0xfe, 0x1f, 0x01, 0x16, 0xfd, 0x96, 0x8d, 0xc6, 0xad, 0x50, + 0xca, 0xbe, 0x58, 0x02, 0x6f, 0x1b, 0xfe, 0x6f, 0xd4, 0xbe, 0x6c, 0x76, 0xaa, 0x23, 0x5d, 0xa9, + 0x8e, 0x06, 0xa1, 0x3a, 0xd6, 0x95, 0xea, 0xbe, 0xce, 0x54, 0xf7, 0x3b, 0xa9, 0xfe, 0x72, 0xc4, + 0x9f, 0x6a, 0x6a, 0xcd, 0x5d, 0x22, 0x9b, 0xf2, 0x10, 0xd9, 0x60, 0x5c, 0x88, 0x76, 0xe5, 0x42, + 0x2c, 0x08, 0x17, 0xfa, 0xba, 0x72, 0xa1, 0xbf, 0x33, 0x17, 0x06, 0x9c, 0x5c, 0x38, 0x0f, 0x93, + 0x06, 0x13, 0x32, 0x35, 0xd9, 0x57, 0xb3, 0xff, 0x63, 0x04, 0x26, 0x5c, 0xed, 0x7e, 0x1c, 0x55, + 0x7a, 0x09, 0x46, 0xf6, 0xa4, 0x0f, 0xca, 0x12, 0xe9, 0xbd, 0xaf, 0x31, 0xa5, 0x86, 0x3d, 0xe9, + 0x83, 0x0c, 0x6e, 0xb1, 0xaf, 0xa1, 0x4b, 0x10, 0x97, 0x3f, 0x68, 0xd5, 0x55, 0xb9, 0xfc, 0x5c, + 0x52, 0x9b, 0xb4, 0xd5, 0x00, 0xbd, 0x8d, 0xa0, 0xe5, 0x8f, 0x25, 0xb5, 0x89, 0x5b, 0x8a, 0x5f, + 0x11, 0x60, 0xd6, 0xc5, 0xd4, 0x1e, 0x14, 0xce, 0x89, 0x29, 0x12, 0x08, 0x53, 0xd4, 0x13, 0xd3, + 0xdf, 0xf2, 0xc2, 0x74, 0x0c, 0xea, 0xe0, 0xc4, 0x18, 0x0d, 0x84, 0x31, 0xe6, 0x89, 0xf1, 0xb2, + 0x05, 0x71, 0x43, 0xa9, 0xbc, 0xaf, 0xb4, 0x75, 0x5f, 0xb9, 0xfd, 0x41, 0x04, 0xa6, 0x3d, 0xdb, + 0xfe, 0x38, 0xca, 0xee, 0x19, 0xb6, 0x06, 0xba, 0x2e, 0xef, 0xb5, 0x74, 0x43, 0x76, 0x87, 0xf1, + 0x1a, 0xb0, 0x22, 0xf4, 0x2a, 0xcc, 0x68, 0xbb, 0xca, 0xf3, 0x72, 0x43, 0xa9, 0xbc, 0x5f, 0x56, + 0xda, 0x7a, 0xf9, 0xa9, 0x54, 0x6f, 0xb4, 0x55, 0x59, 0x63, 0x96, 0x63, 0x12, 0xd7, 0x62, 0x46, + 0x16, 0xdb, 0xfa, 0x03, 0x56, 0x85, 0x65, 0x66, 0xce, 0x93, 0xc9, 0x3d, 0xc8, 0xb2, 0x13, 0x63, + 0x24, 0x0c, 0xc6, 0xa8, 0x3f, 0xc6, 0x7f, 0xe6, 0x87, 0xf1, 0x18, 0x64, 0xdb, 0x89, 0x39, 0x1a, + 0x06, 0x73, 0xcc, 0x1f, 0xf3, 0x2c, 0xf4, 0x15, 0xd5, 0x9a, 0xe7, 0x45, 0xd8, 0x50, 0x51, 0xad, + 0x65, 0x95, 0x3d, 0xa9, 0xde, 0xc4, 0x87, 0x97, 0x2a, 0xf9, 0x8b, 0x35, 0x60, 0xbf, 0xc4, 0xff, + 0x2f, 0x40, 0xb4, 0xa8, 0xd6, 0x5c, 0x94, 0x85, 0x75, 0x8d, 0x8b, 0x6a, 0xed, 0x25, 0x8a, 0xc5, + 0x23, 0x88, 0x71, 0x31, 0x1e, 0xf2, 0x37, 0xc7, 0x81, 0x7e, 0x1b, 0x07, 0x2e, 0xc0, 0x58, 0x51, + 0xad, 0x6d, 0xca, 0x78, 0x1f, 0x2c, 0x29, 0x0d, 0x59, 0xc3, 0x07, 0x63, 0x15, 0xff, 0x41, 0x4e, + 0x29, 0x43, 0x25, 0xfa, 0x43, 0xfc, 0x95, 0x08, 0xe1, 0x27, 0x6d, 0x88, 0x66, 0x61, 0x80, 0xc4, + 0x66, 0x4c, 0xa6, 0xf5, 0xe3, 0x9f, 0x79, 0x47, 0x10, 0x3e, 0xe2, 0x08, 0xc2, 0x9b, 0x91, 0x84, + 0x28, 0x1f, 0x49, 0xb0, 0x87, 0xb4, 0x62, 0x1d, 0x43, 0x5a, 0x7d, 0x8e, 0x90, 0x96, 0x89, 0xb5, + 0x9f, 0xc3, 0xea, 0x64, 0xde, 0x40, 0x28, 0xe6, 0xb9, 0x96, 0x6e, 0x30, 0xdc, 0xd2, 0x89, 0x3f, + 0x05, 0x93, 0x99, 0x6a, 0xd5, 0x62, 0x2a, 0x3b, 0x7b, 0x4c, 0x43, 0xbf, 0xa2, 0xd6, 0x2c, 0x8e, + 0xf5, 0x29, 0x6a, 0x2d, 0x5f, 0xe5, 0x39, 0x19, 0xb1, 0x71, 0xd2, 0x24, 0x2d, 0xca, 0x2f, 0xc3, + 0x7b, 0x30, 0x43, 0xef, 0x3b, 0x4e, 0x68, 0xfc, 0x87, 0x30, 0x53, 0x92, 0xf7, 0x94, 0x67, 0x47, + 0x1e, 0x5f, 0xfc, 0x58, 0x80, 0x59, 0x73, 0x90, 0x93, 0x8e, 0xda, 0x66, 0x1c, 0x51, 0xdb, 0xcb, + 0x01, 0x14, 0x96, 0x91, 0x67, 0x84, 0x6e, 0x3f, 0x16, 0x60, 0xc6, 0x85, 0xb7, 0x23, 0xe9, 0xa1, + 0xde, 0x36, 0xa0, 0x82, 0x15, 0xc6, 0xa7, 0x18, 0x6f, 0x06, 0xc6, 0xe8, 0x19, 0xcb, 0xff, 0x57, + 0x02, 0x4c, 0x79, 0xb5, 0x40, 0x05, 0x3e, 0xa0, 0xbf, 0x12, 0x72, 0x92, 0x17, 0x1c, 0xd5, 0xbf, + 0x05, 0x53, 0xec, 0x91, 0x03, 0xdd, 0x06, 0x0d, 0x8e, 0x2f, 0x32, 0x0b, 0xe6, 0xbe, 0xf2, 0x27, + 0xe5, 0xe2, 0x03, 0xb3, 0x1f, 0xdd, 0x9a, 0xfc, 0x0e, 0xf8, 0xc6, 0x38, 0x11, 0x9f, 0x71, 0x8a, + 0x30, 0xc8, 0xc6, 0xd1, 0xd0, 0x1a, 0x0c, 0xb2, 0xd7, 0x17, 0x46, 0x80, 0xa6, 0x6b, 0x3c, 0x85, + 0xf5, 0x2d, 0x99, 0x1d, 0xc5, 0xef, 0x45, 0x61, 0x80, 0x95, 0xba, 0xc0, 0x20, 0x1e, 0x0c, 0x33, + 0xcb, 0xab, 0x76, 0x7f, 0xe9, 0x6a, 0xc0, 0x19, 0x6d, 0x9b, 0xcd, 0x91, 0xf6, 0x0a, 0x97, 0xb9, + 0xeb, 0x0b, 0xb9, 0x53, 0xdd, 0x67, 0x31, 0x94, 0xfe, 0x80, 0x0e, 0x1f, 0x25, 0x80, 0x0b, 0x43, + 0x9d, 0x87, 0x31, 0x55, 0xd6, 0x94, 0xb6, 0x5a, 0x91, 0xcb, 0xca, 0xf3, 0x26, 0x0b, 0x62, 0x0f, + 0x95, 0x46, 0x8d, 0xd2, 0x22, 0x2e, 0xe4, 0x94, 0x70, 0x90, 0x57, 0xc2, 0x53, 0x30, 0x88, 0x8b, + 0xb9, 0x4b, 0x82, 0x01, 0x45, 0xad, 0x19, 0x77, 0xbe, 0xb8, 0x8a, 0x6d, 0x7b, 0xf4, 0xd6, 0x76, + 0x48, 0x31, 0x7d, 0x82, 0x53, 0x30, 0x58, 0x53, 0xa5, 0x26, 0x79, 0x7d, 0x43, 0xaf, 0x6c, 0x07, + 0xc8, 0xef, 0x7c, 0x55, 0xfc, 0x07, 0x02, 0x4c, 0x1b, 0x9c, 0x3e, 0x61, 0xcb, 0x75, 0xdf, 0x61, + 0xb9, 0x02, 0xcb, 0x9c, 0x61, 0xb7, 0xbe, 0x2a, 0x98, 0xba, 0x70, 0x94, 0x7b, 0xcd, 0x0d, 0xcb, + 0x3c, 0x45, 0x09, 0x90, 0x95, 0xa0, 0xa2, 0xe8, 0x65, 0x9c, 0xbe, 0x2b, 0x00, 0x72, 0xd7, 0xa3, + 0x0d, 0xde, 0x34, 0x5d, 0x0f, 0x35, 0xc1, 0x0b, 0x36, 0x4c, 0x29, 0x13, 0x7f, 0x77, 0xd7, 0xe8, + 0xdb, 0x11, 0x18, 0xb5, 0x35, 0xfe, 0xcc, 0x3d, 0xea, 0xe0, 0x1e, 0x7d, 0x1e, 0xe2, 0x36, 0x66, + 0x65, 0xaa, 0x55, 0x97, 0xa5, 0x0c, 0xe9, 0xb4, 0xec, 0xc0, 0xa4, 0x6d, 0x48, 0xf6, 0x84, 0xf0, + 0x88, 0xa3, 0xde, 0x73, 0x8c, 0x4a, 0xfd, 0xa2, 0xc0, 0xa3, 0x8a, 0x7b, 0x30, 0x66, 0xe8, 0xaa, + 0xd2, 0x90, 0xbd, 0xc8, 0xf4, 0xda, 0x10, 0x9c, 0xf7, 0xb0, 0x51, 0xf7, 0x3d, 0xec, 0x14, 0xf4, + 0xd5, 0x54, 0xa5, 0xdd, 0x62, 0xc2, 0x40, 0x7f, 0x88, 0xbf, 0x2e, 0xc0, 0x30, 0x37, 0x9f, 0xe3, + 0x79, 0xa1, 0xe0, 0x78, 0x5e, 0xd8, 0xeb, 0xdc, 0x47, 0x3e, 0x9c, 0x9b, 0xe0, 0xfb, 0x78, 0xf0, + 0xb7, 0x61, 0x82, 0xc3, 0xee, 0xc3, 0x69, 0x0f, 0xc8, 0xf8, 0xc8, 0x7a, 0x8a, 0xeb, 0x79, 0xd2, + 0xd6, 0x7a, 0xcd, 0x61, 0xad, 0x83, 0x6e, 0x77, 0x84, 0x2a, 0xc3, 0x62, 0xff, 0x9a, 0x00, 0x09, + 0x0f, 0xcc, 0xd4, 0x6a, 0x77, 0x59, 0xb6, 0x70, 0x3e, 0xe7, 0x96, 0xd3, 0xe7, 0xbc, 0x15, 0x02, + 0xaf, 0xa7, 0x61, 0xff, 0xb7, 0x02, 0xcc, 0x78, 0xb7, 0x41, 0x5b, 0xbc, 0x71, 0xbf, 0x19, 0x7a, + 0xa2, 0x17, 0x6c, 0xe0, 0x0f, 0x05, 0x98, 0xb3, 0xa9, 0xf7, 0x49, 0x8b, 0x4e, 0xce, 0x21, 0x3a, + 0xd7, 0x02, 0x72, 0xc8, 0x71, 0x4c, 0xf9, 0x17, 0x02, 0x24, 0x3d, 0x71, 0x9f, 0x80, 0xf8, 0x94, + 0x9c, 0xe2, 0xf3, 0x7a, 0x28, 0xcc, 0x9e, 0x02, 0xf4, 0x5b, 0x96, 0xf0, 0xbb, 0x8f, 0x2e, 0x25, + 0x5e, 0x84, 0x6e, 0xf5, 0x30, 0xd9, 0x0b, 0x16, 0xa2, 0xdf, 0x89, 0xc0, 0x30, 0xf7, 0xc8, 0xfb, + 0xc8, 0x61, 0xa4, 0x4c, 0xab, 0xf5, 0x92, 0x87, 0x91, 0x36, 0x61, 0x58, 0xa9, 0x57, 0x2b, 0xe5, + 0x8a, 0xd2, 0x7c, 0x5a, 0xaf, 0xb1, 0xcd, 0x3f, 0xd5, 0xf5, 0x90, 0x99, 0xcf, 0xae, 0xad, 0x91, + 0x1e, 0x0f, 0x5f, 0x29, 0x01, 0x1e, 0x80, 0xfe, 0x5a, 0x1d, 0x01, 0x90, 0x5a, 0x2d, 0x36, 0x9a, + 0xf8, 0x04, 0x26, 0x38, 0x6e, 0xb2, 0xa0, 0x63, 0x17, 0x89, 0xa6, 0x2c, 0x8f, 0xb8, 0x4e, 0x7c, + 0x7d, 0x3e, 0x27, 0xbe, 0x5f, 0x8e, 0x01, 0x58, 0x70, 0xd0, 0x59, 0x18, 0x55, 0xe5, 0x6a, 0x5d, + 0xc5, 0xc3, 0xb7, 0xd5, 0xba, 0xe1, 0xd9, 0x8d, 0x18, 0x85, 0x8f, 0xd4, 0xba, 0x86, 0x1e, 0x93, + 0x13, 0x0a, 0xb1, 0x0b, 0xe4, 0x8b, 0x02, 0x2d, 0x11, 0x59, 0x8a, 0x06, 0xf1, 0x60, 0xf1, 0x44, + 0x86, 0x45, 0x21, 0x27, 0x9e, 0x51, 0x95, 0xfb, 0xa5, 0xa1, 0x02, 0x0c, 0xd3, 0x23, 0x08, 0x1d, + 0x35, 0x4a, 0x46, 0xbd, 0x16, 0x64, 0xd4, 0x75, 0xdc, 0x8d, 0x0c, 0x09, 0x35, 0xe3, 0x4f, 0x0d, + 0xbd, 0x07, 0x71, 0xc9, 0x62, 0x20, 0xfd, 0xfa, 0x21, 0x46, 0x44, 0xef, 0xd5, 0x20, 0x83, 0x72, + 0xcc, 0x27, 0x43, 0x8f, 0x4b, 0xf6, 0x02, 0xec, 0x6c, 0x56, 0x1a, 0x75, 0x99, 0x9e, 0x99, 0x98, + 0xb3, 0x49, 0x0b, 0xf2, 0x55, 0xcc, 0x4a, 0x56, 0xa9, 0xc9, 0x15, 0x55, 0xd6, 0x59, 0xa0, 0x71, + 0x84, 0x16, 0x6e, 0x93, 0x32, 0xf4, 0xd3, 0x10, 0x97, 0xda, 0xfa, 0x6e, 0x99, 0xaa, 0x15, 0x45, + 0x38, 0x10, 0x30, 0x52, 0x81, 0x11, 0xb6, 0x75, 0xa6, 0x99, 0x04, 0xe0, 0x98, 0x64, 0xfb, 0x8d, + 0xde, 0x80, 0x53, 0x2d, 0x85, 0x3e, 0x42, 0x56, 0xda, 0x7a, 0xd9, 0xbe, 0xb2, 0x83, 0x64, 0x65, + 0x67, 0x70, 0x83, 0x0d, 0x52, 0x5f, 0xe2, 0xd6, 0x58, 0xfc, 0x46, 0x0c, 0xa6, 0x1d, 0x3c, 0x60, + 0x91, 0xf9, 0x2e, 0x02, 0xd8, 0x25, 0xc4, 0xe0, 0x96, 0xb0, 0x68, 0x20, 0x09, 0x8b, 0x9d, 0x88, + 0x84, 0xf5, 0x9d, 0x84, 0x84, 0xf5, 0x1f, 0xa3, 0x84, 0xbd, 0xb4, 0xf2, 0xf1, 0xcd, 0x18, 0xc4, + 0x2d, 0xbb, 0x11, 0xcc, 0x36, 0x9d, 0x87, 0x31, 0x9e, 0x59, 0xa6, 0x9d, 0x1a, 0xe5, 0x4a, 0xa9, + 0xe2, 0x7c, 0x26, 0x21, 0x3f, 0xfa, 0x12, 0xf2, 0x2a, 0x8c, 0xac, 0xf1, 0xa6, 0xce, 0x65, 0x0f, + 0x05, 0xb7, 0x3d, 0x24, 0xe7, 0x17, 0x8e, 0xe4, 0x97, 0xee, 0xfc, 0xc2, 0x61, 0xb3, 0x9d, 0x5f, + 0x3c, 0x30, 0xbf, 0x14, 0xe7, 0x17, 0x17, 0x2e, 0x8f, 0xf3, 0x8b, 0x77, 0x9b, 0x90, 0xe7, 0x17, + 0xd7, 0x20, 0x2f, 0xd8, 0xf5, 0xfc, 0xd7, 0x51, 0x18, 0x61, 0x0e, 0x30, 0xd1, 0xc3, 0x90, 0x9f, + 0x17, 0xa2, 0x73, 0x30, 0x46, 0x94, 0x56, 0xae, 0x96, 0x59, 0x58, 0x95, 0x0e, 0x3f, 0xc2, 0x4a, + 0x8b, 0x24, 0xba, 0x7a, 0x09, 0xe2, 0x7c, 0x2b, 0x2e, 0x04, 0x35, 0x66, 0xb5, 0x23, 0x81, 0x81, + 0xab, 0x80, 0xf8, 0x96, 0x2c, 0xe8, 0x4a, 0x7d, 0x84, 0xb8, 0xd5, 0x96, 0xc5, 0x5e, 0x17, 0x00, + 0x54, 0xa5, 0x21, 0x93, 0x01, 0x8d, 0xe8, 0xd4, 0x10, 0x2e, 0xc1, 0x63, 0x69, 0x68, 0xdd, 0xf0, + 0x9b, 0xa9, 0x62, 0xdf, 0x08, 0x78, 0x12, 0x20, 0x8c, 0xe8, 0xec, 0x40, 0x0f, 0x1e, 0xcd, 0x81, + 0x1e, 0x0a, 0xfb, 0x96, 0xc0, 0x58, 0x02, 0xfe, 0xc3, 0x21, 0x56, 0x46, 0xde, 0xb1, 0x7f, 0x60, + 0xc6, 0x19, 0x09, 0xf8, 0x60, 0x2e, 0x87, 0x7b, 0xed, 0x22, 0x1e, 0x6b, 0x67, 0xe7, 0x71, 0xd4, + 0xc1, 0x63, 0xf1, 0x89, 0x7d, 0xe6, 0xde, 0xbc, 0xed, 0x2e, 0x73, 0xdc, 0x37, 0x43, 0x60, 0x64, + 0x8e, 0x7c, 0x36, 0xe4, 0xf8, 0xe2, 0x12, 0x8c, 0xad, 0x53, 0x9a, 0x8c, 0x01, 0x9c, 0xd7, 0xfc, + 0xbf, 0x6a, 0x9d, 0x87, 0xe9, 0xf2, 0x9f, 0xb0, 0x05, 0xcd, 0x3a, 0x2c, 0xe8, 0xd5, 0x30, 0xb2, + 0x69, 0x9a, 0xd0, 0x5d, 0x33, 0x6a, 0x65, 0x03, 0x7d, 0xfc, 0x26, 0x54, 0x4c, 0xc3, 0x2c, 0x3f, + 0x53, 0xf7, 0x68, 0xf6, 0x3f, 0x8d, 0xd8, 0x05, 0xe3, 0xb3, 0x90, 0x76, 0xd7, 0x90, 0xf6, 0x9f, + 0xb7, 0xae, 0x8b, 0x38, 0x96, 0x65, 0xaa, 0xd5, 0x6e, 0x4b, 0xc9, 0x5f, 0x41, 0x45, 0x6c, 0x57, + 0x50, 0x3c, 0xbf, 0xa3, 0xde, 0xc1, 0xea, 0x18, 0xbf, 0x6a, 0x5f, 0xb6, 0xc2, 0x2a, 0x1c, 0x04, + 0x16, 0x08, 0x7f, 0x61, 0x28, 0xf6, 0xbc, 0x40, 0xb0, 0x68, 0xee, 0xf1, 0x83, 0x10, 0xff, 0xa5, + 0x00, 0x4b, 0xee, 0xf9, 0x4e, 0xda, 0x02, 0xfc, 0x84, 0xc3, 0x02, 0xac, 0x84, 0xb1, 0x00, 0x8e, + 0x68, 0xde, 0x0f, 0x04, 0x38, 0xed, 0x4f, 0x41, 0x20, 0x73, 0xd0, 0x81, 0x71, 0x16, 0xe9, 0x51, + 0x6f, 0xd2, 0x63, 0x3c, 0xe9, 0x8f, 0x9d, 0xdf, 0x19, 0xbe, 0x19, 0x9e, 0x30, 0x4f, 0x9f, 0xeb, + 0x3f, 0x09, 0xb0, 0xd0, 0xb1, 0x29, 0x7a, 0xcc, 0xbb, 0x5e, 0x77, 0x7b, 0x9d, 0xf6, 0x05, 0x7b, + 0x60, 0x7f, 0x3d, 0x46, 0x3f, 0x2f, 0xf2, 0x76, 0xbf, 0x7c, 0x2f, 0x9b, 0xac, 0x7b, 0xec, 0x28, + 0x7f, 0x8f, 0x6d, 0x5f, 0xe5, 0x98, 0x73, 0x95, 0xed, 0x1b, 0x6d, 0x9f, 0xd3, 0x61, 0xca, 0x1a, + 0x0e, 0x13, 0x3d, 0x69, 0x2d, 0x07, 0xf9, 0xae, 0x30, 0x80, 0xb7, 0x34, 0x70, 0x34, 0x6f, 0x69, + 0x30, 0x94, 0x19, 0xee, 0xf4, 0xbd, 0x9f, 0x63, 0xcb, 0x80, 0x8e, 0x5b, 0xc6, 0xb0, 0x7b, 0xcb, + 0xa0, 0x9b, 0xd0, 0x08, 0xbf, 0x09, 0xf1, 0x0f, 0x07, 0x46, 0x3b, 0x3d, 0x1c, 0x18, 0x73, 0x3e, + 0x1c, 0x70, 0xba, 0x75, 0xe3, 0x6e, 0xb7, 0xee, 0x4b, 0xf4, 0x3b, 0x5b, 0xde, 0xa7, 0xf3, 0xdd, + 0x40, 0x2d, 0x81, 0x88, 0xf8, 0x0b, 0x44, 0xb4, 0xb3, 0x40, 0xc4, 0x9c, 0x9e, 0xd7, 0xbb, 0x1c, + 0x00, 0xe6, 0xda, 0xf9, 0x02, 0x08, 0xe9, 0xd4, 0xdd, 0xa2, 0x9f, 0x9f, 0x19, 0x0e, 0x59, 0xd0, + 0x61, 0xc5, 0x9f, 0x36, 0xfd, 0x0a, 0xbe, 0x7b, 0x17, 0xeb, 0xe6, 0xab, 0x46, 0x74, 0xf4, 0xa8, + 0x39, 0xfa, 0x97, 0xcc, 0x7b, 0x29, 0x27, 0xdd, 0xc7, 0x34, 0x43, 0x37, 0x8e, 0x37, 0xec, 0x8e, + 0x16, 0x4f, 0xe3, 0x25, 0x88, 0x1b, 0x08, 0x4c, 0x53, 0x4d, 0x71, 0x8c, 0xb5, 0x78, 0xf7, 0x38, + 0x04, 0xb9, 0xdf, 0xb5, 0xae, 0xaf, 0xec, 0xd3, 0xf5, 0x28, 0x6d, 0x5e, 0x10, 0xa3, 0x9e, 0x10, + 0x2f, 0xb8, 0x0d, 0x15, 0xcb, 0x73, 0x11, 0x17, 0x82, 0x5b, 0x2c, 0xf1, 0x17, 0xfd, 0x08, 0x60, + 0xab, 0x76, 0xfc, 0x3c, 0xeb, 0xb6, 0x80, 0x1f, 0x0b, 0x30, 0x6b, 0xd9, 0xc5, 0x97, 0xed, 0xc1, + 0xa2, 0x89, 0xcc, 0xf4, 0x1d, 0xfe, 0xaa, 0x00, 0x33, 0x2e, 0xbc, 0xbd, 0x3c, 0xfd, 0x29, 0x38, + 0x9f, 0xfe, 0xdc, 0x0c, 0xbe, 0x7d, 0x78, 0xed, 0xf7, 0xbf, 0x23, 0xc0, 0x94, 0x57, 0x8b, 0x90, + 0x2f, 0x13, 0x1d, 0x43, 0x78, 0xec, 0xee, 0x85, 0xa3, 0xec, 0xee, 0xc6, 0x60, 0x89, 0x57, 0xba, + 0xec, 0xf3, 0xff, 0xdc, 0x72, 0x5f, 0x7c, 0xd8, 0x7d, 0xac, 0x31, 0xaf, 0xf0, 0xef, 0x44, 0xbb, + 0xae, 0x86, 0xe8, 0xa9, 0x68, 0x76, 0x1a, 0x82, 0xeb, 0xdb, 0x0f, 0x97, 0x9c, 0x5f, 0x88, 0xc0, + 0x4c, 0xa6, 0xad, 0xef, 0x1e, 0x59, 0xea, 0x2b, 0x3e, 0x89, 0x3c, 0xba, 0xca, 0xa5, 0x63, 0xf6, + 0x90, 0xd9, 0x3c, 0x0a, 0x4e, 0x2f, 0xfb, 0x66, 0xc8, 0xf9, 0x3c, 0x94, 0xcd, 0xab, 0x45, 0x48, + 0x65, 0xeb, 0x48, 0xd4, 0x0b, 0x54, 0x36, 0x6c, 0x84, 0x5d, 0xcb, 0xfb, 0xd2, 0x18, 0x61, 0x13, + 0x99, 0x69, 0x84, 0xf7, 0x60, 0xc8, 0x2c, 0xc4, 0x40, 0xc8, 0x6e, 0x6a, 0x7f, 0x26, 0x3e, 0x0f, + 0x96, 0x2d, 0x70, 0xc7, 0x61, 0x67, 0x80, 0x6d, 0x57, 0x41, 0x0e, 0xd8, 0xa9, 0x7f, 0x22, 0xd0, + 0x33, 0x07, 0x71, 0xdb, 0xd1, 0x29, 0x98, 0x7e, 0xb4, 0x9d, 0x2b, 0x6d, 0xef, 0x64, 0x76, 0x72, + 0xe5, 0x47, 0x85, 0xed, 0xad, 0xdc, 0x5a, 0xfe, 0x41, 0x3e, 0x97, 0x8d, 0xbf, 0x82, 0xa6, 0x20, + 0x6e, 0x55, 0x65, 0xd6, 0x76, 0xf2, 0xef, 0xe4, 0xe2, 0x02, 0x9a, 0x01, 0x64, 0x95, 0xe6, 0x0b, + 0xac, 0x3c, 0x82, 0xa6, 0x61, 0xc2, 0x2a, 0xcf, 0xe6, 0x36, 0x72, 0x3b, 0xb9, 0x6c, 0x3c, 0x6a, + 0x1f, 0x64, 0xa3, 0xb8, 0xf6, 0x76, 0x2e, 0x1b, 0x8f, 0xd9, 0x1b, 0x6f, 0x3f, 0xda, 0xde, 0xca, + 0x15, 0xb2, 0xf1, 0x3e, 0x7b, 0x71, 0xbe, 0x90, 0xdf, 0xc9, 0x67, 0x36, 0xe2, 0xfd, 0xa9, 0x3f, + 0x03, 0xfd, 0x34, 0xd9, 0x04, 0x9e, 0x7c, 0x3d, 0x57, 0xc8, 0xe6, 0x4a, 0x0e, 0xa8, 0x13, 0x30, + 0xca, 0xca, 0x1f, 0xe4, 0x36, 0x33, 0x1b, 0x18, 0xe7, 0x38, 0x0c, 0xb3, 0x22, 0x52, 0x10, 0x41, + 0x08, 0xc6, 0x58, 0x41, 0x36, 0xff, 0x4e, 0xae, 0xb4, 0x9d, 0x8b, 0x47, 0x53, 0xff, 0x4f, 0x80, + 0x51, 0x5b, 0x3a, 0x1a, 0xb4, 0x00, 0xa7, 0x08, 0x84, 0x5c, 0xa6, 0xb4, 0xf6, 0xf0, 0xed, 0xdc, + 0xbb, 0x8e, 0x89, 0xe6, 0x60, 0xd6, 0x51, 0xbd, 0x9d, 0x2b, 0x95, 0x0b, 0x99, 0x4d, 0x3c, 0xe5, + 0x3c, 0x24, 0xec, 0x95, 0x0f, 0xf2, 0xa5, 0xed, 0x1d, 0x5a, 0x1b, 0x71, 0x77, 0xdd, 0xc8, 0x18, + 0x95, 0x51, 0x77, 0x65, 0x21, 0xbf, 0xf6, 0x36, 0xad, 0x8c, 0xa1, 0x45, 0x48, 0xda, 0x2b, 0xb3, + 0xf9, 0xed, 0xad, 0x8d, 0xcc, 0xbb, 0xb4, 0xbe, 0x0f, 0xcd, 0xc2, 0xa4, 0xbd, 0x3e, 0xb7, 0x99, + 0xc9, 0x6f, 0xc4, 0xfb, 0xdd, 0x15, 0x84, 0xb3, 0xf1, 0x81, 0xd4, 0xcf, 0xc0, 0x08, 0xaf, 0x5a, + 0xb8, 0x21, 0x6d, 0xb4, 0x99, 0xdb, 0x79, 0x58, 0xcc, 0x96, 0x73, 0x9f, 0x7f, 0x94, 0xd9, 0xd8, + 0x8e, 0xbf, 0x82, 0x49, 0xb2, 0x55, 0x6c, 0xef, 0x64, 0x4a, 0x3b, 0xdb, 0xe5, 0xc7, 0xf9, 0x9d, + 0x87, 0x71, 0x01, 0x0b, 0x8f, 0xad, 0x76, 0xad, 0x58, 0xd8, 0xc9, 0xe4, 0x0b, 0xdb, 0xf1, 0x48, + 0x2a, 0x0b, 0x03, 0x2c, 0x53, 0x00, 0x1e, 0x7c, 0xf3, 0x41, 0x66, 0xe7, 0xdd, 0x2d, 0xa7, 0x80, + 0x8d, 0xc3, 0xb0, 0x51, 0xb1, 0xbd, 0xb9, 0x4d, 0xd7, 0xcc, 0x28, 0x28, 0xee, 0x6c, 0xc5, 0x23, + 0xa9, 0xa7, 0x30, 0x68, 0x64, 0x0c, 0x40, 0x09, 0x98, 0xc2, 0x7f, 0x7b, 0x08, 0xea, 0x0c, 0x20, + 0xb3, 0xa6, 0x50, 0xdc, 0x29, 0x97, 0x72, 0x99, 0xec, 0xbb, 0x71, 0x01, 0xaf, 0xb8, 0x59, 0x4e, + 0xcb, 0x22, 0x58, 0x1e, 0xb9, 0xb2, 0xcd, 0xe2, 0x3b, 0x58, 0x4a, 0x53, 0x0f, 0x21, 0xee, 0xfc, + 0x30, 0x1f, 0x25, 0x61, 0xa6, 0x50, 0xdc, 0xc9, 0x3f, 0xc8, 0xaf, 0x65, 0x76, 0xf2, 0xc5, 0x02, + 0x41, 0x45, 0x19, 0xfb, 0x0a, 0xc6, 0xe2, 0xaa, 0x23, 0x24, 0xa4, 0xda, 0x30, 0xcc, 0x7d, 0x8f, + 0x88, 0xd7, 0x75, 0xab, 0xb8, 0x91, 0x5f, 0x7b, 0xd7, 0x07, 0x37, 0x5f, 0x69, 0xaa, 0x58, 0x02, + 0xa6, 0xf8, 0x72, 0x4e, 0xc9, 0x66, 0x61, 0x92, 0xaf, 0x31, 0xd5, 0x2c, 0xb5, 0x05, 0x83, 0xc6, + 0xf7, 0x63, 0xb8, 0x7b, 0xb1, 0xb4, 0xee, 0x35, 0xe1, 0x24, 0x8c, 0x9b, 0x35, 0xe6, 0x6c, 0xd3, + 0x30, 0x61, 0x16, 0x5a, 0x53, 0xa5, 0x7e, 0x43, 0x00, 0xe4, 0xfe, 0xb0, 0x03, 0x89, 0xb0, 0x58, + 0x2c, 0xad, 0x6f, 0xe6, 0x36, 0x57, 0xfd, 0x95, 0xe4, 0x0c, 0x2c, 0x78, 0xb4, 0xe1, 0x94, 0x41, + 0x40, 0x4b, 0x30, 0xef, 0xd1, 0xc4, 0xd2, 0x88, 0x08, 0x96, 0x3c, 0x8f, 0x16, 0x74, 0x01, 0xa2, + 0x58, 0x25, 0xbc, 0x60, 0x60, 0x65, 0xcc, 0x67, 0xe3, 0xb1, 0x94, 0x64, 0xde, 0x6c, 0x51, 0x9e, + 0xcc, 0x43, 0x62, 0xab, 0x54, 0xfc, 0x89, 0xdc, 0xda, 0x8e, 0x17, 0x5f, 0x30, 0x5b, 0xf9, 0x5a, + 0x93, 0x37, 0x49, 0x98, 0x31, 0x2a, 0x5c, 0x0c, 0x7a, 0x64, 0xbe, 0x95, 0x35, 0xa4, 0x9c, 0x35, + 0x65, 0x92, 0xfe, 0x76, 0xa1, 0xf8, 0xb8, 0x40, 0xcd, 0x28, 0x5f, 0xb1, 0x9d, 0xdb, 0x78, 0x10, + 0x17, 0x9c, 0xcd, 0xd7, 0x4b, 0x99, 0x02, 0x5e, 0xc9, 0x48, 0xea, 0xb1, 0xf9, 0xb6, 0xd9, 0x62, + 0xfa, 0x12, 0xcc, 0x1b, 0x30, 0xfc, 0x59, 0xee, 0x6a, 0xc1, 0x0a, 0x18, 0xcb, 0x53, 0x07, 0xd6, + 0x23, 0x7f, 0xdb, 0x8b, 0x49, 0x74, 0x0e, 0x96, 0x58, 0xd3, 0x52, 0x71, 0x23, 0xe7, 0x37, 0xc3, + 0x02, 0x9c, 0xf2, 0x6c, 0xc5, 0x16, 0xf4, 0x3c, 0x9c, 0xf1, 0xac, 0xb6, 0x99, 0xaa, 0x48, 0xea, + 0xfb, 0xd6, 0xdb, 0x4f, 0xa7, 0x64, 0x5d, 0x00, 0x91, 0x8d, 0xd0, 0x59, 0xba, 0xac, 0x99, 0x3a, + 0x4a, 0x98, 0x45, 0x55, 0x27, 0x29, 0xb3, 0x38, 0xeb, 0x27, 0x69, 0x22, 0x2c, 0xfa, 0xc1, 0x32, + 0xa5, 0x6d, 0x0b, 0x06, 0x8d, 0x67, 0x77, 0x58, 0xfb, 0x32, 0x5b, 0x5b, 0x3e, 0xda, 0x67, 0xd6, + 0xf0, 0xda, 0x67, 0x16, 0x72, 0xc2, 0xf5, 0x05, 0xfa, 0x52, 0x84, 0x7f, 0x74, 0x81, 0xad, 0x2d, + 0x29, 0xcb, 0x6d, 0x6f, 0x15, 0x0b, 0xdb, 0x39, 0x22, 0x37, 0x6b, 0xc5, 0x6c, 0x8e, 0x2e, 0x8e, + 0xab, 0x2a, 0x9f, 0x2d, 0xef, 0x14, 0xdf, 0xce, 0x15, 0xe2, 0x02, 0x3a, 0x0b, 0xa7, 0x5d, 0xd5, + 0xa4, 0xce, 0x6a, 0x14, 0x49, 0xa9, 0x30, 0x6a, 0x7b, 0x91, 0x81, 0x39, 0x48, 0x0a, 0xb0, 0x68, + 0x92, 0x2e, 0x99, 0x47, 0x3b, 0x0f, 0x8b, 0xa5, 0xfc, 0x4f, 0x12, 0x9b, 0x67, 0x4c, 0x9d, 0x84, + 0x19, 0x7b, 0xab, 0xfc, 0xe6, 0xd6, 0x46, 0x7e, 0x2d, 0xbf, 0x13, 0x17, 0xd0, 0x69, 0x98, 0xb3, + 0xd7, 0x95, 0x72, 0x0f, 0x4a, 0xb9, 0xed, 0x87, 0xe6, 0x9c, 0xcf, 0x60, 0xd2, 0xe3, 0xc1, 0x06, + 0xb6, 0x9a, 0xa4, 0x78, 0x0b, 0x8f, 0x64, 0x59, 0xd8, 0xc7, 0xb9, 0xd5, 0xf8, 0x2b, 0xc4, 0x02, + 0x79, 0x54, 0x92, 0xd5, 0xc8, 0xac, 0xe7, 0x0a, 0x78, 0x62, 0x6c, 0x1e, 0x3c, 0xda, 0x14, 0x32, + 0x8c, 0xbd, 0x0d, 0x40, 0xee, 0x87, 0x1c, 0xc4, 0xe4, 0xe0, 0xd2, 0x47, 0x3b, 0x6c, 0x43, 0x23, + 0x9d, 0x56, 0x33, 0xdb, 0xf9, 0x35, 0xba, 0xf5, 0x7b, 0xd4, 0x6e, 0x15, 0xb7, 0xf1, 0x84, 0xde, + 0x95, 0x85, 0x62, 0x01, 0xcf, 0x56, 0x86, 0x29, 0xaf, 0xab, 0x7e, 0xcc, 0x60, 0x0e, 0xe1, 0x76, + 0xae, 0x94, 0xf1, 0x51, 0x6d, 0x5b, 0x2b, 0x43, 0xfc, 0x32, 0x5b, 0x5b, 0x86, 0x6a, 0xeb, 0xe6, + 0xd3, 0x77, 0x2b, 0x20, 0xcb, 0x99, 0x04, 0xc2, 0x7f, 0x2f, 0x89, 0xb4, 0xac, 0x22, 0xd7, 0xc4, + 0x14, 0xcd, 0x45, 0x48, 0xba, 0x6b, 0x39, 0x19, 0xfd, 0x43, 0x47, 0xf8, 0xc5, 0xa9, 0xd0, 0x57, + 0xe0, 0x22, 0xdf, 0xbf, 0xb3, 0x56, 0xa7, 0xe0, 0x42, 0xa7, 0xc6, 0x36, 0xd5, 0xbe, 0x0c, 0xe7, + 0x3b, 0xb5, 0xe5, 0xf5, 0xdb, 0x32, 0x16, 0x9e, 0x4d, 0x0d, 0x25, 0xbf, 0x08, 0x67, 0x3b, 0x42, + 0x35, 0x35, 0x7d, 0x17, 0xc6, 0xec, 0x71, 0x6f, 0xc3, 0x39, 0xf3, 0xe5, 0x31, 0x73, 0xb0, 0xbd, + 0x18, 0xcc, 0x9c, 0x3e, 0x6f, 0xee, 0x7e, 0x9d, 0x25, 0x2b, 0xb4, 0x9f, 0xa8, 0xb0, 0xf4, 0x5b, + 0x7d, 0xfc, 0x37, 0x03, 0x8f, 0x36, 0xc6, 0x76, 0x90, 0xcf, 0xd2, 0xb5, 0xf5, 0x1a, 0x86, 0xd1, + 0x19, 0x31, 0xdc, 0x60, 0x47, 0x7d, 0xb1, 0xb4, 0x8e, 0xab, 0xa3, 0x04, 0x9c, 0xfb, 0xb8, 0x87, + 0xc1, 0x61, 0x0d, 0xe8, 0x08, 0x6e, 0x01, 0x4e, 0x79, 0xb4, 0x61, 0x23, 0x0b, 0x44, 0xda, 0xdd, + 0xd5, 0x1c, 0xf6, 0x08, 0xc6, 0xee, 0x35, 0x0b, 0xc3, 0x1e, 0x5d, 0xf9, 0xea, 0xd7, 0x04, 0x98, + 0xd8, 0x34, 0x0f, 0x5e, 0xdb, 0xb2, 0xfa, 0xac, 0x5e, 0x91, 0xd1, 0xdb, 0x30, 0xf0, 0x50, 0x96, + 0x1a, 0xfa, 0xee, 0x17, 0xd1, 0x8c, 0xeb, 0x3a, 0x21, 0xb7, 0xd7, 0xd2, 0xf7, 0x93, 0x3e, 0xe5, + 0x62, 0xfc, 0xe0, 0xfb, 0xff, 0xfd, 0x6b, 0x11, 0x40, 0x83, 0xe9, 0x5d, 0x36, 0xc2, 0x3a, 0xf4, + 0x95, 0x64, 0xa9, 0xba, 0x1f, 0x7a, 0xa8, 0x31, 0x32, 0xd4, 0x20, 0xea, 0x4f, 0xab, 0xa4, 0x7f, + 0x01, 0x06, 0xdf, 0x61, 0x79, 0xdd, 0x7d, 0xc7, 0xf2, 0xcb, 0x12, 0x2e, 0x4e, 0x90, 0xc1, 0x86, + 0xd1, 0x90, 0x99, 0x1b, 0x1e, 0x7d, 0x09, 0x86, 0xd7, 0x65, 0x12, 0xa0, 0x59, 0xdd, 0xcf, 0x67, + 0xd1, 0x85, 0x20, 0x91, 0x92, 0x7c, 0x36, 0x19, 0x28, 0x45, 0xa5, 0x28, 0x1e, 0x1c, 0x26, 0x86, + 0xe9, 0x15, 0xcb, 0x32, 0x86, 0x4f, 0xa6, 0x1f, 0x45, 0xc3, 0x69, 0x5c, 0xa2, 0xa5, 0x3f, 0xac, + 0x57, 0x3f, 0x42, 0xdf, 0x10, 0x60, 0xca, 0x44, 0x40, 0x72, 0xe9, 0xad, 0x37, 0x94, 0x27, 0x52, + 0x03, 0x5d, 0x09, 0x32, 0x05, 0xcb, 0x39, 0x1e, 0x10, 0xcf, 0x8a, 0x17, 0x9e, 0x05, 0x34, 0x97, + 0xae, 0x91, 0x29, 0x19, 0x2c, 0x72, 0x57, 0x93, 0xfe, 0x90, 0xfc, 0xf3, 0x11, 0xfa, 0x1b, 0x02, + 0x0c, 0x53, 0x89, 0xc5, 0x43, 0x68, 0xe8, 0x46, 0xf0, 0x74, 0xa5, 0x2c, 0x48, 0x94, 0x5c, 0x09, + 0xd3, 0x85, 0x6e, 0xe0, 0xe2, 0x25, 0x2f, 0xa8, 0x93, 0xe2, 0x18, 0xc3, 0x58, 0xd6, 0x48, 0xf3, + 0x3b, 0x42, 0x0a, 0x03, 0x1c, 0xc9, 0x6b, 0x78, 0x08, 0x9a, 0xd6, 0x3c, 0x00, 0x42, 0x67, 0x1e, + 0xf6, 0x00, 0x08, 0x5d, 0xa9, 0xd5, 0xc5, 0x8b, 0x5e, 0x08, 0x11, 0x8a, 0x1b, 0x08, 0xeb, 0x1a, + 0x4d, 0xbb, 0x8e, 0x7e, 0x4e, 0x00, 0xb0, 0xd2, 0xac, 0x77, 0x87, 0xe7, 0x4a, 0xc9, 0x1e, 0x70, + 0x75, 0xcf, 0x1c, 0x1c, 0x26, 0x46, 0x00, 0x08, 0xa0, 0xe7, 0x6a, 0x5d, 0x97, 0xa9, 0xb4, 0x8b, + 0xfd, 0x14, 0x11, 0xe6, 0xd5, 0x57, 0x05, 0x18, 0xcb, 0xca, 0x52, 0x45, 0xaf, 0x3f, 0x33, 0xe0, + 0x1c, 0xaf, 0xc4, 0xaf, 0x78, 0x62, 0x98, 0x4f, 0xce, 0x72, 0x22, 0x9f, 0x2e, 0x57, 0x4d, 0x08, + 0x06, 0xa8, 0xd2, 0x0f, 0x1f, 0x94, 0x6a, 0x03, 0xf5, 0x17, 0x04, 0x18, 0xdc, 0x50, 0x2a, 0xef, + 0x9f, 0x00, 0x9c, 0xab, 0x9e, 0x70, 0x66, 0x92, 0x13, 0x36, 0x38, 0x0d, 0xa5, 0xf2, 0x3e, 0x06, + 0xf2, 0xf3, 0x02, 0xc0, 0xa3, 0x66, 0xe3, 0x64, 0xa0, 0x2c, 0x7b, 0x42, 0x49, 0x24, 0x27, 0x6d, + 0x50, 0xda, 0x4d, 0x03, 0x8c, 0x0a, 0x90, 0x95, 0x1b, 0x72, 0xc8, 0x55, 0xf2, 0xb3, 0xed, 0xe7, + 0x0e, 0x0e, 0x13, 0xa3, 0x30, 0x4c, 0x66, 0xaf, 0x92, 0x61, 0xa9, 0x81, 0x4c, 0xd9, 0x0c, 0xe4, + 0x57, 0x58, 0xee, 0x4d, 0xe3, 0x3f, 0xc8, 0xb8, 0x16, 0xf0, 0xff, 0xc3, 0x60, 0xba, 0x73, 0x31, + 0x58, 0x73, 0x4d, 0x4c, 0x79, 0xe9, 0xf3, 0x34, 0xb2, 0xb1, 0xc2, 0xf8, 0x2f, 0x36, 0xfe, 0x1e, + 0xde, 0xcf, 0xb9, 0xaf, 0x16, 0x4e, 0x18, 0xda, 0xeb, 0x07, 0x87, 0x09, 0x64, 0x5e, 0x16, 0x2c, + 0x4b, 0xad, 0x96, 0x85, 0x70, 0x1e, 0x25, 0xd3, 0xdc, 0x7b, 0x6d, 0x07, 0xd0, 0xbf, 0x2c, 0x00, + 0x14, 0xd5, 0xda, 0x49, 0x03, 0xc4, 0xd6, 0x1a, 0xc8, 0xe5, 0xbe, 0x05, 0x6c, 0x0a, 0xa1, 0xb4, + 0xa2, 0xd6, 0x1c, 0x80, 0xbe, 0x2e, 0x98, 0xef, 0x13, 0x4f, 0x1a, 0xd4, 0xf5, 0x83, 0xc3, 0xc4, + 0x98, 0xf9, 0x6e, 0xc0, 0x02, 0x96, 0x40, 0x33, 0x69, 0x23, 0x79, 0x84, 0x1d, 0xdc, 0x57, 0x04, + 0x18, 0x63, 0x7b, 0xb1, 0x91, 0x4d, 0x3a, 0xa8, 0x8c, 0x07, 0xda, 0xad, 0xd9, 0xa0, 0x81, 0x44, + 0xad, 0xc5, 0x00, 0xfc, 0x43, 0x01, 0x26, 0x5c, 0x59, 0x97, 0x51, 0xd7, 0xaf, 0x02, 0xfd, 0x12, + 0x35, 0x87, 0x03, 0x1a, 0xc8, 0x3e, 0x30, 0xa4, 0xd8, 0x3e, 0xfc, 0x45, 0x01, 0x46, 0x18, 0x03, + 0x69, 0x62, 0xe3, 0xa0, 0xec, 0xbb, 0x1c, 0xd8, 0xd9, 0xf1, 0xf1, 0x0c, 0x90, 0xcd, 0x7a, 0xd2, + 0xe7, 0x26, 0xdf, 0x12, 0x60, 0x9c, 0x0a, 0x83, 0x05, 0xe8, 0x56, 0x70, 0xc6, 0xf1, 0x59, 0x93, + 0xc3, 0x00, 0x0c, 0x64, 0xdf, 0x09, 0x42, 0xcc, 0xb2, 0x6f, 0x0a, 0x30, 0x57, 0x92, 0x35, 0xb9, + 0x59, 0xe5, 0x12, 0x29, 0x53, 0x5d, 0xde, 0x0c, 0xc3, 0x41, 0x3f, 0x23, 0xfb, 0x96, 0x27, 0x9a, + 0x94, 0x78, 0xde, 0x85, 0x06, 0x6f, 0x81, 0x18, 0xc7, 0x33, 0x0e, 0x82, 0x63, 0x51, 0x69, 0x5a, + 0xe7, 0x63, 0x5d, 0x54, 0x32, 0x64, 0xa0, 0x45, 0xa5, 0x69, 0x9b, 0xed, 0x8b, 0x4a, 0x01, 0x85, + 0x58, 0x54, 0x3e, 0x67, 0x74, 0x18, 0x80, 0x81, 0x16, 0x95, 0x20, 0xb4, 0x2f, 0x2a, 0x97, 0x47, + 0x9a, 0xed, 0x15, 0x4a, 0x55, 0x7e, 0x31, 0x8b, 0x4a, 0xd0, 0xf8, 0x2d, 0x2a, 0x67, 0xea, 0x8c, + 0xa4, 0xd6, 0xc7, 0x6a, 0xea, 0x8c, 0x74, 0xcc, 0x41, 0x4c, 0x1d, 0xcb, 0xec, 0xec, 0x30, 0x75, + 0x06, 0xac, 0x10, 0xa6, 0xce, 0x9e, 0xe2, 0x3a, 0x1c, 0xd0, 0x40, 0xa6, 0x8e, 0x21, 0xc5, 0x0c, + 0xfc, 0x4b, 0x82, 0x79, 0x72, 0xdc, 0x7c, 0x2a, 0x05, 0xe7, 0xde, 0xd5, 0x10, 0x19, 0xa8, 0xb5, + 0x6e, 0x87, 0x0c, 0x02, 0x6a, 0x0f, 0x4f, 0xff, 0x8f, 0x05, 0x98, 0xdb, 0x96, 0x9b, 0x55, 0x9f, + 0x6c, 0xcc, 0xe8, 0x5e, 0xf7, 0xab, 0xe3, 0x4e, 0x69, 0x9c, 0x7d, 0x25, 0xf1, 0xb6, 0x27, 0xdb, + 0xce, 0x88, 0xf3, 0x36, 0x0f, 0x12, 0x4b, 0xa0, 0x26, 0xeb, 0xad, 0xe7, 0x4d, 0x3c, 0xf4, 0x3e, + 0xe6, 0xdf, 0xd7, 0x04, 0x40, 0xdb, 0xb2, 0x9e, 0x6f, 0xd6, 0xf5, 0xba, 0xd4, 0x30, 0xa6, 0x46, + 0x5d, 0xff, 0xa3, 0x0d, 0x47, 0x46, 0x6a, 0x5f, 0x60, 0x37, 0x3d, 0x81, 0x2d, 0x8a, 0xa7, 0x1c, + 0xc0, 0xf4, 0x3a, 0x45, 0xd0, 0x7a, 0x8e, 0x51, 0xfd, 0x7d, 0x01, 0xe6, 0xd6, 0x2d, 0x4e, 0xb8, + 0x92, 0x45, 0xfb, 0x85, 0x1c, 0x5e, 0x0f, 0x0a, 0xdb, 0x39, 0x22, 0x61, 0xe0, 0x28, 0x0c, 0xb7, + 0xc8, 0x2f, 0x6b, 0x8d, 0x97, 0xd0, 0x62, 0x9a, 0x94, 0xd5, 0x65, 0x2d, 0x6d, 0xa4, 0xe5, 0xd6, + 0xd2, 0x15, 0xb3, 0x3b, 0xfa, 0x3d, 0x01, 0x16, 0xe9, 0x51, 0xd1, 0x17, 0xed, 0xbd, 0x5e, 0x51, + 0xd1, 0x71, 0x8f, 0x40, 0xd5, 0x5d, 0xe6, 0x7b, 0x51, 0xaa, 0x2c, 0xfe, 0x9f, 0x15, 0xbb, 0x90, + 0x85, 0x17, 0xe1, 0xf7, 0x05, 0x58, 0xa4, 0x4a, 0x7d, 0xfc, 0x94, 0xd1, 0x71, 0x8f, 0x40, 0xd9, + 0x5b, 0x3e, 0x94, 0x5d, 0x4a, 0x9e, 0xed, 0x4c, 0x19, 0x91, 0x38, 0x4c, 0xde, 0x27, 0x02, 0x2c, + 0xd2, 0x53, 0x94, 0x2f, 0x79, 0x77, 0x7a, 0x85, 0xd7, 0x61, 0xcf, 0xb8, 0x77, 0x70, 0x98, 0x18, + 0x87, 0x51, 0x06, 0x9c, 0x3b, 0x6f, 0x9d, 0x4f, 0x05, 0x41, 0x8e, 0x15, 0x76, 0x8a, 0x53, 0x0d, + 0x2b, 0xdb, 0xb2, 0x9f, 0x4e, 0xdc, 0x08, 0x4a, 0x84, 0x39, 0x14, 0x71, 0xd9, 0x3d, 0x94, 0xe1, + 0x14, 0x9a, 0xf5, 0x42, 0x28, 0xd5, 0x64, 0xf4, 0x1b, 0x02, 0xcc, 0xda, 0xb5, 0xc0, 0x02, 0x76, + 0x3b, 0x34, 0x00, 0x26, 0xf7, 0x3d, 0x20, 0xbf, 0xe9, 0x23, 0x16, 0xf3, 0xa2, 0x1f, 0x74, 0x2c, + 0x0a, 0xbf, 0x29, 0xc0, 0xac, 0x5d, 0xd2, 0x8f, 0x82, 0x9e, 0xc9, 0x76, 0x0f, 0xe8, 0xdf, 0xf0, + 0x41, 0x7f, 0x26, 0x39, 0xef, 0x83, 0xde, 0x94, 0xe6, 0x6f, 0x0a, 0x30, 0x6b, 0x97, 0x66, 0x8b, + 0x84, 0x57, 0x43, 0x23, 0xe9, 0x20, 0xbf, 0xb7, 0xfd, 0xe4, 0x77, 0x31, 0xd5, 0x11, 0x24, 0x46, + 0x98, 0xe0, 0x04, 0xd7, 0x9e, 0x6e, 0xd9, 0x4f, 0x78, 0x5f, 0x0b, 0x0a, 0xdd, 0x36, 0x1c, 0x11, + 0x03, 0x0f, 0x01, 0x5e, 0x40, 0x73, 0x5e, 0x10, 0x1b, 0xb4, 0x2f, 0xfa, 0x6d, 0x01, 0xe6, 0xec, + 0x42, 0x6c, 0x07, 0x79, 0xb7, 0x27, 0x30, 0x4c, 0x98, 0x7b, 0xa4, 0xe4, 0x75, 0x1f, 0x91, 0x58, + 0x12, 0x3b, 0x91, 0x82, 0x25, 0xe2, 0x3f, 0x08, 0x30, 0x67, 0x17, 0xea, 0xe3, 0xa0, 0x86, 0x09, + 0x77, 0x8f, 0xd4, 0xbc, 0xe9, 0x43, 0xcd, 0xf9, 0xe4, 0x52, 0x07, 0x6a, 0x4c, 0x21, 0xff, 0xb6, + 0x00, 0x73, 0x76, 0x21, 0xb7, 0x93, 0x74, 0xbb, 0x27, 0x54, 0x1d, 0x84, 0xfd, 0xae, 0x9f, 0xb0, + 0x8b, 0xa9, 0xae, 0x80, 0xd1, 0x17, 0x01, 0xd6, 0x65, 0xbd, 0xa8, 0xd6, 0xc8, 0x95, 0xc6, 0xf9, + 0x00, 0xe9, 0x48, 0xf3, 0xd9, 0xe4, 0xd9, 0x00, 0xcd, 0xc4, 0x25, 0x8f, 0x38, 0xcf, 0x08, 0x02, + 0x2b, 0xce, 0x83, 0xbe, 0x4e, 0x77, 0x09, 0x32, 0x39, 0xfd, 0x76, 0x83, 0x5d, 0x67, 0x04, 0x49, + 0x0f, 0x4b, 0x3b, 0x04, 0x83, 0xb2, 0xe2, 0x01, 0x65, 0x11, 0xcd, 0x1b, 0x57, 0x19, 0x04, 0x11, + 0xfd, 0x9a, 0x24, 0xfd, 0x21, 0xfd, 0xf7, 0x23, 0xf4, 0x0b, 0x02, 0x8c, 0x5a, 0xe1, 0xef, 0xa2, + 0x5a, 0x3b, 0x56, 0xe6, 0x5c, 0xa7, 0xbe, 0x3a, 0x46, 0x64, 0x09, 0xd8, 0x5c, 0x72, 0x86, 0x8b, + 0x82, 0x39, 0x22, 0xdf, 0x18, 0x4f, 0xe9, 0x87, 0x8a, 0x47, 0x75, 0xe2, 0x99, 0xa0, 0x8b, 0xc7, + 0x7f, 0xb3, 0xea, 0x67, 0x22, 0x97, 0x83, 0x27, 0xfc, 0x25, 0x5f, 0x2a, 0x62, 0x3c, 0x13, 0x30, + 0x8e, 0xf1, 0xec, 0x91, 0x62, 0xfb, 0x81, 0x90, 0xa0, 0xa2, 0x15, 0x5a, 0x9a, 0x7e, 0x62, 0xfa, + 0x57, 0x04, 0x18, 0xe1, 0xf3, 0x3a, 0x77, 0xdf, 0x50, 0x3c, 0xb2, 0x40, 0x77, 0xdc, 0x50, 0x10, + 0xc4, 0x39, 0x3c, 0x1c, 0x9b, 0x44, 0x83, 0x4d, 0xf4, 0xcb, 0x8d, 0x8f, 0x0c, 0x64, 0x98, 0x4d, + 0x7f, 0xc7, 0x0c, 0x41, 0x58, 0xc8, 0x6e, 0x05, 0x8b, 0x4a, 0x06, 0x06, 0x97, 0xe9, 0x00, 0x0e, + 0x1b, 0x2d, 0x4f, 0x70, 0xe9, 0x0f, 0xd9, 0x57, 0x19, 0xc4, 0x68, 0x7d, 0x4b, 0x80, 0x71, 0x47, + 0x62, 0xe9, 0xee, 0x30, 0xbd, 0x33, 0x51, 0xfb, 0xc2, 0xbc, 0x7f, 0x70, 0x98, 0x98, 0x84, 0x09, + 0x0e, 0xa6, 0xc3, 0x56, 0x75, 0xc1, 0x89, 0xbe, 0x27, 0x40, 0x9c, 0x5e, 0xfd, 0x99, 0x73, 0x6a, + 0xdd, 0x51, 0x7a, 0x27, 0x8d, 0x4e, 0xde, 0x0e, 0xdd, 0x8f, 0xdd, 0xe5, 0xdd, 0xf3, 0x17, 0x4d, + 0x7c, 0x62, 0xf1, 0x26, 0x82, 0xbb, 0x83, 0xfc, 0x58, 0x80, 0x31, 0x3a, 0xa4, 0x99, 0xda, 0xf8, + 0x66, 0xa8, 0x54, 0xab, 0x06, 0x05, 0xaf, 0x85, 0xec, 0xc5, 0xf0, 0x2f, 0xfb, 0x84, 0xba, 0x67, + 0xc4, 0x09, 0x2b, 0xd4, 0xcd, 0xe1, 0xfd, 0x45, 0x2b, 0x71, 0x25, 0xd9, 0x23, 0x2e, 0x07, 0x9c, + 0x36, 0x9f, 0x4d, 0x06, 0x4d, 0x96, 0x4b, 0x22, 0x66, 0xc8, 0x8e, 0x09, 0x45, 0xf2, 0x14, 0x57, + 0x1c, 0x8d, 0xd9, 0x43, 0xf0, 0xe8, 0xaf, 0x09, 0x30, 0xca, 0x5c, 0x20, 0x96, 0xca, 0x39, 0x28, + 0x03, 0x6d, 0x59, 0xac, 0x83, 0xc3, 0xbb, 0xc8, 0x76, 0x58, 0x06, 0xcf, 0xd2, 0xae, 0x31, 0x71, + 0xc8, 0xc4, 0x86, 0x79, 0xf5, 0x37, 0x05, 0x18, 0x65, 0xee, 0x4c, 0x48, 0x64, 0xb6, 0x3c, 0xd9, + 0xc1, 0x91, 0x5d, 0x27, 0x3a, 0x65, 0x47, 0x66, 0x72, 0x6e, 0x32, 0xe9, 0xe0, 0x1c, 0x86, 0xf8, + 0x77, 0x05, 0x98, 0xb0, 0xf6, 0x35, 0x03, 0xe6, 0x49, 0x2c, 0xea, 0xe7, 0x3a, 0x61, 0x3b, 0x9d, + 0x4c, 0x3a, 0x2e, 0x56, 0x1c, 0xfb, 0x1d, 0xc6, 0x59, 0x7a, 0x29, 0x71, 0xda, 0xf7, 0xc1, 0x6f, + 0x09, 0x90, 0x5c, 0x97, 0x75, 0x96, 0x06, 0x83, 0x7f, 0xb3, 0x45, 0xb4, 0xa5, 0xeb, 0xc6, 0x67, + 0xcf, 0x9f, 0x91, 0x0c, 0x95, 0xaf, 0x42, 0xbc, 0xe0, 0xa3, 0xcb, 0x63, 0x68, 0x24, 0x4d, 0x3e, + 0x13, 0xb2, 0x1e, 0x8e, 0x4c, 0xe3, 0x63, 0x8d, 0x3b, 0x65, 0xb2, 0xdf, 0x86, 0xbd, 0x12, 0x2e, + 0xfd, 0x25, 0xd9, 0xb4, 0xf1, 0x31, 0x60, 0x1a, 0x26, 0x0d, 0x34, 0x4e, 0xeb, 0x48, 0x4e, 0xe6, + 0x06, 0x2b, 0xed, 0x9b, 0xf7, 0x1f, 0x08, 0x30, 0x65, 0xb3, 0x89, 0x86, 0x75, 0xbf, 0xd3, 0x43, + 0x92, 0x49, 0x43, 0x89, 0xee, 0xf6, 0xd4, 0x97, 0x59, 0xc9, 0x47, 0x07, 0x87, 0x89, 0x25, 0x4f, + 0x5a, 0x90, 0xf9, 0xff, 0xfe, 0x53, 0xb2, 0xae, 0x88, 0x17, 0x38, 0x09, 0xb1, 0x3e, 0x34, 0xf3, + 0x34, 0xfe, 0xdf, 0x10, 0x20, 0x9e, 0xa9, 0x56, 0xed, 0xe9, 0xa8, 0xaf, 0x87, 0x02, 0x9a, 0xa9, + 0x56, 0x3b, 0x6e, 0xb1, 0x49, 0x98, 0x72, 0xa0, 0xb6, 0x4b, 0x34, 0x76, 0x57, 0xec, 0x12, 0xcd, + 0xb9, 0x2b, 0x1f, 0x0b, 0x30, 0x49, 0xbd, 0x0f, 0x3b, 0xc4, 0x57, 0x43, 0x41, 0xa4, 0x23, 0xf8, + 0xa2, 0xcc, 0x07, 0x40, 0x49, 0x0e, 0x5b, 0x5e, 0x28, 0xed, 0x7e, 0xcb, 0xb7, 0x05, 0x98, 0xa4, + 0x6e, 0xc8, 0x51, 0xf0, 0xd2, 0x11, 0x7c, 0xf1, 0xae, 0x1f, 0x1c, 0x26, 0xe6, 0x60, 0xda, 0x81, + 0x97, 0x3a, 0x2f, 0x26, 0x60, 0x72, 0xd8, 0xea, 0x0c, 0x18, 0xfd, 0x3e, 0x89, 0x63, 0x73, 0x62, + 0x4e, 0x75, 0xf0, 0xf5, 0xd0, 0xc9, 0x78, 0x0d, 0x11, 0x7f, 0xa3, 0x87, 0x9e, 0x4c, 0xc0, 0x3f, + 0x7f, 0x70, 0x98, 0x58, 0x84, 0x09, 0xd3, 0x74, 0x28, 0x0d, 0xd9, 0x53, 0xbc, 0x2f, 0x8b, 0xe7, + 0x7c, 0xc4, 0x9b, 0xa8, 0x2e, 0x2f, 0xdc, 0xbf, 0x2c, 0xc0, 0x98, 0x25, 0xdc, 0x24, 0xcb, 0xf5, + 0x72, 0x08, 0x80, 0x9d, 0x04, 0x1b, 0x9f, 0x71, 0x13, 0x80, 0x6c, 0x68, 0xed, 0x02, 0x73, 0x4a, + 0x9c, 0x72, 0xf0, 0x9f, 0xe0, 0x63, 0xbb, 0xf2, 0x84, 0x4d, 0x48, 0x08, 0xb4, 0x1b, 0x61, 0x72, + 0x43, 0x77, 0x16, 0x90, 0xb7, 0x0e, 0x0e, 0x13, 0xa7, 0x2c, 0x63, 0x41, 0xd0, 0x39, 0xc4, 0x63, + 0x21, 0x35, 0xe7, 0x05, 0x2f, 0xfd, 0x61, 0x53, 0xda, 0x93, 0x3f, 0x42, 0x3f, 0x30, 0x25, 0x83, + 0x7b, 0x2a, 0x12, 0x40, 0x32, 0xfc, 0xf2, 0xbc, 0x75, 0x97, 0x0c, 0xdf, 0xac, 0x76, 0xe2, 0xe3, + 0x83, 0xc3, 0xc4, 0x82, 0xfb, 0x05, 0x89, 0x53, 0x30, 0xae, 0x8b, 0x57, 0x7c, 0x04, 0xc3, 0xf6, + 0xc4, 0x84, 0x93, 0x8f, 0xdf, 0x14, 0x60, 0x9c, 0x9b, 0x96, 0xec, 0x8f, 0xd7, 0x42, 0xe0, 0x0c, + 0x72, 0x9f, 0xc8, 0x35, 0x27, 0x22, 0x1e, 0x80, 0x90, 0x14, 0xba, 0x14, 0x84, 0x10, 0xb2, 0x91, + 0xfe, 0xae, 0x00, 0xd3, 0xd4, 0x89, 0x74, 0xbc, 0xad, 0x47, 0xaf, 0x85, 0xcc, 0x9e, 0xc8, 0x22, + 0x6e, 0xa1, 0x08, 0xda, 0xb1, 0xeb, 0x2c, 0x26, 0x88, 0x2a, 0x81, 0x83, 0xa2, 0xab, 0xe2, 0x45, + 0x1f, 0x8a, 0x94, 0x7a, 0xb5, 0xc2, 0x53, 0x85, 0x97, 0xe5, 0xb7, 0xcc, 0xab, 0x54, 0x9e, 0x9e, + 0x1b, 0x21, 0x80, 0xb1, 0x78, 0x5b, 0x28, 0x5a, 0x1e, 0x05, 0xa4, 0xe5, 0x5a, 0x32, 0xf0, 0xea, + 0x60, 0x62, 0xfe, 0xb3, 0x00, 0xd3, 0x96, 0x7b, 0xcb, 0x13, 0x74, 0x92, 0x92, 0x26, 0x05, 0x24, + 0xe6, 0x8d, 0xe4, 0xcd, 0xa0, 0xc4, 0x38, 0xfd, 0x61, 0x4c, 0x58, 0xe9, 0x4f, 0x07, 0x61, 0x76, + 0x07, 0xfa, 0x7f, 0x9a, 0x21, 0x60, 0x6e, 0x62, 0x2e, 0x05, 0xf4, 0xf5, 0xe0, 0xd9, 0xab, 0x99, + 0x1c, 0x86, 0xc8, 0x77, 0x2d, 0x36, 0x02, 0x12, 0x98, 0x4d, 0xde, 0x0f, 0x44, 0xa0, 0x3d, 0xa1, + 0x2c, 0x55, 0x38, 0x9a, 0x3e, 0x1b, 0xd3, 0xfa, 0xbf, 0x04, 0x48, 0x96, 0xe4, 0x9a, 0xdc, 0x94, + 0x55, 0x66, 0x42, 0x6c, 0x29, 0x49, 0x43, 0xae, 0x64, 0xd7, 0xb3, 0x02, 0x3f, 0xb8, 0xa8, 0x07, + 0xa4, 0x74, 0x23, 0xb9, 0x1e, 0x78, 0x29, 0x2d, 0xea, 0xd2, 0x65, 0xfa, 0x30, 0x8e, 0x66, 0x4f, + 0xa5, 0x19, 0x55, 0x31, 0xc5, 0xff, 0x55, 0x80, 0x49, 0x9b, 0xcb, 0x43, 0x0e, 0x2e, 0x1a, 0x7a, + 0x23, 0x54, 0xce, 0x48, 0xdb, 0xd6, 0x76, 0xa7, 0x97, 0xae, 0x6c, 0x6f, 0xdb, 0x3e, 0x38, 0x4c, + 0x9c, 0xb6, 0xfc, 0x08, 0x72, 0x46, 0xf2, 0xde, 0x14, 0xc4, 0xf3, 0x3e, 0x5c, 0x60, 0xe7, 0x2a, + 0x6e, 0x5f, 0xfb, 0x44, 0x30, 0xbf, 0x2b, 0x0c, 0x71, 0xf0, 0xb3, 0x67, 0x5e, 0x0c, 0x79, 0xf0, + 0x5b, 0x3d, 0x38, 0x4c, 0x4c, 0x79, 0xd1, 0x41, 0xc0, 0x9f, 0x43, 0x62, 0x67, 0xf0, 0x64, 0x2f, + 0xfb, 0x35, 0x01, 0x90, 0x2d, 0x8c, 0x42, 0xbf, 0x92, 0x0f, 0x95, 0x2f, 0x8d, 0xed, 0x62, 0xe1, + 0xc0, 0x67, 0xec, 0xe7, 0x44, 0x0a, 0xde, 0x0a, 0xaa, 0x88, 0xe2, 0x42, 0x47, 0xf4, 0x98, 0xe5, + 0xdf, 0x15, 0x00, 0xd9, 0x02, 0x2d, 0x3d, 0x60, 0x67, 0xd6, 0x22, 0x1c, 0xf6, 0x07, 0x9d, 0xb1, + 0x5f, 0x4c, 0x06, 0xe0, 0x3c, 0xdb, 0x74, 0x67, 0x5c, 0x61, 0x18, 0x4a, 0xc4, 0xc9, 0x4a, 0x4e, + 0xa9, 0x33, 0x01, 0xaf, 0x26, 0x97, 0xbb, 0x13, 0xe0, 0xdc, 0x9b, 0x30, 0x31, 0xa5, 0x1f, 0x5d, + 0x62, 0xec, 0xfb, 0xd1, 0x27, 0x34, 0xa0, 0xe3, 0x97, 0x95, 0xd3, 0x2f, 0x60, 0x72, 0xbb, 0x87, + 0x34, 0x83, 0x24, 0x6a, 0x92, 0x23, 0xa7, 0xcb, 0x53, 0x76, 0x1a, 0x9c, 0xb1, 0x13, 0xf2, 0xc4, + 0xc7, 0xa0, 0x84, 0x81, 0xb7, 0x87, 0x50, 0x0e, 0x22, 0x70, 0xca, 0x6d, 0x68, 0x8d, 0x38, 0xca, + 0xfd, 0x5e, 0x93, 0xf6, 0x19, 0x46, 0xf7, 0xad, 0xde, 0x07, 0x60, 0xa6, 0xf7, 0x49, 0x10, 0x3a, + 0xdf, 0x14, 0x5f, 0xef, 0xb2, 0x62, 0x46, 0xf6, 0x1b, 0xcf, 0xf0, 0xca, 0xf7, 0x04, 0x98, 0xb6, + 0x4e, 0xa0, 0x7c, 0x7e, 0xd4, 0xd7, 0xc2, 0xe3, 0xef, 0x74, 0x1e, 0xfd, 0xa9, 0x83, 0xc3, 0xc4, + 0x3c, 0x24, 0x3d, 0x89, 0xb1, 0xe4, 0xef, 0x35, 0xf1, 0x7a, 0x58, 0x6a, 0x30, 0x15, 0xdf, 0x17, + 0x20, 0x61, 0x0b, 0xc2, 0xf0, 0x84, 0xbc, 0x1e, 0x9e, 0x90, 0x2e, 0xe1, 0x18, 0x39, 0x10, 0x2d, + 0xf7, 0x93, 0x77, 0x42, 0xaf, 0x8c, 0x2d, 0x54, 0xf3, 0xbb, 0x02, 0x24, 0x6c, 0xa7, 0xf0, 0x23, + 0x52, 0xd5, 0xe5, 0x4c, 0x5e, 0x21, 0x87, 0xbf, 0x39, 0x4f, 0xaa, 0xb8, 0x7b, 0xa7, 0xcf, 0xa5, + 0x8e, 0x40, 0x16, 0xfa, 0x75, 0xf3, 0x46, 0xca, 0xfc, 0x9c, 0x34, 0xc0, 0x8d, 0x94, 0x77, 0x8a, + 0xa7, 0xee, 0x16, 0xc4, 0x27, 0xfb, 0x99, 0xf8, 0x1a, 0xbd, 0x91, 0x22, 0xcf, 0x17, 0x1d, 0x9e, + 0x40, 0x52, 0x9c, 0x66, 0x6f, 0x18, 0xdd, 0x6e, 0xcb, 0xb7, 0x58, 0x82, 0x16, 0xcb, 0x67, 0xb9, + 0x12, 0x18, 0x41, 0xd0, 0x17, 0xdb, 0xd4, 0x4c, 0xbf, 0xe1, 0x0f, 0x70, 0x11, 0x99, 0xaf, 0x3f, + 0x0d, 0xae, 0xda, 0x9c, 0x94, 0x5f, 0x11, 0x60, 0xdc, 0xfa, 0xc8, 0x8d, 0xee, 0x29, 0xe9, 0xc0, + 0x33, 0x33, 0xf7, 0x24, 0x04, 0x54, 0xf6, 0xf9, 0x0c, 0x07, 0xd5, 0xfe, 0x3e, 0xcb, 0x1b, 0x2b, + 0x66, 0xe7, 0x3f, 0x12, 0x60, 0xdc, 0x7a, 0x5e, 0x1c, 0x16, 0x29, 0x73, 0x46, 0x42, 0x20, 0x7d, + 0xb3, 0x03, 0xd2, 0x33, 0xc9, 0x8e, 0x5c, 0xc5, 0x70, 0xbf, 0x23, 0xc0, 0xa4, 0xfd, 0xf3, 0x3e, + 0x0a, 0xf9, 0xa4, 0x64, 0x20, 0xdf, 0x01, 0x2e, 0x3e, 0xe3, 0x77, 0x80, 0xeb, 0x74, 0x37, 0xbe, + 0x43, 0x82, 0xbe, 0x3f, 0x22, 0xd0, 0xed, 0xce, 0xc5, 0x1f, 0x0a, 0x30, 0x6b, 0xdb, 0xa5, 0x39, + 0xbb, 0x11, 0x34, 0x9f, 0xef, 0x71, 0x9b, 0x8f, 0xf7, 0x0e, 0x0e, 0x13, 0xe7, 0x60, 0xd6, 0xb0, + 0x94, 0x0e, 0x2d, 0x0d, 0x1e, 0xf6, 0xf3, 0xb3, 0x33, 0xff, 0xc5, 0x4a, 0x8e, 0x62, 0x37, 0x37, + 0x2b, 0x61, 0x09, 0x0e, 0xb7, 0x6c, 0x4f, 0x42, 0xd1, 0x75, 0x13, 0xad, 0x74, 0xa4, 0xcb, 0xdb, + 0x3c, 0xfd, 0x9e, 0x00, 0x33, 0xb6, 0x33, 0xd4, 0x8b, 0xb1, 0x52, 0xd2, 0xc1, 0x61, 0xe2, 0x3c, + 0x24, 0x3c, 0x48, 0xf3, 0x3c, 0xd2, 0xaf, 0x88, 0xd7, 0x42, 0xd1, 0x86, 0x57, 0xed, 0xbf, 0x09, + 0x30, 0x63, 0x3b, 0x61, 0x59, 0x94, 0xdd, 0x0a, 0xbb, 0x6e, 0xe1, 0x8d, 0xdb, 0xd3, 0x70, 0x04, + 0xde, 0x4e, 0xf6, 0xb0, 0x78, 0x46, 0x40, 0xc6, 0x75, 0x0c, 0xb3, 0x28, 0x3d, 0x61, 0x09, 0x55, + 0xc3, 0x51, 0xb9, 0x96, 0xbc, 0x17, 0x9e, 0x4a, 0xa7, 0xf1, 0xa4, 0x21, 0xa8, 0x3f, 0xdd, 0x14, + 0xdb, 0x6d, 0xee, 0x57, 0x22, 0x30, 0xef, 0x3e, 0x19, 0x71, 0x86, 0x77, 0x35, 0x54, 0xd4, 0xe0, + 0x98, 0xad, 0xaf, 0x7e, 0x70, 0x98, 0x48, 0xc3, 0x82, 0xdd, 0x4f, 0x75, 0xda, 0x2a, 0xfb, 0x7f, + 0xd3, 0x41, 0x79, 0x73, 0x57, 0xbc, 0x65, 0xf0, 0xc6, 0x20, 0xde, 0x99, 0x21, 0xd4, 0xdf, 0x26, + 0xff, 0x91, 0x60, 0xff, 0x1f, 0x2e, 0xec, 0x86, 0xf9, 0x76, 0x4f, 0x0c, 0x09, 0x27, 0x09, 0x1f, + 0xf4, 0x4a, 0xf7, 0x7d, 0xf4, 0x66, 0x50, 0xba, 0xbd, 0x6d, 0xf6, 0x1f, 0x5b, 0x2f, 0xa8, 0xbd, + 0xc8, 0x40, 0x77, 0x7b, 0xa2, 0x3e, 0xbc, 0x11, 0x7f, 0x7e, 0x70, 0x98, 0xb8, 0x0e, 0x8b, 0xbe, + 0x1c, 0xa0, 0x1a, 0xe1, 0xc5, 0x02, 0xee, 0x94, 0x1c, 0x96, 0x05, 0x78, 0xf1, 0xbf, 0x1c, 0x31, + 0x1f, 0x5d, 0x1f, 0x23, 0x03, 0xc2, 0x1b, 0xf9, 0x3f, 0xd7, 0x33, 0x03, 0x56, 0x93, 0x47, 0x93, + 0x01, 0xcc, 0x85, 0x5f, 0x8a, 0xc0, 0x69, 0xef, 0x08, 0x9c, 0xc5, 0x89, 0x17, 0xa1, 0x08, 0x3f, + 0x27, 0xf4, 0xcc, 0x86, 0x42, 0x32, 0x7f, 0x24, 0x36, 0x38, 0xf7, 0x06, 0xcc, 0x92, 0xd2, 0x8f, + 0x3b, 0x4b, 0x5c, 0xcf, 0xbb, 0xc6, 0xd9, 0xc5, 0xbc, 0x99, 0x47, 0xf6, 0x56, 0xc8, 0x6c, 0xbd, + 0x81, 0xf7, 0x08, 0x9f, 0xcc, 0xba, 0xe2, 0x22, 0xfd, 0xbe, 0x54, 0x9c, 0x4c, 0x4b, 0x6d, 0x7d, + 0xd7, 0x65, 0xcd, 0x57, 0xff, 0x8d, 0xf0, 0xd5, 0xcc, 0x2f, 0x09, 0x68, 0x0d, 0xc6, 0xac, 0xd4, + 0x4c, 0x4b, 0x99, 0xad, 0xbc, 0x78, 0x15, 0xa5, 0x76, 0x75, 0xbd, 0xa5, 0xdd, 0x49, 0xa7, 0x6b, + 0x75, 0x7d, 0xb7, 0xfd, 0x64, 0xb9, 0xa2, 0xec, 0xa5, 0x31, 0x8a, 0x34, 0x43, 0x91, 0xb6, 0x50, + 0xac, 0x44, 0xaf, 0x2f, 0xdf, 0x48, 0x09, 0x91, 0x15, 0xfe, 0x3f, 0x08, 0x4c, 0xff, 0xac, 0xa6, + 0x34, 0xed, 0x25, 0x35, 0xb5, 0x55, 0xb9, 0xe3, 0x6a, 0x73, 0xc7, 0xd5, 0xe6, 0x27, 0x7d, 0xe7, + 0x6c, 0xbd, 0x5f, 0xe3, 0xe6, 0x4d, 0x4b, 0xad, 0x3a, 0xe9, 0xf0, 0xa4, 0x9f, 0xc4, 0x70, 0x5e, + 0xfd, 0x93, 0x00, 0x00, 0x00, 0xff, 0xff, 0x95, 0x4a, 0x9c, 0x64, 0x72, 0xa8, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// ManagementServiceClient is the client API for ManagementService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type ManagementServiceClient interface { + //READINESS + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //USER + GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) + SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) + IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) + CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) + DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + //USER_PROFILE + GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) + UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) + ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) + ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) + UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + //MFA + GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //ORG + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) + DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) + AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) + ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) + UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) + DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) + SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) + AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) + AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) + ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) + UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) + DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) + RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) + UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) + DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //Grant + SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) +} + +type managementServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewManagementServiceClient(cc grpc.ClientConnInterface) ManagementServiceClient { + return &managementServiceClient{cc} +} + +func (c *managementServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) { + out := new(UserSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { + out := new(UniqueUserResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/LockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) { + out := new(OrgMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) { + out := new(OrgMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) { + out := new(ProjectSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) { + out := new(ProjectMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) { + out := new(ProjectMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) { + out := new(ProjectRoleSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { + out := new(ApplicationSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) { + out := new(OIDCConfig) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) { + out := new(ClientSecret) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) { + out := new(ProjectGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) { + out := new(ProjectGrantMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) { + out := new(ProjectGrantMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) { + out := new(AuthGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// ManagementServiceServer is the server API for ManagementService service. +type ManagementServiceServer interface { + //READINESS + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //USER + GetUserByID(context.Context, *UserID) (*User, error) + GetUserByEmailGlobal(context.Context, *UserEmailID) (*User, error) + SearchUsers(context.Context, *UserSearchRequest) (*UserSearchResponse, error) + IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) + CreateUser(context.Context, *CreateUserRequest) (*User, error) + DeactivateUser(context.Context, *UserID) (*User, error) + ReactivateUser(context.Context, *UserID) (*User, error) + LockUser(context.Context, *UserID) (*User, error) + UnlockUser(context.Context, *UserID) (*User, error) + DeleteUser(context.Context, *UserID) (*empty.Empty, error) + UserChanges(context.Context, *ChangeRequest) (*Changes, error) + ApplicationChanges(context.Context, *ChangeRequest) (*Changes, error) + OrgChanges(context.Context, *ChangeRequest) (*Changes, error) + ProjectChanges(context.Context, *ChangeRequest) (*Changes, error) + //USER_PROFILE + GetUserProfile(context.Context, *UserID) (*UserProfile, error) + UpdateUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(context.Context, *UserID) (*UserEmail, error) + ChangeUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(context.Context, *UserID) (*UserPhone, error) + ChangeUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + ResendPhoneVerificationCode(context.Context, *UserID) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(context.Context, *UserID) (*UserAddress, error) + UpdateUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + //MFA + GetUserMfas(context.Context, *UserID) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(context.Context, *SetPasswordNotificationRequest) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(context.Context, *empty.Empty) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyID) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(context.Context, *empty.Empty) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(context.Context, *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(context.Context, *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(context.Context, *PasswordAgePolicyID) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(context.Context, *empty.Empty) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyID) (*empty.Empty, error) + //ORG + GetOrgByID(context.Context, *OrgID) (*Org, error) + GetOrgByDomainGlobal(context.Context, *OrgDomain) (*Org, error) + DeactivateOrg(context.Context, *OrgID) (*Org, error) + ReactivateOrg(context.Context, *OrgID) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(context.Context, *empty.Empty) (*OrgMemberRoles, error) + AddOrgMember(context.Context, *AddOrgMemberRequest) (*empty.Empty, error) + ChangeOrgMember(context.Context, *ChangeOrgMemberRequest) (*empty.Empty, error) + RemoveOrgMember(context.Context, *RemoveOrgMemberRequest) (*empty.Empty, error) + SearchOrgMembers(context.Context, *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(context.Context, *ProjectSearchRequest) (*ProjectSearchResponse, error) + ProjectByID(context.Context, *ProjectID) (*Project, error) + CreateProject(context.Context, *ProjectCreateRequest) (*Project, error) + UpdateProject(context.Context, *ProjectUpdateRequest) (*Project, error) + DeactivateProject(context.Context, *ProjectID) (*Project, error) + ReactivateProject(context.Context, *ProjectID) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(context.Context, *GrantedGrantID) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(context.Context, *empty.Empty) (*ProjectMemberRoles, error) + SearchProjectMembers(context.Context, *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) + AddProjectMember(context.Context, *ProjectMemberAdd) (*empty.Empty, error) + ChangeProjectMember(context.Context, *ProjectMemberChange) (*empty.Empty, error) + RemoveProjectMember(context.Context, *ProjectMemberRemove) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(context.Context, *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) + AddProjectRole(context.Context, *ProjectRoleAdd) (*empty.Empty, error) + RemoveProjectRole(context.Context, *ProjectRoleRemove) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) + ApplicationByID(context.Context, *ApplicationID) (*Application, error) + CreateOIDCApplication(context.Context, *OIDCApplicationCreate) (*Application, error) + UpdateApplication(context.Context, *ApplicationUpdate) (*Application, error) + DeactivateApplication(context.Context, *ApplicationID) (*Application, error) + ReactivateApplication(context.Context, *ApplicationID) (*Application, error) + UpdateApplicationOIDCConfig(context.Context, *OIDCConfigUpdate) (*OIDCConfig, error) + RegenerateOIDCClientSecret(context.Context, *ApplicationID) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(context.Context, *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(context.Context, *ProjectGrantID) (*ProjectGrant, error) + CreateProjectGrant(context.Context, *ProjectGrantCreate) (*ProjectGrant, error) + UpdateProjectGrant(context.Context, *ProjectGrantUpdate) (*ProjectGrant, error) + DeactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + ReactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(context.Context, *empty.Empty) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(context.Context, *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(context.Context, *ProjectGrantMemberAdd) (*empty.Empty, error) + ChangeProjectGrantMember(context.Context, *ProjectGrantMemberChange) (*empty.Empty, error) + RemoveProjectGrantMember(context.Context, *ProjectGrantMemberRemove) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(context.Context, *UserGrantSearchRequest) (*UserGrantSearchResponse, error) + UserGrantByID(context.Context, *UserGrantID) (*UserGrant, error) + CreateUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateUserGrant(context.Context, *UserGrantUpdate) (*UserGrant, error) + DeactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + ReactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(context.Context, *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(context.Context, *ProjectUserGrantID) (*UserGrant, error) + CreateProjectUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateProjectUserGrant(context.Context, *ProjectUserGrantUpdate) (*UserGrant, error) + DeactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + ReactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(context.Context, *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + CreateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantCreate) (*UserGrant, error) + UpdateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantUpdate) (*UserGrant, error) + DeactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + ReactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + //Grant + SearchAuthGrant(context.Context, *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) +} + +// UnimplementedManagementServiceServer can be embedded to have forward compatible implementations. +type UnimplementedManagementServiceServer struct { +} + +func (*UnimplementedManagementServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedManagementServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedManagementServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByEmailGlobal(ctx context.Context, req *UserEmailID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByEmailGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUsers(ctx context.Context, req *UserSearchRequest) (*UserSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUsers not implemented") +} +func (*UnimplementedManagementServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUser(ctx context.Context, req *CreateUserRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) LockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method LockUser not implemented") +} +func (*UnimplementedManagementServiceServer) UnlockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method UnlockUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeleteUser(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeleteUser not implemented") +} +func (*UnimplementedManagementServiceServer) UserChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationChanges not implemented") +} +func (*UnimplementedManagementServiceServer) OrgChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method OrgChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectChanges not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserProfile(ctx context.Context, req *UserID) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserEmail(ctx context.Context, req *UserID) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserPhone(ctx context.Context, req *UserID) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ResendPhoneVerificationCode(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendPhoneVerificationCode not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserAddress(ctx context.Context, req *UserID) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserMfas(ctx context.Context, req *UserID) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserMfas not implemented") +} +func (*UnimplementedManagementServiceServer) SendSetPasswordNotification(ctx context.Context, req *SetPasswordNotificationRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SendSetPasswordNotification not implemented") +} +func (*UnimplementedManagementServiceServer) SetInitialPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetInitialPassword not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordComplexityPolicy(ctx context.Context, req *empty.Empty) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordAgePolicy(ctx context.Context, req *empty.Empty) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordLockoutPolicy(ctx context.Context, req *empty.Empty) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByDomainGlobal(ctx context.Context, req *OrgDomain) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByDomainGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgMemberRoles(ctx context.Context, req *empty.Empty) (*OrgMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddOrgMember(ctx context.Context, req *AddOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeOrgMember(ctx context.Context, req *ChangeOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveOrgMember(ctx context.Context, req *RemoveOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchOrgMembers(ctx context.Context, req *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgMembers not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjects(ctx context.Context, req *ProjectSearchRequest) (*ProjectSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjects not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectByID(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProject(ctx context.Context, req *ProjectCreateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProject not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProject(ctx context.Context, req *ProjectUpdateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProject not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) GetGrantedProjectGrantByID(ctx context.Context, req *GrantedGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetGrantedProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectMembers(ctx context.Context, req *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectMember(ctx context.Context, req *ProjectMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectMember(ctx context.Context, req *ProjectMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectMember(ctx context.Context, req *ProjectMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectRoles(ctx context.Context, req *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectRole(ctx context.Context, req *ProjectRoleAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectRole(ctx context.Context, req *ProjectRoleRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateOIDCApplication(ctx context.Context, req *OIDCApplicationCreate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateOIDCApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplication(ctx context.Context, req *ApplicationUpdate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplicationOIDCConfig(ctx context.Context, req *OIDCConfigUpdate) (*OIDCConfig, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplicationOIDCConfig not implemented") +} +func (*UnimplementedManagementServiceServer) RegenerateOIDCClientSecret(ctx context.Context, req *ApplicationID) (*ClientSecret, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegenerateOIDCClientSecret not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrants(ctx context.Context, req *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantByID(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrant(ctx context.Context, req *ProjectGrantCreate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrant(ctx context.Context, req *ProjectGrantUpdate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectGrantMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectGrantMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectGrantMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantMembers(ctx context.Context, req *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectGrantMember(ctx context.Context, req *ProjectGrantMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectGrantMember(ctx context.Context, req *ProjectGrantMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectGrantMember(ctx context.Context, req *ProjectGrantMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUserGrants(ctx context.Context, req *UserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) UserGrantByID(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserGrant(ctx context.Context, req *UserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectUserGrants(ctx context.Context, req *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectUserGrantByID(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectUserGrant(ctx context.Context, req *ProjectUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantUserGrants(ctx context.Context, req *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantUserGrantByID(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchAuthGrant(ctx context.Context, req *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchAuthGrant not implemented") +} + +func RegisterManagementServiceServer(s *grpc.Server, srv ManagementServiceServer) { + s.RegisterService(&_ManagementService_serviceDesc, srv) +} + +func _ManagementService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByID(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByEmailGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserEmailID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, req.(*UserEmailID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUsers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUsers(ctx, req.(*UserSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).IsUserUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUser(ctx, req.(*CreateUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_LockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).LockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/LockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).LockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UnlockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UnlockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UnlockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeleteUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeleteUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeleteUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_OrgChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).OrgChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).OrgChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserProfile(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserEmail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserPhone(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserAddress(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserMfas(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SendSetPasswordNotification_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SetPasswordNotificationRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, req.(*SetPasswordNotificationRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SetInitialPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, req.(*PasswordAgePolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByDomainGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgDomain) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, req.(*OrgDomain)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AddOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddOrgMember(ctx, req.(*AddOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, req.(*ChangeOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RemoveOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, req.(*RemoveOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchOrgMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, req.(*OrgMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjects_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjects(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjects(ctx, req.(*ProjectSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectByID(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectCreateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProject(ctx, req.(*ProjectCreateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUpdateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProject(ctx, req.(*ProjectUpdateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetGrantedProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(GrantedGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, req.(*GrantedGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, req.(*ProjectMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectMember(ctx, req.(*ProjectMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, req.(*ProjectMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, req.(*ProjectMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, req.(*ProjectRoleSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectRole(ctx, req.(*ProjectRoleAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, req.(*ProjectRoleRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchApplications(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationByID(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateOIDCApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCApplicationCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, req.(*OIDCApplicationCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplication(ctx, req.(*ApplicationUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplicationOIDCConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCConfigUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, req.(*OIDCConfigUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RegenerateOIDCClientSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, req.(*ProjectGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, req.(*ProjectGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, req.(*ProjectGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectGrantMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, req.(*ProjectGrantMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, req.(*ProjectGrantMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, req.(*ProjectGrantMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, req.(*ProjectGrantMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, req.(*UserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserGrantByID(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, req.(*UserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, req.(*ProjectUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, req.(*ProjectUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, req.(*ProjectGrantUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchAuthGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, req.(*AuthGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _ManagementService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "caos.zitadel.management.api.v1.ManagementService", + HandlerType: (*ManagementServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _ManagementService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _ManagementService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _ManagementService_Validate_Handler, + }, + { + MethodName: "GetUserByID", + Handler: _ManagementService_GetUserByID_Handler, + }, + { + MethodName: "GetUserByEmailGlobal", + Handler: _ManagementService_GetUserByEmailGlobal_Handler, + }, + { + MethodName: "SearchUsers", + Handler: _ManagementService_SearchUsers_Handler, + }, + { + MethodName: "IsUserUnique", + Handler: _ManagementService_IsUserUnique_Handler, + }, + { + MethodName: "CreateUser", + Handler: _ManagementService_CreateUser_Handler, + }, + { + MethodName: "DeactivateUser", + Handler: _ManagementService_DeactivateUser_Handler, + }, + { + MethodName: "ReactivateUser", + Handler: _ManagementService_ReactivateUser_Handler, + }, + { + MethodName: "LockUser", + Handler: _ManagementService_LockUser_Handler, + }, + { + MethodName: "UnlockUser", + Handler: _ManagementService_UnlockUser_Handler, + }, + { + MethodName: "DeleteUser", + Handler: _ManagementService_DeleteUser_Handler, + }, + { + MethodName: "UserChanges", + Handler: _ManagementService_UserChanges_Handler, + }, + { + MethodName: "ApplicationChanges", + Handler: _ManagementService_ApplicationChanges_Handler, + }, + { + MethodName: "OrgChanges", + Handler: _ManagementService_OrgChanges_Handler, + }, + { + MethodName: "ProjectChanges", + Handler: _ManagementService_ProjectChanges_Handler, + }, + { + MethodName: "GetUserProfile", + Handler: _ManagementService_GetUserProfile_Handler, + }, + { + MethodName: "UpdateUserProfile", + Handler: _ManagementService_UpdateUserProfile_Handler, + }, + { + MethodName: "GetUserEmail", + Handler: _ManagementService_GetUserEmail_Handler, + }, + { + MethodName: "ChangeUserEmail", + Handler: _ManagementService_ChangeUserEmail_Handler, + }, + { + MethodName: "ResendEmailVerificationMail", + Handler: _ManagementService_ResendEmailVerificationMail_Handler, + }, + { + MethodName: "GetUserPhone", + Handler: _ManagementService_GetUserPhone_Handler, + }, + { + MethodName: "ChangeUserPhone", + Handler: _ManagementService_ChangeUserPhone_Handler, + }, + { + MethodName: "ResendPhoneVerificationCode", + Handler: _ManagementService_ResendPhoneVerificationCode_Handler, + }, + { + MethodName: "GetUserAddress", + Handler: _ManagementService_GetUserAddress_Handler, + }, + { + MethodName: "UpdateUserAddress", + Handler: _ManagementService_UpdateUserAddress_Handler, + }, + { + MethodName: "GetUserMfas", + Handler: _ManagementService_GetUserMfas_Handler, + }, + { + MethodName: "SendSetPasswordNotification", + Handler: _ManagementService_SendSetPasswordNotification_Handler, + }, + { + MethodName: "SetInitialPassword", + Handler: _ManagementService_SetInitialPassword_Handler, + }, + { + MethodName: "GetPasswordComplexityPolicy", + Handler: _ManagementService_GetPasswordComplexityPolicy_Handler, + }, + { + MethodName: "CreatePasswordComplexityPolicy", + Handler: _ManagementService_CreatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "UpdatePasswordComplexityPolicy", + Handler: _ManagementService_UpdatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "DeletePasswordComplexityPolicy", + Handler: _ManagementService_DeletePasswordComplexityPolicy_Handler, + }, + { + MethodName: "GetPasswordAgePolicy", + Handler: _ManagementService_GetPasswordAgePolicy_Handler, + }, + { + MethodName: "CreatePasswordAgePolicy", + Handler: _ManagementService_CreatePasswordAgePolicy_Handler, + }, + { + MethodName: "UpdatePasswordAgePolicy", + Handler: _ManagementService_UpdatePasswordAgePolicy_Handler, + }, + { + MethodName: "DeletePasswordAgePolicy", + Handler: _ManagementService_DeletePasswordAgePolicy_Handler, + }, + { + MethodName: "GetPasswordLockoutPolicy", + Handler: _ManagementService_GetPasswordLockoutPolicy_Handler, + }, + { + MethodName: "CreatePasswordLockoutPolicy", + Handler: _ManagementService_CreatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "UpdatePasswordLockoutPolicy", + Handler: _ManagementService_UpdatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "DeletePasswordLockoutPolicy", + Handler: _ManagementService_DeletePasswordLockoutPolicy_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _ManagementService_GetOrgByID_Handler, + }, + { + MethodName: "GetOrgByDomainGlobal", + Handler: _ManagementService_GetOrgByDomainGlobal_Handler, + }, + { + MethodName: "DeactivateOrg", + Handler: _ManagementService_DeactivateOrg_Handler, + }, + { + MethodName: "ReactivateOrg", + Handler: _ManagementService_ReactivateOrg_Handler, + }, + { + MethodName: "GetOrgMemberRoles", + Handler: _ManagementService_GetOrgMemberRoles_Handler, + }, + { + MethodName: "AddOrgMember", + Handler: _ManagementService_AddOrgMember_Handler, + }, + { + MethodName: "ChangeOrgMember", + Handler: _ManagementService_ChangeOrgMember_Handler, + }, + { + MethodName: "RemoveOrgMember", + Handler: _ManagementService_RemoveOrgMember_Handler, + }, + { + MethodName: "SearchOrgMembers", + Handler: _ManagementService_SearchOrgMembers_Handler, + }, + { + MethodName: "SearchProjects", + Handler: _ManagementService_SearchProjects_Handler, + }, + { + MethodName: "ProjectByID", + Handler: _ManagementService_ProjectByID_Handler, + }, + { + MethodName: "CreateProject", + Handler: _ManagementService_CreateProject_Handler, + }, + { + MethodName: "UpdateProject", + Handler: _ManagementService_UpdateProject_Handler, + }, + { + MethodName: "DeactivateProject", + Handler: _ManagementService_DeactivateProject_Handler, + }, + { + MethodName: "ReactivateProject", + Handler: _ManagementService_ReactivateProject_Handler, + }, + { + MethodName: "GetGrantedProjectGrantByID", + Handler: _ManagementService_GetGrantedProjectGrantByID_Handler, + }, + { + MethodName: "GetProjectMemberRoles", + Handler: _ManagementService_GetProjectMemberRoles_Handler, + }, + { + MethodName: "SearchProjectMembers", + Handler: _ManagementService_SearchProjectMembers_Handler, + }, + { + MethodName: "AddProjectMember", + Handler: _ManagementService_AddProjectMember_Handler, + }, + { + MethodName: "ChangeProjectMember", + Handler: _ManagementService_ChangeProjectMember_Handler, + }, + { + MethodName: "RemoveProjectMember", + Handler: _ManagementService_RemoveProjectMember_Handler, + }, + { + MethodName: "SearchProjectRoles", + Handler: _ManagementService_SearchProjectRoles_Handler, + }, + { + MethodName: "AddProjectRole", + Handler: _ManagementService_AddProjectRole_Handler, + }, + { + MethodName: "RemoveProjectRole", + Handler: _ManagementService_RemoveProjectRole_Handler, + }, + { + MethodName: "SearchApplications", + Handler: _ManagementService_SearchApplications_Handler, + }, + { + MethodName: "ApplicationByID", + Handler: _ManagementService_ApplicationByID_Handler, + }, + { + MethodName: "CreateOIDCApplication", + Handler: _ManagementService_CreateOIDCApplication_Handler, + }, + { + MethodName: "UpdateApplication", + Handler: _ManagementService_UpdateApplication_Handler, + }, + { + MethodName: "DeactivateApplication", + Handler: _ManagementService_DeactivateApplication_Handler, + }, + { + MethodName: "ReactivateApplication", + Handler: _ManagementService_ReactivateApplication_Handler, + }, + { + MethodName: "UpdateApplicationOIDCConfig", + Handler: _ManagementService_UpdateApplicationOIDCConfig_Handler, + }, + { + MethodName: "RegenerateOIDCClientSecret", + Handler: _ManagementService_RegenerateOIDCClientSecret_Handler, + }, + { + MethodName: "SearchProjectGrants", + Handler: _ManagementService_SearchProjectGrants_Handler, + }, + { + MethodName: "ProjectGrantByID", + Handler: _ManagementService_ProjectGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrant", + Handler: _ManagementService_CreateProjectGrant_Handler, + }, + { + MethodName: "UpdateProjectGrant", + Handler: _ManagementService_UpdateProjectGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrant", + Handler: _ManagementService_DeactivateProjectGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrant", + Handler: _ManagementService_ReactivateProjectGrant_Handler, + }, + { + MethodName: "GetProjectGrantMemberRoles", + Handler: _ManagementService_GetProjectGrantMemberRoles_Handler, + }, + { + MethodName: "SearchProjectGrantMembers", + Handler: _ManagementService_SearchProjectGrantMembers_Handler, + }, + { + MethodName: "AddProjectGrantMember", + Handler: _ManagementService_AddProjectGrantMember_Handler, + }, + { + MethodName: "ChangeProjectGrantMember", + Handler: _ManagementService_ChangeProjectGrantMember_Handler, + }, + { + MethodName: "RemoveProjectGrantMember", + Handler: _ManagementService_RemoveProjectGrantMember_Handler, + }, + { + MethodName: "SearchUserGrants", + Handler: _ManagementService_SearchUserGrants_Handler, + }, + { + MethodName: "UserGrantByID", + Handler: _ManagementService_UserGrantByID_Handler, + }, + { + MethodName: "CreateUserGrant", + Handler: _ManagementService_CreateUserGrant_Handler, + }, + { + MethodName: "UpdateUserGrant", + Handler: _ManagementService_UpdateUserGrant_Handler, + }, + { + MethodName: "DeactivateUserGrant", + Handler: _ManagementService_DeactivateUserGrant_Handler, + }, + { + MethodName: "ReactivateUserGrant", + Handler: _ManagementService_ReactivateUserGrant_Handler, + }, + { + MethodName: "SearchProjectUserGrants", + Handler: _ManagementService_SearchProjectUserGrants_Handler, + }, + { + MethodName: "ProjectUserGrantByID", + Handler: _ManagementService_ProjectUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectUserGrant", + Handler: _ManagementService_CreateProjectUserGrant_Handler, + }, + { + MethodName: "UpdateProjectUserGrant", + Handler: _ManagementService_UpdateProjectUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectUserGrant", + Handler: _ManagementService_DeactivateProjectUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectUserGrant", + Handler: _ManagementService_ReactivateProjectUserGrant_Handler, + }, + { + MethodName: "SearchProjectGrantUserGrants", + Handler: _ManagementService_SearchProjectGrantUserGrants_Handler, + }, + { + MethodName: "ProjectGrantUserGrantByID", + Handler: _ManagementService_ProjectGrantUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrantUserGrant", + Handler: _ManagementService_CreateProjectGrantUserGrant_Handler, + }, + { + MethodName: "UpdateProjectGrantUserGrant", + Handler: _ManagementService_UpdateProjectGrantUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrantUserGrant", + Handler: _ManagementService_DeactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrantUserGrant", + Handler: _ManagementService_ReactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "SearchAuthGrant", + Handler: _ManagementService_SearchAuthGrant_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "management.proto", +} diff --git a/pkg/management/api/grpc/management.pb.gw.go b/pkg/management/api/grpc/management.pb.gw.go new file mode 100644 index 0000000000..8ac730cbf5 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.gw.go @@ -0,0 +1,6078 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: management.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_ManagementService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByEmailGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserEmailID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["email"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "email") + } + + protoReq.Email, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "email", err) + } + + msg, err := client.GetUserByEmailGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUsers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_ManagementService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueUserRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_IsUserUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_LockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.LockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UnlockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UnlockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeleteUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_UserChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_UserChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_UserChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UserChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ApplicationChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ApplicationChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ApplicationChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ApplicationChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_OrgChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_OrgChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_OrgChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.OrgChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ProjectChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ProjectChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ProjectChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ProjectChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserMfas_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SendSetPasswordNotification_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SetPasswordNotificationRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SendSetPasswordNotification(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SetInitialPassword_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SetInitialPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByDomainGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgDomain + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["domain"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "domain") + } + + protoReq.Domain, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "domain", err) + } + + msg, err := client.GetOrgByDomainGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetOrgMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AddOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.AddOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RemoveOrgMemberRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchOrgMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.SearchOrgMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjects_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchProjects(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectCreateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUpdateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetGrantedProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq GrantedGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetGrantedProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["name"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "name") + } + + protoReq.Name, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "name", err) + } + + msg, err := client.RemoveProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateOIDCApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCApplicationCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateOIDCApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplicationOIDCConfig_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCConfigUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["application_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "application_id") + } + + protoReq.ApplicationId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "application_id", err) + } + + msg, err := client.UpdateApplicationOIDCConfig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RegenerateOIDCClientSecret_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.RegenerateOIDCClientSecret(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectGrantMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectGrantMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.SearchProjectGrantMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.AddProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + msg, err := client.SearchProjectGrantUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchAuthGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchAuthGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterManagementServiceHandlerFromEndpoint is same as RegisterManagementServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterManagementServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterManagementServiceHandler(ctx, mux, conn) +} + +// RegisterManagementServiceHandler registers the http handlers for service ManagementService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterManagementServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterManagementServiceHandlerClient(ctx, mux, NewManagementServiceClient(conn)) +} + +// RegisterManagementServiceHandlerClient registers the http handlers for service ManagementService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "ManagementServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ManagementServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "ManagementServiceClient" to call the correct interceptors. +func RegisterManagementServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client ManagementServiceClient) error { + + mux.Handle("GET", pattern_ManagementService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByEmailGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByEmailGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByEmailGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUsers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUsers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_LockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_LockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_LockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UnlockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UnlockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UnlockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeleteUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeleteUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_OrgChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_OrgChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_OrgChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SendSetPasswordNotification_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SendSetPasswordNotification_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SendSetPasswordNotification_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SetInitialPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SetInitialPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SetInitialPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByDomainGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByDomainGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByDomainGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchOrgMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchOrgMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchOrgMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjects_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjects_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetGrantedProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetGrantedProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetGrantedProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateOIDCApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateOIDCApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateOIDCApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplicationOIDCConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplicationOIDCConfig_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplicationOIDCConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_RegenerateOIDCClientSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RegenerateOIDCClientSecret_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RegenerateOIDCClientSecret_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectGrantMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectGrantMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectGrantMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchAuthGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchAuthGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchAuthGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_ManagementService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_ManagementService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_ManagementService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_ManagementService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_GetUserByEmailGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "users", "email"}, "")) + + pattern_ManagementService_SearchUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_search"}, "")) + + pattern_ManagementService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) + + pattern_ManagementService_CreateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"users"}, "")) + + pattern_ManagementService_DeactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_reactivate"}, "")) + + pattern_ManagementService_LockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_lock"}, "")) + + pattern_ManagementService_UnlockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_unlock"}, "")) + + pattern_ManagementService_DeleteUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_UserChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "changes"}, "")) + + pattern_ManagementService_ApplicationChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"applications", "id", "changes"}, "")) + + pattern_ManagementService_OrgChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "changes"}, "")) + + pattern_ManagementService_ProjectChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "changes"}, "")) + + pattern_ManagementService_GetUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_UpdateUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_GetUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ChangeUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) + + pattern_ManagementService_GetUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ChangeUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ResendPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "phone", "_resendverification"}, "")) + + pattern_ManagementService_GetUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_UpdateUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_GetUserMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "mfas"}, "")) + + pattern_ManagementService_SendSetPasswordNotification_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_sendsetpwnotify"}, "")) + + pattern_ManagementService_SetInitialPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_setinitialpw"}, "")) + + pattern_ManagementService_GetPasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_GetPasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_CreatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_UpdatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_DeletePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_GetPasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_ManagementService_GetOrgByDomainGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "orgs", "domain"}, "")) + + pattern_ManagementService_DeactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetOrgMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"orgs", "members", "roles"}, "")) + + pattern_ManagementService_AddOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "org_id", "members"}, "")) + + pattern_ManagementService_ChangeOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchOrgMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"orgs", "org_id", "members", "_search"}, "")) + + pattern_ManagementService_SearchProjects_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"projects", "_search"}, "")) + + pattern_ManagementService_ProjectByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_CreateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"projects"}, "")) + + pattern_ManagementService_UpdateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_DeactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetGrantedProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"grants", "id"}, "")) + + pattern_ManagementService_GetProjectMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"projects", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "members"}, "")) + + pattern_ManagementService_ChangeProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchProjectRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "roles", "_search"}, "")) + + pattern_ManagementService_AddProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "roles"}, "")) + + pattern_ManagementService_RemoveProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "roles", "name"}, "")) + + pattern_ManagementService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "applications", "_search"}, "")) + + pattern_ManagementService_ApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_CreateOIDCApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "oidcapplications"}, "")) + + pattern_ManagementService_UpdateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_DeactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_reactivate"}, "")) + + pattern_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "application_id", "oidcconfig"}, "")) + + pattern_ManagementService_RegenerateOIDCClientSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "applications", "id", "oidcconfig", "_changeclientsecret"}, "")) + + pattern_ManagementService_SearchProjectGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetProjectGrantMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"projects", "grants", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectGrantMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "grant_id", "members"}, "")) + + pattern_ManagementService_ChangeProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "grants", "_search"}, "")) + + pattern_ManagementService_UserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projects", "project_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectGrantUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchAuthGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"authgrants", "_search"}, "")) +) + +var ( + forward_ManagementService_Healthz_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Ready_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Validate_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByEmailGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUsers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_IsUserUnique_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_LockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UnlockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeleteUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_OrgChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserMfas_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SendSetPasswordNotification_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SetInitialPassword_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByDomainGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchOrgMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjects_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetGrantedProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchApplications_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateOIDCApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RegenerateOIDCClientSecret_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectGrantMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchAuthGrant_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json new file mode 100644 index 0000000000..57adde4771 --- /dev/null +++ b/pkg/management/api/grpc/management.swagger.json @@ -0,0 +1,5657 @@ +{ + "swagger": "2.0", + "info": { + "title": "Management API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/management" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/{id}/changes": { + "get": { + "operationId": "ApplicationChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/authgrants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchAuthGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/orgs/domain/{domain}": { + "get": { + "operationId": "GetOrgByDomainGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "domain", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/users/email/{email}": { + "get": { + "operationId": "GetUserByEmailGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "email", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/grants/{id}": { + "get": { + "summary": "GRANTED_PROJECT_GRANTS", + "operationId": "GetGrantedProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/healthz": { + "get": { + "summary": "READINESS", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/members/roles": { + "get": { + "summary": "ORG_MEMBERS", + "operationId": "GetOrgMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}": { + "get": { + "summary": "ORG", + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_deactivate": { + "put": { + "operationId": "DeactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_reactivate": { + "put": { + "operationId": "ReactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/changes": { + "get": { + "operationId": "OrgChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members": { + "post": { + "operationId": "AddOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AddOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/_search": { + "post": { + "operationId": "SearchOrgMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ChangeOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age": { + "get": { + "summary": "PASSWORD_AGE_POLICY", + "operationId": "GetPasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age/{id}": { + "delete": { + "operationId": "DeletePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity": { + "get": { + "summary": "PASSWORD_COMPLEXITY_POLICY", + "operationId": "GetPasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity/{id}": { + "delete": { + "operationId": "DeletePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout": { + "get": { + "summary": "PASSWORD_LOCKOUT_POLICY", + "operationId": "GetPasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout/{id}": { + "delete": { + "operationId": "DeletePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_GRANT_USER_GRANT", + "operationId": "SearchProjectGrantUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects": { + "post": { + "operationId": "CreateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectCreateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/_search": { + "post": { + "summary": "PROJECTS", + "operationId": "SearchProjects", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/grants/members/roles": { + "get": { + "summary": "PROJECT_GRANT_MEMBER", + "operationId": "GetProjectGrantMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/members/roles": { + "get": { + "summary": "PROJECT_MEMBERS", + "operationId": "GetProjectMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}": { + "get": { + "operationId": "ProjectByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUpdateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/changes": { + "get": { + "operationId": "ProjectChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members": { + "post": { + "operationId": "AddProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles": { + "post": { + "operationId": "AddProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles/{name}": { + "delete": { + "operationId": "RemoveProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "name", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/_search": { + "post": { + "summary": "APPLICATIONS", + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{application_id}/oidcconfig": { + "put": { + "operationId": "UpdateApplicationOIDCConfig", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "application_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCConfigUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}": { + "get": { + "operationId": "ApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_deactivate": { + "put": { + "operationId": "DeactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_reactivate": { + "put": { + "operationId": "ReactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret": { + "put": { + "operationId": "RegenerateOIDCClientSecret", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ClientSecret" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants": { + "post": { + "operationId": "CreateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/_search": { + "post": { + "summary": "PROJECT_GRANT", + "operationId": "SearchProjectGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members": { + "post": { + "operationId": "AddProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/_search": { + "post": { + "operationId": "SearchProjectGrantMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/members/_search": { + "post": { + "operationId": "SearchProjectMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/oidcapplications": { + "post": { + "operationId": "CreateOIDCApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCApplicationCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/roles/_search": { + "post": { + "summary": "PROJECT_ROLES", + "operationId": "SearchProjectRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_USER_GRANT", + "operationId": "SearchProjectUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/users": { + "post": { + "operationId": "CreateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateUserRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_isunique": { + "get": { + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_search": { + "post": { + "operationId": "SearchUsers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/grants/_search": { + "post": { + "summary": "USER_GRANT", + "operationId": "SearchUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "USER", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "delete": { + "operationId": "DeleteUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_lock": { + "put": { + "operationId": "LockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_sendsetpwnotify": { + "post": { + "summary": "PASSWORD\nSends an Notification (Email/SMS) with a password reset Link", + "operationId": "SendSetPasswordNotification", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SetPasswordNotificationRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_setinitialpw": { + "post": { + "summary": "A Manager is only allowed to set an initial password, on the next login the user has to change his password", + "operationId": "SetInitialPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_unlock": { + "put": { + "operationId": "UnlockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/address": { + "get": { + "summary": "USER_ADDRESS", + "operationId": "GetUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/changes": { + "get": { + "operationId": "UserChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email": { + "get": { + "summary": "USER_EMAIL", + "operationId": "GetUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/mfas": { + "get": { + "summary": "MFA", + "operationId": "GetUserMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone": { + "get": { + "summary": "USER_PHONE", + "operationId": "GetUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone/_resendverification": { + "post": { + "operationId": "ResendPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/profile": { + "get": { + "summary": "USER_PROFILE", + "operationId": "GetUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants": { + "post": { + "operationId": "CreateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}": { + "get": { + "operationId": "UserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "ManagementService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AddOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationID": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSERACHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_NAME" + ], + "default": "APPLICATIONSERACHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1ApplicationUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1AuthGrant": { + "type": "object", + "properties": { + "orgId": { + "type": "string" + }, + "projectId": { + "type": "string" + }, + "userId": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AuthGrantSearchKey": { + "type": "string", + "enum": [ + "AUTHGRANTSEARCHKEY_UNSPECIFIED", + "AUTHGRANTSEARCHKEY_ORG_ID", + "AUTHGRANTSEARCHKEY_PROJECT_ID", + "AUTHGRANTSEARCHKEY_USER_ID" + ], + "default": "AUTHGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1AuthGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1AuthGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrantSearchQuery" + } + } + } + }, + "v1AuthGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrant" + } + } + } + }, + "v1Change": { + "type": "object", + "properties": { + "change_date": { + "type": "string", + "format": "date-time" + }, + "event_type": { + "type": "string" + }, + "sequence": { + "type": "string", + "format": "uint64" + }, + "modifier": { + "type": "string" + }, + "data": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "v1ChangeOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1Changes": { + "type": "object", + "properties": { + "changes": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Change" + } + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ClientSecret": { + "type": "object", + "properties": { + "client_secret": { + "type": "string" + } + } + }, + "v1CreateUserRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCConfigUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "application_id": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_IMPLICIT", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1OrgMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1OrgMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OrgMemberSearchKey": { + "type": "string", + "enum": [ + "ORGMEMBERSEARCHKEY_UNSPECIFIED", + "ORGMEMBERSEARCHKEY_FIRST_NAME", + "ORGMEMBERSEARCHKEY_LAST_NAME", + "ORGMEMBERSEARCHKEY_EMAIL", + "ORGMEMBERSEARCHKEY_USER_ID" + ], + "default": "ORGMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1OrgMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgMemberSearchRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMemberSearchQuery" + } + } + } + }, + "v1OrgMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMember" + } + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1PasswordAgePolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordComplexityPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1PolicyState": { + "type": "string", + "enum": [ + "POLICYSTATE_UNSPECIFIED", + "POLICYSTATE_ACTIVE", + "POLICYSTATE_INACTIVE", + "POLICYSTATE_DELETED" + ], + "default": "POLICYSTATE_UNSPECIFIED" + }, + "v1Project": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1ProjectState" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "type": { + "$ref": "#/definitions/v1ProjectType" + }, + "resource_owner": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "grant_id": { + "type": "string" + } + } + }, + "v1ProjectCreateRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + } + } + }, + "v1ProjectGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "granted_org_name": { + "type": "string" + }, + "granted_org_domain": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1ProjectGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "project_name": { + "type": "string" + } + } + }, + "v1ProjectGrantCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectGrantMemberAdd": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberChange": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectGrantMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectGrantMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchQuery" + } + } + } + }, + "v1ProjectGrantMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMember" + } + } + } + }, + "v1ProjectGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ProjectGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + } + }, + "v1ProjectGrantState": { + "type": "string", + "enum": [ + "PROJECTGRANTSTATE_UNSPECIFIED", + "PROJECTGRANTSTATE_ACTIVE", + "PROJECTGRANTSTATE_INACTIVE" + ], + "default": "PROJECTGRANTSTATE_UNSPECIFIED" + }, + "v1ProjectGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_grant_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantID": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectGrantUserGrantUpdate": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1ProjectMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectMemberAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberChange": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTMEMBERSEARCHKEY_EMAIL", + "PROJECTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMemberSearchQuery" + } + } + } + }, + "v1ProjectMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMember" + } + } + } + }, + "v1ProjectRole": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchKey": { + "type": "string", + "enum": [ + "PROJECTROLESEARCHKEY_UNSPECIFIED", + "PROJECTROLESEARCHKEY_NAME", + "PROJECTROLESEARCHKEY_DISPLAY_NAME" + ], + "default": "PROJECTROLESEARCHKEY_UNSPECIFIED" + }, + "v1ProjectRoleSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectRoleSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRoleSearchQuery" + } + } + } + }, + "v1ProjectRoleSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRole" + } + } + } + }, + "v1ProjectSearchKey": { + "type": "string", + "enum": [ + "PROJECTSEARCHKEY_UNSPECIFIED", + "PROJECTSEARCHKEY_PROJECT_NAME" + ], + "default": "PROJECTSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectSearchQuery" + } + } + } + }, + "v1ProjectSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Project" + } + } + } + }, + "v1ProjectState": { + "type": "string", + "enum": [ + "PROJECTSTATE_UNSPECIFIED", + "PROJECTSTATE_ACTIVE", + "PROJECTSSTATE_INACTIVE" + ], + "default": "PROJECTSTATE_UNSPECIFIED" + }, + "v1ProjectType": { + "type": "string", + "enum": [ + "PROJECTTYPE_UNKNOWN", + "PROJECTTYPE_SELF", + "PROJECTTYPE_GRANTED" + ], + "default": "PROJECTTYPE_UNKNOWN" + }, + "v1ProjectUpdateRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1ProjectUserGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectUserGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SetPasswordNotificationRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1UserGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "project_name": { + "type": "string" + } + } + }, + "v1UserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserGrantID": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1UserGrantSearchKey": { + "type": "string", + "enum": [ + "USERGRANTSEARCHKEY_UNSPECIFIED", + "USERGRANTSEARCHKEY_PROJECT_ID", + "USERGRANTSEARCHKEY_USER_ID", + "USERGRANTSEARCHKEY_ORG_ID" + ], + "default": "USERGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1UserGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1UserGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrant" + } + } + } + }, + "v1UserGrantState": { + "type": "string", + "enum": [ + "USERGRANTSTATE_UNSPECIFIED", + "USERGRANTSTATE_ACTIVE", + "USERGRANTSTATE_INACTIVE" + ], + "default": "USERGRANTSTATE_UNSPECIFIED" + }, + "v1UserGrantUpdate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSearchKey": { + "type": "string", + "enum": [ + "USERSEARCHKEY_UNSPECIFIED", + "USERSEARCHKEY_USER_NAME", + "USERSEARCHKEY_FIRST_NAME", + "USERSEARCHKEY_LAST_NAME", + "USERSEARCHKEY_NICK_NAME", + "USERSEARCHKEY_DISPLAY_NAME", + "USERSEARCHKEY_EMAIL", + "USERSEARCHKEY_STATE" + ], + "default": "USERSEARCHKEY_UNSPECIFIED" + }, + "v1UserSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSearchQuery" + } + } + } + }, + "v1UserSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1User" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/management/api/proto/management.proto b/pkg/management/api/proto/management.proto index b9d3854c99..8fe7c857e4 100644 --- a/pkg/management/api/proto/management.proto +++ b/pkg/management/api/proto/management.proto @@ -11,14 +11,14 @@ import "authoption/options.proto"; package caos.zitadel.management.api.v1; -option go_package = "github.com/caos/zitadel/management/api/grpc"; +option go_package = "github.com/caos/zitadel/pkg/management/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Management API"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/management" + url: "https://github.com/caos/zitadel/pkg/management" }; }; From 46c3289ee306341eea63d8b0049cb18070566571 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 07:09:28 +0100 Subject: [PATCH 07/19] fix: add server --- pkg/admin/api/grpc/org.go | 22 ++++++++++++++++++++++ pkg/admin/api/grpc/probes.go | 20 ++++++++++++++++++++ pkg/admin/api/grpc/server.go | 34 ++++++++++++++++++++++++++++++++++ 3 files changed, 76 insertions(+) create mode 100644 pkg/admin/api/grpc/org.go create mode 100644 pkg/admin/api/grpc/probes.go create mode 100644 pkg/admin/api/grpc/server.go diff --git a/pkg/admin/api/grpc/org.go b/pkg/admin/api/grpc/org.go new file mode 100644 index 0000000000..26e5bf4424 --- /dev/null +++ b/pkg/admin/api/grpc/org.go @@ -0,0 +1,22 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetOrgByID(ctx context.Context, orgID *OrgID) (_ *Org, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) SearchOrgs(ctx context.Context, request *OrgSearchRequest) (_ *OrgSearchResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) IsOrgUnique(ctx context.Context, request *UniqueOrgRequest) (org *UniqueOrgResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) SetUpOrg(ctx context.Context, orgSetUp *OrgSetUpRequest) (_ *OrgSetUpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} diff --git a/pkg/admin/api/grpc/probes.go b/pkg/admin/api/grpc/probes.go new file mode 100644 index 0000000000..31b7bfeba6 --- /dev/null +++ b/pkg/admin/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") +} diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go new file mode 100644 index 0000000000..a1ea0fe3e5 --- /dev/null +++ b/pkg/admin/api/grpc/server.go @@ -0,0 +1,34 @@ +package grpc + +import ( + grpc "google.golang.org/grpc" +) + +var _ AdminServiceServer = (*Server)(nil) + +type Config struct { + Port string + SearchLimit int +} + +type Server struct { + port string + searchLimit int +} + +func StartServer(conf Config) *Server { + return &Server{ + port: conf.Port, + searchLimit: conf.SearchLimit, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer() + RegisterAdminServiceServer(gs, s) + return gs, nil +} From c20dd3cb3ff54a949708ae65a7dbeca0042151a1 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 10:14:39 +0100 Subject: [PATCH 08/19] fix: add requests --- pkg/admin/api/grpc/org.go | 8 +- pkg/admin/api/grpc/probes.go | 4 +- pkg/admin/api/grpc/server.go | 2 +- pkg/auth/api/grpc/application.go | 18 +++ pkg/auth/api/grpc/auth_session.go | 34 +++++ pkg/auth/api/grpc/grant.go | 19 +++ pkg/auth/api/grpc/permissions.go | 50 +++++++ pkg/auth/api/grpc/probes.go | 20 +++ pkg/auth/api/grpc/server.go | 34 +++++ pkg/auth/api/grpc/token.go | 10 ++ pkg/auth/api/grpc/user.go | 122 ++++++++++++++++++ pkg/auth/api/grpc/user_agent.go | 18 +++ pkg/auth/api/grpc/user_session.go | 23 ++++ pkg/management/api/grpc/application.go | 37 ++++++ pkg/management/api/grpc/auth_grant.go | 10 ++ pkg/management/api/grpc/org.go | 26 ++++ pkg/management/api/grpc/org_member.go | 27 ++++ pkg/management/api/grpc/policy.go | 55 ++++++++ pkg/management/api/grpc/probes.go | 20 +++ pkg/management/api/grpc/project.go | 47 +++++++ pkg/management/api/grpc/project_grant.go | 32 +++++ .../api/grpc/project_grant_member.go | 23 ++++ pkg/management/api/grpc/project_member.go | 27 ++++ pkg/management/api/grpc/server.go | 34 +++++ pkg/management/api/grpc/user.go | 103 +++++++++++++++ pkg/management/api/grpc/user_grant.go | 73 +++++++++++ 26 files changed, 869 insertions(+), 7 deletions(-) create mode 100644 pkg/auth/api/grpc/application.go create mode 100644 pkg/auth/api/grpc/auth_session.go create mode 100644 pkg/auth/api/grpc/grant.go create mode 100644 pkg/auth/api/grpc/permissions.go create mode 100644 pkg/auth/api/grpc/probes.go create mode 100644 pkg/auth/api/grpc/server.go create mode 100644 pkg/auth/api/grpc/token.go create mode 100644 pkg/auth/api/grpc/user.go create mode 100644 pkg/auth/api/grpc/user_agent.go create mode 100644 pkg/auth/api/grpc/user_session.go create mode 100644 pkg/management/api/grpc/application.go create mode 100644 pkg/management/api/grpc/auth_grant.go create mode 100644 pkg/management/api/grpc/org.go create mode 100644 pkg/management/api/grpc/org_member.go create mode 100644 pkg/management/api/grpc/policy.go create mode 100644 pkg/management/api/grpc/probes.go create mode 100644 pkg/management/api/grpc/project.go create mode 100644 pkg/management/api/grpc/project_grant.go create mode 100644 pkg/management/api/grpc/project_grant_member.go create mode 100644 pkg/management/api/grpc/project_member.go create mode 100644 pkg/management/api/grpc/server.go create mode 100644 pkg/management/api/grpc/user.go create mode 100644 pkg/management/api/grpc/user_grant.go diff --git a/pkg/admin/api/grpc/org.go b/pkg/admin/api/grpc/org.go index 26e5bf4424..8168f376a1 100644 --- a/pkg/admin/api/grpc/org.go +++ b/pkg/admin/api/grpc/org.go @@ -6,17 +6,17 @@ import ( ) func (s *Server) GetOrgByID(ctx context.Context, orgID *OrgID) (_ *Org, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-mvn3R", "Not implemented") } func (s *Server) SearchOrgs(ctx context.Context, request *OrgSearchRequest) (_ *OrgSearchResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-Po9Hd", "Not implemented") } func (s *Server) IsOrgUnique(ctx context.Context, request *UniqueOrgRequest) (org *UniqueOrgResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-0p6Fw", "Not implemented") } func (s *Server) SetUpOrg(ctx context.Context, orgSetUp *OrgSetUpRequest) (_ *OrgSetUpResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-hdj5D", "Not implemented") } diff --git a/pkg/admin/api/grpc/probes.go b/pkg/admin/api/grpc/probes.go index 31b7bfeba6..46e9966bb9 100644 --- a/pkg/admin/api/grpc/probes.go +++ b/pkg/admin/api/grpc/probes.go @@ -12,9 +12,9 @@ func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error } func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-bw3vR", "Not implemented") } func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ruc8e", "Not implemented") + return nil, errors.ThrowUnimplemented(nil, "GRPC-98Gse", "Not implemented") } diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go index a1ea0fe3e5..d0b8d5b49a 100644 --- a/pkg/admin/api/grpc/server.go +++ b/pkg/admin/api/grpc/server.go @@ -1,7 +1,7 @@ package grpc import ( - grpc "google.golang.org/grpc" + "google.golang.org/grpc" ) var _ AdminServiceServer = (*Server)(nil) diff --git a/pkg/auth/api/grpc/application.go b/pkg/auth/api/grpc/application.go new file mode 100644 index 0000000000..ddde7358f1 --- /dev/null +++ b/pkg/auth/api/grpc/application.go @@ -0,0 +1,18 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetApplicationByID(ctx context.Context, request *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Rfh8e", "Not implemented") +} + +func (s *Server) SearchApplications(ctx context.Context, appSearch *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ju8Rd", "Not implemented") +} + +func (s *Server) AuthorizeApplication(ctx context.Context, auth *ApplicationAuthorizeRequest) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lo8ws", "Not implemented") +} diff --git a/pkg/auth/api/grpc/auth_session.go b/pkg/auth/api/grpc/auth_session.go new file mode 100644 index 0000000000..51574d7647 --- /dev/null +++ b/pkg/auth/api/grpc/auth_session.go @@ -0,0 +1,34 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) CreateAuthSession(ctx context.Context, request *AuthSessionCreation) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dh3Rt", "Not implemented") +} + +func (s *Server) GetAuthSession(ctx context.Context, id *AuthSessionID) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56g", "Not implemented") +} + +func (s *Server) SelectUser(ctx context.Context, request *SelectUserRequest) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dl5gs", "Not implemented") +} + +func (s *Server) VerifyUser(ctx context.Context, request *VerifyUserRequest) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-39dGs", "Not implemented") +} + +func (s *Server) VerifyPassword(ctx context.Context, password *VerifyPasswordRequest) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-tu9j2", "Not implemented") +} + +func (s *Server) VerifyMfa(ctx context.Context, mfa *VerifyMfaRequest) (_ *AuthSessionResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-oi9GB", "Not implemented") +} + +func (s *Server) GetAuthSessionByTokenID(ctx context.Context, id *TokenID) (_ *AuthSessionView, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56z", "Not implemented") +} diff --git a/pkg/auth/api/grpc/grant.go b/pkg/auth/api/grpc/grant.go new file mode 100644 index 0000000000..d755f84281 --- /dev/null +++ b/pkg/auth/api/grpc/grant.go @@ -0,0 +1,19 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) SearchGrant(ctx context.Context, grantSearch *GrantSearchRequest) (*GrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mcn5z", "Not implemented") +} + +func (s *Server) SearchMyProjectOrgs(ctx context.Context, request *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8kdRf", "Not implemented") +} + +func (s *Server) IsIamAdmin(ctx context.Context, _ *empty.Empty) (*IsAdminResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9odFv", "Not implemented") +} diff --git a/pkg/auth/api/grpc/permissions.go b/pkg/auth/api/grpc/permissions.go new file mode 100644 index 0000000000..998ba2ee98 --- /dev/null +++ b/pkg/auth/api/grpc/permissions.go @@ -0,0 +1,50 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetMyZitadelPermissions(ctx context.Context, _ *empty.Empty) (*MyPermissions, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-or67G", "Not implemented") + //ctxData := auth.GetCtxData(ctx) + // + //grants, err := s.processor.ResolveGrants(ctx, ctxData.UserID, ctxData.OrgID) + //if err != nil { + // return nil, err + //} + // + //permissions := &MyPermissions{Permissions: []string{}} + // + //for _, grant := range grants { + // for _, role := range grant.Roles { + // roleName, ctxID := auth.SplitPermission(role) + // for _, mapping := range s.authConf.RolePermissionMappings { + // if mapping.Role == roleName { + // permissions.appendPermissions(ctxID, mapping.Permissions...) + // } + // } + // } + //} + // + //return permissions, nil +} + +func (p *MyPermissions) appendPermissions(ctxID string, permissions ...string) { + for _, permission := range permissions { + p.appendPermission(ctxID, permission) + } +} + +func (p *MyPermissions) appendPermission(ctxID, permission string) { + if ctxID != "" { + permission = permission + ":" + ctxID + } + for _, existingPermission := range p.Permissions { + if existingPermission == permission { + return + } + } + p.Permissions = append(p.Permissions, permission) +} diff --git a/pkg/auth/api/grpc/probes.go b/pkg/auth/api/grpc/probes.go new file mode 100644 index 0000000000..c360baf3d9 --- /dev/null +++ b/pkg/auth/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bst5W", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-or0vW", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lo6Eg", "Not implemented") +} diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go new file mode 100644 index 0000000000..6dc9959361 --- /dev/null +++ b/pkg/auth/api/grpc/server.go @@ -0,0 +1,34 @@ +package grpc + +import ( + "google.golang.org/grpc" +) + +var _ AuthServiceServer = (*Server)(nil) + +type Config struct { + Port string + SearchLimit int +} + +type Server struct { + port string + searchLimit int +} + +func StartServer(conf Config) *Server { + return &Server{ + port: conf.Port, + searchLimit: conf.SearchLimit, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer() + RegisterAuthServiceServer(gs, s) + return gs, nil +} diff --git a/pkg/auth/api/grpc/token.go b/pkg/auth/api/grpc/token.go new file mode 100644 index 0000000000..36d523329e --- /dev/null +++ b/pkg/auth/api/grpc/token.go @@ -0,0 +1,10 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) CreateToken(ctx context.Context, request *CreateTokenRequest) (_ *Token, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-86dG3", "Not implemented") +} diff --git a/pkg/auth/api/grpc/user.go b/pkg/auth/api/grpc/user.go new file mode 100644 index 0000000000..7d114943b6 --- /dev/null +++ b/pkg/auth/api/grpc/user.go @@ -0,0 +1,122 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetUserByID(ctx context.Context, request *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-fj74G", "Not implemented") +} + +func (s *Server) IsUserUnique(ctx context.Context, request *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dke9f", "Not implemented") +} + +func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-fis93", "Not implemented") +} + +func (s *Server) GetMyUserEmail(ctx context.Context, _ *empty.Empty) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-93j5d", "Not implemented") +} + +func (s *Server) GetMyUserPhone(ctx context.Context, _ *empty.Empty) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Hj75G", "Not implemented") +} + +func (s *Server) GetMyUserAddress(ctx context.Context, _ *empty.Empty) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-21jd4", "Not implemented") +} + +func (s *Server) GetMyMfas(ctx context.Context, _ *empty.Empty) (*MultiFactors, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-vkl9i", "Not implemented") +} + +func (s *Server) RegisterUser(ctx context.Context, request *RegisterUserRequest) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-03idx", "Not implemented") +} + +func (s *Server) RegisterUserWithExternal(ctx context.Context, request *RegisterUserExternalIDPRequest) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlwpd", "Not implemented") +} + +func (s *Server) UpdateMyUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented") +} + +func (s *Server) ChangeMyUserEmail(ctx context.Context, request *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lme45", "Not implemented") +} + +func (s *Server) VerifyMyUserEmail(ctx context.Context, request *VerifyMyUserEmailRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poru7", "Not implemented") +} + +func (s *Server) VerifyUserEmail(ctx context.Context, request *VerifyUserEmailRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented") +} + +func (s *Server) ResendMyEmailVerificationMail(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dh69i", "Not implemented") +} + +func (s *Server) ResendEmailVerificationMail(ctx context.Context, id *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mAq23", "Not implemented") +} + +func (s *Server) ChangeMyUserPhone(ctx context.Context, request *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk45g", "Not implemented") +} + +func (s *Server) VerifyMyUserPhone(ctx context.Context, request *VerifyUserPhoneRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ol6gE", "Not implemented") +} + +func (s *Server) ResendMyPhoneVerificationCode(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Wk8rf", "Not implemented") +} + +func (s *Server) UpdateMyUserAddress(ctx context.Context, request *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cmt7F", "Not implemented") +} + +func (s *Server) SetMyPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl9c2", "Not implemented") +} +func (s *Server) RequestPasswordReset(ctx context.Context, request *ResetPasswordRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-xm5hW", "Not implemented") +} + +func (s *Server) PasswordReset(ctx context.Context, request *ResetPassword) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mce5W", "Not implemented") +} + +func (s *Server) ChangeMyPassword(ctx context.Context, request *PasswordChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlo6G", "Not implemented") +} + +func (s *Server) AddMfaOTP(ctx context.Context, _ *empty.Empty) (_ *MfaOtpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-al35G", "Not implemented") +} + +func (s *Server) VerifyMfaOTP(ctx context.Context, request *VerifyMfaOtp) (_ *MfaOtpResponse, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-kgjZ7", "Not implemented") +} + +func (s *Server) RemoveMfaOTP(ctx context.Context, _ *empty.Empty) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9k46d", "Not implemented") +} + +func (s *Server) SkipMfaInit(ctx context.Context, request *SkipMfaInitRequest) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dl3i5", "Not implemented") +} + +func (s *Server) VerifyUserInit(ctx context.Context, request *VerifyUserInitRequest) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-itk6h", "Not implemented") +} + +func (s *Server) ResendUserInitMail(ctx context.Context, request *UserID) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk467", "Not implemented") +} diff --git a/pkg/auth/api/grpc/user_agent.go b/pkg/auth/api/grpc/user_agent.go new file mode 100644 index 0000000000..6ea88ca235 --- /dev/null +++ b/pkg/auth/api/grpc/user_agent.go @@ -0,0 +1,18 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetUserAgent(ctx context.Context, request *UserAgentID) (_ *UserAgent, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-iu7jF", "Not implemented") +} + +func (s *Server) CreateUserAgent(ctx context.Context, request *UserAgentCreation) (_ *UserAgent, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sdfk3", "Not implemented") +} + +func (s *Server) RevokeUserAgent(ctx context.Context, id *UserAgentID) (_ *UserAgent, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-09HjK", "Not implemented") +} diff --git a/pkg/auth/api/grpc/user_session.go b/pkg/auth/api/grpc/user_session.go new file mode 100644 index 0000000000..10a3cf3a0e --- /dev/null +++ b/pkg/auth/api/grpc/user_session.go @@ -0,0 +1,23 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetUserAgentSessions(ctx context.Context, id *UserAgentID) (_ *UserSessions, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ue45f", "Not implemented") +} + +func (s *Server) GetUserSession(ctx context.Context, id *UserSessionID) (_ *UserSession, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lor5h", "Not implemented") +} + +func (s *Server) TerminateUserSession(ctx context.Context, id *UserSessionID) (_ *empty.Empty, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bnmt6", "Not implemented") +} + +func (s *Server) GetMyUserSessions(ctx context.Context, _ *empty.Empty) (_ *UserSessionViews, err error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nc52s", "Not implemented") +} diff --git a/pkg/management/api/grpc/application.go b/pkg/management/api/grpc/application.go new file mode 100644 index 0000000000..dca568a694 --- /dev/null +++ b/pkg/management/api/grpc/application.go @@ -0,0 +1,37 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchApplications(ctx context.Context, request *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-yW23f", "Not implemented") +} + +func (s *Server) ApplicationByID(ctx context.Context, request *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bmr6X", "Not implemented") +} + +func (s *Server) CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poe4d", "Not implemented") +} +func (s *Server) UpdateApplication(ctx context.Context, in *ApplicationUpdate) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bmt6J", "Not implemented") +} +func (s *Server) DeactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cD34f", "Not implemented") +} +func (s *Server) ReactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mo98S", "Not implemented") +} +func (s *Server) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate) (*OIDCConfig, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-xm56g", "Not implemented") +} +func (s *Server) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID) (*ClientSecret, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dlwp3", "Not implemented") +} + +func (s *Server) ApplicationChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-due45", "Not implemented") +} diff --git a/pkg/management/api/grpc/auth_grant.go b/pkg/management/api/grpc/auth_grant.go new file mode 100644 index 0000000000..45243df663 --- /dev/null +++ b/pkg/management/api/grpc/auth_grant.go @@ -0,0 +1,10 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchAuthGrant(ctx context.Context, grantSearch *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dkwd5", "Not implemented") +} diff --git a/pkg/management/api/grpc/org.go b/pkg/management/api/grpc/org.go new file mode 100644 index 0000000000..1062aa154e --- /dev/null +++ b/pkg/management/api/grpc/org.go @@ -0,0 +1,26 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) GetOrgByID(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sdo5g", "Not implemented") +} + +func (s *Server) GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mop4s", "Not implemented") +} + +func (s *Server) DeactivateOrg(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-vel3X", "Not implemented") +} + +func (s *Server) ReactivateOrg(ctx context.Context, in *OrgID) (*Org, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Scmk3", "Not implemented") +} + +func (s *Server) OrgChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mfiF4", "Not implemented") +} diff --git a/pkg/management/api/grpc/org_member.go b/pkg/management/api/grpc/org_member.go new file mode 100644 index 0000000000..d80922ff24 --- /dev/null +++ b/pkg/management/api/grpc/org_member.go @@ -0,0 +1,27 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetOrgMemberRoles(ctx context.Context, _ *empty.Empty) (*OrgMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wz4vc", "Not implemented") +} + +func (s *Server) SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wkdl3", "Not implemented") +} + +func (s *Server) AddOrgMember(ctx context.Context, member *AddOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Moe56", "Not implemented") +} + +func (s *Server) ChangeOrgMember(ctx context.Context, member *ChangeOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-eod34", "Not implemented") +} + +func (s *Server) RemoveOrgMember(ctx context.Context, member *RemoveOrgMemberRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-poeSw", "Not implemented") +} diff --git a/pkg/management/api/grpc/policy.go b/pkg/management/api/grpc/policy.go new file mode 100644 index 0000000000..4a49550953 --- /dev/null +++ b/pkg/management/api/grpc/policy.go @@ -0,0 +1,55 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetPasswordComplexityPolicy(ctx context.Context, _ *empty.Empty) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-swe5v", "Not implemented") +} + +func (s *Server) CreatePasswordComplexityPolicy(ctx context.Context, policy *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-lo34s", "Not implemented") +} + +func (s *Server) UpdatePasswordComplexityPolicy(ctx context.Context, policy *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl8fs", "Not implemented") +} + +func (s *Server) DeletePasswordComplexityPolicy(ctx context.Context, ID *PasswordComplexityPolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-skw3f", "Not implemented") +} + +func (s *Server) GetPasswordAgePolicy(ctx context.Context, _ *empty.Empty) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po9vb", "Not implemented") +} + +func (s *Server) CreatePasswordAgePolicy(ctx context.Context, policy *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldp3v", "Not implemented") +} + +func (s *Server) UpdatePasswordAgePolicy(ctx context.Context, policy *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ckep3", "Not implemented") +} + +func (s *Server) DeletePasswordAgePolicy(ctx context.Context, ID *PasswordAgePolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plo67", "Not implemented") +} + +func (s *Server) GetPasswordLockoutPolicy(ctx context.Context, _ *empty.Empty) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-GHkd9", "Not implemented") +} + +func (s *Server) CreatePasswordLockoutPolicy(ctx context.Context, policy *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mdk3c", "Not implemented") +} + +func (s *Server) UpdatePasswordLockoutPolicy(ctx context.Context, policy *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8dbN4", "Not implemented") +} + +func (s *Server) DeletePasswordLockoutPolicy(ctx context.Context, ID *PasswordLockoutPolicyID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV53", "Not implemented") +} diff --git a/pkg/management/api/grpc/probes.go b/pkg/management/api/grpc/probes.go new file mode 100644 index 0000000000..3debbea5e2 --- /dev/null +++ b/pkg/management/api/grpc/probes.go @@ -0,0 +1,20 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" + pb_struct "github.com/golang/protobuf/ptypes/struct" +) + +func (s *Server) Healthz(_ context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mkd3y", "Not implemented") +} + +func (s *Server) Ready(ctx context.Context, e *empty.Empty) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl6BM", "Not implemented") +} + +func (s *Server) Validate(ctx context.Context, _ *empty.Empty) (*pb_struct.Struct, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2wxF", "Not implemented") +} diff --git a/pkg/management/api/grpc/project.go b/pkg/management/api/grpc/project.go new file mode 100644 index 0000000000..133e62202a --- /dev/null +++ b/pkg/management/api/grpc/project.go @@ -0,0 +1,47 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) CreateProject(ctx context.Context, in *ProjectCreateRequest) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mo34X", "Not implemented") +} +func (s *Server) UpdateProject(ctx context.Context, in *ProjectUpdateRequest) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0o4fB", "Not implemented") +} +func (s *Server) DeactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-4Sck8", "Not implemented") +} +func (s *Server) ReactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0oVre", "Not implemented") +} + +func (s *Server) SearchProjects(ctx context.Context, in *ProjectSearchRequest) (*ProjectSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2sFvd", "Not implemented") +} + +func (s *Server) ProjectByID(ctx context.Context, id *ProjectID) (*Project, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV5x", "Not implemented") +} + +func (s *Server) GetGrantedProjectGrantByID(ctx context.Context, request *GrantedGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-974vd", "Not implemented") +} + +func (s *Server) AddProjectRole(ctx context.Context, in *ProjectRoleAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0ow2C", "Not implemented") +} +func (s *Server) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-bm6iB", "Not implemented") +} + +func (s *Server) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plV56", "Not implemented") +} + +func (s *Server) ProjectChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mci3f", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_grant.go b/pkg/management/api/grpc/project_grant.go new file mode 100644 index 0000000000..fb70cdd648 --- /dev/null +++ b/pkg/management/api/grpc/project_grant.go @@ -0,0 +1,32 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetProjectGrantMemberRoles(ctx context.Context, _ *empty.Empty) (*ProjectGrantMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mGo89", "Not implemented") +} + +func (s *Server) SearchProjectGrants(ctx context.Context, request *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po9fs", "Not implemented") +} + +func (s *Server) ProjectGrantByID(ctx context.Context, request *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nmr54", "Not implemented") +} + +func (s *Server) CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-fi45f", "Not implemented") +} +func (s *Server) UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-nm7Ds", "Not implemented") +} +func (s *Server) DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-xkwpr", "Not implemented") +} +func (s *Server) ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID) (*ProjectGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mdk23", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_grant_member.go b/pkg/management/api/grpc/project_grant_member.go new file mode 100644 index 0000000000..063934f0d3 --- /dev/null +++ b/pkg/management/api/grpc/project_grant_member.go @@ -0,0 +1,23 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) SearchProjectGrantMembers(ctx context.Context, request *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pldE4", "Not implemented") +} + +func (s *Server) AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-po8r3", "Not implemented") +} + +func (s *Server) ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asd3c", "Not implemented") +} + +func (s *Server) RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-04kfs", "Not implemented") +} diff --git a/pkg/management/api/grpc/project_member.go b/pkg/management/api/grpc/project_member.go new file mode 100644 index 0000000000..78f21a2657 --- /dev/null +++ b/pkg/management/api/grpc/project_member.go @@ -0,0 +1,27 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetProjectMemberRoles(ctx context.Context, _ *empty.Empty) (*ProjectMemberRoles, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-qw34d", "Not implemented") +} + +func (s *Server) SearchProjectMembers(ctx context.Context, request *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-PLr84", "Not implemented") +} + +func (s *Server) AddProjectMember(ctx context.Context, in *ProjectMemberAdd) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-c2dks", "Not implemented") +} + +func (s *Server) ChangeProjectMember(ctx context.Context, in *ProjectMemberChange) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cms47", "Not implemented") +} + +func (s *Server) RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-olw21", "Not implemented") +} diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go new file mode 100644 index 0000000000..e3988ada55 --- /dev/null +++ b/pkg/management/api/grpc/server.go @@ -0,0 +1,34 @@ +package grpc + +import ( + "google.golang.org/grpc" +) + +var _ ManagementServiceServer = (*Server)(nil) + +type Config struct { + Port string + SearchLimit int +} + +type Server struct { + port string + searchLimit int +} + +func StartServer(conf Config) *Server { + return &Server{ + port: conf.Port, + searchLimit: conf.SearchLimit, + } +} + +func (s *Server) GRPCPort() string { + return s.port +} + +func (s *Server) GRPCServer() (*grpc.Server, error) { + gs := grpc.NewServer() + RegisterManagementServiceServer(gs, s) + return gs, nil +} diff --git a/pkg/management/api/grpc/user.go b/pkg/management/api/grpc/user.go new file mode 100644 index 0000000000..c6a72965a5 --- /dev/null +++ b/pkg/management/api/grpc/user.go @@ -0,0 +1,103 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" + "github.com/golang/protobuf/ptypes/empty" +) + +func (s *Server) GetUserByID(ctx context.Context, userID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0oVbs", "Not implemented") +} + +func (s *Server) GetUserByEmailGlobal(ctx context.Context, email *UserEmailID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9djSw", "Not implemented") +} + +func (s *Server) SearchUsers(ctx context.Context, userSearch *UserSearchRequest) (*UserSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-as2Dc", "Not implemented") +} + +func (s *Server) UserChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pl6Zu", "Not implemented") +} + +func (s *Server) IsUserUnique(ctx context.Context, request *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-olF56", "Not implemented") +} + +func (s *Server) CreateUser(ctx context.Context, request *CreateUserRequest) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sd4fs", "Not implemented") +} + +func (s *Server) DeactivateUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-Vgh64", "Not implemented") +} + +func (s *Server) ReactivateUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mCx4f", "Not implemented") +} + +func (s *Server) LockUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ds4fd", "Not implemented") +} + +func (s *Server) UnlockUser(ctx context.Context, ID *UserID) (*User, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-MV7dd", "Not implemented") +} + +func (s *Server) DeleteUser(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-as4fg", "Not implemented") +} + +func (s *Server) GetUserProfile(ctx context.Context, ID *UserID) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-mT67d", "Not implemented") +} + +func (s *Server) UpdateUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asje3", "Not implemented") +} + +func (s *Server) GetUserEmail(ctx context.Context, ID *UserID) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-peo9d", "Not implemented") +} + +func (s *Server) ChangeUserEmail(ctx context.Context, request *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-cloeS", "Not implemented") +} + +func (s *Server) ResendEmailVerificationMail(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dwsP9", "Not implemented") +} + +func (s *Server) GetUserPhone(ctx context.Context, ID *UserID) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-wlf7f", "Not implemented") +} + +func (s *Server) ChangeUserPhone(ctx context.Context, request *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-pld5g", "Not implemented") +} + +func (s *Server) ResendPhoneVerificationCode(ctx context.Context, ID *UserID) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-98hdE", "Not implemented") +} + +func (s *Server) GetUserAddress(ctx context.Context, ID *UserID) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-plt67", "Not implemented") +} + +func (s *Server) UpdateUserAddress(ctx context.Context, request *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dleo3", "Not implemented") +} + +func (s *Server) SendSetPasswordNotification(ctx context.Context, request *SetPasswordNotificationRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-LSe7s", "Not implemented") +} + +func (s *Server) SetInitialPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldo3s", "Not implemented") +} + +func (s *Server) GetUserMfas(ctx context.Context, userID *UserID) (*MultiFactors, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ldmw3", "Not implemented") +} diff --git a/pkg/management/api/grpc/user_grant.go b/pkg/management/api/grpc/user_grant.go new file mode 100644 index 0000000000..6751ef2684 --- /dev/null +++ b/pkg/management/api/grpc/user_grant.go @@ -0,0 +1,73 @@ +package grpc + +import ( + "context" + "github.com/caos/zitadel/internal/errors" +) + +func (s *Server) SearchUserGrants(ctx context.Context, request *UserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk3ds", "Not implemented") +} + +func (s *Server) UserGrantByID(ctx context.Context, request *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9dksF", "Not implemented") +} + +func (s *Server) CreateUserGrant(ctx context.Context, in *UserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2kdl2", "Not implemented") +} +func (s *Server) UpdateUserGrant(ctx context.Context, in *UserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-83jsF", "Not implemented") +} +func (s *Server) DeactivateUserGrant(ctx context.Context, in *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-93dj3", "Not implemented") +} +func (s *Server) ReactivateUserGrant(ctx context.Context, in *UserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2kSfs", "Not implemented") +} + +func (s *Server) SearchProjectUserGrants(ctx context.Context, request *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-8jdSw", "Not implemented") +} + +func (s *Server) ProjectUserGrantByID(ctx context.Context, request *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-dk32s", "Not implemented") +} + +func (s *Server) CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-0or5G", "Not implemented") +} +func (s *Server) UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-asl4D", "Not implemented") +} + +func (s *Server) DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-2fG6h", "Not implemented") +} + +func (s *Server) ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-03kSc", "Not implemented") +} + +func (s *Server) SearchProjectGrantUserGrants(ctx context.Context, request *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-32sFs", "Not implemented") +} + +func (s *Server) ProjectGrantUserGrantByID(ctx context.Context, request *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-9kfSc", "Not implemented") +} + +func (s *Server) CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-293md", "Not implemented") +} +func (s *Server) UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-76fGe", "Not implemented") +} + +func (s *Server) DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-sFsi3", "Not implemented") +} + +func (s *Server) ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, errors.ThrowUnimplemented(nil, "GRPC-ckr56", "Not implemented") +} From f2a9fa897241095d8ceeffd4ba16675a4d05eb16 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 11:20:45 +0100 Subject: [PATCH 09/19] fix: add grpc server and gateway --- pkg/admin/api/grpc/gateway.go | 52 ++++++++++++++++++++++++++++++ pkg/admin/api/grpc/server.go | 10 +++++- pkg/auth/api/grpc/gateway.go | 52 ++++++++++++++++++++++++++++++ pkg/auth/api/grpc/server.go | 10 +++++- pkg/management/api/grpc/gateway.go | 52 ++++++++++++++++++++++++++++++ pkg/management/api/grpc/server.go | 10 +++++- 6 files changed, 183 insertions(+), 3 deletions(-) create mode 100644 pkg/admin/api/grpc/gateway.go create mode 100644 pkg/auth/api/grpc/gateway.go create mode 100644 pkg/management/api/grpc/gateway.go diff --git a/pkg/admin/api/grpc/gateway.go b/pkg/admin/api/grpc/gateway.go new file mode 100644 index 0000000000..311e989fc8 --- /dev/null +++ b/pkg/admin/api/grpc/gateway.go @@ -0,0 +1,52 @@ +package grpc + +import ( + "github.com/caos/utils/api/grpc/server" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "strings" +) + +type GatewayConfig struct { + Port string + GRPCEndpoint string + CustomHeaders []string +} + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterAdminServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go index d0b8d5b49a..7fad14521e 100644 --- a/pkg/admin/api/grpc/server.go +++ b/pkg/admin/api/grpc/server.go @@ -1,6 +1,8 @@ package grpc import ( + grpc_utils "github.com/caos/zitadel/internal/api/grpc" + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -28,7 +30,13 @@ func (s *Server) GRPCPort() string { } func (s *Server) GRPCServer() (*grpc.Server, error) { - gs := grpc.NewServer() + gs := grpc.NewServer( + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + grpc_utils.ErrorHandler(), + ), + ), + ) RegisterAdminServiceServer(gs, s) return gs, nil } diff --git a/pkg/auth/api/grpc/gateway.go b/pkg/auth/api/grpc/gateway.go new file mode 100644 index 0000000000..8718cd3fcd --- /dev/null +++ b/pkg/auth/api/grpc/gateway.go @@ -0,0 +1,52 @@ +package grpc + +import ( + "github.com/caos/utils/api/grpc/server" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "strings" +) + +type GatewayConfig struct { + Port string + GRPCEndpoint string + CustomHeaders []string +} + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterAuthServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go index 6dc9959361..51c82892a7 100644 --- a/pkg/auth/api/grpc/server.go +++ b/pkg/auth/api/grpc/server.go @@ -1,6 +1,8 @@ package grpc import ( + grpc_utils "github.com/caos/zitadel/internal/api/grpc" + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -28,7 +30,13 @@ func (s *Server) GRPCPort() string { } func (s *Server) GRPCServer() (*grpc.Server, error) { - gs := grpc.NewServer() + gs := grpc.NewServer( + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + grpc_utils.ErrorHandler(), + ), + ), + ) RegisterAuthServiceServer(gs, s) return gs, nil } diff --git a/pkg/management/api/grpc/gateway.go b/pkg/management/api/grpc/gateway.go new file mode 100644 index 0000000000..75aa957434 --- /dev/null +++ b/pkg/management/api/grpc/gateway.go @@ -0,0 +1,52 @@ +package grpc + +import ( + "github.com/caos/utils/api/grpc/server" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "strings" +) + +type GatewayConfig struct { + Port string + GRPCEndpoint string + CustomHeaders []string +} + +type Gateway struct { + grpcEndpoint string + port string + cutomHeaders []string +} + +func StartGateway(conf GatewayConfig) *Gateway { + return &Gateway{ + grpcEndpoint: conf.GRPCEndpoint, + port: conf.Port, + cutomHeaders: conf.CustomHeaders, + } +} + +func (gw *Gateway) Gateway() server.GatewayFunc { + return RegisterManagementServiceHandlerFromEndpoint +} + +func (gw *Gateway) GRPCEndpoint() string { + return ":" + gw.grpcEndpoint +} + +func (gw *Gateway) GatewayPort() string { + return gw.port +} + +func (gw *Gateway) GatewayServeMuxOptions() []runtime.ServeMuxOption { + return []runtime.ServeMuxOption{ + runtime.WithIncomingHeaderMatcher(func(header string) (string, bool) { + for _, customHeader := range gw.cutomHeaders { + if strings.HasPrefix(strings.ToLower(header), customHeader) { + return header, true + } + } + return header, false + }), + } +} diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go index e3988ada55..13df6492c0 100644 --- a/pkg/management/api/grpc/server.go +++ b/pkg/management/api/grpc/server.go @@ -1,6 +1,8 @@ package grpc import ( + grpc_utils "github.com/caos/zitadel/internal/api/grpc" + grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -28,7 +30,13 @@ func (s *Server) GRPCPort() string { } func (s *Server) GRPCServer() (*grpc.Server, error) { - gs := grpc.NewServer() + gs := grpc.NewServer( + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + grpc_utils.ErrorHandler(), + ), + ), + ) RegisterManagementServiceServer(gs, s) return gs, nil } From 0849f4f567cbae8dbb90f9bb206055d9a758335c Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 11:24:16 +0100 Subject: [PATCH 10/19] fix: add go mod --- go.mod | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/go.mod b/go.mod index 69f1c7ab4f..32e9d92da1 100644 --- a/go.mod +++ b/go.mod @@ -8,12 +8,12 @@ require ( github.com/Masterminds/semver v1.5.0 // indirect github.com/Masterminds/sprig v2.22.0+incompatible github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a + github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e // indirect github.com/envoyproxy/protoc-gen-validate v0.1.0 github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 github.com/golang/protobuf v1.3.5 - github.com/google/go-cmp v0.4.0 // indirect github.com/google/uuid v1.1.1 // indirect github.com/gorilla/schema v1.1.0 github.com/gorilla/securecookie v1.1.1 @@ -21,17 +21,13 @@ require ( github.com/grpc-ecosystem/grpc-gateway v1.14.3 github.com/huandu/xstrings v1.3.0 // indirect github.com/imdario/mergo v0.3.8 // indirect - github.com/kr/pretty v0.1.0 // indirect github.com/magiconair/properties v1.8.1 github.com/mitchellh/copystructure v1.0.0 // indirect github.com/stretchr/testify v1.5.1 golang.org/x/crypto v0.0.0-20200320181102-891825fb96df golang.org/x/net v0.0.0-20200320220750-118fecf932d8 // indirect golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae // indirect - golang.org/x/text v0.3.2 // indirect - golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135 + golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56 google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 - gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect - gopkg.in/yaml.v2 v2.2.8 // indirect ) From 8632263ec394283b9b1bb98e358a473b11c4ac44 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 11:25:01 +0100 Subject: [PATCH 11/19] fix: add go mod --- go.sum | 183 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 183 insertions(+) diff --git a/go.sum b/go.sum index 1a19be8e54..ea115d95ae 100644 --- a/go.sum +++ b/go.sum @@ -1,16 +1,45 @@ cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= +cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= +cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU= +cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU= +cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY= +cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc= +cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0= +cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To= +cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M= +cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o= +cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE= +cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= +cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I= +cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw= +cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw= +cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos= +contrib.go.opencensus.io/exporter/stackdriver v0.13.0/go.mod h1:z2tyTZtPmQ2HvWH4cOmVDgtY+1lomfKdbLnkJvZdc8c= +dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= +github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= github.com/Masterminds/goutils v1.1.0 h1:zukEsf/1JZwCMgHiK3GZftabmxiCw4apj3a28RPBiVg= github.com/Masterminds/goutils v1.1.0/go.mod h1:8cTjp+g8YejhMuvIA5y2vz3BpJxksy863GQaJW2MFNU= github.com/Masterminds/semver v1.5.0 h1:H65muMkzWKEuNDnfl9d70GUjFniHKHRbFPGBuZ3QEww= github.com/Masterminds/semver v1.5.0/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y= github.com/Masterminds/sprig v2.22.0+incompatible h1:z4yfnGrZ7netVz+0EDJ0Wi+5VZCSYp4Z0m2dk6cEM60= github.com/Masterminds/sprig v2.22.0+incompatible/go.mod h1:y6hNFY5UBTIWBxnzTeuNhlNS5hqE0NB0E6fgfo2Br3o= +github.com/VictoriaMetrics/fastcache v1.5.7/go.mod h1:ptDBkNMQI4RtmVo8VS/XwRY6RoTu1dAWCbrk+6WsEM8= +github.com/allegro/bigcache v1.2.1-0.20190218064605-e24eb225f156/go.mod h1:Cb/ax3seSYIx7SuZdm2G2xzfwmv3TPSk2ucNfQESPXM= +github.com/allegro/bigcache v1.2.1/go.mod h1:Cb/ax3seSYIx7SuZdm2G2xzfwmv3TPSk2ucNfQESPXM= github.com/antihax/optional v0.0.0-20180407024304-ca021399b1a6/go.mod h1:V8iCPQYkqmusNa815XgQio277wI47sdRh1dUOLdyC6Q= +github.com/aws/aws-sdk-go v1.23.20/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo= +github.com/aws/aws-sdk-go v1.29.16/go.mod h1:1KvfttTE3SPKMpo8g2c6jL3ZKfXtFvKscTgahTma5Xg= github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a h1:HOU/3xL/afsZ+2aCstfJlrzRkwYMTFR1TIEgps5ny8s= github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a/go.mod h1:9LKiDE2ChuGv6CHYif/kiugrfEXu9AwDiFWSreX7Wp0= +github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e h1:QSbTeoLPW7c1rWNJA2GOKunDJnRAfyg8+cb73qMYESM= +github.com/caos/utils v0.0.0-20200305060859-ac2fa70f313e/go.mod h1:CLEkNe7rs12GkdBWZxadA/mFiKeF6HzuA1BOKq+fX+Y= github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= +github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= +github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI= +github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI= +github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU= github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -23,37 +52,69 @@ github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrp github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= +github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= +github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= +github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg= github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b h1:VKtxabqXZkF25pY9ekfRL6a582T4P37/31XEstQ5p58= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= +github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e h1:1r7pUrabqp18hOBcwBwiTsbnFeTZHV9eER/QT5JVZxY= +github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= +github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= +github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y= +github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= +github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= github.com/golang/mock v1.4.3 h1:GV+pQPG/EUUbkh47niozDcADz6go/dUwhVzdUQHIVRw= github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= +github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= +github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= github.com/golang/protobuf v1.3.5 h1:F768QJ1E9tib+q5Sc8MkdJi1RxLTbRcTf8LJV56aRls= github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk= +github.com/golang/snappy v0.0.1/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= +github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= +github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= +github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= +github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= github.com/google/go-cmp v0.4.0 h1:xsAVV57WRhGj6kEIi8ReJzQlHHqcBYCElAvkovg3B/4= github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= +github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= +github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= +github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI= github.com/google/uuid v1.1.1 h1:Gkbcsh/GbpXz7lPftLA3P6TYMwjCLYm83jiFQZF/3gY= github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= +github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg= +github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk= github.com/gorilla/schema v1.1.0 h1:CamqUDOFUBqzrvxuz2vEwo8+SUdwsluFh7IlzJh30LY= github.com/gorilla/schema v1.1.0/go.mod h1:kgLaKoK1FELgZqMAVxx/5cbj0kT+57qxUrAlIO2eleU= github.com/gorilla/securecookie v1.1.1 h1:miw7JPhV+b/lAHSXz4qd/nN9jRiAFV5FwjeKyCS8BvQ= github.com/gorilla/securecookie v1.1.1/go.mod h1:ra0sb63/xPlUeL+yeDciTfxMRAA+MP+HVt/4epWDjd4= github.com/grpc-ecosystem/go-grpc-middleware v1.2.0 h1:0IKlLyQ3Hs9nDaiK5cSHAGmcQEIC8l2Ts1u6x5Dfrqg= github.com/grpc-ecosystem/go-grpc-middleware v1.2.0/go.mod h1:mJzapYve32yjrKlk9GbyCZHuPgZsrbyIbyKhSzOpg6s= +github.com/grpc-ecosystem/grpc-gateway v1.13.0/go.mod h1:8XEsbTttt/W+VvjtQhLACqCisSPWTxCZ7sBRjU6iH9c= github.com/grpc-ecosystem/grpc-gateway v1.14.3 h1:OCJlWkOUoTnl0neNGlf4fUm3TmbEtguw7vR+nGtnDjY= github.com/grpc-ecosystem/grpc-gateway v1.14.3/go.mod h1:6CwZWGDSPRJidgKAtJVvND6soZe6fT7iteq8wDPdhb0= +github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= +github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= github.com/huandu/xstrings v1.3.0 h1:gvV6jG9dTgFEncxo+AF7PH6MZXi/vZl25owA/8Dg8Wo= github.com/huandu/xstrings v1.3.0/go.mod h1:y5/lhBue+AyNmUVz9RLU9xbLR0o4KIIExikq4ovT0aE= +github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/imdario/mergo v0.3.8 h1:CGgOkSJeqMRmt0D9XLWExdT4m4F1vd3FV3VPt+0VxkQ= github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= +github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= +github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= +github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk= github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ= @@ -73,80 +134,198 @@ github.com/mitchellh/reflectwalk v1.0.0 h1:9D+8oIskB4VJBN5SFlmc27fSlIBZaov1Wpk/I github.com/mitchellh/reflectwalk v1.0.0/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw= github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o= github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= +github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ= +github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= +github.com/rs/cors v1.7.0 h1:+88SsELBHx5r+hZ8TCkggzSstaWNbDvThkVK8H6f9ik= +github.com/rs/cors v1.7.0/go.mod h1:gFx+x8UowdsKA9AchylcLynDq+nNFfI8FkUZdN/jGCU= github.com/sirupsen/logrus v1.4.2 h1:SPIRibHv4MatM3XXNO2BJeFLZwZ2LvZgfQ5+UNI2im4= github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w= github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= +github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= github.com/stretchr/testify v1.5.1 h1:nOGnQDM7FYENwehXlg/kFVnos3rEvtKTjRvOWSzb6H4= github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA= +go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU= +go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8= +go.opencensus.io v0.22.1/go.mod h1:Ap50jQcDJrx6rB6VgeeFPtuPIf3wMRvRfrfYDO6+BmA= +go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +go.opencensus.io v0.22.3 h1:8sGtKOrtQqkN1bp2AtX+misvLIlOmsEsNd+9NIcPEm8= +go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0= go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= +golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200320181102-891825fb96df h1:lDWgvUvNnaTnNBc/dwOty86cFeKoKWbwy2wQj0gIxbU= golang.org/x/crypto v0.0.0-20200320181102-891825fb96df/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= +golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= +golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= +golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek= +golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY= +golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM= +golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= +golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= +golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs= +golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= +golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE= +golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= +golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc= +golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= +golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= +golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= +golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191002035440-2ec189313ef0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200320220750-118fecf932d8 h1:1+zQlQqEEhUeStBTi653GZAnAuivZq/2hz+Iz+OP7rg= golang.org/x/net v0.0.0-20200320220750-118fecf932d8/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= +golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191206220618-eeba5f6aabab h1:FvshnhkKW+LO3HWHodML8kuVX8rnJTxKm9dFPuI68UM= golang.org/x/sys v0.0.0-20191206220618-eeba5f6aabab/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae h1:3tcmuaB7wwSZtelmiv479UjUB+vviwABz7a133ZwOKQ= golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= +golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.2 h1:tW2bmiBqwgJj/UpqtC8EpXEZVYOwU0yG4iWbprSVAcs= golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= +golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= +golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= +golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135 h1:5Beo0mZN8dRzgrMMkDp0jc8YXQKx9DiJ2k1dkvGsn5A= golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191010075000-0337d82405ff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE= +google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M= +google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= +google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= +google.golang.org/api v0.10.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= +google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM= google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= +google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= +google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0= +google.golang.org/appengine v1.6.2/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0= +google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc= google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc= +google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= +google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8= google.golang.org/genproto v0.0.0-20190927181202-20e1ac93f88c/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8= +google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200303153909-beee998c1893/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c h1:5aI3/f/3eCZps9xwoEnmgfDJDhMbnJpfqeGpjVNgVEI= google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= +google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= +google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= +google.golang.org/grpc v1.23.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= google.golang.org/grpc v1.24.0/go.mod h1:XDChyiUovWa60DnaeDeZmSW86xtLtjtZbwvSiRnRtcA= google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY= +google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= google.golang.org/grpc v1.28.0 h1:bO/TA4OxCOummhSf10siHuG7vJOiwh7SpRpFZDkOgl4= google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= +gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.7 h1:VUgggvou5XRW9mHwD/yXxIYSMtY0zoKQf/v226p2nyo= @@ -154,7 +333,11 @@ gopkg.in/yaml.v2 v2.2.7/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.8 h1:obN1ZagJSUGI0Ek/LBmuj4SNLPfIny3KsKFopxRdj10= gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= +rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= rsc.io/quote/v3 v3.1.0 h1:9JKUTTIUgS6kzR9mK1YuGKv6Nl+DijDNIc0ghT58FaY= rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0 h1:7uVkIFmeBqHfdjD+gZwtXXI+RODJ2Wc4O7MPEh/QiW4= From 3100d4b48bf5ecb4fa34e8089644861cf66f39b7 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 24 Mar 2020 16:16:05 +0100 Subject: [PATCH 12/19] fix: imports --- pkg/admin/api/grpc/gateway.go | 2 +- pkg/admin/api/grpc/server.go | 5 +++-- pkg/auth/api/grpc/gateway.go | 2 +- pkg/auth/api/grpc/server.go | 5 +++-- pkg/management/api/grpc/gateway.go | 2 +- pkg/management/api/grpc/server.go | 5 +++-- 6 files changed, 12 insertions(+), 9 deletions(-) diff --git a/pkg/admin/api/grpc/gateway.go b/pkg/admin/api/grpc/gateway.go index 311e989fc8..833285b5a8 100644 --- a/pkg/admin/api/grpc/gateway.go +++ b/pkg/admin/api/grpc/gateway.go @@ -1,7 +1,7 @@ package grpc import ( - "github.com/caos/utils/api/grpc/server" + "github.com/caos/zitadel/internal/api/grpc/server" "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" ) diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go index 7fad14521e..e31a3edd1b 100644 --- a/pkg/admin/api/grpc/server.go +++ b/pkg/admin/api/grpc/server.go @@ -1,7 +1,7 @@ package grpc import ( - grpc_utils "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -31,9 +31,10 @@ func (s *Server) GRPCPort() string { func (s *Server) GRPCServer() (*grpc.Server, error) { gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), grpc.UnaryInterceptor( grpc_middleware.ChainUnaryServer( - grpc_utils.ErrorHandler(), + middleware.ErrorHandler(), ), ), ) diff --git a/pkg/auth/api/grpc/gateway.go b/pkg/auth/api/grpc/gateway.go index 8718cd3fcd..c8b845e6a4 100644 --- a/pkg/auth/api/grpc/gateway.go +++ b/pkg/auth/api/grpc/gateway.go @@ -1,7 +1,7 @@ package grpc import ( - "github.com/caos/utils/api/grpc/server" + "github.com/caos/zitadel/internal/api/grpc/server" "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" ) diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go index 51c82892a7..0a60ba96d9 100644 --- a/pkg/auth/api/grpc/server.go +++ b/pkg/auth/api/grpc/server.go @@ -1,7 +1,7 @@ package grpc import ( - grpc_utils "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -31,9 +31,10 @@ func (s *Server) GRPCPort() string { func (s *Server) GRPCServer() (*grpc.Server, error) { gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), grpc.UnaryInterceptor( grpc_middleware.ChainUnaryServer( - grpc_utils.ErrorHandler(), + middleware.ErrorHandler(), ), ), ) diff --git a/pkg/management/api/grpc/gateway.go b/pkg/management/api/grpc/gateway.go index 75aa957434..8884d8e5f5 100644 --- a/pkg/management/api/grpc/gateway.go +++ b/pkg/management/api/grpc/gateway.go @@ -1,7 +1,7 @@ package grpc import ( - "github.com/caos/utils/api/grpc/server" + "github.com/caos/zitadel/internal/api/grpc/server" "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" ) diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go index 13df6492c0..07981551fb 100644 --- a/pkg/management/api/grpc/server.go +++ b/pkg/management/api/grpc/server.go @@ -1,7 +1,7 @@ package grpc import ( - grpc_utils "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" ) @@ -31,9 +31,10 @@ func (s *Server) GRPCPort() string { func (s *Server) GRPCServer() (*grpc.Server, error) { gs := grpc.NewServer( + middleware.TracingStatsServer("/Healthz", "/Ready", "/Validate"), grpc.UnaryInterceptor( grpc_middleware.ChainUnaryServer( - grpc_utils.ErrorHandler(), + middleware.ErrorHandler(), ), ), ) From 5bab6853406636b5bcfab0534d7339ba909c82bd Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Wed, 25 Mar 2020 10:54:45 +0100 Subject: [PATCH 13/19] fix: start server and gateway --- go.mod | 6 +- go.sum | 5 + .../protoc/protoc-gen-authoption/templates.go | 4 +- .../templates/auth_method_mapping.go.tmpl | 4 +- pkg/admin/admin.go | 6 +- pkg/admin/api/api.go | 28 + pkg/admin/api/config.go | 7 - pkg/admin/api/grpc/admin.pb.authoptions.go | 4 +- pkg/auth/api/api.go | 28 + pkg/auth/api/config.go | 7 - pkg/auth/api/grpc/auth.pb.authoptions.go | 4 +- pkg/auth/auth.go | 6 +- pkg/management/api/api.go | 28 + pkg/management/api/config.go | 7 - .../api/grpc/management.pb.authoptions.go | 4 +- pkg/management/api/grpc/management.pb.go | 986 +++++++++--------- .../api/grpc/management.swagger.json | 2 +- pkg/management/management.go | 6 +- 18 files changed, 609 insertions(+), 533 deletions(-) create mode 100644 pkg/admin/api/api.go delete mode 100644 pkg/admin/api/config.go create mode 100644 pkg/auth/api/api.go delete mode 100644 pkg/auth/api/config.go create mode 100644 pkg/management/api/api.go delete mode 100644 pkg/management/api/config.go diff --git a/go.mod b/go.mod index 731d99ee77..aae394f4a0 100644 --- a/go.mod +++ b/go.mod @@ -11,6 +11,7 @@ require ( github.com/Masterminds/sprig v2.22.0+incompatible github.com/aws/aws-sdk-go v1.29.16 // indirect github.com/caos/logging v0.0.0-20191210002624-b3260f690a6a + github.com/envoyproxy/protoc-gen-validate v0.1.0 github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 @@ -25,15 +26,16 @@ require ( github.com/mitchellh/copystructure v1.0.0 // indirect github.com/nicksnyder/go-i18n/v2 v2.0.3 github.com/rs/cors v1.7.0 + github.com/sirupsen/logrus v1.5.0 // indirect github.com/stretchr/testify v1.5.1 go.opencensus.io v0.22.3 golang.org/x/crypto v0.0.0-20200320181102-891825fb96df golang.org/x/net v0.0.0-20200320220750-118fecf932d8 // indirect - golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae // indirect + golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd // indirect golang.org/x/text v0.3.2 golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56 google.golang.org/api v0.20.0 // indirect - google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c // indirect + google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 gopkg.in/yaml.v2 v2.2.8 // indirect ) diff --git a/go.sum b/go.sum index c277b44880..06d522796e 100644 --- a/go.sum +++ b/go.sum @@ -47,6 +47,7 @@ github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSs github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= +github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrpgBZ1R8UNe3ddc+A= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= @@ -140,6 +141,8 @@ github.com/rs/cors v1.7.0 h1:+88SsELBHx5r+hZ8TCkggzSstaWNbDvThkVK8H6f9ik= github.com/rs/cors v1.7.0/go.mod h1:gFx+x8UowdsKA9AchylcLynDq+nNFfI8FkUZdN/jGCU= github.com/sirupsen/logrus v1.4.2 h1:SPIRibHv4MatM3XXNO2BJeFLZwZ2LvZgfQ5+UNI2im4= github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE= +github.com/sirupsen/logrus v1.5.0 h1:1N5EYkVAPEywqZRJd7cwnRtCb6xJx7NH3T3WUTF980Q= +github.com/sirupsen/logrus v1.5.0/go.mod h1:+F7Ogzej0PZc/94MaYx/nvG9jOFMD2osvC3s+Squfpo= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/testify v1.2.2 h1:bSDNvY7ZPG5RlJ8otE/7V6gMiyenm9RtJ7IUVIAoJ1w= @@ -236,6 +239,8 @@ golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae h1:3tcmuaB7wwSZtelmiv479UjUB+vviwABz7a133ZwOKQ= golang.org/x/sys v0.0.0-20200321134203-328b4cd54aae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd h1:xhmwyvizuTgC2qz7ZlMluP20uW+C3Rm0FD/WLDX8884= +golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index 579ed1367b..6b2bb1b415 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -68,7 +68,7 @@ func (fi bindataFileInfo) Sys() interface{} { return nil } -var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x4d\x90\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x45\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x03\x6d\x67\x71\xd6\x0e\xa8\x4f\x32\x45\xfe\x3f\x3f\x8a\x42\xc0\xca\xd6\x08\x0a\x0d\x7a\x19\xb1\x86\x97\x57\x70\xde\x46\x5b\xdd\x2a\x34\xb7\xb2\x8b\x87\x16\xe3\xc1\xd6\x1c\xee\xd7\xf0\xbc\xde\xc2\xf7\xfb\xc7\x2d\x67\xcc\xc9\xea\x28\x15\x42\x4a\xfc\x41\x37\xc8\x7f\xd8\xcd\x51\xf1\x67\xd9\x62\xce\x8c\x31\xdd\x3a\xeb\x23\xdc\x30\x00\x80\x42\x59\xab\x1a\xe4\xca\x36\xd2\x28\x6e\xbd\x12\xca\xbb\xaa\xe8\x2f\xd9\x97\x2e\xea\x26\xec\xc8\x0a\x0a\xa5\xe3\xa1\x7b\xe1\x95\x6d\x45\x25\x6d\x10\x6f\x3a\xca\x1a\x1b\xa1\x4d\x44\x6f\x64\x23\xa4\xd3\x82\x52\x8b\x73\x1d\x29\x7d\xb2\x6e\x30\x9d\x31\x96\x12\x78\x69\x14\x42\x19\x60\x79\x07\x03\xc1\x4f\xf4\x27\x5d\x61\x00\x02\x10\xf3\x39\x83\x39\xa4\x54\x86\x33\x14\xcc\x05\x63\x27\xe9\xa7\xc1\xdd\xb7\x2e\x1e\x9e\xfa\x01\x05\xb8\x83\x0b\x09\x1f\x82\x4f\xd2\x39\x6d\x14\xa4\x1e\xf5\x62\xdb\x92\x6d\x19\xc6\x2c\x12\x1f\xbf\x94\xa0\x6c\x49\x74\xed\x22\xe5\x58\x17\xb5\x35\x50\xb6\x7c\xdd\x9f\x02\x14\xc4\xc7\x47\x3e\xde\x3b\xf2\xd3\x57\x4e\xa6\xbb\x21\xbb\x80\x6b\x41\xbd\x07\x69\xea\x89\xee\xdf\x13\xdf\xa0\x6f\x75\x08\x64\x31\xa9\xe9\xdf\x4c\xa4\x54\x0e\x83\xd9\x0c\x4f\x9d\x33\x9f\x90\x8b\x94\xc6\x53\xb1\x9c\x72\x0f\x6d\xa6\x2b\x2d\xfa\x2e\x4e\x4b\x28\x52\xfa\xa8\x85\x9c\x8b\xc5\xbb\xba\xd5\x01\xab\xe3\x46\x7a\xd9\xfe\x53\xd7\x5f\x3c\x68\x6c\xea\xb1\x8d\xeb\xda\xbc\x98\x8c\x00\xcd\x79\xc6\x29\xc1\xf0\x93\x19\xdb\x77\xa6\x7a\xf7\x98\xd6\xeb\x37\x49\x08\xbb\x47\x5a\x9d\x0a\x5d\xb4\xfe\xe6\x84\x5e\xef\x35\xfa\x29\xe9\xd6\x1e\xd1\xfc\x1e\x2f\x16\x40\xb1\x95\x35\x7b\x98\x4f\x72\x28\xa0\xd5\x0c\x68\xf3\xf8\x2f\x23\xfd\x2b\x6d\x19\xfa\x89\xf6\xb8\x1b\x1e\x63\xe7\x0d\x5c\x76\x9a\x5f\x75\xf3\x51\x33\x17\xcf\xc5\xff\x76\x72\x46\x9c\x03\x33\xe4\xfc\x27\x00\x00\xff\xff\xb4\x5d\x04\x73\xee\x03\x00\x00") +var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd5\x53\x10\x86\x0f\x4d\x90\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xd0\x6c\xd7\x40\xb5\x19\x45\x88\x2d\x09\x94\x9c\xa1\x15\xf4\xee\x83\x6c\x77\x71\xd6\x0e\x98\x4f\x32\x45\xf2\xe7\x47\xfd\x42\xc0\xca\xd6\x08\x0a\x0d\x92\x0c\x58\xc3\xcb\x2b\x38\xb2\xc1\x56\x37\x0a\xcd\x8d\xec\xc2\xa1\xc5\x70\xb0\x35\x87\xbb\x35\x3c\xad\xb7\xf0\xed\xee\x61\xcb\x19\x73\xb2\x3a\x4a\x85\x10\x23\xbf\xd7\x0d\xf2\xef\x76\x73\x54\xfc\x49\xb6\x98\x12\x63\x4c\xb7\xce\x52\x80\x6b\x06\x00\x50\x28\x6b\x55\x83\x5c\xd9\x46\x1a\xc5\x2d\x29\xa1\xc8\x55\x45\x7f\xc9\xae\xba\xa0\x1b\xbf\xcb\x52\x50\x28\x1d\x0e\xdd\x0b\xaf\x6c\x2b\x2a\x69\xbd\x78\xd3\x41\xd6\xd8\x08\x6d\x02\x92\x91\x8d\x90\x4e\x8b\x9c\x5a\xb0\xab\xff\x4b\xce\x4a\xc2\x23\x9d\x90\x44\xab\xeb\xba\xc1\x5f\x92\xb0\x60\x33\xc6\x62\x04\x92\x46\x21\x94\x1e\x96\xb7\x30\x80\x3c\x23\x9d\x74\x85\x1e\x32\x87\x98\xcf\x19\xcc\x21\xc6\xd2\xbf\xb3\xc1\x5c\x30\x76\x92\x34\x0d\xee\xbe\x76\xe1\xf0\xd8\xef\xc9\xc3\x2d\x9c\x81\xf8\x10\x7c\x94\xce\x69\xa3\x20\xf6\xc4\x67\xd9\x36\xcb\x96\x7e\xcc\xca\xcd\xc7\x2f\x46\x28\xdb\xdc\x74\xed\x42\xce\xb1\x2e\x68\x6b\xa0\x6c\xf9\xba\x3f\x79\x28\x32\x31\x1f\x89\x79\xaf\xc8\x4f\x5f\x78\x16\xdd\x0d\xd9\x05\x5c\x36\xd4\x7b\x90\xa6\x9e\xf4\xfd\x73\xe2\x1b\xa4\x56\x7b\x9f\x25\x26\x35\xfd\xd3\x89\x18\xcb\x61\x31\x9b\xe1\xc5\x53\xe2\x13\x72\x11\xe3\x78\x2a\x96\x53\xee\x61\xcc\x78\xd1\x2b\x7f\x67\xa5\x25\x14\x31\x7e\x36\x42\x4a\xc5\xe2\x43\xdd\xea\x80\xd5\x71\x23\x49\xb6\x7f\xd5\xf5\x17\xf7\x1a\x9b\x7a\x1c\xe3\xb2\x36\x2d\x26\x2b\x40\xf3\xbe\xe3\x18\x61\xf8\x49\x8c\xed\x3b\x53\x7d\x78\x4c\x4b\xfa\x4d\x66\x84\xdd\x43\x36\x53\x85\x2e\x58\xba\x3e\x21\xe9\xbd\x46\x9a\x92\x6e\xed\x11\xcd\xcf\xf1\x62\x01\x39\xb6\xb2\x66\x0f\xf3\x49\x4e\x0e\x68\x35\x83\xec\x45\xfe\xc3\x48\x7a\x7d\xee\x0d\x39\xe9\x3d\x7a\x83\x30\x74\x64\xe0\x6c\x54\x7e\x31\xcd\x67\xc3\x9c\x35\x17\xff\xf2\xe4\x2c\x73\x0e\xcc\x90\xd2\xef\x00\x00\x00\xff\xff\xf3\xc0\x3d\x9c\xf5\x03\x00\x00") func templatesAuth_method_mappingGoTmplBytes() ([]byte, error) { return bindataRead( @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1006, mode: os.FileMode(420), modTime: time.Unix(1584978801, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1013, mode: os.FileMode(420), modTime: time.Unix(1585129064, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl index 4240a0dffd..b08d37acdd 100644 --- a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl +++ b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl @@ -7,7 +7,7 @@ import ( "google.golang.org/grpc" utils_auth "github.com/caos/zitadel/internal/api/auth" - utils_grpc "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) {{ range $s := .File.Services }} @@ -29,7 +29,7 @@ var {{$s.Name}}_AuthMethods = utils_auth.MethodMapping { } func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) + return middleware.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) } {{ end }} \ No newline at end of file diff --git a/pkg/admin/admin.go b/pkg/admin/admin.go index 968bb7fa75..775398faca 100644 --- a/pkg/admin/admin.go +++ b/pkg/admin/admin.go @@ -3,9 +3,9 @@ package admin import ( "context" + "github.com/caos/logging" app "github.com/caos/zitadel/internal/admin" "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/admin/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config *Config, authZ *auth.Config) error { - return errors.ThrowUnimplemented(nil, "ADMIN-n8vw5", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-BmOLI").OnError(err).Panic("unable to start api") + return err } diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go new file mode 100644 index 0000000000..54ba31a3b1 --- /dev/null +++ b/pkg/admin/api/api.go @@ -0,0 +1,28 @@ +package api + +import ( + "context" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/admin/api/grpc" +) + +type API struct { + grpcServer grpc.Server + gateway grpc.Gateway +} + +type Config struct { + GRPCServer grpc.Config + Gateway grpc.GatewayConfig +} + +func Start(ctx context.Context, conf *Config) error { + api := &API{ + grpcServer: *grpc.StartServer(conf.GRPCServer), + gateway: *grpc.StartGateway(conf.Gateway), + } + server.StartServer(ctx, &api.grpcServer) + server.StartGateway(ctx, &api.gateway) + + return nil +} diff --git a/pkg/admin/api/config.go b/pkg/admin/api/config.go deleted file mode 100644 index b63086cc83..0000000000 --- a/pkg/admin/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC *grpc.Config -} diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go index 5dc2d20c11..e7c24e6727 100644 --- a/pkg/admin/api/grpc/admin.pb.authoptions.go +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -6,7 +6,7 @@ import ( "google.golang.org/grpc" utils_auth "github.com/caos/zitadel/internal/api/auth" - utils_grpc "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) /** @@ -37,5 +37,5 @@ var AdminService_AuthMethods = utils_auth.MethodMapping{ } func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) + return middleware.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) } diff --git a/pkg/auth/api/api.go b/pkg/auth/api/api.go new file mode 100644 index 0000000000..bb6db2d066 --- /dev/null +++ b/pkg/auth/api/api.go @@ -0,0 +1,28 @@ +package api + +import ( + "context" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/auth/api/grpc" +) + +type API struct { + grpcServer grpc.Server + gateway grpc.Gateway +} + +type Config struct { + GRPCServer grpc.Config + Gateway grpc.GatewayConfig +} + +func Start(ctx context.Context, conf *Config) error { + api := &API{ + grpcServer: *grpc.StartServer(conf.GRPCServer), + gateway: *grpc.StartGateway(conf.Gateway), + } + server.StartServer(ctx, &api.grpcServer) + server.StartGateway(ctx, &api.gateway) + + return nil +} diff --git a/pkg/auth/api/config.go b/pkg/auth/api/config.go deleted file mode 100644 index b63086cc83..0000000000 --- a/pkg/auth/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC *grpc.Config -} diff --git a/pkg/auth/api/grpc/auth.pb.authoptions.go b/pkg/auth/api/grpc/auth.pb.authoptions.go index 669a2836b9..c84b7dc329 100644 --- a/pkg/auth/api/grpc/auth.pb.authoptions.go +++ b/pkg/auth/api/grpc/auth.pb.authoptions.go @@ -6,7 +6,7 @@ import ( "google.golang.org/grpc" utils_auth "github.com/caos/zitadel/internal/api/auth" - utils_grpc "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) /** @@ -127,5 +127,5 @@ var AuthService_AuthMethods = utils_auth.MethodMapping{ } func AuthService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, AuthService_AuthMethods) + return middleware.AuthorizationInterceptor(verifier, authConf, AuthService_AuthMethods) } diff --git a/pkg/auth/auth.go b/pkg/auth/auth.go index 21f3229f67..eedc1674c4 100644 --- a/pkg/auth/auth.go +++ b/pkg/auth/auth.go @@ -2,10 +2,10 @@ package auth import ( "context" + "github.com/caos/logging" "github.com/caos/zitadel/internal/api/auth" app "github.com/caos/zitadel/internal/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/auth/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config *Config, authZ *auth.Config) error { - return errors.ThrowUnimplemented(nil, "AUTH-l7Hdx", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-BmOLI").OnError(err).Panic("unable to start api") + return err } diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go new file mode 100644 index 0000000000..9e874b2828 --- /dev/null +++ b/pkg/management/api/api.go @@ -0,0 +1,28 @@ +package api + +import ( + "context" + "github.com/caos/zitadel/internal/api/grpc/server" + "github.com/caos/zitadel/pkg/management/api/grpc" +) + +type API struct { + grpcServer grpc.Server + gateway grpc.Gateway +} + +type Config struct { + GRPCServer grpc.Config + Gateway grpc.GatewayConfig +} + +func Start(ctx context.Context, conf *Config) error { + api := &API{ + grpcServer: *grpc.StartServer(conf.GRPCServer), + gateway: *grpc.StartGateway(conf.Gateway), + } + server.StartServer(ctx, &api.grpcServer) + server.StartGateway(ctx, &api.gateway) + + return nil +} diff --git a/pkg/management/api/config.go b/pkg/management/api/config.go deleted file mode 100644 index b63086cc83..0000000000 --- a/pkg/management/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC *grpc.Config -} diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go index 11207192ee..b6c8a95c03 100644 --- a/pkg/management/api/grpc/management.pb.authoptions.go +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -6,7 +6,7 @@ import ( "google.golang.org/grpc" utils_auth "github.com/caos/zitadel/internal/api/auth" - utils_grpc "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) /** @@ -517,5 +517,5 @@ var ManagementService_AuthMethods = utils_auth.MethodMapping{ } func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { - return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) + return middleware.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) } diff --git a/pkg/management/api/grpc/management.pb.go b/pkg/management/api/grpc/management.pb.go index 81e574c5c5..2cb6dc961b 100644 --- a/pkg/management/api/grpc/management.pb.go +++ b/pkg/management/api/grpc/management.pb.go @@ -8229,503 +8229,503 @@ func init() { func init() { proto.RegisterFile("management.proto", fileDescriptor_edc174f991dc0a25) } var fileDescriptor_edc174f991dc0a25 = []byte{ - // 7935 bytes of a gzipped FileDescriptorProto + // 7933 bytes of a gzipped FileDescriptorProto 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7d, 0x6b, 0x70, 0x1b, 0x59, 0x76, 0xde, 0x34, 0x00, 0xbe, 0x0e, 0x5f, 0xe0, 0xe5, 0x0b, 0x02, 0x1f, 0xa2, 0x5a, 0x6f, 0x48, 0x22, 0x24, 0x8e, 0x46, 0x9a, 0x91, 0x76, 0xa4, 0x01, 0x09, 0x88, 0x82, 0x87, 0x04, 0xb8, 0x20, 0x35, 0xca, 0xd8, 0xce, 0xc0, 0x2d, 0xa0, 0x05, 0xc2, 0x03, 0xa2, 0xb1, 0xdd, 0x0d, 0x69, 0xb8, - 0x93, 0xa9, 0x4d, 0x71, 0xab, 0x52, 0x2e, 0x27, 0x8e, 0xbd, 0xbb, 0x71, 0x52, 0xd9, 0xaa, 0xcd, - 0x26, 0x9b, 0x87, 0x93, 0x6c, 0x26, 0x8f, 0xf2, 0xb0, 0x6a, 0x6d, 0x27, 0x1b, 0x57, 0x36, 0x49, - 0x25, 0xb6, 0x7f, 0xc4, 0xd9, 0x54, 0x5c, 0xa9, 0xf2, 0x9f, 0x6c, 0x12, 0x57, 0xe5, 0x57, 0xca, - 0x79, 0xfc, 0xf0, 0xfc, 0x70, 0x5c, 0xf7, 0xd1, 0xdd, 0xb7, 0x5f, 0x40, 0x37, 0x48, 0x6a, 0xb5, - 0xde, 0xf9, 0x25, 0xe2, 0x3e, 0xbf, 0x73, 0xee, 0x39, 0xe7, 0x9e, 0x7b, 0xee, 0xed, 0x23, 0x88, - 0xef, 0x49, 0x4d, 0xa9, 0x26, 0xef, 0xc9, 0x4d, 0x7d, 0xb9, 0xa5, 0x2a, 0xba, 0x82, 0x16, 0x2b, - 0x92, 0xa2, 0x2d, 0x7f, 0xb1, 0xae, 0x4b, 0x55, 0xb9, 0xb1, 0xcc, 0x55, 0x4b, 0xad, 0xfa, 0xf2, - 0xb3, 0x1b, 0xc9, 0xf9, 0x9a, 0xa2, 0xd4, 0x1a, 0x72, 0x5a, 0x6a, 0xd5, 0xd3, 0x52, 0xb3, 0xa9, - 0xe8, 0x92, 0x5e, 0x57, 0x9a, 0x1a, 0xed, 0x9d, 0x9c, 0x63, 0xb5, 0xe4, 0xd7, 0x93, 0xf6, 0xd3, - 0xb4, 0xbc, 0xd7, 0xd2, 0xf7, 0x59, 0xe5, 0xbc, 0xb3, 0x52, 0xd3, 0xd5, 0x76, 0x85, 0x4d, 0x9c, - 0x3c, 0xed, 0xac, 0xd5, 0xeb, 0x7b, 0xb2, 0xa6, 0x4b, 0x7b, 0x2d, 0xd6, 0xe0, 0x2a, 0xf9, 0xa7, - 0x72, 0xad, 0x26, 0x37, 0xaf, 0x69, 0xcf, 0xa5, 0x5a, 0x4d, 0x56, 0xd3, 0x4a, 0x8b, 0xcc, 0xee, - 0x81, 0x64, 0xf6, 0x99, 0xd4, 0xa8, 0x57, 0x25, 0x5d, 0x4e, 0x1b, 0x7f, 0xb0, 0x8a, 0x25, 0xe7, - 0x3c, 0x55, 0x59, 0xab, 0xa8, 0xf5, 0x96, 0xae, 0xa8, 0xac, 0x45, 0x42, 0x6a, 0xeb, 0xbb, 0x74, - 0x64, 0x63, 0x02, 0x5a, 0x23, 0xbe, 0x07, 0xa3, 0x6b, 0xbb, 0x52, 0xb3, 0x26, 0x97, 0xe4, 0x2f, - 0xb4, 0x65, 0x4d, 0x47, 0x63, 0x10, 0xa9, 0x57, 0x13, 0xc2, 0x92, 0x70, 0x69, 0xa8, 0x14, 0xa9, - 0x57, 0xd1, 0x14, 0xf4, 0x35, 0xea, 0x7b, 0x75, 0x3d, 0x11, 0x59, 0x12, 0x2e, 0xc5, 0x4a, 0xf4, - 0x07, 0xba, 0x08, 0xe3, 0x1a, 0xee, 0xd0, 0xac, 0xc8, 0x65, 0xe5, 0xe9, 0x53, 0x4d, 0xd6, 0x13, - 0x51, 0x52, 0x3f, 0x66, 0x14, 0x17, 0x49, 0xa9, 0xb8, 0x0f, 0x03, 0x74, 0x7c, 0x0d, 0xbd, 0x05, - 0x03, 0x15, 0xfa, 0x67, 0x42, 0x58, 0x8a, 0x5e, 0x1a, 0x5e, 0xb9, 0xb0, 0xdc, 0x79, 0x65, 0x96, - 0x19, 0x32, 0xa3, 0x1b, 0x9a, 0x81, 0x7e, 0x36, 0x19, 0x05, 0xc3, 0x7e, 0x59, 0x18, 0xa3, 0x1c, - 0x46, 0xf1, 0xdf, 0x0b, 0xd0, 0x4f, 0x47, 0x40, 0x77, 0x61, 0x98, 0x8e, 0x51, 0xc6, 0x6c, 0x23, - 0xd4, 0x0d, 0xaf, 0x24, 0x97, 0x29, 0xdf, 0x96, 0x0d, 0xbe, 0x2d, 0xef, 0x18, 0xeb, 0x53, 0x02, - 0xda, 0x3c, 0x2b, 0xe9, 0x32, 0x5a, 0x00, 0x90, 0x9f, 0xc9, 0x4d, 0xbd, 0xac, 0xef, 0xb7, 0x64, - 0x32, 0xf3, 0x50, 0x69, 0x88, 0x94, 0xec, 0xec, 0xb7, 0x64, 0x94, 0x84, 0x41, 0x83, 0x66, 0x36, - 0xbf, 0xf9, 0x1b, 0xd7, 0xed, 0x29, 0xd5, 0xfa, 0xd3, 0xba, 0xac, 0x26, 0x62, 0xa4, 0xa3, 0xf9, - 0x1b, 0x5d, 0x81, 0x58, 0x55, 0xd2, 0xa5, 0x44, 0x1f, 0x01, 0x33, 0xeb, 0x02, 0xb3, 0x4d, 0x44, - 0xa9, 0x44, 0x1a, 0x89, 0xf7, 0x60, 0x34, 0xd3, 0x6a, 0x35, 0xea, 0x15, 0x22, 0x11, 0xf9, 0xac, - 0x6b, 0x99, 0x16, 0x00, 0x5a, 0xaa, 0xf2, 0xb3, 0x72, 0x45, 0x2f, 0xd7, 0xab, 0x06, 0x48, 0x56, - 0x92, 0xaf, 0x8a, 0x73, 0x30, 0xb4, 0xc5, 0x7e, 0xb8, 0xfa, 0x8a, 0x09, 0xe8, 0x7f, 0xa4, 0xc9, - 0xaa, 0x47, 0xcd, 0x59, 0x18, 0xc6, 0x35, 0xb9, 0x3d, 0xa9, 0xde, 0xc8, 0x67, 0x31, 0x9f, 0x65, - 0xfc, 0x27, 0x6b, 0x41, 0x7f, 0x88, 0xef, 0xc1, 0xc4, 0xa3, 0x66, 0xfd, 0x0b, 0x6d, 0x19, 0x37, - 0x35, 0xc4, 0xe8, 0x22, 0x0c, 0xb5, 0x35, 0x59, 0x2d, 0x37, 0xa5, 0x3d, 0xca, 0xef, 0xa1, 0x55, - 0xf8, 0x74, 0x75, 0x40, 0xed, 0x8b, 0x0b, 0x89, 0x7f, 0x27, 0x94, 0x06, 0x71, 0x65, 0x41, 0xda, - 0x93, 0xd1, 0x92, 0x31, 0x66, 0xc4, 0xd5, 0x88, 0x8d, 0x7f, 0x03, 0x10, 0x3f, 0xbe, 0xd6, 0x52, - 0x9a, 0x9a, 0x8c, 0xe6, 0x60, 0xa8, 0xae, 0x95, 0xdb, 0xa4, 0x82, 0x4c, 0x30, 0x58, 0x1a, 0xac, - 0x6b, 0xb4, 0xa1, 0xf8, 0x3f, 0xfa, 0x60, 0x62, 0x4d, 0x95, 0x25, 0xbd, 0x37, 0x4c, 0x97, 0x01, - 0x9e, 0xd6, 0x55, 0x4d, 0xa7, 0x2d, 0xdd, 0xc0, 0x86, 0x48, 0x2d, 0x69, 0x7a, 0x11, 0x86, 0x1a, - 0x92, 0xd1, 0x32, 0xea, 0x1e, 0x13, 0x57, 0x92, 0x86, 0xe7, 0x61, 0xa8, 0x59, 0xaf, 0xbc, 0x4f, - 0x1b, 0x12, 0x59, 0x58, 0x1d, 0xfc, 0x74, 0xb5, 0x4f, 0x8d, 0x92, 0x66, 0xb8, 0x8a, 0x34, 0xbb, - 0x02, 0x23, 0xd5, 0xba, 0xd6, 0x6a, 0x48, 0xfb, 0xb4, 0x65, 0x9f, 0xa3, 0xe5, 0x30, 0xab, 0x25, - 0x8d, 0x6f, 0x03, 0x6a, 0xa9, 0xf2, 0x53, 0x59, 0x55, 0xe5, 0x6a, 0xb9, 0x21, 0x35, 0x6b, 0x6d, - 0xa9, 0x26, 0x27, 0xfa, 0x1d, 0x5d, 0x26, 0xcc, 0x36, 0x1b, 0xac, 0x09, 0xba, 0x07, 0xfd, 0x35, - 0xb9, 0x59, 0x95, 0xd5, 0xc4, 0xc0, 0x92, 0x70, 0x69, 0xac, 0xbb, 0x26, 0xae, 0x93, 0xd6, 0x25, - 0xd6, 0x0b, 0x89, 0xc6, 0xa2, 0x0d, 0x92, 0xb9, 0x46, 0x3e, 0x5d, 0x1d, 0x52, 0x07, 0x08, 0xc5, - 0x3f, 0x63, 0x2c, 0x1b, 0x4a, 0xc1, 0x44, 0x5d, 0x2b, 0x93, 0xbf, 0xcb, 0xcf, 0x64, 0x15, 0x0b, - 0x7d, 0x35, 0x31, 0x44, 0x16, 0x6a, 0xbc, 0xae, 0x11, 0x91, 0x7a, 0x87, 0x15, 0xa3, 0x05, 0xe8, - 0x6b, 0xed, 0x2a, 0x4d, 0x39, 0x31, 0x4c, 0xc6, 0x1b, 0xf8, 0x74, 0x35, 0xa6, 0x46, 0x12, 0x53, - 0x25, 0x5a, 0xca, 0x86, 0x22, 0x7f, 0x5b, 0x43, 0x8d, 0x18, 0x43, 0x6d, 0xe1, 0x72, 0x73, 0x28, - 0x11, 0x06, 0x2a, 0x4a, 0xbb, 0xa9, 0xab, 0xfb, 0x89, 0x51, 0x07, 0x23, 0x8c, 0x0a, 0x74, 0x0e, - 0x06, 0x1b, 0x4a, 0x45, 0x6a, 0xd4, 0xf5, 0xfd, 0xc4, 0x98, 0x73, 0x29, 0x8c, 0x1a, 0x74, 0x19, - 0x86, 0x5b, 0x8a, 0xa6, 0x4b, 0x8d, 0x72, 0x45, 0xa9, 0xca, 0x89, 0x71, 0x47, 0x43, 0xa0, 0x95, - 0x6b, 0x4a, 0x15, 0x0b, 0x71, 0xbf, 0x2a, 0xd7, 0xea, 0x4a, 0x33, 0x11, 0x77, 0xb4, 0x62, 0xe5, - 0x28, 0x0d, 0x63, 0x9a, 0xae, 0xca, 0xb2, 0x5e, 0x96, 0xaa, 0x55, 0x55, 0xd6, 0xb4, 0xc4, 0x84, - 0xa3, 0xe5, 0x28, 0xad, 0xcf, 0xd0, 0x6a, 0x74, 0x16, 0x06, 0x5b, 0x92, 0xa6, 0x3d, 0x57, 0xd4, - 0x6a, 0x02, 0xf1, 0x5c, 0x79, 0x58, 0x32, 0x2b, 0xc4, 0x3f, 0xea, 0x87, 0x18, 0x96, 0x70, 0x97, - 0x39, 0xb8, 0x0f, 0x7d, 0x9a, 0x8e, 0x4d, 0x5d, 0x84, 0xac, 0xef, 0xe5, 0x6e, 0xeb, 0x8b, 0x07, - 0xd9, 0xc6, 0x1d, 0x4a, 0xb4, 0x1f, 0xba, 0x0f, 0xa3, 0x15, 0xac, 0x40, 0x75, 0xa5, 0x49, 0x6d, - 0x66, 0xb4, 0xab, 0xcd, 0x1c, 0x31, 0x3a, 0x10, 0xab, 0xe9, 0x30, 0xb9, 0xb1, 0x50, 0x26, 0xf7, - 0x0d, 0x00, 0xa2, 0x55, 0x0d, 0xa5, 0x56, 0x6f, 0x32, 0x0b, 0xd9, 0xa9, 0x2f, 0xd1, 0xc1, 0x0d, - 0xdc, 0x18, 0xe5, 0x20, 0x6e, 0xb0, 0xa7, 0x4c, 0x47, 0xac, 0x12, 0x8d, 0xe8, 0x3c, 0xc0, 0xb8, - 0xd1, 0x87, 0x6e, 0x18, 0x55, 0x6c, 0x5e, 0x2c, 0x5b, 0x31, 0x40, 0x4d, 0xb7, 0x69, 0x1f, 0x16, - 0x6c, 0xf6, 0x61, 0x90, 0x1a, 0x5b, 0xcb, 0x26, 0xcc, 0xf1, 0x36, 0x61, 0x88, 0xf6, 0x35, 0xed, - 0xc0, 0x19, 0x87, 0x82, 0x03, 0xa9, 0xb7, 0xa9, 0xf5, 0x1c, 0x6f, 0x2a, 0x86, 0x69, 0x7f, 0xd3, - 0x40, 0x5c, 0xf3, 0xd4, 0xf9, 0x11, 0xd2, 0xaa, 0xa3, 0xa6, 0x8f, 0xf6, 0xa4, 0xe9, 0xa6, 0xc9, - 0x1f, 0xe3, 0x4c, 0xbe, 0xb7, 0x6e, 0x8f, 0x7b, 0xeb, 0xf6, 0x94, 0xa1, 0xdb, 0x71, 0x3a, 0x42, - 0x07, 0x95, 0x9e, 0xf0, 0x56, 0xe9, 0x84, 0xa5, 0xd2, 0x44, 0x13, 0x2c, 0x45, 0x4e, 0x72, 0x8a, - 0x3c, 0xc9, 0x18, 0x6d, 0xa8, 0xef, 0x69, 0xbb, 0xfa, 0x4e, 0x91, 0x6a, 0x5e, 0x69, 0x67, 0x4c, - 0xa5, 0x9d, 0x26, 0x75, 0x86, 0xaa, 0x9e, 0x77, 0xa9, 0xea, 0x0c, 0xa9, 0xb7, 0x2b, 0xa8, 0xf8, - 0xc7, 0x02, 0x4c, 0x10, 0xb5, 0x91, 0x25, 0xb5, 0xb2, 0x6b, 0xec, 0x31, 0x96, 0x8b, 0x22, 0x78, - 0xbb, 0x28, 0x36, 0x37, 0xea, 0x3d, 0x18, 0xd3, 0x14, 0x55, 0xaf, 0x37, 0x6b, 0xe5, 0x8a, 0xd2, - 0x68, 0xef, 0x35, 0x89, 0x9a, 0x8d, 0xad, 0x5c, 0x0b, 0xa4, 0xaf, 0x64, 0xe2, 0xb7, 0xe5, 0x7d, - 0x62, 0x44, 0x0e, 0x84, 0xc8, 0xd2, 0x2b, 0xa5, 0x51, 0x36, 0xdc, 0x1a, 0x19, 0x0d, 0xc5, 0x21, - 0x2a, 0x69, 0x15, 0xa2, 0x7c, 0x83, 0x25, 0xfc, 0x27, 0xca, 0xc3, 0xc0, 0x17, 0xda, 0xb2, 0x5a, - 0x97, 0xb5, 0x44, 0x1f, 0x71, 0xc2, 0xd2, 0xc1, 0xa7, 0xfa, 0x7c, 0x5b, 0x56, 0xf7, 0x4b, 0x46, - 0x7f, 0xf1, 0x3b, 0x02, 0x8c, 0x3b, 0x2a, 0x51, 0x1e, 0xa2, 0xef, 0xcb, 0xfb, 0x84, 0xf6, 0x23, - 0x50, 0x81, 0xc7, 0x40, 0x59, 0xe8, 0xdf, 0x93, 0xf5, 0x5d, 0xa5, 0xca, 0x6c, 0xd8, 0xd5, 0x6e, - 0xa3, 0xd1, 0x91, 0x36, 0x49, 0x9f, 0x12, 0xeb, 0x8b, 0xf9, 0xfe, 0x4c, 0x6a, 0xb4, 0xd9, 0xde, - 0x5c, 0xa2, 0x3f, 0xc4, 0xbf, 0x2d, 0x00, 0xe2, 0xd7, 0x8e, 0xf9, 0x14, 0xe1, 0x16, 0xef, 0x0c, - 0x8c, 0xe8, 0x0a, 0x96, 0x2f, 0x55, 0xd6, 0xda, 0x0d, 0xc3, 0xf9, 0x1c, 0x26, 0x65, 0x25, 0x52, - 0x84, 0x3e, 0x87, 0x45, 0x8c, 0x54, 0xc6, 0x08, 0xb3, 0xcf, 0x05, 0xe1, 0x48, 0x89, 0xf5, 0x11, - 0xff, 0x20, 0x42, 0xdd, 0xaf, 0x2d, 0x55, 0x79, 0x5a, 0x6f, 0xc8, 0xc7, 0x6f, 0xe4, 0xed, 0x76, - 0x2c, 0xda, 0xd1, 0x8e, 0xc5, 0x1c, 0x76, 0xcc, 0x66, 0xa4, 0xfa, 0x1c, 0x46, 0xca, 0x69, 0xe4, - 0xfa, 0xdd, 0x46, 0xce, 0xdb, 0x8e, 0x0d, 0x74, 0xb7, 0x63, 0x83, 0x3d, 0xd9, 0x31, 0x9b, 0x3d, - 0x1f, 0xb2, 0xdb, 0x73, 0xf1, 0xb7, 0x23, 0x90, 0x78, 0xd4, 0xaa, 0x32, 0x77, 0x91, 0xb1, 0xdb, - 0xef, 0x40, 0xf4, 0x99, 0x73, 0xd8, 0x99, 0xd5, 0xe2, 0x9f, 0x85, 0x21, 0xf3, 0xd0, 0xe0, 0x75, - 0x9c, 0xe4, 0xdc, 0xfd, 0x8e, 0xfb, 0x49, 0xd4, 0x73, 0x3f, 0x11, 0x9f, 0xc1, 0x8c, 0xb5, 0x56, - 0xa4, 0xca, 0x6f, 0xa5, 0xba, 0x1e, 0x2d, 0x42, 0xcd, 0xcb, 0xc8, 0x22, 0x5b, 0x93, 0x17, 0x59, - 0x74, 0x93, 0x8b, 0x74, 0xdd, 0xe4, 0xa2, 0x9e, 0x9b, 0x9c, 0xd8, 0xe6, 0xc9, 0x22, 0x55, 0x7e, - 0x64, 0x9d, 0xb6, 0xcd, 0xb5, 0x3a, 0xf4, 0xe9, 0x6a, 0xbf, 0x1a, 0x8b, 0x0b, 0x5d, 0xdc, 0x65, - 0x9f, 0x69, 0x7f, 0x55, 0xa0, 0x36, 0xc6, 0x70, 0x3b, 0x9d, 0x93, 0x71, 0x7b, 0x6f, 0xc4, 0x7f, - 0xef, 0x8d, 0x76, 0xde, 0x7b, 0x63, 0x1d, 0xf6, 0xde, 0xbe, 0x2e, 0x7b, 0x6f, 0xbf, 0xd7, 0xde, - 0xfb, 0xbf, 0x05, 0x5e, 0x61, 0x59, 0xa9, 0x1f, 0xbf, 0x44, 0x07, 0x09, 0xdd, 0x4e, 0x04, 0xd1, - 0xa0, 0x27, 0x82, 0x58, 0xa0, 0x13, 0x41, 0x5f, 0xe0, 0x13, 0x41, 0x7f, 0xc7, 0x13, 0x81, 0x58, - 0x84, 0x91, 0xcd, 0x76, 0x43, 0xaf, 0x3f, 0x90, 0x2a, 0xba, 0xa2, 0x6a, 0xe8, 0x3e, 0xc4, 0xf6, - 0x9e, 0x4a, 0x46, 0x30, 0xe5, 0x4a, 0x37, 0x2d, 0xe5, 0xfa, 0x96, 0x48, 0x47, 0xf1, 0xe7, 0x05, - 0x18, 0xe6, 0x4a, 0xd1, 0x5d, 0x88, 0x91, 0x10, 0x07, 0xdd, 0xbd, 0x2f, 0x76, 0x1d, 0xf0, 0xa9, - 0xb4, 0xb3, 0xdf, 0x92, 0x4b, 0xa4, 0x13, 0xba, 0x67, 0xdf, 0x8c, 0x2e, 0x75, 0xed, 0xfd, 0x20, - 0xc3, 0xef, 0x45, 0xe2, 0x3c, 0xc0, 0x16, 0xf3, 0xc1, 0x3d, 0x02, 0x11, 0x0f, 0x61, 0xdc, 0xa8, - 0xf5, 0x5b, 0xe6, 0xf3, 0xdc, 0x81, 0xc9, 0xa1, 0x19, 0xfc, 0x91, 0xe9, 0x02, 0x4c, 0x95, 0x64, - 0x4d, 0xd6, 0xbb, 0x0c, 0x27, 0x3e, 0x83, 0xc5, 0x6d, 0xab, 0x55, 0x41, 0xd1, 0xeb, 0x4f, 0x59, - 0xf4, 0xc5, 0x0f, 0x40, 0x96, 0xb1, 0x8f, 0x32, 0xe0, 0x7a, 0x37, 0x06, 0xf0, 0x43, 0x5a, 0x7c, - 0x14, 0xaf, 0x42, 0xd2, 0x98, 0x74, 0x4d, 0xd9, 0x6b, 0x35, 0xe4, 0x0f, 0xea, 0xfa, 0xfe, 0x96, - 0xd2, 0xa8, 0x57, 0xf6, 0x3d, 0xf8, 0xf2, 0x49, 0x14, 0x12, 0x7e, 0xcd, 0x3d, 0xec, 0xe1, 0xb0, - 0x11, 0x19, 0xc4, 0x82, 0x19, 0x61, 0x9b, 0xb2, 0x55, 0x84, 0x32, 0xc6, 0x22, 0x52, 0x37, 0xb4, - 0xab, 0x4c, 0xd1, 0x89, 0x3a, 0x1f, 0x1c, 0x63, 0x47, 0x3b, 0x38, 0xf6, 0x85, 0x8d, 0xd5, 0xed, - 0xd5, 0x9b, 0xe5, 0x86, 0xdc, 0xac, 0xe9, 0xbb, 0x44, 0xa1, 0x62, 0xa5, 0xa1, 0xbd, 0x7a, 0x73, - 0x83, 0x14, 0xa0, 0xb3, 0x30, 0xba, 0x2b, 0x69, 0xe5, 0x86, 0xf2, 0x5c, 0x56, 0x2b, 0x92, 0x46, - 0xfd, 0x8d, 0xc1, 0xd2, 0xc8, 0xae, 0xa4, 0x6d, 0x18, 0x65, 0x46, 0xa3, 0x76, 0xab, 0xc5, 0x1a, - 0x0d, 0x9a, 0x8d, 0x1e, 0x19, 0x65, 0x78, 0x22, 0xdc, 0xa8, 0xd9, 0xde, 0x7b, 0x22, 0xab, 0x2c, - 0xac, 0x31, 0xb4, 0x2b, 0x69, 0x05, 0x52, 0x60, 0x54, 0x6b, 0xfb, 0x7b, 0x4f, 0x94, 0x06, 0x39, - 0xe3, 0xd1, 0xea, 0x6d, 0x52, 0x20, 0xfe, 0x1f, 0x01, 0x16, 0xfd, 0x96, 0x8d, 0xc6, 0xad, 0x50, - 0xca, 0xbe, 0x58, 0x02, 0x6f, 0x1b, 0xfe, 0x6f, 0xd4, 0xbe, 0x6c, 0x76, 0xaa, 0x23, 0x5d, 0xa9, - 0x8e, 0x06, 0xa1, 0x3a, 0xd6, 0x95, 0xea, 0xbe, 0xce, 0x54, 0xf7, 0x3b, 0xa9, 0xfe, 0x72, 0xc4, - 0x9f, 0x6a, 0x6a, 0xcd, 0x5d, 0x22, 0x9b, 0xf2, 0x10, 0xd9, 0x60, 0x5c, 0x88, 0x76, 0xe5, 0x42, - 0x2c, 0x08, 0x17, 0xfa, 0xba, 0x72, 0xa1, 0xbf, 0x33, 0x17, 0x06, 0x9c, 0x5c, 0x38, 0x0f, 0x93, - 0x06, 0x13, 0x32, 0x35, 0xd9, 0x57, 0xb3, 0xff, 0x63, 0x04, 0x26, 0x5c, 0xed, 0x7e, 0x1c, 0x55, - 0x7a, 0x09, 0x46, 0xf6, 0xa4, 0x0f, 0xca, 0x12, 0xe9, 0xbd, 0xaf, 0x31, 0xa5, 0x86, 0x3d, 0xe9, - 0x83, 0x0c, 0x6e, 0xb1, 0xaf, 0xa1, 0x4b, 0x10, 0x97, 0x3f, 0x68, 0xd5, 0x55, 0xb9, 0xfc, 0x5c, - 0x52, 0x9b, 0xb4, 0xd5, 0x00, 0xbd, 0x8d, 0xa0, 0xe5, 0x8f, 0x25, 0xb5, 0x89, 0x5b, 0x8a, 0x5f, - 0x11, 0x60, 0xd6, 0xc5, 0xd4, 0x1e, 0x14, 0xce, 0x89, 0x29, 0x12, 0x08, 0x53, 0xd4, 0x13, 0xd3, - 0xdf, 0xf2, 0xc2, 0x74, 0x0c, 0xea, 0xe0, 0xc4, 0x18, 0x0d, 0x84, 0x31, 0xe6, 0x89, 0xf1, 0xb2, - 0x05, 0x71, 0x43, 0xa9, 0xbc, 0xaf, 0xb4, 0x75, 0x5f, 0xb9, 0xfd, 0x41, 0x04, 0xa6, 0x3d, 0xdb, - 0xfe, 0x38, 0xca, 0xee, 0x19, 0xb6, 0x06, 0xba, 0x2e, 0xef, 0xb5, 0x74, 0x43, 0x76, 0x87, 0xf1, - 0x1a, 0xb0, 0x22, 0xf4, 0x2a, 0xcc, 0x68, 0xbb, 0xca, 0xf3, 0x72, 0x43, 0xa9, 0xbc, 0x5f, 0x56, - 0xda, 0x7a, 0xf9, 0xa9, 0x54, 0x6f, 0xb4, 0x55, 0x59, 0x63, 0x96, 0x63, 0x12, 0xd7, 0x62, 0x46, - 0x16, 0xdb, 0xfa, 0x03, 0x56, 0x85, 0x65, 0x66, 0xce, 0x93, 0xc9, 0x3d, 0xc8, 0xb2, 0x13, 0x63, - 0x24, 0x0c, 0xc6, 0xa8, 0x3f, 0xc6, 0x7f, 0xe6, 0x87, 0xf1, 0x18, 0x64, 0xdb, 0x89, 0x39, 0x1a, - 0x06, 0x73, 0xcc, 0x1f, 0xf3, 0x2c, 0xf4, 0x15, 0xd5, 0x9a, 0xe7, 0x45, 0xd8, 0x50, 0x51, 0xad, - 0x65, 0x95, 0x3d, 0xa9, 0xde, 0xc4, 0x87, 0x97, 0x2a, 0xf9, 0x8b, 0x35, 0x60, 0xbf, 0xc4, 0xff, - 0x2f, 0x40, 0xb4, 0xa8, 0xd6, 0x5c, 0x94, 0x85, 0x75, 0x8d, 0x8b, 0x6a, 0xed, 0x25, 0x8a, 0xc5, - 0x23, 0x88, 0x71, 0x31, 0x1e, 0xf2, 0x37, 0xc7, 0x81, 0x7e, 0x1b, 0x07, 0x2e, 0xc0, 0x58, 0x51, - 0xad, 0x6d, 0xca, 0x78, 0x1f, 0x2c, 0x29, 0x0d, 0x59, 0xc3, 0x07, 0x63, 0x15, 0xff, 0x41, 0x4e, - 0x29, 0x43, 0x25, 0xfa, 0x43, 0xfc, 0x95, 0x08, 0xe1, 0x27, 0x6d, 0x88, 0x66, 0x61, 0x80, 0xc4, - 0x66, 0x4c, 0xa6, 0xf5, 0xe3, 0x9f, 0x79, 0x47, 0x10, 0x3e, 0xe2, 0x08, 0xc2, 0x9b, 0x91, 0x84, - 0x28, 0x1f, 0x49, 0xb0, 0x87, 0xb4, 0x62, 0x1d, 0x43, 0x5a, 0x7d, 0x8e, 0x90, 0x96, 0x89, 0xb5, - 0x9f, 0xc3, 0xea, 0x64, 0xde, 0x40, 0x28, 0xe6, 0xb9, 0x96, 0x6e, 0x30, 0xdc, 0xd2, 0x89, 0x3f, - 0x05, 0x93, 0x99, 0x6a, 0xd5, 0x62, 0x2a, 0x3b, 0x7b, 0x4c, 0x43, 0xbf, 0xa2, 0xd6, 0x2c, 0x8e, - 0xf5, 0x29, 0x6a, 0x2d, 0x5f, 0xe5, 0x39, 0x19, 0xb1, 0x71, 0xd2, 0x24, 0x2d, 0xca, 0x2f, 0xc3, - 0x7b, 0x30, 0x43, 0xef, 0x3b, 0x4e, 0x68, 0xfc, 0x87, 0x30, 0x53, 0x92, 0xf7, 0x94, 0x67, 0x47, - 0x1e, 0x5f, 0xfc, 0x58, 0x80, 0x59, 0x73, 0x90, 0x93, 0x8e, 0xda, 0x66, 0x1c, 0x51, 0xdb, 0xcb, - 0x01, 0x14, 0x96, 0x91, 0x67, 0x84, 0x6e, 0x3f, 0x16, 0x60, 0xc6, 0x85, 0xb7, 0x23, 0xe9, 0xa1, - 0xde, 0x36, 0xa0, 0x82, 0x15, 0xc6, 0xa7, 0x18, 0x6f, 0x06, 0xc6, 0xe8, 0x19, 0xcb, 0xff, 0x57, - 0x02, 0x4c, 0x79, 0xb5, 0x40, 0x05, 0x3e, 0xa0, 0xbf, 0x12, 0x72, 0x92, 0x17, 0x1c, 0xd5, 0xbf, - 0x05, 0x53, 0xec, 0x91, 0x03, 0xdd, 0x06, 0x0d, 0x8e, 0x2f, 0x32, 0x0b, 0xe6, 0xbe, 0xf2, 0x27, - 0xe5, 0xe2, 0x03, 0xb3, 0x1f, 0xdd, 0x9a, 0xfc, 0x0e, 0xf8, 0xc6, 0x38, 0x11, 0x9f, 0x71, 0x8a, - 0x30, 0xc8, 0xc6, 0xd1, 0xd0, 0x1a, 0x0c, 0xb2, 0xd7, 0x17, 0x46, 0x80, 0xa6, 0x6b, 0x3c, 0x85, - 0xf5, 0x2d, 0x99, 0x1d, 0xc5, 0xef, 0x45, 0x61, 0x80, 0x95, 0xba, 0xc0, 0x20, 0x1e, 0x0c, 0x33, - 0xcb, 0xab, 0x76, 0x7f, 0xe9, 0x6a, 0xc0, 0x19, 0x6d, 0x9b, 0xcd, 0x91, 0xf6, 0x0a, 0x97, 0xb9, - 0xeb, 0x0b, 0xb9, 0x53, 0xdd, 0x67, 0x31, 0x94, 0xfe, 0x80, 0x0e, 0x1f, 0x25, 0x80, 0x0b, 0x43, - 0x9d, 0x87, 0x31, 0x55, 0xd6, 0x94, 0xb6, 0x5a, 0x91, 0xcb, 0xca, 0xf3, 0x26, 0x0b, 0x62, 0x0f, - 0x95, 0x46, 0x8d, 0xd2, 0x22, 0x2e, 0xe4, 0x94, 0x70, 0x90, 0x57, 0xc2, 0x53, 0x30, 0x88, 0x8b, - 0xb9, 0x4b, 0x82, 0x01, 0x45, 0xad, 0x19, 0x77, 0xbe, 0xb8, 0x8a, 0x6d, 0x7b, 0xf4, 0xd6, 0x76, - 0x48, 0x31, 0x7d, 0x82, 0x53, 0x30, 0x58, 0x53, 0xa5, 0x26, 0x79, 0x7d, 0x43, 0xaf, 0x6c, 0x07, - 0xc8, 0xef, 0x7c, 0x55, 0xfc, 0x07, 0x02, 0x4c, 0x1b, 0x9c, 0x3e, 0x61, 0xcb, 0x75, 0xdf, 0x61, - 0xb9, 0x02, 0xcb, 0x9c, 0x61, 0xb7, 0xbe, 0x2a, 0x98, 0xba, 0x70, 0x94, 0x7b, 0xcd, 0x0d, 0xcb, - 0x3c, 0x45, 0x09, 0x90, 0x95, 0xa0, 0xa2, 0xe8, 0x65, 0x9c, 0xbe, 0x2b, 0x00, 0x72, 0xd7, 0xa3, - 0x0d, 0xde, 0x34, 0x5d, 0x0f, 0x35, 0xc1, 0x0b, 0x36, 0x4c, 0x29, 0x13, 0x7f, 0x77, 0xd7, 0xe8, - 0xdb, 0x11, 0x18, 0xb5, 0x35, 0xfe, 0xcc, 0x3d, 0xea, 0xe0, 0x1e, 0x7d, 0x1e, 0xe2, 0x36, 0x66, - 0x65, 0xaa, 0x55, 0x97, 0xa5, 0x0c, 0xe9, 0xb4, 0xec, 0xc0, 0xa4, 0x6d, 0x48, 0xf6, 0x84, 0xf0, - 0x88, 0xa3, 0xde, 0x73, 0x8c, 0x4a, 0xfd, 0xa2, 0xc0, 0xa3, 0x8a, 0x7b, 0x30, 0x66, 0xe8, 0xaa, - 0xd2, 0x90, 0xbd, 0xc8, 0xf4, 0xda, 0x10, 0x9c, 0xf7, 0xb0, 0x51, 0xf7, 0x3d, 0xec, 0x14, 0xf4, - 0xd5, 0x54, 0xa5, 0xdd, 0x62, 0xc2, 0x40, 0x7f, 0x88, 0xbf, 0x2e, 0xc0, 0x30, 0x37, 0x9f, 0xe3, - 0x79, 0xa1, 0xe0, 0x78, 0x5e, 0xd8, 0xeb, 0xdc, 0x47, 0x3e, 0x9c, 0x9b, 0xe0, 0xfb, 0x78, 0xf0, - 0xb7, 0x61, 0x82, 0xc3, 0xee, 0xc3, 0x69, 0x0f, 0xc8, 0xf8, 0xc8, 0x7a, 0x8a, 0xeb, 0x79, 0xd2, - 0xd6, 0x7a, 0xcd, 0x61, 0xad, 0x83, 0x6e, 0x77, 0x84, 0x2a, 0xc3, 0x62, 0xff, 0x9a, 0x00, 0x09, - 0x0f, 0xcc, 0xd4, 0x6a, 0x77, 0x59, 0xb6, 0x70, 0x3e, 0xe7, 0x96, 0xd3, 0xe7, 0xbc, 0x15, 0x02, - 0xaf, 0xa7, 0x61, 0xff, 0xb7, 0x02, 0xcc, 0x78, 0xb7, 0x41, 0x5b, 0xbc, 0x71, 0xbf, 0x19, 0x7a, - 0xa2, 0x17, 0x6c, 0xe0, 0x0f, 0x05, 0x98, 0xb3, 0xa9, 0xf7, 0x49, 0x8b, 0x4e, 0xce, 0x21, 0x3a, - 0xd7, 0x02, 0x72, 0xc8, 0x71, 0x4c, 0xf9, 0x17, 0x02, 0x24, 0x3d, 0x71, 0x9f, 0x80, 0xf8, 0x94, - 0x9c, 0xe2, 0xf3, 0x7a, 0x28, 0xcc, 0x9e, 0x02, 0xf4, 0x5b, 0x96, 0xf0, 0xbb, 0x8f, 0x2e, 0x25, - 0x5e, 0x84, 0x6e, 0xf5, 0x30, 0xd9, 0x0b, 0x16, 0xa2, 0xdf, 0x89, 0xc0, 0x30, 0xf7, 0xc8, 0xfb, - 0xc8, 0x61, 0xa4, 0x4c, 0xab, 0xf5, 0x92, 0x87, 0x91, 0x36, 0x61, 0x58, 0xa9, 0x57, 0x2b, 0xe5, - 0x8a, 0xd2, 0x7c, 0x5a, 0xaf, 0xb1, 0xcd, 0x3f, 0xd5, 0xf5, 0x90, 0x99, 0xcf, 0xae, 0xad, 0x91, - 0x1e, 0x0f, 0x5f, 0x29, 0x01, 0x1e, 0x80, 0xfe, 0x5a, 0x1d, 0x01, 0x90, 0x5a, 0x2d, 0x36, 0x9a, - 0xf8, 0x04, 0x26, 0x38, 0x6e, 0xb2, 0xa0, 0x63, 0x17, 0x89, 0xa6, 0x2c, 0x8f, 0xb8, 0x4e, 0x7c, - 0x7d, 0x3e, 0x27, 0xbe, 0x5f, 0x8e, 0x01, 0x58, 0x70, 0xd0, 0x59, 0x18, 0x55, 0xe5, 0x6a, 0x5d, - 0xc5, 0xc3, 0xb7, 0xd5, 0xba, 0xe1, 0xd9, 0x8d, 0x18, 0x85, 0x8f, 0xd4, 0xba, 0x86, 0x1e, 0x93, - 0x13, 0x0a, 0xb1, 0x0b, 0xe4, 0x8b, 0x02, 0x2d, 0x11, 0x59, 0x8a, 0x06, 0xf1, 0x60, 0xf1, 0x44, - 0x86, 0x45, 0x21, 0x27, 0x9e, 0x51, 0x95, 0xfb, 0xa5, 0xa1, 0x02, 0x0c, 0xd3, 0x23, 0x08, 0x1d, - 0x35, 0x4a, 0x46, 0xbd, 0x16, 0x64, 0xd4, 0x75, 0xdc, 0x8d, 0x0c, 0x09, 0x35, 0xe3, 0x4f, 0x0d, - 0xbd, 0x07, 0x71, 0xc9, 0x62, 0x20, 0xfd, 0xfa, 0x21, 0x46, 0x44, 0xef, 0xd5, 0x20, 0x83, 0x72, - 0xcc, 0x27, 0x43, 0x8f, 0x4b, 0xf6, 0x02, 0xec, 0x6c, 0x56, 0x1a, 0x75, 0x99, 0x9e, 0x99, 0x98, - 0xb3, 0x49, 0x0b, 0xf2, 0x55, 0xcc, 0x4a, 0x56, 0xa9, 0xc9, 0x15, 0x55, 0xd6, 0x59, 0xa0, 0x71, - 0x84, 0x16, 0x6e, 0x93, 0x32, 0xf4, 0xd3, 0x10, 0x97, 0xda, 0xfa, 0x6e, 0x99, 0xaa, 0x15, 0x45, - 0x38, 0x10, 0x30, 0x52, 0x81, 0x11, 0xb6, 0x75, 0xa6, 0x99, 0x04, 0xe0, 0x98, 0x64, 0xfb, 0x8d, - 0xde, 0x80, 0x53, 0x2d, 0x85, 0x3e, 0x42, 0x56, 0xda, 0x7a, 0xd9, 0xbe, 0xb2, 0x83, 0x64, 0x65, - 0x67, 0x70, 0x83, 0x0d, 0x52, 0x5f, 0xe2, 0xd6, 0x58, 0xfc, 0x46, 0x0c, 0xa6, 0x1d, 0x3c, 0x60, - 0x91, 0xf9, 0x2e, 0x02, 0xd8, 0x25, 0xc4, 0xe0, 0x96, 0xb0, 0x68, 0x20, 0x09, 0x8b, 0x9d, 0x88, - 0x84, 0xf5, 0x9d, 0x84, 0x84, 0xf5, 0x1f, 0xa3, 0x84, 0xbd, 0xb4, 0xf2, 0xf1, 0xcd, 0x18, 0xc4, - 0x2d, 0xbb, 0x11, 0xcc, 0x36, 0x9d, 0x87, 0x31, 0x9e, 0x59, 0xa6, 0x9d, 0x1a, 0xe5, 0x4a, 0xa9, - 0xe2, 0x7c, 0x26, 0x21, 0x3f, 0xfa, 0x12, 0xf2, 0x2a, 0x8c, 0xac, 0xf1, 0xa6, 0xce, 0x65, 0x0f, - 0x05, 0xb7, 0x3d, 0x24, 0xe7, 0x17, 0x8e, 0xe4, 0x97, 0xee, 0xfc, 0xc2, 0x61, 0xb3, 0x9d, 0x5f, - 0x3c, 0x30, 0xbf, 0x14, 0xe7, 0x17, 0x17, 0x2e, 0x8f, 0xf3, 0x8b, 0x77, 0x9b, 0x90, 0xe7, 0x17, - 0xd7, 0x20, 0x2f, 0xd8, 0xf5, 0xfc, 0xd7, 0x51, 0x18, 0x61, 0x0e, 0x30, 0xd1, 0xc3, 0x90, 0x9f, - 0x17, 0xa2, 0x73, 0x30, 0x46, 0x94, 0x56, 0xae, 0x96, 0x59, 0x58, 0x95, 0x0e, 0x3f, 0xc2, 0x4a, - 0x8b, 0x24, 0xba, 0x7a, 0x09, 0xe2, 0x7c, 0x2b, 0x2e, 0x04, 0x35, 0x66, 0xb5, 0x23, 0x81, 0x81, - 0xab, 0x80, 0xf8, 0x96, 0x2c, 0xe8, 0x4a, 0x7d, 0x84, 0xb8, 0xd5, 0x96, 0xc5, 0x5e, 0x17, 0x00, - 0x54, 0xa5, 0x21, 0x93, 0x01, 0x8d, 0xe8, 0xd4, 0x10, 0x2e, 0xc1, 0x63, 0x69, 0x68, 0xdd, 0xf0, - 0x9b, 0xa9, 0x62, 0xdf, 0x08, 0x78, 0x12, 0x20, 0x8c, 0xe8, 0xec, 0x40, 0x0f, 0x1e, 0xcd, 0x81, - 0x1e, 0x0a, 0xfb, 0x96, 0xc0, 0x58, 0x02, 0xfe, 0xc3, 0x21, 0x56, 0x46, 0xde, 0xb1, 0x7f, 0x60, - 0xc6, 0x19, 0x09, 0xf8, 0x60, 0x2e, 0x87, 0x7b, 0xed, 0x22, 0x1e, 0x6b, 0x67, 0xe7, 0x71, 0xd4, - 0xc1, 0x63, 0xf1, 0x89, 0x7d, 0xe6, 0xde, 0xbc, 0xed, 0x2e, 0x73, 0xdc, 0x37, 0x43, 0x60, 0x64, - 0x8e, 0x7c, 0x36, 0xe4, 0xf8, 0xe2, 0x12, 0x8c, 0xad, 0x53, 0x9a, 0x8c, 0x01, 0x9c, 0xd7, 0xfc, - 0xbf, 0x6a, 0x9d, 0x87, 0xe9, 0xf2, 0x9f, 0xb0, 0x05, 0xcd, 0x3a, 0x2c, 0xe8, 0xd5, 0x30, 0xb2, - 0x69, 0x9a, 0xd0, 0x5d, 0x33, 0x6a, 0x65, 0x03, 0x7d, 0xfc, 0x26, 0x54, 0x4c, 0xc3, 0x2c, 0x3f, - 0x53, 0xf7, 0x68, 0xf6, 0x3f, 0x8d, 0xd8, 0x05, 0xe3, 0xb3, 0x90, 0x76, 0xd7, 0x90, 0xf6, 0x9f, - 0xb7, 0xae, 0x8b, 0x38, 0x96, 0x65, 0xaa, 0xd5, 0x6e, 0x4b, 0xc9, 0x5f, 0x41, 0x45, 0x6c, 0x57, - 0x50, 0x3c, 0xbf, 0xa3, 0xde, 0xc1, 0xea, 0x18, 0xbf, 0x6a, 0x5f, 0xb6, 0xc2, 0x2a, 0x1c, 0x04, - 0x16, 0x08, 0x7f, 0x61, 0x28, 0xf6, 0xbc, 0x40, 0xb0, 0x68, 0xee, 0xf1, 0x83, 0x10, 0xff, 0xa5, - 0x00, 0x4b, 0xee, 0xf9, 0x4e, 0xda, 0x02, 0xfc, 0x84, 0xc3, 0x02, 0xac, 0x84, 0xb1, 0x00, 0x8e, - 0x68, 0xde, 0x0f, 0x04, 0x38, 0xed, 0x4f, 0x41, 0x20, 0x73, 0xd0, 0x81, 0x71, 0x16, 0xe9, 0x51, - 0x6f, 0xd2, 0x63, 0x3c, 0xe9, 0x8f, 0x9d, 0xdf, 0x19, 0xbe, 0x19, 0x9e, 0x30, 0x4f, 0x9f, 0xeb, - 0x3f, 0x09, 0xb0, 0xd0, 0xb1, 0x29, 0x7a, 0xcc, 0xbb, 0x5e, 0x77, 0x7b, 0x9d, 0xf6, 0x05, 0x7b, - 0x60, 0x7f, 0x3d, 0x46, 0x3f, 0x2f, 0xf2, 0x76, 0xbf, 0x7c, 0x2f, 0x9b, 0xac, 0x7b, 0xec, 0x28, - 0x7f, 0x8f, 0x6d, 0x5f, 0xe5, 0x98, 0x73, 0x95, 0xed, 0x1b, 0x6d, 0x9f, 0xd3, 0x61, 0xca, 0x1a, - 0x0e, 0x13, 0x3d, 0x69, 0x2d, 0x07, 0xf9, 0xae, 0x30, 0x80, 0xb7, 0x34, 0x70, 0x34, 0x6f, 0x69, - 0x30, 0x94, 0x19, 0xee, 0xf4, 0xbd, 0x9f, 0x63, 0xcb, 0x80, 0x8e, 0x5b, 0xc6, 0xb0, 0x7b, 0xcb, - 0xa0, 0x9b, 0xd0, 0x08, 0xbf, 0x09, 0xf1, 0x0f, 0x07, 0x46, 0x3b, 0x3d, 0x1c, 0x18, 0x73, 0x3e, - 0x1c, 0x70, 0xba, 0x75, 0xe3, 0x6e, 0xb7, 0xee, 0x4b, 0xf4, 0x3b, 0x5b, 0xde, 0xa7, 0xf3, 0xdd, - 0x40, 0x2d, 0x81, 0x88, 0xf8, 0x0b, 0x44, 0xb4, 0xb3, 0x40, 0xc4, 0x9c, 0x9e, 0xd7, 0xbb, 0x1c, - 0x00, 0xe6, 0xda, 0xf9, 0x02, 0x08, 0xe9, 0xd4, 0xdd, 0xa2, 0x9f, 0x9f, 0x19, 0x0e, 0x59, 0xd0, - 0x61, 0xc5, 0x9f, 0x36, 0xfd, 0x0a, 0xbe, 0x7b, 0x17, 0xeb, 0xe6, 0xab, 0x46, 0x74, 0xf4, 0xa8, - 0x39, 0xfa, 0x97, 0xcc, 0x7b, 0x29, 0x27, 0xdd, 0xc7, 0x34, 0x43, 0x37, 0x8e, 0x37, 0xec, 0x8e, - 0x16, 0x4f, 0xe3, 0x25, 0x88, 0x1b, 0x08, 0x4c, 0x53, 0x4d, 0x71, 0x8c, 0xb5, 0x78, 0xf7, 0x38, - 0x04, 0xb9, 0xdf, 0xb5, 0xae, 0xaf, 0xec, 0xd3, 0xf5, 0x28, 0x6d, 0x5e, 0x10, 0xa3, 0x9e, 0x10, - 0x2f, 0xb8, 0x0d, 0x15, 0xcb, 0x73, 0x11, 0x17, 0x82, 0x5b, 0x2c, 0xf1, 0x17, 0xfd, 0x08, 0x60, - 0xab, 0x76, 0xfc, 0x3c, 0xeb, 0xb6, 0x80, 0x1f, 0x0b, 0x30, 0x6b, 0xd9, 0xc5, 0x97, 0xed, 0xc1, - 0xa2, 0x89, 0xcc, 0xf4, 0x1d, 0xfe, 0xaa, 0x00, 0x33, 0x2e, 0xbc, 0xbd, 0x3c, 0xfd, 0x29, 0x38, - 0x9f, 0xfe, 0xdc, 0x0c, 0xbe, 0x7d, 0x78, 0xed, 0xf7, 0xbf, 0x23, 0xc0, 0x94, 0x57, 0x8b, 0x90, - 0x2f, 0x13, 0x1d, 0x43, 0x78, 0xec, 0xee, 0x85, 0xa3, 0xec, 0xee, 0xc6, 0x60, 0x89, 0x57, 0xba, - 0xec, 0xf3, 0xff, 0xdc, 0x72, 0x5f, 0x7c, 0xd8, 0x7d, 0xac, 0x31, 0xaf, 0xf0, 0xef, 0x44, 0xbb, - 0xae, 0x86, 0xe8, 0xa9, 0x68, 0x76, 0x1a, 0x82, 0xeb, 0xdb, 0x0f, 0x97, 0x9c, 0x5f, 0x88, 0xc0, - 0x4c, 0xa6, 0xad, 0xef, 0x1e, 0x59, 0xea, 0x2b, 0x3e, 0x89, 0x3c, 0xba, 0xca, 0xa5, 0x63, 0xf6, - 0x90, 0xd9, 0x3c, 0x0a, 0x4e, 0x2f, 0xfb, 0x66, 0xc8, 0xf9, 0x3c, 0x94, 0xcd, 0xab, 0x45, 0x48, - 0x65, 0xeb, 0x48, 0xd4, 0x0b, 0x54, 0x36, 0x6c, 0x84, 0x5d, 0xcb, 0xfb, 0xd2, 0x18, 0x61, 0x13, - 0x99, 0x69, 0x84, 0xf7, 0x60, 0xc8, 0x2c, 0xc4, 0x40, 0xc8, 0x6e, 0x6a, 0x7f, 0x26, 0x3e, 0x0f, - 0x96, 0x2d, 0x70, 0xc7, 0x61, 0x67, 0x80, 0x6d, 0x57, 0x41, 0x0e, 0xd8, 0xa9, 0x7f, 0x22, 0xd0, - 0x33, 0x07, 0x71, 0xdb, 0xd1, 0x29, 0x98, 0x7e, 0xb4, 0x9d, 0x2b, 0x6d, 0xef, 0x64, 0x76, 0x72, - 0xe5, 0x47, 0x85, 0xed, 0xad, 0xdc, 0x5a, 0xfe, 0x41, 0x3e, 0x97, 0x8d, 0xbf, 0x82, 0xa6, 0x20, - 0x6e, 0x55, 0x65, 0xd6, 0x76, 0xf2, 0xef, 0xe4, 0xe2, 0x02, 0x9a, 0x01, 0x64, 0x95, 0xe6, 0x0b, - 0xac, 0x3c, 0x82, 0xa6, 0x61, 0xc2, 0x2a, 0xcf, 0xe6, 0x36, 0x72, 0x3b, 0xb9, 0x6c, 0x3c, 0x6a, - 0x1f, 0x64, 0xa3, 0xb8, 0xf6, 0x76, 0x2e, 0x1b, 0x8f, 0xd9, 0x1b, 0x6f, 0x3f, 0xda, 0xde, 0xca, - 0x15, 0xb2, 0xf1, 0x3e, 0x7b, 0x71, 0xbe, 0x90, 0xdf, 0xc9, 0x67, 0x36, 0xe2, 0xfd, 0xa9, 0x3f, - 0x03, 0xfd, 0x34, 0xd9, 0x04, 0x9e, 0x7c, 0x3d, 0x57, 0xc8, 0xe6, 0x4a, 0x0e, 0xa8, 0x13, 0x30, - 0xca, 0xca, 0x1f, 0xe4, 0x36, 0x33, 0x1b, 0x18, 0xe7, 0x38, 0x0c, 0xb3, 0x22, 0x52, 0x10, 0x41, - 0x08, 0xc6, 0x58, 0x41, 0x36, 0xff, 0x4e, 0xae, 0xb4, 0x9d, 0x8b, 0x47, 0x53, 0xff, 0x4f, 0x80, - 0x51, 0x5b, 0x3a, 0x1a, 0xb4, 0x00, 0xa7, 0x08, 0x84, 0x5c, 0xa6, 0xb4, 0xf6, 0xf0, 0xed, 0xdc, - 0xbb, 0x8e, 0x89, 0xe6, 0x60, 0xd6, 0x51, 0xbd, 0x9d, 0x2b, 0x95, 0x0b, 0x99, 0x4d, 0x3c, 0xe5, - 0x3c, 0x24, 0xec, 0x95, 0x0f, 0xf2, 0xa5, 0xed, 0x1d, 0x5a, 0x1b, 0x71, 0x77, 0xdd, 0xc8, 0x18, - 0x95, 0x51, 0x77, 0x65, 0x21, 0xbf, 0xf6, 0x36, 0xad, 0x8c, 0xa1, 0x45, 0x48, 0xda, 0x2b, 0xb3, - 0xf9, 0xed, 0xad, 0x8d, 0xcc, 0xbb, 0xb4, 0xbe, 0x0f, 0xcd, 0xc2, 0xa4, 0xbd, 0x3e, 0xb7, 0x99, - 0xc9, 0x6f, 0xc4, 0xfb, 0xdd, 0x15, 0x84, 0xb3, 0xf1, 0x81, 0xd4, 0xcf, 0xc0, 0x08, 0xaf, 0x5a, - 0xb8, 0x21, 0x6d, 0xb4, 0x99, 0xdb, 0x79, 0x58, 0xcc, 0x96, 0x73, 0x9f, 0x7f, 0x94, 0xd9, 0xd8, - 0x8e, 0xbf, 0x82, 0x49, 0xb2, 0x55, 0x6c, 0xef, 0x64, 0x4a, 0x3b, 0xdb, 0xe5, 0xc7, 0xf9, 0x9d, - 0x87, 0x71, 0x01, 0x0b, 0x8f, 0xad, 0x76, 0xad, 0x58, 0xd8, 0xc9, 0xe4, 0x0b, 0xdb, 0xf1, 0x48, - 0x2a, 0x0b, 0x03, 0x2c, 0x53, 0x00, 0x1e, 0x7c, 0xf3, 0x41, 0x66, 0xe7, 0xdd, 0x2d, 0xa7, 0x80, - 0x8d, 0xc3, 0xb0, 0x51, 0xb1, 0xbd, 0xb9, 0x4d, 0xd7, 0xcc, 0x28, 0x28, 0xee, 0x6c, 0xc5, 0x23, - 0xa9, 0xa7, 0x30, 0x68, 0x64, 0x0c, 0x40, 0x09, 0x98, 0xc2, 0x7f, 0x7b, 0x08, 0xea, 0x0c, 0x20, - 0xb3, 0xa6, 0x50, 0xdc, 0x29, 0x97, 0x72, 0x99, 0xec, 0xbb, 0x71, 0x01, 0xaf, 0xb8, 0x59, 0x4e, - 0xcb, 0x22, 0x58, 0x1e, 0xb9, 0xb2, 0xcd, 0xe2, 0x3b, 0x58, 0x4a, 0x53, 0x0f, 0x21, 0xee, 0xfc, - 0x30, 0x1f, 0x25, 0x61, 0xa6, 0x50, 0xdc, 0xc9, 0x3f, 0xc8, 0xaf, 0x65, 0x76, 0xf2, 0xc5, 0x02, - 0x41, 0x45, 0x19, 0xfb, 0x0a, 0xc6, 0xe2, 0xaa, 0x23, 0x24, 0xa4, 0xda, 0x30, 0xcc, 0x7d, 0x8f, - 0x88, 0xd7, 0x75, 0xab, 0xb8, 0x91, 0x5f, 0x7b, 0xd7, 0x07, 0x37, 0x5f, 0x69, 0xaa, 0x58, 0x02, - 0xa6, 0xf8, 0x72, 0x4e, 0xc9, 0x66, 0x61, 0x92, 0xaf, 0x31, 0xd5, 0x2c, 0xb5, 0x05, 0x83, 0xc6, - 0xf7, 0x63, 0xb8, 0x7b, 0xb1, 0xb4, 0xee, 0x35, 0xe1, 0x24, 0x8c, 0x9b, 0x35, 0xe6, 0x6c, 0xd3, - 0x30, 0x61, 0x16, 0x5a, 0x53, 0xa5, 0x7e, 0x43, 0x00, 0xe4, 0xfe, 0xb0, 0x03, 0x89, 0xb0, 0x58, - 0x2c, 0xad, 0x6f, 0xe6, 0x36, 0x57, 0xfd, 0x95, 0xe4, 0x0c, 0x2c, 0x78, 0xb4, 0xe1, 0x94, 0x41, - 0x40, 0x4b, 0x30, 0xef, 0xd1, 0xc4, 0xd2, 0x88, 0x08, 0x96, 0x3c, 0x8f, 0x16, 0x74, 0x01, 0xa2, - 0x58, 0x25, 0xbc, 0x60, 0x60, 0x65, 0xcc, 0x67, 0xe3, 0xb1, 0x94, 0x64, 0xde, 0x6c, 0x51, 0x9e, - 0xcc, 0x43, 0x62, 0xab, 0x54, 0xfc, 0x89, 0xdc, 0xda, 0x8e, 0x17, 0x5f, 0x30, 0x5b, 0xf9, 0x5a, - 0x93, 0x37, 0x49, 0x98, 0x31, 0x2a, 0x5c, 0x0c, 0x7a, 0x64, 0xbe, 0x95, 0x35, 0xa4, 0x9c, 0x35, - 0x65, 0x92, 0xfe, 0x76, 0xa1, 0xf8, 0xb8, 0x40, 0xcd, 0x28, 0x5f, 0xb1, 0x9d, 0xdb, 0x78, 0x10, - 0x17, 0x9c, 0xcd, 0xd7, 0x4b, 0x99, 0x02, 0x5e, 0xc9, 0x48, 0xea, 0xb1, 0xf9, 0xb6, 0xd9, 0x62, - 0xfa, 0x12, 0xcc, 0x1b, 0x30, 0xfc, 0x59, 0xee, 0x6a, 0xc1, 0x0a, 0x18, 0xcb, 0x53, 0x07, 0xd6, - 0x23, 0x7f, 0xdb, 0x8b, 0x49, 0x74, 0x0e, 0x96, 0x58, 0xd3, 0x52, 0x71, 0x23, 0xe7, 0x37, 0xc3, - 0x02, 0x9c, 0xf2, 0x6c, 0xc5, 0x16, 0xf4, 0x3c, 0x9c, 0xf1, 0xac, 0xb6, 0x99, 0xaa, 0x48, 0xea, - 0xfb, 0xd6, 0xdb, 0x4f, 0xa7, 0x64, 0x5d, 0x00, 0x91, 0x8d, 0xd0, 0x59, 0xba, 0xac, 0x99, 0x3a, - 0x4a, 0x98, 0x45, 0x55, 0x27, 0x29, 0xb3, 0x38, 0xeb, 0x27, 0x69, 0x22, 0x2c, 0xfa, 0xc1, 0x32, - 0xa5, 0x6d, 0x0b, 0x06, 0x8d, 0x67, 0x77, 0x58, 0xfb, 0x32, 0x5b, 0x5b, 0x3e, 0xda, 0x67, 0xd6, - 0xf0, 0xda, 0x67, 0x16, 0x72, 0xc2, 0xf5, 0x05, 0xfa, 0x52, 0x84, 0x7f, 0x74, 0x81, 0xad, 0x2d, - 0x29, 0xcb, 0x6d, 0x6f, 0x15, 0x0b, 0xdb, 0x39, 0x22, 0x37, 0x6b, 0xc5, 0x6c, 0x8e, 0x2e, 0x8e, - 0xab, 0x2a, 0x9f, 0x2d, 0xef, 0x14, 0xdf, 0xce, 0x15, 0xe2, 0x02, 0x3a, 0x0b, 0xa7, 0x5d, 0xd5, - 0xa4, 0xce, 0x6a, 0x14, 0x49, 0xa9, 0x30, 0x6a, 0x7b, 0x91, 0x81, 0x39, 0x48, 0x0a, 0xb0, 0x68, - 0x92, 0x2e, 0x99, 0x47, 0x3b, 0x0f, 0x8b, 0xa5, 0xfc, 0x4f, 0x12, 0x9b, 0x67, 0x4c, 0x9d, 0x84, - 0x19, 0x7b, 0xab, 0xfc, 0xe6, 0xd6, 0x46, 0x7e, 0x2d, 0xbf, 0x13, 0x17, 0xd0, 0x69, 0x98, 0xb3, - 0xd7, 0x95, 0x72, 0x0f, 0x4a, 0xb9, 0xed, 0x87, 0xe6, 0x9c, 0xcf, 0x60, 0xd2, 0xe3, 0xc1, 0x06, - 0xb6, 0x9a, 0xa4, 0x78, 0x0b, 0x8f, 0x64, 0x59, 0xd8, 0xc7, 0xb9, 0xd5, 0xf8, 0x2b, 0xc4, 0x02, - 0x79, 0x54, 0x92, 0xd5, 0xc8, 0xac, 0xe7, 0x0a, 0x78, 0x62, 0x6c, 0x1e, 0x3c, 0xda, 0x14, 0x32, - 0x8c, 0xbd, 0x0d, 0x40, 0xee, 0x87, 0x1c, 0xc4, 0xe4, 0xe0, 0xd2, 0x47, 0x3b, 0x6c, 0x43, 0x23, - 0x9d, 0x56, 0x33, 0xdb, 0xf9, 0x35, 0xba, 0xf5, 0x7b, 0xd4, 0x6e, 0x15, 0xb7, 0xf1, 0x84, 0xde, - 0x95, 0x85, 0x62, 0x01, 0xcf, 0x56, 0x86, 0x29, 0xaf, 0xab, 0x7e, 0xcc, 0x60, 0x0e, 0xe1, 0x76, - 0xae, 0x94, 0xf1, 0x51, 0x6d, 0x5b, 0x2b, 0x43, 0xfc, 0x32, 0x5b, 0x5b, 0x86, 0x6a, 0xeb, 0xe6, - 0xd3, 0x77, 0x2b, 0x20, 0xcb, 0x99, 0x04, 0xc2, 0x7f, 0x2f, 0x89, 0xb4, 0xac, 0x22, 0xd7, 0xc4, - 0x14, 0xcd, 0x45, 0x48, 0xba, 0x6b, 0x39, 0x19, 0xfd, 0x43, 0x47, 0xf8, 0xc5, 0xa9, 0xd0, 0x57, - 0xe0, 0x22, 0xdf, 0xbf, 0xb3, 0x56, 0xa7, 0xe0, 0x42, 0xa7, 0xc6, 0x36, 0xd5, 0xbe, 0x0c, 0xe7, - 0x3b, 0xb5, 0xe5, 0xf5, 0xdb, 0x32, 0x16, 0x9e, 0x4d, 0x0d, 0x25, 0xbf, 0x08, 0x67, 0x3b, 0x42, - 0x35, 0x35, 0x7d, 0x17, 0xc6, 0xec, 0x71, 0x6f, 0xc3, 0x39, 0xf3, 0xe5, 0x31, 0x73, 0xb0, 0xbd, - 0x18, 0xcc, 0x9c, 0x3e, 0x6f, 0xee, 0x7e, 0x9d, 0x25, 0x2b, 0xb4, 0x9f, 0xa8, 0xb0, 0xf4, 0x5b, - 0x7d, 0xfc, 0x37, 0x03, 0x8f, 0x36, 0xc6, 0x76, 0x90, 0xcf, 0xd2, 0xb5, 0xf5, 0x1a, 0x86, 0xd1, - 0x19, 0x31, 0xdc, 0x60, 0x47, 0x7d, 0xb1, 0xb4, 0x8e, 0xab, 0xa3, 0x04, 0x9c, 0xfb, 0xb8, 0x87, - 0xc1, 0x61, 0x0d, 0xe8, 0x08, 0x6e, 0x01, 0x4e, 0x79, 0xb4, 0x61, 0x23, 0x0b, 0x44, 0xda, 0xdd, - 0xd5, 0x1c, 0xf6, 0x08, 0xc6, 0xee, 0x35, 0x0b, 0xc3, 0x1e, 0x5d, 0xf9, 0xea, 0xd7, 0x04, 0x98, - 0xd8, 0x34, 0x0f, 0x5e, 0xdb, 0xb2, 0xfa, 0xac, 0x5e, 0x91, 0xd1, 0xdb, 0x30, 0xf0, 0x50, 0x96, - 0x1a, 0xfa, 0xee, 0x17, 0xd1, 0x8c, 0xeb, 0x3a, 0x21, 0xb7, 0xd7, 0xd2, 0xf7, 0x93, 0x3e, 0xe5, - 0x62, 0xfc, 0xe0, 0xfb, 0xff, 0xfd, 0x6b, 0x11, 0x40, 0x83, 0xe9, 0x5d, 0x36, 0xc2, 0x3a, 0xf4, - 0x95, 0x64, 0xa9, 0xba, 0x1f, 0x7a, 0xa8, 0x31, 0x32, 0xd4, 0x20, 0xea, 0x4f, 0xab, 0xa4, 0x7f, - 0x01, 0x06, 0xdf, 0x61, 0x79, 0xdd, 0x7d, 0xc7, 0xf2, 0xcb, 0x12, 0x2e, 0x4e, 0x90, 0xc1, 0x86, - 0xd1, 0x90, 0x99, 0x1b, 0x1e, 0x7d, 0x09, 0x86, 0xd7, 0x65, 0x12, 0xa0, 0x59, 0xdd, 0xcf, 0x67, - 0xd1, 0x85, 0x20, 0x91, 0x92, 0x7c, 0x36, 0x19, 0x28, 0x45, 0xa5, 0x28, 0x1e, 0x1c, 0x26, 0x86, - 0xe9, 0x15, 0xcb, 0x32, 0x86, 0x4f, 0xa6, 0x1f, 0x45, 0xc3, 0x69, 0x5c, 0xa2, 0xa5, 0x3f, 0xac, - 0x57, 0x3f, 0x42, 0xdf, 0x10, 0x60, 0xca, 0x44, 0x40, 0x72, 0xe9, 0xad, 0x37, 0x94, 0x27, 0x52, - 0x03, 0x5d, 0x09, 0x32, 0x05, 0xcb, 0x39, 0x1e, 0x10, 0xcf, 0x8a, 0x17, 0x9e, 0x05, 0x34, 0x97, - 0xae, 0x91, 0x29, 0x19, 0x2c, 0x72, 0x57, 0x93, 0xfe, 0x90, 0xfc, 0xf3, 0x11, 0xfa, 0x1b, 0x02, - 0x0c, 0x53, 0x89, 0xc5, 0x43, 0x68, 0xe8, 0x46, 0xf0, 0x74, 0xa5, 0x2c, 0x48, 0x94, 0x5c, 0x09, - 0xd3, 0x85, 0x6e, 0xe0, 0xe2, 0x25, 0x2f, 0xa8, 0x93, 0xe2, 0x18, 0xc3, 0x58, 0xd6, 0x48, 0xf3, - 0x3b, 0x42, 0x0a, 0x03, 0x1c, 0xc9, 0x6b, 0x78, 0x08, 0x9a, 0xd6, 0x3c, 0x00, 0x42, 0x67, 0x1e, - 0xf6, 0x00, 0x08, 0x5d, 0xa9, 0xd5, 0xc5, 0x8b, 0x5e, 0x08, 0x11, 0x8a, 0x1b, 0x08, 0xeb, 0x1a, - 0x4d, 0xbb, 0x8e, 0x7e, 0x4e, 0x00, 0xb0, 0xd2, 0xac, 0x77, 0x87, 0xe7, 0x4a, 0xc9, 0x1e, 0x70, - 0x75, 0xcf, 0x1c, 0x1c, 0x26, 0x46, 0x00, 0x08, 0xa0, 0xe7, 0x6a, 0x5d, 0x97, 0xa9, 0xb4, 0x8b, - 0xfd, 0x14, 0x11, 0xe6, 0xd5, 0x57, 0x05, 0x18, 0xcb, 0xca, 0x52, 0x45, 0xaf, 0x3f, 0x33, 0xe0, - 0x1c, 0xaf, 0xc4, 0xaf, 0x78, 0x62, 0x98, 0x4f, 0xce, 0x72, 0x22, 0x9f, 0x2e, 0x57, 0x4d, 0x08, - 0x06, 0xa8, 0xd2, 0x0f, 0x1f, 0x94, 0x6a, 0x03, 0xf5, 0x17, 0x04, 0x18, 0xdc, 0x50, 0x2a, 0xef, - 0x9f, 0x00, 0x9c, 0xab, 0x9e, 0x70, 0x66, 0x92, 0x13, 0x36, 0x38, 0x0d, 0xa5, 0xf2, 0x3e, 0x06, - 0xf2, 0xf3, 0x02, 0xc0, 0xa3, 0x66, 0xe3, 0x64, 0xa0, 0x2c, 0x7b, 0x42, 0x49, 0x24, 0x27, 0x6d, - 0x50, 0xda, 0x4d, 0x03, 0x8c, 0x0a, 0x90, 0x95, 0x1b, 0x72, 0xc8, 0x55, 0xf2, 0xb3, 0xed, 0xe7, - 0x0e, 0x0e, 0x13, 0xa3, 0x30, 0x4c, 0x66, 0xaf, 0x92, 0x61, 0xa9, 0x81, 0x4c, 0xd9, 0x0c, 0xe4, - 0x57, 0x58, 0xee, 0x4d, 0xe3, 0x3f, 0xc8, 0xb8, 0x16, 0xf0, 0xff, 0xc3, 0x60, 0xba, 0x73, 0x31, - 0x58, 0x73, 0x4d, 0x4c, 0x79, 0xe9, 0xf3, 0x34, 0xb2, 0xb1, 0xc2, 0xf8, 0x2f, 0x36, 0xfe, 0x1e, - 0xde, 0xcf, 0xb9, 0xaf, 0x16, 0x4e, 0x18, 0xda, 0xeb, 0x07, 0x87, 0x09, 0x64, 0x5e, 0x16, 0x2c, - 0x4b, 0xad, 0x96, 0x85, 0x70, 0x1e, 0x25, 0xd3, 0xdc, 0x7b, 0x6d, 0x07, 0xd0, 0xbf, 0x2c, 0x00, - 0x14, 0xd5, 0xda, 0x49, 0x03, 0xc4, 0xd6, 0x1a, 0xc8, 0xe5, 0xbe, 0x05, 0x6c, 0x0a, 0xa1, 0xb4, - 0xa2, 0xd6, 0x1c, 0x80, 0xbe, 0x2e, 0x98, 0xef, 0x13, 0x4f, 0x1a, 0xd4, 0xf5, 0x83, 0xc3, 0xc4, - 0x98, 0xf9, 0x6e, 0xc0, 0x02, 0x96, 0x40, 0x33, 0x69, 0x23, 0x79, 0x84, 0x1d, 0xdc, 0x57, 0x04, - 0x18, 0x63, 0x7b, 0xb1, 0x91, 0x4d, 0x3a, 0xa8, 0x8c, 0x07, 0xda, 0xad, 0xd9, 0xa0, 0x81, 0x44, - 0xad, 0xc5, 0x00, 0xfc, 0x43, 0x01, 0x26, 0x5c, 0x59, 0x97, 0x51, 0xd7, 0xaf, 0x02, 0xfd, 0x12, - 0x35, 0x87, 0x03, 0x1a, 0xc8, 0x3e, 0x30, 0xa4, 0xd8, 0x3e, 0xfc, 0x45, 0x01, 0x46, 0x18, 0x03, - 0x69, 0x62, 0xe3, 0xa0, 0xec, 0xbb, 0x1c, 0xd8, 0xd9, 0xf1, 0xf1, 0x0c, 0x90, 0xcd, 0x7a, 0xd2, - 0xe7, 0x26, 0xdf, 0x12, 0x60, 0x9c, 0x0a, 0x83, 0x05, 0xe8, 0x56, 0x70, 0xc6, 0xf1, 0x59, 0x93, - 0xc3, 0x00, 0x0c, 0x64, 0xdf, 0x09, 0x42, 0xcc, 0xb2, 0x6f, 0x0a, 0x30, 0x57, 0x92, 0x35, 0xb9, - 0x59, 0xe5, 0x12, 0x29, 0x53, 0x5d, 0xde, 0x0c, 0xc3, 0x41, 0x3f, 0x23, 0xfb, 0x96, 0x27, 0x9a, - 0x94, 0x78, 0xde, 0x85, 0x06, 0x6f, 0x81, 0x18, 0xc7, 0x33, 0x0e, 0x82, 0x63, 0x51, 0x69, 0x5a, - 0xe7, 0x63, 0x5d, 0x54, 0x32, 0x64, 0xa0, 0x45, 0xa5, 0x69, 0x9b, 0xed, 0x8b, 0x4a, 0x01, 0x85, - 0x58, 0x54, 0x3e, 0x67, 0x74, 0x18, 0x80, 0x81, 0x16, 0x95, 0x20, 0xb4, 0x2f, 0x2a, 0x97, 0x47, - 0x9a, 0xed, 0x15, 0x4a, 0x55, 0x7e, 0x31, 0x8b, 0x4a, 0xd0, 0xf8, 0x2d, 0x2a, 0x67, 0xea, 0x8c, - 0xa4, 0xd6, 0xc7, 0x6a, 0xea, 0x8c, 0x74, 0xcc, 0x41, 0x4c, 0x1d, 0xcb, 0xec, 0xec, 0x30, 0x75, - 0x06, 0xac, 0x10, 0xa6, 0xce, 0x9e, 0xe2, 0x3a, 0x1c, 0xd0, 0x40, 0xa6, 0x8e, 0x21, 0xc5, 0x0c, - 0xfc, 0x4b, 0x82, 0x79, 0x72, 0xdc, 0x7c, 0x2a, 0x05, 0xe7, 0xde, 0xd5, 0x10, 0x19, 0xa8, 0xb5, - 0x6e, 0x87, 0x0c, 0x02, 0x6a, 0x0f, 0x4f, 0xff, 0x8f, 0x05, 0x98, 0xdb, 0x96, 0x9b, 0x55, 0x9f, - 0x6c, 0xcc, 0xe8, 0x5e, 0xf7, 0xab, 0xe3, 0x4e, 0x69, 0x9c, 0x7d, 0x25, 0xf1, 0xb6, 0x27, 0xdb, - 0xce, 0x88, 0xf3, 0x36, 0x0f, 0x12, 0x4b, 0xa0, 0x26, 0xeb, 0xad, 0xe7, 0x4d, 0x3c, 0xf4, 0x3e, - 0xe6, 0xdf, 0xd7, 0x04, 0x40, 0xdb, 0xb2, 0x9e, 0x6f, 0xd6, 0xf5, 0xba, 0xd4, 0x30, 0xa6, 0x46, - 0x5d, 0xff, 0xa3, 0x0d, 0x47, 0x46, 0x6a, 0x5f, 0x60, 0x37, 0x3d, 0x81, 0x2d, 0x8a, 0xa7, 0x1c, - 0xc0, 0xf4, 0x3a, 0x45, 0xd0, 0x7a, 0x8e, 0x51, 0xfd, 0x7d, 0x01, 0xe6, 0xd6, 0x2d, 0x4e, 0xb8, - 0x92, 0x45, 0xfb, 0x85, 0x1c, 0x5e, 0x0f, 0x0a, 0xdb, 0x39, 0x22, 0x61, 0xe0, 0x28, 0x0c, 0xb7, - 0xc8, 0x2f, 0x6b, 0x8d, 0x97, 0xd0, 0x62, 0x9a, 0x94, 0xd5, 0x65, 0x2d, 0x6d, 0xa4, 0xe5, 0xd6, - 0xd2, 0x15, 0xb3, 0x3b, 0xfa, 0x3d, 0x01, 0x16, 0xe9, 0x51, 0xd1, 0x17, 0xed, 0xbd, 0x5e, 0x51, - 0xd1, 0x71, 0x8f, 0x40, 0xd5, 0x5d, 0xe6, 0x7b, 0x51, 0xaa, 0x2c, 0xfe, 0x9f, 0x15, 0xbb, 0x90, - 0x85, 0x17, 0xe1, 0xf7, 0x05, 0x58, 0xa4, 0x4a, 0x7d, 0xfc, 0x94, 0xd1, 0x71, 0x8f, 0x40, 0xd9, - 0x5b, 0x3e, 0x94, 0x5d, 0x4a, 0x9e, 0xed, 0x4c, 0x19, 0x91, 0x38, 0x4c, 0xde, 0x27, 0x02, 0x2c, - 0xd2, 0x53, 0x94, 0x2f, 0x79, 0x77, 0x7a, 0x85, 0xd7, 0x61, 0xcf, 0xb8, 0x77, 0x70, 0x98, 0x18, - 0x87, 0x51, 0x06, 0x9c, 0x3b, 0x6f, 0x9d, 0x4f, 0x05, 0x41, 0x8e, 0x15, 0x76, 0x8a, 0x53, 0x0d, - 0x2b, 0xdb, 0xb2, 0x9f, 0x4e, 0xdc, 0x08, 0x4a, 0x84, 0x39, 0x14, 0x71, 0xd9, 0x3d, 0x94, 0xe1, - 0x14, 0x9a, 0xf5, 0x42, 0x28, 0xd5, 0x64, 0xf4, 0x1b, 0x02, 0xcc, 0xda, 0xb5, 0xc0, 0x02, 0x76, - 0x3b, 0x34, 0x00, 0x26, 0xf7, 0x3d, 0x20, 0xbf, 0xe9, 0x23, 0x16, 0xf3, 0xa2, 0x1f, 0x74, 0x2c, - 0x0a, 0xbf, 0x29, 0xc0, 0xac, 0x5d, 0xd2, 0x8f, 0x82, 0x9e, 0xc9, 0x76, 0x0f, 0xe8, 0xdf, 0xf0, - 0x41, 0x7f, 0x26, 0x39, 0xef, 0x83, 0xde, 0x94, 0xe6, 0x6f, 0x0a, 0x30, 0x6b, 0x97, 0x66, 0x8b, - 0x84, 0x57, 0x43, 0x23, 0xe9, 0x20, 0xbf, 0xb7, 0xfd, 0xe4, 0x77, 0x31, 0xd5, 0x11, 0x24, 0x46, - 0x98, 0xe0, 0x04, 0xd7, 0x9e, 0x6e, 0xd9, 0x4f, 0x78, 0x5f, 0x0b, 0x0a, 0xdd, 0x36, 0x1c, 0x11, - 0x03, 0x0f, 0x01, 0x5e, 0x40, 0x73, 0x5e, 0x10, 0x1b, 0xb4, 0x2f, 0xfa, 0x6d, 0x01, 0xe6, 0xec, - 0x42, 0x6c, 0x07, 0x79, 0xb7, 0x27, 0x30, 0x4c, 0x98, 0x7b, 0xa4, 0xe4, 0x75, 0x1f, 0x91, 0x58, - 0x12, 0x3b, 0x91, 0x82, 0x25, 0xe2, 0x3f, 0x08, 0x30, 0x67, 0x17, 0xea, 0xe3, 0xa0, 0x86, 0x09, - 0x77, 0x8f, 0xd4, 0xbc, 0xe9, 0x43, 0xcd, 0xf9, 0xe4, 0x52, 0x07, 0x6a, 0x4c, 0x21, 0xff, 0xb6, - 0x00, 0x73, 0x76, 0x21, 0xb7, 0x93, 0x74, 0xbb, 0x27, 0x54, 0x1d, 0x84, 0xfd, 0xae, 0x9f, 0xb0, - 0x8b, 0xa9, 0xae, 0x80, 0xd1, 0x17, 0x01, 0xd6, 0x65, 0xbd, 0xa8, 0xd6, 0xc8, 0x95, 0xc6, 0xf9, - 0x00, 0xe9, 0x48, 0xf3, 0xd9, 0xe4, 0xd9, 0x00, 0xcd, 0xc4, 0x25, 0x8f, 0x38, 0xcf, 0x08, 0x02, - 0x2b, 0xce, 0x83, 0xbe, 0x4e, 0x77, 0x09, 0x32, 0x39, 0xfd, 0x76, 0x83, 0x5d, 0x67, 0x04, 0x49, - 0x0f, 0x4b, 0x3b, 0x04, 0x83, 0xb2, 0xe2, 0x01, 0x65, 0x11, 0xcd, 0x1b, 0x57, 0x19, 0x04, 0x11, - 0xfd, 0x9a, 0x24, 0xfd, 0x21, 0xfd, 0xf7, 0x23, 0xf4, 0x0b, 0x02, 0x8c, 0x5a, 0xe1, 0xef, 0xa2, - 0x5a, 0x3b, 0x56, 0xe6, 0x5c, 0xa7, 0xbe, 0x3a, 0x46, 0x64, 0x09, 0xd8, 0x5c, 0x72, 0x86, 0x8b, - 0x82, 0x39, 0x22, 0xdf, 0x18, 0x4f, 0xe9, 0x87, 0x8a, 0x47, 0x75, 0xe2, 0x99, 0xa0, 0x8b, 0xc7, - 0x7f, 0xb3, 0xea, 0x67, 0x22, 0x97, 0x83, 0x27, 0xfc, 0x25, 0x5f, 0x2a, 0x62, 0x3c, 0x13, 0x30, - 0x8e, 0xf1, 0xec, 0x91, 0x62, 0xfb, 0x81, 0x90, 0xa0, 0xa2, 0x15, 0x5a, 0x9a, 0x7e, 0x62, 0xfa, - 0x57, 0x04, 0x18, 0xe1, 0xf3, 0x3a, 0x77, 0xdf, 0x50, 0x3c, 0xb2, 0x40, 0x77, 0xdc, 0x50, 0x10, - 0xc4, 0x39, 0x3c, 0x1c, 0x9b, 0x44, 0x83, 0x4d, 0xf4, 0xcb, 0x8d, 0x8f, 0x0c, 0x64, 0x98, 0x4d, - 0x7f, 0xc7, 0x0c, 0x41, 0x58, 0xc8, 0x6e, 0x05, 0x8b, 0x4a, 0x06, 0x06, 0x97, 0xe9, 0x00, 0x0e, - 0x1b, 0x2d, 0x4f, 0x70, 0xe9, 0x0f, 0xd9, 0x57, 0x19, 0xc4, 0x68, 0x7d, 0x4b, 0x80, 0x71, 0x47, - 0x62, 0xe9, 0xee, 0x30, 0xbd, 0x33, 0x51, 0xfb, 0xc2, 0xbc, 0x7f, 0x70, 0x98, 0x98, 0x84, 0x09, - 0x0e, 0xa6, 0xc3, 0x56, 0x75, 0xc1, 0x89, 0xbe, 0x27, 0x40, 0x9c, 0x5e, 0xfd, 0x99, 0x73, 0x6a, - 0xdd, 0x51, 0x7a, 0x27, 0x8d, 0x4e, 0xde, 0x0e, 0xdd, 0x8f, 0xdd, 0xe5, 0xdd, 0xf3, 0x17, 0x4d, - 0x7c, 0x62, 0xf1, 0x26, 0x82, 0xbb, 0x83, 0xfc, 0x58, 0x80, 0x31, 0x3a, 0xa4, 0x99, 0xda, 0xf8, - 0x66, 0xa8, 0x54, 0xab, 0x06, 0x05, 0xaf, 0x85, 0xec, 0xc5, 0xf0, 0x2f, 0xfb, 0x84, 0xba, 0x67, - 0xc4, 0x09, 0x2b, 0xd4, 0xcd, 0xe1, 0xfd, 0x45, 0x2b, 0x71, 0x25, 0xd9, 0x23, 0x2e, 0x07, 0x9c, - 0x36, 0x9f, 0x4d, 0x06, 0x4d, 0x96, 0x4b, 0x22, 0x66, 0xc8, 0x8e, 0x09, 0x45, 0xf2, 0x14, 0x57, - 0x1c, 0x8d, 0xd9, 0x43, 0xf0, 0xe8, 0xaf, 0x09, 0x30, 0xca, 0x5c, 0x20, 0x96, 0xca, 0x39, 0x28, - 0x03, 0x6d, 0x59, 0xac, 0x83, 0xc3, 0xbb, 0xc8, 0x76, 0x58, 0x06, 0xcf, 0xd2, 0xae, 0x31, 0x71, - 0xc8, 0xc4, 0x86, 0x79, 0xf5, 0x37, 0x05, 0x18, 0x65, 0xee, 0x4c, 0x48, 0x64, 0xb6, 0x3c, 0xd9, - 0xc1, 0x91, 0x5d, 0x27, 0x3a, 0x65, 0x47, 0x66, 0x72, 0x6e, 0x32, 0xe9, 0xe0, 0x1c, 0x86, 0xf8, - 0x77, 0x05, 0x98, 0xb0, 0xf6, 0x35, 0x03, 0xe6, 0x49, 0x2c, 0xea, 0xe7, 0x3a, 0x61, 0x3b, 0x9d, - 0x4c, 0x3a, 0x2e, 0x56, 0x1c, 0xfb, 0x1d, 0xc6, 0x59, 0x7a, 0x29, 0x71, 0xda, 0xf7, 0xc1, 0x6f, - 0x09, 0x90, 0x5c, 0x97, 0x75, 0x96, 0x06, 0x83, 0x7f, 0xb3, 0x45, 0xb4, 0xa5, 0xeb, 0xc6, 0x67, - 0xcf, 0x9f, 0x91, 0x0c, 0x95, 0xaf, 0x42, 0xbc, 0xe0, 0xa3, 0xcb, 0x63, 0x68, 0x24, 0x4d, 0x3e, - 0x13, 0xb2, 0x1e, 0x8e, 0x4c, 0xe3, 0x63, 0x8d, 0x3b, 0x65, 0xb2, 0xdf, 0x86, 0xbd, 0x12, 0x2e, - 0xfd, 0x25, 0xd9, 0xb4, 0xf1, 0x31, 0x60, 0x1a, 0x26, 0x0d, 0x34, 0x4e, 0xeb, 0x48, 0x4e, 0xe6, - 0x06, 0x2b, 0xed, 0x9b, 0xf7, 0x1f, 0x08, 0x30, 0x65, 0xb3, 0x89, 0x86, 0x75, 0xbf, 0xd3, 0x43, - 0x92, 0x49, 0x43, 0x89, 0xee, 0xf6, 0xd4, 0x97, 0x59, 0xc9, 0x47, 0x07, 0x87, 0x89, 0x25, 0x4f, - 0x5a, 0x90, 0xf9, 0xff, 0xfe, 0x53, 0xb2, 0xae, 0x88, 0x17, 0x38, 0x09, 0xb1, 0x3e, 0x34, 0xf3, - 0x34, 0xfe, 0xdf, 0x10, 0x20, 0x9e, 0xa9, 0x56, 0xed, 0xe9, 0xa8, 0xaf, 0x87, 0x02, 0x9a, 0xa9, - 0x56, 0x3b, 0x6e, 0xb1, 0x49, 0x98, 0x72, 0xa0, 0xb6, 0x4b, 0x34, 0x76, 0x57, 0xec, 0x12, 0xcd, - 0xb9, 0x2b, 0x1f, 0x0b, 0x30, 0x49, 0xbd, 0x0f, 0x3b, 0xc4, 0x57, 0x43, 0x41, 0xa4, 0x23, 0xf8, - 0xa2, 0xcc, 0x07, 0x40, 0x49, 0x0e, 0x5b, 0x5e, 0x28, 0xed, 0x7e, 0xcb, 0xb7, 0x05, 0x98, 0xa4, - 0x6e, 0xc8, 0x51, 0xf0, 0xd2, 0x11, 0x7c, 0xf1, 0xae, 0x1f, 0x1c, 0x26, 0xe6, 0x60, 0xda, 0x81, - 0x97, 0x3a, 0x2f, 0x26, 0x60, 0x72, 0xd8, 0xea, 0x0c, 0x18, 0xfd, 0x3e, 0x89, 0x63, 0x73, 0x62, - 0x4e, 0x75, 0xf0, 0xf5, 0xd0, 0xc9, 0x78, 0x0d, 0x11, 0x7f, 0xa3, 0x87, 0x9e, 0x4c, 0xc0, 0x3f, - 0x7f, 0x70, 0x98, 0x58, 0x84, 0x09, 0xd3, 0x74, 0x28, 0x0d, 0xd9, 0x53, 0xbc, 0x2f, 0x8b, 0xe7, - 0x7c, 0xc4, 0x9b, 0xa8, 0x2e, 0x2f, 0xdc, 0xbf, 0x2c, 0xc0, 0x98, 0x25, 0xdc, 0x24, 0xcb, 0xf5, - 0x72, 0x08, 0x80, 0x9d, 0x04, 0x1b, 0x9f, 0x71, 0x13, 0x80, 0x6c, 0x68, 0xed, 0x02, 0x73, 0x4a, - 0x9c, 0x72, 0xf0, 0x9f, 0xe0, 0x63, 0xbb, 0xf2, 0x84, 0x4d, 0x48, 0x08, 0xb4, 0x1b, 0x61, 0x72, - 0x43, 0x77, 0x16, 0x90, 0xb7, 0x0e, 0x0e, 0x13, 0xa7, 0x2c, 0x63, 0x41, 0xd0, 0x39, 0xc4, 0x63, - 0x21, 0x35, 0xe7, 0x05, 0x2f, 0xfd, 0x61, 0x53, 0xda, 0x93, 0x3f, 0x42, 0x3f, 0x30, 0x25, 0x83, - 0x7b, 0x2a, 0x12, 0x40, 0x32, 0xfc, 0xf2, 0xbc, 0x75, 0x97, 0x0c, 0xdf, 0xac, 0x76, 0xe2, 0xe3, - 0x83, 0xc3, 0xc4, 0x82, 0xfb, 0x05, 0x89, 0x53, 0x30, 0xae, 0x8b, 0x57, 0x7c, 0x04, 0xc3, 0xf6, - 0xc4, 0x84, 0x93, 0x8f, 0xdf, 0x14, 0x60, 0x9c, 0x9b, 0x96, 0xec, 0x8f, 0xd7, 0x42, 0xe0, 0x0c, - 0x72, 0x9f, 0xc8, 0x35, 0x27, 0x22, 0x1e, 0x80, 0x90, 0x14, 0xba, 0x14, 0x84, 0x10, 0xb2, 0x91, - 0xfe, 0xae, 0x00, 0xd3, 0xd4, 0x89, 0x74, 0xbc, 0xad, 0x47, 0xaf, 0x85, 0xcc, 0x9e, 0xc8, 0x22, - 0x6e, 0xa1, 0x08, 0xda, 0xb1, 0xeb, 0x2c, 0x26, 0x88, 0x2a, 0x81, 0x83, 0xa2, 0xab, 0xe2, 0x45, - 0x1f, 0x8a, 0x94, 0x7a, 0xb5, 0xc2, 0x53, 0x85, 0x97, 0xe5, 0xb7, 0xcc, 0xab, 0x54, 0x9e, 0x9e, - 0x1b, 0x21, 0x80, 0xb1, 0x78, 0x5b, 0x28, 0x5a, 0x1e, 0x05, 0xa4, 0xe5, 0x5a, 0x32, 0xf0, 0xea, - 0x60, 0x62, 0xfe, 0xb3, 0x00, 0xd3, 0x96, 0x7b, 0xcb, 0x13, 0x74, 0x92, 0x92, 0x26, 0x05, 0x24, - 0xe6, 0x8d, 0xe4, 0xcd, 0xa0, 0xc4, 0x38, 0xfd, 0x61, 0x4c, 0x58, 0xe9, 0x4f, 0x07, 0x61, 0x76, - 0x07, 0xfa, 0x7f, 0x9a, 0x21, 0x60, 0x6e, 0x62, 0x2e, 0x05, 0xf4, 0xf5, 0xe0, 0xd9, 0xab, 0x99, - 0x1c, 0x86, 0xc8, 0x77, 0x2d, 0x36, 0x02, 0x12, 0x98, 0x4d, 0xde, 0x0f, 0x44, 0xa0, 0x3d, 0xa1, - 0x2c, 0x55, 0x38, 0x9a, 0x3e, 0x1b, 0xd3, 0xfa, 0xbf, 0x04, 0x48, 0x96, 0xe4, 0x9a, 0xdc, 0x94, - 0x55, 0x66, 0x42, 0x6c, 0x29, 0x49, 0x43, 0xae, 0x64, 0xd7, 0xb3, 0x02, 0x3f, 0xb8, 0xa8, 0x07, - 0xa4, 0x74, 0x23, 0xb9, 0x1e, 0x78, 0x29, 0x2d, 0xea, 0xd2, 0x65, 0xfa, 0x30, 0x8e, 0x66, 0x4f, - 0xa5, 0x19, 0x55, 0x31, 0xc5, 0xff, 0x55, 0x80, 0x49, 0x9b, 0xcb, 0x43, 0x0e, 0x2e, 0x1a, 0x7a, - 0x23, 0x54, 0xce, 0x48, 0xdb, 0xd6, 0x76, 0xa7, 0x97, 0xae, 0x6c, 0x6f, 0xdb, 0x3e, 0x38, 0x4c, - 0x9c, 0xb6, 0xfc, 0x08, 0x72, 0x46, 0xf2, 0xde, 0x14, 0xc4, 0xf3, 0x3e, 0x5c, 0x60, 0xe7, 0x2a, - 0x6e, 0x5f, 0xfb, 0x44, 0x30, 0xbf, 0x2b, 0x0c, 0x71, 0xf0, 0xb3, 0x67, 0x5e, 0x0c, 0x79, 0xf0, - 0x5b, 0x3d, 0x38, 0x4c, 0x4c, 0x79, 0xd1, 0x41, 0xc0, 0x9f, 0x43, 0x62, 0x67, 0xf0, 0x64, 0x2f, - 0xfb, 0x35, 0x01, 0x90, 0x2d, 0x8c, 0x42, 0xbf, 0x92, 0x0f, 0x95, 0x2f, 0x8d, 0xed, 0x62, 0xe1, - 0xc0, 0x67, 0xec, 0xe7, 0x44, 0x0a, 0xde, 0x0a, 0xaa, 0x88, 0xe2, 0x42, 0x47, 0xf4, 0x98, 0xe5, - 0xdf, 0x15, 0x00, 0xd9, 0x02, 0x2d, 0x3d, 0x60, 0x67, 0xd6, 0x22, 0x1c, 0xf6, 0x07, 0x9d, 0xb1, - 0x5f, 0x4c, 0x06, 0xe0, 0x3c, 0xdb, 0x74, 0x67, 0x5c, 0x61, 0x18, 0x4a, 0xc4, 0xc9, 0x4a, 0x4e, - 0xa9, 0x33, 0x01, 0xaf, 0x26, 0x97, 0xbb, 0x13, 0xe0, 0xdc, 0x9b, 0x30, 0x31, 0xa5, 0x1f, 0x5d, - 0x62, 0xec, 0xfb, 0xd1, 0x27, 0x34, 0xa0, 0xe3, 0x97, 0x95, 0xd3, 0x2f, 0x60, 0x72, 0xbb, 0x87, - 0x34, 0x83, 0x24, 0x6a, 0x92, 0x23, 0xa7, 0xcb, 0x53, 0x76, 0x1a, 0x9c, 0xb1, 0x13, 0xf2, 0xc4, - 0xc7, 0xa0, 0x84, 0x81, 0xb7, 0x87, 0x50, 0x0e, 0x22, 0x70, 0xca, 0x6d, 0x68, 0x8d, 0x38, 0xca, - 0xfd, 0x5e, 0x93, 0xf6, 0x19, 0x46, 0xf7, 0xad, 0xde, 0x07, 0x60, 0xa6, 0xf7, 0x49, 0x10, 0x3a, - 0xdf, 0x14, 0x5f, 0xef, 0xb2, 0x62, 0x46, 0xf6, 0x1b, 0xcf, 0xf0, 0xca, 0xf7, 0x04, 0x98, 0xb6, - 0x4e, 0xa0, 0x7c, 0x7e, 0xd4, 0xd7, 0xc2, 0xe3, 0xef, 0x74, 0x1e, 0xfd, 0xa9, 0x83, 0xc3, 0xc4, - 0x3c, 0x24, 0x3d, 0x89, 0xb1, 0xe4, 0xef, 0x35, 0xf1, 0x7a, 0x58, 0x6a, 0x30, 0x15, 0xdf, 0x17, - 0x20, 0x61, 0x0b, 0xc2, 0xf0, 0x84, 0xbc, 0x1e, 0x9e, 0x90, 0x2e, 0xe1, 0x18, 0x39, 0x10, 0x2d, - 0xf7, 0x93, 0x77, 0x42, 0xaf, 0x8c, 0x2d, 0x54, 0xf3, 0xbb, 0x02, 0x24, 0x6c, 0xa7, 0xf0, 0x23, - 0x52, 0xd5, 0xe5, 0x4c, 0x5e, 0x21, 0x87, 0xbf, 0x39, 0x4f, 0xaa, 0xb8, 0x7b, 0xa7, 0xcf, 0xa5, - 0x8e, 0x40, 0x16, 0xfa, 0x75, 0xf3, 0x46, 0xca, 0xfc, 0x9c, 0x34, 0xc0, 0x8d, 0x94, 0x77, 0x8a, - 0xa7, 0xee, 0x16, 0xc4, 0x27, 0xfb, 0x99, 0xf8, 0x1a, 0xbd, 0x91, 0x22, 0xcf, 0x17, 0x1d, 0x9e, - 0x40, 0x52, 0x9c, 0x66, 0x6f, 0x18, 0xdd, 0x6e, 0xcb, 0xb7, 0x58, 0x82, 0x16, 0xcb, 0x67, 0xb9, - 0x12, 0x18, 0x41, 0xd0, 0x17, 0xdb, 0xd4, 0x4c, 0xbf, 0xe1, 0x0f, 0x70, 0x11, 0x99, 0xaf, 0x3f, - 0x0d, 0xae, 0xda, 0x9c, 0x94, 0x5f, 0x11, 0x60, 0xdc, 0xfa, 0xc8, 0x8d, 0xee, 0x29, 0xe9, 0xc0, - 0x33, 0x33, 0xf7, 0x24, 0x04, 0x54, 0xf6, 0xf9, 0x0c, 0x07, 0xd5, 0xfe, 0x3e, 0xcb, 0x1b, 0x2b, - 0x66, 0xe7, 0x3f, 0x12, 0x60, 0xdc, 0x7a, 0x5e, 0x1c, 0x16, 0x29, 0x73, 0x46, 0x42, 0x20, 0x7d, - 0xb3, 0x03, 0xd2, 0x33, 0xc9, 0x8e, 0x5c, 0xc5, 0x70, 0xbf, 0x23, 0xc0, 0xa4, 0xfd, 0xf3, 0x3e, - 0x0a, 0xf9, 0xa4, 0x64, 0x20, 0xdf, 0x01, 0x2e, 0x3e, 0xe3, 0x77, 0x80, 0xeb, 0x74, 0x37, 0xbe, - 0x43, 0x82, 0xbe, 0x3f, 0x22, 0xd0, 0xed, 0xce, 0xc5, 0x1f, 0x0a, 0x30, 0x6b, 0xdb, 0xa5, 0x39, - 0xbb, 0x11, 0x34, 0x9f, 0xef, 0x71, 0x9b, 0x8f, 0xf7, 0x0e, 0x0e, 0x13, 0xe7, 0x60, 0xd6, 0xb0, - 0x94, 0x0e, 0x2d, 0x0d, 0x1e, 0xf6, 0xf3, 0xb3, 0x33, 0xff, 0xc5, 0x4a, 0x8e, 0x62, 0x37, 0x37, - 0x2b, 0x61, 0x09, 0x0e, 0xb7, 0x6c, 0x4f, 0x42, 0xd1, 0x75, 0x13, 0xad, 0x74, 0xa4, 0xcb, 0xdb, - 0x3c, 0xfd, 0x9e, 0x00, 0x33, 0xb6, 0x33, 0xd4, 0x8b, 0xb1, 0x52, 0xd2, 0xc1, 0x61, 0xe2, 0x3c, - 0x24, 0x3c, 0x48, 0xf3, 0x3c, 0xd2, 0xaf, 0x88, 0xd7, 0x42, 0xd1, 0x86, 0x57, 0xed, 0xbf, 0x09, - 0x30, 0x63, 0x3b, 0x61, 0x59, 0x94, 0xdd, 0x0a, 0xbb, 0x6e, 0xe1, 0x8d, 0xdb, 0xd3, 0x70, 0x04, - 0xde, 0x4e, 0xf6, 0xb0, 0x78, 0x46, 0x40, 0xc6, 0x75, 0x0c, 0xb3, 0x28, 0x3d, 0x61, 0x09, 0x55, - 0xc3, 0x51, 0xb9, 0x96, 0xbc, 0x17, 0x9e, 0x4a, 0xa7, 0xf1, 0xa4, 0x21, 0xa8, 0x3f, 0xdd, 0x14, - 0xdb, 0x6d, 0xee, 0x57, 0x22, 0x30, 0xef, 0x3e, 0x19, 0x71, 0x86, 0x77, 0x35, 0x54, 0xd4, 0xe0, - 0x98, 0xad, 0xaf, 0x7e, 0x70, 0x98, 0x48, 0xc3, 0x82, 0xdd, 0x4f, 0x75, 0xda, 0x2a, 0xfb, 0x7f, - 0xd3, 0x41, 0x79, 0x73, 0x57, 0xbc, 0x65, 0xf0, 0xc6, 0x20, 0xde, 0x99, 0x21, 0xd4, 0xdf, 0x26, - 0xff, 0x91, 0x60, 0xff, 0x1f, 0x2e, 0xec, 0x86, 0xf9, 0x76, 0x4f, 0x0c, 0x09, 0x27, 0x09, 0x1f, - 0xf4, 0x4a, 0xf7, 0x7d, 0xf4, 0x66, 0x50, 0xba, 0xbd, 0x6d, 0xf6, 0x1f, 0x5b, 0x2f, 0xa8, 0xbd, - 0xc8, 0x40, 0x77, 0x7b, 0xa2, 0x3e, 0xbc, 0x11, 0x7f, 0x7e, 0x70, 0x98, 0xb8, 0x0e, 0x8b, 0xbe, - 0x1c, 0xa0, 0x1a, 0xe1, 0xc5, 0x02, 0xee, 0x94, 0x1c, 0x96, 0x05, 0x78, 0xf1, 0xbf, 0x1c, 0x31, - 0x1f, 0x5d, 0x1f, 0x23, 0x03, 0xc2, 0x1b, 0xf9, 0x3f, 0xd7, 0x33, 0x03, 0x56, 0x93, 0x47, 0x93, - 0x01, 0xcc, 0x85, 0x5f, 0x8a, 0xc0, 0x69, 0xef, 0x08, 0x9c, 0xc5, 0x89, 0x17, 0xa1, 0x08, 0x3f, - 0x27, 0xf4, 0xcc, 0x86, 0x42, 0x32, 0x7f, 0x24, 0x36, 0x38, 0xf7, 0x06, 0xcc, 0x92, 0xd2, 0x8f, - 0x3b, 0x4b, 0x5c, 0xcf, 0xbb, 0xc6, 0xd9, 0xc5, 0xbc, 0x99, 0x47, 0xf6, 0x56, 0xc8, 0x6c, 0xbd, - 0x81, 0xf7, 0x08, 0x9f, 0xcc, 0xba, 0xe2, 0x22, 0xfd, 0xbe, 0x54, 0x9c, 0x4c, 0x4b, 0x6d, 0x7d, - 0xd7, 0x65, 0xcd, 0x57, 0xff, 0x8d, 0xf0, 0xd5, 0xcc, 0x2f, 0x09, 0x68, 0x0d, 0xc6, 0xac, 0xd4, - 0x4c, 0x4b, 0x99, 0xad, 0xbc, 0x78, 0x15, 0xa5, 0x76, 0x75, 0xbd, 0xa5, 0xdd, 0x49, 0xa7, 0x6b, - 0x75, 0x7d, 0xb7, 0xfd, 0x64, 0xb9, 0xa2, 0xec, 0xa5, 0x31, 0x8a, 0x34, 0x43, 0x91, 0xb6, 0x50, - 0xac, 0x44, 0xaf, 0x2f, 0xdf, 0x48, 0x09, 0x91, 0x15, 0xfe, 0x3f, 0x08, 0x4c, 0xff, 0xac, 0xa6, - 0x34, 0xed, 0x25, 0x35, 0xb5, 0x55, 0xb9, 0xe3, 0x6a, 0x73, 0xc7, 0xd5, 0xe6, 0x27, 0x7d, 0xe7, - 0x6c, 0xbd, 0x5f, 0xe3, 0xe6, 0x4d, 0x4b, 0xad, 0x3a, 0xe9, 0xf0, 0xa4, 0x9f, 0xc4, 0x70, 0x5e, - 0xfd, 0x93, 0x00, 0x00, 0x00, 0xff, 0xff, 0x95, 0x4a, 0x9c, 0x64, 0x72, 0xa8, 0x00, 0x00, + 0x93, 0xa9, 0x4d, 0x71, 0xab, 0x52, 0x2e, 0x27, 0x8e, 0xb3, 0xbb, 0x76, 0x52, 0xd9, 0xaa, 0xcd, + 0x26, 0x9b, 0x87, 0x93, 0x6c, 0x26, 0x8f, 0xf2, 0xb0, 0x6a, 0x6d, 0x27, 0x1b, 0x57, 0x36, 0x95, + 0x8a, 0x1f, 0x3f, 0xe2, 0x6c, 0x2a, 0xae, 0x54, 0xf9, 0x4f, 0x36, 0x89, 0xab, 0xf2, 0x2b, 0xe5, + 0x3c, 0x7e, 0x78, 0x7e, 0x38, 0xae, 0xfb, 0xe8, 0xee, 0xdb, 0x2f, 0xa0, 0x1b, 0x24, 0xb5, 0x5a, + 0xef, 0xfc, 0x12, 0x71, 0x9f, 0xdf, 0x39, 0xf7, 0x9c, 0x73, 0xcf, 0x3d, 0xf7, 0xf6, 0x11, 0xc4, + 0xf7, 0xa4, 0xa6, 0x54, 0x93, 0xf7, 0xe4, 0xa6, 0xbe, 0xdc, 0x52, 0x15, 0x5d, 0x41, 0x8b, 0x15, + 0x49, 0xd1, 0x96, 0xbf, 0x58, 0xd7, 0xa5, 0xaa, 0xdc, 0x58, 0xe6, 0xaa, 0xa5, 0x56, 0x7d, 0xf9, + 0xd9, 0x8d, 0xe4, 0x7c, 0x4d, 0x51, 0x6a, 0x0d, 0x39, 0x2d, 0xb5, 0xea, 0x69, 0xa9, 0xd9, 0x54, + 0x74, 0x49, 0xaf, 0x2b, 0x4d, 0x8d, 0xf6, 0x4e, 0xce, 0xb1, 0x5a, 0xf2, 0xeb, 0x49, 0xfb, 0x69, + 0x5a, 0xde, 0x6b, 0xe9, 0xfb, 0xac, 0x72, 0xde, 0x59, 0xa9, 0xe9, 0x6a, 0xbb, 0xc2, 0x26, 0x4e, + 0x9e, 0x76, 0xd6, 0xea, 0xf5, 0x3d, 0x59, 0xd3, 0xa5, 0xbd, 0x16, 0x6b, 0x70, 0x95, 0xfc, 0x53, + 0xb9, 0x56, 0x93, 0x9b, 0xd7, 0xb4, 0xe7, 0x52, 0xad, 0x26, 0xab, 0x69, 0xa5, 0x45, 0x66, 0xf7, + 0x40, 0x32, 0xfb, 0x4c, 0x6a, 0xd4, 0xab, 0x92, 0x2e, 0xa7, 0x8d, 0x3f, 0x58, 0xc5, 0x92, 0x73, + 0x9e, 0xaa, 0xac, 0x55, 0xd4, 0x7a, 0x4b, 0x57, 0x54, 0xd6, 0x22, 0x21, 0xb5, 0xf5, 0x5d, 0x3a, + 0xb2, 0x31, 0x01, 0xad, 0x11, 0xdf, 0x83, 0xd1, 0xb5, 0x5d, 0xa9, 0x59, 0x93, 0x4b, 0xf2, 0x17, + 0xda, 0xb2, 0xa6, 0xa3, 0x31, 0x88, 0xd4, 0xab, 0x09, 0x61, 0x49, 0xb8, 0x34, 0x54, 0x8a, 0xd4, + 0xab, 0x68, 0x0a, 0xfa, 0x1a, 0xf5, 0xbd, 0xba, 0x9e, 0x88, 0x2c, 0x09, 0x97, 0x62, 0x25, 0xfa, + 0x03, 0x5d, 0x84, 0x71, 0x0d, 0x77, 0x68, 0x56, 0xe4, 0xb2, 0xf2, 0xf4, 0xa9, 0x26, 0xeb, 0x89, + 0x28, 0xa9, 0x1f, 0x33, 0x8a, 0x8b, 0xa4, 0x54, 0xdc, 0x87, 0x01, 0x3a, 0xbe, 0x86, 0xde, 0x82, + 0x81, 0x0a, 0xfd, 0x33, 0x21, 0x2c, 0x45, 0x2f, 0x0d, 0xaf, 0x5c, 0x58, 0xee, 0xbc, 0x32, 0xcb, + 0x0c, 0x99, 0xd1, 0x0d, 0xcd, 0x40, 0x3f, 0x9b, 0x8c, 0x82, 0x61, 0xbf, 0x2c, 0x8c, 0x51, 0x0e, + 0xa3, 0xf8, 0x5b, 0x02, 0xf4, 0xd3, 0x11, 0xd0, 0x5d, 0x18, 0xa6, 0x63, 0x94, 0x31, 0xdb, 0x08, + 0x75, 0xc3, 0x2b, 0xc9, 0x65, 0xca, 0xb7, 0x65, 0x83, 0x6f, 0xcb, 0x3b, 0xc6, 0xfa, 0x94, 0x80, + 0x36, 0xcf, 0x4a, 0xba, 0x8c, 0x16, 0x00, 0xe4, 0x67, 0x72, 0x53, 0x2f, 0xeb, 0xfb, 0x2d, 0x99, + 0xcc, 0x3c, 0x54, 0x1a, 0x22, 0x25, 0x3b, 0xfb, 0x2d, 0x19, 0x25, 0x61, 0xd0, 0xa0, 0x99, 0xcd, + 0x6f, 0xfe, 0xc6, 0x75, 0x7b, 0x4a, 0xb5, 0xfe, 0xb4, 0x2e, 0xab, 0x89, 0x18, 0xe9, 0x68, 0xfe, + 0x46, 0x57, 0x20, 0x56, 0x95, 0x74, 0x29, 0xd1, 0x47, 0xc0, 0xcc, 0xba, 0xc0, 0x6c, 0x13, 0x51, + 0x2a, 0x91, 0x46, 0xe2, 0x3d, 0x18, 0xcd, 0xb4, 0x5a, 0x8d, 0x7a, 0x85, 0x48, 0x44, 0x3e, 0xeb, + 0x5a, 0xa6, 0x05, 0x80, 0x96, 0xaa, 0xfc, 0xac, 0x5c, 0xd1, 0xcb, 0xf5, 0xaa, 0x01, 0x92, 0x95, + 0xe4, 0xab, 0xe2, 0x1c, 0x0c, 0x6d, 0xb1, 0x1f, 0xae, 0xbe, 0x62, 0x02, 0xfa, 0x1f, 0x69, 0xb2, + 0xea, 0x51, 0x73, 0x16, 0x86, 0x71, 0x4d, 0x6e, 0x4f, 0xaa, 0x37, 0xf2, 0x59, 0xcc, 0x67, 0x19, + 0xff, 0xc9, 0x5a, 0xd0, 0x1f, 0xe2, 0x7b, 0x30, 0xf1, 0xa8, 0x59, 0xff, 0x42, 0x5b, 0xc6, 0x4d, + 0x0d, 0x31, 0xba, 0x08, 0x43, 0x6d, 0x4d, 0x56, 0xcb, 0x4d, 0x69, 0x8f, 0xf2, 0x7b, 0x68, 0x15, + 0x3e, 0x5d, 0x1d, 0x50, 0xfb, 0xe2, 0x42, 0xe2, 0xdf, 0x0b, 0xa5, 0x41, 0x5c, 0x59, 0x90, 0xf6, + 0x64, 0xb4, 0x64, 0x8c, 0x19, 0x71, 0x35, 0x62, 0xe3, 0xdf, 0x00, 0xc4, 0x8f, 0xaf, 0xb5, 0x94, + 0xa6, 0x26, 0xa3, 0x39, 0x18, 0xaa, 0x6b, 0xe5, 0x36, 0xa9, 0x20, 0x13, 0x0c, 0x96, 0x06, 0xeb, + 0x1a, 0x6d, 0x28, 0xfe, 0x8f, 0x3e, 0x98, 0x58, 0x53, 0x65, 0x49, 0xef, 0x0d, 0xd3, 0x65, 0x80, + 0xa7, 0x75, 0x55, 0xd3, 0x69, 0x4b, 0x37, 0xb0, 0x21, 0x52, 0x4b, 0x9a, 0x5e, 0x84, 0xa1, 0x86, + 0x64, 0xb4, 0x8c, 0xba, 0xc7, 0xc4, 0x95, 0xa4, 0xe1, 0x79, 0x18, 0x6a, 0xd6, 0x2b, 0xef, 0xd3, + 0x86, 0x44, 0x16, 0x56, 0x07, 0x3f, 0x5d, 0xed, 0x53, 0xa3, 0xa4, 0x19, 0xae, 0x22, 0xcd, 0xae, + 0xc0, 0x48, 0xb5, 0xae, 0xb5, 0x1a, 0xd2, 0x3e, 0x6d, 0xd9, 0xe7, 0x68, 0x39, 0xcc, 0x6a, 0x49, + 0xe3, 0xdb, 0x80, 0x5a, 0xaa, 0xfc, 0x54, 0x56, 0x55, 0xb9, 0x5a, 0x6e, 0x48, 0xcd, 0x5a, 0x5b, + 0xaa, 0xc9, 0x89, 0x7e, 0x47, 0x97, 0x09, 0xb3, 0xcd, 0x06, 0x6b, 0x82, 0xee, 0x41, 0x7f, 0x4d, + 0x6e, 0x56, 0x65, 0x35, 0x31, 0xb0, 0x24, 0x5c, 0x1a, 0xeb, 0xae, 0x89, 0xeb, 0xa4, 0x75, 0x89, + 0xf5, 0x42, 0xa2, 0xb1, 0x68, 0x83, 0x64, 0xae, 0x91, 0x4f, 0x57, 0x87, 0xd4, 0x01, 0x42, 0xf1, + 0xcf, 0x18, 0xcb, 0x86, 0x52, 0x30, 0x51, 0xd7, 0xca, 0xe4, 0xef, 0xf2, 0x33, 0x59, 0xc5, 0x42, + 0x5f, 0x4d, 0x0c, 0x91, 0x85, 0x1a, 0xaf, 0x6b, 0x44, 0xa4, 0xde, 0x61, 0xc5, 0x68, 0x01, 0xfa, + 0x5a, 0xbb, 0x4a, 0x53, 0x4e, 0x0c, 0x93, 0xf1, 0x06, 0x3e, 0x5d, 0x8d, 0xa9, 0x91, 0xc4, 0x54, + 0x89, 0x96, 0xb2, 0xa1, 0xc8, 0xdf, 0xd6, 0x50, 0x23, 0xc6, 0x50, 0x5b, 0xb8, 0xdc, 0x1c, 0x4a, + 0x84, 0x81, 0x8a, 0xd2, 0x6e, 0xea, 0xea, 0x7e, 0x62, 0xd4, 0xc1, 0x08, 0xa3, 0x02, 0x9d, 0x83, + 0xc1, 0x86, 0x52, 0x91, 0x1a, 0x75, 0x7d, 0x3f, 0x31, 0xe6, 0x5c, 0x0a, 0xa3, 0x06, 0x5d, 0x86, + 0xe1, 0x96, 0xa2, 0xe9, 0x52, 0xa3, 0x5c, 0x51, 0xaa, 0x72, 0x62, 0xdc, 0xd1, 0x10, 0x68, 0xe5, + 0x9a, 0x52, 0xc5, 0x42, 0xdc, 0xaf, 0xca, 0xb5, 0xba, 0xd2, 0x4c, 0xc4, 0x1d, 0xad, 0x58, 0x39, + 0x4a, 0xc3, 0x98, 0xa6, 0xab, 0xb2, 0xac, 0x97, 0xa5, 0x6a, 0x55, 0x95, 0x35, 0x2d, 0x31, 0xe1, + 0x68, 0x39, 0x4a, 0xeb, 0x33, 0xb4, 0x1a, 0x9d, 0x85, 0xc1, 0x96, 0xa4, 0x69, 0xcf, 0x15, 0xb5, + 0x9a, 0x40, 0x3c, 0x57, 0x1e, 0x96, 0xcc, 0x0a, 0xf1, 0x8f, 0xfb, 0x21, 0x86, 0x25, 0xdc, 0x65, + 0x0e, 0xee, 0x43, 0x9f, 0xa6, 0x63, 0x53, 0x17, 0x21, 0xeb, 0x7b, 0xb9, 0xdb, 0xfa, 0xe2, 0x41, + 0xb6, 0x71, 0x87, 0x12, 0xed, 0x87, 0xee, 0xc3, 0x68, 0x05, 0x2b, 0x50, 0x5d, 0x69, 0x52, 0x9b, + 0x19, 0xed, 0x6a, 0x33, 0x47, 0x8c, 0x0e, 0xc4, 0x6a, 0x3a, 0x4c, 0x6e, 0x2c, 0x94, 0xc9, 0x7d, + 0x03, 0x80, 0x68, 0x55, 0x43, 0xa9, 0xd5, 0x9b, 0xcc, 0x42, 0x76, 0xea, 0x4b, 0x74, 0x70, 0x03, + 0x37, 0x46, 0x39, 0x88, 0x1b, 0xec, 0x29, 0xd3, 0x11, 0xab, 0x44, 0x23, 0x3a, 0x0f, 0x30, 0x6e, + 0xf4, 0xa1, 0x1b, 0x46, 0x15, 0x9b, 0x17, 0xcb, 0x56, 0x0c, 0x50, 0xd3, 0x6d, 0xda, 0x87, 0x05, + 0x9b, 0x7d, 0x18, 0xa4, 0xc6, 0xd6, 0xb2, 0x09, 0x73, 0xbc, 0x4d, 0x18, 0xa2, 0x7d, 0x4d, 0x3b, + 0x70, 0xc6, 0xa1, 0xe0, 0x40, 0xea, 0x6d, 0x6a, 0x3d, 0xc7, 0x9b, 0x8a, 0x61, 0xda, 0xdf, 0x34, + 0x10, 0xd7, 0x3c, 0x75, 0x7e, 0x84, 0xb4, 0xea, 0xa8, 0xe9, 0xa3, 0x3d, 0x69, 0xba, 0x69, 0xf2, + 0xc7, 0x38, 0x93, 0xef, 0xad, 0xdb, 0xe3, 0xde, 0xba, 0x3d, 0x65, 0xe8, 0x76, 0x9c, 0x8e, 0xd0, + 0x41, 0xa5, 0x27, 0xbc, 0x55, 0x3a, 0x61, 0xa9, 0x34, 0xd1, 0x04, 0x4b, 0x91, 0x93, 0x9c, 0x22, + 0x4f, 0x32, 0x46, 0x1b, 0xea, 0x7b, 0xda, 0xae, 0xbe, 0x53, 0xa4, 0x9a, 0x57, 0xda, 0x19, 0x53, + 0x69, 0xa7, 0x49, 0x9d, 0xa1, 0xaa, 0xe7, 0x5d, 0xaa, 0x3a, 0x43, 0xea, 0xed, 0x0a, 0x2a, 0xfe, + 0x89, 0x00, 0x13, 0x44, 0x6d, 0x64, 0x49, 0xad, 0xec, 0x1a, 0x7b, 0x8c, 0xe5, 0xa2, 0x08, 0xde, + 0x2e, 0x8a, 0xcd, 0x8d, 0x7a, 0x0f, 0xc6, 0x34, 0x45, 0xd5, 0xeb, 0xcd, 0x5a, 0xb9, 0xa2, 0x34, + 0xda, 0x7b, 0x4d, 0xa2, 0x66, 0x63, 0x2b, 0xd7, 0x02, 0xe9, 0x2b, 0x99, 0xf8, 0x6d, 0x79, 0x9f, + 0x18, 0x91, 0x03, 0x21, 0xb2, 0xf4, 0x4a, 0x69, 0x94, 0x0d, 0xb7, 0x46, 0x46, 0x43, 0x71, 0x88, + 0x4a, 0x5a, 0x85, 0x28, 0xdf, 0x60, 0x09, 0xff, 0x89, 0xf2, 0x30, 0xf0, 0x85, 0xb6, 0xac, 0xd6, + 0x65, 0x2d, 0xd1, 0x47, 0x9c, 0xb0, 0x74, 0xf0, 0xa9, 0x3e, 0xdf, 0x96, 0xd5, 0xfd, 0x92, 0xd1, + 0x5f, 0xfc, 0x8e, 0x00, 0xe3, 0x8e, 0x4a, 0x94, 0x87, 0xe8, 0xfb, 0xf2, 0x3e, 0xa1, 0xfd, 0x08, + 0x54, 0xe0, 0x31, 0x50, 0x16, 0xfa, 0xf7, 0x64, 0x7d, 0x57, 0xa9, 0x32, 0x1b, 0x76, 0xb5, 0xdb, + 0x68, 0x74, 0xa4, 0x4d, 0xd2, 0xa7, 0xc4, 0xfa, 0x62, 0xbe, 0x3f, 0x93, 0x1a, 0x6d, 0xb6, 0x37, + 0x97, 0xe8, 0x0f, 0xf1, 0xef, 0x0a, 0x80, 0xf8, 0xb5, 0x63, 0x3e, 0x45, 0xb8, 0xc5, 0x3b, 0x03, + 0x23, 0xba, 0x82, 0xe5, 0x4b, 0x95, 0xb5, 0x76, 0xc3, 0x70, 0x3e, 0x87, 0x49, 0x59, 0x89, 0x14, + 0xa1, 0xcf, 0x61, 0x11, 0x23, 0x95, 0x31, 0xc2, 0xec, 0x73, 0x41, 0x38, 0x52, 0x62, 0x7d, 0xc4, + 0x3f, 0x8c, 0x50, 0xf7, 0x6b, 0x4b, 0x55, 0x9e, 0xd6, 0x1b, 0xf2, 0xf1, 0x1b, 0x79, 0xbb, 0x1d, + 0x8b, 0x76, 0xb4, 0x63, 0x31, 0x87, 0x1d, 0xb3, 0x19, 0xa9, 0x3e, 0x87, 0x91, 0x72, 0x1a, 0xb9, + 0x7e, 0xb7, 0x91, 0xf3, 0xb6, 0x63, 0x03, 0xdd, 0xed, 0xd8, 0x60, 0x4f, 0x76, 0xcc, 0x66, 0xcf, + 0x87, 0xec, 0xf6, 0x5c, 0xfc, 0x9d, 0x08, 0x24, 0x1e, 0xb5, 0xaa, 0xcc, 0x5d, 0x64, 0xec, 0xf6, + 0x3b, 0x10, 0x7d, 0xe6, 0x1c, 0x76, 0x66, 0xb5, 0xf8, 0xe7, 0x61, 0xc8, 0x3c, 0x34, 0x78, 0x1d, + 0x27, 0x39, 0x77, 0xbf, 0xe3, 0x7e, 0x12, 0xf5, 0xdc, 0x4f, 0xc4, 0x67, 0x30, 0x63, 0xad, 0x15, + 0xa9, 0xf2, 0x5b, 0xa9, 0xae, 0x47, 0x8b, 0x50, 0xf3, 0x32, 0xb2, 0xc8, 0xd6, 0xe4, 0x45, 0x16, + 0xdd, 0xe4, 0x22, 0x5d, 0x37, 0xb9, 0xa8, 0xe7, 0x26, 0x27, 0xb6, 0x79, 0xb2, 0x48, 0x95, 0x1f, + 0x59, 0xa7, 0x6d, 0x73, 0xad, 0x0e, 0x7d, 0xba, 0xda, 0xaf, 0xc6, 0xe2, 0x42, 0x17, 0x77, 0xd9, + 0x67, 0xda, 0x5f, 0x15, 0xa8, 0x8d, 0x31, 0xdc, 0x4e, 0xe7, 0x64, 0xdc, 0xde, 0x1b, 0xf1, 0xdf, + 0x7b, 0xa3, 0x9d, 0xf7, 0xde, 0x58, 0x87, 0xbd, 0xb7, 0xaf, 0xcb, 0xde, 0xdb, 0xef, 0xb5, 0xf7, + 0xfe, 0x6f, 0x81, 0x57, 0x58, 0x56, 0xea, 0xc7, 0x2f, 0xd1, 0x41, 0x42, 0xb7, 0x13, 0x41, 0x34, + 0xe8, 0x89, 0x20, 0x16, 0xe8, 0x44, 0xd0, 0x17, 0xf8, 0x44, 0xd0, 0xdf, 0xf1, 0x44, 0x20, 0x16, + 0x61, 0x64, 0xb3, 0xdd, 0xd0, 0xeb, 0x0f, 0xa4, 0x8a, 0xae, 0xa8, 0x1a, 0xba, 0x0f, 0xb1, 0xbd, + 0xa7, 0x92, 0x11, 0x4c, 0xb9, 0xd2, 0x4d, 0x4b, 0xb9, 0xbe, 0x25, 0xd2, 0x51, 0xfc, 0x79, 0x01, + 0x86, 0xb9, 0x52, 0x74, 0x17, 0x62, 0x24, 0xc4, 0x41, 0x77, 0xef, 0x8b, 0x5d, 0x07, 0x7c, 0x2a, + 0xed, 0xec, 0xb7, 0xe4, 0x12, 0xe9, 0x84, 0xee, 0xd9, 0x37, 0xa3, 0x4b, 0x5d, 0x7b, 0x3f, 0xc8, + 0xf0, 0x7b, 0x91, 0x38, 0x0f, 0xb0, 0xc5, 0x7c, 0x70, 0x8f, 0x40, 0xc4, 0x43, 0x18, 0x37, 0x6a, + 0xfd, 0x96, 0xf9, 0x3c, 0x77, 0x60, 0x72, 0x68, 0x06, 0x7f, 0x64, 0xba, 0x00, 0x53, 0x25, 0x59, + 0x93, 0xf5, 0x2e, 0xc3, 0x89, 0xcf, 0x60, 0x71, 0xdb, 0x6a, 0x55, 0x50, 0xf4, 0xfa, 0x53, 0x16, + 0x7d, 0xf1, 0x03, 0x90, 0x65, 0xec, 0xa3, 0x0c, 0xb8, 0xde, 0x8d, 0x01, 0xfc, 0x90, 0x16, 0x1f, + 0xc5, 0xab, 0x90, 0x34, 0x26, 0x5d, 0x53, 0xf6, 0x5a, 0x0d, 0xf9, 0x83, 0xba, 0xbe, 0xbf, 0xa5, + 0x34, 0xea, 0x95, 0x7d, 0x0f, 0xbe, 0x7c, 0x12, 0x85, 0x84, 0x5f, 0x73, 0x0f, 0x7b, 0x38, 0x6c, + 0x44, 0x06, 0xb1, 0x60, 0x46, 0xd8, 0xa6, 0x6c, 0x15, 0xa1, 0x8c, 0xb1, 0x88, 0xd4, 0x0d, 0xed, + 0x2a, 0x53, 0x74, 0xa2, 0xce, 0x07, 0xc7, 0xd8, 0xd1, 0x0e, 0x8e, 0x7d, 0x61, 0x63, 0x75, 0x7b, + 0xf5, 0x66, 0xb9, 0x21, 0x37, 0x6b, 0xfa, 0x2e, 0x51, 0xa8, 0x58, 0x69, 0x68, 0xaf, 0xde, 0xdc, + 0x20, 0x05, 0xe8, 0x2c, 0x8c, 0xee, 0x4a, 0x5a, 0xb9, 0xa1, 0x3c, 0x97, 0xd5, 0x8a, 0xa4, 0x51, + 0x7f, 0x63, 0xb0, 0x34, 0xb2, 0x2b, 0x69, 0x1b, 0x46, 0x99, 0xd1, 0xa8, 0xdd, 0x6a, 0xb1, 0x46, + 0x83, 0x66, 0xa3, 0x47, 0x46, 0x19, 0x9e, 0x08, 0x37, 0x6a, 0xb6, 0xf7, 0x9e, 0xc8, 0x2a, 0x0b, + 0x6b, 0x0c, 0xed, 0x4a, 0x5a, 0x81, 0x14, 0x18, 0xd5, 0xda, 0xfe, 0xde, 0x13, 0xa5, 0x41, 0xce, + 0x78, 0xb4, 0x7a, 0x9b, 0x14, 0x88, 0xff, 0x47, 0x80, 0x45, 0xbf, 0x65, 0xa3, 0x71, 0x2b, 0x94, + 0xb2, 0x2f, 0x96, 0xc0, 0xdb, 0x86, 0xff, 0x1b, 0xb5, 0x2f, 0x9b, 0x9d, 0xea, 0x48, 0x57, 0xaa, + 0xa3, 0x41, 0xa8, 0x8e, 0x75, 0xa5, 0xba, 0xaf, 0x33, 0xd5, 0xfd, 0x4e, 0xaa, 0xbf, 0x1c, 0xf1, + 0xa7, 0x9a, 0x5a, 0x73, 0x97, 0xc8, 0xa6, 0x3c, 0x44, 0x36, 0x18, 0x17, 0xa2, 0x5d, 0xb9, 0x10, + 0x0b, 0xc2, 0x85, 0xbe, 0xae, 0x5c, 0xe8, 0xef, 0xcc, 0x85, 0x01, 0x27, 0x17, 0xce, 0xc3, 0xa4, + 0xc1, 0x84, 0x4c, 0x4d, 0xf6, 0xd5, 0xec, 0xff, 0x18, 0x81, 0x09, 0x57, 0xbb, 0x1f, 0x47, 0x95, + 0x5e, 0x82, 0x91, 0x3d, 0xe9, 0x83, 0xb2, 0x44, 0x7a, 0xef, 0x6b, 0x4c, 0xa9, 0x61, 0x4f, 0xfa, + 0x20, 0x83, 0x5b, 0xec, 0x6b, 0xe8, 0x12, 0xc4, 0xe5, 0x0f, 0x5a, 0x75, 0x55, 0x2e, 0x3f, 0x97, + 0xd4, 0x26, 0x6d, 0x35, 0x40, 0x6f, 0x23, 0x68, 0xf9, 0x63, 0x49, 0x6d, 0xe2, 0x96, 0xe2, 0x57, + 0x04, 0x98, 0x75, 0x31, 0xb5, 0x07, 0x85, 0x73, 0x62, 0x8a, 0x04, 0xc2, 0x14, 0xf5, 0xc4, 0xf4, + 0x77, 0xbc, 0x30, 0x1d, 0x83, 0x3a, 0x38, 0x31, 0x46, 0x03, 0x61, 0x8c, 0x79, 0x62, 0xbc, 0x6c, + 0x41, 0xdc, 0x50, 0x2a, 0xef, 0x2b, 0x6d, 0xdd, 0x57, 0x6e, 0x7f, 0x10, 0x81, 0x69, 0xcf, 0xb6, + 0x3f, 0x8e, 0xb2, 0x7b, 0x86, 0xad, 0x81, 0xae, 0xcb, 0x7b, 0x2d, 0xdd, 0x90, 0xdd, 0x61, 0xbc, + 0x06, 0xac, 0x08, 0xbd, 0x0a, 0x33, 0xda, 0xae, 0xf2, 0xbc, 0xdc, 0x50, 0x2a, 0xef, 0x97, 0x95, + 0xb6, 0x5e, 0x7e, 0x2a, 0xd5, 0x1b, 0x6d, 0x55, 0xd6, 0x98, 0xe5, 0x98, 0xc4, 0xb5, 0x98, 0x91, + 0xc5, 0xb6, 0xfe, 0x80, 0x55, 0x61, 0x99, 0x99, 0xf3, 0x64, 0x72, 0x0f, 0xb2, 0xec, 0xc4, 0x18, + 0x09, 0x83, 0x31, 0xea, 0x8f, 0xf1, 0x5f, 0xf8, 0x61, 0x3c, 0x06, 0xd9, 0x76, 0x62, 0x8e, 0x86, + 0xc1, 0x1c, 0xf3, 0xc7, 0x3c, 0x0b, 0x7d, 0x45, 0xb5, 0xe6, 0x79, 0x11, 0x36, 0x54, 0x54, 0x6b, + 0x59, 0x65, 0x4f, 0xaa, 0x37, 0xf1, 0xe1, 0xa5, 0x4a, 0xfe, 0x62, 0x0d, 0xd8, 0x2f, 0xf1, 0xff, + 0x0b, 0x10, 0x2d, 0xaa, 0x35, 0x17, 0x65, 0x61, 0x5d, 0xe3, 0xa2, 0x5a, 0x7b, 0x89, 0x62, 0xf1, + 0x08, 0x62, 0x5c, 0x8c, 0x87, 0xfc, 0xcd, 0x71, 0xa0, 0xdf, 0xc6, 0x81, 0x0b, 0x30, 0x56, 0x54, + 0x6b, 0x9b, 0x32, 0xde, 0x07, 0x4b, 0x4a, 0x43, 0xd6, 0xf0, 0xc1, 0x58, 0xc5, 0x7f, 0x90, 0x53, + 0xca, 0x50, 0x89, 0xfe, 0x10, 0x7f, 0x25, 0x42, 0xf8, 0x49, 0x1b, 0xa2, 0x59, 0x18, 0x20, 0xb1, + 0x19, 0x93, 0x69, 0xfd, 0xf8, 0x67, 0xde, 0x11, 0x84, 0x8f, 0x38, 0x82, 0xf0, 0x66, 0x24, 0x21, + 0xca, 0x47, 0x12, 0xec, 0x21, 0xad, 0x58, 0xc7, 0x90, 0x56, 0x9f, 0x23, 0xa4, 0x65, 0x62, 0xed, + 0xe7, 0xb0, 0x3a, 0x99, 0x37, 0x10, 0x8a, 0x79, 0xae, 0xa5, 0x1b, 0x0c, 0xb7, 0x74, 0xe2, 0x4f, + 0xc1, 0x64, 0xa6, 0x5a, 0xb5, 0x98, 0xca, 0xce, 0x1e, 0xd3, 0xd0, 0xaf, 0xa8, 0x35, 0x8b, 0x63, + 0x7d, 0x8a, 0x5a, 0xcb, 0x57, 0x79, 0x4e, 0x46, 0x6c, 0x9c, 0x34, 0x49, 0x8b, 0xf2, 0xcb, 0xf0, + 0x1e, 0xcc, 0xd0, 0xfb, 0x8e, 0x13, 0x1a, 0xff, 0x21, 0xcc, 0x94, 0xe4, 0x3d, 0xe5, 0xd9, 0x91, + 0xc7, 0x17, 0x3f, 0x16, 0x60, 0xd6, 0x1c, 0xe4, 0xa4, 0xa3, 0xb6, 0x19, 0x47, 0xd4, 0xf6, 0x72, + 0x00, 0x85, 0x65, 0xe4, 0x19, 0xa1, 0xdb, 0x8f, 0x05, 0x98, 0x71, 0xe1, 0xed, 0x48, 0x7a, 0xa8, + 0xb7, 0x0d, 0xa8, 0x60, 0x85, 0xf1, 0x29, 0xc6, 0x9b, 0x81, 0x31, 0x7a, 0xc6, 0xf2, 0xff, 0x8d, + 0x00, 0x53, 0x5e, 0x2d, 0x50, 0x81, 0x0f, 0xe8, 0xaf, 0x84, 0x9c, 0xe4, 0x05, 0x47, 0xf5, 0x6f, + 0xc1, 0x14, 0x7b, 0xe4, 0x40, 0xb7, 0x41, 0x83, 0xe3, 0x8b, 0xcc, 0x82, 0xb9, 0xaf, 0xfc, 0x49, + 0xb9, 0xf8, 0xc0, 0xec, 0x47, 0xb7, 0x26, 0xbf, 0x03, 0xbe, 0x31, 0x4e, 0xc4, 0x67, 0x9c, 0x22, + 0x0c, 0xb2, 0x71, 0x34, 0xb4, 0x06, 0x83, 0xec, 0xf5, 0x85, 0x11, 0xa0, 0xe9, 0x1a, 0x4f, 0x61, + 0x7d, 0x4b, 0x66, 0x47, 0xf1, 0x7b, 0x51, 0x18, 0x60, 0xa5, 0x2e, 0x30, 0x88, 0x07, 0xc3, 0xcc, + 0xf2, 0xaa, 0xdd, 0x5f, 0xba, 0x1a, 0x70, 0x46, 0xdb, 0x66, 0x73, 0xa4, 0xbd, 0xc2, 0x65, 0xee, + 0xfa, 0x42, 0xee, 0x54, 0xf7, 0x59, 0x0c, 0xa5, 0x3f, 0xa0, 0xc3, 0x47, 0x09, 0xe0, 0xc2, 0x50, + 0xe7, 0x61, 0x4c, 0x95, 0x35, 0xa5, 0xad, 0x56, 0xe4, 0xb2, 0xf2, 0xbc, 0xc9, 0x82, 0xd8, 0x43, + 0xa5, 0x51, 0xa3, 0xb4, 0x88, 0x0b, 0x39, 0x25, 0x1c, 0xe4, 0x95, 0xf0, 0x14, 0x0c, 0xe2, 0x62, + 0xee, 0x92, 0x60, 0x40, 0x51, 0x6b, 0xc6, 0x9d, 0x2f, 0xae, 0x62, 0xdb, 0x1e, 0xbd, 0xb5, 0x1d, + 0x52, 0x4c, 0x9f, 0xe0, 0x14, 0x0c, 0xd6, 0x54, 0xa9, 0x49, 0x5e, 0xdf, 0xd0, 0x2b, 0xdb, 0x01, + 0xf2, 0x3b, 0x5f, 0x15, 0xff, 0x91, 0x00, 0xd3, 0x06, 0xa7, 0x4f, 0xd8, 0x72, 0xdd, 0x77, 0x58, + 0xae, 0xc0, 0x32, 0x67, 0xd8, 0xad, 0xaf, 0x0a, 0xa6, 0x2e, 0x1c, 0xe5, 0x5e, 0x73, 0xc3, 0x32, + 0x4f, 0x51, 0x02, 0x64, 0x25, 0xa8, 0x28, 0x7a, 0x19, 0xa7, 0xef, 0x0a, 0x80, 0xdc, 0xf5, 0x68, + 0x83, 0x37, 0x4d, 0xd7, 0x43, 0x4d, 0xf0, 0x82, 0x0d, 0x53, 0xca, 0xc4, 0xdf, 0xdd, 0x35, 0xfa, + 0x76, 0x04, 0x46, 0x6d, 0x8d, 0x3f, 0x73, 0x8f, 0x3a, 0xb8, 0x47, 0x9f, 0x87, 0xb8, 0x8d, 0x59, + 0x99, 0x6a, 0xd5, 0x65, 0x29, 0x43, 0x3a, 0x2d, 0x3b, 0x30, 0x69, 0x1b, 0x92, 0x3d, 0x21, 0x3c, + 0xe2, 0xa8, 0xf7, 0x1c, 0xa3, 0x52, 0xbf, 0x28, 0xf0, 0xa8, 0xe2, 0x1e, 0x8c, 0x19, 0xba, 0xaa, + 0x34, 0x64, 0x2f, 0x32, 0xbd, 0x36, 0x04, 0xe7, 0x3d, 0x6c, 0xd4, 0x7d, 0x0f, 0x3b, 0x05, 0x7d, + 0x35, 0x55, 0x69, 0xb7, 0x98, 0x30, 0xd0, 0x1f, 0xe2, 0xaf, 0x0b, 0x30, 0xcc, 0xcd, 0xe7, 0x78, + 0x5e, 0x28, 0x38, 0x9e, 0x17, 0xf6, 0x3a, 0xf7, 0x91, 0x0f, 0xe7, 0x26, 0xf8, 0x3e, 0x1e, 0xfc, + 0x6d, 0x98, 0xe0, 0xb0, 0xfb, 0x70, 0xda, 0x03, 0x32, 0x3e, 0xb2, 0x9e, 0xe2, 0x7a, 0x9e, 0xb4, + 0xb5, 0x5e, 0x73, 0x58, 0xeb, 0xa0, 0xdb, 0x1d, 0xa1, 0xca, 0xb0, 0xd8, 0xbf, 0x26, 0x40, 0xc2, + 0x03, 0x33, 0xb5, 0xda, 0x5d, 0x96, 0x2d, 0x9c, 0xcf, 0xb9, 0xe5, 0xf4, 0x39, 0x6f, 0x85, 0xc0, + 0xeb, 0x69, 0xd8, 0xff, 0x9d, 0x00, 0x33, 0xde, 0x6d, 0xd0, 0x16, 0x6f, 0xdc, 0x6f, 0x86, 0x9e, + 0xe8, 0x05, 0x1b, 0xf8, 0x43, 0x01, 0xe6, 0x6c, 0xea, 0x7d, 0xd2, 0xa2, 0x93, 0x73, 0x88, 0xce, + 0xb5, 0x80, 0x1c, 0x72, 0x1c, 0x53, 0xfe, 0x95, 0x00, 0x49, 0x4f, 0xdc, 0x27, 0x20, 0x3e, 0x25, + 0xa7, 0xf8, 0xbc, 0x1e, 0x0a, 0xb3, 0xa7, 0x00, 0xfd, 0xb6, 0x25, 0xfc, 0xee, 0xa3, 0x4b, 0x89, + 0x17, 0xa1, 0x5b, 0x3d, 0x4c, 0xf6, 0x82, 0x85, 0xe8, 0x77, 0x23, 0x30, 0xcc, 0x3d, 0xf2, 0x3e, + 0x72, 0x18, 0x29, 0xd3, 0x6a, 0xbd, 0xe4, 0x61, 0xa4, 0x4d, 0x18, 0x56, 0xea, 0xd5, 0x4a, 0xb9, + 0xa2, 0x34, 0x9f, 0xd6, 0x6b, 0x6c, 0xf3, 0x4f, 0x75, 0x3d, 0x64, 0xe6, 0xb3, 0x6b, 0x6b, 0xa4, + 0xc7, 0xc3, 0x57, 0x4a, 0x80, 0x07, 0xa0, 0xbf, 0x56, 0x47, 0x00, 0xa4, 0x56, 0x8b, 0x8d, 0x26, + 0x3e, 0x81, 0x09, 0x8e, 0x9b, 0x2c, 0xe8, 0xd8, 0x45, 0xa2, 0x29, 0xcb, 0x23, 0xae, 0x13, 0x5f, + 0x9f, 0xcf, 0x89, 0xef, 0x97, 0x63, 0x00, 0x16, 0x1c, 0x74, 0x16, 0x46, 0x55, 0xb9, 0x5a, 0x57, + 0xf1, 0xf0, 0x6d, 0xb5, 0x6e, 0x78, 0x76, 0x23, 0x46, 0xe1, 0x23, 0xb5, 0xae, 0xa1, 0xc7, 0xe4, + 0x84, 0x42, 0xec, 0x02, 0xf9, 0xa2, 0x40, 0x4b, 0x44, 0x96, 0xa2, 0x41, 0x3c, 0x58, 0x3c, 0x91, + 0x61, 0x51, 0xc8, 0x89, 0x67, 0x54, 0xe5, 0x7e, 0x69, 0xa8, 0x00, 0xc3, 0xf4, 0x08, 0x42, 0x47, + 0x8d, 0x92, 0x51, 0xaf, 0x05, 0x19, 0x75, 0x1d, 0x77, 0x23, 0x43, 0x42, 0xcd, 0xf8, 0x53, 0x43, + 0xef, 0x41, 0x5c, 0xb2, 0x18, 0x48, 0xbf, 0x7e, 0x88, 0x11, 0xd1, 0x7b, 0x35, 0xc8, 0xa0, 0x1c, + 0xf3, 0xc9, 0xd0, 0xe3, 0x92, 0xbd, 0x00, 0x3b, 0x9b, 0x95, 0x46, 0x5d, 0xa6, 0x67, 0x26, 0xe6, + 0x6c, 0xd2, 0x82, 0x7c, 0x15, 0xb3, 0x92, 0x55, 0x6a, 0x72, 0x45, 0x95, 0x75, 0x16, 0x68, 0x1c, + 0xa1, 0x85, 0xdb, 0xa4, 0x0c, 0xfd, 0x34, 0xc4, 0xa5, 0xb6, 0xbe, 0x5b, 0xa6, 0x6a, 0x45, 0x11, + 0x0e, 0x04, 0x8c, 0x54, 0x60, 0x84, 0x6d, 0x9d, 0x69, 0x26, 0x01, 0x38, 0x26, 0xd9, 0x7e, 0xa3, + 0x37, 0xe0, 0x54, 0x4b, 0xa1, 0x8f, 0x90, 0x95, 0xb6, 0x5e, 0xb6, 0xaf, 0xec, 0x20, 0x59, 0xd9, + 0x19, 0xdc, 0x60, 0x83, 0xd4, 0x97, 0xb8, 0x35, 0x16, 0xbf, 0x11, 0x83, 0x69, 0x07, 0x0f, 0x58, + 0x64, 0xbe, 0x8b, 0x00, 0x76, 0x09, 0x31, 0xb8, 0x25, 0x2c, 0x1a, 0x48, 0xc2, 0x62, 0x27, 0x22, + 0x61, 0x7d, 0x27, 0x21, 0x61, 0xfd, 0xc7, 0x28, 0x61, 0x2f, 0xad, 0x7c, 0x7c, 0x33, 0x06, 0x71, + 0xcb, 0x6e, 0x04, 0xb3, 0x4d, 0xe7, 0x61, 0x8c, 0x67, 0x96, 0x69, 0xa7, 0x46, 0xb9, 0x52, 0xaa, + 0x38, 0x9f, 0x49, 0xc8, 0x8f, 0xbe, 0x84, 0xbc, 0x0a, 0x23, 0x6b, 0xbc, 0xa9, 0x73, 0xd9, 0x43, + 0xc1, 0x6d, 0x0f, 0xc9, 0xf9, 0x85, 0x23, 0xf9, 0xa5, 0x3b, 0xbf, 0x70, 0xd8, 0x6c, 0xe7, 0x17, + 0x0f, 0xcc, 0x2f, 0xc5, 0xf9, 0xc5, 0x85, 0xcb, 0xe3, 0xfc, 0xe2, 0xdd, 0x26, 0xe4, 0xf9, 0xc5, + 0x35, 0xc8, 0x0b, 0x76, 0x3d, 0xff, 0x6d, 0x14, 0x46, 0x98, 0x03, 0x4c, 0xf4, 0x30, 0xe4, 0xe7, + 0x85, 0xe8, 0x1c, 0x8c, 0x11, 0xa5, 0x95, 0xab, 0x65, 0x16, 0x56, 0xa5, 0xc3, 0x8f, 0xb0, 0xd2, + 0x22, 0x89, 0xae, 0x5e, 0x82, 0x38, 0xdf, 0x8a, 0x0b, 0x41, 0x8d, 0x59, 0xed, 0x48, 0x60, 0xe0, + 0x2a, 0x20, 0xbe, 0x25, 0x0b, 0xba, 0x52, 0x1f, 0x21, 0x6e, 0xb5, 0x65, 0xb1, 0xd7, 0x05, 0x00, + 0x55, 0x69, 0xc8, 0x64, 0x40, 0x23, 0x3a, 0x35, 0x84, 0x4b, 0xf0, 0x58, 0x1a, 0x5a, 0x37, 0xfc, + 0x66, 0xaa, 0xd8, 0x37, 0x02, 0x9e, 0x04, 0x08, 0x23, 0x3a, 0x3b, 0xd0, 0x83, 0x47, 0x73, 0xa0, + 0x87, 0xc2, 0xbe, 0x25, 0x30, 0x96, 0x80, 0xff, 0x70, 0x88, 0x95, 0x91, 0x77, 0xec, 0x1f, 0x98, + 0x71, 0x46, 0x02, 0x3e, 0x98, 0xcb, 0xe1, 0x5e, 0xbb, 0x88, 0xc7, 0xda, 0xd9, 0x79, 0x1c, 0x75, + 0xf0, 0x58, 0x7c, 0x62, 0x9f, 0xb9, 0x37, 0x6f, 0xbb, 0xcb, 0x1c, 0xf7, 0xcd, 0x10, 0x18, 0x99, + 0x23, 0x9f, 0x0d, 0x39, 0xbe, 0xb8, 0x04, 0x63, 0xeb, 0x94, 0x26, 0x63, 0x00, 0xe7, 0x35, 0xff, + 0xaf, 0x5a, 0xe7, 0x61, 0xba, 0xfc, 0x27, 0x6c, 0x41, 0xb3, 0x0e, 0x0b, 0x7a, 0x35, 0x8c, 0x6c, + 0x9a, 0x26, 0x74, 0xd7, 0x8c, 0x5a, 0xd9, 0x40, 0x1f, 0xbf, 0x09, 0x15, 0xd3, 0x30, 0xcb, 0xcf, + 0xd4, 0x3d, 0x9a, 0xfd, 0xcf, 0x23, 0x76, 0xc1, 0xf8, 0x2c, 0xa4, 0xdd, 0x35, 0xa4, 0xfd, 0x17, + 0xad, 0xeb, 0x22, 0x8e, 0x65, 0x99, 0x6a, 0xb5, 0xdb, 0x52, 0xf2, 0x57, 0x50, 0x11, 0xdb, 0x15, + 0x14, 0xcf, 0xef, 0xa8, 0x77, 0xb0, 0x3a, 0xc6, 0xaf, 0xda, 0x97, 0xad, 0xb0, 0x0a, 0x07, 0x81, + 0x05, 0xc2, 0x5f, 0x18, 0x8a, 0x3d, 0x2f, 0x10, 0x2c, 0x9a, 0x7b, 0xfc, 0x20, 0xc4, 0x7f, 0x2d, + 0xc0, 0x92, 0x7b, 0xbe, 0x93, 0xb6, 0x00, 0x3f, 0xe1, 0xb0, 0x00, 0x2b, 0x61, 0x2c, 0x80, 0x23, + 0x9a, 0xf7, 0x03, 0x01, 0x4e, 0xfb, 0x53, 0x10, 0xc8, 0x1c, 0x74, 0x60, 0x9c, 0x45, 0x7a, 0xd4, + 0x9b, 0xf4, 0x18, 0x4f, 0xfa, 0x63, 0xe7, 0x77, 0x86, 0x6f, 0x86, 0x27, 0xcc, 0xd3, 0xe7, 0xfa, + 0x4f, 0x02, 0x2c, 0x74, 0x6c, 0x8a, 0x1e, 0xf3, 0xae, 0xd7, 0xdd, 0x5e, 0xa7, 0x7d, 0xc1, 0x1e, + 0xd8, 0xdf, 0x8c, 0xd1, 0xcf, 0x8b, 0xbc, 0xdd, 0x2f, 0xdf, 0xcb, 0x26, 0xeb, 0x1e, 0x3b, 0xca, + 0xdf, 0x63, 0xdb, 0x57, 0x39, 0xe6, 0x5c, 0x65, 0xfb, 0x46, 0xdb, 0xe7, 0x74, 0x98, 0xb2, 0x86, + 0xc3, 0x44, 0x4f, 0x5a, 0xcb, 0x41, 0xbe, 0x2b, 0x0c, 0xe0, 0x2d, 0x0d, 0x1c, 0xcd, 0x5b, 0x1a, + 0x0c, 0x65, 0x86, 0x3b, 0x7d, 0xef, 0xe7, 0xd8, 0x32, 0xa0, 0xe3, 0x96, 0x31, 0xec, 0xde, 0x32, + 0xe8, 0x26, 0x34, 0xc2, 0x6f, 0x42, 0xfc, 0xc3, 0x81, 0xd1, 0x4e, 0x0f, 0x07, 0xc6, 0x9c, 0x0f, + 0x07, 0x9c, 0x6e, 0xdd, 0xb8, 0xdb, 0xad, 0xfb, 0x12, 0xfd, 0xce, 0x96, 0xf7, 0xe9, 0x7c, 0x37, + 0x50, 0x4b, 0x20, 0x22, 0xfe, 0x02, 0x11, 0xed, 0x2c, 0x10, 0x31, 0xa7, 0xe7, 0xf5, 0x2e, 0x07, + 0x80, 0xb9, 0x76, 0xbe, 0x00, 0x42, 0x3a, 0x75, 0xb7, 0xe8, 0xe7, 0x67, 0x86, 0x43, 0x16, 0x74, + 0x58, 0xf1, 0xa7, 0x4d, 0xbf, 0x82, 0xef, 0xde, 0xc5, 0xba, 0xf9, 0xaa, 0x11, 0x1d, 0x3d, 0x6a, + 0x8e, 0xfe, 0x25, 0xf3, 0x5e, 0xca, 0x49, 0xf7, 0x31, 0xcd, 0xd0, 0x8d, 0xe3, 0x0d, 0xbb, 0xa3, + 0xc5, 0xd3, 0x78, 0x09, 0xe2, 0x06, 0x02, 0xd3, 0x54, 0x53, 0x1c, 0x63, 0x2d, 0xde, 0x3d, 0x0e, + 0x41, 0xee, 0x77, 0xad, 0xeb, 0x2b, 0xfb, 0x74, 0x3d, 0x4a, 0x9b, 0x17, 0xc4, 0xa8, 0x27, 0xc4, + 0x0b, 0x6e, 0x43, 0xc5, 0xf2, 0x5c, 0xc4, 0x85, 0xe0, 0x16, 0x4b, 0xfc, 0x45, 0x3f, 0x02, 0xd8, + 0xaa, 0x1d, 0x3f, 0xcf, 0xba, 0x2d, 0xe0, 0xc7, 0x02, 0xcc, 0x5a, 0x76, 0xf1, 0x65, 0x7b, 0xb0, + 0x68, 0x22, 0x33, 0x7d, 0x87, 0xbf, 0x2e, 0xc0, 0x8c, 0x0b, 0x6f, 0x2f, 0x4f, 0x7f, 0x0a, 0xce, + 0xa7, 0x3f, 0x37, 0x83, 0x6f, 0x1f, 0x5e, 0xfb, 0xfd, 0xef, 0x0a, 0x30, 0xe5, 0xd5, 0x22, 0xe4, + 0xcb, 0x44, 0xc7, 0x10, 0x1e, 0xbb, 0x7b, 0xe1, 0x28, 0xbb, 0xbb, 0x31, 0x58, 0xe2, 0x95, 0x2e, + 0xfb, 0xfc, 0xbf, 0xb4, 0xdc, 0x17, 0x1f, 0x76, 0x1f, 0x6b, 0xcc, 0x2b, 0xfc, 0x3b, 0xd1, 0xae, + 0xab, 0x21, 0x7a, 0x2a, 0x9a, 0x9d, 0x86, 0xe0, 0xfa, 0xf6, 0xc3, 0x25, 0xe7, 0x17, 0x22, 0x30, + 0x93, 0x69, 0xeb, 0xbb, 0x47, 0x96, 0xfa, 0x8a, 0x4f, 0x22, 0x8f, 0xae, 0x72, 0xe9, 0x98, 0x3d, + 0x64, 0x36, 0x8f, 0x82, 0xd3, 0xcb, 0xbe, 0x19, 0x72, 0x3e, 0x0f, 0x65, 0xf3, 0x6a, 0x11, 0x52, + 0xd9, 0x3a, 0x12, 0xf5, 0x02, 0x95, 0x0d, 0x1b, 0x61, 0xd7, 0xf2, 0xbe, 0x34, 0x46, 0xd8, 0x44, + 0x66, 0x1a, 0xe1, 0x3d, 0x18, 0x32, 0x0b, 0x31, 0x10, 0xb2, 0x9b, 0xda, 0x9f, 0x89, 0xcf, 0x83, + 0x65, 0x0b, 0xdc, 0x71, 0xd8, 0x19, 0x60, 0xdb, 0x55, 0x90, 0x03, 0x76, 0xea, 0x9f, 0x09, 0xf4, + 0xcc, 0x41, 0xdc, 0x76, 0x74, 0x0a, 0xa6, 0x1f, 0x6d, 0xe7, 0x4a, 0xdb, 0x3b, 0x99, 0x9d, 0x5c, + 0xf9, 0x51, 0x61, 0x7b, 0x2b, 0xb7, 0x96, 0x7f, 0x90, 0xcf, 0x65, 0xe3, 0xaf, 0xa0, 0x29, 0x88, + 0x5b, 0x55, 0x99, 0xb5, 0x9d, 0xfc, 0x3b, 0xb9, 0xb8, 0x80, 0x66, 0x00, 0x59, 0xa5, 0xf9, 0x02, + 0x2b, 0x8f, 0xa0, 0x69, 0x98, 0xb0, 0xca, 0xb3, 0xb9, 0x8d, 0xdc, 0x4e, 0x2e, 0x1b, 0x8f, 0xda, + 0x07, 0xd9, 0x28, 0xae, 0xbd, 0x9d, 0xcb, 0xc6, 0x63, 0xf6, 0xc6, 0xdb, 0x8f, 0xb6, 0xb7, 0x72, + 0x85, 0x6c, 0xbc, 0xcf, 0x5e, 0x9c, 0x2f, 0xe4, 0x77, 0xf2, 0x99, 0x8d, 0x78, 0x7f, 0xea, 0xcf, + 0x41, 0x3f, 0x4d, 0x36, 0x81, 0x27, 0x5f, 0xcf, 0x15, 0xb2, 0xb9, 0x92, 0x03, 0xea, 0x04, 0x8c, + 0xb2, 0xf2, 0x07, 0xb9, 0xcd, 0xcc, 0x06, 0xc6, 0x39, 0x0e, 0xc3, 0xac, 0x88, 0x14, 0x44, 0x10, + 0x82, 0x31, 0x56, 0x90, 0xcd, 0xbf, 0x93, 0x2b, 0x6d, 0xe7, 0xe2, 0xd1, 0xd4, 0xff, 0x13, 0x60, + 0xd4, 0x96, 0x8e, 0x06, 0x2d, 0xc0, 0x29, 0x02, 0x21, 0x97, 0x29, 0xad, 0x3d, 0x7c, 0x3b, 0xf7, + 0xae, 0x63, 0xa2, 0x39, 0x98, 0x75, 0x54, 0x6f, 0xe7, 0x4a, 0xe5, 0x42, 0x66, 0x13, 0x4f, 0x39, + 0x0f, 0x09, 0x7b, 0xe5, 0x83, 0x7c, 0x69, 0x7b, 0x87, 0xd6, 0x46, 0xdc, 0x5d, 0x37, 0x32, 0x46, + 0x65, 0xd4, 0x5d, 0x59, 0xc8, 0xaf, 0xbd, 0x4d, 0x2b, 0x63, 0x68, 0x11, 0x92, 0xf6, 0xca, 0x6c, + 0x7e, 0x7b, 0x6b, 0x23, 0xf3, 0x2e, 0xad, 0xef, 0x43, 0xb3, 0x30, 0x69, 0xaf, 0xcf, 0x6d, 0x66, + 0xf2, 0x1b, 0xf1, 0x7e, 0x77, 0x05, 0xe1, 0x6c, 0x7c, 0x20, 0xf5, 0x33, 0x30, 0xc2, 0xab, 0x16, + 0x6e, 0x48, 0x1b, 0x6d, 0xe6, 0x76, 0x1e, 0x16, 0xb3, 0xe5, 0xdc, 0xe7, 0x1f, 0x65, 0x36, 0xb6, + 0xe3, 0xaf, 0x60, 0x92, 0x6c, 0x15, 0xdb, 0x3b, 0x99, 0xd2, 0xce, 0x76, 0xf9, 0x71, 0x7e, 0xe7, + 0x61, 0x5c, 0xc0, 0xc2, 0x63, 0xab, 0x5d, 0x2b, 0x16, 0x76, 0x32, 0xf9, 0xc2, 0x76, 0x3c, 0x92, + 0xca, 0xc2, 0x00, 0xcb, 0x14, 0x80, 0x07, 0xdf, 0x7c, 0x90, 0xd9, 0x79, 0x77, 0xcb, 0x29, 0x60, + 0xe3, 0x30, 0x6c, 0x54, 0x6c, 0x6f, 0x6e, 0xd3, 0x35, 0x33, 0x0a, 0x8a, 0x3b, 0x5b, 0xf1, 0x48, + 0xea, 0x29, 0x0c, 0x1a, 0x19, 0x03, 0x50, 0x02, 0xa6, 0xf0, 0xdf, 0x1e, 0x82, 0x3a, 0x03, 0xc8, + 0xac, 0x29, 0x14, 0x77, 0xca, 0xa5, 0x5c, 0x26, 0xfb, 0x6e, 0x5c, 0xc0, 0x2b, 0x6e, 0x96, 0xd3, + 0xb2, 0x08, 0x96, 0x47, 0xae, 0x6c, 0xb3, 0xf8, 0x0e, 0x96, 0xd2, 0xd4, 0x43, 0x88, 0x3b, 0x3f, + 0xcc, 0x47, 0x49, 0x98, 0x29, 0x14, 0x77, 0xf2, 0x0f, 0xf2, 0x6b, 0x99, 0x9d, 0x7c, 0xb1, 0x40, + 0x50, 0x51, 0xc6, 0xbe, 0x82, 0xb1, 0xb8, 0xea, 0x08, 0x09, 0xa9, 0x36, 0x0c, 0x73, 0xdf, 0x23, + 0xe2, 0x75, 0xdd, 0x2a, 0x6e, 0xe4, 0xd7, 0xde, 0xf5, 0xc1, 0xcd, 0x57, 0x9a, 0x2a, 0x96, 0x80, + 0x29, 0xbe, 0x9c, 0x53, 0xb2, 0x59, 0x98, 0xe4, 0x6b, 0x4c, 0x35, 0x4b, 0x6d, 0xc1, 0xa0, 0xf1, + 0xfd, 0x18, 0xee, 0x5e, 0x2c, 0xad, 0x7b, 0x4d, 0x38, 0x09, 0xe3, 0x66, 0x8d, 0x39, 0xdb, 0x34, + 0x4c, 0x98, 0x85, 0xd6, 0x54, 0xa9, 0xdf, 0x10, 0x00, 0xb9, 0x3f, 0xec, 0x40, 0x22, 0x2c, 0x16, + 0x4b, 0xeb, 0x9b, 0xb9, 0xcd, 0x55, 0x7f, 0x25, 0x39, 0x03, 0x0b, 0x1e, 0x6d, 0x38, 0x65, 0x10, + 0xd0, 0x12, 0xcc, 0x7b, 0x34, 0xb1, 0x34, 0x22, 0x82, 0x25, 0xcf, 0xa3, 0x05, 0x5d, 0x80, 0x28, + 0x56, 0x09, 0x2f, 0x18, 0x58, 0x19, 0xf3, 0xd9, 0x78, 0x2c, 0x25, 0x99, 0x37, 0x5b, 0x94, 0x27, + 0xf3, 0x90, 0xd8, 0x2a, 0x15, 0x7f, 0x22, 0xb7, 0xb6, 0xe3, 0xc5, 0x17, 0xcc, 0x56, 0xbe, 0xd6, + 0xe4, 0x4d, 0x12, 0x66, 0x8c, 0x0a, 0x17, 0x83, 0x1e, 0x99, 0x6f, 0x65, 0x0d, 0x29, 0x67, 0x4d, + 0x99, 0xa4, 0xbf, 0x5d, 0x28, 0x3e, 0x2e, 0x50, 0x33, 0xca, 0x57, 0x6c, 0xe7, 0x36, 0x1e, 0xc4, + 0x05, 0x67, 0xf3, 0xf5, 0x52, 0xa6, 0x80, 0x57, 0x32, 0x92, 0x7a, 0x6c, 0xbe, 0x6d, 0xb6, 0x98, + 0xbe, 0x04, 0xf3, 0x06, 0x0c, 0x7f, 0x96, 0xbb, 0x5a, 0xb0, 0x02, 0xc6, 0xf2, 0xd4, 0x81, 0xf5, + 0xc8, 0xdf, 0xf6, 0x62, 0x12, 0x9d, 0x83, 0x25, 0xd6, 0xb4, 0x54, 0xdc, 0xc8, 0xf9, 0xcd, 0xb0, + 0x00, 0xa7, 0x3c, 0x5b, 0xb1, 0x05, 0x3d, 0x0f, 0x67, 0x3c, 0xab, 0x6d, 0xa6, 0x2a, 0x92, 0xfa, + 0xbe, 0xf5, 0xf6, 0xd3, 0x29, 0x59, 0x17, 0x40, 0x64, 0x23, 0x74, 0x96, 0x2e, 0x6b, 0xa6, 0x8e, + 0x12, 0x66, 0x51, 0xd5, 0x49, 0xca, 0x2c, 0xce, 0xfa, 0x49, 0x9a, 0x08, 0x8b, 0x7e, 0xb0, 0x4c, + 0x69, 0xdb, 0x82, 0x41, 0xe3, 0xd9, 0x1d, 0xd6, 0xbe, 0xcc, 0xd6, 0x96, 0x8f, 0xf6, 0x99, 0x35, + 0xbc, 0xf6, 0x99, 0x85, 0x9c, 0x70, 0x7d, 0x81, 0xbe, 0x14, 0xe1, 0x1f, 0x5d, 0x60, 0x6b, 0x4b, + 0xca, 0x72, 0xdb, 0x5b, 0xc5, 0xc2, 0x76, 0x8e, 0xc8, 0xcd, 0x5a, 0x31, 0x9b, 0xa3, 0x8b, 0xe3, + 0xaa, 0xca, 0x67, 0xcb, 0x3b, 0xc5, 0xb7, 0x73, 0x85, 0xb8, 0x80, 0xce, 0xc2, 0x69, 0x57, 0x35, + 0xa9, 0xb3, 0x1a, 0x45, 0x52, 0x2a, 0x8c, 0xda, 0x5e, 0x64, 0x60, 0x0e, 0x92, 0x02, 0x2c, 0x9a, + 0xa4, 0x4b, 0xe6, 0xd1, 0xce, 0xc3, 0x62, 0x29, 0xff, 0x93, 0xc4, 0xe6, 0x19, 0x53, 0x27, 0x61, + 0xc6, 0xde, 0x2a, 0xbf, 0xb9, 0xb5, 0x91, 0x5f, 0xcb, 0xef, 0xc4, 0x05, 0x74, 0x1a, 0xe6, 0xec, + 0x75, 0xa5, 0xdc, 0x83, 0x52, 0x6e, 0xfb, 0xa1, 0x39, 0xe7, 0x33, 0x98, 0xf4, 0x78, 0xb0, 0x81, + 0xad, 0x26, 0x29, 0xde, 0xc2, 0x23, 0x59, 0x16, 0xf6, 0x71, 0x6e, 0x35, 0xfe, 0x0a, 0xb1, 0x40, + 0x1e, 0x95, 0x64, 0x35, 0x32, 0xeb, 0xb9, 0x02, 0x9e, 0x18, 0x9b, 0x07, 0x8f, 0x36, 0x85, 0x0c, + 0x63, 0x6f, 0x03, 0x90, 0xfb, 0x21, 0x07, 0x31, 0x39, 0xb8, 0xf4, 0xd1, 0x0e, 0xdb, 0xd0, 0x48, + 0xa7, 0xd5, 0xcc, 0x76, 0x7e, 0x8d, 0x6e, 0xfd, 0x1e, 0xb5, 0x5b, 0xc5, 0x6d, 0x3c, 0xa1, 0x77, + 0x65, 0xa1, 0x58, 0xc0, 0xb3, 0x95, 0x61, 0xca, 0xeb, 0xaa, 0x1f, 0x33, 0x98, 0x43, 0xb8, 0x9d, + 0x2b, 0x65, 0x7c, 0x54, 0xdb, 0xd6, 0xca, 0x10, 0xbf, 0xcc, 0xd6, 0x96, 0xa1, 0xda, 0xba, 0xf9, + 0xf4, 0xdd, 0x0a, 0xc8, 0x72, 0x26, 0x81, 0xf0, 0xdf, 0x4b, 0x22, 0x2d, 0xab, 0xc8, 0x35, 0x31, + 0x45, 0x73, 0x11, 0x92, 0xee, 0x5a, 0x4e, 0x46, 0xff, 0xc8, 0x11, 0x7e, 0x71, 0x2a, 0xf4, 0x15, + 0xb8, 0xc8, 0xf7, 0xef, 0xac, 0xd5, 0x29, 0xb8, 0xd0, 0xa9, 0xb1, 0x4d, 0xb5, 0x2f, 0xc3, 0xf9, + 0x4e, 0x6d, 0x79, 0xfd, 0xb6, 0x8c, 0x85, 0x67, 0x53, 0x43, 0xc9, 0x2f, 0xc2, 0xd9, 0x8e, 0x50, + 0x4d, 0x4d, 0xdf, 0x85, 0x31, 0x7b, 0xdc, 0xdb, 0x70, 0xce, 0x7c, 0x79, 0xcc, 0x1c, 0x6c, 0x2f, + 0x06, 0x33, 0xa7, 0xcf, 0x9b, 0xbb, 0x5f, 0x67, 0xc9, 0x0a, 0xed, 0x27, 0x2a, 0x2c, 0xfd, 0x56, + 0x1f, 0xff, 0xcd, 0xc0, 0xa3, 0x8d, 0xb1, 0x1d, 0xe4, 0xb3, 0x74, 0x6d, 0xbd, 0x86, 0x61, 0x74, + 0x46, 0x0c, 0x37, 0xd8, 0x51, 0x5f, 0x2c, 0xad, 0xe3, 0xea, 0x28, 0x01, 0xe7, 0x3e, 0xee, 0x61, + 0x70, 0x58, 0x03, 0x3a, 0x82, 0x5b, 0x80, 0x53, 0x1e, 0x6d, 0xd8, 0xc8, 0x02, 0x91, 0x76, 0x77, + 0x35, 0x87, 0x3d, 0x82, 0xb1, 0x7b, 0xcd, 0xc2, 0xb0, 0x47, 0x57, 0xbe, 0xfa, 0x35, 0x01, 0x26, + 0x36, 0xcd, 0x83, 0xd7, 0xb6, 0xac, 0x3e, 0xab, 0x57, 0x64, 0xf4, 0x36, 0x0c, 0x3c, 0x94, 0xa5, + 0x86, 0xbe, 0xfb, 0x45, 0x34, 0xe3, 0xba, 0x4e, 0xc8, 0xed, 0xb5, 0xf4, 0xfd, 0xa4, 0x4f, 0xb9, + 0x18, 0x3f, 0xf8, 0xfe, 0x7f, 0xff, 0x5a, 0x04, 0xd0, 0x60, 0x7a, 0x97, 0x8d, 0xb0, 0x0e, 0x7d, + 0x25, 0x59, 0xaa, 0xee, 0x87, 0x1e, 0x6a, 0x8c, 0x0c, 0x35, 0x88, 0xfa, 0xd3, 0x2a, 0xe9, 0x5f, + 0x80, 0xc1, 0x77, 0x58, 0x5e, 0x77, 0xdf, 0xb1, 0xfc, 0xb2, 0x84, 0x8b, 0x13, 0x64, 0xb0, 0x61, + 0x34, 0x64, 0xe6, 0x86, 0x47, 0x5f, 0x82, 0xe1, 0x75, 0x99, 0x04, 0x68, 0x56, 0xf7, 0xf3, 0x59, + 0x74, 0x21, 0x48, 0xa4, 0x24, 0x9f, 0x4d, 0x06, 0x4a, 0x51, 0x29, 0x8a, 0x07, 0x87, 0x89, 0x61, + 0x7a, 0xc5, 0xb2, 0x8c, 0xe1, 0x93, 0xe9, 0x47, 0xd1, 0x70, 0x1a, 0x97, 0x68, 0xe9, 0x0f, 0xeb, + 0xd5, 0x8f, 0xd0, 0x37, 0x04, 0x98, 0x32, 0x11, 0x90, 0x5c, 0x7a, 0xeb, 0x0d, 0xe5, 0x89, 0xd4, + 0x40, 0x57, 0x82, 0x4c, 0xc1, 0x72, 0x8e, 0x07, 0xc4, 0xb3, 0xe2, 0x85, 0x67, 0x01, 0xcd, 0xa5, + 0x6b, 0x64, 0x4a, 0x06, 0x8b, 0xdc, 0xd5, 0xa4, 0x3f, 0x24, 0xff, 0x7c, 0x84, 0xfe, 0x96, 0x00, + 0xc3, 0x54, 0x62, 0xf1, 0x10, 0x1a, 0xba, 0x11, 0x3c, 0x5d, 0x29, 0x0b, 0x12, 0x25, 0x57, 0xc2, + 0x74, 0xa1, 0x1b, 0xb8, 0x78, 0xc9, 0x0b, 0xea, 0xa4, 0x38, 0xc6, 0x30, 0x96, 0x35, 0xd2, 0xfc, + 0x8e, 0x90, 0xc2, 0x00, 0x47, 0xf2, 0x1a, 0x1e, 0x82, 0xa6, 0x35, 0x0f, 0x80, 0xd0, 0x99, 0x87, + 0x3d, 0x00, 0x42, 0x57, 0x6a, 0x75, 0xf1, 0xa2, 0x17, 0x42, 0x84, 0xe2, 0x06, 0xc2, 0xba, 0x46, + 0xd3, 0xae, 0xa3, 0x9f, 0x13, 0x00, 0xac, 0x34, 0xeb, 0xdd, 0xe1, 0xb9, 0x52, 0xb2, 0x07, 0x5c, + 0xdd, 0x33, 0x07, 0x87, 0x89, 0x11, 0x00, 0x02, 0xe8, 0xb9, 0x5a, 0xd7, 0x65, 0x2a, 0xed, 0x62, + 0x3f, 0x45, 0x84, 0x79, 0xf5, 0x55, 0x01, 0xc6, 0xb2, 0xb2, 0x54, 0xd1, 0xeb, 0xcf, 0x0c, 0x38, + 0xc7, 0x2b, 0xf1, 0x2b, 0x9e, 0x18, 0xe6, 0x93, 0xb3, 0x9c, 0xc8, 0xa7, 0xcb, 0x55, 0x13, 0x82, + 0x01, 0xaa, 0xf4, 0xc3, 0x07, 0xa5, 0xda, 0x40, 0xfd, 0x25, 0x01, 0x06, 0x37, 0x94, 0xca, 0xfb, + 0x27, 0x00, 0xe7, 0xaa, 0x27, 0x9c, 0x99, 0xe4, 0x84, 0x0d, 0x4e, 0x43, 0xa9, 0xbc, 0x8f, 0x81, + 0xfc, 0xbc, 0x00, 0xf0, 0xa8, 0xd9, 0x38, 0x19, 0x28, 0xcb, 0x9e, 0x50, 0x12, 0xc9, 0x49, 0x1b, + 0x94, 0x76, 0xd3, 0x00, 0xa3, 0x02, 0x64, 0xe5, 0x86, 0x1c, 0x72, 0x95, 0xfc, 0x6c, 0xfb, 0xb9, + 0x83, 0xc3, 0xc4, 0x28, 0x0c, 0x93, 0xd9, 0xab, 0x64, 0x58, 0x6a, 0x20, 0x53, 0x36, 0x03, 0xf9, + 0x15, 0x96, 0x7b, 0xd3, 0xf8, 0x0f, 0x32, 0xae, 0x05, 0xfc, 0xff, 0x30, 0x98, 0xee, 0x5c, 0x0c, + 0xd6, 0x5c, 0x13, 0x53, 0x5e, 0xfa, 0x3c, 0x8d, 0x6c, 0xac, 0x30, 0xfe, 0x8b, 0x8d, 0x7f, 0x80, + 0xf7, 0x73, 0xee, 0xab, 0x85, 0x13, 0x86, 0xf6, 0xfa, 0xc1, 0x61, 0x02, 0x99, 0x97, 0x05, 0xcb, + 0x52, 0xab, 0x65, 0x21, 0x9c, 0x47, 0xc9, 0x34, 0xf7, 0x5e, 0xdb, 0x01, 0xf4, 0xaf, 0x0a, 0x00, + 0x45, 0xb5, 0x76, 0xd2, 0x00, 0xb1, 0xb5, 0x06, 0x72, 0xb9, 0x6f, 0x01, 0x9b, 0x42, 0x28, 0xad, + 0xa8, 0x35, 0x07, 0xa0, 0xaf, 0x0b, 0xe6, 0xfb, 0xc4, 0x93, 0x06, 0x75, 0xfd, 0xe0, 0x30, 0x31, + 0x66, 0xbe, 0x1b, 0xb0, 0x80, 0x25, 0xd0, 0x4c, 0xda, 0x48, 0x1e, 0x61, 0x07, 0xf7, 0x15, 0x01, + 0xc6, 0xd8, 0x5e, 0x6c, 0x64, 0x93, 0x0e, 0x2a, 0xe3, 0x81, 0x76, 0x6b, 0x36, 0x68, 0x20, 0x51, + 0x6b, 0x31, 0x00, 0xff, 0x58, 0x80, 0x09, 0x57, 0xd6, 0x65, 0xd4, 0xf5, 0xab, 0x40, 0xbf, 0x44, + 0xcd, 0xe1, 0x80, 0x06, 0xb2, 0x0f, 0x0c, 0x29, 0xb6, 0x0f, 0x7f, 0x59, 0x80, 0x11, 0xc6, 0x40, + 0x9a, 0xd8, 0x38, 0x28, 0xfb, 0x2e, 0x07, 0x76, 0x76, 0x7c, 0x3c, 0x03, 0x64, 0xb3, 0x9e, 0xf4, + 0xb9, 0xc9, 0xb7, 0x04, 0x18, 0xa7, 0xc2, 0x60, 0x01, 0xba, 0x15, 0x9c, 0x71, 0x7c, 0xd6, 0xe4, + 0x30, 0x00, 0x03, 0xd9, 0x77, 0x82, 0x10, 0xb3, 0xec, 0x9b, 0x02, 0xcc, 0x95, 0x64, 0x4d, 0x6e, + 0x56, 0xb9, 0x44, 0xca, 0x54, 0x97, 0x37, 0xc3, 0x70, 0xd0, 0xcf, 0xc8, 0xbe, 0xe5, 0x89, 0x26, + 0x25, 0x9e, 0x77, 0xa1, 0xc1, 0x5b, 0x20, 0xc6, 0xf1, 0x8c, 0x83, 0xe0, 0x58, 0x54, 0x9a, 0xd6, + 0xf9, 0x58, 0x17, 0x95, 0x0c, 0x19, 0x68, 0x51, 0x69, 0xda, 0x66, 0xfb, 0xa2, 0x52, 0x40, 0x21, + 0x16, 0x95, 0xcf, 0x19, 0x1d, 0x06, 0x60, 0xa0, 0x45, 0x25, 0x08, 0xed, 0x8b, 0xca, 0xe5, 0x91, + 0x66, 0x7b, 0x85, 0x52, 0x95, 0x5f, 0xcc, 0xa2, 0x12, 0x34, 0x7e, 0x8b, 0xca, 0x99, 0x3a, 0x23, + 0xa9, 0xf5, 0xb1, 0x9a, 0x3a, 0x23, 0x1d, 0x73, 0x10, 0x53, 0xc7, 0x32, 0x3b, 0x3b, 0x4c, 0x9d, + 0x01, 0x2b, 0x84, 0xa9, 0xb3, 0xa7, 0xb8, 0x0e, 0x07, 0x34, 0x90, 0xa9, 0x63, 0x48, 0x31, 0x03, + 0xff, 0x8a, 0x60, 0x9e, 0x1c, 0x37, 0x9f, 0x4a, 0xc1, 0xb9, 0x77, 0x35, 0x44, 0x06, 0x6a, 0xad, + 0xdb, 0x21, 0x83, 0x80, 0xda, 0xc3, 0xd3, 0xff, 0x53, 0x01, 0xe6, 0xb6, 0xe5, 0x66, 0xd5, 0x27, + 0x1b, 0x33, 0xba, 0xd7, 0xfd, 0xea, 0xb8, 0x53, 0x1a, 0x67, 0x5f, 0x49, 0xbc, 0xed, 0xc9, 0xb6, + 0x33, 0xe2, 0xbc, 0xcd, 0x83, 0xc4, 0x12, 0xa8, 0xc9, 0x7a, 0xeb, 0x79, 0x13, 0x0f, 0xbd, 0x8f, + 0xf9, 0xf7, 0x35, 0x01, 0xd0, 0xb6, 0xac, 0xe7, 0x9b, 0x75, 0xbd, 0x2e, 0x35, 0x8c, 0xa9, 0x51, + 0xd7, 0xff, 0x68, 0xc3, 0x91, 0x91, 0xda, 0x17, 0xd8, 0x4d, 0x4f, 0x60, 0x8b, 0xe2, 0x29, 0x07, + 0x30, 0xbd, 0x4e, 0x11, 0xb4, 0x9e, 0x63, 0x54, 0xff, 0x50, 0x80, 0xb9, 0x75, 0x8b, 0x13, 0xae, + 0x64, 0xd1, 0x7e, 0x21, 0x87, 0xd7, 0x83, 0xc2, 0x76, 0x8e, 0x48, 0x18, 0x38, 0x0a, 0xc3, 0x2d, + 0xf2, 0xcb, 0x5a, 0xe3, 0x25, 0xb4, 0x98, 0x26, 0x65, 0x75, 0x59, 0x4b, 0x1b, 0x69, 0xb9, 0xb5, + 0x74, 0xc5, 0xec, 0x8e, 0x7e, 0x5f, 0x80, 0x45, 0x7a, 0x54, 0xf4, 0x45, 0x7b, 0xaf, 0x57, 0x54, + 0x74, 0xdc, 0x23, 0x50, 0x75, 0x97, 0xf9, 0x5e, 0x94, 0x2a, 0x8b, 0xff, 0x67, 0xc5, 0x2e, 0x64, + 0xe1, 0x45, 0xf8, 0x03, 0x01, 0x16, 0xa9, 0x52, 0x1f, 0x3f, 0x65, 0x74, 0xdc, 0x23, 0x50, 0xf6, + 0x96, 0x0f, 0x65, 0x97, 0x92, 0x67, 0x3b, 0x53, 0x46, 0x24, 0x0e, 0x93, 0xf7, 0x89, 0x00, 0x8b, + 0xf4, 0x14, 0xe5, 0x4b, 0xde, 0x9d, 0x5e, 0xe1, 0x75, 0xd8, 0x33, 0xee, 0x1d, 0x1c, 0x26, 0xc6, + 0x61, 0x94, 0x01, 0xe7, 0xce, 0x5b, 0xe7, 0x53, 0x41, 0x90, 0x63, 0x85, 0x9d, 0xe2, 0x54, 0xc3, + 0xca, 0xb6, 0xec, 0xa7, 0x13, 0x37, 0x82, 0x12, 0x61, 0x0e, 0x45, 0x5c, 0x76, 0x0f, 0x65, 0x38, + 0x85, 0x66, 0xbd, 0x10, 0x4a, 0x35, 0x19, 0xfd, 0x86, 0x00, 0xb3, 0x76, 0x2d, 0xb0, 0x80, 0xdd, + 0x0e, 0x0d, 0x80, 0xc9, 0x7d, 0x0f, 0xc8, 0x6f, 0xfa, 0x88, 0xc5, 0xbc, 0xe8, 0x07, 0x1d, 0x8b, + 0xc2, 0x6f, 0x0a, 0x30, 0x6b, 0x97, 0xf4, 0xa3, 0xa0, 0x67, 0xb2, 0xdd, 0x03, 0xfa, 0x37, 0x7c, + 0xd0, 0x9f, 0x49, 0xce, 0xfb, 0xa0, 0x37, 0xa5, 0xf9, 0x9b, 0x02, 0xcc, 0xda, 0xa5, 0xd9, 0x22, + 0xe1, 0xd5, 0xd0, 0x48, 0x3a, 0xc8, 0xef, 0x6d, 0x3f, 0xf9, 0x5d, 0x4c, 0x75, 0x04, 0x89, 0x11, + 0x26, 0x38, 0xc1, 0xb5, 0xa7, 0x5b, 0xf6, 0x13, 0xde, 0xd7, 0x82, 0x42, 0xb7, 0x0d, 0x47, 0xc4, + 0xc0, 0x43, 0x80, 0x17, 0xd0, 0x9c, 0x17, 0xc4, 0x06, 0xed, 0x8b, 0x7e, 0x47, 0x80, 0x39, 0xbb, + 0x10, 0xdb, 0x41, 0xde, 0xed, 0x09, 0x0c, 0x13, 0xe6, 0x1e, 0x29, 0x79, 0xdd, 0x47, 0x24, 0x96, + 0xc4, 0x4e, 0xa4, 0x60, 0x89, 0xf8, 0x0f, 0x02, 0xcc, 0xd9, 0x85, 0xfa, 0x38, 0xa8, 0x61, 0xc2, + 0xdd, 0x23, 0x35, 0x6f, 0xfa, 0x50, 0x73, 0x3e, 0xb9, 0xd4, 0x81, 0x1a, 0x53, 0xc8, 0xbf, 0x2d, + 0xc0, 0x9c, 0x5d, 0xc8, 0xed, 0x24, 0xdd, 0xee, 0x09, 0x55, 0x07, 0x61, 0xbf, 0xeb, 0x27, 0xec, + 0x62, 0xaa, 0x2b, 0x60, 0xf4, 0x45, 0x80, 0x75, 0x59, 0x2f, 0xaa, 0x35, 0x72, 0xa5, 0x71, 0x3e, + 0x40, 0x3a, 0xd2, 0x7c, 0x36, 0x79, 0x36, 0x40, 0x33, 0x71, 0xc9, 0x23, 0xce, 0x33, 0x82, 0xc0, + 0x8a, 0xf3, 0xa0, 0xaf, 0xd3, 0x5d, 0x82, 0x4c, 0x4e, 0xbf, 0xdd, 0x60, 0xd7, 0x19, 0x41, 0xd2, + 0xc3, 0xd2, 0x0e, 0xc1, 0xa0, 0xac, 0x78, 0x40, 0x59, 0x44, 0xf3, 0xc6, 0x55, 0x06, 0x41, 0x44, + 0xbf, 0x26, 0x49, 0x7f, 0x48, 0xff, 0xfd, 0x08, 0xfd, 0x82, 0x00, 0xa3, 0x56, 0xf8, 0xbb, 0xa8, + 0xd6, 0x8e, 0x95, 0x39, 0xd7, 0xa9, 0xaf, 0x8e, 0x11, 0x59, 0x02, 0x36, 0x97, 0x9c, 0xe1, 0xa2, + 0x60, 0x8e, 0xc8, 0x37, 0xc6, 0x53, 0xfa, 0xa1, 0xe2, 0x51, 0x9d, 0x78, 0x26, 0xe8, 0xe2, 0xf1, + 0xdf, 0xac, 0xfa, 0x99, 0xc8, 0xe5, 0xe0, 0x09, 0x7f, 0xc9, 0x97, 0x8a, 0x18, 0xcf, 0x04, 0x8c, + 0x63, 0x3c, 0x7b, 0xa4, 0xd8, 0x7e, 0x20, 0x24, 0xa8, 0x68, 0x85, 0x96, 0xa6, 0x9f, 0x98, 0xfe, + 0x92, 0x00, 0x23, 0x7c, 0x5e, 0xe7, 0xee, 0x1b, 0x8a, 0x47, 0x16, 0xe8, 0x8e, 0x1b, 0x0a, 0x82, + 0x38, 0x87, 0x87, 0x63, 0x93, 0x68, 0xb0, 0x89, 0x7e, 0xb9, 0xf1, 0x91, 0x81, 0x0c, 0xb3, 0xe9, + 0xef, 0x99, 0x21, 0x08, 0x0b, 0xd9, 0xad, 0x60, 0x51, 0xc9, 0xc0, 0xe0, 0x32, 0x1d, 0xc0, 0x61, + 0xa3, 0xe5, 0x09, 0x2e, 0xfd, 0x21, 0xfb, 0x2a, 0x83, 0x18, 0xad, 0x6f, 0x09, 0x30, 0xee, 0x48, + 0x2c, 0xdd, 0x1d, 0xa6, 0x77, 0x26, 0x6a, 0x5f, 0x98, 0xf7, 0x0f, 0x0e, 0x13, 0x93, 0x30, 0xc1, + 0xc1, 0x74, 0xd8, 0xaa, 0x2e, 0x38, 0xd1, 0xf7, 0x04, 0x88, 0xd3, 0xab, 0x3f, 0x73, 0x4e, 0xad, + 0x3b, 0x4a, 0xef, 0xa4, 0xd1, 0xc9, 0xdb, 0xa1, 0xfb, 0xb1, 0xbb, 0xbc, 0x7b, 0xfe, 0xa2, 0x89, + 0x4f, 0x2c, 0xde, 0x44, 0x70, 0x77, 0x90, 0x1f, 0x0b, 0x30, 0x46, 0x87, 0x34, 0x53, 0x1b, 0xdf, + 0x0c, 0x95, 0x6a, 0xd5, 0xa0, 0xe0, 0xb5, 0x90, 0xbd, 0x18, 0xfe, 0x65, 0x9f, 0x50, 0xf7, 0x8c, + 0x38, 0x61, 0x85, 0xba, 0x39, 0xbc, 0xbf, 0x68, 0x25, 0xae, 0x24, 0x7b, 0xc4, 0xe5, 0x80, 0xd3, + 0xe6, 0xb3, 0xc9, 0xa0, 0xc9, 0x72, 0x49, 0xc4, 0x0c, 0xd9, 0x31, 0xa1, 0x48, 0x9e, 0xe2, 0x8a, + 0xa3, 0x31, 0x7b, 0x08, 0x1e, 0xfd, 0x0d, 0x01, 0x46, 0x99, 0x0b, 0xc4, 0x52, 0x39, 0x07, 0x65, + 0xa0, 0x2d, 0x8b, 0x75, 0x70, 0x78, 0x17, 0xd9, 0x0e, 0xcb, 0xe0, 0x59, 0xda, 0x35, 0x26, 0x0e, + 0x99, 0xd8, 0x30, 0xaf, 0xfe, 0xb6, 0x00, 0xa3, 0xcc, 0x9d, 0x09, 0x89, 0xcc, 0x96, 0x27, 0x3b, + 0x38, 0xb2, 0xeb, 0x44, 0xa7, 0xec, 0xc8, 0x4c, 0xce, 0x4d, 0x26, 0x1d, 0x9c, 0xc3, 0x10, 0xff, + 0xbe, 0x00, 0x13, 0xd6, 0xbe, 0x66, 0xc0, 0x3c, 0x89, 0x45, 0xfd, 0x5c, 0x27, 0x6c, 0xa7, 0x93, + 0x49, 0xc7, 0xc5, 0x8a, 0x63, 0xbf, 0xc3, 0x38, 0x4b, 0x2f, 0x25, 0x4e, 0xfb, 0x3e, 0xf8, 0x2d, + 0x01, 0x92, 0xeb, 0xb2, 0xce, 0xd2, 0x60, 0xf0, 0x6f, 0xb6, 0x88, 0xb6, 0x74, 0xdd, 0xf8, 0xec, + 0xf9, 0x33, 0x92, 0xa1, 0xf2, 0x55, 0x88, 0x17, 0x7c, 0x74, 0x79, 0x0c, 0x8d, 0xa4, 0xc9, 0x67, + 0x42, 0xd6, 0xc3, 0x91, 0x69, 0x7c, 0xac, 0x71, 0xa7, 0x4c, 0xf6, 0xdb, 0xb0, 0x57, 0xc2, 0xa5, + 0xbf, 0x24, 0x9b, 0x36, 0x3e, 0x06, 0x4c, 0xc3, 0xa4, 0x81, 0xc6, 0x69, 0x1d, 0xc9, 0xc9, 0xdc, + 0x60, 0xa5, 0x7d, 0xf3, 0xfe, 0x43, 0x01, 0xa6, 0x6c, 0x36, 0xd1, 0xb0, 0xee, 0x77, 0x7a, 0x48, + 0x32, 0x69, 0x28, 0xd1, 0xdd, 0x9e, 0xfa, 0x32, 0x2b, 0xf9, 0xe8, 0xe0, 0x30, 0xb1, 0xe4, 0x49, + 0x0b, 0x32, 0xff, 0xdf, 0x7f, 0x4a, 0xd6, 0x15, 0xf1, 0x02, 0x27, 0x21, 0xd6, 0x87, 0x66, 0x9e, + 0xc6, 0xff, 0x1b, 0x02, 0xc4, 0x33, 0xd5, 0xaa, 0x3d, 0x1d, 0xf5, 0xf5, 0x50, 0x40, 0x33, 0xd5, + 0x6a, 0xc7, 0x2d, 0x36, 0x09, 0x53, 0x0e, 0xd4, 0x76, 0x89, 0xc6, 0xee, 0x8a, 0x5d, 0xa2, 0x39, + 0x77, 0xe5, 0x63, 0x01, 0x26, 0xa9, 0xf7, 0x61, 0x87, 0xf8, 0x6a, 0x28, 0x88, 0x74, 0x04, 0x5f, + 0x94, 0xf9, 0x00, 0x28, 0xc9, 0x61, 0xcb, 0x0b, 0xa5, 0xdd, 0x6f, 0xf9, 0xb6, 0x00, 0x93, 0xd4, + 0x0d, 0x39, 0x0a, 0x5e, 0x3a, 0x82, 0x2f, 0xde, 0xf5, 0x83, 0xc3, 0xc4, 0x1c, 0x4c, 0x3b, 0xf0, + 0x52, 0xe7, 0xc5, 0x04, 0x4c, 0x0e, 0x5b, 0x9d, 0x01, 0xa3, 0x3f, 0x20, 0x71, 0x6c, 0x4e, 0xcc, + 0xa9, 0x0e, 0xbe, 0x1e, 0x3a, 0x19, 0xaf, 0x21, 0xe2, 0x6f, 0xf4, 0xd0, 0x93, 0x09, 0xf8, 0xe7, + 0x0f, 0x0e, 0x13, 0x8b, 0x30, 0x61, 0x9a, 0x0e, 0xa5, 0x21, 0x7b, 0x8a, 0xf7, 0x65, 0xf1, 0x9c, + 0x8f, 0x78, 0x13, 0xd5, 0xe5, 0x85, 0xfb, 0x97, 0x05, 0x18, 0xb3, 0x84, 0x9b, 0x64, 0xb9, 0x5e, + 0x0e, 0x01, 0xb0, 0x93, 0x60, 0xe3, 0x33, 0x6e, 0x02, 0x90, 0x0d, 0xad, 0x5d, 0x60, 0x4e, 0x89, + 0x53, 0x0e, 0xfe, 0x13, 0x7c, 0x6c, 0x57, 0x9e, 0xb0, 0x09, 0x09, 0x81, 0x76, 0x23, 0x4c, 0x6e, + 0xe8, 0xce, 0x02, 0xf2, 0xd6, 0xc1, 0x61, 0xe2, 0x94, 0x65, 0x2c, 0x08, 0x3a, 0x87, 0x78, 0x2c, + 0xa4, 0xe6, 0xbc, 0xe0, 0xa5, 0x3f, 0x6c, 0x4a, 0x7b, 0xf2, 0x47, 0xe8, 0x07, 0xa6, 0x64, 0x70, + 0x4f, 0x45, 0x02, 0x48, 0x86, 0x5f, 0x9e, 0xb7, 0xee, 0x92, 0xe1, 0x9b, 0xd5, 0x4e, 0x7c, 0x7c, + 0x70, 0x98, 0x58, 0x70, 0xbf, 0x20, 0x71, 0x0a, 0xc6, 0x75, 0xf1, 0x8a, 0x8f, 0x60, 0xd8, 0x9e, + 0x98, 0x70, 0xf2, 0xf1, 0x9b, 0x02, 0x8c, 0x73, 0xd3, 0x92, 0xfd, 0xf1, 0x5a, 0x08, 0x9c, 0x41, + 0xee, 0x13, 0xb9, 0xe6, 0x44, 0xc4, 0x03, 0x10, 0x92, 0x42, 0x97, 0x82, 0x10, 0x42, 0x36, 0xd2, + 0xdf, 0x13, 0x60, 0x9a, 0x3a, 0x91, 0x8e, 0xb7, 0xf5, 0xe8, 0xb5, 0x90, 0xd9, 0x13, 0x59, 0xc4, + 0x2d, 0x14, 0x41, 0x3b, 0x76, 0x9d, 0xc5, 0x04, 0x51, 0x25, 0x70, 0x50, 0x74, 0x55, 0xbc, 0xe8, + 0x43, 0x91, 0x52, 0xaf, 0x56, 0x78, 0xaa, 0xf0, 0xb2, 0xfc, 0xb6, 0x79, 0x95, 0xca, 0xd3, 0x73, + 0x23, 0x04, 0x30, 0x16, 0x6f, 0x0b, 0x45, 0xcb, 0xa3, 0x80, 0xb4, 0x5c, 0x4b, 0x06, 0x5e, 0x1d, + 0x4c, 0xcc, 0x7f, 0x16, 0x60, 0xda, 0x72, 0x6f, 0x79, 0x82, 0x4e, 0x52, 0xd2, 0xa4, 0x80, 0xc4, + 0xbc, 0x91, 0xbc, 0x19, 0x94, 0x18, 0xa7, 0x3f, 0x8c, 0x09, 0x2b, 0xfd, 0xd9, 0x20, 0xcc, 0xee, + 0x40, 0xff, 0x4f, 0x33, 0x04, 0xcc, 0x4d, 0xcc, 0xa5, 0x80, 0xbe, 0x1e, 0x3c, 0x7b, 0x35, 0x93, + 0xc3, 0x10, 0xf9, 0xae, 0xc5, 0x46, 0x40, 0x02, 0xb3, 0xc9, 0xfb, 0x81, 0x08, 0xb4, 0x27, 0x94, + 0xa5, 0x0a, 0x47, 0xd3, 0x67, 0x63, 0x5a, 0xff, 0x97, 0x00, 0xc9, 0x92, 0x5c, 0x93, 0x9b, 0xb2, + 0xca, 0x4c, 0x88, 0x2d, 0x25, 0x69, 0xc8, 0x95, 0xec, 0x7a, 0x56, 0xe0, 0x07, 0x17, 0xf5, 0x80, + 0x94, 0x6e, 0x24, 0xd7, 0x03, 0x2f, 0xa5, 0x45, 0x5d, 0xba, 0x4c, 0x1f, 0xc6, 0xd1, 0xec, 0xa9, + 0x34, 0xa3, 0x2a, 0xa6, 0xf8, 0xbf, 0x0a, 0x30, 0x69, 0x73, 0x79, 0xc8, 0xc1, 0x45, 0x43, 0x6f, + 0x84, 0xca, 0x19, 0x69, 0xdb, 0xda, 0xee, 0xf4, 0xd2, 0x95, 0xed, 0x6d, 0xdb, 0x07, 0x87, 0x89, + 0xd3, 0x96, 0x1f, 0x41, 0xce, 0x48, 0xde, 0x9b, 0x82, 0x78, 0xde, 0x87, 0x0b, 0xec, 0x5c, 0xc5, + 0xed, 0x6b, 0x9f, 0x08, 0xe6, 0x77, 0x85, 0x21, 0x0e, 0x7e, 0xf6, 0xcc, 0x8b, 0x21, 0x0f, 0x7e, + 0xab, 0x07, 0x87, 0x89, 0x29, 0x2f, 0x3a, 0x08, 0xf8, 0x73, 0x48, 0xec, 0x0c, 0x9e, 0xec, 0x65, + 0xbf, 0x26, 0x00, 0xb2, 0x85, 0x51, 0xe8, 0x57, 0xf2, 0xa1, 0xf2, 0xa5, 0xb1, 0x5d, 0x2c, 0x1c, + 0xf8, 0x8c, 0xfd, 0x9c, 0x48, 0xc1, 0x5b, 0x41, 0x15, 0x51, 0x5c, 0xe8, 0x88, 0x1e, 0xb3, 0xfc, + 0xbb, 0x02, 0x20, 0x5b, 0xa0, 0xa5, 0x07, 0xec, 0xcc, 0x5a, 0x84, 0xc3, 0xfe, 0xa0, 0x33, 0xf6, + 0x8b, 0xc9, 0x00, 0x9c, 0x67, 0x9b, 0xee, 0x8c, 0x2b, 0x0c, 0x43, 0x89, 0x38, 0x59, 0xc9, 0x29, + 0x75, 0x26, 0xe0, 0xd5, 0xe4, 0x72, 0x77, 0x02, 0x9c, 0x7b, 0x13, 0x26, 0xa6, 0xf4, 0xa3, 0x4b, + 0x8c, 0x7d, 0x3f, 0xfa, 0x84, 0x06, 0x74, 0xfc, 0xb2, 0x72, 0xfa, 0x05, 0x4c, 0x6e, 0xf7, 0x90, + 0x66, 0x90, 0x44, 0x4d, 0x72, 0xe4, 0x74, 0x79, 0xca, 0x4e, 0x83, 0x33, 0x76, 0x42, 0x9e, 0xf8, + 0x18, 0x94, 0x30, 0xf0, 0xf6, 0x10, 0xca, 0x41, 0x04, 0x4e, 0xb9, 0x0d, 0xad, 0x11, 0x47, 0xb9, + 0xdf, 0x6b, 0xd2, 0x3e, 0xc3, 0xe8, 0xbe, 0xd5, 0xfb, 0x00, 0xcc, 0xf4, 0x3e, 0x09, 0x42, 0xe7, + 0x9b, 0xe2, 0xeb, 0x5d, 0x56, 0xcc, 0xc8, 0x7e, 0xe3, 0x19, 0x5e, 0xf9, 0x9e, 0x00, 0xd3, 0xd6, + 0x09, 0x94, 0xcf, 0x8f, 0xfa, 0x5a, 0x78, 0xfc, 0x9d, 0xce, 0xa3, 0x3f, 0x75, 0x70, 0x98, 0x98, + 0x87, 0xa4, 0x27, 0x31, 0x96, 0xfc, 0xbd, 0x26, 0x5e, 0x0f, 0x4b, 0x0d, 0xa6, 0xe2, 0xfb, 0x02, + 0x24, 0x6c, 0x41, 0x18, 0x9e, 0x90, 0xd7, 0xc3, 0x13, 0xd2, 0x25, 0x1c, 0x23, 0x07, 0xa2, 0xe5, + 0x7e, 0xf2, 0x4e, 0xe8, 0x95, 0xb1, 0x85, 0x6a, 0x7e, 0x4f, 0x80, 0x84, 0xed, 0x14, 0x7e, 0x44, + 0xaa, 0xba, 0x9c, 0xc9, 0x2b, 0xe4, 0xf0, 0x37, 0xe7, 0x49, 0x15, 0x77, 0xef, 0xf4, 0xb9, 0xd4, + 0x11, 0xc8, 0x42, 0xbf, 0x6e, 0xde, 0x48, 0x99, 0x9f, 0x93, 0x06, 0xb8, 0x91, 0xf2, 0x4e, 0xf1, + 0xd4, 0xdd, 0x82, 0xf8, 0x64, 0x3f, 0x13, 0x5f, 0xa3, 0x37, 0x52, 0xe4, 0xf9, 0xa2, 0xc3, 0x13, + 0x48, 0x8a, 0xd3, 0xec, 0x0d, 0xa3, 0xdb, 0x6d, 0xf9, 0x16, 0x4b, 0xd0, 0x62, 0xf9, 0x2c, 0x57, + 0x02, 0x23, 0x08, 0xfa, 0x62, 0x9b, 0x9a, 0xe9, 0x37, 0xfc, 0x01, 0x2e, 0x22, 0xf3, 0xf5, 0xa7, + 0xc1, 0x55, 0x9b, 0x93, 0xf2, 0x2b, 0x02, 0x8c, 0x5b, 0x1f, 0xb9, 0xd1, 0x3d, 0x25, 0x1d, 0x78, + 0x66, 0xe6, 0x9e, 0x84, 0x80, 0xca, 0x3e, 0x9f, 0xe1, 0xa0, 0xda, 0xdf, 0x67, 0x79, 0x63, 0xc5, + 0xec, 0xfc, 0x27, 0x02, 0x8c, 0x5b, 0xcf, 0x8b, 0xc3, 0x22, 0x65, 0xce, 0x48, 0x08, 0xa4, 0x6f, + 0x76, 0x40, 0x7a, 0x26, 0xd9, 0x91, 0xab, 0x18, 0xee, 0x77, 0x04, 0x98, 0xb4, 0x7f, 0xde, 0x47, + 0x21, 0x9f, 0x94, 0x0c, 0xe4, 0x3b, 0xc0, 0xc5, 0x67, 0xfc, 0x0e, 0x70, 0x9d, 0xee, 0xc6, 0x77, + 0x48, 0xd0, 0xf7, 0x47, 0x04, 0xba, 0xdd, 0xb9, 0xf8, 0x23, 0x01, 0x66, 0x6d, 0xbb, 0x34, 0x67, + 0x37, 0x82, 0xe6, 0xf3, 0x3d, 0x6e, 0xf3, 0xf1, 0xde, 0xc1, 0x61, 0xe2, 0x1c, 0xcc, 0x1a, 0x96, + 0xd2, 0xa1, 0xa5, 0xc1, 0xc3, 0x7e, 0x7e, 0x76, 0xe6, 0xbf, 0x58, 0xc9, 0x51, 0xec, 0xe6, 0x66, + 0x25, 0x2c, 0xc1, 0xe1, 0x96, 0xed, 0x49, 0x28, 0xba, 0x6e, 0xa2, 0x95, 0x8e, 0x74, 0x79, 0x9b, + 0xa7, 0xdf, 0x17, 0x60, 0xc6, 0x76, 0x86, 0x7a, 0x31, 0x56, 0x4a, 0x3a, 0x38, 0x4c, 0x9c, 0x87, + 0x84, 0x07, 0x69, 0x9e, 0x47, 0xfa, 0x15, 0xf1, 0x5a, 0x28, 0xda, 0xf0, 0xaa, 0xfd, 0x37, 0x01, + 0x66, 0x6c, 0x27, 0x2c, 0x8b, 0xb2, 0x5b, 0x61, 0xd7, 0x2d, 0xbc, 0x71, 0x7b, 0x1a, 0x8e, 0xc0, + 0xdb, 0xc9, 0x1e, 0x16, 0xcf, 0x08, 0xc8, 0xb8, 0x8e, 0x61, 0x16, 0xa5, 0x27, 0x2c, 0xa1, 0x6a, + 0x38, 0x2a, 0xd7, 0x92, 0xf7, 0xc2, 0x53, 0xe9, 0x34, 0x9e, 0x34, 0x04, 0xf5, 0x67, 0x9b, 0x62, + 0xbb, 0xcd, 0xfd, 0x4a, 0x04, 0xe6, 0xdd, 0x27, 0x23, 0xce, 0xf0, 0xae, 0x86, 0x8a, 0x1a, 0x1c, + 0xb3, 0xf5, 0xd5, 0x0f, 0x0e, 0x13, 0x69, 0x58, 0xb0, 0xfb, 0xa9, 0x4e, 0x5b, 0x65, 0xff, 0x6f, + 0x3a, 0x28, 0x6f, 0xee, 0x8a, 0xb7, 0x0c, 0xde, 0x18, 0xc4, 0x3b, 0x33, 0x84, 0xfa, 0xdb, 0xe4, + 0x3f, 0x16, 0xec, 0xff, 0xc3, 0x85, 0xdd, 0x30, 0xdf, 0xee, 0x89, 0x21, 0xe1, 0x24, 0xe1, 0x83, + 0x5e, 0xe9, 0xbe, 0x8f, 0xde, 0x0c, 0x4a, 0xb7, 0xb7, 0xcd, 0xfe, 0x13, 0xeb, 0x05, 0xb5, 0x17, + 0x19, 0xe8, 0x6e, 0x4f, 0xd4, 0x87, 0x37, 0xe2, 0xcf, 0x0f, 0x0e, 0x13, 0xd7, 0x61, 0xd1, 0x97, + 0x03, 0x54, 0x23, 0xbc, 0x58, 0xc0, 0x9d, 0x92, 0xc3, 0xb2, 0x00, 0x2f, 0xfe, 0x97, 0x23, 0xe6, + 0xa3, 0xeb, 0x63, 0x64, 0x40, 0x78, 0x23, 0xff, 0x17, 0x7a, 0x66, 0xc0, 0x6a, 0xf2, 0x68, 0x32, + 0x80, 0xb9, 0xf0, 0xd7, 0x22, 0x70, 0xda, 0x3b, 0x02, 0x67, 0x71, 0xe2, 0x45, 0x28, 0xc2, 0xcf, + 0x09, 0x3d, 0xb3, 0xa1, 0x90, 0xcc, 0x1f, 0x89, 0x0d, 0xce, 0xbd, 0x01, 0xb3, 0xa4, 0xf4, 0xe3, + 0xce, 0x12, 0xd7, 0xf3, 0xae, 0x71, 0x76, 0x31, 0x6f, 0xe6, 0x91, 0xbd, 0x15, 0x32, 0x5b, 0x6f, + 0xe0, 0x3d, 0xc2, 0x27, 0xb3, 0xae, 0xb8, 0x48, 0xbf, 0x2f, 0x15, 0x27, 0xd3, 0x52, 0x5b, 0xdf, + 0x75, 0x59, 0xf3, 0xd5, 0xdf, 0x12, 0xbe, 0x9a, 0xf9, 0x25, 0x01, 0xad, 0xc3, 0x98, 0x95, 0x9a, + 0x69, 0x29, 0xb3, 0x95, 0x17, 0xaf, 0xa3, 0xe5, 0x5d, 0x5d, 0x6f, 0x69, 0x77, 0xd2, 0xe9, 0x5a, + 0x5d, 0xdf, 0x6d, 0x3f, 0x59, 0xae, 0x28, 0x7b, 0x69, 0x8c, 0x22, 0xcd, 0x50, 0xa4, 0x5b, 0xef, + 0xd7, 0xd2, 0x16, 0x92, 0x95, 0xe8, 0xf5, 0xe5, 0x1b, 0x29, 0x21, 0xb2, 0xc2, 0xff, 0x27, 0x81, + 0xe9, 0x9f, 0xd5, 0x94, 0xa6, 0xbd, 0xa4, 0xa6, 0xb6, 0x2a, 0x77, 0x5c, 0x6d, 0xee, 0xb8, 0xda, + 0xfc, 0x64, 0xc0, 0x79, 0xd3, 0x52, 0xab, 0x4e, 0x3a, 0x3c, 0xe9, 0x27, 0x71, 0x9c, 0x57, 0xff, + 0x34, 0x00, 0x00, 0xff, 0xff, 0xbc, 0x20, 0xfd, 0x2d, 0x76, 0xa8, 0x00, 0x00, } // Reference imports to suppress errors if they are not otherwise used. diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json index 57adde4771..f3110156c8 100644 --- a/pkg/management/api/grpc/management.swagger.json +++ b/pkg/management/api/grpc/management.swagger.json @@ -4,7 +4,7 @@ "title": "Management API", "version": "0.1", "contact": { - "url": "https://github.com/caos/zitadel/management" + "url": "https://github.com/caos/zitadel/pkg/management" } }, "schemes": [ diff --git a/pkg/management/management.go b/pkg/management/management.go index 2ba24ff227..da03b6e137 100644 --- a/pkg/management/management.go +++ b/pkg/management/management.go @@ -2,9 +2,9 @@ package management import ( "context" + "github.com/caos/logging" "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" app "github.com/caos/zitadel/internal/management" "github.com/caos/zitadel/pkg/management/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config *Config, authZ *auth.Config) error { - return errors.ThrowUnimplemented(nil, "MANAG-h3k3x", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-BmOLI").OnError(err).Panic("unable to start api") + return err } From 40734f27c78b7b426149a162963b04db769bec87 Mon Sep 17 00:00:00 2001 From: Livio Amstutz Date: Wed, 25 Mar 2020 11:17:38 +0100 Subject: [PATCH 14/19] fix configs --- pkg/admin/api/api.go | 8 ++++---- pkg/admin/api/grpc/gateway.go | 9 ++------- pkg/admin/api/grpc/server.go | 9 +++++---- pkg/auth/api/api.go | 9 +++++---- pkg/auth/api/grpc/gateway.go | 15 ++++++--------- pkg/auth/api/grpc/server.go | 14 +++++--------- pkg/management/api/api.go | 9 +++++---- pkg/management/api/grpc/gateway.go | 9 ++------- pkg/management/api/grpc/server.go | 14 ++++---------- 9 files changed, 38 insertions(+), 58 deletions(-) diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go index 54ba31a3b1..bebc1ce5ab 100644 --- a/pkg/admin/api/api.go +++ b/pkg/admin/api/api.go @@ -2,6 +2,7 @@ package api import ( "context" + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server" "github.com/caos/zitadel/pkg/admin/api/grpc" ) @@ -12,14 +13,13 @@ type API struct { } type Config struct { - GRPCServer grpc.Config - Gateway grpc.GatewayConfig + GRPC grpc_util.Config } func Start(ctx context.Context, conf *Config) error { api := &API{ - grpcServer: *grpc.StartServer(conf.GRPCServer), - gateway: *grpc.StartGateway(conf.Gateway), + grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), + gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), } server.StartServer(ctx, &api.grpcServer) server.StartGateway(ctx, &api.gateway) diff --git a/pkg/admin/api/grpc/gateway.go b/pkg/admin/api/grpc/gateway.go index 833285b5a8..bd88fbbe56 100644 --- a/pkg/admin/api/grpc/gateway.go +++ b/pkg/admin/api/grpc/gateway.go @@ -1,24 +1,19 @@ package grpc import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server" "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" ) -type GatewayConfig struct { - Port string - GRPCEndpoint string - CustomHeaders []string -} - type Gateway struct { grpcEndpoint string port string cutomHeaders []string } -func StartGateway(conf GatewayConfig) *Gateway { +func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go index e31a3edd1b..e463dea1d8 100644 --- a/pkg/admin/api/grpc/server.go +++ b/pkg/admin/api/grpc/server.go @@ -1,9 +1,11 @@ package grpc import ( - "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) var _ AdminServiceServer = (*Server)(nil) @@ -18,10 +20,9 @@ type Server struct { searchLimit int } -func StartServer(conf Config) *Server { +func StartServer(conf *grpc_util.ServerConfig) *Server { return &Server{ - port: conf.Port, - searchLimit: conf.SearchLimit, + port: conf.Port, } } diff --git a/pkg/auth/api/api.go b/pkg/auth/api/api.go index bb6db2d066..204b3a331f 100644 --- a/pkg/auth/api/api.go +++ b/pkg/auth/api/api.go @@ -2,6 +2,8 @@ package api import ( "context" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server" "github.com/caos/zitadel/pkg/auth/api/grpc" ) @@ -12,14 +14,13 @@ type API struct { } type Config struct { - GRPCServer grpc.Config - Gateway grpc.GatewayConfig + GRPC grpc_util.Config } func Start(ctx context.Context, conf *Config) error { api := &API{ - grpcServer: *grpc.StartServer(conf.GRPCServer), - gateway: *grpc.StartGateway(conf.Gateway), + grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), + gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), } server.StartServer(ctx, &api.grpcServer) server.StartGateway(ctx, &api.gateway) diff --git a/pkg/auth/api/grpc/gateway.go b/pkg/auth/api/grpc/gateway.go index c8b845e6a4..14958b8a7b 100644 --- a/pkg/auth/api/grpc/gateway.go +++ b/pkg/auth/api/grpc/gateway.go @@ -1,16 +1,13 @@ package grpc import ( - "github.com/caos/zitadel/internal/api/grpc/server" - "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" -) -type GatewayConfig struct { - Port string - GRPCEndpoint string - CustomHeaders []string -} + "github.com/grpc-ecosystem/grpc-gateway/runtime" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server" +) type Gateway struct { grpcEndpoint string @@ -18,7 +15,7 @@ type Gateway struct { cutomHeaders []string } -func StartGateway(conf GatewayConfig) *Gateway { +func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go index 0a60ba96d9..214e4445c9 100644 --- a/pkg/auth/api/grpc/server.go +++ b/pkg/auth/api/grpc/server.go @@ -1,27 +1,23 @@ package grpc import ( - "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" + "github.com/caos/zitadel/internal/api/grpc/server/middleware" ) var _ AuthServiceServer = (*Server)(nil) -type Config struct { - Port string - SearchLimit int -} - type Server struct { port string searchLimit int } -func StartServer(conf Config) *Server { +func StartServer(conf *grpc_util.ServerConfig) *Server { return &Server{ - port: conf.Port, - searchLimit: conf.SearchLimit, + port: conf.Port, } } diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go index 9e874b2828..92b494410a 100644 --- a/pkg/management/api/api.go +++ b/pkg/management/api/api.go @@ -2,6 +2,8 @@ package api import ( "context" + + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server" "github.com/caos/zitadel/pkg/management/api/grpc" ) @@ -12,14 +14,13 @@ type API struct { } type Config struct { - GRPCServer grpc.Config - Gateway grpc.GatewayConfig + GRPC grpc_util.Config } func Start(ctx context.Context, conf *Config) error { api := &API{ - grpcServer: *grpc.StartServer(conf.GRPCServer), - gateway: *grpc.StartGateway(conf.Gateway), + grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), + gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), } server.StartServer(ctx, &api.grpcServer) server.StartGateway(ctx, &api.gateway) diff --git a/pkg/management/api/grpc/gateway.go b/pkg/management/api/grpc/gateway.go index 8884d8e5f5..77b5486165 100644 --- a/pkg/management/api/grpc/gateway.go +++ b/pkg/management/api/grpc/gateway.go @@ -1,24 +1,19 @@ package grpc import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server" "github.com/grpc-ecosystem/grpc-gateway/runtime" "strings" ) -type GatewayConfig struct { - Port string - GRPCEndpoint string - CustomHeaders []string -} - type Gateway struct { grpcEndpoint string port string cutomHeaders []string } -func StartGateway(conf GatewayConfig) *Gateway { +func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go index 07981551fb..4ed734c79e 100644 --- a/pkg/management/api/grpc/server.go +++ b/pkg/management/api/grpc/server.go @@ -1,6 +1,7 @@ package grpc import ( + grpc_util "github.com/caos/zitadel/internal/api/grpc" "github.com/caos/zitadel/internal/api/grpc/server/middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" "google.golang.org/grpc" @@ -8,20 +9,13 @@ import ( var _ ManagementServiceServer = (*Server)(nil) -type Config struct { - Port string - SearchLimit int -} - type Server struct { - port string - searchLimit int + port string } -func StartServer(conf Config) *Server { +func StartServer(conf *grpc_util.ServerConfig) *Server { return &Server{ - port: conf.Port, - searchLimit: conf.SearchLimit, + port: conf.Port, } } From 108876348f44d7f9dca2db634ace8066115857f7 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 30 Mar 2020 17:51:25 +0200 Subject: [PATCH 15/19] feat: merge master --- go.mod | 3 ++- go.sum | 1 + pkg/admin/api/config.go | 7 ------- pkg/admin/api/grpc/gateway.go | 2 +- pkg/admin/api/grpc/server.go | 2 +- pkg/auth/api/api.go | 2 +- pkg/auth/api/config.go | 7 ------- pkg/auth/api/grpc/gateway.go | 2 +- pkg/auth/api/grpc/server.go | 2 +- pkg/management/api/config.go | 7 ------- pkg/management/api/grpc/gateway.go | 2 +- pkg/management/api/grpc/server.go | 2 +- 12 files changed, 10 insertions(+), 29 deletions(-) delete mode 100644 pkg/admin/api/config.go delete mode 100644 pkg/auth/api/config.go delete mode 100644 pkg/management/api/config.go diff --git a/go.mod b/go.mod index 4f7af60649..6951ede648 100644 --- a/go.mod +++ b/go.mod @@ -11,6 +11,7 @@ require ( github.com/Masterminds/sprig v2.22.0+incompatible github.com/aws/aws-sdk-go v1.29.16 // indirect github.com/caos/logging v0.0.1 + github.com/envoyproxy/protoc-gen-validate v0.1.0 github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 @@ -34,7 +35,7 @@ require ( golang.org/x/text v0.3.2 golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56 google.golang.org/api v0.20.0 // indirect - google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c // indirect + google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 gopkg.in/yaml.v2 v2.2.8 // indirect ) diff --git a/go.sum b/go.sum index f253cef29c..e8bca6a47d 100644 --- a/go.sum +++ b/go.sum @@ -47,6 +47,7 @@ github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSs github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= +github.com/envoyproxy/protoc-gen-validate v0.1.0 h1:EQciDnbrYxy13PgWoY8AqoxGiPrpgBZ1R8UNe3ddc+A= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= diff --git a/pkg/admin/api/config.go b/pkg/admin/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/admin/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/admin/api/grpc/gateway.go b/pkg/admin/api/grpc/gateway.go index bd88fbbe56..0eaa3c6ae8 100644 --- a/pkg/admin/api/grpc/gateway.go +++ b/pkg/admin/api/grpc/gateway.go @@ -13,7 +13,7 @@ type Gateway struct { cutomHeaders []string } -func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/admin/api/grpc/server.go b/pkg/admin/api/grpc/server.go index e463dea1d8..895d75e7f8 100644 --- a/pkg/admin/api/grpc/server.go +++ b/pkg/admin/api/grpc/server.go @@ -20,7 +20,7 @@ type Server struct { searchLimit int } -func StartServer(conf *grpc_util.ServerConfig) *Server { +func StartServer(conf grpc_util.ServerConfig) *Server { return &Server{ port: conf.Port, } diff --git a/pkg/auth/api/api.go b/pkg/auth/api/api.go index 204b3a331f..dcdb4f2672 100644 --- a/pkg/auth/api/api.go +++ b/pkg/auth/api/api.go @@ -17,7 +17,7 @@ type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf *Config) error { +func Start(ctx context.Context, conf Config) error { api := &API{ grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), diff --git a/pkg/auth/api/config.go b/pkg/auth/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/auth/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/auth/api/grpc/gateway.go b/pkg/auth/api/grpc/gateway.go index 14958b8a7b..7bdea9d1f6 100644 --- a/pkg/auth/api/grpc/gateway.go +++ b/pkg/auth/api/grpc/gateway.go @@ -15,7 +15,7 @@ type Gateway struct { cutomHeaders []string } -func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/auth/api/grpc/server.go b/pkg/auth/api/grpc/server.go index 214e4445c9..5af9cad064 100644 --- a/pkg/auth/api/grpc/server.go +++ b/pkg/auth/api/grpc/server.go @@ -15,7 +15,7 @@ type Server struct { searchLimit int } -func StartServer(conf *grpc_util.ServerConfig) *Server { +func StartServer(conf grpc_util.ServerConfig) *Server { return &Server{ port: conf.Port, } diff --git a/pkg/management/api/config.go b/pkg/management/api/config.go deleted file mode 100644 index 8fce0aca62..0000000000 --- a/pkg/management/api/config.go +++ /dev/null @@ -1,7 +0,0 @@ -package api - -import "github.com/caos/zitadel/internal/api/grpc" - -type Config struct { - GRPC grpc.Config -} diff --git a/pkg/management/api/grpc/gateway.go b/pkg/management/api/grpc/gateway.go index 77b5486165..82e595331a 100644 --- a/pkg/management/api/grpc/gateway.go +++ b/pkg/management/api/grpc/gateway.go @@ -13,7 +13,7 @@ type Gateway struct { cutomHeaders []string } -func StartGateway(conf *grpc_util.GatewayConfig) *Gateway { +func StartGateway(conf grpc_util.GatewayConfig) *Gateway { return &Gateway{ grpcEndpoint: conf.GRPCEndpoint, port: conf.Port, diff --git a/pkg/management/api/grpc/server.go b/pkg/management/api/grpc/server.go index 4ed734c79e..33af61d559 100644 --- a/pkg/management/api/grpc/server.go +++ b/pkg/management/api/grpc/server.go @@ -13,7 +13,7 @@ type Server struct { port string } -func StartServer(conf *grpc_util.ServerConfig) *Server { +func StartServer(conf grpc_util.ServerConfig) *Server { return &Server{ port: conf.Port, } From 9900e53afa8b118fc51443ed78133d06a5712cbc Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 30 Mar 2020 18:08:54 +0200 Subject: [PATCH 16/19] fix: start grpc gateway/server --- .gitignore | 2 +- google-credentials/.gitignore | 1 + pkg/admin/admin.go | 6 ++++-- pkg/admin/api/api.go | 2 +- pkg/auth/auth.go | 6 ++++-- pkg/management/api/api.go | 2 +- pkg/management/management.go | 6 ++++-- 7 files changed, 16 insertions(+), 9 deletions(-) create mode 100644 google-credentials/.gitignore diff --git a/.gitignore b/.gitignore index 192669f97e..2a82aba2e2 100644 --- a/.gitignore +++ b/.gitignore @@ -20,4 +20,4 @@ debug # IDE .idea -.vscode \ No newline at end of file +.vscode diff --git a/google-credentials/.gitignore b/google-credentials/.gitignore new file mode 100644 index 0000000000..3f62406e6a --- /dev/null +++ b/google-credentials/.gitignore @@ -0,0 +1 @@ +key.json diff --git a/pkg/admin/admin.go b/pkg/admin/admin.go index 0a18a4b145..8d2d89d75f 100644 --- a/pkg/admin/admin.go +++ b/pkg/admin/admin.go @@ -2,10 +2,10 @@ package admin import ( "context" + "github.com/caos/logging" app "github.com/caos/zitadel/internal/admin" "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/admin/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "ADMIN-n8vw5", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-lfo5h").OnError(err).Panic("unable to start api") + return err } diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go index bebc1ce5ab..8b163bff39 100644 --- a/pkg/admin/api/api.go +++ b/pkg/admin/api/api.go @@ -16,7 +16,7 @@ type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf *Config) error { +func Start(ctx context.Context, conf Config) error { api := &API{ grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), diff --git a/pkg/auth/auth.go b/pkg/auth/auth.go index f8838f83c0..52929e11a9 100644 --- a/pkg/auth/auth.go +++ b/pkg/auth/auth.go @@ -2,10 +2,10 @@ package auth import ( "context" + "github.com/caos/logging" "github.com/caos/zitadel/internal/api/auth" app "github.com/caos/zitadel/internal/auth" - "github.com/caos/zitadel/internal/errors" "github.com/caos/zitadel/pkg/auth/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "AUTH-l7Hdx", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-udjed").OnError(err).Panic("unable to start api") + return err } diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go index 92b494410a..3a95803f05 100644 --- a/pkg/management/api/api.go +++ b/pkg/management/api/api.go @@ -17,7 +17,7 @@ type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf *Config) error { +func Start(ctx context.Context, conf Config) error { api := &API{ grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), diff --git a/pkg/management/management.go b/pkg/management/management.go index 9f6af48229..4defc40c9d 100644 --- a/pkg/management/management.go +++ b/pkg/management/management.go @@ -2,9 +2,9 @@ package management import ( "context" + "github.com/caos/logging" "github.com/caos/zitadel/internal/api/auth" - "github.com/caos/zitadel/internal/errors" app "github.com/caos/zitadel/internal/management" "github.com/caos/zitadel/pkg/management/api" ) @@ -15,5 +15,7 @@ type Config struct { } func Start(ctx context.Context, config Config, authZ auth.Config) error { - return errors.ThrowUnimplemented(nil, "MANAG-h3k3x", "not implemented yet") //TODO: implement + err := api.Start(ctx, config.API) + logging.Log("MAIN-6dhRs").OnError(err).Panic("unable to start api") + return err } From 52ac0772e36cd380c843864af7238baf3c86102a Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 31 Mar 2020 11:07:48 +0200 Subject: [PATCH 17/19] fix: remove unnecessary functions from auth.proto --- .gitignore | 4 + cmd/zitadel/main.go | 9 +- go.mod | 3 +- go.sum | 11 + google-credentials/.gitignore | 1 - pkg/admin/admin.go | 8 +- pkg/admin/api/api.go | 13 +- pkg/auth/api/api.go | 18 +- pkg/auth/api/grpc/application.go | 18 - pkg/auth/api/grpc/auth.pb.go | 9078 ++++++--------------- pkg/auth/api/grpc/auth.pb.gw.go | 2485 ------ pkg/auth/api/grpc/auth.swagger.json | 1803 +--- pkg/auth/api/grpc/auth_session.go | 34 - pkg/auth/api/grpc/grant.go | 4 - pkg/auth/api/grpc/mock/auth.proto.mock.go | 582 +- pkg/auth/api/grpc/token.go | 10 - pkg/auth/api/grpc/user.go | 27 - pkg/auth/api/grpc/user_agent.go | 18 - pkg/auth/api/grpc/user_session.go | 12 - pkg/auth/api/proto/auth.proto | 650 +- pkg/auth/auth.go | 8 +- pkg/management/api/api.go | 13 +- pkg/management/management.go | 8 +- 23 files changed, 2759 insertions(+), 12058 deletions(-) delete mode 100644 google-credentials/.gitignore delete mode 100644 pkg/auth/api/grpc/application.go delete mode 100644 pkg/auth/api/grpc/auth.pb.gw.go delete mode 100644 pkg/auth/api/grpc/auth_session.go delete mode 100644 pkg/auth/api/grpc/token.go delete mode 100644 pkg/auth/api/grpc/user_agent.go diff --git a/.gitignore b/.gitignore index 2a82aba2e2..e4f3db01e5 100644 --- a/.gitignore +++ b/.gitignore @@ -21,3 +21,7 @@ debug # IDE .idea .vscode + +# credential +google-credentials +key.json \ No newline at end of file diff --git a/cmd/zitadel/main.go b/cmd/zitadel/main.go index fc5f748139..17c108d930 100644 --- a/cmd/zitadel/main.go +++ b/cmd/zitadel/main.go @@ -44,20 +44,17 @@ func main() { ctx := context.Background() if *managementEnabled { - err = management.Start(ctx, conf.Mgmt, conf.AuthZ) - logging.Log("MAIN-39Nv5").OnError(err).Fatal("error starting management api") + management.Start(ctx, conf.Mgmt, conf.AuthZ) } if *authEnabled { - err = auth.Start(ctx, conf.Auth, conf.AuthZ) - logging.Log("MAIN-x0nD2").OnError(err).Fatal("error starting auth api") + auth.Start(ctx, conf.Auth, conf.AuthZ) } if *loginEnabled { err = login.Start(ctx, conf.Login) logging.Log("MAIN-53RF2").OnError(err).Fatal("error starting login ui") } if *adminEnabled { - err = admin.Start(ctx, conf.Admin, conf.AuthZ) - logging.Log("MAIN-0na71").OnError(err).Fatal("error starting admin api") + admin.Start(ctx, conf.Admin, conf.AuthZ) } if *consoleEnabled { err = console.Start(ctx, conf.Console) diff --git a/go.mod b/go.mod index 6951ede648..b4ce9ed1ba 100644 --- a/go.mod +++ b/go.mod @@ -15,7 +15,7 @@ require ( github.com/ghodss/yaml v1.0.0 github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b github.com/golang/mock v1.4.3 - github.com/golang/protobuf v1.3.5 + github.com/golang/protobuf v1.4.0-rc.4 github.com/google/uuid v1.1.1 // indirect github.com/gorilla/schema v1.1.0 github.com/gorilla/securecookie v1.1.1 @@ -37,5 +37,6 @@ require ( google.golang.org/api v0.20.0 // indirect google.golang.org/genproto v0.0.0-20200319113533-08878b785e9c google.golang.org/grpc v1.28.0 + google.golang.org/protobuf v1.20.1 gopkg.in/yaml.v2 v2.2.8 // indirect ) diff --git a/go.sum b/go.sum index e8bca6a47d..35f95765e3 100644 --- a/go.sum +++ b/go.sum @@ -76,6 +76,11 @@ github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5y github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= github.com/golang/protobuf v1.3.5 h1:F768QJ1E9tib+q5Sc8MkdJi1RxLTbRcTf8LJV56aRls= github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk= +github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8= +github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA= +github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs= +github.com/golang/protobuf v1.4.0-rc.4 h1:+EOh4OY6tjM6ZueeUKinl1f0U2820HzQOuf1iqMnsks= +github.com/golang/protobuf v1.4.0-rc.4/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w= github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= @@ -324,6 +329,12 @@ google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8 google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= google.golang.org/grpc v1.28.0 h1:bO/TA4OxCOummhSf10siHuG7vJOiwh7SpRpFZDkOgl4= google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60= +google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= +google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= +google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM= +google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE= +google.golang.org/protobuf v1.20.1 h1:ESRXHgpUBG5D2I5mmsQIyYxB/tQIZfSZ8wLyFDf/N/U= +google.golang.org/protobuf v1.20.1/go.mod h1:KqelGeouBkcbcuB3HCk4/YH2tmNLk6YSWA5LIWeI/lY= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= diff --git a/google-credentials/.gitignore b/google-credentials/.gitignore deleted file mode 100644 index 3f62406e6a..0000000000 --- a/google-credentials/.gitignore +++ /dev/null @@ -1 +0,0 @@ -key.json diff --git a/pkg/admin/admin.go b/pkg/admin/admin.go index 8d2d89d75f..a21970d817 100644 --- a/pkg/admin/admin.go +++ b/pkg/admin/admin.go @@ -2,8 +2,6 @@ package admin import ( "context" - "github.com/caos/logging" - app "github.com/caos/zitadel/internal/admin" "github.com/caos/zitadel/internal/api/auth" "github.com/caos/zitadel/pkg/admin/api" @@ -14,8 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - err := api.Start(ctx, config.API) - logging.Log("MAIN-lfo5h").OnError(err).Panic("unable to start api") - return err +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) } diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go index 8b163bff39..92604a142f 100644 --- a/pkg/admin/api/api.go +++ b/pkg/admin/api/api.go @@ -16,13 +16,10 @@ type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf Config) error { - api := &API{ - grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), - gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), - } - server.StartServer(ctx, &api.grpcServer) - server.StartGateway(ctx, &api.gateway) +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) - return nil + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) } diff --git a/pkg/auth/api/api.go b/pkg/auth/api/api.go index dcdb4f2672..e59bdd1bec 100644 --- a/pkg/auth/api/api.go +++ b/pkg/auth/api/api.go @@ -8,22 +8,14 @@ import ( "github.com/caos/zitadel/pkg/auth/api/grpc" ) -type API struct { - grpcServer grpc.Server - gateway grpc.Gateway -} - type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf Config) error { - api := &API{ - grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), - gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), - } - server.StartServer(ctx, &api.grpcServer) - server.StartGateway(ctx, &api.gateway) +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) - return nil + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) } diff --git a/pkg/auth/api/grpc/application.go b/pkg/auth/api/grpc/application.go deleted file mode 100644 index ddde7358f1..0000000000 --- a/pkg/auth/api/grpc/application.go +++ /dev/null @@ -1,18 +0,0 @@ -package grpc - -import ( - "context" - "github.com/caos/zitadel/internal/errors" -) - -func (s *Server) GetApplicationByID(ctx context.Context, request *ApplicationID) (*Application, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-Rfh8e", "Not implemented") -} - -func (s *Server) SearchApplications(ctx context.Context, appSearch *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ju8Rd", "Not implemented") -} - -func (s *Server) AuthorizeApplication(ctx context.Context, auth *ApplicationAuthorizeRequest) (*Application, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-lo8ws", "Not implemented") -} diff --git a/pkg/auth/api/grpc/auth.pb.go b/pkg/auth/api/grpc/auth.pb.go index 523d941590..0166dff10d 100644 --- a/pkg/auth/api/grpc/auth.pb.go +++ b/pkg/auth/api/grpc/auth.pb.go @@ -1,11 +1,13 @@ // Code generated by protoc-gen-go. DO NOT EDIT. +// versions: +// protoc-gen-go v1.20.1 +// protoc v3.11.3 // source: auth.proto package grpc import ( context "context" - fmt "fmt" _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" _ "github.com/envoyproxy/protoc-gen-validate/validate" proto "github.com/golang/protobuf/proto" @@ -17,47 +19,22 @@ import ( grpc "google.golang.org/grpc" codes "google.golang.org/grpc/codes" status "google.golang.org/grpc/status" - math "math" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" + protoimpl "google.golang.org/protobuf/runtime/protoimpl" + reflect "reflect" + sync "sync" ) -// Reference imports to suppress errors if they are not otherwise used. -var _ = proto.Marshal -var _ = fmt.Errorf -var _ = math.Inf - -// This is a compile-time assertion to ensure that this generated file -// is compatible with the proto package it is being compiled against. -// A compilation error at this line likely means your copy of the -// proto package needs to be updated. -const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package - -type UserAgentState int32 - const ( - UserAgentState_USERAGENTSTATE_UNSPECIFIED UserAgentState = 0 - UserAgentState_USERAGENTSTATE_ACTIVE UserAgentState = 1 - UserAgentState_USERAGENTSTATE_TERMINATED UserAgentState = 2 + // Verify that this generated code is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) + // Verify that runtime/protoimpl is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) ) -var UserAgentState_name = map[int32]string{ - 0: "USERAGENTSTATE_UNSPECIFIED", - 1: "USERAGENTSTATE_ACTIVE", - 2: "USERAGENTSTATE_TERMINATED", -} - -var UserAgentState_value = map[string]int32{ - "USERAGENTSTATE_UNSPECIFIED": 0, - "USERAGENTSTATE_ACTIVE": 1, - "USERAGENTSTATE_TERMINATED": 2, -} - -func (x UserAgentState) String() string { - return proto.EnumName(UserAgentState_name, int32(x)) -} - -func (UserAgentState) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{0} -} +// This is a compile-time assertion that a sufficiently up-to-date version +// of the legacy proto package is being used. +const _ = proto.ProtoPackageIsVersion4 type UserSessionState int32 @@ -67,150 +44,45 @@ const ( UserSessionState_USERSESSIONSTATE_TERMINATED UserSessionState = 2 ) -var UserSessionState_name = map[int32]string{ - 0: "USERSESSIONSTATE_UNSPECIFIED", - 1: "USERSESSIONSTATE_ACTIVE", - 2: "USERSESSIONSTATE_TERMINATED", -} +// Enum value maps for UserSessionState. +var ( + UserSessionState_name = map[int32]string{ + 0: "USERSESSIONSTATE_UNSPECIFIED", + 1: "USERSESSIONSTATE_ACTIVE", + 2: "USERSESSIONSTATE_TERMINATED", + } + UserSessionState_value = map[string]int32{ + "USERSESSIONSTATE_UNSPECIFIED": 0, + "USERSESSIONSTATE_ACTIVE": 1, + "USERSESSIONSTATE_TERMINATED": 2, + } +) -var UserSessionState_value = map[string]int32{ - "USERSESSIONSTATE_UNSPECIFIED": 0, - "USERSESSIONSTATE_ACTIVE": 1, - "USERSESSIONSTATE_TERMINATED": 2, +func (x UserSessionState) Enum() *UserSessionState { + p := new(UserSessionState) + *p = x + return p } func (x UserSessionState) String() string { - return proto.EnumName(UserSessionState_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (UserSessionState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[0].Descriptor() +} + +func (UserSessionState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[0] +} + +func (x UserSessionState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use UserSessionState.Descriptor instead. func (UserSessionState) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{1} -} - -type NextStepType int32 - -const ( - NextStepType_NEXTSTEP_UNSPECIFIED NextStepType = 0 - NextStepType_NEXTSTEP_LOGIN NextStepType = 1 - NextStepType_NEXTSTEP_PASSWORD NextStepType = 2 - NextStepType_NEXTSTEP_CHANGE_PASSWORD NextStepType = 3 - NextStepType_NEXTSTEP_MFA_PROMPT NextStepType = 4 - NextStepType_NEXTSTEP_MFA_INIT_CHOICE NextStepType = 5 - NextStepType_NEXTSTEP_MFA_INIT_CREATE NextStepType = 6 - NextStepType_NEXTSTEP_MFA_INIT_VERIFY NextStepType = 7 - NextStepType_NEXTSTEP_MFA_INIT_DONE NextStepType = 8 - NextStepType_NEXTSTEP_MFA_VERIFY NextStepType = 9 - NextStepType_NEXTSTEP_MFA_VERIFY_ASYNC NextStepType = 10 - NextStepType_NEXTSTEP_VERIFY_EMAIL NextStepType = 11 - NextStepType_NEXTSTEP_REDIRECT_TO_CALLBACK NextStepType = 12 - NextStepType_NEXTSTEP_INIT_PASSWORD NextStepType = 13 - NextStepType_NEXTSTEP_CHOOSE_USER NextStepType = 14 -) - -var NextStepType_name = map[int32]string{ - 0: "NEXTSTEP_UNSPECIFIED", - 1: "NEXTSTEP_LOGIN", - 2: "NEXTSTEP_PASSWORD", - 3: "NEXTSTEP_CHANGE_PASSWORD", - 4: "NEXTSTEP_MFA_PROMPT", - 5: "NEXTSTEP_MFA_INIT_CHOICE", - 6: "NEXTSTEP_MFA_INIT_CREATE", - 7: "NEXTSTEP_MFA_INIT_VERIFY", - 8: "NEXTSTEP_MFA_INIT_DONE", - 9: "NEXTSTEP_MFA_VERIFY", - 10: "NEXTSTEP_MFA_VERIFY_ASYNC", - 11: "NEXTSTEP_VERIFY_EMAIL", - 12: "NEXTSTEP_REDIRECT_TO_CALLBACK", - 13: "NEXTSTEP_INIT_PASSWORD", - 14: "NEXTSTEP_CHOOSE_USER", -} - -var NextStepType_value = map[string]int32{ - "NEXTSTEP_UNSPECIFIED": 0, - "NEXTSTEP_LOGIN": 1, - "NEXTSTEP_PASSWORD": 2, - "NEXTSTEP_CHANGE_PASSWORD": 3, - "NEXTSTEP_MFA_PROMPT": 4, - "NEXTSTEP_MFA_INIT_CHOICE": 5, - "NEXTSTEP_MFA_INIT_CREATE": 6, - "NEXTSTEP_MFA_INIT_VERIFY": 7, - "NEXTSTEP_MFA_INIT_DONE": 8, - "NEXTSTEP_MFA_VERIFY": 9, - "NEXTSTEP_MFA_VERIFY_ASYNC": 10, - "NEXTSTEP_VERIFY_EMAIL": 11, - "NEXTSTEP_REDIRECT_TO_CALLBACK": 12, - "NEXTSTEP_INIT_PASSWORD": 13, - "NEXTSTEP_CHOOSE_USER": 14, -} - -func (x NextStepType) String() string { - return proto.EnumName(NextStepType_name, int32(x)) -} - -func (NextStepType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{2} -} - -type AuthSessionType int32 - -const ( - AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED AuthSessionType = 0 - AuthSessionType_AUTHSESSIONTYPE_OIDC AuthSessionType = 1 - AuthSessionType_AUTHSESSIONTYPE_SAML AuthSessionType = 2 -) - -var AuthSessionType_name = map[int32]string{ - 0: "AUTHSESSIONTYPE_UNSPECIFIED", - 1: "AUTHSESSIONTYPE_OIDC", - 2: "AUTHSESSIONTYPE_SAML", -} - -var AuthSessionType_value = map[string]int32{ - "AUTHSESSIONTYPE_UNSPECIFIED": 0, - "AUTHSESSIONTYPE_OIDC": 1, - "AUTHSESSIONTYPE_SAML": 2, -} - -func (x AuthSessionType) String() string { - return proto.EnumName(AuthSessionType_name, int32(x)) -} - -func (AuthSessionType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{3} -} - -type Prompt int32 - -const ( - Prompt_PROMPT_UNSPECIFIED Prompt = 0 - Prompt_PROMPT_NONE Prompt = 1 - Prompt_PROMPT_LOGIN Prompt = 2 - Prompt_PROMPT_CONSENT Prompt = 3 - Prompt_PROMPT_SELECT_ACCOUNT Prompt = 4 -) - -var Prompt_name = map[int32]string{ - 0: "PROMPT_UNSPECIFIED", - 1: "PROMPT_NONE", - 2: "PROMPT_LOGIN", - 3: "PROMPT_CONSENT", - 4: "PROMPT_SELECT_ACCOUNT", -} - -var Prompt_value = map[string]int32{ - "PROMPT_UNSPECIFIED": 0, - "PROMPT_NONE": 1, - "PROMPT_LOGIN": 2, - "PROMPT_CONSENT": 3, - "PROMPT_SELECT_ACCOUNT": 4, -} - -func (x Prompt) String() string { - return proto.EnumName(Prompt_name, int32(x)) -} - -func (Prompt) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{4} + return file_auth_proto_rawDescGZIP(), []int{0} } type OIDCResponseType int32 @@ -221,49 +93,45 @@ const ( OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN_TOKEN OIDCResponseType = 2 ) -var OIDCResponseType_name = map[int32]string{ - 0: "OIDCRESPONSETYPE_CODE", - 1: "OIDCRESPONSETYPE_ID_TOKEN", - 2: "OIDCRESPONSETYPE_ID_TOKEN_TOKEN", -} +// Enum value maps for OIDCResponseType. +var ( + OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_ID_TOKEN_TOKEN", + } + OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN": 2, + } +) -var OIDCResponseType_value = map[string]int32{ - "OIDCRESPONSETYPE_CODE": 0, - "OIDCRESPONSETYPE_ID_TOKEN": 1, - "OIDCRESPONSETYPE_ID_TOKEN_TOKEN": 2, +func (x OIDCResponseType) Enum() *OIDCResponseType { + p := new(OIDCResponseType) + *p = x + return p } func (x OIDCResponseType) String() string { - return proto.EnumName(OIDCResponseType_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (OIDCResponseType) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[1].Descriptor() +} + +func (OIDCResponseType) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[1] +} + +func (x OIDCResponseType) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use OIDCResponseType.Descriptor instead. func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{5} -} - -type CodeChallengeMethod int32 - -const ( - CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN CodeChallengeMethod = 0 - CodeChallengeMethod_CODECHALLENGEMETHOD_S256 CodeChallengeMethod = 1 -) - -var CodeChallengeMethod_name = map[int32]string{ - 0: "CODECHALLENGEMETHOD_PLAIN", - 1: "CODECHALLENGEMETHOD_S256", -} - -var CodeChallengeMethod_value = map[string]int32{ - "CODECHALLENGEMETHOD_PLAIN": 0, - "CODECHALLENGEMETHOD_S256": 1, -} - -func (x CodeChallengeMethod) String() string { - return proto.EnumName(CodeChallengeMethod_name, int32(x)) -} - -func (CodeChallengeMethod) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{6} + return file_auth_proto_rawDescGZIP(), []int{1} } type UserState int32 @@ -278,32 +146,53 @@ const ( UserState_USERSTATE_INITIAL UserState = 6 ) -var UserState_name = map[int32]string{ - 0: "USERSTATE_UNSPECIEFIED", - 1: "USERSTATE_ACTIVE", - 2: "USERSTATE_INACTIVE", - 3: "USERSTATE_DELETED", - 4: "USERSTATE_LOCKED", - 5: "USERSTATE_SUSPEND", - 6: "USERSTATE_INITIAL", -} +// Enum value maps for UserState. +var ( + UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIEFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", + } + UserState_value = map[string]int32{ + "USERSTATE_UNSPECIEFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, + } +) -var UserState_value = map[string]int32{ - "USERSTATE_UNSPECIEFIED": 0, - "USERSTATE_ACTIVE": 1, - "USERSTATE_INACTIVE": 2, - "USERSTATE_DELETED": 3, - "USERSTATE_LOCKED": 4, - "USERSTATE_SUSPEND": 5, - "USERSTATE_INITIAL": 6, +func (x UserState) Enum() *UserState { + p := new(UserState) + *p = x + return p } func (x UserState) String() string { - return proto.EnumName(UserState_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (UserState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[2].Descriptor() +} + +func (UserState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[2] +} + +func (x UserState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use UserState.Descriptor instead. func (UserState) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{7} + return file_auth_proto_rawDescGZIP(), []int{2} } type Gender int32 @@ -315,51 +204,47 @@ const ( Gender_GENDER_DIVERSE Gender = 3 ) -var Gender_name = map[int32]string{ - 0: "GENDER_UNSPECIFIED", - 1: "GENDER_FEMALE", - 2: "GENDER_MALE", - 3: "GENDER_DIVERSE", -} +// Enum value maps for Gender. +var ( + Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", + } + Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, + } +) -var Gender_value = map[string]int32{ - "GENDER_UNSPECIFIED": 0, - "GENDER_FEMALE": 1, - "GENDER_MALE": 2, - "GENDER_DIVERSE": 3, +func (x Gender) Enum() *Gender { + p := new(Gender) + *p = x + return p } func (x Gender) String() string { - return proto.EnumName(Gender_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (Gender) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[3].Descriptor() +} + +func (Gender) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[3] +} + +func (x Gender) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use Gender.Descriptor instead. func (Gender) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{8} -} - -type NotificationType int32 - -const ( - NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 - NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 -) - -var NotificationType_name = map[int32]string{ - 0: "NOTIFICATIONTYPE_EMAIL", - 1: "NOTIFICATIONTYPE_SMS", -} - -var NotificationType_value = map[string]int32{ - "NOTIFICATIONTYPE_EMAIL": 0, - "NOTIFICATIONTYPE_SMS": 1, -} - -func (x NotificationType) String() string { - return proto.EnumName(NotificationType_name, int32(x)) -} - -func (NotificationType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{9} + return file_auth_proto_rawDescGZIP(), []int{3} } type MfaType int32 @@ -370,24 +255,45 @@ const ( MfaType_MFATYPE_OTP MfaType = 2 ) -var MfaType_name = map[int32]string{ - 0: "MFATYPE_UNSPECIFIED", - 1: "MFATYPE_SMS", - 2: "MFATYPE_OTP", -} +// Enum value maps for MfaType. +var ( + MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", + } + MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, + } +) -var MfaType_value = map[string]int32{ - "MFATYPE_UNSPECIFIED": 0, - "MFATYPE_SMS": 1, - "MFATYPE_OTP": 2, +func (x MfaType) Enum() *MfaType { + p := new(MfaType) + *p = x + return p } func (x MfaType) String() string { - return proto.EnumName(MfaType_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (MfaType) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[4].Descriptor() +} + +func (MfaType) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[4] +} + +func (x MfaType) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use MfaType.Descriptor instead. func (MfaType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{10} + return file_auth_proto_rawDescGZIP(), []int{4} } type MFAState int32 @@ -399,178 +305,93 @@ const ( MFAState_MFASTATE_REMOVED MFAState = 3 ) -var MFAState_name = map[int32]string{ - 0: "MFASTATE_UNSPECIFIED", - 1: "MFASTATE_NOT_READY", - 2: "MFASTATE_READY", - 3: "MFASTATE_REMOVED", -} +// Enum value maps for MFAState. +var ( + MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", + } + MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, + } +) -var MFAState_value = map[string]int32{ - "MFASTATE_UNSPECIFIED": 0, - "MFASTATE_NOT_READY": 1, - "MFASTATE_READY": 2, - "MFASTATE_REMOVED": 3, +func (x MFAState) Enum() *MFAState { + p := new(MFAState) + *p = x + return p } func (x MFAState) String() string { - return proto.EnumName(MFAState_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (MFAState) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[5].Descriptor() +} + +func (MFAState) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[5] +} + +func (x MFAState) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use MFAState.Descriptor instead. func (MFAState) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{11} + return file_auth_proto_rawDescGZIP(), []int{5} } -type AppState int32 +type MyProjectOrgSearchKey int32 const ( - AppState_APPSTATE_UNSPECIFIED AppState = 0 - AppState_APPSTATE_ACTIVE AppState = 1 - AppState_APPSTATE_INACTIVE AppState = 2 - AppState_APPSTATE_DELETED AppState = 3 + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED MyProjectOrgSearchKey = 0 + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_ORG_NAME MyProjectOrgSearchKey = 1 ) -var AppState_name = map[int32]string{ - 0: "APPSTATE_UNSPECIFIED", - 1: "APPSTATE_ACTIVE", - 2: "APPSTATE_INACTIVE", - 3: "APPSTATE_DELETED", -} - -var AppState_value = map[string]int32{ - "APPSTATE_UNSPECIFIED": 0, - "APPSTATE_ACTIVE": 1, - "APPSTATE_INACTIVE": 2, - "APPSTATE_DELETED": 3, -} - -func (x AppState) String() string { - return proto.EnumName(AppState_name, int32(x)) -} - -func (AppState) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{12} -} - -type OIDCGrantType int32 - -const ( - OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 - OIDCGrantType_OIDCGRANTTYPE_GRANT_TYPE_NONE OIDCGrantType = 1 - OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +// Enum value maps for MyProjectOrgSearchKey. +var ( + MyProjectOrgSearchKey_name = map[int32]string{ + 0: "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + 1: "MYPROJECTORGSEARCHKEY_ORG_NAME", + } + MyProjectOrgSearchKey_value = map[string]int32{ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED": 0, + "MYPROJECTORGSEARCHKEY_ORG_NAME": 1, + } ) -var OIDCGrantType_name = map[int32]string{ - 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", - 1: "OIDCGRANTTYPE_GRANT_TYPE_NONE", - 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +func (x MyProjectOrgSearchKey) Enum() *MyProjectOrgSearchKey { + p := new(MyProjectOrgSearchKey) + *p = x + return p } -var OIDCGrantType_value = map[string]int32{ - "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, - "OIDCGRANTTYPE_GRANT_TYPE_NONE": 1, - "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +func (x MyProjectOrgSearchKey) String() string { + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } -func (x OIDCGrantType) String() string { - return proto.EnumName(OIDCGrantType_name, int32(x)) +func (MyProjectOrgSearchKey) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[6].Descriptor() } -func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{13} +func (MyProjectOrgSearchKey) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[6] } -type OIDCApplicationType int32 - -const ( - OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 - OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 - OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 -) - -var OIDCApplicationType_name = map[int32]string{ - 0: "OIDCAPPLICATIONTYPE_WEB", - 1: "OIDCAPPLICATIONTYPE_USER_AGENT", - 2: "OIDCAPPLICATIONTYPE_NATIVE", +func (x MyProjectOrgSearchKey) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) } -var OIDCApplicationType_value = map[string]int32{ - "OIDCAPPLICATIONTYPE_WEB": 0, - "OIDCAPPLICATIONTYPE_USER_AGENT": 1, - "OIDCAPPLICATIONTYPE_NATIVE": 2, -} - -func (x OIDCApplicationType) String() string { - return proto.EnumName(OIDCApplicationType_name, int32(x)) -} - -func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{14} -} - -type OIDCAuthMethodType int32 - -const ( - OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 - OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 - OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 -) - -var OIDCAuthMethodType_name = map[int32]string{ - 0: "OIDCAUTHMETHODTYPE_BASIC", - 1: "OIDCAUTHMETHODTYPE_POST", - 2: "OIDCAUTHMETHODTYPE_NONE", -} - -var OIDCAuthMethodType_value = map[string]int32{ - "OIDCAUTHMETHODTYPE_BASIC": 0, - "OIDCAUTHMETHODTYPE_POST": 1, - "OIDCAUTHMETHODTYPE_NONE": 2, -} - -func (x OIDCAuthMethodType) String() string { - return proto.EnumName(OIDCAuthMethodType_name, int32(x)) -} - -func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{15} -} - -type ApplicationSearchKey int32 - -const ( - ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED ApplicationSearchKey = 0 - ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_TYPE ApplicationSearchKey = 1 - ApplicationSearchKey_APPLICATIONSEARCHKEY_STATE ApplicationSearchKey = 2 - ApplicationSearchKey_APPLICATIONSEARCHKEY_CLIENT_ID ApplicationSearchKey = 3 - ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 4 - ApplicationSearchKey_APPLICATIONSEARCHKEY_PROJECT_ID ApplicationSearchKey = 5 -) - -var ApplicationSearchKey_name = map[int32]string{ - 0: "APPLICATIONSEARCHKEY_UNSPECIFIED", - 1: "APPLICATIONSEARCHKEY_APP_TYPE", - 2: "APPLICATIONSEARCHKEY_STATE", - 3: "APPLICATIONSEARCHKEY_CLIENT_ID", - 4: "APPLICATIONSEARCHKEY_APP_NAME", - 5: "APPLICATIONSEARCHKEY_PROJECT_ID", -} - -var ApplicationSearchKey_value = map[string]int32{ - "APPLICATIONSEARCHKEY_UNSPECIFIED": 0, - "APPLICATIONSEARCHKEY_APP_TYPE": 1, - "APPLICATIONSEARCHKEY_STATE": 2, - "APPLICATIONSEARCHKEY_CLIENT_ID": 3, - "APPLICATIONSEARCHKEY_APP_NAME": 4, - "APPLICATIONSEARCHKEY_PROJECT_ID": 5, -} - -func (x ApplicationSearchKey) String() string { - return proto.EnumName(ApplicationSearchKey_name, int32(x)) -} - -func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{16} +// Deprecated: Use MyProjectOrgSearchKey.Descriptor instead. +func (MyProjectOrgSearchKey) EnumDescriptor() ([]byte, []int) { + return file_auth_proto_rawDescGZIP(), []int{6} } type SearchMethod int32 @@ -581,2544 +402,225 @@ const ( SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 ) -var SearchMethod_name = map[int32]string{ - 0: "SEARCHMETHOD_EQUALS", - 1: "SEARCHMETHOD_STARTS_WITH", - 2: "SEARCHMETHOD_CONTAINS", -} +// Enum value maps for SearchMethod. +var ( + SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", + } + SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, + } +) -var SearchMethod_value = map[string]int32{ - "SEARCHMETHOD_EQUALS": 0, - "SEARCHMETHOD_STARTS_WITH": 1, - "SEARCHMETHOD_CONTAINS": 2, +func (x SearchMethod) Enum() *SearchMethod { + p := new(SearchMethod) + *p = x + return p } func (x SearchMethod) String() string { - return proto.EnumName(SearchMethod_name, int32(x)) + return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } +func (SearchMethod) Descriptor() protoreflect.EnumDescriptor { + return file_auth_proto_enumTypes[7].Descriptor() +} + +func (SearchMethod) Type() protoreflect.EnumType { + return &file_auth_proto_enumTypes[7] +} + +func (x SearchMethod) Number() protoreflect.EnumNumber { + return protoreflect.EnumNumber(x) +} + +// Deprecated: Use SearchMethod.Descriptor instead. func (SearchMethod) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{17} -} - -type GrantSearchKey int32 - -const ( - GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED GrantSearchKey = 0 - GrantSearchKey_GRANTSEARCHKEY_ORG_ID GrantSearchKey = 1 - GrantSearchKey_GRANTSEARCHKEY_PROJECT_ID GrantSearchKey = 2 - GrantSearchKey_GRANTSEARCHKEY_USER_ID GrantSearchKey = 3 -) - -var GrantSearchKey_name = map[int32]string{ - 0: "GRANTSEARCHKEY_UNSPECIFIED", - 1: "GRANTSEARCHKEY_ORG_ID", - 2: "GRANTSEARCHKEY_PROJECT_ID", - 3: "GRANTSEARCHKEY_USER_ID", -} - -var GrantSearchKey_value = map[string]int32{ - "GRANTSEARCHKEY_UNSPECIFIED": 0, - "GRANTSEARCHKEY_ORG_ID": 1, - "GRANTSEARCHKEY_PROJECT_ID": 2, - "GRANTSEARCHKEY_USER_ID": 3, -} - -func (x GrantSearchKey) String() string { - return proto.EnumName(GrantSearchKey_name, int32(x)) -} - -func (GrantSearchKey) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{18} -} - -type MyProjectOrgSearchKey int32 - -const ( - MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED MyProjectOrgSearchKey = 0 - MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_ORG_NAME MyProjectOrgSearchKey = 1 -) - -var MyProjectOrgSearchKey_name = map[int32]string{ - 0: "MYPROJECTORGSEARCHKEY_UNSPECIFIED", - 1: "MYPROJECTORGSEARCHKEY_ORG_NAME", -} - -var MyProjectOrgSearchKey_value = map[string]int32{ - "MYPROJECTORGSEARCHKEY_UNSPECIFIED": 0, - "MYPROJECTORGSEARCHKEY_ORG_NAME": 1, -} - -func (x MyProjectOrgSearchKey) String() string { - return proto.EnumName(MyProjectOrgSearchKey_name, int32(x)) -} - -func (MyProjectOrgSearchKey) EnumDescriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{19} -} - -type SessionRequest struct { - UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *SessionRequest) Reset() { *m = SessionRequest{} } -func (m *SessionRequest) String() string { return proto.CompactTextString(m) } -func (*SessionRequest) ProtoMessage() {} -func (*SessionRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{0} -} - -func (m *SessionRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_SessionRequest.Unmarshal(m, b) -} -func (m *SessionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_SessionRequest.Marshal(b, m, deterministic) -} -func (m *SessionRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_SessionRequest.Merge(m, src) -} -func (m *SessionRequest) XXX_Size() int { - return xxx_messageInfo_SessionRequest.Size(m) -} -func (m *SessionRequest) XXX_DiscardUnknown() { - xxx_messageInfo_SessionRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_SessionRequest proto.InternalMessageInfo - -func (m *SessionRequest) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -func (m *SessionRequest) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type UserAgent struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - State UserAgentState `protobuf:"varint,3,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserAgentState" json:"state,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserAgent) Reset() { *m = UserAgent{} } -func (m *UserAgent) String() string { return proto.CompactTextString(m) } -func (*UserAgent) ProtoMessage() {} -func (*UserAgent) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{1} -} - -func (m *UserAgent) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserAgent.Unmarshal(m, b) -} -func (m *UserAgent) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserAgent.Marshal(b, m, deterministic) -} -func (m *UserAgent) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserAgent.Merge(m, src) -} -func (m *UserAgent) XXX_Size() int { - return xxx_messageInfo_UserAgent.Size(m) -} -func (m *UserAgent) XXX_DiscardUnknown() { - xxx_messageInfo_UserAgent.DiscardUnknown(m) -} - -var xxx_messageInfo_UserAgent proto.InternalMessageInfo - -func (m *UserAgent) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *UserAgent) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -func (m *UserAgent) GetState() UserAgentState { - if m != nil { - return m.State - } - return UserAgentState_USERAGENTSTATE_UNSPECIFIED -} - -type UserAgentID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserAgentID) Reset() { *m = UserAgentID{} } -func (m *UserAgentID) String() string { return proto.CompactTextString(m) } -func (*UserAgentID) ProtoMessage() {} -func (*UserAgentID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{2} -} - -func (m *UserAgentID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserAgentID.Unmarshal(m, b) -} -func (m *UserAgentID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserAgentID.Marshal(b, m, deterministic) -} -func (m *UserAgentID) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserAgentID.Merge(m, src) -} -func (m *UserAgentID) XXX_Size() int { - return xxx_messageInfo_UserAgentID.Size(m) -} -func (m *UserAgentID) XXX_DiscardUnknown() { - xxx_messageInfo_UserAgentID.DiscardUnknown(m) -} - -var xxx_messageInfo_UserAgentID proto.InternalMessageInfo - -func (m *UserAgentID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -type UserAgentCreation struct { - BrowserInfo *BrowserInformation `protobuf:"bytes,1,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserAgentCreation) Reset() { *m = UserAgentCreation{} } -func (m *UserAgentCreation) String() string { return proto.CompactTextString(m) } -func (*UserAgentCreation) ProtoMessage() {} -func (*UserAgentCreation) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{3} -} - -func (m *UserAgentCreation) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserAgentCreation.Unmarshal(m, b) -} -func (m *UserAgentCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserAgentCreation.Marshal(b, m, deterministic) -} -func (m *UserAgentCreation) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserAgentCreation.Merge(m, src) -} -func (m *UserAgentCreation) XXX_Size() int { - return xxx_messageInfo_UserAgentCreation.Size(m) -} -func (m *UserAgentCreation) XXX_DiscardUnknown() { - xxx_messageInfo_UserAgentCreation.DiscardUnknown(m) -} - -var xxx_messageInfo_UserAgentCreation proto.InternalMessageInfo - -func (m *UserAgentCreation) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type UserAgents struct { - Sessions []*UserAgent `protobuf:"bytes,1,rep,name=sessions,proto3" json:"sessions,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserAgents) Reset() { *m = UserAgents{} } -func (m *UserAgents) String() string { return proto.CompactTextString(m) } -func (*UserAgents) ProtoMessage() {} -func (*UserAgents) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{4} -} - -func (m *UserAgents) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserAgents.Unmarshal(m, b) -} -func (m *UserAgents) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserAgents.Marshal(b, m, deterministic) -} -func (m *UserAgents) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserAgents.Merge(m, src) -} -func (m *UserAgents) XXX_Size() int { - return xxx_messageInfo_UserAgents.Size(m) -} -func (m *UserAgents) XXX_DiscardUnknown() { - xxx_messageInfo_UserAgents.DiscardUnknown(m) -} - -var xxx_messageInfo_UserAgents proto.InternalMessageInfo - -func (m *UserAgents) GetSessions() []*UserAgent { - if m != nil { - return m.Sessions - } - return nil -} - -type AuthSessionCreation struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - Type AuthSessionType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` - RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` - State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` - Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` - AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` - UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` - LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` - MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` - // Types that are valid to be assigned to TypeInfo: - // *AuthSessionCreation_Oidc - TypeInfo isAuthSessionCreation_TypeInfo `protobuf_oneof:"type_info"` - PreselectedUserId string `protobuf:"bytes,13,opt,name=preselected_user_id,json=preselectedUserId,proto3" json:"preselected_user_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthSessionCreation) Reset() { *m = AuthSessionCreation{} } -func (m *AuthSessionCreation) String() string { return proto.CompactTextString(m) } -func (*AuthSessionCreation) ProtoMessage() {} -func (*AuthSessionCreation) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{5} -} - -func (m *AuthSessionCreation) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthSessionCreation.Unmarshal(m, b) -} -func (m *AuthSessionCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthSessionCreation.Marshal(b, m, deterministic) -} -func (m *AuthSessionCreation) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthSessionCreation.Merge(m, src) -} -func (m *AuthSessionCreation) XXX_Size() int { - return xxx_messageInfo_AuthSessionCreation.Size(m) -} -func (m *AuthSessionCreation) XXX_DiscardUnknown() { - xxx_messageInfo_AuthSessionCreation.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthSessionCreation proto.InternalMessageInfo - -func (m *AuthSessionCreation) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *AuthSessionCreation) GetType() AuthSessionType { - if m != nil { - return m.Type - } - return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED -} - -func (m *AuthSessionCreation) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -func (m *AuthSessionCreation) GetClientId() string { - if m != nil { - return m.ClientId - } - return "" -} - -func (m *AuthSessionCreation) GetRedirectUri() string { - if m != nil { - return m.RedirectUri - } - return "" -} - -func (m *AuthSessionCreation) GetState() string { - if m != nil { - return m.State - } - return "" -} - -func (m *AuthSessionCreation) GetPrompt() Prompt { - if m != nil { - return m.Prompt - } - return Prompt_PROMPT_UNSPECIFIED -} - -func (m *AuthSessionCreation) GetAuthContextClassReference() []string { - if m != nil { - return m.AuthContextClassReference - } - return nil -} - -func (m *AuthSessionCreation) GetUiLocales() []string { - if m != nil { - return m.UiLocales - } - return nil -} - -func (m *AuthSessionCreation) GetLoginHint() string { - if m != nil { - return m.LoginHint - } - return "" -} - -func (m *AuthSessionCreation) GetMaxAge() uint32 { - if m != nil { - return m.MaxAge - } - return 0 -} - -type isAuthSessionCreation_TypeInfo interface { - isAuthSessionCreation_TypeInfo() -} - -type AuthSessionCreation_Oidc struct { - Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` -} - -func (*AuthSessionCreation_Oidc) isAuthSessionCreation_TypeInfo() {} - -func (m *AuthSessionCreation) GetTypeInfo() isAuthSessionCreation_TypeInfo { - if m != nil { - return m.TypeInfo - } - return nil -} - -func (m *AuthSessionCreation) GetOidc() *AuthRequestOIDC { - if x, ok := m.GetTypeInfo().(*AuthSessionCreation_Oidc); ok { - return x.Oidc - } - return nil -} - -func (m *AuthSessionCreation) GetPreselectedUserId() string { - if m != nil { - return m.PreselectedUserId - } - return "" -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*AuthSessionCreation) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*AuthSessionCreation_Oidc)(nil), - } -} - -type AuthSessionResponse struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` - Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` - ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` - RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` - State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` - Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` - AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` - UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` - LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` - MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` - // Types that are valid to be assigned to TypeInfo: - // *AuthSessionResponse_Oidc - TypeInfo isAuthSessionResponse_TypeInfo `protobuf_oneof:"type_info"` - PossibleSteps []*NextStep `protobuf:"bytes,13,rep,name=possible_steps,json=possibleSteps,proto3" json:"possible_steps,omitempty"` - ProjectClientIds []string `protobuf:"bytes,14,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` - UserSession *UserSession `protobuf:"bytes,15,opt,name=user_session,json=userSession,proto3" json:"user_session,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthSessionResponse) Reset() { *m = AuthSessionResponse{} } -func (m *AuthSessionResponse) String() string { return proto.CompactTextString(m) } -func (*AuthSessionResponse) ProtoMessage() {} -func (*AuthSessionResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{6} -} - -func (m *AuthSessionResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthSessionResponse.Unmarshal(m, b) -} -func (m *AuthSessionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthSessionResponse.Marshal(b, m, deterministic) -} -func (m *AuthSessionResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthSessionResponse.Merge(m, src) -} -func (m *AuthSessionResponse) XXX_Size() int { - return xxx_messageInfo_AuthSessionResponse.Size(m) -} -func (m *AuthSessionResponse) XXX_DiscardUnknown() { - xxx_messageInfo_AuthSessionResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthSessionResponse proto.InternalMessageInfo - -func (m *AuthSessionResponse) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *AuthSessionResponse) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *AuthSessionResponse) GetType() AuthSessionType { - if m != nil { - return m.Type - } - return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED -} - -func (m *AuthSessionResponse) GetClientId() string { - if m != nil { - return m.ClientId - } - return "" -} - -func (m *AuthSessionResponse) GetRedirectUri() string { - if m != nil { - return m.RedirectUri - } - return "" -} - -func (m *AuthSessionResponse) GetState() string { - if m != nil { - return m.State - } - return "" -} - -func (m *AuthSessionResponse) GetPrompt() Prompt { - if m != nil { - return m.Prompt - } - return Prompt_PROMPT_UNSPECIFIED -} - -func (m *AuthSessionResponse) GetAuthContextClassReference() []string { - if m != nil { - return m.AuthContextClassReference - } - return nil -} - -func (m *AuthSessionResponse) GetUiLocales() []string { - if m != nil { - return m.UiLocales - } - return nil -} - -func (m *AuthSessionResponse) GetLoginHint() string { - if m != nil { - return m.LoginHint - } - return "" -} - -func (m *AuthSessionResponse) GetMaxAge() uint32 { - if m != nil { - return m.MaxAge - } - return 0 -} - -type isAuthSessionResponse_TypeInfo interface { - isAuthSessionResponse_TypeInfo() -} - -type AuthSessionResponse_Oidc struct { - Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` -} - -func (*AuthSessionResponse_Oidc) isAuthSessionResponse_TypeInfo() {} - -func (m *AuthSessionResponse) GetTypeInfo() isAuthSessionResponse_TypeInfo { - if m != nil { - return m.TypeInfo - } - return nil -} - -func (m *AuthSessionResponse) GetOidc() *AuthRequestOIDC { - if x, ok := m.GetTypeInfo().(*AuthSessionResponse_Oidc); ok { - return x.Oidc - } - return nil -} - -func (m *AuthSessionResponse) GetPossibleSteps() []*NextStep { - if m != nil { - return m.PossibleSteps - } - return nil -} - -func (m *AuthSessionResponse) GetProjectClientIds() []string { - if m != nil { - return m.ProjectClientIds - } - return nil -} - -func (m *AuthSessionResponse) GetUserSession() *UserSession { - if m != nil { - return m.UserSession - } - return nil -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*AuthSessionResponse) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*AuthSessionResponse_Oidc)(nil), - } -} - -type AuthSessionView struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` - ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` - UserSessionId string `protobuf:"bytes,5,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` - ProjectClientIds []string `protobuf:"bytes,6,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` - TokenId string `protobuf:"bytes,7,opt,name=token_id,json=tokenId,proto3" json:"token_id,omitempty"` - TokenExpiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=token_expiration,json=tokenExpiration,proto3" json:"token_expiration,omitempty"` - UserId string `protobuf:"bytes,9,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthSessionView) Reset() { *m = AuthSessionView{} } -func (m *AuthSessionView) String() string { return proto.CompactTextString(m) } -func (*AuthSessionView) ProtoMessage() {} -func (*AuthSessionView) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{7} -} - -func (m *AuthSessionView) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthSessionView.Unmarshal(m, b) -} -func (m *AuthSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthSessionView.Marshal(b, m, deterministic) -} -func (m *AuthSessionView) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthSessionView.Merge(m, src) -} -func (m *AuthSessionView) XXX_Size() int { - return xxx_messageInfo_AuthSessionView.Size(m) -} -func (m *AuthSessionView) XXX_DiscardUnknown() { - xxx_messageInfo_AuthSessionView.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthSessionView proto.InternalMessageInfo - -func (m *AuthSessionView) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *AuthSessionView) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -func (m *AuthSessionView) GetType() AuthSessionType { - if m != nil { - return m.Type - } - return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED -} - -func (m *AuthSessionView) GetClientId() string { - if m != nil { - return m.ClientId - } - return "" -} - -func (m *AuthSessionView) GetUserSessionId() string { - if m != nil { - return m.UserSessionId - } - return "" -} - -func (m *AuthSessionView) GetProjectClientIds() []string { - if m != nil { - return m.ProjectClientIds - } - return nil -} - -func (m *AuthSessionView) GetTokenId() string { - if m != nil { - return m.TokenId - } - return "" -} - -func (m *AuthSessionView) GetTokenExpiration() *timestamp.Timestamp { - if m != nil { - return m.TokenExpiration - } - return nil -} - -func (m *AuthSessionView) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -type TokenID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *TokenID) Reset() { *m = TokenID{} } -func (m *TokenID) String() string { return proto.CompactTextString(m) } -func (*TokenID) ProtoMessage() {} -func (*TokenID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{8} -} - -func (m *TokenID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_TokenID.Unmarshal(m, b) -} -func (m *TokenID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_TokenID.Marshal(b, m, deterministic) -} -func (m *TokenID) XXX_Merge(src proto.Message) { - xxx_messageInfo_TokenID.Merge(m, src) -} -func (m *TokenID) XXX_Size() int { - return xxx_messageInfo_TokenID.Size(m) -} -func (m *TokenID) XXX_DiscardUnknown() { - xxx_messageInfo_TokenID.DiscardUnknown(m) -} - -var xxx_messageInfo_TokenID proto.InternalMessageInfo - -func (m *TokenID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -type UserSessionID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserSessionID) Reset() { *m = UserSessionID{} } -func (m *UserSessionID) String() string { return proto.CompactTextString(m) } -func (*UserSessionID) ProtoMessage() {} -func (*UserSessionID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{9} -} - -func (m *UserSessionID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserSessionID.Unmarshal(m, b) -} -func (m *UserSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserSessionID.Marshal(b, m, deterministic) -} -func (m *UserSessionID) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserSessionID.Merge(m, src) -} -func (m *UserSessionID) XXX_Size() int { - return xxx_messageInfo_UserSessionID.Size(m) -} -func (m *UserSessionID) XXX_DiscardUnknown() { - xxx_messageInfo_UserSessionID.DiscardUnknown(m) -} - -var xxx_messageInfo_UserSessionID proto.InternalMessageInfo - -func (m *UserSessionID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *UserSessionID) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -type UserSessions struct { - UserSessions []*UserSession `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserSessions) Reset() { *m = UserSessions{} } -func (m *UserSessions) String() string { return proto.CompactTextString(m) } -func (*UserSessions) ProtoMessage() {} -func (*UserSessions) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{10} -} - -func (m *UserSessions) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserSessions.Unmarshal(m, b) -} -func (m *UserSessions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserSessions.Marshal(b, m, deterministic) -} -func (m *UserSessions) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserSessions.Merge(m, src) -} -func (m *UserSessions) XXX_Size() int { - return xxx_messageInfo_UserSessions.Size(m) -} -func (m *UserSessions) XXX_DiscardUnknown() { - xxx_messageInfo_UserSessions.DiscardUnknown(m) -} - -var xxx_messageInfo_UserSessions proto.InternalMessageInfo - -func (m *UserSessions) GetUserSessions() []*UserSession { - if m != nil { - return m.UserSessions - } - return nil -} - -type UserSession struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` - User *AuthUser `protobuf:"bytes,4,opt,name=user,proto3" json:"user,omitempty"` - PasswordVerified bool `protobuf:"varint,5,opt,name=password_verified,json=passwordVerified,proto3" json:"password_verified,omitempty"` - Mfa MfaType `protobuf:"varint,6,opt,name=mfa,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa,omitempty"` - MfaVerified bool `protobuf:"varint,7,opt,name=mfa_verified,json=mfaVerified,proto3" json:"mfa_verified,omitempty"` - AuthTime *timestamp.Timestamp `protobuf:"bytes,8,opt,name=auth_time,json=authTime,proto3" json:"auth_time,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UserSession) Reset() { *m = UserSession{} } -func (m *UserSession) String() string { return proto.CompactTextString(m) } -func (*UserSession) ProtoMessage() {} -func (*UserSession) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{11} -} - -func (m *UserSession) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserSession.Unmarshal(m, b) -} -func (m *UserSession) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserSession.Marshal(b, m, deterministic) -} -func (m *UserSession) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserSession.Merge(m, src) -} -func (m *UserSession) XXX_Size() int { - return xxx_messageInfo_UserSession.Size(m) -} -func (m *UserSession) XXX_DiscardUnknown() { - xxx_messageInfo_UserSession.DiscardUnknown(m) -} - -var xxx_messageInfo_UserSession proto.InternalMessageInfo - -func (m *UserSession) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *UserSession) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *UserSession) GetAuthState() UserSessionState { - if m != nil { - return m.AuthState - } - return UserSessionState_USERSESSIONSTATE_UNSPECIFIED -} - -func (m *UserSession) GetUser() *AuthUser { - if m != nil { - return m.User - } - return nil -} - -func (m *UserSession) GetPasswordVerified() bool { - if m != nil { - return m.PasswordVerified - } - return false -} - -func (m *UserSession) GetMfa() MfaType { - if m != nil { - return m.Mfa - } - return MfaType_MFATYPE_UNSPECIFIED -} - -func (m *UserSession) GetMfaVerified() bool { - if m != nil { - return m.MfaVerified - } - return false -} - -func (m *UserSession) GetAuthTime() *timestamp.Timestamp { - if m != nil { - return m.AuthTime - } - return nil + return file_auth_proto_rawDescGZIP(), []int{7} } type UserSessionViews struct { - UserSessions []*UserSessionView `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + UserSessions []*UserSessionView `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` } -func (m *UserSessionViews) Reset() { *m = UserSessionViews{} } -func (m *UserSessionViews) String() string { return proto.CompactTextString(m) } -func (*UserSessionViews) ProtoMessage() {} +func (x *UserSessionViews) Reset() { + *x = UserSessionViews{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[0] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserSessionViews) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserSessionViews) ProtoMessage() {} + +func (x *UserSessionViews) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[0] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserSessionViews.ProtoReflect.Descriptor instead. func (*UserSessionViews) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{12} + return file_auth_proto_rawDescGZIP(), []int{0} } -func (m *UserSessionViews) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserSessionViews.Unmarshal(m, b) -} -func (m *UserSessionViews) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserSessionViews.Marshal(b, m, deterministic) -} -func (m *UserSessionViews) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserSessionViews.Merge(m, src) -} -func (m *UserSessionViews) XXX_Size() int { - return xxx_messageInfo_UserSessionViews.Size(m) -} -func (m *UserSessionViews) XXX_DiscardUnknown() { - xxx_messageInfo_UserSessionViews.DiscardUnknown(m) -} - -var xxx_messageInfo_UserSessionViews proto.InternalMessageInfo - -func (m *UserSessionViews) GetUserSessions() []*UserSessionView { - if m != nil { - return m.UserSessions +func (x *UserSessionViews) GetUserSessions() []*UserSessionView { + if x != nil { + return x.UserSessions } return nil } type UserSessionView struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` - UserId string `protobuf:"bytes,4,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + UserId string `protobuf:"bytes,4,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` } -func (m *UserSessionView) Reset() { *m = UserSessionView{} } -func (m *UserSessionView) String() string { return proto.CompactTextString(m) } -func (*UserSessionView) ProtoMessage() {} +func (x *UserSessionView) Reset() { + *x = UserSessionView{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[1] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserSessionView) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserSessionView) ProtoMessage() {} + +func (x *UserSessionView) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[1] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserSessionView.ProtoReflect.Descriptor instead. func (*UserSessionView) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{13} + return file_auth_proto_rawDescGZIP(), []int{1} } -func (m *UserSessionView) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserSessionView.Unmarshal(m, b) -} -func (m *UserSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserSessionView.Marshal(b, m, deterministic) -} -func (m *UserSessionView) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserSessionView.Merge(m, src) -} -func (m *UserSessionView) XXX_Size() int { - return xxx_messageInfo_UserSessionView.Size(m) -} -func (m *UserSessionView) XXX_DiscardUnknown() { - xxx_messageInfo_UserSessionView.DiscardUnknown(m) -} - -var xxx_messageInfo_UserSessionView proto.InternalMessageInfo - -func (m *UserSessionView) GetId() string { - if m != nil { - return m.Id +func (x *UserSessionView) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *UserSessionView) GetAgentId() string { - if m != nil { - return m.AgentId +func (x *UserSessionView) GetAgentId() string { + if x != nil { + return x.AgentId } return "" } -func (m *UserSessionView) GetAuthState() UserSessionState { - if m != nil { - return m.AuthState +func (x *UserSessionView) GetAuthState() UserSessionState { + if x != nil { + return x.AuthState } return UserSessionState_USERSESSIONSTATE_UNSPECIFIED } -func (m *UserSessionView) GetUserId() string { - if m != nil { - return m.UserId +func (x *UserSessionView) GetUserId() string { + if x != nil { + return x.UserId } return "" } -func (m *UserSessionView) GetUserName() string { - if m != nil { - return m.UserName +func (x *UserSessionView) GetUserName() string { + if x != nil { + return x.UserName } return "" } -type AuthUser struct { - UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthUser) Reset() { *m = AuthUser{} } -func (m *AuthUser) String() string { return proto.CompactTextString(m) } -func (*AuthUser) ProtoMessage() {} -func (*AuthUser) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{14} -} - -func (m *AuthUser) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthUser.Unmarshal(m, b) -} -func (m *AuthUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthUser.Marshal(b, m, deterministic) -} -func (m *AuthUser) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthUser.Merge(m, src) -} -func (m *AuthUser) XXX_Size() int { - return xxx_messageInfo_AuthUser.Size(m) -} -func (m *AuthUser) XXX_DiscardUnknown() { - xxx_messageInfo_AuthUser.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthUser proto.InternalMessageInfo - -func (m *AuthUser) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -func (m *AuthUser) GetUserName() string { - if m != nil { - return m.UserName - } - return "" -} - -type AuthSessionID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthSessionID) Reset() { *m = AuthSessionID{} } -func (m *AuthSessionID) String() string { return proto.CompactTextString(m) } -func (*AuthSessionID) ProtoMessage() {} -func (*AuthSessionID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{15} -} - -func (m *AuthSessionID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthSessionID.Unmarshal(m, b) -} -func (m *AuthSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthSessionID.Marshal(b, m, deterministic) -} -func (m *AuthSessionID) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthSessionID.Merge(m, src) -} -func (m *AuthSessionID) XXX_Size() int { - return xxx_messageInfo_AuthSessionID.Size(m) -} -func (m *AuthSessionID) XXX_DiscardUnknown() { - xxx_messageInfo_AuthSessionID.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthSessionID proto.InternalMessageInfo - -func (m *AuthSessionID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *AuthSessionID) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *AuthSessionID) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type SelectUserRequest struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - UserSessionId string `protobuf:"bytes,3,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *SelectUserRequest) Reset() { *m = SelectUserRequest{} } -func (m *SelectUserRequest) String() string { return proto.CompactTextString(m) } -func (*SelectUserRequest) ProtoMessage() {} -func (*SelectUserRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{16} -} - -func (m *SelectUserRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_SelectUserRequest.Unmarshal(m, b) -} -func (m *SelectUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_SelectUserRequest.Marshal(b, m, deterministic) -} -func (m *SelectUserRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_SelectUserRequest.Merge(m, src) -} -func (m *SelectUserRequest) XXX_Size() int { - return xxx_messageInfo_SelectUserRequest.Size(m) -} -func (m *SelectUserRequest) XXX_DiscardUnknown() { - xxx_messageInfo_SelectUserRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_SelectUserRequest proto.InternalMessageInfo - -func (m *SelectUserRequest) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *SelectUserRequest) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -func (m *SelectUserRequest) GetUserSessionId() string { - if m != nil { - return m.UserSessionId - } - return "" -} - -func (m *SelectUserRequest) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type VerifyUserRequest struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *VerifyUserRequest) Reset() { *m = VerifyUserRequest{} } -func (m *VerifyUserRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyUserRequest) ProtoMessage() {} -func (*VerifyUserRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{17} -} - -func (m *VerifyUserRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyUserRequest.Unmarshal(m, b) -} -func (m *VerifyUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyUserRequest.Marshal(b, m, deterministic) -} -func (m *VerifyUserRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyUserRequest.Merge(m, src) -} -func (m *VerifyUserRequest) XXX_Size() int { - return xxx_messageInfo_VerifyUserRequest.Size(m) -} -func (m *VerifyUserRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyUserRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyUserRequest proto.InternalMessageInfo - -func (m *VerifyUserRequest) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *VerifyUserRequest) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -func (m *VerifyUserRequest) GetUserName() string { - if m != nil { - return m.UserName - } - return "" -} - -func (m *VerifyUserRequest) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type VerifyPasswordRequest struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *VerifyPasswordRequest) Reset() { *m = VerifyPasswordRequest{} } -func (m *VerifyPasswordRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyPasswordRequest) ProtoMessage() {} -func (*VerifyPasswordRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{18} -} - -func (m *VerifyPasswordRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyPasswordRequest.Unmarshal(m, b) -} -func (m *VerifyPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyPasswordRequest.Marshal(b, m, deterministic) -} -func (m *VerifyPasswordRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyPasswordRequest.Merge(m, src) -} -func (m *VerifyPasswordRequest) XXX_Size() int { - return xxx_messageInfo_VerifyPasswordRequest.Size(m) -} -func (m *VerifyPasswordRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyPasswordRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyPasswordRequest proto.InternalMessageInfo - -func (m *VerifyPasswordRequest) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *VerifyPasswordRequest) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -func (m *VerifyPasswordRequest) GetPassword() string { - if m != nil { - return m.Password - } - return "" -} - -func (m *VerifyPasswordRequest) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type VerifyMfaRequest struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` - // Types that are valid to be assigned to Mfa: - // *VerifyMfaRequest_Otp - Mfa isVerifyMfaRequest_Mfa `protobuf_oneof:"mfa"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *VerifyMfaRequest) Reset() { *m = VerifyMfaRequest{} } -func (m *VerifyMfaRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyMfaRequest) ProtoMessage() {} -func (*VerifyMfaRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{19} -} - -func (m *VerifyMfaRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyMfaRequest.Unmarshal(m, b) -} -func (m *VerifyMfaRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyMfaRequest.Marshal(b, m, deterministic) -} -func (m *VerifyMfaRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyMfaRequest.Merge(m, src) -} -func (m *VerifyMfaRequest) XXX_Size() int { - return xxx_messageInfo_VerifyMfaRequest.Size(m) -} -func (m *VerifyMfaRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyMfaRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyMfaRequest proto.InternalMessageInfo - -func (m *VerifyMfaRequest) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *VerifyMfaRequest) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -func (m *VerifyMfaRequest) GetBrowserInfo() *BrowserInformation { - if m != nil { - return m.BrowserInfo - } - return nil -} - -type isVerifyMfaRequest_Mfa interface { - isVerifyMfaRequest_Mfa() -} - -type VerifyMfaRequest_Otp struct { - Otp *AuthSessionMultiFactorOTP `protobuf:"bytes,4,opt,name=otp,proto3,oneof"` -} - -func (*VerifyMfaRequest_Otp) isVerifyMfaRequest_Mfa() {} - -func (m *VerifyMfaRequest) GetMfa() isVerifyMfaRequest_Mfa { - if m != nil { - return m.Mfa - } - return nil -} - -func (m *VerifyMfaRequest) GetOtp() *AuthSessionMultiFactorOTP { - if x, ok := m.GetMfa().(*VerifyMfaRequest_Otp); ok { - return x.Otp - } - return nil -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*VerifyMfaRequest) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*VerifyMfaRequest_Otp)(nil), - } -} - -type AuthSessionMultiFactorOTP struct { - Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthSessionMultiFactorOTP) Reset() { *m = AuthSessionMultiFactorOTP{} } -func (m *AuthSessionMultiFactorOTP) String() string { return proto.CompactTextString(m) } -func (*AuthSessionMultiFactorOTP) ProtoMessage() {} -func (*AuthSessionMultiFactorOTP) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{20} -} - -func (m *AuthSessionMultiFactorOTP) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthSessionMultiFactorOTP.Unmarshal(m, b) -} -func (m *AuthSessionMultiFactorOTP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthSessionMultiFactorOTP.Marshal(b, m, deterministic) -} -func (m *AuthSessionMultiFactorOTP) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthSessionMultiFactorOTP.Merge(m, src) -} -func (m *AuthSessionMultiFactorOTP) XXX_Size() int { - return xxx_messageInfo_AuthSessionMultiFactorOTP.Size(m) -} -func (m *AuthSessionMultiFactorOTP) XXX_DiscardUnknown() { - xxx_messageInfo_AuthSessionMultiFactorOTP.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthSessionMultiFactorOTP proto.InternalMessageInfo - -func (m *AuthSessionMultiFactorOTP) GetCode() string { - if m != nil { - return m.Code - } - return "" -} - -type NextStep struct { - Type NextStepType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.NextStepType" json:"type,omitempty"` - // Types that are valid to be assigned to Data: - // *NextStep_Login - // *NextStep_Password - // *NextStep_MfaVerify - // *NextStep_MfaPrompt - // *NextStep_ChooseUser - Data isNextStep_Data `protobuf_oneof:"data"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *NextStep) Reset() { *m = NextStep{} } -func (m *NextStep) String() string { return proto.CompactTextString(m) } -func (*NextStep) ProtoMessage() {} -func (*NextStep) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{21} -} - -func (m *NextStep) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_NextStep.Unmarshal(m, b) -} -func (m *NextStep) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_NextStep.Marshal(b, m, deterministic) -} -func (m *NextStep) XXX_Merge(src proto.Message) { - xxx_messageInfo_NextStep.Merge(m, src) -} -func (m *NextStep) XXX_Size() int { - return xxx_messageInfo_NextStep.Size(m) -} -func (m *NextStep) XXX_DiscardUnknown() { - xxx_messageInfo_NextStep.DiscardUnknown(m) -} - -var xxx_messageInfo_NextStep proto.InternalMessageInfo - -func (m *NextStep) GetType() NextStepType { - if m != nil { - return m.Type - } - return NextStepType_NEXTSTEP_UNSPECIFIED -} - -type isNextStep_Data interface { - isNextStep_Data() -} - -type NextStep_Login struct { - Login *LoginData `protobuf:"bytes,2,opt,name=login,proto3,oneof"` -} - -type NextStep_Password struct { - Password *PasswordData `protobuf:"bytes,3,opt,name=password,proto3,oneof"` -} - -type NextStep_MfaVerify struct { - MfaVerify *MfaVerifyData `protobuf:"bytes,4,opt,name=mfa_verify,json=mfaVerify,proto3,oneof"` -} - -type NextStep_MfaPrompt struct { - MfaPrompt *MfaPromptData `protobuf:"bytes,5,opt,name=mfa_prompt,json=mfaPrompt,proto3,oneof"` -} - -type NextStep_ChooseUser struct { - ChooseUser *ChooseUserData `protobuf:"bytes,6,opt,name=choose_user,json=chooseUser,proto3,oneof"` -} - -func (*NextStep_Login) isNextStep_Data() {} - -func (*NextStep_Password) isNextStep_Data() {} - -func (*NextStep_MfaVerify) isNextStep_Data() {} - -func (*NextStep_MfaPrompt) isNextStep_Data() {} - -func (*NextStep_ChooseUser) isNextStep_Data() {} - -func (m *NextStep) GetData() isNextStep_Data { - if m != nil { - return m.Data - } - return nil -} - -func (m *NextStep) GetLogin() *LoginData { - if x, ok := m.GetData().(*NextStep_Login); ok { - return x.Login - } - return nil -} - -func (m *NextStep) GetPassword() *PasswordData { - if x, ok := m.GetData().(*NextStep_Password); ok { - return x.Password - } - return nil -} - -func (m *NextStep) GetMfaVerify() *MfaVerifyData { - if x, ok := m.GetData().(*NextStep_MfaVerify); ok { - return x.MfaVerify - } - return nil -} - -func (m *NextStep) GetMfaPrompt() *MfaPromptData { - if x, ok := m.GetData().(*NextStep_MfaPrompt); ok { - return x.MfaPrompt - } - return nil -} - -func (m *NextStep) GetChooseUser() *ChooseUserData { - if x, ok := m.GetData().(*NextStep_ChooseUser); ok { - return x.ChooseUser - } - return nil -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*NextStep) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*NextStep_Login)(nil), - (*NextStep_Password)(nil), - (*NextStep_MfaVerify)(nil), - (*NextStep_MfaPrompt)(nil), - (*NextStep_ChooseUser)(nil), - } -} - -type LoginData struct { - ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *LoginData) Reset() { *m = LoginData{} } -func (m *LoginData) String() string { return proto.CompactTextString(m) } -func (*LoginData) ProtoMessage() {} -func (*LoginData) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{22} -} - -func (m *LoginData) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_LoginData.Unmarshal(m, b) -} -func (m *LoginData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_LoginData.Marshal(b, m, deterministic) -} -func (m *LoginData) XXX_Merge(src proto.Message) { - xxx_messageInfo_LoginData.Merge(m, src) -} -func (m *LoginData) XXX_Size() int { - return xxx_messageInfo_LoginData.Size(m) -} -func (m *LoginData) XXX_DiscardUnknown() { - xxx_messageInfo_LoginData.DiscardUnknown(m) -} - -var xxx_messageInfo_LoginData proto.InternalMessageInfo - -func (m *LoginData) GetErrMsg() string { - if m != nil { - return m.ErrMsg - } - return "" -} - -type PasswordData struct { - ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` - FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *PasswordData) Reset() { *m = PasswordData{} } -func (m *PasswordData) String() string { return proto.CompactTextString(m) } -func (*PasswordData) ProtoMessage() {} -func (*PasswordData) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{23} -} - -func (m *PasswordData) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_PasswordData.Unmarshal(m, b) -} -func (m *PasswordData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_PasswordData.Marshal(b, m, deterministic) -} -func (m *PasswordData) XXX_Merge(src proto.Message) { - xxx_messageInfo_PasswordData.Merge(m, src) -} -func (m *PasswordData) XXX_Size() int { - return xxx_messageInfo_PasswordData.Size(m) -} -func (m *PasswordData) XXX_DiscardUnknown() { - xxx_messageInfo_PasswordData.DiscardUnknown(m) -} - -var xxx_messageInfo_PasswordData proto.InternalMessageInfo - -func (m *PasswordData) GetErrMsg() string { - if m != nil { - return m.ErrMsg - } - return "" -} - -func (m *PasswordData) GetFailureCount() uint32 { - if m != nil { - return m.FailureCount - } - return 0 -} - -type MfaVerifyData struct { - ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` - FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` - MfaProviders []MfaType `protobuf:"varint,3,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *MfaVerifyData) Reset() { *m = MfaVerifyData{} } -func (m *MfaVerifyData) String() string { return proto.CompactTextString(m) } -func (*MfaVerifyData) ProtoMessage() {} -func (*MfaVerifyData) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{24} -} - -func (m *MfaVerifyData) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MfaVerifyData.Unmarshal(m, b) -} -func (m *MfaVerifyData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MfaVerifyData.Marshal(b, m, deterministic) -} -func (m *MfaVerifyData) XXX_Merge(src proto.Message) { - xxx_messageInfo_MfaVerifyData.Merge(m, src) -} -func (m *MfaVerifyData) XXX_Size() int { - return xxx_messageInfo_MfaVerifyData.Size(m) -} -func (m *MfaVerifyData) XXX_DiscardUnknown() { - xxx_messageInfo_MfaVerifyData.DiscardUnknown(m) -} - -var xxx_messageInfo_MfaVerifyData proto.InternalMessageInfo - -func (m *MfaVerifyData) GetErrMsg() string { - if m != nil { - return m.ErrMsg - } - return "" -} - -func (m *MfaVerifyData) GetFailureCount() uint32 { - if m != nil { - return m.FailureCount - } - return 0 -} - -func (m *MfaVerifyData) GetMfaProviders() []MfaType { - if m != nil { - return m.MfaProviders - } - return nil -} - -type MfaPromptData struct { - Required bool `protobuf:"varint,1,opt,name=required,proto3" json:"required,omitempty"` - MfaProviders []MfaType `protobuf:"varint,2,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *MfaPromptData) Reset() { *m = MfaPromptData{} } -func (m *MfaPromptData) String() string { return proto.CompactTextString(m) } -func (*MfaPromptData) ProtoMessage() {} -func (*MfaPromptData) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{25} -} - -func (m *MfaPromptData) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MfaPromptData.Unmarshal(m, b) -} -func (m *MfaPromptData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MfaPromptData.Marshal(b, m, deterministic) -} -func (m *MfaPromptData) XXX_Merge(src proto.Message) { - xxx_messageInfo_MfaPromptData.Merge(m, src) -} -func (m *MfaPromptData) XXX_Size() int { - return xxx_messageInfo_MfaPromptData.Size(m) -} -func (m *MfaPromptData) XXX_DiscardUnknown() { - xxx_messageInfo_MfaPromptData.DiscardUnknown(m) -} - -var xxx_messageInfo_MfaPromptData proto.InternalMessageInfo - -func (m *MfaPromptData) GetRequired() bool { - if m != nil { - return m.Required - } - return false -} - -func (m *MfaPromptData) GetMfaProviders() []MfaType { - if m != nil { - return m.MfaProviders - } - return nil -} - -type ChooseUserData struct { - Users []*ChooseUser `protobuf:"bytes,1,rep,name=users,proto3" json:"users,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ChooseUserData) Reset() { *m = ChooseUserData{} } -func (m *ChooseUserData) String() string { return proto.CompactTextString(m) } -func (*ChooseUserData) ProtoMessage() {} -func (*ChooseUserData) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{26} -} - -func (m *ChooseUserData) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ChooseUserData.Unmarshal(m, b) -} -func (m *ChooseUserData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ChooseUserData.Marshal(b, m, deterministic) -} -func (m *ChooseUserData) XXX_Merge(src proto.Message) { - xxx_messageInfo_ChooseUserData.Merge(m, src) -} -func (m *ChooseUserData) XXX_Size() int { - return xxx_messageInfo_ChooseUserData.Size(m) -} -func (m *ChooseUserData) XXX_DiscardUnknown() { - xxx_messageInfo_ChooseUserData.DiscardUnknown(m) -} - -var xxx_messageInfo_ChooseUserData proto.InternalMessageInfo - -func (m *ChooseUserData) GetUsers() []*ChooseUser { - if m != nil { - return m.Users - } - return nil -} - -type ChooseUser struct { - UserSessionId string `protobuf:"bytes,1,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` - UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - UserSessionState UserSessionState `protobuf:"varint,4,opt,name=user_session_state,json=userSessionState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"user_session_state,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ChooseUser) Reset() { *m = ChooseUser{} } -func (m *ChooseUser) String() string { return proto.CompactTextString(m) } -func (*ChooseUser) ProtoMessage() {} -func (*ChooseUser) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{27} -} - -func (m *ChooseUser) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ChooseUser.Unmarshal(m, b) -} -func (m *ChooseUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ChooseUser.Marshal(b, m, deterministic) -} -func (m *ChooseUser) XXX_Merge(src proto.Message) { - xxx_messageInfo_ChooseUser.Merge(m, src) -} -func (m *ChooseUser) XXX_Size() int { - return xxx_messageInfo_ChooseUser.Size(m) -} -func (m *ChooseUser) XXX_DiscardUnknown() { - xxx_messageInfo_ChooseUser.DiscardUnknown(m) -} - -var xxx_messageInfo_ChooseUser proto.InternalMessageInfo - -func (m *ChooseUser) GetUserSessionId() string { - if m != nil { - return m.UserSessionId - } - return "" -} - -func (m *ChooseUser) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -func (m *ChooseUser) GetUserName() string { - if m != nil { - return m.UserName - } - return "" -} - -func (m *ChooseUser) GetUserSessionState() UserSessionState { - if m != nil { - return m.UserSessionState - } - return UserSessionState_USERSESSIONSTATE_UNSPECIFIED -} - -type SkipMfaInitRequest struct { - UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *SkipMfaInitRequest) Reset() { *m = SkipMfaInitRequest{} } -func (m *SkipMfaInitRequest) String() string { return proto.CompactTextString(m) } -func (*SkipMfaInitRequest) ProtoMessage() {} -func (*SkipMfaInitRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{28} -} - -func (m *SkipMfaInitRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_SkipMfaInitRequest.Unmarshal(m, b) -} -func (m *SkipMfaInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_SkipMfaInitRequest.Marshal(b, m, deterministic) -} -func (m *SkipMfaInitRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_SkipMfaInitRequest.Merge(m, src) -} -func (m *SkipMfaInitRequest) XXX_Size() int { - return xxx_messageInfo_SkipMfaInitRequest.Size(m) -} -func (m *SkipMfaInitRequest) XXX_DiscardUnknown() { - xxx_messageInfo_SkipMfaInitRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_SkipMfaInitRequest proto.InternalMessageInfo - -func (m *SkipMfaInitRequest) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -type BrowserInformation struct { - UserAgent string `protobuf:"bytes,1,opt,name=user_agent,json=userAgent,proto3" json:"user_agent,omitempty"` - RemoteIp *IP `protobuf:"bytes,2,opt,name=remote_ip,json=remoteIp,proto3" json:"remote_ip,omitempty"` - AcceptLanguage string `protobuf:"bytes,3,opt,name=accept_language,json=acceptLanguage,proto3" json:"accept_language,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *BrowserInformation) Reset() { *m = BrowserInformation{} } -func (m *BrowserInformation) String() string { return proto.CompactTextString(m) } -func (*BrowserInformation) ProtoMessage() {} -func (*BrowserInformation) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{29} -} - -func (m *BrowserInformation) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_BrowserInformation.Unmarshal(m, b) -} -func (m *BrowserInformation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_BrowserInformation.Marshal(b, m, deterministic) -} -func (m *BrowserInformation) XXX_Merge(src proto.Message) { - xxx_messageInfo_BrowserInformation.Merge(m, src) -} -func (m *BrowserInformation) XXX_Size() int { - return xxx_messageInfo_BrowserInformation.Size(m) -} -func (m *BrowserInformation) XXX_DiscardUnknown() { - xxx_messageInfo_BrowserInformation.DiscardUnknown(m) -} - -var xxx_messageInfo_BrowserInformation proto.InternalMessageInfo - -func (m *BrowserInformation) GetUserAgent() string { - if m != nil { - return m.UserAgent - } - return "" -} - -func (m *BrowserInformation) GetRemoteIp() *IP { - if m != nil { - return m.RemoteIp - } - return nil -} - -func (m *BrowserInformation) GetAcceptLanguage() string { - if m != nil { - return m.AcceptLanguage - } - return "" -} - -type IP struct { - V4 string `protobuf:"bytes,1,opt,name=V4,proto3" json:"V4,omitempty"` - V6 string `protobuf:"bytes,2,opt,name=V6,proto3" json:"V6,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *IP) Reset() { *m = IP{} } -func (m *IP) String() string { return proto.CompactTextString(m) } -func (*IP) ProtoMessage() {} -func (*IP) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{30} -} - -func (m *IP) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_IP.Unmarshal(m, b) -} -func (m *IP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_IP.Marshal(b, m, deterministic) -} -func (m *IP) XXX_Merge(src proto.Message) { - xxx_messageInfo_IP.Merge(m, src) -} -func (m *IP) XXX_Size() int { - return xxx_messageInfo_IP.Size(m) -} -func (m *IP) XXX_DiscardUnknown() { - xxx_messageInfo_IP.DiscardUnknown(m) -} - -var xxx_messageInfo_IP proto.InternalMessageInfo - -func (m *IP) GetV4() string { - if m != nil { - return m.V4 - } - return "" -} - -func (m *IP) GetV6() string { - if m != nil { - return m.V6 - } - return "" -} - -type AuthRequestOIDC struct { - Scope []string `protobuf:"bytes,1,rep,name=scope,proto3" json:"scope,omitempty"` - ResponseType OIDCResponseType `protobuf:"varint,2,opt,name=response_type,json=responseType,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_type,omitempty"` - Nonce string `protobuf:"bytes,3,opt,name=nonce,proto3" json:"nonce,omitempty"` - CodeChallenge *CodeChallenge `protobuf:"bytes,4,opt,name=code_challenge,json=codeChallenge,proto3" json:"code_challenge,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *AuthRequestOIDC) Reset() { *m = AuthRequestOIDC{} } -func (m *AuthRequestOIDC) String() string { return proto.CompactTextString(m) } -func (*AuthRequestOIDC) ProtoMessage() {} -func (*AuthRequestOIDC) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{31} -} - -func (m *AuthRequestOIDC) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_AuthRequestOIDC.Unmarshal(m, b) -} -func (m *AuthRequestOIDC) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_AuthRequestOIDC.Marshal(b, m, deterministic) -} -func (m *AuthRequestOIDC) XXX_Merge(src proto.Message) { - xxx_messageInfo_AuthRequestOIDC.Merge(m, src) -} -func (m *AuthRequestOIDC) XXX_Size() int { - return xxx_messageInfo_AuthRequestOIDC.Size(m) -} -func (m *AuthRequestOIDC) XXX_DiscardUnknown() { - xxx_messageInfo_AuthRequestOIDC.DiscardUnknown(m) -} - -var xxx_messageInfo_AuthRequestOIDC proto.InternalMessageInfo - -func (m *AuthRequestOIDC) GetScope() []string { - if m != nil { - return m.Scope - } - return nil -} - -func (m *AuthRequestOIDC) GetResponseType() OIDCResponseType { - if m != nil { - return m.ResponseType - } - return OIDCResponseType_OIDCRESPONSETYPE_CODE -} - -func (m *AuthRequestOIDC) GetNonce() string { - if m != nil { - return m.Nonce - } - return "" -} - -func (m *AuthRequestOIDC) GetCodeChallenge() *CodeChallenge { - if m != nil { - return m.CodeChallenge - } - return nil -} - -type CodeChallenge struct { - Challenge string `protobuf:"bytes,1,opt,name=challenge,proto3" json:"challenge,omitempty"` - Method CodeChallengeMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.CodeChallengeMethod" json:"method,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *CodeChallenge) Reset() { *m = CodeChallenge{} } -func (m *CodeChallenge) String() string { return proto.CompactTextString(m) } -func (*CodeChallenge) ProtoMessage() {} -func (*CodeChallenge) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{32} -} - -func (m *CodeChallenge) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_CodeChallenge.Unmarshal(m, b) -} -func (m *CodeChallenge) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_CodeChallenge.Marshal(b, m, deterministic) -} -func (m *CodeChallenge) XXX_Merge(src proto.Message) { - xxx_messageInfo_CodeChallenge.Merge(m, src) -} -func (m *CodeChallenge) XXX_Size() int { - return xxx_messageInfo_CodeChallenge.Size(m) -} -func (m *CodeChallenge) XXX_DiscardUnknown() { - xxx_messageInfo_CodeChallenge.DiscardUnknown(m) -} - -var xxx_messageInfo_CodeChallenge proto.InternalMessageInfo - -func (m *CodeChallenge) GetChallenge() string { - if m != nil { - return m.Challenge - } - return "" -} - -func (m *CodeChallenge) GetMethod() CodeChallengeMethod { - if m != nil { - return m.Method - } - return CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN -} - type UserID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` } -func (m *UserID) Reset() { *m = UserID{} } -func (m *UserID) String() string { return proto.CompactTextString(m) } -func (*UserID) ProtoMessage() {} +func (x *UserID) Reset() { + *x = UserID{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[2] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserID) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserID) ProtoMessage() {} + +func (x *UserID) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[2] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserID.ProtoReflect.Descriptor instead. func (*UserID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{33} + return file_auth_proto_rawDescGZIP(), []int{2} } -func (m *UserID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserID.Unmarshal(m, b) -} -func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserID.Marshal(b, m, deterministic) -} -func (m *UserID) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserID.Merge(m, src) -} -func (m *UserID) XXX_Size() int { - return xxx_messageInfo_UserID.Size(m) -} -func (m *UserID) XXX_DiscardUnknown() { - xxx_messageInfo_UserID.DiscardUnknown(m) -} - -var xxx_messageInfo_UserID proto.InternalMessageInfo - -func (m *UserID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -type UniqueUserRequest struct { - UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } -func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } -func (*UniqueUserRequest) ProtoMessage() {} -func (*UniqueUserRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{34} -} - -func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) -} -func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) -} -func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_UniqueUserRequest.Merge(m, src) -} -func (m *UniqueUserRequest) XXX_Size() int { - return xxx_messageInfo_UniqueUserRequest.Size(m) -} -func (m *UniqueUserRequest) XXX_DiscardUnknown() { - xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo - -func (m *UniqueUserRequest) GetUserName() string { - if m != nil { - return m.UserName - } - return "" -} - -func (m *UniqueUserRequest) GetEmail() string { - if m != nil { - return m.Email - } - return "" -} - -type UniqueUserResponse struct { - IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } -func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } -func (*UniqueUserResponse) ProtoMessage() {} -func (*UniqueUserResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{35} -} - -func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) -} -func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) -} -func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_UniqueUserResponse.Merge(m, src) -} -func (m *UniqueUserResponse) XXX_Size() int { - return xxx_messageInfo_UniqueUserResponse.Size(m) -} -func (m *UniqueUserResponse) XXX_DiscardUnknown() { - xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo - -func (m *UniqueUserResponse) GetIsUnique() bool { - if m != nil { - return m.IsUnique - } - return false -} - -type RegisterUserRequest struct { - Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` - FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` - LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` - NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` - DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` - PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` - Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` - Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` - OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } -func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } -func (*RegisterUserRequest) ProtoMessage() {} -func (*RegisterUserRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{36} -} - -func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) -} -func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) -} -func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_RegisterUserRequest.Merge(m, src) -} -func (m *RegisterUserRequest) XXX_Size() int { - return xxx_messageInfo_RegisterUserRequest.Size(m) -} -func (m *RegisterUserRequest) XXX_DiscardUnknown() { - xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo - -func (m *RegisterUserRequest) GetEmail() string { - if m != nil { - return m.Email - } - return "" -} - -func (m *RegisterUserRequest) GetFirstName() string { - if m != nil { - return m.FirstName - } - return "" -} - -func (m *RegisterUserRequest) GetLastName() string { - if m != nil { - return m.LastName - } - return "" -} - -func (m *RegisterUserRequest) GetNickName() string { - if m != nil { - return m.NickName - } - return "" -} - -func (m *RegisterUserRequest) GetDisplayName() string { - if m != nil { - return m.DisplayName - } - return "" -} - -func (m *RegisterUserRequest) GetPreferredLanguage() string { - if m != nil { - return m.PreferredLanguage - } - return "" -} - -func (m *RegisterUserRequest) GetGender() Gender { - if m != nil { - return m.Gender - } - return Gender_GENDER_UNSPECIFIED -} - -func (m *RegisterUserRequest) GetPassword() string { - if m != nil { - return m.Password - } - return "" -} - -func (m *RegisterUserRequest) GetOrgId() string { - if m != nil { - return m.OrgId - } - return "" -} - -type RegisterUserExternalIDPRequest struct { - Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` - FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` - LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` - NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` - DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` - PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` - Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` - IdpProvider *IDPProvider `protobuf:"bytes,8,opt,name=idp_provider,json=idpProvider,proto3" json:"idp_provider,omitempty"` - OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *RegisterUserExternalIDPRequest) Reset() { *m = RegisterUserExternalIDPRequest{} } -func (m *RegisterUserExternalIDPRequest) String() string { return proto.CompactTextString(m) } -func (*RegisterUserExternalIDPRequest) ProtoMessage() {} -func (*RegisterUserExternalIDPRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{37} -} - -func (m *RegisterUserExternalIDPRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_RegisterUserExternalIDPRequest.Unmarshal(m, b) -} -func (m *RegisterUserExternalIDPRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_RegisterUserExternalIDPRequest.Marshal(b, m, deterministic) -} -func (m *RegisterUserExternalIDPRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_RegisterUserExternalIDPRequest.Merge(m, src) -} -func (m *RegisterUserExternalIDPRequest) XXX_Size() int { - return xxx_messageInfo_RegisterUserExternalIDPRequest.Size(m) -} -func (m *RegisterUserExternalIDPRequest) XXX_DiscardUnknown() { - xxx_messageInfo_RegisterUserExternalIDPRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_RegisterUserExternalIDPRequest proto.InternalMessageInfo - -func (m *RegisterUserExternalIDPRequest) GetEmail() string { - if m != nil { - return m.Email - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetFirstName() string { - if m != nil { - return m.FirstName - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetLastName() string { - if m != nil { - return m.LastName - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetNickName() string { - if m != nil { - return m.NickName - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetDisplayName() string { - if m != nil { - return m.DisplayName - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetPreferredLanguage() string { - if m != nil { - return m.PreferredLanguage - } - return "" -} - -func (m *RegisterUserExternalIDPRequest) GetGender() Gender { - if m != nil { - return m.Gender - } - return Gender_GENDER_UNSPECIFIED -} - -func (m *RegisterUserExternalIDPRequest) GetIdpProvider() *IDPProvider { - if m != nil { - return m.IdpProvider - } - return nil -} - -func (m *RegisterUserExternalIDPRequest) GetOrgId() string { - if m != nil { - return m.OrgId - } - return "" -} - -type IDPProvider struct { - Provider string `protobuf:"bytes,8,opt,name=provider,proto3" json:"provider,omitempty"` - ExternalIdpID string `protobuf:"bytes,9,opt,name=externalIdpID,proto3" json:"externalIdpID,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *IDPProvider) Reset() { *m = IDPProvider{} } -func (m *IDPProvider) String() string { return proto.CompactTextString(m) } -func (*IDPProvider) ProtoMessage() {} -func (*IDPProvider) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{38} -} - -func (m *IDPProvider) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_IDPProvider.Unmarshal(m, b) -} -func (m *IDPProvider) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_IDPProvider.Marshal(b, m, deterministic) -} -func (m *IDPProvider) XXX_Merge(src proto.Message) { - xxx_messageInfo_IDPProvider.Merge(m, src) -} -func (m *IDPProvider) XXX_Size() int { - return xxx_messageInfo_IDPProvider.Size(m) -} -func (m *IDPProvider) XXX_DiscardUnknown() { - xxx_messageInfo_IDPProvider.DiscardUnknown(m) -} - -var xxx_messageInfo_IDPProvider proto.InternalMessageInfo - -func (m *IDPProvider) GetProvider() string { - if m != nil { - return m.Provider - } - return "" -} - -func (m *IDPProvider) GetExternalIdpID() string { - if m != nil { - return m.ExternalIdpID +func (x *UserID) GetId() string { + if x != nil { + return x.Id } return "" } type User struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserState" json:"state,omitempty"` CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` @@ -3143,3056 +645,2774 @@ type User struct { Region string `protobuf:"bytes,22,opt,name=region,proto3" json:"region,omitempty"` StreetAddress string `protobuf:"bytes,23,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` PasswordChangeRequired bool `protobuf:"varint,24,opt,name=password_change_required,json=passwordChangeRequired,proto3" json:"password_change_required,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` } -func (m *User) Reset() { *m = User{} } -func (m *User) String() string { return proto.CompactTextString(m) } -func (*User) ProtoMessage() {} +func (x *User) Reset() { + *x = User{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[3] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *User) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*User) ProtoMessage() {} + +func (x *User) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[3] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use User.ProtoReflect.Descriptor instead. func (*User) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{39} + return file_auth_proto_rawDescGZIP(), []int{3} } -func (m *User) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_User.Unmarshal(m, b) -} -func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_User.Marshal(b, m, deterministic) -} -func (m *User) XXX_Merge(src proto.Message) { - xxx_messageInfo_User.Merge(m, src) -} -func (m *User) XXX_Size() int { - return xxx_messageInfo_User.Size(m) -} -func (m *User) XXX_DiscardUnknown() { - xxx_messageInfo_User.DiscardUnknown(m) -} - -var xxx_messageInfo_User proto.InternalMessageInfo - -func (m *User) GetId() string { - if m != nil { - return m.Id +func (x *User) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *User) GetState() UserState { - if m != nil { - return m.State +func (x *User) GetState() UserState { + if x != nil { + return x.State } return UserState_USERSTATE_UNSPECIEFIED } -func (m *User) GetCreationDate() *timestamp.Timestamp { - if m != nil { - return m.CreationDate +func (x *User) GetCreationDate() *timestamp.Timestamp { + if x != nil { + return x.CreationDate } return nil } -func (m *User) GetActivationDate() *timestamp.Timestamp { - if m != nil { - return m.ActivationDate +func (x *User) GetActivationDate() *timestamp.Timestamp { + if x != nil { + return x.ActivationDate } return nil } -func (m *User) GetChangeDate() *timestamp.Timestamp { - if m != nil { - return m.ChangeDate +func (x *User) GetChangeDate() *timestamp.Timestamp { + if x != nil { + return x.ChangeDate } return nil } -func (m *User) GetLastLogin() *timestamp.Timestamp { - if m != nil { - return m.LastLogin +func (x *User) GetLastLogin() *timestamp.Timestamp { + if x != nil { + return x.LastLogin } return nil } -func (m *User) GetPasswordChanged() *timestamp.Timestamp { - if m != nil { - return m.PasswordChanged +func (x *User) GetPasswordChanged() *timestamp.Timestamp { + if x != nil { + return x.PasswordChanged } return nil } -func (m *User) GetUserName() string { - if m != nil { - return m.UserName +func (x *User) GetUserName() string { + if x != nil { + return x.UserName } return "" } -func (m *User) GetFirstName() string { - if m != nil { - return m.FirstName +func (x *User) GetFirstName() string { + if x != nil { + return x.FirstName } return "" } -func (m *User) GetLastName() string { - if m != nil { - return m.LastName +func (x *User) GetLastName() string { + if x != nil { + return x.LastName } return "" } -func (m *User) GetNickName() string { - if m != nil { - return m.NickName +func (x *User) GetNickName() string { + if x != nil { + return x.NickName } return "" } -func (m *User) GetDisplayName() string { - if m != nil { - return m.DisplayName +func (x *User) GetDisplayName() string { + if x != nil { + return x.DisplayName } return "" } -func (m *User) GetPreferredLanguage() string { - if m != nil { - return m.PreferredLanguage +func (x *User) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage } return "" } -func (m *User) GetGender() Gender { - if m != nil { - return m.Gender +func (x *User) GetGender() Gender { + if x != nil { + return x.Gender } return Gender_GENDER_UNSPECIFIED } -func (m *User) GetEmail() string { - if m != nil { - return m.Email +func (x *User) GetEmail() string { + if x != nil { + return x.Email } return "" } -func (m *User) GetIsEmailVerified() bool { - if m != nil { - return m.IsEmailVerified +func (x *User) GetIsEmailVerified() bool { + if x != nil { + return x.IsEmailVerified } return false } -func (m *User) GetPhone() string { - if m != nil { - return m.Phone +func (x *User) GetPhone() string { + if x != nil { + return x.Phone } return "" } -func (m *User) GetIsPhoneVerified() bool { - if m != nil { - return m.IsPhoneVerified +func (x *User) GetIsPhoneVerified() bool { + if x != nil { + return x.IsPhoneVerified } return false } -func (m *User) GetCountry() string { - if m != nil { - return m.Country +func (x *User) GetCountry() string { + if x != nil { + return x.Country } return "" } -func (m *User) GetLocality() string { - if m != nil { - return m.Locality +func (x *User) GetLocality() string { + if x != nil { + return x.Locality } return "" } -func (m *User) GetPostalCode() string { - if m != nil { - return m.PostalCode +func (x *User) GetPostalCode() string { + if x != nil { + return x.PostalCode } return "" } -func (m *User) GetRegion() string { - if m != nil { - return m.Region +func (x *User) GetRegion() string { + if x != nil { + return x.Region } return "" } -func (m *User) GetStreetAddress() string { - if m != nil { - return m.StreetAddress +func (x *User) GetStreetAddress() string { + if x != nil { + return x.StreetAddress } return "" } -func (m *User) GetPasswordChangeRequired() bool { - if m != nil { - return m.PasswordChangeRequired +func (x *User) GetPasswordChangeRequired() bool { + if x != nil { + return x.PasswordChangeRequired } return false } type UserProfile struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` - LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` - NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` - DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` - PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` - Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` } -func (m *UserProfile) Reset() { *m = UserProfile{} } -func (m *UserProfile) String() string { return proto.CompactTextString(m) } -func (*UserProfile) ProtoMessage() {} +func (x *UserProfile) Reset() { + *x = UserProfile{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[4] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserProfile) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserProfile) ProtoMessage() {} + +func (x *UserProfile) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[4] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserProfile.ProtoReflect.Descriptor instead. func (*UserProfile) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{40} + return file_auth_proto_rawDescGZIP(), []int{4} } -func (m *UserProfile) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserProfile.Unmarshal(m, b) -} -func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) -} -func (m *UserProfile) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserProfile.Merge(m, src) -} -func (m *UserProfile) XXX_Size() int { - return xxx_messageInfo_UserProfile.Size(m) -} -func (m *UserProfile) XXX_DiscardUnknown() { - xxx_messageInfo_UserProfile.DiscardUnknown(m) -} - -var xxx_messageInfo_UserProfile proto.InternalMessageInfo - -func (m *UserProfile) GetId() string { - if m != nil { - return m.Id +func (x *UserProfile) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *UserProfile) GetUserName() string { - if m != nil { - return m.UserName +func (x *UserProfile) GetUserName() string { + if x != nil { + return x.UserName } return "" } -func (m *UserProfile) GetFirstName() string { - if m != nil { - return m.FirstName +func (x *UserProfile) GetFirstName() string { + if x != nil { + return x.FirstName } return "" } -func (m *UserProfile) GetLastName() string { - if m != nil { - return m.LastName +func (x *UserProfile) GetLastName() string { + if x != nil { + return x.LastName } return "" } -func (m *UserProfile) GetNickName() string { - if m != nil { - return m.NickName +func (x *UserProfile) GetNickName() string { + if x != nil { + return x.NickName } return "" } -func (m *UserProfile) GetDisplayName() string { - if m != nil { - return m.DisplayName +func (x *UserProfile) GetDisplayName() string { + if x != nil { + return x.DisplayName } return "" } -func (m *UserProfile) GetPreferredLanguage() string { - if m != nil { - return m.PreferredLanguage +func (x *UserProfile) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage } return "" } -func (m *UserProfile) GetGender() Gender { - if m != nil { - return m.Gender +func (x *UserProfile) GetGender() Gender { + if x != nil { + return x.Gender } return Gender_GENDER_UNSPECIFIED } type UpdateUserProfileRequest struct { - FirstName string `protobuf:"bytes,1,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` - LastName string `protobuf:"bytes,2,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` - NickName string `protobuf:"bytes,3,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` - DisplayName string `protobuf:"bytes,4,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` - PreferredLanguage string `protobuf:"bytes,5,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` - Gender Gender `protobuf:"varint,6,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + FirstName string `protobuf:"bytes,1,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,2,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,3,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,4,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,5,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,6,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` } -func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } -func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } -func (*UpdateUserProfileRequest) ProtoMessage() {} +func (x *UpdateUserProfileRequest) Reset() { + *x = UpdateUserProfileRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[5] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserProfileRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserProfileRequest) ProtoMessage() {} + +func (x *UpdateUserProfileRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[5] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserProfileRequest.ProtoReflect.Descriptor instead. func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{41} + return file_auth_proto_rawDescGZIP(), []int{5} } -func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) -} -func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) -} -func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) -} -func (m *UpdateUserProfileRequest) XXX_Size() int { - return xxx_messageInfo_UpdateUserProfileRequest.Size(m) -} -func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { - xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo - -func (m *UpdateUserProfileRequest) GetFirstName() string { - if m != nil { - return m.FirstName +func (x *UpdateUserProfileRequest) GetFirstName() string { + if x != nil { + return x.FirstName } return "" } -func (m *UpdateUserProfileRequest) GetLastName() string { - if m != nil { - return m.LastName +func (x *UpdateUserProfileRequest) GetLastName() string { + if x != nil { + return x.LastName } return "" } -func (m *UpdateUserProfileRequest) GetNickName() string { - if m != nil { - return m.NickName +func (x *UpdateUserProfileRequest) GetNickName() string { + if x != nil { + return x.NickName } return "" } -func (m *UpdateUserProfileRequest) GetDisplayName() string { - if m != nil { - return m.DisplayName +func (x *UpdateUserProfileRequest) GetDisplayName() string { + if x != nil { + return x.DisplayName } return "" } -func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { - if m != nil { - return m.PreferredLanguage +func (x *UpdateUserProfileRequest) GetPreferredLanguage() string { + if x != nil { + return x.PreferredLanguage } return "" } -func (m *UpdateUserProfileRequest) GetGender() Gender { - if m != nil { - return m.Gender +func (x *UpdateUserProfileRequest) GetGender() Gender { + if x != nil { + return x.Gender } return Gender_GENDER_UNSPECIFIED } type UserEmail struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` - IsEmailVerified bool `protobuf:"varint,3,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` } -func (m *UserEmail) Reset() { *m = UserEmail{} } -func (m *UserEmail) String() string { return proto.CompactTextString(m) } -func (*UserEmail) ProtoMessage() {} +func (x *UserEmail) Reset() { + *x = UserEmail{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[6] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserEmail) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserEmail) ProtoMessage() {} + +func (x *UserEmail) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[6] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserEmail.ProtoReflect.Descriptor instead. func (*UserEmail) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{42} + return file_auth_proto_rawDescGZIP(), []int{6} } -func (m *UserEmail) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserEmail.Unmarshal(m, b) -} -func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) -} -func (m *UserEmail) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserEmail.Merge(m, src) -} -func (m *UserEmail) XXX_Size() int { - return xxx_messageInfo_UserEmail.Size(m) -} -func (m *UserEmail) XXX_DiscardUnknown() { - xxx_messageInfo_UserEmail.DiscardUnknown(m) -} - -var xxx_messageInfo_UserEmail proto.InternalMessageInfo - -func (m *UserEmail) GetId() string { - if m != nil { - return m.Id +func (x *UserEmail) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *UserEmail) GetEmail() string { - if m != nil { - return m.Email +func (x *UserEmail) GetEmail() string { + if x != nil { + return x.Email } return "" } -func (m *UserEmail) GetIsEmailVerified() bool { - if m != nil { - return m.IsEmailVerified +func (x *UserEmail) GetIsEmailVerified() bool { + if x != nil { + return x.IsEmailVerified } return false } type VerifyMyUserEmailRequest struct { - Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` } -func (m *VerifyMyUserEmailRequest) Reset() { *m = VerifyMyUserEmailRequest{} } -func (m *VerifyMyUserEmailRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyMyUserEmailRequest) ProtoMessage() {} +func (x *VerifyMyUserEmailRequest) Reset() { + *x = VerifyMyUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[7] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyMyUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyMyUserEmailRequest) ProtoMessage() {} + +func (x *VerifyMyUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[7] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyMyUserEmailRequest.ProtoReflect.Descriptor instead. func (*VerifyMyUserEmailRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{43} + return file_auth_proto_rawDescGZIP(), []int{7} } -func (m *VerifyMyUserEmailRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyMyUserEmailRequest.Unmarshal(m, b) -} -func (m *VerifyMyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyMyUserEmailRequest.Marshal(b, m, deterministic) -} -func (m *VerifyMyUserEmailRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyMyUserEmailRequest.Merge(m, src) -} -func (m *VerifyMyUserEmailRequest) XXX_Size() int { - return xxx_messageInfo_VerifyMyUserEmailRequest.Size(m) -} -func (m *VerifyMyUserEmailRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyMyUserEmailRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyMyUserEmailRequest proto.InternalMessageInfo - -func (m *VerifyMyUserEmailRequest) GetCode() string { - if m != nil { - return m.Code +func (x *VerifyMyUserEmailRequest) GetCode() string { + if x != nil { + return x.Code } return "" } type VerifyUserEmailRequest struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` } -func (m *VerifyUserEmailRequest) Reset() { *m = VerifyUserEmailRequest{} } -func (m *VerifyUserEmailRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyUserEmailRequest) ProtoMessage() {} +func (x *VerifyUserEmailRequest) Reset() { + *x = VerifyUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[8] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyUserEmailRequest) ProtoMessage() {} + +func (x *VerifyUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[8] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyUserEmailRequest.ProtoReflect.Descriptor instead. func (*VerifyUserEmailRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{44} + return file_auth_proto_rawDescGZIP(), []int{8} } -func (m *VerifyUserEmailRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyUserEmailRequest.Unmarshal(m, b) -} -func (m *VerifyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyUserEmailRequest.Marshal(b, m, deterministic) -} -func (m *VerifyUserEmailRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyUserEmailRequest.Merge(m, src) -} -func (m *VerifyUserEmailRequest) XXX_Size() int { - return xxx_messageInfo_VerifyUserEmailRequest.Size(m) -} -func (m *VerifyUserEmailRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyUserEmailRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyUserEmailRequest proto.InternalMessageInfo - -func (m *VerifyUserEmailRequest) GetId() string { - if m != nil { - return m.Id +func (x *VerifyUserEmailRequest) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *VerifyUserEmailRequest) GetCode() string { - if m != nil { - return m.Code +func (x *VerifyUserEmailRequest) GetCode() string { + if x != nil { + return x.Code } return "" } type UpdateUserEmailRequest struct { - Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` } -func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } -func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } -func (*UpdateUserEmailRequest) ProtoMessage() {} +func (x *UpdateUserEmailRequest) Reset() { + *x = UpdateUserEmailRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[9] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserEmailRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserEmailRequest) ProtoMessage() {} + +func (x *UpdateUserEmailRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[9] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserEmailRequest.ProtoReflect.Descriptor instead. func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{45} + return file_auth_proto_rawDescGZIP(), []int{9} } -func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) -} -func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) -} -func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) -} -func (m *UpdateUserEmailRequest) XXX_Size() int { - return xxx_messageInfo_UpdateUserEmailRequest.Size(m) -} -func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { - xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo - -func (m *UpdateUserEmailRequest) GetEmail() string { - if m != nil { - return m.Email +func (x *UpdateUserEmailRequest) GetEmail() string { + if x != nil { + return x.Email } return "" } type UserPhone struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` - IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` } -func (m *UserPhone) Reset() { *m = UserPhone{} } -func (m *UserPhone) String() string { return proto.CompactTextString(m) } -func (*UserPhone) ProtoMessage() {} +func (x *UserPhone) Reset() { + *x = UserPhone{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[10] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserPhone) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserPhone) ProtoMessage() {} + +func (x *UserPhone) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[10] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserPhone.ProtoReflect.Descriptor instead. func (*UserPhone) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{46} + return file_auth_proto_rawDescGZIP(), []int{10} } -func (m *UserPhone) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserPhone.Unmarshal(m, b) -} -func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) -} -func (m *UserPhone) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserPhone.Merge(m, src) -} -func (m *UserPhone) XXX_Size() int { - return xxx_messageInfo_UserPhone.Size(m) -} -func (m *UserPhone) XXX_DiscardUnknown() { - xxx_messageInfo_UserPhone.DiscardUnknown(m) -} - -var xxx_messageInfo_UserPhone proto.InternalMessageInfo - -func (m *UserPhone) GetId() string { - if m != nil { - return m.Id +func (x *UserPhone) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *UserPhone) GetPhone() string { - if m != nil { - return m.Phone +func (x *UserPhone) GetPhone() string { + if x != nil { + return x.Phone } return "" } -func (m *UserPhone) GetIsPhoneVerified() bool { - if m != nil { - return m.IsPhoneVerified +func (x *UserPhone) GetIsPhoneVerified() bool { + if x != nil { + return x.IsPhoneVerified } return false } type UpdateUserPhoneRequest struct { - Phone string `protobuf:"bytes,1,opt,name=phone,proto3" json:"phone,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Phone string `protobuf:"bytes,1,opt,name=phone,proto3" json:"phone,omitempty"` } -func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } -func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } -func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (x *UpdateUserPhoneRequest) Reset() { + *x = UpdateUserPhoneRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[11] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserPhoneRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserPhoneRequest) ProtoMessage() {} + +func (x *UpdateUserPhoneRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[11] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserPhoneRequest.ProtoReflect.Descriptor instead. func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{47} + return file_auth_proto_rawDescGZIP(), []int{11} } -func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) -} -func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) -} -func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) -} -func (m *UpdateUserPhoneRequest) XXX_Size() int { - return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) -} -func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { - xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo - -func (m *UpdateUserPhoneRequest) GetPhone() string { - if m != nil { - return m.Phone +func (x *UpdateUserPhoneRequest) GetPhone() string { + if x != nil { + return x.Phone } return "" } type VerifyUserPhoneRequest struct { - Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` } -func (m *VerifyUserPhoneRequest) Reset() { *m = VerifyUserPhoneRequest{} } -func (m *VerifyUserPhoneRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyUserPhoneRequest) ProtoMessage() {} +func (x *VerifyUserPhoneRequest) Reset() { + *x = VerifyUserPhoneRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[12] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyUserPhoneRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyUserPhoneRequest) ProtoMessage() {} + +func (x *VerifyUserPhoneRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[12] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyUserPhoneRequest.ProtoReflect.Descriptor instead. func (*VerifyUserPhoneRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{48} + return file_auth_proto_rawDescGZIP(), []int{12} } -func (m *VerifyUserPhoneRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyUserPhoneRequest.Unmarshal(m, b) -} -func (m *VerifyUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyUserPhoneRequest.Marshal(b, m, deterministic) -} -func (m *VerifyUserPhoneRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyUserPhoneRequest.Merge(m, src) -} -func (m *VerifyUserPhoneRequest) XXX_Size() int { - return xxx_messageInfo_VerifyUserPhoneRequest.Size(m) -} -func (m *VerifyUserPhoneRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyUserPhoneRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyUserPhoneRequest proto.InternalMessageInfo - -func (m *VerifyUserPhoneRequest) GetCode() string { - if m != nil { - return m.Code +func (x *VerifyUserPhoneRequest) GetCode() string { + if x != nil { + return x.Code } return "" } type UserAddress struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` - Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` - PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` - Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` - StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` } -func (m *UserAddress) Reset() { *m = UserAddress{} } -func (m *UserAddress) String() string { return proto.CompactTextString(m) } -func (*UserAddress) ProtoMessage() {} +func (x *UserAddress) Reset() { + *x = UserAddress{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[13] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UserAddress) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UserAddress) ProtoMessage() {} + +func (x *UserAddress) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[13] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UserAddress.ProtoReflect.Descriptor instead. func (*UserAddress) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{49} + return file_auth_proto_rawDescGZIP(), []int{13} } -func (m *UserAddress) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UserAddress.Unmarshal(m, b) -} -func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) -} -func (m *UserAddress) XXX_Merge(src proto.Message) { - xxx_messageInfo_UserAddress.Merge(m, src) -} -func (m *UserAddress) XXX_Size() int { - return xxx_messageInfo_UserAddress.Size(m) -} -func (m *UserAddress) XXX_DiscardUnknown() { - xxx_messageInfo_UserAddress.DiscardUnknown(m) -} - -var xxx_messageInfo_UserAddress proto.InternalMessageInfo - -func (m *UserAddress) GetId() string { - if m != nil { - return m.Id +func (x *UserAddress) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *UserAddress) GetCountry() string { - if m != nil { - return m.Country +func (x *UserAddress) GetCountry() string { + if x != nil { + return x.Country } return "" } -func (m *UserAddress) GetLocality() string { - if m != nil { - return m.Locality +func (x *UserAddress) GetLocality() string { + if x != nil { + return x.Locality } return "" } -func (m *UserAddress) GetPostalCode() string { - if m != nil { - return m.PostalCode +func (x *UserAddress) GetPostalCode() string { + if x != nil { + return x.PostalCode } return "" } -func (m *UserAddress) GetRegion() string { - if m != nil { - return m.Region +func (x *UserAddress) GetRegion() string { + if x != nil { + return x.Region } return "" } -func (m *UserAddress) GetStreetAddress() string { - if m != nil { - return m.StreetAddress +func (x *UserAddress) GetStreetAddress() string { + if x != nil { + return x.StreetAddress } return "" } type UpdateUserAddressRequest struct { - Country string `protobuf:"bytes,1,opt,name=country,proto3" json:"country,omitempty"` - Locality string `protobuf:"bytes,2,opt,name=locality,proto3" json:"locality,omitempty"` - PostalCode string `protobuf:"bytes,3,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` - Region string `protobuf:"bytes,4,opt,name=region,proto3" json:"region,omitempty"` - StreetAddress string `protobuf:"bytes,5,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Country string `protobuf:"bytes,1,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,2,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,3,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,4,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,5,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` } -func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } -func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } -func (*UpdateUserAddressRequest) ProtoMessage() {} +func (x *UpdateUserAddressRequest) Reset() { + *x = UpdateUserAddressRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[14] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *UpdateUserAddressRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*UpdateUserAddressRequest) ProtoMessage() {} + +func (x *UpdateUserAddressRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[14] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use UpdateUserAddressRequest.ProtoReflect.Descriptor instead. func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{50} + return file_auth_proto_rawDescGZIP(), []int{14} } -func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) -} -func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) -} -func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) -} -func (m *UpdateUserAddressRequest) XXX_Size() int { - return xxx_messageInfo_UpdateUserAddressRequest.Size(m) -} -func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { - xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo - -func (m *UpdateUserAddressRequest) GetCountry() string { - if m != nil { - return m.Country +func (x *UpdateUserAddressRequest) GetCountry() string { + if x != nil { + return x.Country } return "" } -func (m *UpdateUserAddressRequest) GetLocality() string { - if m != nil { - return m.Locality +func (x *UpdateUserAddressRequest) GetLocality() string { + if x != nil { + return x.Locality } return "" } -func (m *UpdateUserAddressRequest) GetPostalCode() string { - if m != nil { - return m.PostalCode +func (x *UpdateUserAddressRequest) GetPostalCode() string { + if x != nil { + return x.PostalCode } return "" } -func (m *UpdateUserAddressRequest) GetRegion() string { - if m != nil { - return m.Region +func (x *UpdateUserAddressRequest) GetRegion() string { + if x != nil { + return x.Region } return "" } -func (m *UpdateUserAddressRequest) GetStreetAddress() string { - if m != nil { - return m.StreetAddress +func (x *UpdateUserAddressRequest) GetStreetAddress() string { + if x != nil { + return x.StreetAddress } return "" } type PasswordID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` } -func (m *PasswordID) Reset() { *m = PasswordID{} } -func (m *PasswordID) String() string { return proto.CompactTextString(m) } -func (*PasswordID) ProtoMessage() {} +func (x *PasswordID) Reset() { + *x = PasswordID{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[15] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordID) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordID) ProtoMessage() {} + +func (x *PasswordID) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[15] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordID.ProtoReflect.Descriptor instead. func (*PasswordID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{51} + return file_auth_proto_rawDescGZIP(), []int{15} } -func (m *PasswordID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_PasswordID.Unmarshal(m, b) -} -func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) -} -func (m *PasswordID) XXX_Merge(src proto.Message) { - xxx_messageInfo_PasswordID.Merge(m, src) -} -func (m *PasswordID) XXX_Size() int { - return xxx_messageInfo_PasswordID.Size(m) -} -func (m *PasswordID) XXX_DiscardUnknown() { - xxx_messageInfo_PasswordID.DiscardUnknown(m) -} - -var xxx_messageInfo_PasswordID proto.InternalMessageInfo - -func (m *PasswordID) GetId() string { - if m != nil { - return m.Id +func (x *PasswordID) GetId() string { + if x != nil { + return x.Id } return "" } type PasswordRequest struct { - Password string `protobuf:"bytes,1,opt,name=password,proto3" json:"password,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Password string `protobuf:"bytes,1,opt,name=password,proto3" json:"password,omitempty"` } -func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } -func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } -func (*PasswordRequest) ProtoMessage() {} +func (x *PasswordRequest) Reset() { + *x = PasswordRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[16] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordRequest) ProtoMessage() {} + +func (x *PasswordRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[16] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordRequest.ProtoReflect.Descriptor instead. func (*PasswordRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{52} + return file_auth_proto_rawDescGZIP(), []int{16} } -func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) -} -func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) -} -func (m *PasswordRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_PasswordRequest.Merge(m, src) -} -func (m *PasswordRequest) XXX_Size() int { - return xxx_messageInfo_PasswordRequest.Size(m) -} -func (m *PasswordRequest) XXX_DiscardUnknown() { - xxx_messageInfo_PasswordRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo - -func (m *PasswordRequest) GetPassword() string { - if m != nil { - return m.Password +func (x *PasswordRequest) GetPassword() string { + if x != nil { + return x.Password } return "" } -type ResetPasswordRequest struct { - UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` - Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } -func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } -func (*ResetPasswordRequest) ProtoMessage() {} -func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{53} -} - -func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) -} -func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) -} -func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_ResetPasswordRequest.Merge(m, src) -} -func (m *ResetPasswordRequest) XXX_Size() int { - return xxx_messageInfo_ResetPasswordRequest.Size(m) -} -func (m *ResetPasswordRequest) XXX_DiscardUnknown() { - xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo - -func (m *ResetPasswordRequest) GetUserName() string { - if m != nil { - return m.UserName - } - return "" -} - -func (m *ResetPasswordRequest) GetType() NotificationType { - if m != nil { - return m.Type - } - return NotificationType_NOTIFICATIONTYPE_EMAIL -} - -type ResetPassword struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` - NewPassword string `protobuf:"bytes,3,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ResetPassword) Reset() { *m = ResetPassword{} } -func (m *ResetPassword) String() string { return proto.CompactTextString(m) } -func (*ResetPassword) ProtoMessage() {} -func (*ResetPassword) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{54} -} - -func (m *ResetPassword) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ResetPassword.Unmarshal(m, b) -} -func (m *ResetPassword) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ResetPassword.Marshal(b, m, deterministic) -} -func (m *ResetPassword) XXX_Merge(src proto.Message) { - xxx_messageInfo_ResetPassword.Merge(m, src) -} -func (m *ResetPassword) XXX_Size() int { - return xxx_messageInfo_ResetPassword.Size(m) -} -func (m *ResetPassword) XXX_DiscardUnknown() { - xxx_messageInfo_ResetPassword.DiscardUnknown(m) -} - -var xxx_messageInfo_ResetPassword proto.InternalMessageInfo - -func (m *ResetPassword) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *ResetPassword) GetCode() string { - if m != nil { - return m.Code - } - return "" -} - -func (m *ResetPassword) GetNewPassword() string { - if m != nil { - return m.NewPassword - } - return "" -} - -type SetPasswordNotificationRequest struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } -func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } -func (*SetPasswordNotificationRequest) ProtoMessage() {} -func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{55} -} - -func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) -} -func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) -} -func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) -} -func (m *SetPasswordNotificationRequest) XXX_Size() int { - return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) -} -func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { - xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo - -func (m *SetPasswordNotificationRequest) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *SetPasswordNotificationRequest) GetType() NotificationType { - if m != nil { - return m.Type - } - return NotificationType_NOTIFICATIONTYPE_EMAIL -} - type PasswordChange struct { - OldPassword string `protobuf:"bytes,1,opt,name=old_password,json=oldPassword,proto3" json:"old_password,omitempty"` - NewPassword string `protobuf:"bytes,2,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + OldPassword string `protobuf:"bytes,1,opt,name=old_password,json=oldPassword,proto3" json:"old_password,omitempty"` + NewPassword string `protobuf:"bytes,2,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` } -func (m *PasswordChange) Reset() { *m = PasswordChange{} } -func (m *PasswordChange) String() string { return proto.CompactTextString(m) } -func (*PasswordChange) ProtoMessage() {} +func (x *PasswordChange) Reset() { + *x = PasswordChange{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[17] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *PasswordChange) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*PasswordChange) ProtoMessage() {} + +func (x *PasswordChange) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[17] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use PasswordChange.ProtoReflect.Descriptor instead. func (*PasswordChange) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{56} + return file_auth_proto_rawDescGZIP(), []int{17} } -func (m *PasswordChange) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_PasswordChange.Unmarshal(m, b) -} -func (m *PasswordChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_PasswordChange.Marshal(b, m, deterministic) -} -func (m *PasswordChange) XXX_Merge(src proto.Message) { - xxx_messageInfo_PasswordChange.Merge(m, src) -} -func (m *PasswordChange) XXX_Size() int { - return xxx_messageInfo_PasswordChange.Size(m) -} -func (m *PasswordChange) XXX_DiscardUnknown() { - xxx_messageInfo_PasswordChange.DiscardUnknown(m) -} - -var xxx_messageInfo_PasswordChange proto.InternalMessageInfo - -func (m *PasswordChange) GetOldPassword() string { - if m != nil { - return m.OldPassword +func (x *PasswordChange) GetOldPassword() string { + if x != nil { + return x.OldPassword } return "" } -func (m *PasswordChange) GetNewPassword() string { - if m != nil { - return m.NewPassword +func (x *PasswordChange) GetNewPassword() string { + if x != nil { + return x.NewPassword } return "" } type VerifyMfaOtp struct { - Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` } -func (m *VerifyMfaOtp) Reset() { *m = VerifyMfaOtp{} } -func (m *VerifyMfaOtp) String() string { return proto.CompactTextString(m) } -func (*VerifyMfaOtp) ProtoMessage() {} +func (x *VerifyMfaOtp) Reset() { + *x = VerifyMfaOtp{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[18] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *VerifyMfaOtp) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*VerifyMfaOtp) ProtoMessage() {} + +func (x *VerifyMfaOtp) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[18] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use VerifyMfaOtp.ProtoReflect.Descriptor instead. func (*VerifyMfaOtp) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{57} + return file_auth_proto_rawDescGZIP(), []int{18} } -func (m *VerifyMfaOtp) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyMfaOtp.Unmarshal(m, b) -} -func (m *VerifyMfaOtp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyMfaOtp.Marshal(b, m, deterministic) -} -func (m *VerifyMfaOtp) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyMfaOtp.Merge(m, src) -} -func (m *VerifyMfaOtp) XXX_Size() int { - return xxx_messageInfo_VerifyMfaOtp.Size(m) -} -func (m *VerifyMfaOtp) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyMfaOtp.DiscardUnknown(m) -} - -var xxx_messageInfo_VerifyMfaOtp proto.InternalMessageInfo - -func (m *VerifyMfaOtp) GetCode() string { - if m != nil { - return m.Code +func (x *VerifyMfaOtp) GetCode() string { + if x != nil { + return x.Code } return "" } type MultiFactors struct { - Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` } -func (m *MultiFactors) Reset() { *m = MultiFactors{} } -func (m *MultiFactors) String() string { return proto.CompactTextString(m) } -func (*MultiFactors) ProtoMessage() {} +func (x *MultiFactors) Reset() { + *x = MultiFactors{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[19] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MultiFactors) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MultiFactors) ProtoMessage() {} + +func (x *MultiFactors) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[19] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MultiFactors.ProtoReflect.Descriptor instead. func (*MultiFactors) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{58} + return file_auth_proto_rawDescGZIP(), []int{19} } -func (m *MultiFactors) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MultiFactors.Unmarshal(m, b) -} -func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) -} -func (m *MultiFactors) XXX_Merge(src proto.Message) { - xxx_messageInfo_MultiFactors.Merge(m, src) -} -func (m *MultiFactors) XXX_Size() int { - return xxx_messageInfo_MultiFactors.Size(m) -} -func (m *MultiFactors) XXX_DiscardUnknown() { - xxx_messageInfo_MultiFactors.DiscardUnknown(m) -} - -var xxx_messageInfo_MultiFactors proto.InternalMessageInfo - -func (m *MultiFactors) GetMfas() []*MultiFactor { - if m != nil { - return m.Mfas +func (x *MultiFactors) GetMfas() []*MultiFactor { + if x != nil { + return x.Mfas } return nil } type MultiFactor struct { - Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.MfaType" json:"type,omitempty"` - State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` } -func (m *MultiFactor) Reset() { *m = MultiFactor{} } -func (m *MultiFactor) String() string { return proto.CompactTextString(m) } -func (*MultiFactor) ProtoMessage() {} +func (x *MultiFactor) Reset() { + *x = MultiFactor{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[20] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MultiFactor) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MultiFactor) ProtoMessage() {} + +func (x *MultiFactor) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[20] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MultiFactor.ProtoReflect.Descriptor instead. func (*MultiFactor) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{59} + return file_auth_proto_rawDescGZIP(), []int{20} } -func (m *MultiFactor) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MultiFactor.Unmarshal(m, b) -} -func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) -} -func (m *MultiFactor) XXX_Merge(src proto.Message) { - xxx_messageInfo_MultiFactor.Merge(m, src) -} -func (m *MultiFactor) XXX_Size() int { - return xxx_messageInfo_MultiFactor.Size(m) -} -func (m *MultiFactor) XXX_DiscardUnknown() { - xxx_messageInfo_MultiFactor.DiscardUnknown(m) -} - -var xxx_messageInfo_MultiFactor proto.InternalMessageInfo - -func (m *MultiFactor) GetType() MfaType { - if m != nil { - return m.Type +func (x *MultiFactor) GetType() MfaType { + if x != nil { + return x.Type } return MfaType_MFATYPE_UNSPECIFIED } -func (m *MultiFactor) GetState() MFAState { - if m != nil { - return m.State +func (x *MultiFactor) GetState() MFAState { + if x != nil { + return x.State } return MFAState_MFASTATE_UNSPECIFIED } type MfaOtpResponse struct { - UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` - Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"` - Secret string `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` - State MFAState `protobuf:"varint,4,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"` + Secret string `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` + State MFAState `protobuf:"varint,4,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` } -func (m *MfaOtpResponse) Reset() { *m = MfaOtpResponse{} } -func (m *MfaOtpResponse) String() string { return proto.CompactTextString(m) } -func (*MfaOtpResponse) ProtoMessage() {} +func (x *MfaOtpResponse) Reset() { + *x = MfaOtpResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[21] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MfaOtpResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MfaOtpResponse) ProtoMessage() {} + +func (x *MfaOtpResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[21] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MfaOtpResponse.ProtoReflect.Descriptor instead. func (*MfaOtpResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{60} + return file_auth_proto_rawDescGZIP(), []int{21} } -func (m *MfaOtpResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MfaOtpResponse.Unmarshal(m, b) -} -func (m *MfaOtpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MfaOtpResponse.Marshal(b, m, deterministic) -} -func (m *MfaOtpResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_MfaOtpResponse.Merge(m, src) -} -func (m *MfaOtpResponse) XXX_Size() int { - return xxx_messageInfo_MfaOtpResponse.Size(m) -} -func (m *MfaOtpResponse) XXX_DiscardUnknown() { - xxx_messageInfo_MfaOtpResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_MfaOtpResponse proto.InternalMessageInfo - -func (m *MfaOtpResponse) GetUserId() string { - if m != nil { - return m.UserId +func (x *MfaOtpResponse) GetUserId() string { + if x != nil { + return x.UserId } return "" } -func (m *MfaOtpResponse) GetUrl() string { - if m != nil { - return m.Url +func (x *MfaOtpResponse) GetUrl() string { + if x != nil { + return x.Url } return "" } -func (m *MfaOtpResponse) GetSecret() string { - if m != nil { - return m.Secret +func (x *MfaOtpResponse) GetSecret() string { + if x != nil { + return x.Secret } return "" } -func (m *MfaOtpResponse) GetState() MFAState { - if m != nil { - return m.State +func (x *MfaOtpResponse) GetState() MFAState { + if x != nil { + return x.State } return MFAState_MFASTATE_UNSPECIFIED } -type ApplicationID struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ApplicationID) Reset() { *m = ApplicationID{} } -func (m *ApplicationID) String() string { return proto.CompactTextString(m) } -func (*ApplicationID) ProtoMessage() {} -func (*ApplicationID) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{61} -} - -func (m *ApplicationID) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ApplicationID.Unmarshal(m, b) -} -func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) -} -func (m *ApplicationID) XXX_Merge(src proto.Message) { - xxx_messageInfo_ApplicationID.Merge(m, src) -} -func (m *ApplicationID) XXX_Size() int { - return xxx_messageInfo_ApplicationID.Size(m) -} -func (m *ApplicationID) XXX_DiscardUnknown() { - xxx_messageInfo_ApplicationID.DiscardUnknown(m) -} - -var xxx_messageInfo_ApplicationID proto.InternalMessageInfo - -func (m *ApplicationID) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -type Application struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.AppState" json:"state,omitempty"` - CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` - ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` - Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` - // Types that are valid to be assigned to AppConfig: - // *Application_OidcConfig - AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *Application) Reset() { *m = Application{} } -func (m *Application) String() string { return proto.CompactTextString(m) } -func (*Application) ProtoMessage() {} -func (*Application) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{62} -} - -func (m *Application) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_Application.Unmarshal(m, b) -} -func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_Application.Marshal(b, m, deterministic) -} -func (m *Application) XXX_Merge(src proto.Message) { - xxx_messageInfo_Application.Merge(m, src) -} -func (m *Application) XXX_Size() int { - return xxx_messageInfo_Application.Size(m) -} -func (m *Application) XXX_DiscardUnknown() { - xxx_messageInfo_Application.DiscardUnknown(m) -} - -var xxx_messageInfo_Application proto.InternalMessageInfo - -func (m *Application) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *Application) GetState() AppState { - if m != nil { - return m.State - } - return AppState_APPSTATE_UNSPECIFIED -} - -func (m *Application) GetCreationDate() *timestamp.Timestamp { - if m != nil { - return m.CreationDate - } - return nil -} - -func (m *Application) GetChangeDate() *timestamp.Timestamp { - if m != nil { - return m.ChangeDate - } - return nil -} - -func (m *Application) GetName() string { - if m != nil { - return m.Name - } - return "" -} - -type isApplication_AppConfig interface { - isApplication_AppConfig() -} - -type Application_OidcConfig struct { - OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` -} - -func (*Application_OidcConfig) isApplication_AppConfig() {} - -func (m *Application) GetAppConfig() isApplication_AppConfig { - if m != nil { - return m.AppConfig - } - return nil -} - -func (m *Application) GetOidcConfig() *OIDCConfig { - if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { - return x.OidcConfig - } - return nil -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*Application) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*Application_OidcConfig)(nil), - } -} - -type OIDCConfig struct { - RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` - ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_types,omitempty"` - GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=zitadel.auth.api.v1.OIDCGrantType" json:"grant_types,omitempty"` - ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=zitadel.auth.api.v1.OIDCApplicationType" json:"application_type,omitempty"` - ClientSecret string `protobuf:"bytes,5,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` - ClientId string `protobuf:"bytes,6,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` - AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=zitadel.auth.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` - PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } -func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } -func (*OIDCConfig) ProtoMessage() {} -func (*OIDCConfig) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{63} -} - -func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) -} -func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) -} -func (m *OIDCConfig) XXX_Merge(src proto.Message) { - xxx_messageInfo_OIDCConfig.Merge(m, src) -} -func (m *OIDCConfig) XXX_Size() int { - return xxx_messageInfo_OIDCConfig.Size(m) -} -func (m *OIDCConfig) XXX_DiscardUnknown() { - xxx_messageInfo_OIDCConfig.DiscardUnknown(m) -} - -var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo - -func (m *OIDCConfig) GetRedirectUris() []string { - if m != nil { - return m.RedirectUris - } - return nil -} - -func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { - if m != nil { - return m.ResponseTypes - } - return nil -} - -func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { - if m != nil { - return m.GrantTypes - } - return nil -} - -func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { - if m != nil { - return m.ApplicationType - } - return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB -} - -func (m *OIDCConfig) GetClientSecret() string { - if m != nil { - return m.ClientSecret - } - return "" -} - -func (m *OIDCConfig) GetClientId() string { - if m != nil { - return m.ClientId - } - return "" -} - -func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { - if m != nil { - return m.AuthMethodType - } - return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC -} - -func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { - if m != nil { - return m.PostLogoutRedirectUris - } - return nil -} - -type ApplicationSearchRequest struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - SortingColumn ApplicationSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"sorting_column,omitempty"` - Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` - Queries []*ApplicationSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } -func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } -func (*ApplicationSearchRequest) ProtoMessage() {} -func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{64} -} - -func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) -} -func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) -} -func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) -} -func (m *ApplicationSearchRequest) XXX_Size() int { - return xxx_messageInfo_ApplicationSearchRequest.Size(m) -} -func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { - xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo - -func (m *ApplicationSearchRequest) GetOffset() uint64 { - if m != nil { - return m.Offset - } - return 0 -} - -func (m *ApplicationSearchRequest) GetLimit() uint64 { - if m != nil { - return m.Limit - } - return 0 -} - -func (m *ApplicationSearchRequest) GetSortingColumn() ApplicationSearchKey { - if m != nil { - return m.SortingColumn - } - return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED -} - -func (m *ApplicationSearchRequest) GetAsc() bool { - if m != nil { - return m.Asc - } - return false -} - -func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { - if m != nil { - return m.Queries - } - return nil -} - -type ApplicationSearchQuery struct { - Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"key,omitempty"` - Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` - Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } -func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } -func (*ApplicationSearchQuery) ProtoMessage() {} -func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{65} -} - -func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) -} -func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) -} -func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { - xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) -} -func (m *ApplicationSearchQuery) XXX_Size() int { - return xxx_messageInfo_ApplicationSearchQuery.Size(m) -} -func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { - xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) -} - -var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo - -func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { - if m != nil { - return m.Key - } - return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED -} - -func (m *ApplicationSearchQuery) GetMethod() SearchMethod { - if m != nil { - return m.Method - } - return SearchMethod_SEARCHMETHOD_EQUALS -} - -func (m *ApplicationSearchQuery) GetValue() string { - if m != nil { - return m.Value - } - return "" -} - -type ApplicationSearchResponse struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` - Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } -func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } -func (*ApplicationSearchResponse) ProtoMessage() {} -func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{66} -} - -func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) -} -func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) -} -func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) -} -func (m *ApplicationSearchResponse) XXX_Size() int { - return xxx_messageInfo_ApplicationSearchResponse.Size(m) -} -func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { - xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo - -func (m *ApplicationSearchResponse) GetOffset() uint64 { - if m != nil { - return m.Offset - } - return 0 -} - -func (m *ApplicationSearchResponse) GetLimit() uint64 { - if m != nil { - return m.Limit - } - return 0 -} - -func (m *ApplicationSearchResponse) GetTotalResult() uint64 { - if m != nil { - return m.TotalResult - } - return 0 -} - -func (m *ApplicationSearchResponse) GetResult() []*Application { - if m != nil { - return m.Result - } - return nil -} - -type ApplicationAuthorizeRequest struct { - // Types that are valid to be assigned to Auth: - // *ApplicationAuthorizeRequest_OidcClientAuth - Auth isApplicationAuthorizeRequest_Auth `protobuf_oneof:"auth"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *ApplicationAuthorizeRequest) Reset() { *m = ApplicationAuthorizeRequest{} } -func (m *ApplicationAuthorizeRequest) String() string { return proto.CompactTextString(m) } -func (*ApplicationAuthorizeRequest) ProtoMessage() {} -func (*ApplicationAuthorizeRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{67} -} - -func (m *ApplicationAuthorizeRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_ApplicationAuthorizeRequest.Unmarshal(m, b) -} -func (m *ApplicationAuthorizeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_ApplicationAuthorizeRequest.Marshal(b, m, deterministic) -} -func (m *ApplicationAuthorizeRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_ApplicationAuthorizeRequest.Merge(m, src) -} -func (m *ApplicationAuthorizeRequest) XXX_Size() int { - return xxx_messageInfo_ApplicationAuthorizeRequest.Size(m) -} -func (m *ApplicationAuthorizeRequest) XXX_DiscardUnknown() { - xxx_messageInfo_ApplicationAuthorizeRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_ApplicationAuthorizeRequest proto.InternalMessageInfo - -type isApplicationAuthorizeRequest_Auth interface { - isApplicationAuthorizeRequest_Auth() -} - -type ApplicationAuthorizeRequest_OidcClientAuth struct { - OidcClientAuth *OIDCClientAuth `protobuf:"bytes,1,opt,name=oidc_client_auth,json=oidcClientAuth,proto3,oneof"` -} - -func (*ApplicationAuthorizeRequest_OidcClientAuth) isApplicationAuthorizeRequest_Auth() {} - -func (m *ApplicationAuthorizeRequest) GetAuth() isApplicationAuthorizeRequest_Auth { - if m != nil { - return m.Auth - } - return nil -} - -func (m *ApplicationAuthorizeRequest) GetOidcClientAuth() *OIDCClientAuth { - if x, ok := m.GetAuth().(*ApplicationAuthorizeRequest_OidcClientAuth); ok { - return x.OidcClientAuth - } - return nil -} - -// XXX_OneofWrappers is for the internal use of the proto package. -func (*ApplicationAuthorizeRequest) XXX_OneofWrappers() []interface{} { - return []interface{}{ - (*ApplicationAuthorizeRequest_OidcClientAuth)(nil), - } -} - type OIDCClientAuth struct { - ClientId string `protobuf:"bytes,1,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` - ClientSecret string `protobuf:"bytes,2,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + ClientId string `protobuf:"bytes,1,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,2,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` } -func (m *OIDCClientAuth) Reset() { *m = OIDCClientAuth{} } -func (m *OIDCClientAuth) String() string { return proto.CompactTextString(m) } -func (*OIDCClientAuth) ProtoMessage() {} +func (x *OIDCClientAuth) Reset() { + *x = OIDCClientAuth{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[22] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *OIDCClientAuth) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*OIDCClientAuth) ProtoMessage() {} + +func (x *OIDCClientAuth) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[22] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use OIDCClientAuth.ProtoReflect.Descriptor instead. func (*OIDCClientAuth) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{68} + return file_auth_proto_rawDescGZIP(), []int{22} } -func (m *OIDCClientAuth) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_OIDCClientAuth.Unmarshal(m, b) -} -func (m *OIDCClientAuth) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_OIDCClientAuth.Marshal(b, m, deterministic) -} -func (m *OIDCClientAuth) XXX_Merge(src proto.Message) { - xxx_messageInfo_OIDCClientAuth.Merge(m, src) -} -func (m *OIDCClientAuth) XXX_Size() int { - return xxx_messageInfo_OIDCClientAuth.Size(m) -} -func (m *OIDCClientAuth) XXX_DiscardUnknown() { - xxx_messageInfo_OIDCClientAuth.DiscardUnknown(m) -} - -var xxx_messageInfo_OIDCClientAuth proto.InternalMessageInfo - -func (m *OIDCClientAuth) GetClientId() string { - if m != nil { - return m.ClientId +func (x *OIDCClientAuth) GetClientId() string { + if x != nil { + return x.ClientId } return "" } -func (m *OIDCClientAuth) GetClientSecret() string { - if m != nil { - return m.ClientSecret - } - return "" -} - -type GrantSearchRequest struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - SortingColumn GrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"sorting_column,omitempty"` - Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` - Queries []*GrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *GrantSearchRequest) Reset() { *m = GrantSearchRequest{} } -func (m *GrantSearchRequest) String() string { return proto.CompactTextString(m) } -func (*GrantSearchRequest) ProtoMessage() {} -func (*GrantSearchRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{69} -} - -func (m *GrantSearchRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_GrantSearchRequest.Unmarshal(m, b) -} -func (m *GrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_GrantSearchRequest.Marshal(b, m, deterministic) -} -func (m *GrantSearchRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_GrantSearchRequest.Merge(m, src) -} -func (m *GrantSearchRequest) XXX_Size() int { - return xxx_messageInfo_GrantSearchRequest.Size(m) -} -func (m *GrantSearchRequest) XXX_DiscardUnknown() { - xxx_messageInfo_GrantSearchRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_GrantSearchRequest proto.InternalMessageInfo - -func (m *GrantSearchRequest) GetOffset() uint64 { - if m != nil { - return m.Offset - } - return 0 -} - -func (m *GrantSearchRequest) GetLimit() uint64 { - if m != nil { - return m.Limit - } - return 0 -} - -func (m *GrantSearchRequest) GetSortingColumn() GrantSearchKey { - if m != nil { - return m.SortingColumn - } - return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED -} - -func (m *GrantSearchRequest) GetAsc() bool { - if m != nil { - return m.Asc - } - return false -} - -func (m *GrantSearchRequest) GetQueries() []*GrantSearchQuery { - if m != nil { - return m.Queries - } - return nil -} - -type GrantSearchQuery struct { - Key GrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"key,omitempty"` - Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` - Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *GrantSearchQuery) Reset() { *m = GrantSearchQuery{} } -func (m *GrantSearchQuery) String() string { return proto.CompactTextString(m) } -func (*GrantSearchQuery) ProtoMessage() {} -func (*GrantSearchQuery) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{70} -} - -func (m *GrantSearchQuery) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_GrantSearchQuery.Unmarshal(m, b) -} -func (m *GrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_GrantSearchQuery.Marshal(b, m, deterministic) -} -func (m *GrantSearchQuery) XXX_Merge(src proto.Message) { - xxx_messageInfo_GrantSearchQuery.Merge(m, src) -} -func (m *GrantSearchQuery) XXX_Size() int { - return xxx_messageInfo_GrantSearchQuery.Size(m) -} -func (m *GrantSearchQuery) XXX_DiscardUnknown() { - xxx_messageInfo_GrantSearchQuery.DiscardUnknown(m) -} - -var xxx_messageInfo_GrantSearchQuery proto.InternalMessageInfo - -func (m *GrantSearchQuery) GetKey() GrantSearchKey { - if m != nil { - return m.Key - } - return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED -} - -func (m *GrantSearchQuery) GetMethod() SearchMethod { - if m != nil { - return m.Method - } - return SearchMethod_SEARCHMETHOD_EQUALS -} - -func (m *GrantSearchQuery) GetValue() string { - if m != nil { - return m.Value - } - return "" -} - -type GrantSearchResponse struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` - Result []*Grant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *GrantSearchResponse) Reset() { *m = GrantSearchResponse{} } -func (m *GrantSearchResponse) String() string { return proto.CompactTextString(m) } -func (*GrantSearchResponse) ProtoMessage() {} -func (*GrantSearchResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{71} -} - -func (m *GrantSearchResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_GrantSearchResponse.Unmarshal(m, b) -} -func (m *GrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_GrantSearchResponse.Marshal(b, m, deterministic) -} -func (m *GrantSearchResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_GrantSearchResponse.Merge(m, src) -} -func (m *GrantSearchResponse) XXX_Size() int { - return xxx_messageInfo_GrantSearchResponse.Size(m) -} -func (m *GrantSearchResponse) XXX_DiscardUnknown() { - xxx_messageInfo_GrantSearchResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_GrantSearchResponse proto.InternalMessageInfo - -func (m *GrantSearchResponse) GetOffset() uint64 { - if m != nil { - return m.Offset - } - return 0 -} - -func (m *GrantSearchResponse) GetLimit() uint64 { - if m != nil { - return m.Limit - } - return 0 -} - -func (m *GrantSearchResponse) GetTotalResult() uint64 { - if m != nil { - return m.TotalResult - } - return 0 -} - -func (m *GrantSearchResponse) GetResult() []*Grant { - if m != nil { - return m.Result - } - return nil -} - -type Grant struct { - OrgId string `protobuf:"bytes,1,opt,name=OrgId,proto3" json:"OrgId,omitempty"` - ProjectId string `protobuf:"bytes,2,opt,name=ProjectId,proto3" json:"ProjectId,omitempty"` - UserId string `protobuf:"bytes,3,opt,name=UserId,proto3" json:"UserId,omitempty"` - Roles []string `protobuf:"bytes,4,rep,name=Roles,proto3" json:"Roles,omitempty"` - OrgName string `protobuf:"bytes,5,opt,name=OrgName,proto3" json:"OrgName,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *Grant) Reset() { *m = Grant{} } -func (m *Grant) String() string { return proto.CompactTextString(m) } -func (*Grant) ProtoMessage() {} -func (*Grant) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{72} -} - -func (m *Grant) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_Grant.Unmarshal(m, b) -} -func (m *Grant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_Grant.Marshal(b, m, deterministic) -} -func (m *Grant) XXX_Merge(src proto.Message) { - xxx_messageInfo_Grant.Merge(m, src) -} -func (m *Grant) XXX_Size() int { - return xxx_messageInfo_Grant.Size(m) -} -func (m *Grant) XXX_DiscardUnknown() { - xxx_messageInfo_Grant.DiscardUnknown(m) -} - -var xxx_messageInfo_Grant proto.InternalMessageInfo - -func (m *Grant) GetOrgId() string { - if m != nil { - return m.OrgId - } - return "" -} - -func (m *Grant) GetProjectId() string { - if m != nil { - return m.ProjectId - } - return "" -} - -func (m *Grant) GetUserId() string { - if m != nil { - return m.UserId - } - return "" -} - -func (m *Grant) GetRoles() []string { - if m != nil { - return m.Roles - } - return nil -} - -func (m *Grant) GetOrgName() string { - if m != nil { - return m.OrgName +func (x *OIDCClientAuth) GetClientSecret() string { + if x != nil { + return x.ClientSecret } return "" } type MyProjectOrgSearchRequest struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` - Queries []*MyProjectOrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*MyProjectOrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` } -func (m *MyProjectOrgSearchRequest) Reset() { *m = MyProjectOrgSearchRequest{} } -func (m *MyProjectOrgSearchRequest) String() string { return proto.CompactTextString(m) } -func (*MyProjectOrgSearchRequest) ProtoMessage() {} +func (x *MyProjectOrgSearchRequest) Reset() { + *x = MyProjectOrgSearchRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[23] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchRequest) ProtoMessage() {} + +func (x *MyProjectOrgSearchRequest) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[23] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchRequest.ProtoReflect.Descriptor instead. func (*MyProjectOrgSearchRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{73} + return file_auth_proto_rawDescGZIP(), []int{23} } -func (m *MyProjectOrgSearchRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MyProjectOrgSearchRequest.Unmarshal(m, b) -} -func (m *MyProjectOrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MyProjectOrgSearchRequest.Marshal(b, m, deterministic) -} -func (m *MyProjectOrgSearchRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_MyProjectOrgSearchRequest.Merge(m, src) -} -func (m *MyProjectOrgSearchRequest) XXX_Size() int { - return xxx_messageInfo_MyProjectOrgSearchRequest.Size(m) -} -func (m *MyProjectOrgSearchRequest) XXX_DiscardUnknown() { - xxx_messageInfo_MyProjectOrgSearchRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_MyProjectOrgSearchRequest proto.InternalMessageInfo - -func (m *MyProjectOrgSearchRequest) GetOffset() uint64 { - if m != nil { - return m.Offset +func (x *MyProjectOrgSearchRequest) GetOffset() uint64 { + if x != nil { + return x.Offset } return 0 } -func (m *MyProjectOrgSearchRequest) GetLimit() uint64 { - if m != nil { - return m.Limit +func (x *MyProjectOrgSearchRequest) GetLimit() uint64 { + if x != nil { + return x.Limit } return 0 } -func (m *MyProjectOrgSearchRequest) GetAsc() bool { - if m != nil { - return m.Asc +func (x *MyProjectOrgSearchRequest) GetAsc() bool { + if x != nil { + return x.Asc } return false } -func (m *MyProjectOrgSearchRequest) GetQueries() []*MyProjectOrgSearchQuery { - if m != nil { - return m.Queries +func (x *MyProjectOrgSearchRequest) GetQueries() []*MyProjectOrgSearchQuery { + if x != nil { + return x.Queries } return nil } type MyProjectOrgSearchQuery struct { - Key MyProjectOrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.MyProjectOrgSearchKey" json:"key,omitempty"` - Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` - Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Key MyProjectOrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.MyProjectOrgSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` } -func (m *MyProjectOrgSearchQuery) Reset() { *m = MyProjectOrgSearchQuery{} } -func (m *MyProjectOrgSearchQuery) String() string { return proto.CompactTextString(m) } -func (*MyProjectOrgSearchQuery) ProtoMessage() {} +func (x *MyProjectOrgSearchQuery) Reset() { + *x = MyProjectOrgSearchQuery{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[24] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchQuery) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchQuery) ProtoMessage() {} + +func (x *MyProjectOrgSearchQuery) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[24] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchQuery.ProtoReflect.Descriptor instead. func (*MyProjectOrgSearchQuery) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{74} + return file_auth_proto_rawDescGZIP(), []int{24} } -func (m *MyProjectOrgSearchQuery) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MyProjectOrgSearchQuery.Unmarshal(m, b) -} -func (m *MyProjectOrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MyProjectOrgSearchQuery.Marshal(b, m, deterministic) -} -func (m *MyProjectOrgSearchQuery) XXX_Merge(src proto.Message) { - xxx_messageInfo_MyProjectOrgSearchQuery.Merge(m, src) -} -func (m *MyProjectOrgSearchQuery) XXX_Size() int { - return xxx_messageInfo_MyProjectOrgSearchQuery.Size(m) -} -func (m *MyProjectOrgSearchQuery) XXX_DiscardUnknown() { - xxx_messageInfo_MyProjectOrgSearchQuery.DiscardUnknown(m) -} - -var xxx_messageInfo_MyProjectOrgSearchQuery proto.InternalMessageInfo - -func (m *MyProjectOrgSearchQuery) GetKey() MyProjectOrgSearchKey { - if m != nil { - return m.Key +func (x *MyProjectOrgSearchQuery) GetKey() MyProjectOrgSearchKey { + if x != nil { + return x.Key } return MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED } -func (m *MyProjectOrgSearchQuery) GetMethod() SearchMethod { - if m != nil { - return m.Method +func (x *MyProjectOrgSearchQuery) GetMethod() SearchMethod { + if x != nil { + return x.Method } return SearchMethod_SEARCHMETHOD_EQUALS } -func (m *MyProjectOrgSearchQuery) GetValue() string { - if m != nil { - return m.Value +func (x *MyProjectOrgSearchQuery) GetValue() string { + if x != nil { + return x.Value } return "" } type MyProjectOrgSearchResponse struct { - Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` - Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` - TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` - Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` } -func (m *MyProjectOrgSearchResponse) Reset() { *m = MyProjectOrgSearchResponse{} } -func (m *MyProjectOrgSearchResponse) String() string { return proto.CompactTextString(m) } -func (*MyProjectOrgSearchResponse) ProtoMessage() {} +func (x *MyProjectOrgSearchResponse) Reset() { + *x = MyProjectOrgSearchResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[25] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyProjectOrgSearchResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyProjectOrgSearchResponse) ProtoMessage() {} + +func (x *MyProjectOrgSearchResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[25] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyProjectOrgSearchResponse.ProtoReflect.Descriptor instead. func (*MyProjectOrgSearchResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{75} + return file_auth_proto_rawDescGZIP(), []int{25} } -func (m *MyProjectOrgSearchResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MyProjectOrgSearchResponse.Unmarshal(m, b) -} -func (m *MyProjectOrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MyProjectOrgSearchResponse.Marshal(b, m, deterministic) -} -func (m *MyProjectOrgSearchResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_MyProjectOrgSearchResponse.Merge(m, src) -} -func (m *MyProjectOrgSearchResponse) XXX_Size() int { - return xxx_messageInfo_MyProjectOrgSearchResponse.Size(m) -} -func (m *MyProjectOrgSearchResponse) XXX_DiscardUnknown() { - xxx_messageInfo_MyProjectOrgSearchResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_MyProjectOrgSearchResponse proto.InternalMessageInfo - -func (m *MyProjectOrgSearchResponse) GetOffset() uint64 { - if m != nil { - return m.Offset +func (x *MyProjectOrgSearchResponse) GetOffset() uint64 { + if x != nil { + return x.Offset } return 0 } -func (m *MyProjectOrgSearchResponse) GetLimit() uint64 { - if m != nil { - return m.Limit +func (x *MyProjectOrgSearchResponse) GetLimit() uint64 { + if x != nil { + return x.Limit } return 0 } -func (m *MyProjectOrgSearchResponse) GetTotalResult() uint64 { - if m != nil { - return m.TotalResult +func (x *MyProjectOrgSearchResponse) GetTotalResult() uint64 { + if x != nil { + return x.TotalResult } return 0 } -func (m *MyProjectOrgSearchResponse) GetResult() []*Org { - if m != nil { - return m.Result +func (x *MyProjectOrgSearchResponse) GetResult() []*Org { + if x != nil { + return x.Result } return nil } type IsAdminResponse struct { - IsAdmin bool `protobuf:"varint,1,opt,name=is_admin,json=isAdmin,proto3" json:"is_admin,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + IsAdmin bool `protobuf:"varint,1,opt,name=is_admin,json=isAdmin,proto3" json:"is_admin,omitempty"` } -func (m *IsAdminResponse) Reset() { *m = IsAdminResponse{} } -func (m *IsAdminResponse) String() string { return proto.CompactTextString(m) } -func (*IsAdminResponse) ProtoMessage() {} +func (x *IsAdminResponse) Reset() { + *x = IsAdminResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[26] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *IsAdminResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*IsAdminResponse) ProtoMessage() {} + +func (x *IsAdminResponse) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[26] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use IsAdminResponse.ProtoReflect.Descriptor instead. func (*IsAdminResponse) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{76} + return file_auth_proto_rawDescGZIP(), []int{26} } -func (m *IsAdminResponse) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_IsAdminResponse.Unmarshal(m, b) -} -func (m *IsAdminResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_IsAdminResponse.Marshal(b, m, deterministic) -} -func (m *IsAdminResponse) XXX_Merge(src proto.Message) { - xxx_messageInfo_IsAdminResponse.Merge(m, src) -} -func (m *IsAdminResponse) XXX_Size() int { - return xxx_messageInfo_IsAdminResponse.Size(m) -} -func (m *IsAdminResponse) XXX_DiscardUnknown() { - xxx_messageInfo_IsAdminResponse.DiscardUnknown(m) -} - -var xxx_messageInfo_IsAdminResponse proto.InternalMessageInfo - -func (m *IsAdminResponse) GetIsAdmin() bool { - if m != nil { - return m.IsAdmin +func (x *IsAdminResponse) GetIsAdmin() bool { + if x != nil { + return x.IsAdmin } return false } type Org struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` } -func (m *Org) Reset() { *m = Org{} } -func (m *Org) String() string { return proto.CompactTextString(m) } -func (*Org) ProtoMessage() {} +func (x *Org) Reset() { + *x = Org{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[27] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *Org) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*Org) ProtoMessage() {} + +func (x *Org) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[27] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use Org.ProtoReflect.Descriptor instead. func (*Org) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{77} + return file_auth_proto_rawDescGZIP(), []int{27} } -func (m *Org) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_Org.Unmarshal(m, b) -} -func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_Org.Marshal(b, m, deterministic) -} -func (m *Org) XXX_Merge(src proto.Message) { - xxx_messageInfo_Org.Merge(m, src) -} -func (m *Org) XXX_Size() int { - return xxx_messageInfo_Org.Size(m) -} -func (m *Org) XXX_DiscardUnknown() { - xxx_messageInfo_Org.DiscardUnknown(m) -} - -var xxx_messageInfo_Org proto.InternalMessageInfo - -func (m *Org) GetId() string { - if m != nil { - return m.Id +func (x *Org) GetId() string { + if x != nil { + return x.Id } return "" } -func (m *Org) GetName() string { - if m != nil { - return m.Name +func (x *Org) GetName() string { + if x != nil { + return x.Name } return "" } -type CreateTokenRequest struct { - AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` - AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *CreateTokenRequest) Reset() { *m = CreateTokenRequest{} } -func (m *CreateTokenRequest) String() string { return proto.CompactTextString(m) } -func (*CreateTokenRequest) ProtoMessage() {} -func (*CreateTokenRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{78} -} - -func (m *CreateTokenRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_CreateTokenRequest.Unmarshal(m, b) -} -func (m *CreateTokenRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_CreateTokenRequest.Marshal(b, m, deterministic) -} -func (m *CreateTokenRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_CreateTokenRequest.Merge(m, src) -} -func (m *CreateTokenRequest) XXX_Size() int { - return xxx_messageInfo_CreateTokenRequest.Size(m) -} -func (m *CreateTokenRequest) XXX_DiscardUnknown() { - xxx_messageInfo_CreateTokenRequest.DiscardUnknown(m) -} - -var xxx_messageInfo_CreateTokenRequest proto.InternalMessageInfo - -func (m *CreateTokenRequest) GetAgentId() string { - if m != nil { - return m.AgentId - } - return "" -} - -func (m *CreateTokenRequest) GetAuthSessionId() string { - if m != nil { - return m.AuthSessionId - } - return "" -} - -type Token struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Expiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=expiration,proto3" json:"expiration,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` -} - -func (m *Token) Reset() { *m = Token{} } -func (m *Token) String() string { return proto.CompactTextString(m) } -func (*Token) ProtoMessage() {} -func (*Token) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{79} -} - -func (m *Token) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_Token.Unmarshal(m, b) -} -func (m *Token) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_Token.Marshal(b, m, deterministic) -} -func (m *Token) XXX_Merge(src proto.Message) { - xxx_messageInfo_Token.Merge(m, src) -} -func (m *Token) XXX_Size() int { - return xxx_messageInfo_Token.Size(m) -} -func (m *Token) XXX_DiscardUnknown() { - xxx_messageInfo_Token.DiscardUnknown(m) -} - -var xxx_messageInfo_Token proto.InternalMessageInfo - -func (m *Token) GetId() string { - if m != nil { - return m.Id - } - return "" -} - -func (m *Token) GetExpiration() *timestamp.Timestamp { - if m != nil { - return m.Expiration - } - return nil -} - type MyPermissions struct { - Permissions []string `protobuf:"bytes,1,rep,name=permissions,proto3" json:"permissions,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Permissions []string `protobuf:"bytes,1,rep,name=permissions,proto3" json:"permissions,omitempty"` } -func (m *MyPermissions) Reset() { *m = MyPermissions{} } -func (m *MyPermissions) String() string { return proto.CompactTextString(m) } -func (*MyPermissions) ProtoMessage() {} +func (x *MyPermissions) Reset() { + *x = MyPermissions{} + if protoimpl.UnsafeEnabled { + mi := &file_auth_proto_msgTypes[28] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *MyPermissions) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*MyPermissions) ProtoMessage() {} + +func (x *MyPermissions) ProtoReflect() protoreflect.Message { + mi := &file_auth_proto_msgTypes[28] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use MyPermissions.ProtoReflect.Descriptor instead. func (*MyPermissions) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{80} + return file_auth_proto_rawDescGZIP(), []int{28} } -func (m *MyPermissions) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_MyPermissions.Unmarshal(m, b) -} -func (m *MyPermissions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_MyPermissions.Marshal(b, m, deterministic) -} -func (m *MyPermissions) XXX_Merge(src proto.Message) { - xxx_messageInfo_MyPermissions.Merge(m, src) -} -func (m *MyPermissions) XXX_Size() int { - return xxx_messageInfo_MyPermissions.Size(m) -} -func (m *MyPermissions) XXX_DiscardUnknown() { - xxx_messageInfo_MyPermissions.DiscardUnknown(m) -} - -var xxx_messageInfo_MyPermissions proto.InternalMessageInfo - -func (m *MyPermissions) GetPermissions() []string { - if m != nil { - return m.Permissions +func (x *MyPermissions) GetPermissions() []string { + if x != nil { + return x.Permissions } return nil } -type VerifyUserInitRequest struct { - Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` - Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` - XXX_NoUnkeyedLiteral struct{} `json:"-"` - XXX_unrecognized []byte `json:"-"` - XXX_sizecache int32 `json:"-"` +var File_auth_proto protoreflect.FileDescriptor + +var file_auth_proto_rawDesc = []byte{ + 0x0a, 0x0a, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x13, 0x7a, 0x69, + 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, + 0x31, 0x1a, 0x1c, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x61, 0x6e, + 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, + 0x1b, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, + 0x2f, 0x65, 0x6d, 0x70, 0x74, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1c, 0x67, 0x6f, + 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x73, 0x74, + 0x72, 0x75, 0x63, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x74, 0x69, 0x6d, 0x65, + 0x73, 0x74, 0x61, 0x6d, 0x70, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x17, 0x76, 0x61, 0x6c, + 0x69, 0x64, 0x61, 0x74, 0x65, 0x2f, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2e, 0x70, + 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x2c, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x2d, 0x67, 0x65, 0x6e, + 0x2d, 0x73, 0x77, 0x61, 0x67, 0x67, 0x65, 0x72, 0x2f, 0x6f, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x73, + 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, + 0x74, 0x6f, 0x1a, 0x18, 0x61, 0x75, 0x74, 0x68, 0x6f, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6f, + 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0x5d, 0x0a, 0x10, + 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x73, + 0x12, 0x49, 0x0a, 0x0d, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x73, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, + 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, + 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x52, 0x0c, 0x75, + 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x22, 0xb8, 0x01, 0x0a, 0x0f, + 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x12, + 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, + 0x19, 0x0a, 0x08, 0x61, 0x67, 0x65, 0x6e, 0x74, 0x5f, 0x69, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x07, 0x61, 0x67, 0x65, 0x6e, 0x74, 0x49, 0x64, 0x12, 0x44, 0x0a, 0x0a, 0x61, 0x75, + 0x74, 0x68, 0x5f, 0x73, 0x74, 0x61, 0x74, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x25, + 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, + 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, + 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x09, 0x61, 0x75, 0x74, 0x68, 0x53, 0x74, 0x61, 0x74, 0x65, + 0x12, 0x17, 0x0a, 0x07, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18, 0x04, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x06, 0x75, 0x73, 0x65, 0x72, 0x49, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, + 0x72, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, + 0x65, 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x22, 0x18, 0x0a, 0x06, 0x55, 0x73, 0x65, 0x72, 0x49, 0x44, + 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, + 0x22, 0xe2, 0x07, 0x0a, 0x04, 0x55, 0x73, 0x65, 0x72, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, + 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x34, 0x0a, 0x05, 0x73, 0x74, 0x61, + 0x74, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x73, 0x65, 0x72, 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x12, + 0x3f, 0x0a, 0x0d, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x61, 0x74, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, + 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, + 0x6d, 0x70, 0x52, 0x0c, 0x63, 0x72, 0x65, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x44, 0x61, 0x74, 0x65, + 0x12, 0x43, 0x0a, 0x0f, 0x61, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x64, + 0x61, 0x74, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, + 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0e, 0x61, 0x63, 0x74, 0x69, 0x76, 0x61, 0x74, 0x69, 0x6f, + 0x6e, 0x44, 0x61, 0x74, 0x65, 0x12, 0x3b, 0x0a, 0x0b, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x5f, + 0x64, 0x61, 0x74, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, + 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0a, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x44, 0x61, + 0x74, 0x65, 0x12, 0x39, 0x0a, 0x0a, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6c, 0x6f, 0x67, 0x69, 0x6e, + 0x18, 0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, + 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, + 0x6d, 0x70, 0x52, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x4c, 0x6f, 0x67, 0x69, 0x6e, 0x12, 0x45, 0x0a, + 0x10, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, + 0x64, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, + 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, + 0x61, 0x6d, 0x70, 0x52, 0x0f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6e, 0x61, 0x6d, + 0x65, 0x18, 0x08, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, 0x65, 0x72, 0x4e, 0x61, 0x6d, + 0x65, 0x12, 0x1d, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, + 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, + 0x12, 0x1b, 0x0a, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0a, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x1b, 0x0a, + 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x21, 0x0a, 0x0c, 0x64, 0x69, + 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x0c, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0b, 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, 0x0a, + 0x12, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, 0x75, + 0x61, 0x67, 0x65, 0x18, 0x0d, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, 0x65, + 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, 0x06, + 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x18, 0x0e, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, 0x7a, + 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, + 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, + 0x72, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x18, 0x0f, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2a, 0x0a, 0x11, 0x69, 0x73, 0x5f, 0x65, 0x6d, + 0x61, 0x69, 0x6c, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x18, 0x10, 0x20, 0x01, + 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, + 0x69, 0x65, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x18, 0x11, 0x20, 0x01, + 0x28, 0x09, 0x52, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2a, 0x0a, 0x11, 0x69, 0x73, 0x5f, + 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x18, 0x12, + 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x56, 0x65, 0x72, + 0x69, 0x66, 0x69, 0x65, 0x64, 0x12, 0x18, 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, + 0x18, 0x13, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, + 0x1a, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x18, 0x14, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x12, 0x1f, 0x0a, 0x0b, 0x70, + 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x15, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x0a, 0x06, + 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x18, 0x16, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x72, 0x65, + 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x25, 0x0a, 0x0e, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x5f, 0x61, + 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, 0x17, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x73, 0x74, + 0x72, 0x65, 0x65, 0x74, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x12, 0x38, 0x0a, 0x18, 0x70, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x5f, 0x72, + 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x64, 0x18, 0x18, 0x20, 0x01, 0x28, 0x08, 0x52, 0x16, 0x70, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x52, 0x65, 0x71, + 0x75, 0x69, 0x72, 0x65, 0x64, 0x22, 0x9a, 0x02, 0x0a, 0x0b, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, + 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x1b, 0x0a, 0x09, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6e, 0x61, + 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x75, 0x73, 0x65, 0x72, 0x4e, 0x61, + 0x6d, 0x65, 0x12, 0x1d, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, + 0x65, 0x12, 0x1b, 0x0a, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x04, + 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x1b, + 0x0a, 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x21, 0x0a, 0x0c, 0x64, + 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x06, 0x20, 0x01, 0x28, + 0x09, 0x52, 0x0b, 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, + 0x0a, 0x12, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, + 0x75, 0x61, 0x67, 0x65, 0x18, 0x07, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, + 0x65, 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, + 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, + 0x65, 0x72, 0x22, 0xb6, 0x02, 0x0a, 0x18, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, + 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, + 0x29, 0x0a, 0x0a, 0x66, 0x69, 0x72, 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, + 0x09, 0x66, 0x69, 0x72, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x27, 0x0a, 0x09, 0x6c, 0x61, + 0x73, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, + 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x4e, + 0x61, 0x6d, 0x65, 0x12, 0x27, 0x0a, 0x09, 0x6e, 0x69, 0x63, 0x6b, 0x5f, 0x6e, 0x61, 0x6d, 0x65, + 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, + 0xc8, 0x01, 0x52, 0x08, 0x6e, 0x69, 0x63, 0x6b, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2d, 0x0a, 0x0c, + 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x04, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x0b, + 0x64, 0x69, 0x73, 0x70, 0x6c, 0x61, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x39, 0x0a, 0x12, 0x70, + 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x5f, 0x6c, 0x61, 0x6e, 0x67, 0x75, 0x61, 0x67, + 0x65, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, + 0x18, 0xc8, 0x01, 0x52, 0x11, 0x70, 0x72, 0x65, 0x66, 0x65, 0x72, 0x72, 0x65, 0x64, 0x4c, 0x61, + 0x6e, 0x67, 0x75, 0x61, 0x67, 0x65, 0x12, 0x33, 0x0a, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, + 0x18, 0x06, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x6e, + 0x64, 0x65, 0x72, 0x52, 0x06, 0x67, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x22, 0x5b, 0x0a, 0x09, 0x55, + 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, + 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, + 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x28, + 0x0a, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, + 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x45, 0x6d, 0x61, 0x69, 0x6c, + 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x22, 0x3a, 0x0a, 0x18, 0x56, 0x65, 0x72, 0x69, + 0x66, 0x79, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, 0x71, + 0x75, 0x65, 0x73, 0x74, 0x12, 0x1e, 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, + 0x63, 0x6f, 0x64, 0x65, 0x22, 0x48, 0x0a, 0x16, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x0e, + 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x1e, + 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, + 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x22, 0x3a, + 0x0a, 0x16, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, + 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x20, 0x0a, 0x05, 0x65, 0x6d, 0x61, 0x69, + 0x6c, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, 0x07, 0x72, 0x05, 0x10, 0x01, + 0x18, 0xc8, 0x01, 0x52, 0x05, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x5d, 0x0a, 0x09, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, + 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2a, 0x0a, + 0x11, 0x69, 0x73, 0x5f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x65, 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x69, 0x73, 0x50, 0x68, 0x6f, 0x6e, + 0x65, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x65, 0x64, 0x22, 0x39, 0x0a, 0x16, 0x55, 0x70, 0x64, + 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, + 0x65, 0x73, 0x74, 0x12, 0x1f, 0x0a, 0x05, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, 0x10, 0x01, 0x18, 0x14, 0x52, 0x05, 0x70, + 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x38, 0x0a, 0x16, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x1e, + 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x0a, 0xfa, 0x42, + 0x07, 0x72, 0x05, 0x10, 0x01, 0x18, 0xc8, 0x01, 0x52, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x22, 0xb3, + 0x01, 0x0a, 0x0b, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x12, 0x0e, + 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x18, + 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, + 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x1a, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, + 0x6c, 0x69, 0x74, 0x79, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, + 0x6c, 0x69, 0x74, 0x79, 0x12, 0x1f, 0x0a, 0x0b, 0x70, 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, + 0x6f, 0x64, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, 0x61, + 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x18, + 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x25, 0x0a, + 0x0e, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x5f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, + 0x06, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x73, 0x74, 0x72, 0x65, 0x65, 0x74, 0x41, 0x64, 0x64, + 0x72, 0x65, 0x73, 0x73, 0x22, 0xe2, 0x01, 0x0a, 0x18, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, + 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, + 0x74, 0x12, 0x22, 0x0a, 0x07, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x72, 0x79, 0x18, 0x01, 0x20, 0x01, + 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x07, 0x63, 0x6f, + 0x75, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x24, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, + 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, + 0x01, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x69, 0x74, 0x79, 0x12, 0x29, 0x0a, 0x0b, 0x70, + 0x6f, 0x73, 0x74, 0x61, 0x6c, 0x5f, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, + 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x0a, 0x70, 0x6f, 0x73, 0x74, + 0x61, 0x6c, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x20, 0x0a, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, + 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, + 0x52, 0x06, 0x72, 0x65, 0x67, 0x69, 0x6f, 0x6e, 0x12, 0x2f, 0x0a, 0x0e, 0x73, 0x74, 0x72, 0x65, + 0x65, 0x74, 0x5f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, + 0x42, 0x08, 0xfa, 0x42, 0x05, 0x72, 0x03, 0x18, 0xc8, 0x01, 0x52, 0x0d, 0x73, 0x74, 0x72, 0x65, + 0x65, 0x74, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x22, 0x1c, 0x0a, 0x0a, 0x50, 0x61, 0x73, + 0x73, 0x77, 0x6f, 0x72, 0x64, 0x49, 0x44, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x22, 0x38, 0x0a, 0x0f, 0x50, 0x61, 0x73, 0x73, 0x77, + 0x6f, 0x72, 0x64, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x25, 0x0a, 0x08, 0x70, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, + 0x06, 0x72, 0x04, 0x10, 0x01, 0x18, 0x48, 0x52, 0x08, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x22, 0x6c, 0x0a, 0x0e, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x12, 0x2c, 0x0a, 0x0c, 0x6f, 0x6c, 0x64, 0x5f, 0x70, 0x61, 0x73, 0x73, 0x77, + 0x6f, 0x72, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, + 0x10, 0x01, 0x18, 0x48, 0x52, 0x0b, 0x6f, 0x6c, 0x64, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x12, 0x2c, 0x0a, 0x0c, 0x6e, 0x65, 0x77, 0x5f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x42, 0x09, 0xfa, 0x42, 0x06, 0x72, 0x04, 0x10, 0x01, + 0x18, 0x48, 0x52, 0x0b, 0x6e, 0x65, 0x77, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x22, + 0x22, 0x0a, 0x0c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x12, + 0x12, 0x0a, 0x04, 0x63, 0x6f, 0x64, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x63, + 0x6f, 0x64, 0x65, 0x22, 0x44, 0x0a, 0x0c, 0x4d, 0x75, 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, + 0x6f, 0x72, 0x73, 0x12, 0x34, 0x0a, 0x04, 0x6d, 0x66, 0x61, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, + 0x0b, 0x32, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, + 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x75, 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, + 0x74, 0x6f, 0x72, 0x52, 0x04, 0x6d, 0x66, 0x61, 0x73, 0x22, 0x74, 0x0a, 0x0b, 0x4d, 0x75, 0x6c, + 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, 0x6f, 0x72, 0x12, 0x30, 0x0a, 0x04, 0x74, 0x79, 0x70, 0x65, + 0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1c, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x66, 0x61, + 0x54, 0x79, 0x70, 0x65, 0x52, 0x04, 0x74, 0x79, 0x70, 0x65, 0x12, 0x33, 0x0a, 0x05, 0x73, 0x74, + 0x61, 0x74, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1d, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x4d, 0x46, 0x41, 0x53, 0x74, 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x22, + 0x88, 0x01, 0x0a, 0x0e, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, + 0x73, 0x65, 0x12, 0x17, 0x0a, 0x07, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18, 0x01, 0x20, + 0x01, 0x28, 0x09, 0x52, 0x06, 0x75, 0x73, 0x65, 0x72, 0x49, 0x64, 0x12, 0x10, 0x0a, 0x03, 0x75, + 0x72, 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x6c, 0x12, 0x16, 0x0a, + 0x06, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x73, + 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x33, 0x0a, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x18, 0x04, + 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1d, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x46, 0x41, 0x53, 0x74, + 0x61, 0x74, 0x65, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x22, 0x52, 0x0a, 0x0e, 0x4f, 0x49, + 0x44, 0x43, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x41, 0x75, 0x74, 0x68, 0x12, 0x1b, 0x0a, 0x09, + 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x5f, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, + 0x08, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x49, 0x64, 0x12, 0x23, 0x0a, 0x0d, 0x63, 0x6c, 0x69, + 0x65, 0x6e, 0x74, 0x5f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, + 0x52, 0x0c, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x22, 0xa3, + 0x01, 0x0a, 0x19, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, + 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x16, 0x0a, 0x06, + 0x6f, 0x66, 0x66, 0x73, 0x65, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x6f, 0x66, + 0x66, 0x73, 0x65, 0x74, 0x12, 0x14, 0x0a, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x18, 0x02, 0x20, + 0x01, 0x28, 0x04, 0x52, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x12, 0x10, 0x0a, 0x03, 0x61, 0x73, + 0x63, 0x18, 0x04, 0x20, 0x01, 0x28, 0x08, 0x52, 0x03, 0x61, 0x73, 0x63, 0x12, 0x46, 0x0a, 0x07, + 0x71, 0x75, 0x65, 0x72, 0x69, 0x65, 0x73, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x2c, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, + 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x51, 0x75, 0x65, 0x72, 0x79, 0x52, 0x07, 0x71, 0x75, 0x65, + 0x72, 0x69, 0x65, 0x73, 0x22, 0xb2, 0x01, 0x0a, 0x17, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, + 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x51, 0x75, 0x65, 0x72, 0x79, + 0x12, 0x46, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x2a, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, + 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4b, 0x65, 0x79, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x82, 0x01, + 0x02, 0x20, 0x00, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x39, 0x0a, 0x06, 0x6d, 0x65, 0x74, 0x68, + 0x6f, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x53, + 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x52, 0x06, 0x6d, 0x65, 0x74, + 0x68, 0x6f, 0x64, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x03, 0x20, 0x01, + 0x28, 0x09, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x22, 0x9f, 0x01, 0x0a, 0x1a, 0x4d, 0x79, + 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, + 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x6f, 0x66, 0x66, 0x73, + 0x65, 0x74, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x6f, 0x66, 0x66, 0x73, 0x65, 0x74, + 0x12, 0x14, 0x0a, 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x04, 0x52, + 0x05, 0x6c, 0x69, 0x6d, 0x69, 0x74, 0x12, 0x21, 0x0a, 0x0c, 0x74, 0x6f, 0x74, 0x61, 0x6c, 0x5f, + 0x72, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x04, 0x52, 0x0b, 0x74, 0x6f, + 0x74, 0x61, 0x6c, 0x52, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x12, 0x30, 0x0a, 0x06, 0x72, 0x65, 0x73, + 0x75, 0x6c, 0x74, 0x18, 0x04, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x18, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x4f, 0x72, 0x67, 0x52, 0x06, 0x72, 0x65, 0x73, 0x75, 0x6c, 0x74, 0x22, 0x2c, 0x0a, 0x0f, 0x49, + 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x19, + 0x0a, 0x08, 0x69, 0x73, 0x5f, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, + 0x52, 0x07, 0x69, 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x22, 0x29, 0x0a, 0x03, 0x4f, 0x72, 0x67, + 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, + 0x12, 0x12, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, + 0x6e, 0x61, 0x6d, 0x65, 0x22, 0x31, 0x0a, 0x0d, 0x4d, 0x79, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, + 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x20, 0x0a, 0x0b, 0x70, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, + 0x69, 0x6f, 0x6e, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0b, 0x70, 0x65, 0x72, 0x6d, + 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2a, 0x72, 0x0a, 0x10, 0x55, 0x73, 0x65, 0x72, 0x53, + 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x20, 0x0a, 0x1c, 0x55, + 0x53, 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, + 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x1b, 0x0a, + 0x17, 0x55, 0x53, 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, + 0x45, 0x5f, 0x41, 0x43, 0x54, 0x49, 0x56, 0x45, 0x10, 0x01, 0x12, 0x1f, 0x0a, 0x1b, 0x55, 0x53, + 0x45, 0x52, 0x53, 0x45, 0x53, 0x53, 0x49, 0x4f, 0x4e, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x54, + 0x45, 0x52, 0x4d, 0x49, 0x4e, 0x41, 0x54, 0x45, 0x44, 0x10, 0x02, 0x2a, 0x71, 0x0a, 0x10, 0x4f, + 0x49, 0x44, 0x43, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65, 0x12, + 0x19, 0x0a, 0x15, 0x4f, 0x49, 0x44, 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, + 0x59, 0x50, 0x45, 0x5f, 0x43, 0x4f, 0x44, 0x45, 0x10, 0x00, 0x12, 0x1d, 0x0a, 0x19, 0x4f, 0x49, + 0x44, 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x49, + 0x44, 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x10, 0x01, 0x12, 0x23, 0x0a, 0x1f, 0x4f, 0x49, 0x44, + 0x43, 0x52, 0x45, 0x53, 0x50, 0x4f, 0x4e, 0x53, 0x45, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x49, 0x44, + 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x5f, 0x54, 0x4f, 0x4b, 0x45, 0x4e, 0x10, 0x02, 0x2a, 0xb0, + 0x01, 0x0a, 0x09, 0x55, 0x73, 0x65, 0x72, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x1a, 0x0a, 0x16, + 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, + 0x49, 0x45, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x14, 0x0a, 0x10, 0x55, 0x53, 0x45, 0x52, + 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x41, 0x43, 0x54, 0x49, 0x56, 0x45, 0x10, 0x01, 0x12, 0x16, + 0x0a, 0x12, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x49, 0x4e, 0x41, 0x43, + 0x54, 0x49, 0x56, 0x45, 0x10, 0x02, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, + 0x41, 0x54, 0x45, 0x5f, 0x44, 0x45, 0x4c, 0x45, 0x54, 0x45, 0x44, 0x10, 0x03, 0x12, 0x14, 0x0a, + 0x10, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x4c, 0x4f, 0x43, 0x4b, 0x45, + 0x44, 0x10, 0x04, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, + 0x5f, 0x53, 0x55, 0x53, 0x50, 0x45, 0x4e, 0x44, 0x10, 0x05, 0x12, 0x15, 0x0a, 0x11, 0x55, 0x53, + 0x45, 0x52, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x49, 0x4e, 0x49, 0x54, 0x49, 0x41, 0x4c, 0x10, + 0x06, 0x2a, 0x58, 0x0a, 0x06, 0x47, 0x65, 0x6e, 0x64, 0x65, 0x72, 0x12, 0x16, 0x0a, 0x12, 0x47, + 0x45, 0x4e, 0x44, 0x45, 0x52, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, + 0x44, 0x10, 0x00, 0x12, 0x11, 0x0a, 0x0d, 0x47, 0x45, 0x4e, 0x44, 0x45, 0x52, 0x5f, 0x46, 0x45, + 0x4d, 0x41, 0x4c, 0x45, 0x10, 0x01, 0x12, 0x0f, 0x0a, 0x0b, 0x47, 0x45, 0x4e, 0x44, 0x45, 0x52, + 0x5f, 0x4d, 0x41, 0x4c, 0x45, 0x10, 0x02, 0x12, 0x12, 0x0a, 0x0e, 0x47, 0x45, 0x4e, 0x44, 0x45, + 0x52, 0x5f, 0x44, 0x49, 0x56, 0x45, 0x52, 0x53, 0x45, 0x10, 0x03, 0x2a, 0x44, 0x0a, 0x07, 0x4d, + 0x66, 0x61, 0x54, 0x79, 0x70, 0x65, 0x12, 0x17, 0x0a, 0x13, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, + 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, + 0x0f, 0x0a, 0x0b, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x53, 0x4d, 0x53, 0x10, 0x01, + 0x12, 0x0f, 0x0a, 0x0b, 0x4d, 0x46, 0x41, 0x54, 0x59, 0x50, 0x45, 0x5f, 0x4f, 0x54, 0x50, 0x10, + 0x02, 0x2a, 0x66, 0x0a, 0x08, 0x4d, 0x46, 0x41, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x18, 0x0a, + 0x14, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, + 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x16, 0x0a, 0x12, 0x4d, 0x46, 0x41, 0x53, 0x54, + 0x41, 0x54, 0x45, 0x5f, 0x4e, 0x4f, 0x54, 0x5f, 0x52, 0x45, 0x41, 0x44, 0x59, 0x10, 0x01, 0x12, + 0x12, 0x0a, 0x0e, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x52, 0x45, 0x41, 0x44, + 0x59, 0x10, 0x02, 0x12, 0x14, 0x0a, 0x10, 0x4d, 0x46, 0x41, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, + 0x52, 0x45, 0x4d, 0x4f, 0x56, 0x45, 0x44, 0x10, 0x03, 0x2a, 0x62, 0x0a, 0x15, 0x4d, 0x79, 0x50, + 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4b, + 0x65, 0x79, 0x12, 0x25, 0x0a, 0x21, 0x4d, 0x59, 0x50, 0x52, 0x4f, 0x4a, 0x45, 0x43, 0x54, 0x4f, + 0x52, 0x47, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4b, 0x45, 0x59, 0x5f, 0x55, 0x4e, 0x53, 0x50, + 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x22, 0x0a, 0x1e, 0x4d, 0x59, 0x50, + 0x52, 0x4f, 0x4a, 0x45, 0x43, 0x54, 0x4f, 0x52, 0x47, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4b, + 0x45, 0x59, 0x5f, 0x4f, 0x52, 0x47, 0x5f, 0x4e, 0x41, 0x4d, 0x45, 0x10, 0x01, 0x2a, 0x60, 0x0a, + 0x0c, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x12, 0x17, 0x0a, + 0x13, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x45, 0x51, + 0x55, 0x41, 0x4c, 0x53, 0x10, 0x00, 0x12, 0x1c, 0x0a, 0x18, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, + 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x53, 0x54, 0x41, 0x52, 0x54, 0x53, 0x5f, 0x57, 0x49, + 0x54, 0x48, 0x10, 0x01, 0x12, 0x19, 0x0a, 0x15, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4d, 0x45, + 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x43, 0x4f, 0x4e, 0x54, 0x41, 0x49, 0x4e, 0x53, 0x10, 0x02, 0x32, + 0x96, 0x1a, 0x0a, 0x0b, 0x41, 0x75, 0x74, 0x68, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, + 0x4b, 0x0a, 0x07, 0x48, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x7a, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x10, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x0a, 0x12, 0x08, 0x2f, 0x68, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x7a, 0x12, 0x47, 0x0a, 0x05, + 0x52, 0x65, 0x61, 0x64, 0x79, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, + 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x16, 0x2e, + 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, + 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x0e, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x08, 0x12, 0x06, 0x2f, + 0x72, 0x65, 0x61, 0x64, 0x79, 0x12, 0x4e, 0x0a, 0x08, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, + 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, + 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x17, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x53, 0x74, 0x72, 0x75, + 0x63, 0x74, 0x22, 0x11, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x0b, 0x12, 0x09, 0x2f, 0x76, 0x61, 0x6c, + 0x69, 0x64, 0x61, 0x74, 0x65, 0x12, 0x7f, 0x0a, 0x11, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, + 0x65, 0x72, 0x53, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x25, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, + 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x53, 0x65, 0x73, + 0x73, 0x69, 0x6f, 0x6e, 0x56, 0x69, 0x65, 0x77, 0x73, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x12, 0x12, 0x10, 0x2f, 0x6d, 0x65, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x65, 0x73, 0x73, 0x69, + 0x6f, 0x6e, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, + 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x10, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, + 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, + 0x66, 0x69, 0x6c, 0x65, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x12, 0x11, 0x2f, 0x75, + 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x97, 0x01, 0x0a, 0x13, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, + 0x6c, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x55, 0x73, 0x65, 0x72, 0x50, 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x22, 0x2f, 0x82, 0xd3, 0xe4, + 0x93, 0x02, 0x16, 0x1a, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, + 0x72, 0x6f, 0x66, 0x69, 0x6c, 0x65, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x74, 0x0a, 0x0e, + 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x16, + 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, + 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, + 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x2a, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x11, 0x12, 0x0f, + 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x4d, 0x79, 0x55, + 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x52, 0x65, + 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, + 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, + 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x22, 0x2d, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x14, 0x1a, 0x0f, 0x2f, + 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x3a, 0x01, + 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, + 0x61, 0x74, 0x65, 0x64, 0x12, 0x91, 0x01, 0x0a, 0x11, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, + 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x45, 0x6d, 0x61, + 0x69, 0x6c, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, + 0x79, 0x22, 0x35, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1c, 0x22, 0x17, 0x2f, 0x75, 0x73, 0x65, 0x72, + 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, 0x61, 0x69, 0x6c, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, + 0x66, 0x79, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x92, 0x01, 0x0a, 0x1d, 0x52, 0x65, 0x73, + 0x65, 0x6e, 0x64, 0x4d, 0x79, 0x45, 0x6d, 0x61, 0x69, 0x6c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x4d, 0x61, 0x69, 0x6c, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x41, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x28, 0x22, 0x23, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x65, 0x6d, + 0x61, 0x69, 0x6c, 0x2f, 0x5f, 0x72, 0x65, 0x73, 0x65, 0x6e, 0x64, 0x76, 0x65, 0x72, 0x69, 0x66, + 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, + 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x74, 0x0a, + 0x0e, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, + 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, + 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, + 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x2a, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x11, 0x12, + 0x0f, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, + 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, + 0x74, 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x43, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x4d, 0x79, + 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2b, 0x2e, 0x7a, 0x69, 0x74, 0x61, + 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, + 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x52, + 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x1e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, + 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x22, 0x2d, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x14, 0x1a, 0x0f, + 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x3a, + 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x8f, 0x01, 0x0a, 0x11, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, + 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x12, 0x2b, 0x2e, 0x7a, 0x69, + 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, + 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x55, 0x73, 0x65, 0x72, 0x50, 0x68, 0x6f, 0x6e, + 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, + 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, + 0x22, 0x35, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1c, 0x22, 0x17, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, + 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, 0x6e, 0x65, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, + 0x79, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, + 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x92, 0x01, 0x0a, 0x1d, 0x52, 0x65, 0x73, 0x65, + 0x6e, 0x64, 0x4d, 0x79, 0x50, 0x68, 0x6f, 0x6e, 0x65, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x63, + 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x43, 0x6f, 0x64, 0x65, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, + 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, + 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, + 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x41, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x28, 0x22, 0x23, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x68, 0x6f, + 0x6e, 0x65, 0x2f, 0x5f, 0x72, 0x65, 0x73, 0x65, 0x6e, 0x64, 0x76, 0x65, 0x72, 0x69, 0x66, 0x69, + 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x10, + 0x47, 0x65, 0x74, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, + 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, + 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, + 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x13, 0x12, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x61, 0x64, + 0x64, 0x72, 0x65, 0x73, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x97, 0x01, 0x0a, 0x13, 0x55, 0x70, 0x64, + 0x61, 0x74, 0x65, 0x4d, 0x79, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, + 0x12, 0x2d, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, + 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x70, 0x64, 0x61, 0x74, 0x65, 0x55, 0x73, 0x65, + 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, + 0x20, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, + 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x41, 0x64, 0x64, 0x72, 0x65, 0x73, + 0x73, 0x22, 0x2f, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x16, 0x1a, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, + 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x3a, 0x01, 0x2a, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x71, 0x0a, 0x09, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x4d, 0x66, 0x61, 0x73, 0x12, + 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, + 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x75, + 0x6c, 0x74, 0x69, 0x46, 0x61, 0x63, 0x74, 0x6f, 0x72, 0x73, 0x22, 0x29, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x10, 0x12, 0x0e, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, + 0x61, 0x73, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x80, 0x01, 0x0a, 0x0d, 0x53, 0x65, 0x74, 0x4d, 0x79, 0x50, + 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x12, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x16, 0x2e, + 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, + 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x31, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x18, 0x1a, 0x13, 0x2f, + 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, + 0x64, 0x73, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x8a, 0x01, 0x0a, 0x10, 0x43, 0x68, 0x61, + 0x6e, 0x67, 0x65, 0x4d, 0x79, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x12, 0x23, 0x2e, + 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, + 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x43, 0x68, 0x61, 0x6e, + 0x67, 0x65, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, + 0x02, 0x20, 0x1a, 0x1b, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x70, 0x61, + 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x73, 0x2f, 0x5f, 0x63, 0x68, 0x61, 0x6e, 0x67, 0x65, 0x3a, + 0x01, 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, + 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x79, 0x0a, 0x09, 0x41, 0x64, 0x64, 0x4d, 0x66, 0x61, 0x4f, + 0x54, 0x50, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x23, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x4d, 0x66, 0x61, 0x4f, 0x74, 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, + 0x2f, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x16, 0x22, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, + 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, 0x2f, 0x6f, 0x74, 0x70, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0x8f, 0x01, 0x0a, 0x0c, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, 0x61, 0x4f, 0x54, + 0x50, 0x12, 0x21, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, + 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x79, 0x4d, 0x66, + 0x61, 0x4f, 0x74, 0x70, 0x1a, 0x23, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x66, 0x61, 0x4f, 0x74, + 0x70, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x37, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x1e, 0x1a, 0x19, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, + 0x2f, 0x6f, 0x74, 0x70, 0x2f, 0x5f, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x3a, 0x01, 0x2a, 0x82, + 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, + 0x65, 0x64, 0x12, 0x6c, 0x0a, 0x0c, 0x52, 0x65, 0x6d, 0x6f, 0x76, 0x65, 0x4d, 0x66, 0x61, 0x4f, + 0x54, 0x50, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, + 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, + 0x74, 0x79, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x2a, 0x11, 0x2f, 0x75, 0x73, 0x65, + 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, 0x2f, 0x6f, 0x74, 0x70, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0x5a, 0x0a, 0x0b, 0x47, 0x65, 0x74, 0x55, 0x73, 0x65, 0x72, 0x42, 0x79, 0x49, 0x44, 0x12, + 0x1b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, + 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x49, 0x44, 0x1a, 0x19, 0x2e, 0x7a, + 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, + 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x22, 0x13, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x0d, 0x12, + 0x0b, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x7b, 0x69, 0x64, 0x7d, 0x12, 0xb1, 0x01, 0x0a, + 0x13, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, + 0x4f, 0x72, 0x67, 0x73, 0x12, 0x2e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, + 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x71, + 0x75, 0x65, 0x73, 0x74, 0x1a, 0x2f, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, + 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x73, + 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x20, 0x22, 0x1b, 0x2f, + 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x6f, 0x72, + 0x67, 0x73, 0x2f, 0x5f, 0x73, 0x65, 0x61, 0x72, 0x63, 0x68, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, + 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, + 0x12, 0x7a, 0x0a, 0x0a, 0x49, 0x73, 0x49, 0x61, 0x6d, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x12, 0x16, + 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, + 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, + 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x49, 0x73, 0x41, + 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2e, 0x82, 0xd3, + 0xe4, 0x93, 0x02, 0x15, 0x12, 0x13, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x5f, 0x69, + 0x73, 0x69, 0x61, 0x6d, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x89, 0x01, 0x0a, + 0x17, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x5a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x50, 0x65, 0x72, + 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, + 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, + 0x1a, 0x22, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, + 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, + 0x69, 0x6f, 0x6e, 0x73, 0x22, 0x32, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x19, 0x12, 0x17, 0x2f, 0x70, + 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2f, 0x6d, 0x65, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, + 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x42, 0xb7, 0x01, 0x5a, 0x29, 0x67, 0x69, 0x74, + 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, 0x73, 0x2f, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, 0x74, 0x68, 0x2f, 0x61, 0x70, + 0x69, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x92, 0x41, 0x88, 0x01, 0x12, 0x3b, 0x0a, 0x08, 0x41, 0x75, + 0x74, 0x68, 0x20, 0x41, 0x50, 0x49, 0x22, 0x2a, 0x12, 0x28, 0x68, 0x74, 0x74, 0x70, 0x73, 0x3a, + 0x2f, 0x2f, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, + 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, + 0x74, 0x68, 0x32, 0x03, 0x30, 0x2e, 0x31, 0x2a, 0x01, 0x02, 0x32, 0x10, 0x61, 0x70, 0x70, 0x6c, + 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6a, 0x73, 0x6f, 0x6e, 0x32, 0x10, 0x61, 0x70, + 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x3a, 0x10, + 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6a, 0x73, 0x6f, 0x6e, + 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, + 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, } -func (m *VerifyUserInitRequest) Reset() { *m = VerifyUserInitRequest{} } -func (m *VerifyUserInitRequest) String() string { return proto.CompactTextString(m) } -func (*VerifyUserInitRequest) ProtoMessage() {} -func (*VerifyUserInitRequest) Descriptor() ([]byte, []int) { - return fileDescriptor_8bbd6f3875b0e874, []int{81} +var ( + file_auth_proto_rawDescOnce sync.Once + file_auth_proto_rawDescData = file_auth_proto_rawDesc +) + +func file_auth_proto_rawDescGZIP() []byte { + file_auth_proto_rawDescOnce.Do(func() { + file_auth_proto_rawDescData = protoimpl.X.CompressGZIP(file_auth_proto_rawDescData) + }) + return file_auth_proto_rawDescData } -func (m *VerifyUserInitRequest) XXX_Unmarshal(b []byte) error { - return xxx_messageInfo_VerifyUserInitRequest.Unmarshal(m, b) +var file_auth_proto_enumTypes = make([]protoimpl.EnumInfo, 8) +var file_auth_proto_msgTypes = make([]protoimpl.MessageInfo, 29) +var file_auth_proto_goTypes = []interface{}{ + (UserSessionState)(0), // 0: zitadel.auth.api.v1.UserSessionState + (OIDCResponseType)(0), // 1: zitadel.auth.api.v1.OIDCResponseType + (UserState)(0), // 2: zitadel.auth.api.v1.UserState + (Gender)(0), // 3: zitadel.auth.api.v1.Gender + (MfaType)(0), // 4: zitadel.auth.api.v1.MfaType + (MFAState)(0), // 5: zitadel.auth.api.v1.MFAState + (MyProjectOrgSearchKey)(0), // 6: zitadel.auth.api.v1.MyProjectOrgSearchKey + (SearchMethod)(0), // 7: zitadel.auth.api.v1.SearchMethod + (*UserSessionViews)(nil), // 8: zitadel.auth.api.v1.UserSessionViews + (*UserSessionView)(nil), // 9: zitadel.auth.api.v1.UserSessionView + (*UserID)(nil), // 10: zitadel.auth.api.v1.UserID + (*User)(nil), // 11: zitadel.auth.api.v1.User + (*UserProfile)(nil), // 12: zitadel.auth.api.v1.UserProfile + (*UpdateUserProfileRequest)(nil), // 13: zitadel.auth.api.v1.UpdateUserProfileRequest + (*UserEmail)(nil), // 14: zitadel.auth.api.v1.UserEmail + (*VerifyMyUserEmailRequest)(nil), // 15: zitadel.auth.api.v1.VerifyMyUserEmailRequest + (*VerifyUserEmailRequest)(nil), // 16: zitadel.auth.api.v1.VerifyUserEmailRequest + (*UpdateUserEmailRequest)(nil), // 17: zitadel.auth.api.v1.UpdateUserEmailRequest + (*UserPhone)(nil), // 18: zitadel.auth.api.v1.UserPhone + (*UpdateUserPhoneRequest)(nil), // 19: zitadel.auth.api.v1.UpdateUserPhoneRequest + (*VerifyUserPhoneRequest)(nil), // 20: zitadel.auth.api.v1.VerifyUserPhoneRequest + (*UserAddress)(nil), // 21: zitadel.auth.api.v1.UserAddress + (*UpdateUserAddressRequest)(nil), // 22: zitadel.auth.api.v1.UpdateUserAddressRequest + (*PasswordID)(nil), // 23: zitadel.auth.api.v1.PasswordID + (*PasswordRequest)(nil), // 24: zitadel.auth.api.v1.PasswordRequest + (*PasswordChange)(nil), // 25: zitadel.auth.api.v1.PasswordChange + (*VerifyMfaOtp)(nil), // 26: zitadel.auth.api.v1.VerifyMfaOtp + (*MultiFactors)(nil), // 27: zitadel.auth.api.v1.MultiFactors + (*MultiFactor)(nil), // 28: zitadel.auth.api.v1.MultiFactor + (*MfaOtpResponse)(nil), // 29: zitadel.auth.api.v1.MfaOtpResponse + (*OIDCClientAuth)(nil), // 30: zitadel.auth.api.v1.OIDCClientAuth + (*MyProjectOrgSearchRequest)(nil), // 31: zitadel.auth.api.v1.MyProjectOrgSearchRequest + (*MyProjectOrgSearchQuery)(nil), // 32: zitadel.auth.api.v1.MyProjectOrgSearchQuery + (*MyProjectOrgSearchResponse)(nil), // 33: zitadel.auth.api.v1.MyProjectOrgSearchResponse + (*IsAdminResponse)(nil), // 34: zitadel.auth.api.v1.IsAdminResponse + (*Org)(nil), // 35: zitadel.auth.api.v1.Org + (*MyPermissions)(nil), // 36: zitadel.auth.api.v1.MyPermissions + (*timestamp.Timestamp)(nil), // 37: google.protobuf.Timestamp + (*empty.Empty)(nil), // 38: google.protobuf.Empty + (*_struct.Struct)(nil), // 39: google.protobuf.Struct } -func (m *VerifyUserInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { - return xxx_messageInfo_VerifyUserInitRequest.Marshal(b, m, deterministic) -} -func (m *VerifyUserInitRequest) XXX_Merge(src proto.Message) { - xxx_messageInfo_VerifyUserInitRequest.Merge(m, src) -} -func (m *VerifyUserInitRequest) XXX_Size() int { - return xxx_messageInfo_VerifyUserInitRequest.Size(m) -} -func (m *VerifyUserInitRequest) XXX_DiscardUnknown() { - xxx_messageInfo_VerifyUserInitRequest.DiscardUnknown(m) +var file_auth_proto_depIdxs = []int32{ + 9, // 0: zitadel.auth.api.v1.UserSessionViews.user_sessions:type_name -> zitadel.auth.api.v1.UserSessionView + 0, // 1: zitadel.auth.api.v1.UserSessionView.auth_state:type_name -> zitadel.auth.api.v1.UserSessionState + 2, // 2: zitadel.auth.api.v1.User.state:type_name -> zitadel.auth.api.v1.UserState + 37, // 3: zitadel.auth.api.v1.User.creation_date:type_name -> google.protobuf.Timestamp + 37, // 4: zitadel.auth.api.v1.User.activation_date:type_name -> google.protobuf.Timestamp + 37, // 5: zitadel.auth.api.v1.User.change_date:type_name -> google.protobuf.Timestamp + 37, // 6: zitadel.auth.api.v1.User.last_login:type_name -> google.protobuf.Timestamp + 37, // 7: zitadel.auth.api.v1.User.password_changed:type_name -> google.protobuf.Timestamp + 3, // 8: zitadel.auth.api.v1.User.gender:type_name -> zitadel.auth.api.v1.Gender + 3, // 9: zitadel.auth.api.v1.UserProfile.gender:type_name -> zitadel.auth.api.v1.Gender + 3, // 10: zitadel.auth.api.v1.UpdateUserProfileRequest.gender:type_name -> zitadel.auth.api.v1.Gender + 28, // 11: zitadel.auth.api.v1.MultiFactors.mfas:type_name -> zitadel.auth.api.v1.MultiFactor + 4, // 12: zitadel.auth.api.v1.MultiFactor.type:type_name -> zitadel.auth.api.v1.MfaType + 5, // 13: zitadel.auth.api.v1.MultiFactor.state:type_name -> zitadel.auth.api.v1.MFAState + 5, // 14: zitadel.auth.api.v1.MfaOtpResponse.state:type_name -> zitadel.auth.api.v1.MFAState + 32, // 15: zitadel.auth.api.v1.MyProjectOrgSearchRequest.queries:type_name -> zitadel.auth.api.v1.MyProjectOrgSearchQuery + 6, // 16: zitadel.auth.api.v1.MyProjectOrgSearchQuery.key:type_name -> zitadel.auth.api.v1.MyProjectOrgSearchKey + 7, // 17: zitadel.auth.api.v1.MyProjectOrgSearchQuery.method:type_name -> zitadel.auth.api.v1.SearchMethod + 35, // 18: zitadel.auth.api.v1.MyProjectOrgSearchResponse.result:type_name -> zitadel.auth.api.v1.Org + 38, // 19: zitadel.auth.api.v1.AuthService.Healthz:input_type -> google.protobuf.Empty + 38, // 20: zitadel.auth.api.v1.AuthService.Ready:input_type -> google.protobuf.Empty + 38, // 21: zitadel.auth.api.v1.AuthService.Validate:input_type -> google.protobuf.Empty + 38, // 22: zitadel.auth.api.v1.AuthService.GetMyUserSessions:input_type -> google.protobuf.Empty + 38, // 23: zitadel.auth.api.v1.AuthService.GetMyUserProfile:input_type -> google.protobuf.Empty + 13, // 24: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:input_type -> zitadel.auth.api.v1.UpdateUserProfileRequest + 38, // 25: zitadel.auth.api.v1.AuthService.GetMyUserEmail:input_type -> google.protobuf.Empty + 17, // 26: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:input_type -> zitadel.auth.api.v1.UpdateUserEmailRequest + 15, // 27: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:input_type -> zitadel.auth.api.v1.VerifyMyUserEmailRequest + 38, // 28: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:input_type -> google.protobuf.Empty + 38, // 29: zitadel.auth.api.v1.AuthService.GetMyUserPhone:input_type -> google.protobuf.Empty + 19, // 30: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:input_type -> zitadel.auth.api.v1.UpdateUserPhoneRequest + 20, // 31: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:input_type -> zitadel.auth.api.v1.VerifyUserPhoneRequest + 38, // 32: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:input_type -> google.protobuf.Empty + 38, // 33: zitadel.auth.api.v1.AuthService.GetMyUserAddress:input_type -> google.protobuf.Empty + 22, // 34: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:input_type -> zitadel.auth.api.v1.UpdateUserAddressRequest + 38, // 35: zitadel.auth.api.v1.AuthService.GetMyMfas:input_type -> google.protobuf.Empty + 24, // 36: zitadel.auth.api.v1.AuthService.SetMyPassword:input_type -> zitadel.auth.api.v1.PasswordRequest + 25, // 37: zitadel.auth.api.v1.AuthService.ChangeMyPassword:input_type -> zitadel.auth.api.v1.PasswordChange + 38, // 38: zitadel.auth.api.v1.AuthService.AddMfaOTP:input_type -> google.protobuf.Empty + 26, // 39: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:input_type -> zitadel.auth.api.v1.VerifyMfaOtp + 38, // 40: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:input_type -> google.protobuf.Empty + 10, // 41: zitadel.auth.api.v1.AuthService.GetUserByID:input_type -> zitadel.auth.api.v1.UserID + 31, // 42: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:input_type -> zitadel.auth.api.v1.MyProjectOrgSearchRequest + 38, // 43: zitadel.auth.api.v1.AuthService.IsIamAdmin:input_type -> google.protobuf.Empty + 38, // 44: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:input_type -> google.protobuf.Empty + 38, // 45: zitadel.auth.api.v1.AuthService.Healthz:output_type -> google.protobuf.Empty + 38, // 46: zitadel.auth.api.v1.AuthService.Ready:output_type -> google.protobuf.Empty + 39, // 47: zitadel.auth.api.v1.AuthService.Validate:output_type -> google.protobuf.Struct + 8, // 48: zitadel.auth.api.v1.AuthService.GetMyUserSessions:output_type -> zitadel.auth.api.v1.UserSessionViews + 12, // 49: zitadel.auth.api.v1.AuthService.GetMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 12, // 50: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 14, // 51: zitadel.auth.api.v1.AuthService.GetMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 14, // 52: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 38, // 53: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:output_type -> google.protobuf.Empty + 38, // 54: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:output_type -> google.protobuf.Empty + 18, // 55: zitadel.auth.api.v1.AuthService.GetMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 18, // 56: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 38, // 57: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:output_type -> google.protobuf.Empty + 38, // 58: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:output_type -> google.protobuf.Empty + 21, // 59: zitadel.auth.api.v1.AuthService.GetMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 21, // 60: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 27, // 61: zitadel.auth.api.v1.AuthService.GetMyMfas:output_type -> zitadel.auth.api.v1.MultiFactors + 38, // 62: zitadel.auth.api.v1.AuthService.SetMyPassword:output_type -> google.protobuf.Empty + 38, // 63: zitadel.auth.api.v1.AuthService.ChangeMyPassword:output_type -> google.protobuf.Empty + 29, // 64: zitadel.auth.api.v1.AuthService.AddMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 29, // 65: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 38, // 66: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:output_type -> google.protobuf.Empty + 11, // 67: zitadel.auth.api.v1.AuthService.GetUserByID:output_type -> zitadel.auth.api.v1.User + 33, // 68: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:output_type -> zitadel.auth.api.v1.MyProjectOrgSearchResponse + 34, // 69: zitadel.auth.api.v1.AuthService.IsIamAdmin:output_type -> zitadel.auth.api.v1.IsAdminResponse + 36, // 70: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:output_type -> zitadel.auth.api.v1.MyPermissions + 45, // [45:71] is the sub-list for method output_type + 19, // [19:45] is the sub-list for method input_type + 19, // [19:19] is the sub-list for extension type_name + 19, // [19:19] is the sub-list for extension extendee + 0, // [0:19] is the sub-list for field type_name } -var xxx_messageInfo_VerifyUserInitRequest proto.InternalMessageInfo - -func (m *VerifyUserInitRequest) GetId() string { - if m != nil { - return m.Id +func init() { file_auth_proto_init() } +func file_auth_proto_init() { + if File_auth_proto != nil { + return } - return "" -} - -func (m *VerifyUserInitRequest) GetCode() string { - if m != nil { - return m.Code + if !protoimpl.UnsafeEnabled { + file_auth_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserSessionViews); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserSessionView); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserID); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*User); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserProfile); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserProfileRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserEmail); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyMyUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserEmailRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserPhone); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserPhoneRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyUserPhoneRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UserAddress); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*UpdateUserAddressRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordID); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*PasswordChange); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*VerifyMfaOtp); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MultiFactors); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MultiFactor); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MfaOtpResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*OIDCClientAuth); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchQuery); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[25].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyProjectOrgSearchResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[26].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*IsAdminResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[27].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*Org); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_auth_proto_msgTypes[28].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*MyPermissions); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } } - return "" -} - -func (m *VerifyUserInitRequest) GetPassword() string { - if m != nil { - return m.Password - } - return "" -} - -func init() { - proto.RegisterEnum("zitadel.auth.api.v1.UserAgentState", UserAgentState_name, UserAgentState_value) - proto.RegisterEnum("zitadel.auth.api.v1.UserSessionState", UserSessionState_name, UserSessionState_value) - proto.RegisterEnum("zitadel.auth.api.v1.NextStepType", NextStepType_name, NextStepType_value) - proto.RegisterEnum("zitadel.auth.api.v1.AuthSessionType", AuthSessionType_name, AuthSessionType_value) - proto.RegisterEnum("zitadel.auth.api.v1.Prompt", Prompt_name, Prompt_value) - proto.RegisterEnum("zitadel.auth.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) - proto.RegisterEnum("zitadel.auth.api.v1.CodeChallengeMethod", CodeChallengeMethod_name, CodeChallengeMethod_value) - proto.RegisterEnum("zitadel.auth.api.v1.UserState", UserState_name, UserState_value) - proto.RegisterEnum("zitadel.auth.api.v1.Gender", Gender_name, Gender_value) - proto.RegisterEnum("zitadel.auth.api.v1.NotificationType", NotificationType_name, NotificationType_value) - proto.RegisterEnum("zitadel.auth.api.v1.MfaType", MfaType_name, MfaType_value) - proto.RegisterEnum("zitadel.auth.api.v1.MFAState", MFAState_name, MFAState_value) - proto.RegisterEnum("zitadel.auth.api.v1.AppState", AppState_name, AppState_value) - proto.RegisterEnum("zitadel.auth.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) - proto.RegisterEnum("zitadel.auth.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) - proto.RegisterEnum("zitadel.auth.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) - proto.RegisterEnum("zitadel.auth.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) - proto.RegisterEnum("zitadel.auth.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) - proto.RegisterEnum("zitadel.auth.api.v1.GrantSearchKey", GrantSearchKey_name, GrantSearchKey_value) - proto.RegisterEnum("zitadel.auth.api.v1.MyProjectOrgSearchKey", MyProjectOrgSearchKey_name, MyProjectOrgSearchKey_value) - proto.RegisterType((*SessionRequest)(nil), "zitadel.auth.api.v1.SessionRequest") - proto.RegisterType((*UserAgent)(nil), "zitadel.auth.api.v1.UserAgent") - proto.RegisterType((*UserAgentID)(nil), "zitadel.auth.api.v1.UserAgentID") - proto.RegisterType((*UserAgentCreation)(nil), "zitadel.auth.api.v1.UserAgentCreation") - proto.RegisterType((*UserAgents)(nil), "zitadel.auth.api.v1.UserAgents") - proto.RegisterType((*AuthSessionCreation)(nil), "zitadel.auth.api.v1.AuthSessionCreation") - proto.RegisterType((*AuthSessionResponse)(nil), "zitadel.auth.api.v1.AuthSessionResponse") - proto.RegisterType((*AuthSessionView)(nil), "zitadel.auth.api.v1.AuthSessionView") - proto.RegisterType((*TokenID)(nil), "zitadel.auth.api.v1.TokenID") - proto.RegisterType((*UserSessionID)(nil), "zitadel.auth.api.v1.UserSessionID") - proto.RegisterType((*UserSessions)(nil), "zitadel.auth.api.v1.UserSessions") - proto.RegisterType((*UserSession)(nil), "zitadel.auth.api.v1.UserSession") - proto.RegisterType((*UserSessionViews)(nil), "zitadel.auth.api.v1.UserSessionViews") - proto.RegisterType((*UserSessionView)(nil), "zitadel.auth.api.v1.UserSessionView") - proto.RegisterType((*AuthUser)(nil), "zitadel.auth.api.v1.AuthUser") - proto.RegisterType((*AuthSessionID)(nil), "zitadel.auth.api.v1.AuthSessionID") - proto.RegisterType((*SelectUserRequest)(nil), "zitadel.auth.api.v1.SelectUserRequest") - proto.RegisterType((*VerifyUserRequest)(nil), "zitadel.auth.api.v1.VerifyUserRequest") - proto.RegisterType((*VerifyPasswordRequest)(nil), "zitadel.auth.api.v1.VerifyPasswordRequest") - proto.RegisterType((*VerifyMfaRequest)(nil), "zitadel.auth.api.v1.VerifyMfaRequest") - proto.RegisterType((*AuthSessionMultiFactorOTP)(nil), "zitadel.auth.api.v1.AuthSessionMultiFactorOTP") - proto.RegisterType((*NextStep)(nil), "zitadel.auth.api.v1.NextStep") - proto.RegisterType((*LoginData)(nil), "zitadel.auth.api.v1.LoginData") - proto.RegisterType((*PasswordData)(nil), "zitadel.auth.api.v1.PasswordData") - proto.RegisterType((*MfaVerifyData)(nil), "zitadel.auth.api.v1.MfaVerifyData") - proto.RegisterType((*MfaPromptData)(nil), "zitadel.auth.api.v1.MfaPromptData") - proto.RegisterType((*ChooseUserData)(nil), "zitadel.auth.api.v1.ChooseUserData") - proto.RegisterType((*ChooseUser)(nil), "zitadel.auth.api.v1.ChooseUser") - proto.RegisterType((*SkipMfaInitRequest)(nil), "zitadel.auth.api.v1.SkipMfaInitRequest") - proto.RegisterType((*BrowserInformation)(nil), "zitadel.auth.api.v1.BrowserInformation") - proto.RegisterType((*IP)(nil), "zitadel.auth.api.v1.IP") - proto.RegisterType((*AuthRequestOIDC)(nil), "zitadel.auth.api.v1.AuthRequestOIDC") - proto.RegisterType((*CodeChallenge)(nil), "zitadel.auth.api.v1.CodeChallenge") - proto.RegisterType((*UserID)(nil), "zitadel.auth.api.v1.UserID") - proto.RegisterType((*UniqueUserRequest)(nil), "zitadel.auth.api.v1.UniqueUserRequest") - proto.RegisterType((*UniqueUserResponse)(nil), "zitadel.auth.api.v1.UniqueUserResponse") - proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.auth.api.v1.RegisterUserRequest") - proto.RegisterType((*RegisterUserExternalIDPRequest)(nil), "zitadel.auth.api.v1.RegisterUserExternalIDPRequest") - proto.RegisterType((*IDPProvider)(nil), "zitadel.auth.api.v1.IDPProvider") - proto.RegisterType((*User)(nil), "zitadel.auth.api.v1.User") - proto.RegisterType((*UserProfile)(nil), "zitadel.auth.api.v1.UserProfile") - proto.RegisterType((*UpdateUserProfileRequest)(nil), "zitadel.auth.api.v1.UpdateUserProfileRequest") - proto.RegisterType((*UserEmail)(nil), "zitadel.auth.api.v1.UserEmail") - proto.RegisterType((*VerifyMyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyMyUserEmailRequest") - proto.RegisterType((*VerifyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyUserEmailRequest") - proto.RegisterType((*UpdateUserEmailRequest)(nil), "zitadel.auth.api.v1.UpdateUserEmailRequest") - proto.RegisterType((*UserPhone)(nil), "zitadel.auth.api.v1.UserPhone") - proto.RegisterType((*UpdateUserPhoneRequest)(nil), "zitadel.auth.api.v1.UpdateUserPhoneRequest") - proto.RegisterType((*VerifyUserPhoneRequest)(nil), "zitadel.auth.api.v1.VerifyUserPhoneRequest") - proto.RegisterType((*UserAddress)(nil), "zitadel.auth.api.v1.UserAddress") - proto.RegisterType((*UpdateUserAddressRequest)(nil), "zitadel.auth.api.v1.UpdateUserAddressRequest") - proto.RegisterType((*PasswordID)(nil), "zitadel.auth.api.v1.PasswordID") - proto.RegisterType((*PasswordRequest)(nil), "zitadel.auth.api.v1.PasswordRequest") - proto.RegisterType((*ResetPasswordRequest)(nil), "zitadel.auth.api.v1.ResetPasswordRequest") - proto.RegisterType((*ResetPassword)(nil), "zitadel.auth.api.v1.ResetPassword") - proto.RegisterType((*SetPasswordNotificationRequest)(nil), "zitadel.auth.api.v1.SetPasswordNotificationRequest") - proto.RegisterType((*PasswordChange)(nil), "zitadel.auth.api.v1.PasswordChange") - proto.RegisterType((*VerifyMfaOtp)(nil), "zitadel.auth.api.v1.VerifyMfaOtp") - proto.RegisterType((*MultiFactors)(nil), "zitadel.auth.api.v1.MultiFactors") - proto.RegisterType((*MultiFactor)(nil), "zitadel.auth.api.v1.MultiFactor") - proto.RegisterType((*MfaOtpResponse)(nil), "zitadel.auth.api.v1.MfaOtpResponse") - proto.RegisterType((*ApplicationID)(nil), "zitadel.auth.api.v1.ApplicationID") - proto.RegisterType((*Application)(nil), "zitadel.auth.api.v1.Application") - proto.RegisterType((*OIDCConfig)(nil), "zitadel.auth.api.v1.OIDCConfig") - proto.RegisterType((*ApplicationSearchRequest)(nil), "zitadel.auth.api.v1.ApplicationSearchRequest") - proto.RegisterType((*ApplicationSearchQuery)(nil), "zitadel.auth.api.v1.ApplicationSearchQuery") - proto.RegisterType((*ApplicationSearchResponse)(nil), "zitadel.auth.api.v1.ApplicationSearchResponse") - proto.RegisterType((*ApplicationAuthorizeRequest)(nil), "zitadel.auth.api.v1.ApplicationAuthorizeRequest") - proto.RegisterType((*OIDCClientAuth)(nil), "zitadel.auth.api.v1.OIDCClientAuth") - proto.RegisterType((*GrantSearchRequest)(nil), "zitadel.auth.api.v1.GrantSearchRequest") - proto.RegisterType((*GrantSearchQuery)(nil), "zitadel.auth.api.v1.GrantSearchQuery") - proto.RegisterType((*GrantSearchResponse)(nil), "zitadel.auth.api.v1.GrantSearchResponse") - proto.RegisterType((*Grant)(nil), "zitadel.auth.api.v1.Grant") - proto.RegisterType((*MyProjectOrgSearchRequest)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchRequest") - proto.RegisterType((*MyProjectOrgSearchQuery)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchQuery") - proto.RegisterType((*MyProjectOrgSearchResponse)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchResponse") - proto.RegisterType((*IsAdminResponse)(nil), "zitadel.auth.api.v1.IsAdminResponse") - proto.RegisterType((*Org)(nil), "zitadel.auth.api.v1.Org") - proto.RegisterType((*CreateTokenRequest)(nil), "zitadel.auth.api.v1.CreateTokenRequest") - proto.RegisterType((*Token)(nil), "zitadel.auth.api.v1.Token") - proto.RegisterType((*MyPermissions)(nil), "zitadel.auth.api.v1.MyPermissions") - proto.RegisterType((*VerifyUserInitRequest)(nil), "zitadel.auth.api.v1.VerifyUserInitRequest") -} - -func init() { proto.RegisterFile("auth.proto", fileDescriptor_8bbd6f3875b0e874) } - -var fileDescriptor_8bbd6f3875b0e874 = []byte{ - // 6219 bytes of a gzipped FileDescriptorProto - 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7c, 0xdd, 0x6f, 0x1b, 0xd9, - 0x75, 0xb8, 0x87, 0xa4, 0x3e, 0x78, 0x48, 0x4a, 0xa3, 0x2b, 0x59, 0xa6, 0x28, 0x7f, 0xc8, 0x63, - 0x3b, 0xb6, 0xb5, 0x6b, 0x71, 0xd7, 0xfb, 0x91, 0xb5, 0xf3, 0xc3, 0x6f, 0x43, 0x91, 0x63, 0x89, - 0x6b, 0x89, 0x64, 0x86, 0xb4, 0x37, 0xbb, 0x45, 0xca, 0x8c, 0xc9, 0x2b, 0x7a, 0xd6, 0x24, 0x87, - 0x9e, 0x19, 0xca, 0xab, 0x6d, 0x17, 0x2d, 0xb6, 0x41, 0x90, 0xe6, 0x25, 0x69, 0xfa, 0x11, 0x20, - 0x2d, 0x10, 0xa0, 0x2d, 0x0a, 0x14, 0x08, 0xd0, 0xb4, 0x45, 0xd3, 0xbc, 0xe5, 0xb5, 0xef, 0xed, - 0x5f, 0x10, 0x14, 0x28, 0xd2, 0xfc, 0x01, 0x05, 0x16, 0x6d, 0x51, 0xdc, 0x8f, 0x19, 0xde, 0x19, - 0xce, 0x90, 0x54, 0x6c, 0xe7, 0x29, 0x4f, 0xd2, 0xdc, 0x7b, 0xee, 0x39, 0xe7, 0x9e, 0xaf, 0x7b, - 0xee, 0x99, 0x33, 0x04, 0xd0, 0x87, 0xce, 0xe3, 0x9d, 0x81, 0x65, 0x3a, 0x26, 0x5a, 0xfd, 0xc4, - 0x70, 0xf4, 0x36, 0xee, 0xee, 0xd0, 0x31, 0x7d, 0x60, 0xec, 0x1c, 0xbf, 0x9e, 0x3b, 0xdf, 0x31, - 0xcd, 0x4e, 0x17, 0xe7, 0xf5, 0x81, 0x91, 0xd7, 0xfb, 0x7d, 0xd3, 0xd1, 0x1d, 0xc3, 0xec, 0xdb, - 0x6c, 0x49, 0x6e, 0x93, 0xcf, 0xd2, 0xa7, 0x47, 0xc3, 0xa3, 0x3c, 0xee, 0x0d, 0x9c, 0x13, 0x3e, - 0x79, 0x3e, 0x38, 0x69, 0x3b, 0xd6, 0xb0, 0xe5, 0xf0, 0xd9, 0x4b, 0xc1, 0x59, 0xc7, 0xe8, 0x61, - 0xdb, 0xd1, 0x7b, 0x03, 0x0e, 0x70, 0xee, 0x58, 0xef, 0x1a, 0x6d, 0xdd, 0xc1, 0x79, 0xf7, 0x1f, - 0x3e, 0xf1, 0x2a, 0xfd, 0xd3, 0xba, 0xd5, 0xc1, 0xfd, 0x5b, 0xf6, 0x33, 0xbd, 0xd3, 0xc1, 0x56, - 0xde, 0x1c, 0x50, 0xb6, 0x42, 0x58, 0xcc, 0x92, 0xdd, 0xb0, 0x69, 0x17, 0x8a, 0xcd, 0x28, 0x43, - 0x58, 0xaa, 0x63, 0xdb, 0x36, 0xcc, 0xbe, 0x86, 0x9f, 0x0e, 0xb1, 0xed, 0xa0, 0x73, 0xb0, 0x30, - 0xb4, 0xb1, 0xd5, 0x34, 0xda, 0x59, 0x69, 0x4b, 0xba, 0x91, 0xd4, 0xe6, 0xc9, 0x63, 0xb9, 0x8d, - 0xde, 0x83, 0xf4, 0x23, 0xcb, 0x7c, 0x46, 0xe7, 0xfa, 0x47, 0x66, 0x36, 0xb6, 0x25, 0xdd, 0x48, - 0xdd, 0xbe, 0xbe, 0x13, 0x22, 0xb1, 0x9d, 0x5d, 0x06, 0x58, 0xee, 0x1f, 0x99, 0x56, 0x8f, 0xb2, - 0xa2, 0xa5, 0x1e, 0x8d, 0xc6, 0x94, 0xbf, 0x94, 0x20, 0xf9, 0xc0, 0xc6, 0x56, 0xa1, 0x83, 0xfb, - 0x0e, 0x5a, 0x82, 0x98, 0x47, 0x2d, 0x66, 0xbc, 0x50, 0x4a, 0xe8, 0x0e, 0xcc, 0xd9, 0x8e, 0xee, - 0xe0, 0x6c, 0x7c, 0x4b, 0xba, 0xb1, 0x74, 0xfb, 0x4a, 0x28, 0x12, 0x8f, 0x95, 0x3a, 0x01, 0xd5, - 0xd8, 0x0a, 0xe5, 0x02, 0xa4, 0xbc, 0x89, 0x72, 0x29, 0xc8, 0xa5, 0x62, 0xc0, 0x8a, 0x37, 0x5d, - 0xb4, 0x30, 0xa5, 0x8d, 0x1a, 0x01, 0xd6, 0xa5, 0x53, 0xb1, 0xbe, 0xbb, 0xf8, 0xf9, 0xee, 0xdc, - 0xb7, 0xa5, 0x98, 0x2c, 0xf9, 0xc5, 0xb5, 0x0f, 0xe0, 0x91, 0xb2, 0xd1, 0x5d, 0x58, 0xb4, 0x99, - 0xce, 0xec, 0xac, 0xb4, 0x15, 0xbf, 0x91, 0xba, 0x7d, 0x71, 0xf2, 0xae, 0x34, 0x0f, 0x5e, 0xf9, - 0xaf, 0x04, 0xac, 0x16, 0x86, 0xce, 0x63, 0xae, 0x74, 0x8f, 0x6f, 0x05, 0x16, 0x75, 0x02, 0xea, - 0xa9, 0x7d, 0x77, 0xe1, 0xf3, 0xdd, 0x84, 0x45, 0x38, 0x59, 0xa0, 0x13, 0xe5, 0x36, 0x7a, 0x07, - 0x12, 0xce, 0xc9, 0x00, 0x53, 0x75, 0x2c, 0xdd, 0xbe, 0x1a, 0x4a, 0x53, 0xc0, 0xdd, 0x38, 0x19, - 0x60, 0x8d, 0xae, 0x18, 0x93, 0x4a, 0xfc, 0x45, 0x48, 0x05, 0x5d, 0x85, 0x64, 0xab, 0x6b, 0x70, - 0xa6, 0x13, 0x7e, 0xa6, 0x17, 0xd9, 0x4c, 0xb9, 0x8d, 0xb6, 0x21, 0x6d, 0xe1, 0xb6, 0x61, 0xe1, - 0x96, 0xd3, 0x1c, 0x5a, 0x46, 0x76, 0xce, 0x0f, 0x98, 0x72, 0x27, 0x1f, 0x58, 0x06, 0x5a, 0x73, - 0x8d, 0x65, 0x9e, 0x6a, 0x99, 0x3d, 0xa0, 0x37, 0x60, 0x7e, 0x60, 0x99, 0xbd, 0x81, 0x93, 0x5d, - 0xa0, 0x3b, 0xdf, 0x0c, 0xe5, 0xbb, 0x46, 0x41, 0x34, 0x0e, 0x8a, 0xde, 0x85, 0xf3, 0x64, 0xb6, - 0xd9, 0x32, 0xfb, 0x0e, 0xfe, 0xd8, 0x69, 0xb6, 0xba, 0xba, 0x6d, 0x37, 0x2d, 0x7c, 0x84, 0x2d, - 0xdc, 0x6f, 0xe1, 0xec, 0xe2, 0x56, 0xfc, 0x46, 0x52, 0xdb, 0x20, 0x30, 0x45, 0x06, 0x52, 0x24, - 0x10, 0x9a, 0x0b, 0x80, 0x2e, 0x00, 0x0c, 0x8d, 0x66, 0xd7, 0x6c, 0xe9, 0x5d, 0x6c, 0x67, 0x93, - 0x14, 0x3c, 0x39, 0x34, 0x0e, 0xd8, 0x00, 0x99, 0xee, 0x9a, 0x1d, 0xa3, 0xdf, 0x7c, 0x6c, 0xf4, - 0x9d, 0x2c, 0x50, 0x7e, 0x93, 0x74, 0x64, 0xdf, 0xe8, 0x53, 0x2f, 0xee, 0xe9, 0x1f, 0x37, 0xf5, - 0x0e, 0xce, 0xa6, 0xb6, 0xa4, 0x1b, 0x19, 0x6d, 0xbe, 0xa7, 0x7f, 0x5c, 0xe8, 0x60, 0x74, 0x17, - 0x12, 0xa6, 0xd1, 0x6e, 0x65, 0xd3, 0x54, 0x05, 0xd1, 0x4a, 0xe4, 0xe1, 0xa0, 0x5a, 0x2e, 0x15, - 0xf7, 0xcf, 0x68, 0x74, 0x0d, 0xda, 0x81, 0xd5, 0x81, 0x85, 0x6d, 0xdc, 0xc5, 0x2d, 0x07, 0xb7, - 0x9b, 0x6e, 0x98, 0xc8, 0x50, 0xe2, 0x2b, 0xc2, 0xd4, 0x03, 0x1a, 0x31, 0x76, 0x53, 0x90, 0x24, - 0xea, 0xa7, 0x3a, 0x57, 0x7e, 0x38, 0xe7, 0xb3, 0x3c, 0x0d, 0xdb, 0x03, 0xb3, 0x6f, 0x63, 0xb4, - 0x11, 0xb4, 0xbc, 0x91, 0xc1, 0x31, 0x8f, 0x8b, 0x79, 0x71, 0xc1, 0x35, 0xc0, 0xf8, 0xa9, 0x0d, - 0x70, 0x73, 0xcc, 0x54, 0x04, 0x0b, 0xb9, 0x1c, 0x66, 0x21, 0xbf, 0x31, 0x8c, 0x53, 0x18, 0x46, - 0x09, 0x96, 0x06, 0xa6, 0x6d, 0x1b, 0x8f, 0xba, 0xb8, 0x69, 0x3b, 0x78, 0x60, 0x67, 0x33, 0x34, - 0x2e, 0x5d, 0x08, 0xc5, 0x52, 0xc1, 0x1f, 0x3b, 0x75, 0x07, 0x0f, 0xb4, 0x8c, 0xbb, 0x88, 0x3c, - 0xd9, 0xe8, 0x55, 0x40, 0x03, 0xcb, 0xfc, 0x88, 0xa8, 0xc1, 0x53, 0x96, 0x9d, 0x5d, 0xa2, 0x1b, - 0x94, 0xf9, 0x4c, 0x91, 0x2b, 0xcd, 0x46, 0x45, 0x48, 0x53, 0x03, 0xe4, 0xa1, 0x2d, 0xbb, 0x4c, - 0xf9, 0xde, 0x8a, 0x8c, 0x84, 0xae, 0xdd, 0xa5, 0x86, 0xa3, 0x07, 0xbf, 0x85, 0xfe, 0x77, 0x0c, - 0x96, 0x05, 0xf3, 0x79, 0x68, 0xe0, 0x67, 0x93, 0xac, 0xf3, 0x0b, 0xb0, 0x4c, 0x15, 0xc9, 0x19, - 0x68, 0x7a, 0xa6, 0x9a, 0xd1, 0x47, 0x48, 0xca, 0x2f, 0xcd, 0x6a, 0xbf, 0x00, 0xcb, 0xe2, 0xfe, - 0x09, 0x08, 0x33, 0xdc, 0x8c, 0xb0, 0xc1, 0x72, 0x3b, 0x42, 0xaa, 0xf3, 0x11, 0x52, 0xdd, 0x80, - 0x45, 0xc7, 0x7c, 0x82, 0x29, 0xba, 0x05, 0xb6, 0x5f, 0xfa, 0x5c, 0x6e, 0x23, 0x15, 0x64, 0x36, - 0x85, 0x3f, 0x1e, 0x18, 0x16, 0x8d, 0xcc, 0xd9, 0x45, 0x2a, 0xf4, 0xdc, 0x0e, 0xcb, 0x63, 0x76, - 0xdc, 0x3c, 0x66, 0xa7, 0xe1, 0xe6, 0x31, 0xda, 0x32, 0x5d, 0xa3, 0x7a, 0x4b, 0xc4, 0xfc, 0x22, - 0x29, 0xe6, 0x17, 0xca, 0x06, 0x2c, 0x34, 0x28, 0xa9, 0xf1, 0xa3, 0xf6, 0x2e, 0x64, 0x04, 0x15, - 0x8e, 0x03, 0xf8, 0xd4, 0x14, 0xf3, 0xa9, 0x49, 0x79, 0x00, 0x69, 0x61, 0xad, 0x8d, 0x54, 0xc8, - 0x88, 0x72, 0x73, 0x8f, 0xd0, 0xe9, 0x86, 0x93, 0x16, 0xe4, 0x6a, 0x2b, 0xff, 0x19, 0x63, 0xd9, - 0x01, 0x1f, 0x38, 0x05, 0x47, 0xa8, 0xc4, 0x32, 0xce, 0xa6, 0x98, 0x97, 0x5c, 0x9b, 0x46, 0x9e, - 0x65, 0x26, 0x49, 0x6a, 0x5a, 0x34, 0xf8, 0xbc, 0x0e, 0x09, 0xc2, 0x10, 0xb5, 0x8b, 0x28, 0x4f, - 0x23, 0x66, 0x45, 0x70, 0x68, 0x14, 0x14, 0xbd, 0x02, 0x2b, 0x03, 0xdd, 0xb6, 0x9f, 0x99, 0x56, - 0xbb, 0x79, 0x8c, 0x2d, 0xe3, 0xc8, 0xc0, 0xcc, 0x68, 0x16, 0x35, 0xd9, 0x9d, 0x78, 0xc8, 0xc7, - 0xd1, 0x0e, 0xc4, 0x7b, 0x47, 0x3a, 0x0d, 0x78, 0x4b, 0xb7, 0xcf, 0x87, 0xa2, 0x3f, 0x3c, 0xd2, - 0xa9, 0xb5, 0x12, 0x40, 0x12, 0x45, 0x7b, 0x47, 0xfa, 0x08, 0xef, 0x02, 0xc5, 0x9b, 0xea, 0x1d, - 0xe9, 0x1e, 0xca, 0x2f, 0x02, 0xe5, 0xbf, 0x49, 0xb2, 0xdc, 0x19, 0x4c, 0x67, 0x91, 0x00, 0x93, - 0x47, 0xe5, 0x6b, 0x20, 0x0b, 0xa2, 0x20, 0x8e, 0x69, 0xa3, 0x72, 0xb8, 0x1e, 0xaf, 0x4e, 0x13, - 0x24, 0x59, 0x1d, 0xd0, 0xe5, 0x4f, 0x25, 0x58, 0x0e, 0x40, 0xfc, 0xfa, 0xf5, 0x29, 0xf8, 0x45, - 0xc2, 0x97, 0x77, 0x6f, 0x42, 0x92, 0x4e, 0xf4, 0xf5, 0x1e, 0xe6, 0x2e, 0xbe, 0x48, 0x06, 0x2a, - 0x7a, 0x0f, 0x2b, 0x5f, 0x86, 0x45, 0x57, 0xc9, 0xd1, 0x99, 0xbb, 0x0f, 0x43, 0x2c, 0x80, 0xe1, - 0x9b, 0x12, 0x64, 0x84, 0xf0, 0x73, 0x2a, 0xe7, 0x1a, 0xcb, 0xd4, 0xe3, 0xcf, 0x71, 0x27, 0xf8, - 0x37, 0x09, 0x56, 0xea, 0x34, 0x81, 0xa0, 0x26, 0xcb, 0xaf, 0x23, 0x2f, 0x20, 0x00, 0x87, 0x44, - 0xca, 0x78, 0x58, 0xa4, 0x0c, 0x66, 0xa9, 0x89, 0x17, 0x92, 0xbb, 0xff, 0x87, 0x04, 0x2b, 0xd4, - 0x03, 0x4e, 0xc4, 0x6d, 0xcd, 0x92, 0x6f, 0xe7, 0x23, 0xf6, 0x37, 0x02, 0x0d, 0x6c, 0xf4, 0xba, - 0xa8, 0x67, 0xba, 0xc5, 0x5d, 0xf8, 0x7c, 0x77, 0xc1, 0x9a, 0x93, 0xa5, 0xec, 0xbf, 0x48, 0x23, - 0x9d, 0xbf, 0xa4, 0x9d, 0xfe, 0x42, 0x82, 0xb3, 0x6c, 0xa7, 0x35, 0x1e, 0x4c, 0x5e, 0xea, 0x6e, - 0xaf, 0xc1, 0xa2, 0x1b, 0xb4, 0xf8, 0x66, 0x93, 0x9f, 0xef, 0xce, 0x5b, 0x09, 0x59, 0xca, 0xee, - 0x6b, 0xde, 0xd4, 0x4b, 0xda, 0xeb, 0xff, 0x4a, 0x20, 0xb3, 0xbd, 0x1e, 0x1e, 0xe9, 0x2f, 0x75, - 0x9b, 0x2f, 0xd0, 0xc5, 0xd0, 0x2e, 0xc4, 0x4d, 0x67, 0xc0, 0x45, 0xb0, 0x33, 0x2d, 0x13, 0x39, - 0x1c, 0x76, 0x1d, 0xe3, 0x9e, 0xde, 0x72, 0x4c, 0xab, 0xda, 0xa8, 0xed, 0x9f, 0xd1, 0xc8, 0xe2, - 0xdd, 0x39, 0x7a, 0x2e, 0x28, 0x77, 0x60, 0x23, 0x12, 0x14, 0x9d, 0x87, 0x44, 0xcb, 0x6c, 0x63, - 0x2e, 0x04, 0x22, 0x42, 0x2b, 0x4e, 0x2c, 0x90, 0x8e, 0x2a, 0x7f, 0x12, 0x87, 0x45, 0x37, 0x07, - 0x44, 0x6f, 0xf1, 0xec, 0x48, 0xa2, 0x61, 0xf3, 0xf2, 0xc4, 0x84, 0x51, 0x48, 0x8d, 0xde, 0x86, - 0x39, 0x9a, 0xd3, 0xf2, 0xda, 0x40, 0xf8, 0x05, 0xf8, 0x80, 0x40, 0x94, 0x74, 0x47, 0xdf, 0x3f, - 0xa3, 0x31, 0x70, 0xf4, 0x6e, 0xc0, 0x68, 0x52, 0x11, 0x24, 0x5d, 0x0b, 0xe6, 0xab, 0x47, 0xe6, - 0x54, 0x04, 0xf0, 0x8e, 0xb9, 0x13, 0x2e, 0x49, 0x25, 0xea, 0x74, 0x64, 0x16, 0xc2, 0x71, 0x24, - 0xdd, 0xa3, 0xf0, 0xc4, 0x45, 0xc2, 0x2f, 0x0f, 0x73, 0x93, 0x91, 0xb0, 0xfb, 0x83, 0x80, 0x84, - 0x0d, 0xa0, 0x7b, 0x90, 0x6a, 0x3d, 0x36, 0x4d, 0x1b, 0xd3, 0x8b, 0x18, 0x3d, 0xa8, 0x53, 0x11, - 0xf5, 0x8d, 0x22, 0x85, 0x23, 0xf1, 0x87, 0xa3, 0x81, 0x96, 0x37, 0xb2, 0x3b, 0x0f, 0x89, 0xb6, - 0xee, 0xe8, 0xca, 0x55, 0x48, 0x7a, 0x02, 0x23, 0x67, 0x09, 0xb6, 0xac, 0x66, 0xcf, 0xee, 0xb8, - 0x67, 0x09, 0xb6, 0xac, 0x43, 0xbb, 0xa3, 0x1c, 0x40, 0x5a, 0x94, 0x4d, 0x24, 0x20, 0xba, 0x02, - 0x99, 0x23, 0xdd, 0xe8, 0x0e, 0x2d, 0xdc, 0x6c, 0x99, 0xc3, 0xbe, 0x43, 0x35, 0x95, 0xd1, 0xd2, - 0x7c, 0xb0, 0x48, 0xc6, 0x94, 0xef, 0x4a, 0x90, 0xf1, 0xc9, 0xe9, 0xf9, 0xf0, 0xa1, 0x02, 0x64, - 0xb8, 0x60, 0x8f, 0x8d, 0x36, 0xb6, 0xec, 0x6c, 0x7c, 0x2b, 0x3e, 0x35, 0x7d, 0x49, 0x33, 0x99, - 0xb2, 0x15, 0x4a, 0x9f, 0x72, 0x34, 0x12, 0x3a, 0xca, 0xc1, 0xa2, 0x85, 0x9f, 0x0e, 0x0d, 0x0b, - 0x33, 0xaf, 0x5e, 0xd4, 0xbc, 0xe7, 0x71, 0x7a, 0xb1, 0x53, 0xd3, 0xdb, 0x83, 0x25, 0xbf, 0x7a, - 0xd0, 0x5b, 0x30, 0x47, 0x34, 0xea, 0x66, 0x34, 0x97, 0xa6, 0xa8, 0x54, 0x63, 0xd0, 0xca, 0xcf, - 0x24, 0x80, 0xd1, 0x68, 0xd8, 0xa9, 0x27, 0x85, 0x9d, 0x7a, 0x42, 0xd6, 0x10, 0x8b, 0xce, 0x1a, - 0xe2, 0xfe, 0xac, 0x01, 0xd5, 0x01, 0xf9, 0xb0, 0xb3, 0xdc, 0x27, 0x71, 0x9a, 0xdc, 0x47, 0x1e, - 0x06, 0x46, 0x94, 0x5b, 0x80, 0xea, 0x4f, 0x8c, 0xc1, 0xe1, 0x91, 0x5e, 0xee, 0x1b, 0xce, 0xb4, - 0x82, 0xa4, 0xf2, 0x17, 0x12, 0xa0, 0xf1, 0x88, 0x47, 0xef, 0xc7, 0x04, 0x9e, 0x46, 0x5c, 0xbe, - 0x84, 0xee, 0x84, 0x15, 0x1b, 0xff, 0x3f, 0x24, 0x2d, 0xdc, 0x33, 0x1d, 0xdc, 0x34, 0x06, 0x3c, - 0x7a, 0x9c, 0x0b, 0x65, 0xb8, 0x5c, 0x13, 0x82, 0xff, 0x22, 0x5b, 0x53, 0x1e, 0xa0, 0xeb, 0xb0, - 0xac, 0xb7, 0x5a, 0x78, 0xe0, 0x34, 0xbb, 0x7a, 0xbf, 0x33, 0x24, 0x17, 0x69, 0x26, 0x9c, 0x25, - 0x36, 0x7c, 0xc0, 0x47, 0x95, 0xab, 0x10, 0x2b, 0xd7, 0x48, 0x32, 0xf5, 0xf0, 0x4d, 0x37, 0x99, - 0x7a, 0xf8, 0x26, 0x7d, 0x7e, 0xdb, 0xad, 0x69, 0x3c, 0x7c, 0x9b, 0x64, 0x3d, 0xcb, 0x81, 0x6b, - 0x35, 0xad, 0x36, 0xb4, 0x4c, 0x1a, 0x14, 0xe3, 0xb4, 0xda, 0x40, 0x1e, 0xd0, 0x7b, 0x90, 0xb1, - 0x78, 0xd1, 0xa4, 0x29, 0xd4, 0xe1, 0xc2, 0xa5, 0x4d, 0xf0, 0xb8, 0x25, 0x16, 0x66, 0x74, 0x96, - 0xf0, 0x44, 0x28, 0xf4, 0xcd, 0x7e, 0xcb, 0x65, 0x9d, 0x3d, 0xa0, 0x32, 0x2c, 0x91, 0x00, 0xdd, - 0x6c, 0x3d, 0xd6, 0xbb, 0x5d, 0xdc, 0xef, 0xe0, 0x89, 0xf1, 0xad, 0x68, 0xb6, 0x71, 0xd1, 0x85, - 0xd4, 0x32, 0x2d, 0xf1, 0x51, 0x31, 0x21, 0xe3, 0x9b, 0x47, 0xe7, 0x21, 0x39, 0x42, 0xcb, 0x95, - 0xe2, 0x0d, 0xa0, 0x2f, 0xc3, 0x7c, 0x0f, 0x3b, 0x8f, 0xcd, 0x36, 0xdf, 0xd4, 0x8d, 0xe9, 0x14, - 0x0f, 0x29, 0xbc, 0xc6, 0xd7, 0x29, 0x59, 0x98, 0xa7, 0x55, 0xa7, 0xf1, 0xcb, 0xe3, 0x6f, 0xc3, - 0xca, 0x83, 0xbe, 0xf1, 0x74, 0x88, 0xc5, 0xfc, 0xcb, 0x97, 0x2a, 0x49, 0x13, 0x52, 0xa5, 0x2d, - 0x98, 0xc3, 0x3d, 0xdd, 0xe8, 0xf2, 0x53, 0x5a, 0x04, 0x62, 0x13, 0xca, 0xeb, 0x80, 0x44, 0xfc, - 0xbc, 0xac, 0xb5, 0x09, 0x49, 0xc3, 0x6e, 0x0e, 0xe9, 0x84, 0x1b, 0x36, 0x0c, 0x9b, 0x01, 0x2a, - 0x7f, 0x16, 0x87, 0x55, 0x0d, 0x77, 0x0c, 0xdb, 0xc1, 0x96, 0x3f, 0x2b, 0xe4, 0xc4, 0x18, 0x47, - 0xe9, 0xcf, 0x77, 0x93, 0xd6, 0x02, 0x25, 0xf6, 0x75, 0x97, 0x1c, 0xba, 0x09, 0x70, 0x64, 0x58, - 0xb6, 0x23, 0x64, 0xf3, 0x3e, 0xae, 0x92, 0x74, 0x96, 0xf2, 0x7e, 0x1d, 0x92, 0x5d, 0xdd, 0x85, - 0x0c, 0xc9, 0x07, 0xc9, 0x24, 0x05, 0xbc, 0x06, 0xc9, 0xbe, 0xd1, 0x7a, 0xc2, 0x00, 0x13, 0x81, - 0x43, 0x7b, 0x91, 0x4c, 0x51, 0xb0, 0x57, 0x20, 0xdd, 0x36, 0xec, 0x41, 0x57, 0x3f, 0x11, 0x2e, - 0x23, 0x02, 0x64, 0x8a, 0xcf, 0x52, 0xe0, 0x2f, 0x02, 0x1a, 0xd0, 0xaa, 0x96, 0x85, 0xdb, 0x23, - 0x57, 0x99, 0x0f, 0x2c, 0x59, 0xf1, 0x60, 0x5c, 0xbf, 0x41, 0x6f, 0xc0, 0x7c, 0x07, 0xf7, 0xdb, - 0xd8, 0x9a, 0x58, 0x55, 0xdb, 0xa3, 0x20, 0x1a, 0x07, 0xf5, 0x25, 0x83, 0x8b, 0xd1, 0xc9, 0xe0, - 0x45, 0x98, 0x37, 0xad, 0x8e, 0x57, 0x7b, 0x18, 0x25, 0x5d, 0x73, 0xa6, 0xd5, 0x29, 0xb7, 0x95, - 0x9f, 0xc5, 0xe1, 0xa2, 0xa8, 0x18, 0xf5, 0x63, 0x07, 0x5b, 0x7d, 0xbd, 0x5b, 0x2e, 0xd5, 0x7e, - 0xa3, 0xa3, 0xe7, 0xd5, 0x51, 0x11, 0xd2, 0x46, 0x7b, 0xe0, 0x1d, 0x96, 0xbc, 0x02, 0x10, 0x5e, - 0x78, 0x29, 0x97, 0x6a, 0xee, 0x11, 0xa9, 0xa5, 0x8c, 0xf6, 0xc0, 0x7d, 0x98, 0xaa, 0xc1, 0x2a, - 0xa4, 0x84, 0xb5, 0xe4, 0xf0, 0xf6, 0xd1, 0x4b, 0x6a, 0xde, 0x33, 0xba, 0x0a, 0x19, 0xec, 0xea, - 0xb7, 0x3d, 0x28, 0x97, 0x78, 0x3d, 0xca, 0x3f, 0xa8, 0xfc, 0x7c, 0x01, 0x12, 0xf4, 0x40, 0x0d, - 0x5e, 0x8b, 0xdf, 0x74, 0x6b, 0xc2, 0x2c, 0x64, 0x45, 0xbf, 0x83, 0x11, 0x5f, 0x2a, 0xa1, 0x77, - 0x21, 0xd3, 0xe2, 0x2f, 0x5d, 0x9a, 0x6d, 0xb7, 0x5e, 0x30, 0xb9, 0x0e, 0x92, 0x76, 0x17, 0x94, - 0x08, 0x82, 0x22, 0x39, 0x7f, 0x1c, 0xe3, 0x58, 0x40, 0x91, 0x98, 0x8a, 0x62, 0x69, 0xb4, 0x84, - 0x22, 0xf9, 0x12, 0xc9, 0x1d, 0xf5, 0x7e, 0x07, 0x33, 0x04, 0x73, 0x53, 0x11, 0x00, 0x03, 0xa7, - 0x8b, 0xef, 0x00, 0x50, 0x93, 0x65, 0x09, 0xf8, 0xfc, 0xd4, 0xb5, 0xd4, 0xc0, 0x69, 0x6a, 0x89, - 0x54, 0xf0, 0x0a, 0x4d, 0x4d, 0x86, 0x91, 0x15, 0x8a, 0xa6, 0xd4, 0x10, 0xdd, 0x35, 0x45, 0xb6, - 0xc4, 0x9f, 0x9a, 0x2c, 0x06, 0x52, 0x93, 0x0b, 0x3e, 0xe7, 0x63, 0x3a, 0x15, 0x1c, 0x6e, 0x53, - 0x74, 0x38, 0x56, 0x1e, 0x1f, 0x39, 0xd9, 0xa6, 0xe8, 0x64, 0x29, 0x36, 0xe9, 0xb9, 0xd6, 0xe5, - 0x80, 0x6b, 0xa5, 0xd9, 0x7b, 0x02, 0xd1, 0xa1, 0x6e, 0x85, 0x3a, 0xd4, 0xe8, 0x05, 0x49, 0xa4, - 0x1b, 0x2d, 0xcd, 0xee, 0x46, 0x6b, 0x6e, 0x00, 0x5a, 0x66, 0x67, 0x37, 0x0b, 0x39, 0xdb, 0xb0, - 0x62, 0xd8, 0x4d, 0xfa, 0xff, 0xa8, 0x06, 0x27, 0xd3, 0x73, 0x67, 0xd9, 0xb0, 0x55, 0x32, 0xee, - 0xd5, 0xe1, 0xd6, 0x60, 0x6e, 0xf0, 0xd8, 0xec, 0xe3, 0xec, 0x0a, 0xc3, 0x40, 0x1f, 0x38, 0x06, - 0xfa, 0xff, 0x08, 0x03, 0x72, 0x31, 0xd4, 0xc8, 0xb8, 0x87, 0x21, 0x0b, 0x0b, 0x34, 0x09, 0xb7, - 0x4e, 0xb2, 0xab, 0xac, 0x28, 0xc3, 0x1f, 0x89, 0xc3, 0xd1, 0x57, 0x13, 0x86, 0x73, 0x92, 0x5d, - 0xe3, 0xd2, 0xe5, 0xcf, 0xe8, 0x12, 0xa4, 0x06, 0xa6, 0xed, 0xe8, 0xdd, 0x26, 0xbd, 0x1d, 0x9e, - 0xa5, 0xd3, 0xc0, 0x86, 0xc8, 0xd9, 0x8e, 0xd6, 0x61, 0xde, 0xc2, 0x1d, 0xc3, 0xec, 0x67, 0xd7, - 0x59, 0xa6, 0xc7, 0x9e, 0xd0, 0x35, 0x58, 0xb2, 0x1d, 0x0b, 0x63, 0xa7, 0xa9, 0xb7, 0xdb, 0x16, - 0xb6, 0xed, 0xec, 0x39, 0xe6, 0xaa, 0x6c, 0xb4, 0xc0, 0x06, 0xd1, 0x3b, 0x90, 0x0d, 0x58, 0x57, - 0xd3, 0xcb, 0xdc, 0xb3, 0x74, 0x23, 0xeb, 0x7e, 0x4b, 0xd2, 0xf8, 0xac, 0xf2, 0x03, 0x5e, 0xcd, - 0xad, 0x59, 0xe6, 0x91, 0xd1, 0xc5, 0x63, 0xbe, 0x3e, 0xa9, 0x82, 0x16, 0x30, 0xb8, 0xf8, 0x44, - 0x83, 0x4b, 0x4c, 0x32, 0xb8, 0xb9, 0x29, 0x06, 0x37, 0x3f, 0xab, 0xc1, 0x2d, 0x4c, 0x37, 0xb8, - 0xc5, 0x99, 0x0d, 0x4e, 0xf9, 0x49, 0x0c, 0xb2, 0x0f, 0x06, 0x24, 0x50, 0x08, 0x22, 0x72, 0x8f, - 0x43, 0xff, 0x51, 0x27, 0xcd, 0x7c, 0xd4, 0xc5, 0x26, 0x1c, 0x75, 0xd7, 0x45, 0xa1, 0x84, 0x9c, - 0x89, 0x9e, 0x80, 0x6e, 0x05, 0x04, 0x94, 0x18, 0x83, 0xf5, 0x09, 0xeb, 0x4e, 0xa8, 0xb0, 0xe6, - 0xc6, 0x16, 0x4d, 0x14, 0xdc, 0xfc, 0xec, 0x82, 0xfb, 0x2d, 0xd6, 0xe4, 0x40, 0x9d, 0x6f, 0xcc, - 0xa4, 0xd6, 0x7c, 0x89, 0xa5, 0xeb, 0xc6, 0x37, 0x20, 0xe8, 0xad, 0x54, 0x00, 0xe3, 0x4e, 0xac, - 0xdc, 0x85, 0x2c, 0x2f, 0x40, 0x9d, 0x78, 0x44, 0x5c, 0xa5, 0x5c, 0xf4, 0xd5, 0x5f, 0xc4, 0xad, - 0xb1, 0x0a, 0xcc, 0x3e, 0xac, 0x8f, 0x4a, 0x92, 0xbe, 0x95, 0x41, 0x2e, 0x5d, 0x4c, 0xb1, 0x08, - 0x4c, 0x77, 0x61, 0x7d, 0x64, 0x1a, 0x3e, 0x4c, 0x5b, 0xfe, 0x3c, 0x29, 0x24, 0x71, 0xfe, 0x1a, - 0x13, 0x0f, 0x8d, 0x2c, 0x61, 0xe2, 0x61, 0x31, 0x2a, 0x36, 0x35, 0x46, 0xc5, 0x43, 0x63, 0x94, - 0x72, 0x47, 0x64, 0x8d, 0x4e, 0xb9, 0xac, 0x5d, 0x72, 0x71, 0x4b, 0xfe, 0x4c, 0x71, 0x8d, 0x93, - 0x51, 0xde, 0x11, 0xe5, 0xe3, 0x5b, 0x3a, 0x4d, 0xb2, 0xff, 0x28, 0xf1, 0xa6, 0x11, 0x1e, 0x92, - 0x82, 0xdb, 0x12, 0x02, 0x67, 0x2c, 0x3a, 0x70, 0xc6, 0x27, 0x07, 0xce, 0xc4, 0x84, 0xc0, 0x39, - 0x37, 0x25, 0x70, 0xce, 0x87, 0x04, 0x4e, 0xe5, 0xe7, 0x92, 0xe8, 0xe1, 0x7c, 0x74, 0x94, 0xf0, - 0x7a, 0x2c, 0x07, 0xeb, 0x79, 0x1e, 0xf3, 0x57, 0x05, 0xe6, 0x63, 0xc1, 0xdc, 0xd4, 0xdb, 0xc6, - 0x4d, 0xff, 0x36, 0xe2, 0x01, 0x40, 0x71, 0x43, 0x5b, 0xde, 0x86, 0x82, 0xa9, 0xae, 0xbb, 0xb5, - 0xfc, 0xd8, 0xd6, 0x82, 0xa9, 0x6e, 0x60, 0x93, 0xe7, 0x01, 0xdc, 0xca, 0x55, 0xc8, 0x2d, 0xf1, - 0x1d, 0x58, 0x0e, 0x56, 0xad, 0xc5, 0x3b, 0x85, 0x14, 0x79, 0xa7, 0x50, 0x3e, 0x81, 0x35, 0x0d, - 0xdb, 0xd8, 0x09, 0x2e, 0x9f, 0xf9, 0x8a, 0x79, 0xc7, 0xd7, 0x57, 0x13, 0x7e, 0x9f, 0xaf, 0x98, - 0x8e, 0x71, 0x64, 0xb4, 0x68, 0x06, 0x37, 0x2a, 0x83, 0x2a, 0xc7, 0x90, 0xf1, 0xd1, 0x46, 0xe7, - 0x46, 0xdb, 0x1a, 0xa5, 0xc6, 0x33, 0x38, 0x32, 0x7a, 0x15, 0xd2, 0x7d, 0xfc, 0xac, 0x19, 0x5d, - 0x51, 0x4f, 0xf5, 0xf1, 0x33, 0x97, 0x8c, 0xf2, 0x04, 0x2e, 0xd6, 0x47, 0x54, 0x45, 0xe6, 0xa2, - 0x02, 0xc9, 0x73, 0x6c, 0xb2, 0x0b, 0x4b, 0x35, 0xdf, 0xb1, 0x4d, 0x98, 0x35, 0xbb, 0xed, 0x66, - 0xb4, 0x76, 0x52, 0x66, 0xb7, 0xed, 0xc9, 0x24, 0xb8, 0xb5, 0xd8, 0xc4, 0xad, 0x29, 0x90, 0xf6, - 0x0a, 0xfb, 0x55, 0x67, 0x80, 0x90, 0xe8, 0xf1, 0xdc, 0xcb, 0x4b, 0x90, 0x16, 0x2a, 0xde, 0x36, - 0x7a, 0x13, 0x12, 0xbd, 0x23, 0x7d, 0xf2, 0xab, 0x64, 0x61, 0x81, 0x46, 0xa1, 0x15, 0x07, 0x52, - 0xc2, 0x20, 0x7a, 0xcd, 0x57, 0x09, 0x9f, 0x5c, 0x42, 0x64, 0x45, 0xf0, 0x37, 0xfc, 0x37, 0x90, - 0xf0, 0x77, 0xc0, 0x87, 0xf7, 0x0a, 0xbe, 0xae, 0xb6, 0x6f, 0x49, 0xb0, 0xc4, 0xb6, 0xe6, 0xd5, - 0x2a, 0x22, 0x5f, 0x1c, 0xca, 0x10, 0x1f, 0x5a, 0xee, 0x09, 0x45, 0xfe, 0x25, 0x81, 0xc6, 0xc6, - 0x2d, 0x0b, 0x3b, 0x3c, 0x46, 0xf1, 0xa7, 0x11, 0x2b, 0x89, 0x53, 0xb0, 0x72, 0x09, 0x32, 0x85, - 0xc1, 0xa0, 0xcb, 0x35, 0x1e, 0xe2, 0x94, 0x3f, 0x89, 0x41, 0x4a, 0x80, 0x18, 0x33, 0xaa, 0x99, - 0x04, 0x50, 0x18, 0x0c, 0x5e, 0xec, 0x0d, 0x2c, 0x70, 0x79, 0x4a, 0x9c, 0xea, 0xf2, 0x84, 0x20, - 0x21, 0xe4, 0x7a, 0xf4, 0x7f, 0xb4, 0x0b, 0x29, 0xd3, 0x68, 0xb7, 0x9a, 0x2d, 0xb3, 0x7f, 0x64, - 0x74, 0xf8, 0xbd, 0xf8, 0x52, 0x64, 0x5d, 0xaf, 0x48, 0xc1, 0xf6, 0xcf, 0x68, 0x40, 0x56, 0xb1, - 0xa7, 0xdd, 0x34, 0x80, 0x3e, 0x18, 0x70, 0x14, 0xca, 0x2f, 0xe2, 0x00, 0x23, 0x50, 0x74, 0x05, - 0x32, 0x62, 0x87, 0x93, 0xcd, 0x0b, 0x8b, 0x69, 0xa1, 0xc5, 0xc9, 0x46, 0x07, 0xb0, 0xe4, 0xab, - 0x2f, 0xba, 0xc5, 0xec, 0x19, 0x0b, 0x8c, 0x19, 0xb1, 0xc0, 0x68, 0xa3, 0x22, 0xa4, 0x3a, 0x96, - 0xde, 0x77, 0x38, 0x2a, 0x56, 0x87, 0x57, 0x22, 0x51, 0xed, 0x11, 0x58, 0x8a, 0x07, 0x3a, 0xee, - 0xbf, 0x36, 0xaa, 0x83, 0xac, 0x8f, 0xd4, 0xcf, 0xaa, 0x9e, 0x89, 0x09, 0x05, 0x42, 0x82, 0x49, - 0xb0, 0x17, 0x8a, 0x6f, 0x59, 0xf7, 0x0f, 0x10, 0x61, 0xf0, 0x46, 0x18, 0x6e, 0xc9, 0x4c, 0x15, - 0x69, 0x36, 0x58, 0x67, 0xf6, 0xec, 0x6b, 0xbd, 0x99, 0x0f, 0xb4, 0xde, 0x7c, 0x05, 0x64, 0xfa, - 0x0e, 0x8f, 0x95, 0x1e, 0x19, 0x5b, 0xac, 0x0e, 0x72, 0x3d, 0x9a, 0xad, 0xa1, 0xf3, 0x98, 0x95, - 0x2c, 0x29, 0x57, 0x4b, 0xba, 0xef, 0x19, 0xdd, 0x81, 0x0d, 0x72, 0xfa, 0x91, 0x3b, 0xb5, 0x39, - 0x74, 0x9a, 0x7e, 0x6d, 0xb1, 0x96, 0xb0, 0x75, 0x02, 0x70, 0x40, 0xe7, 0x35, 0x41, 0x6f, 0xca, - 0xff, 0x48, 0x90, 0x15, 0x36, 0x5d, 0xc7, 0xba, 0xd5, 0x72, 0xcb, 0xc9, 0xc4, 0x5f, 0xcd, 0xa3, - 0x23, 0x1b, 0xb3, 0x42, 0x78, 0x42, 0xe3, 0x4f, 0x24, 0xbd, 0xea, 0x1a, 0x3d, 0x83, 0xbd, 0x45, - 0x49, 0x68, 0xec, 0x01, 0x7d, 0x08, 0x4b, 0xb6, 0x69, 0x39, 0x46, 0xbf, 0xd3, 0x6c, 0x99, 0xdd, - 0x61, 0xaf, 0xcf, 0xbb, 0x19, 0x6e, 0x46, 0x39, 0x96, 0x9f, 0xe8, 0x7d, 0x7c, 0x42, 0x8f, 0xdf, - 0xcf, 0xa4, 0xd8, 0xd6, 0x19, 0x2d, 0xc3, 0x51, 0x15, 0x29, 0x26, 0x12, 0x4b, 0x74, 0xbb, 0x45, - 0xd5, 0xb7, 0xa8, 0x91, 0x7f, 0x91, 0x0a, 0x0b, 0x4f, 0x87, 0xd8, 0x32, 0x30, 0x39, 0xba, 0x49, - 0xe0, 0x7c, 0x65, 0x36, 0x32, 0x5f, 0x19, 0x62, 0xeb, 0x44, 0x73, 0xd7, 0x2a, 0x3f, 0x96, 0x60, - 0x3d, 0x1c, 0x06, 0xa9, 0x10, 0x7f, 0x82, 0x4f, 0x78, 0x44, 0xfd, 0x95, 0x36, 0x41, 0xd6, 0xa3, - 0x3b, 0x81, 0xea, 0x74, 0xf8, 0x2b, 0x43, 0xb6, 0xdc, 0x5f, 0x96, 0x26, 0x72, 0x3e, 0xd6, 0xbb, - 0x43, 0xaf, 0xd0, 0x4e, 0x1f, 0x94, 0xbf, 0x91, 0x60, 0x23, 0x44, 0x65, 0x3c, 0x1c, 0x9f, 0x4e, - 0x67, 0x97, 0x21, 0xed, 0x98, 0x24, 0xa7, 0xb2, 0xb0, 0x3d, 0xec, 0xb2, 0xb8, 0x9c, 0xd0, 0x52, - 0x74, 0x4c, 0xa3, 0x43, 0xe8, 0x1d, 0x92, 0x4c, 0xd1, 0xc9, 0xc4, 0x84, 0x03, 0x4a, 0x60, 0x48, - 0xe3, 0xf0, 0xca, 0x31, 0x6c, 0x0a, 0xc3, 0xc4, 0x86, 0x4d, 0xcb, 0xf8, 0xc4, 0xcb, 0x86, 0xab, - 0x20, 0xb3, 0xc0, 0xc5, 0x5c, 0x85, 0x60, 0xe3, 0x1d, 0xcf, 0x57, 0xa2, 0xa3, 0x17, 0x85, 0x25, - 0xa8, 0xf6, 0xcf, 0x68, 0x4b, 0x34, 0x82, 0x79, 0x23, 0xbb, 0xf3, 0x90, 0x20, 0xf0, 0x8a, 0x06, - 0x4b, 0x7e, 0x58, 0xbf, 0x43, 0x4a, 0x01, 0x87, 0x1c, 0x73, 0xe9, 0xd8, 0xb8, 0x4b, 0x2b, 0xbf, - 0x94, 0x00, 0xd1, 0x30, 0xf3, 0x3c, 0x1e, 0xd2, 0x88, 0xf0, 0x90, 0xf0, 0xfd, 0x0a, 0xe4, 0x4e, - 0xe9, 0x1b, 0xef, 0x06, 0x7d, 0xe3, 0xda, 0x34, 0x02, 0x01, 0xaf, 0xf8, 0x6b, 0x09, 0xe4, 0xe0, - 0x2c, 0x7a, 0x57, 0xf4, 0x87, 0x53, 0xb2, 0xfc, 0x72, 0x3c, 0xe1, 0x07, 0x12, 0xac, 0xfa, 0x94, - 0xf2, 0xb2, 0x7c, 0xe0, 0x76, 0xc0, 0x07, 0x72, 0xd1, 0xbb, 0xf7, 0xac, 0xff, 0x0f, 0x24, 0x98, - 0xa3, 0x23, 0x84, 0x6c, 0xd5, 0xea, 0x94, 0x5d, 0xcb, 0x63, 0x0f, 0xe8, 0x3c, 0x24, 0x6b, 0xac, - 0x81, 0xb2, 0xec, 0xbe, 0x3c, 0x1d, 0x0d, 0x90, 0x2d, 0xb0, 0x3e, 0x68, 0x37, 0x55, 0x62, 0x4f, - 0x04, 0x97, 0x66, 0x76, 0xb1, 0x4d, 0x19, 0x49, 0x6a, 0xec, 0x81, 0x5c, 0x0c, 0xab, 0x56, 0xa7, - 0x32, 0x4a, 0x0d, 0xdc, 0x47, 0xe5, 0xaf, 0x24, 0xd8, 0x38, 0x3c, 0xe1, 0x78, 0xab, 0x56, 0xe7, - 0x79, 0xcc, 0x77, 0xdc, 0xd0, 0xee, 0x05, 0x0d, 0xed, 0xd5, 0xf0, 0xd4, 0x6d, 0x8c, 0x81, 0x80, - 0xbd, 0xfd, 0x83, 0x04, 0xe7, 0x22, 0x80, 0xd0, 0x3d, 0xd1, 0xec, 0xb6, 0x67, 0xc4, 0xff, 0xeb, - 0xb0, 0xbe, 0x1f, 0x4a, 0x90, 0x0b, 0x13, 0xed, 0xcb, 0x32, 0xc2, 0xd7, 0x02, 0x46, 0x98, 0x0d, - 0x8f, 0x92, 0x56, 0xc7, 0x33, 0xc1, 0x57, 0x61, 0xb9, 0x6c, 0x17, 0xda, 0x3d, 0xc3, 0xd7, 0x30, - 0x6f, 0xd8, 0x4d, 0x9d, 0x8c, 0xf1, 0x17, 0x8b, 0x0b, 0x06, 0x03, 0x51, 0x6e, 0x42, 0xbc, 0x6a, - 0x75, 0xc6, 0xd2, 0x64, 0x37, 0xe7, 0x8c, 0x8d, 0x72, 0x4e, 0xc5, 0x00, 0x44, 0x3f, 0xfe, 0xc0, - 0xb4, 0xe7, 0xf6, 0x65, 0x76, 0x30, 0x29, 0x75, 0x98, 0xa3, 0x44, 0xc6, 0xf8, 0xba, 0x0b, 0x70, - 0xaa, 0x5e, 0x62, 0x01, 0x5a, 0x79, 0x1d, 0x32, 0x87, 0x27, 0x35, 0x6c, 0xf5, 0x0c, 0xde, 0xd7, - 0xbb, 0x05, 0xa9, 0xc1, 0xe8, 0x91, 0x67, 0xb8, 0xe2, 0x90, 0xf2, 0xbe, 0xdb, 0x9e, 0x46, 0x1d, - 0x51, 0xe8, 0x30, 0x08, 0x91, 0xd7, 0xe8, 0xae, 0xcc, 0xef, 0xc7, 0xb9, 0x60, 0xb7, 0xd9, 0xa8, - 0x02, 0xb0, 0xfd, 0x11, 0x2c, 0xf9, 0xbf, 0x20, 0x42, 0x17, 0x21, 0xf7, 0xa0, 0xae, 0x6a, 0x85, - 0x3d, 0xb5, 0xd2, 0xa8, 0x37, 0x0a, 0x0d, 0xb5, 0xf9, 0xa0, 0x52, 0xaf, 0xa9, 0xc5, 0xf2, 0xbd, - 0xb2, 0x5a, 0x92, 0xcf, 0xa0, 0x0d, 0x38, 0x1b, 0x98, 0x2f, 0x14, 0x1b, 0xe5, 0x87, 0xaa, 0x2c, - 0xa1, 0x0b, 0xb0, 0x11, 0x98, 0x6a, 0xa8, 0xda, 0x61, 0xb9, 0x52, 0x68, 0xa8, 0x25, 0x39, 0xb6, - 0x6d, 0xf9, 0x5a, 0x61, 0x19, 0xb5, 0x2d, 0x38, 0x4f, 0x96, 0xd4, 0xd5, 0x7a, 0xbd, 0x5c, 0xad, - 0x84, 0xd1, 0xdb, 0x84, 0x73, 0x63, 0x10, 0x1e, 0xc5, 0x4b, 0xb0, 0x39, 0x36, 0xe9, 0xa3, 0xf9, - 0xa3, 0x38, 0xa4, 0xc5, 0x1e, 0x2c, 0x94, 0x85, 0xb5, 0x8a, 0xfa, 0xd5, 0x46, 0xbd, 0xa1, 0xd6, - 0x02, 0x84, 0x10, 0x2c, 0x79, 0x33, 0x07, 0xd5, 0xbd, 0x72, 0x45, 0x96, 0xd0, 0x59, 0x58, 0xf1, - 0xc6, 0x6a, 0x85, 0x7a, 0xfd, 0xfd, 0xaa, 0x56, 0x92, 0x63, 0xe8, 0x3c, 0x64, 0xbd, 0xe1, 0xe2, - 0x7e, 0xa1, 0xb2, 0xa7, 0x8e, 0x66, 0xe3, 0xe8, 0x1c, 0xac, 0x7a, 0xb3, 0x87, 0xf7, 0x0a, 0xcd, - 0x9a, 0x56, 0x3d, 0xac, 0x35, 0xe4, 0x84, 0x6f, 0x19, 0x99, 0x28, 0x57, 0xca, 0x8d, 0x66, 0x71, - 0xbf, 0x5a, 0x2e, 0xaa, 0xf2, 0x5c, 0xc4, 0xac, 0xa6, 0x16, 0x1a, 0xaa, 0x3c, 0x1f, 0x3e, 0xfb, - 0x50, 0xd5, 0xca, 0xf7, 0x3e, 0x90, 0x17, 0x50, 0x0e, 0xd6, 0xc7, 0x67, 0x4b, 0xd5, 0x8a, 0x2a, - 0x2f, 0x8e, 0xb1, 0xc3, 0x17, 0x25, 0x89, 0xba, 0x42, 0x26, 0x9a, 0x85, 0xfa, 0x07, 0x95, 0xa2, - 0x0c, 0x44, 0xd1, 0xde, 0x34, 0x9f, 0x52, 0x0f, 0x0b, 0xe5, 0x03, 0x39, 0x85, 0x2e, 0xc3, 0x05, - 0x6f, 0x4a, 0x53, 0x4b, 0x65, 0x4d, 0x2d, 0x36, 0x9a, 0x8d, 0x6a, 0xb3, 0x58, 0x38, 0x38, 0xd8, - 0x2d, 0x14, 0xef, 0xcb, 0x69, 0x1f, 0x47, 0x94, 0x1b, 0x4f, 0x40, 0x19, 0x9f, 0x0e, 0x8a, 0xfb, - 0xd5, 0x6a, 0x5d, 0x6d, 0x12, 0x2d, 0xca, 0x4b, 0xdb, 0x47, 0xbe, 0xcf, 0x18, 0xa8, 0xc2, 0x2e, - 0xc1, 0x66, 0xe1, 0x41, 0x63, 0x9f, 0xab, 0xb8, 0xf1, 0x41, 0x2d, 0x68, 0x20, 0x59, 0x58, 0x0b, - 0x02, 0x90, 0x04, 0x4c, 0x96, 0xc2, 0x66, 0xea, 0x85, 0xc3, 0x03, 0x6a, 0x8a, 0xf3, 0xbc, 0x15, - 0x6d, 0x1d, 0x10, 0xd3, 0x4f, 0x00, 0xeb, 0x32, 0xa4, 0xf8, 0x78, 0x85, 0x88, 0x51, 0x42, 0x32, - 0xa4, 0xf9, 0x00, 0x33, 0x8e, 0x18, 0x31, 0x18, 0x3e, 0x52, 0xac, 0x56, 0xea, 0x6a, 0xa5, 0x21, - 0xc7, 0x89, 0xd0, 0xf8, 0x58, 0x5d, 0x3d, 0x20, 0x52, 0x29, 0x14, 0x8b, 0xd5, 0x07, 0x95, 0x86, - 0x9c, 0xd8, 0x7e, 0x0a, 0x72, 0xf0, 0xe6, 0x49, 0xc0, 0xe9, 0x98, 0x5a, 0xaf, 0x11, 0x14, 0x94, - 0xc5, 0x62, 0xb5, 0xa4, 0xca, 0x67, 0x88, 0x76, 0xc6, 0xa6, 0xca, 0xa5, 0x66, 0xa3, 0x7a, 0x5f, - 0x25, 0x96, 0x79, 0x05, 0x2e, 0x45, 0x4e, 0x73, 0xa0, 0xd8, 0xb6, 0x06, 0xab, 0x21, 0x8d, 0x27, - 0x04, 0x35, 0x21, 0x52, 0xdc, 0x2f, 0x1c, 0x1c, 0xa8, 0x95, 0x3d, 0xf5, 0x50, 0x6d, 0xec, 0x57, - 0x4b, 0xcd, 0xda, 0x41, 0xa1, 0x5c, 0x91, 0xcf, 0x10, 0x53, 0x0b, 0x9b, 0xae, 0xdf, 0x7e, 0xeb, - 0x6d, 0x59, 0xda, 0xfe, 0x31, 0xff, 0xfe, 0x91, 0xf9, 0x6f, 0x0e, 0xd6, 0xa9, 0x03, 0x8a, 0x8e, - 0xab, 0x72, 0x11, 0xae, 0x81, 0x3c, 0x9a, 0xf3, 0x5c, 0x76, 0x1d, 0xd0, 0x68, 0xb4, 0x5c, 0xe1, - 0xe3, 0x31, 0xe2, 0x6a, 0xa3, 0xf1, 0x92, 0x7a, 0xa0, 0x12, 0x07, 0x8e, 0xfb, 0x91, 0x1c, 0x54, - 0x8b, 0xf7, 0xd5, 0x92, 0x9c, 0xf0, 0x03, 0xd7, 0x1f, 0xd4, 0x6b, 0x6a, 0xa5, 0x24, 0xcf, 0xf9, - 0x87, 0x89, 0xd5, 0x95, 0x0b, 0x07, 0xf2, 0xfc, 0xf6, 0x57, 0x61, 0x9e, 0xbd, 0xde, 0x20, 0xc4, - 0xf7, 0xd4, 0x4a, 0x49, 0xd5, 0x02, 0xda, 0x5e, 0x81, 0x0c, 0x1f, 0xbf, 0xa7, 0x1e, 0x16, 0x0e, - 0x08, 0x9f, 0xcb, 0x90, 0xe2, 0x43, 0x74, 0x80, 0xaa, 0x9b, 0x0f, 0x94, 0xca, 0x0f, 0x49, 0xcc, - 0x91, 0xe3, 0xdb, 0xfb, 0x20, 0x07, 0x2b, 0x7f, 0xd4, 0xf2, 0xab, 0x8d, 0xf2, 0xbd, 0x72, 0xb1, - 0xd0, 0x70, 0xcd, 0x8e, 0x39, 0x0e, 0xb5, 0xd5, 0xb1, 0xb9, 0xfa, 0x61, 0x5d, 0x96, 0xb6, 0x4b, - 0xb0, 0xc0, 0x2b, 0x64, 0xc4, 0x61, 0x0f, 0xef, 0x15, 0x42, 0x2c, 0x7d, 0x19, 0x52, 0xee, 0x04, - 0x5d, 0x24, 0x0e, 0x54, 0x1b, 0x35, 0x39, 0xb6, 0x7d, 0x04, 0x8b, 0x6e, 0xa5, 0x8a, 0xd0, 0x22, - 0xff, 0x87, 0x84, 0xd4, 0x75, 0x40, 0xde, 0x4c, 0xa5, 0xda, 0x68, 0x6a, 0x6a, 0xa1, 0xf4, 0x81, - 0x2c, 0x91, 0x1d, 0x7a, 0xe3, 0x6c, 0x2c, 0x46, 0xe4, 0x2f, 0x8c, 0x1d, 0x56, 0x1f, 0x12, 0xad, - 0x10, 0x3a, 0x6e, 0x6d, 0x8a, 0x7a, 0x59, 0xad, 0x16, 0x46, 0x67, 0x15, 0x96, 0xbd, 0x19, 0x4f, - 0xff, 0x67, 0x61, 0xc5, 0x1b, 0x14, 0xd4, 0xbf, 0x06, 0xb2, 0x37, 0xec, 0x69, 0x7f, 0xfb, 0x04, - 0x32, 0xbe, 0x12, 0x0b, 0xba, 0x0a, 0x5b, 0x74, 0x40, 0x2b, 0x54, 0x1a, 0x74, 0xdf, 0xc4, 0xc1, - 0xab, 0x5a, 0xf9, 0x43, 0x2a, 0x4f, 0xd7, 0x77, 0x2e, 0xc3, 0x05, 0x3f, 0x14, 0xfd, 0xaf, 0x49, - 0xff, 0xe5, 0xee, 0x7c, 0x09, 0x36, 0xfd, 0x20, 0x9a, 0x7a, 0x4f, 0x53, 0xeb, 0xfb, 0x9e, 0xef, - 0x1c, 0xc3, 0x6a, 0x48, 0x4d, 0x86, 0x1c, 0x47, 0x74, 0xb8, 0x56, 0x3b, 0x10, 0x95, 0xf8, 0xbe, - 0xba, 0x2b, 0x9f, 0x41, 0x0a, 0x5c, 0x0c, 0x9b, 0x24, 0x36, 0xd9, 0xa4, 0xa7, 0xa2, 0x2c, 0x91, - 0xf3, 0x35, 0x0c, 0xa6, 0x52, 0x60, 0x82, 0xd8, 0xee, 0x02, 0x1a, 0x2f, 0xba, 0x10, 0x9f, 0xa4, - 0xa3, 0x0f, 0x1a, 0xfb, 0xcc, 0x1d, 0xe9, 0xa2, 0xdd, 0x42, 0xbd, 0x5c, 0x64, 0x67, 0x64, 0xc8, - 0x6c, 0xad, 0x5a, 0x27, 0x04, 0xc3, 0x27, 0xa9, 0x18, 0x62, 0xdb, 0xbf, 0x94, 0x60, 0x2d, 0xac, - 0x8e, 0x40, 0x04, 0x2d, 0xb0, 0x58, 0x57, 0x0b, 0x5a, 0x71, 0xff, 0xbe, 0xfa, 0x41, 0x40, 0xc3, - 0x97, 0xe1, 0x42, 0x28, 0x54, 0xa1, 0x56, 0xa3, 0xd2, 0x66, 0xfb, 0x0d, 0x05, 0xa1, 0xaa, 0x96, - 0x63, 0x44, 0x66, 0xa1, 0xf3, 0xc5, 0x83, 0xb2, 0x5a, 0x69, 0x34, 0xcb, 0x24, 0x08, 0x4c, 0x22, - 0x53, 0x29, 0x1c, 0xaa, 0x72, 0x82, 0xc4, 0xc3, 0x50, 0x90, 0x9a, 0x56, 0x7d, 0x8f, 0xc4, 0xe1, - 0x72, 0x49, 0x9e, 0xdb, 0xfe, 0x3a, 0xa4, 0xc5, 0x14, 0x9b, 0x78, 0x1a, 0x83, 0xe4, 0x21, 0x4e, - 0xfd, 0xca, 0x83, 0xc2, 0x41, 0x9d, 0x85, 0x40, 0xdf, 0x44, 0xbd, 0x51, 0xd0, 0x1a, 0xf5, 0xe6, - 0xfb, 0xe5, 0xc6, 0xbe, 0x2c, 0x91, 0xa8, 0xed, 0x9b, 0x2d, 0x56, 0x2b, 0x8d, 0x42, 0xb9, 0x52, - 0x97, 0x63, 0xdb, 0xdf, 0x94, 0x60, 0xc9, 0x7f, 0x0f, 0x25, 0x02, 0xa0, 0x56, 0x16, 0x25, 0xc3, - 0x0d, 0x38, 0x1b, 0x98, 0xaf, 0x6a, 0x7b, 0x84, 0x5f, 0x9a, 0x50, 0x05, 0xa6, 0x84, 0xed, 0xc4, - 0x48, 0xa4, 0x09, 0x62, 0x26, 0x96, 0x46, 0x44, 0xb6, 0xfd, 0x08, 0xce, 0x86, 0x5e, 0x4c, 0xd0, - 0x35, 0xb8, 0x7c, 0xf8, 0x01, 0x47, 0x53, 0xd5, 0xf6, 0xa2, 0xb8, 0x52, 0xe0, 0x62, 0x38, 0x18, - 0x61, 0x8e, 0xca, 0x5c, 0xba, 0xfd, 0x77, 0x6f, 0x43, 0x8a, 0x1d, 0xd7, 0xd6, 0xb1, 0xd1, 0xc2, - 0xe8, 0x3e, 0x2c, 0xec, 0x63, 0xbd, 0xeb, 0x3c, 0xfe, 0x04, 0xad, 0x8f, 0xe5, 0xc2, 0x6a, 0x6f, - 0xe0, 0x9c, 0xe4, 0x22, 0xc6, 0x15, 0xf9, 0xb3, 0x7f, 0xfd, 0xf7, 0x3f, 0x8e, 0x01, 0x5a, 0xcc, - 0x3f, 0xe6, 0x18, 0xf6, 0x60, 0x4e, 0xc3, 0x7a, 0xfb, 0xe4, 0xd4, 0xa8, 0x96, 0x28, 0xaa, 0x45, - 0x34, 0x9f, 0xb7, 0xe8, 0xfa, 0x0a, 0x2c, 0x3e, 0xe4, 0xbf, 0x40, 0x10, 0x89, 0xeb, 0xdc, 0xd8, - 0x78, 0x9d, 0xfe, 0xd8, 0x81, 0xb2, 0x42, 0x91, 0xa5, 0x50, 0xd2, 0xfb, 0x15, 0x03, 0xf4, 0x11, - 0xa4, 0xf7, 0xb0, 0x33, 0xfa, 0x09, 0x80, 0xad, 0xc9, 0x5f, 0xb0, 0x97, 0x4b, 0xb9, 0x29, 0xdf, - 0xb8, 0x2b, 0x59, 0x4a, 0x04, 0x21, 0x39, 0x3f, 0xb4, 0xb1, 0x45, 0x2f, 0x2b, 0x76, 0xfe, 0x77, - 0x8c, 0xf6, 0xa7, 0xe8, 0x29, 0x2c, 0xb3, 0xab, 0xce, 0x88, 0xdc, 0x17, 0x26, 0x23, 0x73, 0x3f, - 0x8b, 0x9f, 0x4a, 0x74, 0x9d, 0x12, 0x95, 0x95, 0x94, 0x40, 0xf4, 0xae, 0xb4, 0x8d, 0x06, 0xb0, - 0xac, 0xe1, 0x63, 0xf3, 0x09, 0x7e, 0x91, 0x3b, 0xdc, 0xa4, 0xc4, 0xce, 0xe6, 0xc6, 0x76, 0x48, - 0x28, 0x7e, 0x5f, 0x82, 0x15, 0xb6, 0x4b, 0x21, 0xf7, 0x43, 0x37, 0xa6, 0x7d, 0xe3, 0xe1, 0xed, - 0x74, 0x2a, 0xa4, 0x9b, 0x72, 0x29, 0x3b, 0x94, 0x8d, 0x1b, 0xca, 0x15, 0x1f, 0x1b, 0xee, 0xb5, - 0xf1, 0xd3, 0x3c, 0x59, 0xef, 0x7e, 0x94, 0x47, 0x38, 0xfb, 0x2e, 0xf1, 0x66, 0xec, 0x88, 0x6c, - 0x29, 0xd3, 0x88, 0x95, 0x4b, 0xa7, 0x60, 0xe8, 0x35, 0xca, 0xd0, 0x36, 0xba, 0x31, 0x03, 0x43, - 0xcc, 0x22, 0x7e, 0x0f, 0xce, 0xf9, 0x39, 0xda, 0x3d, 0x71, 0x3f, 0x3d, 0x0d, 0x7f, 0xef, 0xc6, - 0x67, 0x73, 0x53, 0xbf, 0xde, 0x7d, 0x68, 0xe0, 0x67, 0xca, 0x16, 0x65, 0x28, 0x87, 0xb2, 0x79, - 0xfa, 0xf1, 0x2b, 0x23, 0x2a, 0xb2, 0x81, 0x7e, 0x24, 0x01, 0x8c, 0xbe, 0x75, 0x8b, 0x30, 0xc7, - 0xb1, 0x8f, 0xe1, 0x4e, 0x21, 0x93, 0x03, 0xca, 0xc2, 0xbd, 0x5c, 0x61, 0x26, 0x99, 0x04, 0xee, - 0xf3, 0x9f, 0xe6, 0x9b, 0xec, 0x4b, 0x7e, 0xb2, 0x96, 0xa8, 0x90, 0xb0, 0x3b, 0xba, 0x3a, 0x47, - 0xb0, 0x3b, 0xf6, 0x91, 0xdb, 0xaf, 0x91, 0x5d, 0xf6, 0x39, 0x8e, 0xcb, 0xee, 0x4f, 0x25, 0x58, - 0xf2, 0x7f, 0x88, 0x86, 0xb6, 0x27, 0xb0, 0x1c, 0x78, 0x71, 0x7f, 0x0a, 0xb6, 0x6b, 0x94, 0xed, - 0xf7, 0x72, 0xea, 0x73, 0xb1, 0xed, 0xd6, 0x11, 0x08, 0xeb, 0x7f, 0x2b, 0x41, 0xd2, 0x7b, 0xfd, - 0x8c, 0xae, 0x4d, 0xe0, 0x7a, 0xf4, 0xdd, 0xd9, 0x29, 0x18, 0xbe, 0x4f, 0x19, 0x56, 0x73, 0x5f, - 0x7e, 0x2e, 0x86, 0x7b, 0x47, 0x3a, 0xe1, 0xf5, 0x33, 0x09, 0xd6, 0xc4, 0x20, 0xee, 0x7d, 0x62, - 0x3d, 0x3d, 0xd4, 0x5d, 0x9e, 0xf6, 0x89, 0x88, 0xad, 0x5c, 0xa3, 0xac, 0x5e, 0x42, 0x17, 0x82, - 0xd1, 0x8e, 0x3e, 0xbb, 0x4c, 0xa2, 0x6f, 0xb1, 0xe8, 0x22, 0x7e, 0x8a, 0xad, 0x4c, 0x43, 0x5e, - 0x2e, 0xe5, 0xa6, 0x7e, 0xee, 0x3d, 0x35, 0xaa, 0x88, 0x5c, 0xb8, 0x51, 0x65, 0x65, 0x0f, 0x3b, - 0xac, 0x1d, 0xcb, 0x93, 0x45, 0xd4, 0x61, 0x79, 0x6d, 0x96, 0xef, 0x94, 0x6d, 0xe5, 0x95, 0xcf, - 0xfe, 0x29, 0xbb, 0x0c, 0xb4, 0xa0, 0x86, 0xfb, 0x0e, 0x49, 0x30, 0x71, 0xdb, 0x3b, 0xe8, 0x7a, - 0xd8, 0x2f, 0x8b, 0x6f, 0x48, 0xb0, 0xd6, 0xc0, 0x56, 0xcf, 0xe8, 0xf3, 0xc3, 0xee, 0x34, 0x12, - 0x89, 0xca, 0x04, 0xb8, 0x1c, 0xb6, 0x67, 0x97, 0xc3, 0x9f, 0x4b, 0x90, 0x12, 0x6a, 0x8b, 0x28, - 0xfc, 0xa5, 0xe8, 0x78, 0xf5, 0x31, 0x97, 0x8b, 0x8e, 0xbd, 0xca, 0x1e, 0x65, 0xa3, 0xa0, 0xfc, - 0xbf, 0x5f, 0xcd, 0x72, 0x59, 0x20, 0x26, 0x56, 0x7b, 0x02, 0xe9, 0xb2, 0x4d, 0xb6, 0xce, 0xbe, - 0xc5, 0x88, 0x4a, 0x05, 0x82, 0x5f, 0x8c, 0xe4, 0xae, 0x4f, 0x85, 0xe3, 0x3e, 0xe6, 0x4f, 0x44, - 0xec, 0x7c, 0xd3, 0xb0, 0xd9, 0x67, 0x20, 0x68, 0x00, 0x69, 0xf1, 0xe3, 0x82, 0x88, 0xd3, 0x39, - 0xe4, 0xc3, 0x90, 0xdc, 0x46, 0xa4, 0x02, 0xdd, 0xac, 0x40, 0xf1, 0xc8, 0x59, 0x7c, 0x3d, 0xd9, - 0xec, 0x77, 0x24, 0xc8, 0x8a, 0xf8, 0xde, 0x37, 0x9c, 0xc7, 0xee, 0x37, 0x0d, 0xe8, 0x8d, 0xa9, - 0xe4, 0xc7, 0x3f, 0x7f, 0x98, 0xc4, 0xc9, 0x15, 0xca, 0xc9, 0x05, 0x25, 0xeb, 0x72, 0xe2, 0x36, - 0xd2, 0x8b, 0x1c, 0x7d, 0x02, 0xb2, 0xe7, 0x24, 0x6e, 0xb7, 0x6d, 0x94, 0x8f, 0x44, 0x3b, 0x29, - 0x5f, 0xa9, 0xbc, 0x1a, 0xe5, 0x1e, 0xab, 0x68, 0x85, 0x73, 0xd1, 0xa3, 0x3f, 0xaf, 0x45, 0xe9, - 0x7c, 0x5f, 0x82, 0x55, 0xd6, 0xe6, 0xe6, 0xa7, 0x7f, 0x2b, 0x9c, 0x4e, 0x44, 0xcb, 0xeb, 0x0c, - 0x6c, 0xe5, 0xa3, 0xd8, 0x5a, 0xcf, 0x8d, 0xb3, 0x45, 0xa4, 0xe2, 0xd0, 0x20, 0x26, 0x74, 0x72, - 0x46, 0xca, 0x24, 0x3a, 0x49, 0xa4, 0xeb, 0x94, 0xed, 0x28, 0xd2, 0x2b, 0x68, 0x79, 0x44, 0x9a, - 0x35, 0x9b, 0x7e, 0x87, 0xe4, 0x8c, 0xb4, 0x35, 0x45, 0xa4, 0xfc, 0xca, 0x14, 0x69, 0x88, 0x5d, - 0x9e, 0x53, 0xd9, 0xb9, 0x15, 0xc5, 0xce, 0x5a, 0x2e, 0xc8, 0x0e, 0x91, 0xc3, 0x1f, 0x79, 0x1f, - 0xcb, 0x8b, 0x1c, 0xdd, 0x9a, 0x74, 0x0c, 0x8e, 0xf5, 0xb0, 0x46, 0x46, 0xb2, 0xb7, 0xa2, 0x78, - 0x39, 0xaf, 0x9c, 0x0b, 0xf0, 0xe2, 0x9e, 0x74, 0x84, 0xa7, 0xdf, 0x85, 0xe5, 0x40, 0xb3, 0x6c, - 0x84, 0x88, 0xc2, 0x5b, 0x6a, 0x23, 0xd9, 0xb9, 0x4a, 0x69, 0x5f, 0x54, 0x36, 0x38, 0x6d, 0x7a, - 0xb6, 0x8d, 0x51, 0xff, 0x9e, 0x04, 0x17, 0x34, 0x6c, 0xe3, 0x7e, 0xfb, 0xf0, 0x44, 0x68, 0x00, - 0x66, 0x95, 0x86, 0xc3, 0x49, 0x96, 0x12, 0x45, 0xb7, 0x10, 0x25, 0x06, 0x37, 0xa5, 0x17, 0xc5, - 0x60, 0x51, 0xd2, 0xc7, 0x02, 0x4d, 0xc2, 0xd4, 0x37, 0x24, 0xd8, 0x64, 0x4c, 0x85, 0xb3, 0xb4, - 0x19, 0x69, 0x15, 0xd3, 0x0f, 0x1a, 0xe5, 0x5a, 0x88, 0x3c, 0xc2, 0xd9, 0x10, 0xbd, 0x86, 0x75, - 0x11, 0x9f, 0xde, 0x6b, 0xe8, 0xba, 0x19, 0xbd, 0x86, 0xf5, 0x20, 0x07, 0xbd, 0x86, 0x51, 0x9e, - 0xe6, 0x35, 0x62, 0x17, 0xf1, 0x54, 0x76, 0x66, 0xf3, 0x1a, 0xca, 0x0e, 0x8f, 0xf2, 0x3e, 0xaf, - 0x99, 0xc4, 0x51, 0x78, 0x5f, 0xf3, 0x73, 0xfa, 0x0c, 0xe5, 0x24, 0xca, 0x6a, 0x85, 0xae, 0x6c, - 0xa6, 0x3a, 0xd6, 0xb1, 0xfc, 0x52, 0xac, 0x96, 0x33, 0x12, 0x6e, 0x2e, 0xe2, 0xd1, 0xe3, 0xf6, - 0x67, 0x9f, 0xfe, 0xe8, 0x71, 0xdb, 0x89, 0x67, 0x3b, 0x7a, 0x78, 0x6f, 0xf2, 0xd8, 0xd1, 0xe3, - 0xd2, 0x9f, 0x76, 0xf4, 0xf8, 0x7b, 0xb1, 0x67, 0x60, 0x6b, 0xb6, 0xa3, 0x87, 0xb3, 0x45, 0xa4, - 0xf2, 0x14, 0x92, 0x54, 0x2a, 0x87, 0x47, 0x7a, 0xb4, 0x38, 0x2e, 0x4f, 0x6b, 0x69, 0xb5, 0x95, - 0x9b, 0x51, 0x84, 0x65, 0xb4, 0x34, 0x22, 0xdc, 0x23, 0x54, 0x7e, 0x5f, 0x82, 0x4c, 0x9d, 0xd0, - 0xf4, 0xae, 0x67, 0x57, 0x27, 0xfe, 0x08, 0xc3, 0x34, 0x23, 0x7d, 0x3d, 0x8a, 0x74, 0x36, 0xb7, - 0x2a, 0xd8, 0x06, 0xc7, 0x46, 0x77, 0xfd, 0x4d, 0x09, 0xd6, 0x38, 0xda, 0x11, 0x15, 0x1b, 0x3b, - 0xe8, 0x66, 0x44, 0x52, 0x34, 0xde, 0xe0, 0x1d, 0xc9, 0xce, 0x2b, 0x94, 0xf6, 0x35, 0x65, 0x8b, - 0xd3, 0xf6, 0x08, 0xe7, 0xe9, 0xe7, 0x48, 0xd8, 0x76, 0x06, 0xcf, 0x88, 0x85, 0x3a, 0x84, 0x91, - 0x63, 0xc8, 0xf8, 0x19, 0x50, 0xa6, 0x33, 0x10, 0x49, 0xf9, 0x26, 0xa5, 0x7c, 0x45, 0xb9, 0x28, - 0x86, 0x50, 0x1f, 0x79, 0x1b, 0x3b, 0x83, 0x67, 0x84, 0xee, 0xb7, 0x25, 0x90, 0xdd, 0x28, 0xe6, - 0xa9, 0xe1, 0xca, 0x44, 0x35, 0x30, 0xf0, 0x48, 0xe2, 0x77, 0xa2, 0xb4, 0xb0, 0x95, 0xdb, 0x0c, - 0xd1, 0x42, 0x9e, 0x7f, 0xa2, 0xc5, 0x72, 0xf2, 0x64, 0xa1, 0xdd, 0x3e, 0x3c, 0xd2, 0xab, 0x8d, - 0x5a, 0xa4, 0x0d, 0x5e, 0x89, 0xea, 0x88, 0x16, 0x5a, 0x99, 0x27, 0x98, 0xbf, 0xb2, 0xe2, 0xb3, - 0xc2, 0xbc, 0xe9, 0x0c, 0x78, 0xec, 0x14, 0xfa, 0xbd, 0x1b, 0x35, 0x74, 0x79, 0xf2, 0x9d, 0xbb, - 0xea, 0x0c, 0x66, 0xe3, 0xe4, 0x8b, 0x51, 0x9c, 0x5c, 0xcc, 0x6d, 0x8c, 0x71, 0x22, 0xc6, 0xce, - 0x2e, 0xb9, 0x25, 0xf4, 0xcc, 0x63, 0x3c, 0x45, 0x1e, 0x51, 0x7a, 0x88, 0x0e, 0x4c, 0xdb, 0xe3, - 0x22, 0x40, 0x27, 0x90, 0x12, 0x7e, 0x73, 0x21, 0xe2, 0xae, 0x36, 0xfe, 0xab, 0x0c, 0xb3, 0x9b, - 0x20, 0xef, 0x2c, 0xff, 0x94, 0x52, 0x6c, 0xda, 0x4f, 0x8c, 0x81, 0xd1, 0x37, 0xa8, 0xe9, 0x7f, - 0x08, 0x29, 0x7e, 0x73, 0xdf, 0x3d, 0x29, 0x97, 0x26, 0x27, 0x0d, 0x13, 0xae, 0x1d, 0xab, 0x94, - 0x62, 0x06, 0xa5, 0x04, 0xa3, 0x47, 0xc7, 0x80, 0xf6, 0xb0, 0x23, 0xbc, 0x94, 0xa1, 0x24, 0x94, - 0x69, 0x8d, 0x8f, 0x91, 0x95, 0x01, 0x01, 0x46, 0xc9, 0xb1, 0xa3, 0x18, 0xa1, 0xbc, 0xd0, 0x5a, - 0xcc, 0xe9, 0xfe, 0xa9, 0x04, 0x88, 0xbd, 0x26, 0x10, 0x56, 0x44, 0x85, 0xf9, 0xa8, 0xae, 0xdd, - 0xdc, 0xce, 0xac, 0xe0, 0xdc, 0xd6, 0x78, 0xc1, 0x51, 0x39, 0xeb, 0xe7, 0xa8, 0x69, 0x53, 0x30, - 0x6e, 0xe6, 0x6b, 0x5e, 0xfb, 0xa6, 0xd8, 0x52, 0xff, 0xda, 0x34, 0x52, 0xc1, 0xa6, 0xcf, 0x19, - 0x04, 0x34, 0xba, 0x08, 0xfa, 0xd9, 0xd1, 0x5d, 0x54, 0x2c, 0xad, 0x4e, 0xb1, 0x5d, 0xb0, 0x0e, - 0xbb, 0xeb, 0xd3, 0xba, 0x11, 0x27, 0x17, 0xbb, 0x42, 0x7a, 0x08, 0x5d, 0x3d, 0x29, 0xcb, 0x79, - 0xda, 0x52, 0xee, 0x93, 0xc7, 0xdf, 0x4b, 0xb0, 0xca, 0xdf, 0x62, 0x09, 0x2f, 0x78, 0x6c, 0xb4, - 0x33, 0x63, 0x77, 0x9a, 0xcb, 0x4d, 0x7e, 0x66, 0x78, 0xce, 0x54, 0x74, 0x94, 0x54, 0x36, 0xf3, - 0x9d, 0xae, 0xf9, 0x48, 0xef, 0xe6, 0xf9, 0xaf, 0x32, 0x9a, 0x56, 0xc7, 0xc7, 0xf3, 0x27, 0x00, - 0x65, 0xbb, 0xac, 0xf7, 0x68, 0xaf, 0x57, 0x64, 0x58, 0x08, 0x3f, 0x4a, 0x03, 0x4d, 0x64, 0xca, - 0x4e, 0x14, 0x1b, 0x67, 0xd1, 0xaa, 0xcb, 0x46, 0xd3, 0xb0, 0x0d, 0xbd, 0x47, 0x1b, 0xcd, 0xd0, - 0x1f, 0x4a, 0xb4, 0x64, 0x7e, 0x78, 0xf2, 0x21, 0x43, 0x2e, 0x76, 0x5e, 0x45, 0x71, 0xa2, 0x44, - 0xc9, 0x46, 0xe8, 0xc9, 0xba, 0x1d, 0xc5, 0xc7, 0x06, 0x3a, 0x97, 0x17, 0x9a, 0xb7, 0xf2, 0x1c, - 0x55, 0xbe, 0x87, 0x77, 0xff, 0x59, 0xfa, 0x5e, 0xe1, 0x5b, 0x12, 0xfa, 0x12, 0xfb, 0xe9, 0xbb, - 0xad, 0x42, 0xad, 0xac, 0x6c, 0xa3, 0x1b, 0x8f, 0x1d, 0x67, 0x60, 0xdf, 0xcd, 0xe7, 0x3b, 0x86, - 0xf3, 0x78, 0xf8, 0x68, 0xa7, 0x65, 0xf6, 0xf2, 0x2d, 0xdd, 0x1c, 0x2d, 0x1c, 0x3c, 0xe9, 0xd0, - 0x22, 0xd1, 0xed, 0xf8, 0x6b, 0x3b, 0xaf, 0x6f, 0x4b, 0xb1, 0xdb, 0xe2, 0xa7, 0x05, 0xf9, 0x8f, - 0x6c, 0xb3, 0xef, 0x1f, 0xe9, 0x58, 0x83, 0xd6, 0xdd, 0x31, 0x98, 0xbb, 0x63, 0x30, 0x1f, 0xde, - 0x9c, 0x46, 0x91, 0xfe, 0x6e, 0x38, 0x01, 0x7d, 0x34, 0x4f, 0x25, 0xf4, 0xc6, 0xff, 0x05, 0x00, - 0x00, 0xff, 0xff, 0xa5, 0x71, 0x9e, 0x99, 0x72, 0x5c, 0x00, 0x00, + type x struct{} + out := protoimpl.TypeBuilder{ + File: protoimpl.DescBuilder{ + GoPackagePath: reflect.TypeOf(x{}).PkgPath(), + RawDescriptor: file_auth_proto_rawDesc, + NumEnums: 8, + NumMessages: 29, + NumExtensions: 0, + NumServices: 1, + }, + GoTypes: file_auth_proto_goTypes, + DependencyIndexes: file_auth_proto_depIdxs, + EnumInfos: file_auth_proto_enumTypes, + MessageInfos: file_auth_proto_msgTypes, + }.Build() + File_auth_proto = out.File + file_auth_proto_rawDesc = nil + file_auth_proto_goTypes = nil + file_auth_proto_depIdxs = nil } // Reference imports to suppress errors if they are not otherwise used. @@ -6212,33 +3432,14 @@ type AuthServiceClient interface { Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) // Authorization - GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) - CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) - RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) - CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) - GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) - GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) - SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) - VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) - VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) - VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) - GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) - GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) - TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) - CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) //User - IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) - RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) - RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) - VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) - ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) @@ -6247,22 +3448,13 @@ type AuthServiceClient interface { UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) - RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) - PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) // MFA AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) - SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) //TODO: Remove func only for tests GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) - //Application - GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) - SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) - AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) - //Grant - SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) //Permission @@ -6304,114 +3496,6 @@ func (c *authServiceClient) Validate(ctx context.Context, in *empty.Empty, opts return out, nil } -func (c *authServiceClient) GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { - out := new(UserAgent) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgent", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) { - out := new(UserAgent) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateUserAgent", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { - out := new(UserAgent) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateAuthSession", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSession", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) { - out := new(AuthSessionView) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SelectUser", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUser", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyPassword", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { - out := new(AuthSessionResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfa", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) { - out := new(UserSessions) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) { - out := new(UserSession) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserSession", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) { out := new(UserSessionViews) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", in, out, opts...) @@ -6421,51 +3505,6 @@ func (c *authServiceClient) GetMyUserSessions(ctx context.Context, in *empty.Emp return out, nil } -func (c *authServiceClient) TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/TerminateUserSession", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) { - out := new(Token) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateToken", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { - out := new(UniqueUserResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsUserUnique", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) { - out := new(User) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUser", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) { - out := new(User) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) { out := new(UserProfile) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", in, out, opts...) @@ -6511,15 +3550,6 @@ func (c *authServiceClient) VerifyMyUserEmail(ctx context.Context, in *VerifyMyU return out, nil } -func (c *authServiceClient) VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { out := new(empty.Empty) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", in, out, opts...) @@ -6529,15 +3559,6 @@ func (c *authServiceClient) ResendMyEmailVerificationMail(ctx context.Context, i return out, nil } -func (c *authServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) { out := new(UserPhone) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", in, out, opts...) @@ -6610,24 +3631,6 @@ func (c *authServiceClient) SetMyPassword(ctx context.Context, in *PasswordReque return out, nil } -func (c *authServiceClient) RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/PasswordReset", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) { out := new(empty.Empty) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", in, out, opts...) @@ -6664,15 +3667,6 @@ func (c *authServiceClient) RemoveMfaOTP(ctx context.Context, in *empty.Empty, o return out, nil } -func (c *authServiceClient) SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) { - out := new(empty.Empty) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SkipMfaInit", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { out := new(User) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserByID", in, out, opts...) @@ -6682,42 +3676,6 @@ func (c *authServiceClient) GetUserByID(ctx context.Context, in *UserID, opts .. return out, nil } -func (c *authServiceClient) GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { - out := new(Application) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetApplicationByID", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { - out := new(ApplicationSearchResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchApplications", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) { - out := new(Application) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - -func (c *authServiceClient) SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) { - out := new(GrantSearchResponse) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchGrant", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) { out := new(MyProjectOrgSearchResponse) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", in, out, opts...) @@ -6752,33 +3710,14 @@ type AuthServiceServer interface { Ready(context.Context, *empty.Empty) (*empty.Empty, error) Validate(context.Context, *empty.Empty) (*_struct.Struct, error) // Authorization - GetUserAgent(context.Context, *UserAgentID) (*UserAgent, error) - CreateUserAgent(context.Context, *UserAgentCreation) (*UserAgent, error) - RevokeUserAgent(context.Context, *UserAgentID) (*UserAgent, error) - CreateAuthSession(context.Context, *AuthSessionCreation) (*AuthSessionResponse, error) - GetAuthSession(context.Context, *AuthSessionID) (*AuthSessionResponse, error) - GetAuthSessionByTokenID(context.Context, *TokenID) (*AuthSessionView, error) - SelectUser(context.Context, *SelectUserRequest) (*AuthSessionResponse, error) - VerifyUser(context.Context, *VerifyUserRequest) (*AuthSessionResponse, error) - VerifyPassword(context.Context, *VerifyPasswordRequest) (*AuthSessionResponse, error) - VerifyMfa(context.Context, *VerifyMfaRequest) (*AuthSessionResponse, error) - GetUserAgentSessions(context.Context, *UserAgentID) (*UserSessions, error) - GetUserSession(context.Context, *UserSessionID) (*UserSession, error) GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) - TerminateUserSession(context.Context, *UserSessionID) (*empty.Empty, error) - CreateToken(context.Context, *CreateTokenRequest) (*Token, error) //User - IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) - RegisterUser(context.Context, *RegisterUserRequest) (*User, error) - RegisterUserWithExternal(context.Context, *RegisterUserExternalIDPRequest) (*User, error) GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) - VerifyUserEmail(context.Context, *VerifyUserEmailRequest) (*empty.Empty, error) ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) - ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) @@ -6787,22 +3726,13 @@ type AuthServiceServer interface { UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) - RequestPasswordReset(context.Context, *ResetPasswordRequest) (*empty.Empty, error) - PasswordReset(context.Context, *ResetPassword) (*empty.Empty, error) ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) // MFA AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) - SkipMfaInit(context.Context, *SkipMfaInitRequest) (*empty.Empty, error) //TODO: Remove func only for tests GetUserByID(context.Context, *UserID) (*User, error) - //Application - GetApplicationByID(context.Context, *ApplicationID) (*Application, error) - SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) - AuthorizeApplication(context.Context, *ApplicationAuthorizeRequest) (*Application, error) - //Grant - SearchGrant(context.Context, *GrantSearchRequest) (*GrantSearchResponse, error) SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) //Permission @@ -6813,160 +3743,82 @@ type AuthServiceServer interface { type UnimplementedAuthServiceServer struct { } -func (*UnimplementedAuthServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) Healthz(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") } -func (*UnimplementedAuthServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) Ready(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") } -func (*UnimplementedAuthServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { +func (*UnimplementedAuthServiceServer) Validate(context.Context, *empty.Empty) (*_struct.Struct, error) { return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") } -func (*UnimplementedAuthServiceServer) GetUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetUserAgent not implemented") -} -func (*UnimplementedAuthServiceServer) CreateUserAgent(ctx context.Context, req *UserAgentCreation) (*UserAgent, error) { - return nil, status.Errorf(codes.Unimplemented, "method CreateUserAgent not implemented") -} -func (*UnimplementedAuthServiceServer) RevokeUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { - return nil, status.Errorf(codes.Unimplemented, "method RevokeUserAgent not implemented") -} -func (*UnimplementedAuthServiceServer) CreateAuthSession(ctx context.Context, req *AuthSessionCreation) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method CreateAuthSession not implemented") -} -func (*UnimplementedAuthServiceServer) GetAuthSession(ctx context.Context, req *AuthSessionID) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetAuthSession not implemented") -} -func (*UnimplementedAuthServiceServer) GetAuthSessionByTokenID(ctx context.Context, req *TokenID) (*AuthSessionView, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetAuthSessionByTokenID not implemented") -} -func (*UnimplementedAuthServiceServer) SelectUser(ctx context.Context, req *SelectUserRequest) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method SelectUser not implemented") -} -func (*UnimplementedAuthServiceServer) VerifyUser(ctx context.Context, req *VerifyUserRequest) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method VerifyUser not implemented") -} -func (*UnimplementedAuthServiceServer) VerifyPassword(ctx context.Context, req *VerifyPasswordRequest) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method VerifyPassword not implemented") -} -func (*UnimplementedAuthServiceServer) VerifyMfa(ctx context.Context, req *VerifyMfaRequest) (*AuthSessionResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method VerifyMfa not implemented") -} -func (*UnimplementedAuthServiceServer) GetUserAgentSessions(ctx context.Context, req *UserAgentID) (*UserSessions, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetUserAgentSessions not implemented") -} -func (*UnimplementedAuthServiceServer) GetUserSession(ctx context.Context, req *UserSessionID) (*UserSession, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetUserSession not implemented") -} -func (*UnimplementedAuthServiceServer) GetMyUserSessions(ctx context.Context, req *empty.Empty) (*UserSessionViews, error) { +func (*UnimplementedAuthServiceServer) GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyUserSessions not implemented") } -func (*UnimplementedAuthServiceServer) TerminateUserSession(ctx context.Context, req *UserSessionID) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method TerminateUserSession not implemented") -} -func (*UnimplementedAuthServiceServer) CreateToken(ctx context.Context, req *CreateTokenRequest) (*Token, error) { - return nil, status.Errorf(codes.Unimplemented, "method CreateToken not implemented") -} -func (*UnimplementedAuthServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") -} -func (*UnimplementedAuthServiceServer) RegisterUser(ctx context.Context, req *RegisterUserRequest) (*User, error) { - return nil, status.Errorf(codes.Unimplemented, "method RegisterUser not implemented") -} -func (*UnimplementedAuthServiceServer) RegisterUserWithExternal(ctx context.Context, req *RegisterUserExternalIDPRequest) (*User, error) { - return nil, status.Errorf(codes.Unimplemented, "method RegisterUserWithExternal not implemented") -} -func (*UnimplementedAuthServiceServer) GetMyUserProfile(ctx context.Context, req *empty.Empty) (*UserProfile, error) { +func (*UnimplementedAuthServiceServer) GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyUserProfile not implemented") } -func (*UnimplementedAuthServiceServer) UpdateMyUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { +func (*UnimplementedAuthServiceServer) UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserProfile not implemented") } -func (*UnimplementedAuthServiceServer) GetMyUserEmail(ctx context.Context, req *empty.Empty) (*UserEmail, error) { +func (*UnimplementedAuthServiceServer) GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyUserEmail not implemented") } -func (*UnimplementedAuthServiceServer) ChangeMyUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { +func (*UnimplementedAuthServiceServer) ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) { return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserEmail not implemented") } -func (*UnimplementedAuthServiceServer) VerifyMyUserEmail(ctx context.Context, req *VerifyMyUserEmailRequest) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserEmail not implemented") } -func (*UnimplementedAuthServiceServer) VerifyUserEmail(ctx context.Context, req *VerifyUserEmailRequest) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method VerifyUserEmail not implemented") -} -func (*UnimplementedAuthServiceServer) ResendMyEmailVerificationMail(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method ResendMyEmailVerificationMail not implemented") } -func (*UnimplementedAuthServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") -} -func (*UnimplementedAuthServiceServer) GetMyUserPhone(ctx context.Context, req *empty.Empty) (*UserPhone, error) { +func (*UnimplementedAuthServiceServer) GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyUserPhone not implemented") } -func (*UnimplementedAuthServiceServer) ChangeMyUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { +func (*UnimplementedAuthServiceServer) ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) { return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserPhone not implemented") } -func (*UnimplementedAuthServiceServer) VerifyMyUserPhone(ctx context.Context, req *VerifyUserPhoneRequest) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserPhone not implemented") } -func (*UnimplementedAuthServiceServer) ResendMyPhoneVerificationCode(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) ResendMyPhoneVerificationCode(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method ResendMyPhoneVerificationCode not implemented") } -func (*UnimplementedAuthServiceServer) GetMyUserAddress(ctx context.Context, req *empty.Empty) (*UserAddress, error) { +func (*UnimplementedAuthServiceServer) GetMyUserAddress(context.Context, *empty.Empty) (*UserAddress, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyUserAddress not implemented") } -func (*UnimplementedAuthServiceServer) UpdateMyUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { +func (*UnimplementedAuthServiceServer) UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserAddress not implemented") } -func (*UnimplementedAuthServiceServer) GetMyMfas(ctx context.Context, req *empty.Empty) (*MultiFactors, error) { +func (*UnimplementedAuthServiceServer) GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyMfas not implemented") } -func (*UnimplementedAuthServiceServer) SetMyPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method SetMyPassword not implemented") } -func (*UnimplementedAuthServiceServer) RequestPasswordReset(ctx context.Context, req *ResetPasswordRequest) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method RequestPasswordReset not implemented") -} -func (*UnimplementedAuthServiceServer) PasswordReset(ctx context.Context, req *ResetPassword) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method PasswordReset not implemented") -} -func (*UnimplementedAuthServiceServer) ChangeMyPassword(ctx context.Context, req *PasswordChange) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method ChangeMyPassword not implemented") } -func (*UnimplementedAuthServiceServer) AddMfaOTP(ctx context.Context, req *empty.Empty) (*MfaOtpResponse, error) { +func (*UnimplementedAuthServiceServer) AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AddMfaOTP not implemented") } -func (*UnimplementedAuthServiceServer) VerifyMfaOTP(ctx context.Context, req *VerifyMfaOtp) (*MfaOtpResponse, error) { +func (*UnimplementedAuthServiceServer) VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method VerifyMfaOTP not implemented") } -func (*UnimplementedAuthServiceServer) RemoveMfaOTP(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { +func (*UnimplementedAuthServiceServer) RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method RemoveMfaOTP not implemented") } -func (*UnimplementedAuthServiceServer) SkipMfaInit(ctx context.Context, req *SkipMfaInitRequest) (*empty.Empty, error) { - return nil, status.Errorf(codes.Unimplemented, "method SkipMfaInit not implemented") -} -func (*UnimplementedAuthServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { +func (*UnimplementedAuthServiceServer) GetUserByID(context.Context, *UserID) (*User, error) { return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") } -func (*UnimplementedAuthServiceServer) GetApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetApplicationByID not implemented") -} -func (*UnimplementedAuthServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") -} -func (*UnimplementedAuthServiceServer) AuthorizeApplication(ctx context.Context, req *ApplicationAuthorizeRequest) (*Application, error) { - return nil, status.Errorf(codes.Unimplemented, "method AuthorizeApplication not implemented") -} -func (*UnimplementedAuthServiceServer) SearchGrant(ctx context.Context, req *GrantSearchRequest) (*GrantSearchResponse, error) { - return nil, status.Errorf(codes.Unimplemented, "method SearchGrant not implemented") -} -func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(ctx context.Context, req *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { +func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method SearchMyProjectOrgs not implemented") } -func (*UnimplementedAuthServiceServer) IsIamAdmin(ctx context.Context, req *empty.Empty) (*IsAdminResponse, error) { +func (*UnimplementedAuthServiceServer) IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method IsIamAdmin not implemented") } -func (*UnimplementedAuthServiceServer) GetMyZitadelPermissions(ctx context.Context, req *empty.Empty) (*MyPermissions, error) { +func (*UnimplementedAuthServiceServer) GetMyZitadelPermissions(context.Context, *empty.Empty) (*MyPermissions, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMyZitadelPermissions not implemented") } @@ -7028,222 +3880,6 @@ func _AuthService_Validate_Handler(srv interface{}, ctx context.Context, dec fun return interceptor(ctx, in, info, handler) } -func _AuthService_GetUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserAgentID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetUserAgent(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgent", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetUserAgent(ctx, req.(*UserAgentID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_CreateUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserAgentCreation) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).CreateUserAgent(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/CreateUserAgent", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).CreateUserAgent(ctx, req.(*UserAgentCreation)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_RevokeUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserAgentID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).RevokeUserAgent(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).RevokeUserAgent(ctx, req.(*UserAgentID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_CreateAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(AuthSessionCreation) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).CreateAuthSession(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/CreateAuthSession", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).CreateAuthSession(ctx, req.(*AuthSessionCreation)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_GetAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(AuthSessionID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetAuthSession(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSession", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetAuthSession(ctx, req.(*AuthSessionID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_GetAuthSessionByTokenID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(TokenID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, req.(*TokenID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_SelectUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(SelectUserRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).SelectUser(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/SelectUser", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).SelectUser(ctx, req.(*SelectUserRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_VerifyUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(VerifyUserRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).VerifyUser(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUser", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).VerifyUser(ctx, req.(*VerifyUserRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_VerifyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(VerifyPasswordRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).VerifyPassword(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyPassword", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).VerifyPassword(ctx, req.(*VerifyPasswordRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_VerifyMfa_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(VerifyMfaRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).VerifyMfa(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfa", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).VerifyMfa(ctx, req.(*VerifyMfaRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_GetUserAgentSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserAgentID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetUserAgentSessions(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetUserAgentSessions(ctx, req.(*UserAgentID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_GetUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserSessionID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetUserSession(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserSession", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetUserSession(ctx, req.(*UserSessionID)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_GetMyUserSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(empty.Empty) if err := dec(in); err != nil { @@ -7262,96 +3898,6 @@ func _AuthService_GetMyUserSessions_Handler(srv interface{}, ctx context.Context return interceptor(ctx, in, info, handler) } -func _AuthService_TerminateUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserSessionID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).TerminateUserSession(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/TerminateUserSession", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).TerminateUserSession(ctx, req.(*UserSessionID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_CreateToken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(CreateTokenRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).CreateToken(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/CreateToken", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).CreateToken(ctx, req.(*CreateTokenRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UniqueUserRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).IsUserUnique(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/IsUserUnique", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_RegisterUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(RegisterUserRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).RegisterUser(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUser", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).RegisterUser(ctx, req.(*RegisterUserRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_RegisterUserWithExternal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(RegisterUserExternalIDPRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, req.(*RegisterUserExternalIDPRequest)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_GetMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(empty.Empty) if err := dec(in); err != nil { @@ -7442,24 +3988,6 @@ func _AuthService_VerifyMyUserEmail_Handler(srv interface{}, ctx context.Context return interceptor(ctx, in, info, handler) } -func _AuthService_VerifyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(VerifyUserEmailRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).VerifyUserEmail(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).VerifyUserEmail(ctx, req.(*VerifyUserEmailRequest)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_ResendMyEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(empty.Empty) if err := dec(in); err != nil { @@ -7478,24 +4006,6 @@ func _AuthService_ResendMyEmailVerificationMail_Handler(srv interface{}, ctx con return interceptor(ctx, in, info, handler) } -func _AuthService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_GetMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(empty.Empty) if err := dec(in); err != nil { @@ -7640,42 +4150,6 @@ func _AuthService_SetMyPassword_Handler(srv interface{}, ctx context.Context, de return interceptor(ctx, in, info, handler) } -func _AuthService_RequestPasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(ResetPasswordRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).RequestPasswordReset(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).RequestPasswordReset(ctx, req.(*ResetPasswordRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_PasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(ResetPassword) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).PasswordReset(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/PasswordReset", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).PasswordReset(ctx, req.(*ResetPassword)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_ChangeMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(PasswordChange) if err := dec(in); err != nil { @@ -7748,24 +4222,6 @@ func _AuthService_RemoveMfaOTP_Handler(srv interface{}, ctx context.Context, dec return interceptor(ctx, in, info, handler) } -func _AuthService_SkipMfaInit_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(SkipMfaInitRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).SkipMfaInit(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/SkipMfaInit", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).SkipMfaInit(ctx, req.(*SkipMfaInitRequest)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UserID) if err := dec(in); err != nil { @@ -7784,78 +4240,6 @@ func _AuthService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec return interceptor(ctx, in, info, handler) } -func _AuthService_GetApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(ApplicationID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetApplicationByID(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetApplicationByID", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetApplicationByID(ctx, req.(*ApplicationID)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(ApplicationSearchRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).SearchApplications(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/SearchApplications", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_AuthorizeApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(ApplicationAuthorizeRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).AuthorizeApplication(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).AuthorizeApplication(ctx, req.(*ApplicationAuthorizeRequest)) - } - return interceptor(ctx, in, info, handler) -} - -func _AuthService_SearchGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(GrantSearchRequest) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).SearchGrant(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/SearchGrant", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).SearchGrant(ctx, req.(*GrantSearchRequest)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_SearchMyProjectOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(MyProjectOrgSearchRequest) if err := dec(in); err != nil { @@ -7926,78 +4310,10 @@ var _AuthService_serviceDesc = grpc.ServiceDesc{ MethodName: "Validate", Handler: _AuthService_Validate_Handler, }, - { - MethodName: "GetUserAgent", - Handler: _AuthService_GetUserAgent_Handler, - }, - { - MethodName: "CreateUserAgent", - Handler: _AuthService_CreateUserAgent_Handler, - }, - { - MethodName: "RevokeUserAgent", - Handler: _AuthService_RevokeUserAgent_Handler, - }, - { - MethodName: "CreateAuthSession", - Handler: _AuthService_CreateAuthSession_Handler, - }, - { - MethodName: "GetAuthSession", - Handler: _AuthService_GetAuthSession_Handler, - }, - { - MethodName: "GetAuthSessionByTokenID", - Handler: _AuthService_GetAuthSessionByTokenID_Handler, - }, - { - MethodName: "SelectUser", - Handler: _AuthService_SelectUser_Handler, - }, - { - MethodName: "VerifyUser", - Handler: _AuthService_VerifyUser_Handler, - }, - { - MethodName: "VerifyPassword", - Handler: _AuthService_VerifyPassword_Handler, - }, - { - MethodName: "VerifyMfa", - Handler: _AuthService_VerifyMfa_Handler, - }, - { - MethodName: "GetUserAgentSessions", - Handler: _AuthService_GetUserAgentSessions_Handler, - }, - { - MethodName: "GetUserSession", - Handler: _AuthService_GetUserSession_Handler, - }, { MethodName: "GetMyUserSessions", Handler: _AuthService_GetMyUserSessions_Handler, }, - { - MethodName: "TerminateUserSession", - Handler: _AuthService_TerminateUserSession_Handler, - }, - { - MethodName: "CreateToken", - Handler: _AuthService_CreateToken_Handler, - }, - { - MethodName: "IsUserUnique", - Handler: _AuthService_IsUserUnique_Handler, - }, - { - MethodName: "RegisterUser", - Handler: _AuthService_RegisterUser_Handler, - }, - { - MethodName: "RegisterUserWithExternal", - Handler: _AuthService_RegisterUserWithExternal_Handler, - }, { MethodName: "GetMyUserProfile", Handler: _AuthService_GetMyUserProfile_Handler, @@ -8018,18 +4334,10 @@ var _AuthService_serviceDesc = grpc.ServiceDesc{ MethodName: "VerifyMyUserEmail", Handler: _AuthService_VerifyMyUserEmail_Handler, }, - { - MethodName: "VerifyUserEmail", - Handler: _AuthService_VerifyUserEmail_Handler, - }, { MethodName: "ResendMyEmailVerificationMail", Handler: _AuthService_ResendMyEmailVerificationMail_Handler, }, - { - MethodName: "ResendEmailVerificationMail", - Handler: _AuthService_ResendEmailVerificationMail_Handler, - }, { MethodName: "GetMyUserPhone", Handler: _AuthService_GetMyUserPhone_Handler, @@ -8062,14 +4370,6 @@ var _AuthService_serviceDesc = grpc.ServiceDesc{ MethodName: "SetMyPassword", Handler: _AuthService_SetMyPassword_Handler, }, - { - MethodName: "RequestPasswordReset", - Handler: _AuthService_RequestPasswordReset_Handler, - }, - { - MethodName: "PasswordReset", - Handler: _AuthService_PasswordReset_Handler, - }, { MethodName: "ChangeMyPassword", Handler: _AuthService_ChangeMyPassword_Handler, @@ -8086,30 +4386,10 @@ var _AuthService_serviceDesc = grpc.ServiceDesc{ MethodName: "RemoveMfaOTP", Handler: _AuthService_RemoveMfaOTP_Handler, }, - { - MethodName: "SkipMfaInit", - Handler: _AuthService_SkipMfaInit_Handler, - }, { MethodName: "GetUserByID", Handler: _AuthService_GetUserByID_Handler, }, - { - MethodName: "GetApplicationByID", - Handler: _AuthService_GetApplicationByID_Handler, - }, - { - MethodName: "SearchApplications", - Handler: _AuthService_SearchApplications_Handler, - }, - { - MethodName: "AuthorizeApplication", - Handler: _AuthService_AuthorizeApplication_Handler, - }, - { - MethodName: "SearchGrant", - Handler: _AuthService_SearchGrant_Handler, - }, { MethodName: "SearchMyProjectOrgs", Handler: _AuthService_SearchMyProjectOrgs_Handler, diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go deleted file mode 100644 index 00607cd705..0000000000 --- a/pkg/auth/api/grpc/auth.pb.gw.go +++ /dev/null @@ -1,2485 +0,0 @@ -// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. -// source: auth.proto - -/* -Package grpc is a reverse proxy. - -It translates gRPC into RESTful JSON APIs. -*/ -package grpc - -import ( - "context" - "io" - "net/http" - - "github.com/golang/protobuf/proto" - "github.com/golang/protobuf/ptypes/empty" - "github.com/grpc-ecosystem/grpc-gateway/runtime" - "github.com/grpc-ecosystem/grpc-gateway/utilities" - "google.golang.org/grpc" - "google.golang.org/grpc/codes" - "google.golang.org/grpc/grpclog" - "google.golang.org/grpc/status" -) - -var _ codes.Code -var _ io.Reader -var _ status.Status -var _ = runtime.String -var _ = utilities.NewDoubleArray - -func request_AuthService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserAgentID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_CreateUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserAgentCreation - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.CreateUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_RevokeUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserAgentID - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.RevokeUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_CreateAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq AuthSessionCreation - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - msg, err := client.CreateAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -var ( - filter_AuthService_GetAuthSession_0 = &utilities.DoubleArray{Encoding: map[string]int{"agent_id": 0, "id": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} -) - -func request_AuthService_GetAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq AuthSessionID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_GetAuthSession_0); err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.GetAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetAuthSessionByTokenID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq TokenID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetAuthSessionByTokenID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SelectUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq SelectUserRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["auth_session_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") - } - - protoReq.AuthSessionId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) - } - - msg, err := client.SelectUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyUserRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["auth_session_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") - } - - protoReq.AuthSessionId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) - } - - msg, err := client.VerifyUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyPasswordRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["auth_session_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") - } - - protoReq.AuthSessionId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) - } - - msg, err := client.VerifyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyMfa_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyMfaRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["auth_session_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") - } - - protoReq.AuthSessionId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) - } - - msg, err := client.VerifyMfa(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetUserAgentSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserAgentID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetUserAgentSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserSessionID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyUserSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyUserSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_TerminateUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserSessionID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.TerminateUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_CreateToken_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq CreateTokenRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["agent_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") - } - - protoReq.AgentId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) - } - - val, ok = pathParams["auth_session_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") - } - - protoReq.AuthSessionId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) - } - - msg, err := client.CreateToken(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -var ( - filter_AuthService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} -) - -func request_AuthService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UniqueUserRequest - var metadata runtime.ServerMetadata - - if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_IsUserUnique_0); err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_RegisterUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq RegisterUserRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.RegisterUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_RegisterUserWithExternal_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq RegisterUserExternalIDPRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.RegisterUserWithExternal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_UpdateMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UpdateUserProfileRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.UpdateMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ChangeMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UpdateUserEmailRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.ChangeMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyMyUserEmailRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.VerifyMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyUserEmailRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.VerifyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ResendMyEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.ResendMyEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserID - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ChangeMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UpdateUserPhoneRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.ChangeMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyUserPhoneRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.VerifyMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ResendMyPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.ResendMyPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_UpdateMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UpdateUserAddressRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.UpdateMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyMfas_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SetMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq PasswordRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.SetMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_RequestPasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq ResetPasswordRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.RequestPasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_PasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq ResetPassword - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.PasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_ChangeMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq PasswordChange - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.ChangeMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_AddMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.AddMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_VerifyMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq VerifyMfaOtp - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.VerifyMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.RemoveMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SkipMfaInit_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq SkipMfaInitRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["user_id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") - } - - protoReq.UserId, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) - } - - msg, err := client.SkipMfaInit(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq ApplicationID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq ApplicationSearchRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_AuthorizeApplication_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq ApplicationAuthorizeRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.AuthorizeApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SearchGrant_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq GrantSearchRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.SearchGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq MyProjectOrgSearchRequest - var metadata runtime.ServerMetadata - - newReader, berr := utilities.IOReaderFactory(req.Body) - if berr != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) - } - if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { - return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) - } - - msg, err := client.SearchMyProjectOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_IsIamAdmin_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.IsIamAdmin(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -func request_AuthService_GetMyZitadelPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq empty.Empty - var metadata runtime.ServerMetadata - - msg, err := client.GetMyZitadelPermissions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - -// RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but -// automatically dials to "endpoint" and closes the connection when "ctx" gets done. -func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { - conn, err := grpc.Dial(endpoint, opts...) - if err != nil { - return err - } - defer func() { - if err != nil { - if cerr := conn.Close(); cerr != nil { - grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) - } - return - } - go func() { - <-ctx.Done() - if cerr := conn.Close(); cerr != nil { - grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) - } - }() - }() - - return RegisterAuthServiceHandler(ctx, mux, conn) -} - -// RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux". -// The handlers forward requests to the grpc endpoint over "conn". -func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { - return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn)) -} - -// RegisterAuthServiceHandlerClient registers the http handlers for service AuthService -// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient". -// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient" -// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in -// "AuthServiceClient" to call the correct interceptors. -func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error { - - mux.Handle("GET", pattern_AuthService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_CreateUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_CreateUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_CreateUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_RevokeUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_RevokeUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_RevokeUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_CreateAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_CreateAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_CreateAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetAuthSessionByTokenID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetAuthSessionByTokenID_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetAuthSessionByTokenID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_SelectUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SelectUser_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SelectUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_VerifyUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyUser_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_VerifyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyPassword_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_VerifyMfa_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyMfa_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyMfa_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetUserAgentSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetUserAgentSessions_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetUserAgentSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetUserSession_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyUserSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyUserSessions_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyUserSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("DELETE", pattern_AuthService_TerminateUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_TerminateUserSession_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_TerminateUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_CreateToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_CreateToken_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_CreateToken_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_RegisterUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_RegisterUser_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_RegisterUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_RegisterUserWithExternal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_RegisterUserWithExternal_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_RegisterUserWithExternal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_UpdateMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_UpdateMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_UpdateMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_ChangeMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ChangeMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ChangeMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_VerifyMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_VerifyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_ResendMyEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ResendMyEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ResendMyEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_ChangeMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ChangeMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ChangeMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_VerifyMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_ResendMyPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ResendMyPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ResendMyPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_UpdateMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_UpdateMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_UpdateMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyMfas_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_SetMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SetMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SetMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_RequestPasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_RequestPasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_RequestPasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_PasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_PasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_PasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_ChangeMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_ChangeMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_ChangeMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_AddMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_AddMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_AddMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("PUT", pattern_AuthService_VerifyMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_VerifyMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_VerifyMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("DELETE", pattern_AuthService_RemoveMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_RemoveMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_RemoveMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_SkipMfaInit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SkipMfaInit_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SkipMfaInit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_AuthorizeApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_AuthorizeApplication_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_AuthorizeApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_SearchGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SearchGrant_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SearchGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_SearchMyProjectOrgs_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_SearchMyProjectOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_IsIamAdmin_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_IsIamAdmin_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_IsIamAdmin_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - mux.Handle("GET", pattern_AuthService_GetMyZitadelPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetMyZitadelPermissions_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetMyZitadelPermissions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - - return nil -} - -var ( - pattern_AuthService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) - - pattern_AuthService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) - - pattern_AuthService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) - - pattern_AuthService_GetUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) - - pattern_AuthService_CreateUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"useragents"}, "")) - - pattern_AuthService_RevokeUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) - - pattern_AuthService_CreateAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "agent_id", "authsessions"}, "")) - - pattern_AuthService_GetAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "authsessions", "id"}, "")) - - pattern_AuthService_GetAuthSessionByTokenID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"tokens", "id", "authsession"}, "")) - - pattern_AuthService_SelectUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_selectuser"}, "")) - - pattern_AuthService_VerifyUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifyuser"}, "")) - - pattern_AuthService_VerifyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifypassword"}, "")) - - pattern_AuthService_VerifyMfa_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifymfa"}, "")) - - pattern_AuthService_GetUserAgentSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "id", "usersessions"}, "")) - - pattern_AuthService_GetUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) - - pattern_AuthService_GetMyUserSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"me", "usersessions"}, "")) - - pattern_AuthService_TerminateUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) - - pattern_AuthService_CreateToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "tokens"}, "")) - - pattern_AuthService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) - - pattern_AuthService_RegisterUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_register"}, "")) - - pattern_AuthService_RegisterUserWithExternal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_externalregister"}, "")) - - pattern_AuthService_GetMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) - - pattern_AuthService_UpdateMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) - - pattern_AuthService_GetMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) - - pattern_AuthService_ChangeMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) - - pattern_AuthService_VerifyMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_verify"}, "")) - - pattern_AuthService_VerifyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_verify"}, "")) - - pattern_AuthService_ResendMyEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_resendverification"}, "")) - - pattern_AuthService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) - - pattern_AuthService_GetMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) - - pattern_AuthService_ChangeMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) - - pattern_AuthService_VerifyMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_verify"}, "")) - - pattern_AuthService_ResendMyPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_resendverification"}, "")) - - pattern_AuthService_GetMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) - - pattern_AuthService_UpdateMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) - - pattern_AuthService_GetMyMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "mfas"}, "")) - - pattern_AuthService_SetMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "passwords"}, "")) - - pattern_AuthService_RequestPasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "passwords", "_requestpwreset"}, "")) - - pattern_AuthService_PasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "passwords", "_resetpw"}, "")) - - pattern_AuthService_ChangeMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "passwords", "_change"}, "")) - - pattern_AuthService_AddMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) - - pattern_AuthService_VerifyMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"users", "me", "mfa", "otp", "_verify"}, "")) - - pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) - - pattern_AuthService_SkipMfaInit_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "user_id", "mfa", "_skipinit"}, "")) - - pattern_AuthService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) - - pattern_AuthService_GetApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"applications", "id"}, "")) - - pattern_AuthService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_search"}, "")) - - pattern_AuthService_AuthorizeApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_authorize"}, "")) - - pattern_AuthService_SearchGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"grants", "_search"}, "")) - - pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) - - pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) - - pattern_AuthService_GetMyZitadelPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"permissions", "zitadel", "me"}, "")) -) - -var ( - forward_AuthService_Healthz_0 = runtime.ForwardResponseMessage - - forward_AuthService_Ready_0 = runtime.ForwardResponseMessage - - forward_AuthService_Validate_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetUserAgent_0 = runtime.ForwardResponseMessage - - forward_AuthService_CreateUserAgent_0 = runtime.ForwardResponseMessage - - forward_AuthService_RevokeUserAgent_0 = runtime.ForwardResponseMessage - - forward_AuthService_CreateAuthSession_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetAuthSession_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetAuthSessionByTokenID_0 = runtime.ForwardResponseMessage - - forward_AuthService_SelectUser_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyUser_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyPassword_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyMfa_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetUserAgentSessions_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetUserSession_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyUserSessions_0 = runtime.ForwardResponseMessage - - forward_AuthService_TerminateUserSession_0 = runtime.ForwardResponseMessage - - forward_AuthService_CreateToken_0 = runtime.ForwardResponseMessage - - forward_AuthService_IsUserUnique_0 = runtime.ForwardResponseMessage - - forward_AuthService_RegisterUser_0 = runtime.ForwardResponseMessage - - forward_AuthService_RegisterUserWithExternal_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyUserProfile_0 = runtime.ForwardResponseMessage - - forward_AuthService_UpdateMyUserProfile_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyUserEmail_0 = runtime.ForwardResponseMessage - - forward_AuthService_ChangeMyUserEmail_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyMyUserEmail_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyUserEmail_0 = runtime.ForwardResponseMessage - - forward_AuthService_ResendMyEmailVerificationMail_0 = runtime.ForwardResponseMessage - - forward_AuthService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyUserPhone_0 = runtime.ForwardResponseMessage - - forward_AuthService_ChangeMyUserPhone_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyMyUserPhone_0 = runtime.ForwardResponseMessage - - forward_AuthService_ResendMyPhoneVerificationCode_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyUserAddress_0 = runtime.ForwardResponseMessage - - forward_AuthService_UpdateMyUserAddress_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyMfas_0 = runtime.ForwardResponseMessage - - forward_AuthService_SetMyPassword_0 = runtime.ForwardResponseMessage - - forward_AuthService_RequestPasswordReset_0 = runtime.ForwardResponseMessage - - forward_AuthService_PasswordReset_0 = runtime.ForwardResponseMessage - - forward_AuthService_ChangeMyPassword_0 = runtime.ForwardResponseMessage - - forward_AuthService_AddMfaOTP_0 = runtime.ForwardResponseMessage - - forward_AuthService_VerifyMfaOTP_0 = runtime.ForwardResponseMessage - - forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage - - forward_AuthService_SkipMfaInit_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetUserByID_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetApplicationByID_0 = runtime.ForwardResponseMessage - - forward_AuthService_SearchApplications_0 = runtime.ForwardResponseMessage - - forward_AuthService_AuthorizeApplication_0 = runtime.ForwardResponseMessage - - forward_AuthService_SearchGrant_0 = runtime.ForwardResponseMessage - - forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage - - forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage - - forward_AuthService_GetMyZitadelPermissions_0 = runtime.ForwardResponseMessage -) diff --git a/pkg/auth/api/grpc/auth.swagger.json b/pkg/auth/api/grpc/auth.swagger.json index a90c611941..c73ed1a85f 100644 --- a/pkg/auth/api/grpc/auth.swagger.json +++ b/pkg/auth/api/grpc/auth.swagger.json @@ -19,83 +19,6 @@ "application/grpc" ], "paths": { - "/applications/_authorize": { - "post": { - "operationId": "AuthorizeApplication", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationAuthorizeRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/applications/_search": { - "post": { - "operationId": "SearchApplications", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1ApplicationSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ApplicationSearchRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/applications/{id}": { - "get": { - "summary": "Application", - "operationId": "GetApplicationByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Application" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, "/global/_isiamadmin": { "get": { "operationId": "IsIamAdmin", @@ -138,33 +61,6 @@ ] } }, - "/grants/_search": { - "post": { - "summary": "Grant", - "operationId": "SearchGrant", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1GrantSearchResponse" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1GrantSearchRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, "/healthz": { "get": { "summary": "Readiness", @@ -184,6 +80,7 @@ }, "/me/usersessions": { "get": { + "summary": "Authorization", "operationId": "GetMyUserSessions", "responses": { "200": { @@ -231,552 +128,6 @@ ] } }, - "/tokens/{id}/authsession": { - "get": { - "operationId": "GetAuthSessionByTokenID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionView" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents": { - "post": { - "operationId": "CreateUserAgent", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserAgent" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserAgentCreation" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions": { - "post": { - "operationId": "CreateAuthSession", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1AuthSessionCreation" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser": { - "put": { - "operationId": "SelectUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "auth_session_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1SelectUserRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa": { - "put": { - "operationId": "VerifyMfa", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "auth_session_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1VerifyMfaRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword": { - "put": { - "operationId": "VerifyPassword", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "auth_session_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1VerifyPasswordRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser": { - "put": { - "operationId": "VerifyUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "auth_session_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1VerifyUserRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens": { - "post": { - "operationId": "CreateToken", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1Token" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "auth_session_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1CreateTokenRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/authsessions/{id}": { - "get": { - "operationId": "GetAuthSession", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1AuthSessionResponse" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "browser_info.user_agent", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "browser_info.remote_ip.V4", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "browser_info.remote_ip.V6", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "browser_info.accept_language", - "in": "query", - "required": false, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{agent_id}/usersessions/{id}": { - "get": { - "operationId": "GetUserSession", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserSession" - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - }, - "delete": { - "operationId": "TerminateUserSession", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "agent_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{id}": { - "get": { - "summary": "Authorization", - "operationId": "GetUserAgent", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserAgent" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - }, - "put": { - "operationId": "RevokeUserAgent", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserAgent" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserAgentID" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/useragents/{id}/usersessions": { - "get": { - "operationId": "GetUserAgentSessions", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UserSessions" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/_externalregister": { - "post": { - "operationId": "RegisterUserWithExternal", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1RegisterUserExternalIDPRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/_isunique": { - "get": { - "summary": "User", - "operationId": "IsUserUnique", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1UniqueUserResponse" - } - } - }, - "parameters": [ - { - "name": "user_name", - "in": "query", - "required": false, - "type": "string" - }, - { - "name": "email", - "in": "query", - "required": false, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/_register": { - "post": { - "operationId": "RegisterUser", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1RegisterUserRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, "/users/me/address": { "get": { "operationId": "GetMyUserAddress", @@ -1138,6 +489,7 @@ }, "/users/me/profile": { "get": { + "summary": "User", "operationId": "GetMyUserProfile", "responses": { "200": { @@ -1176,32 +528,6 @@ ] } }, - "/users/passwords/_requestpwreset": { - "post": { - "operationId": "RequestPasswordReset", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ResetPasswordRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, "/users/{id}": { "get": { "summary": "TODO: Remove func only for tests", @@ -1227,134 +553,6 @@ ] } }, - "/users/{id}/email/_resendverification": { - "post": { - "operationId": "ResendEmailVerificationMail", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1UserID" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/{id}/email/_verify": { - "post": { - "operationId": "VerifyUserEmail", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1VerifyUserEmailRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/{id}/passwords/_resetpw": { - "post": { - "operationId": "PasswordReset", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1ResetPassword" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, - "/users/{user_id}/mfa/_skipinit": { - "post": { - "operationId": "SkipMfaInit", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "properties": {} - } - } - }, - "parameters": [ - { - "name": "user_id", - "in": "path", - "required": true, - "type": "string" - }, - { - "name": "body", - "in": "body", - "required": true, - "schema": { - "$ref": "#/definitions/v1SkipMfaInitRequest" - } - } - ], - "tags": [ - "AuthService" - ] - } - }, "/validate": { "get": { "operationId": "Validate", @@ -1439,394 +637,6 @@ }, "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." }, - "v1AppState": { - "type": "string", - "enum": [ - "APPSTATE_UNSPECIFIED", - "APPSTATE_ACTIVE", - "APPSTATE_INACTIVE", - "APPSTATE_DELETED" - ], - "default": "APPSTATE_UNSPECIFIED" - }, - "v1Application": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1AppState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "name": { - "type": "string" - }, - "oidc_config": { - "$ref": "#/definitions/v1OIDCConfig" - } - } - }, - "v1ApplicationAuthorizeRequest": { - "type": "object", - "properties": { - "oidc_client_auth": { - "$ref": "#/definitions/v1OIDCClientAuth" - } - } - }, - "v1ApplicationSearchKey": { - "type": "string", - "enum": [ - "APPLICATIONSEARCHKEY_UNSPECIFIED", - "APPLICATIONSEARCHKEY_APP_TYPE", - "APPLICATIONSEARCHKEY_STATE", - "APPLICATIONSEARCHKEY_CLIENT_ID", - "APPLICATIONSEARCHKEY_APP_NAME", - "APPLICATIONSEARCHKEY_PROJECT_ID" - ], - "default": "APPLICATIONSEARCHKEY_UNSPECIFIED" - }, - "v1ApplicationSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1ApplicationSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1ApplicationSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "sorting_column": { - "$ref": "#/definitions/v1ApplicationSearchKey" - }, - "asc": { - "type": "boolean", - "format": "boolean" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ApplicationSearchQuery" - } - } - } - }, - "v1ApplicationSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Application" - } - } - } - }, - "v1AuthRequestOIDC": { - "type": "object", - "properties": { - "scope": { - "type": "array", - "items": { - "type": "string" - } - }, - "response_type": { - "$ref": "#/definitions/v1OIDCResponseType" - }, - "nonce": { - "type": "string" - }, - "code_challenge": { - "$ref": "#/definitions/v1CodeChallenge" - } - } - }, - "v1AuthSessionCreation": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "type": { - "$ref": "#/definitions/v1AuthSessionType" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - }, - "client_id": { - "type": "string" - }, - "redirect_uri": { - "type": "string" - }, - "state": { - "type": "string" - }, - "prompt": { - "$ref": "#/definitions/v1Prompt" - }, - "auth_context_class_reference": { - "type": "array", - "items": { - "type": "string" - } - }, - "ui_locales": { - "type": "array", - "items": { - "type": "string" - } - }, - "login_hint": { - "type": "string" - }, - "max_age": { - "type": "integer", - "format": "int64" - }, - "oidc": { - "$ref": "#/definitions/v1AuthRequestOIDC" - }, - "preselected_user_id": { - "type": "string" - } - } - }, - "v1AuthSessionMultiFactorOTP": { - "type": "object", - "properties": { - "code": { - "type": "string" - } - } - }, - "v1AuthSessionResponse": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "id": { - "type": "string" - }, - "type": { - "$ref": "#/definitions/v1AuthSessionType" - }, - "client_id": { - "type": "string" - }, - "redirect_uri": { - "type": "string" - }, - "state": { - "type": "string" - }, - "prompt": { - "$ref": "#/definitions/v1Prompt" - }, - "auth_context_class_reference": { - "type": "array", - "items": { - "type": "string" - } - }, - "ui_locales": { - "type": "array", - "items": { - "type": "string" - } - }, - "login_hint": { - "type": "string" - }, - "max_age": { - "type": "integer", - "format": "int64" - }, - "oidc": { - "$ref": "#/definitions/v1AuthRequestOIDC" - }, - "possible_steps": { - "type": "array", - "items": { - "$ref": "#/definitions/v1NextStep" - } - }, - "project_client_ids": { - "type": "array", - "items": { - "type": "string" - } - }, - "user_session": { - "$ref": "#/definitions/v1UserSession" - } - } - }, - "v1AuthSessionType": { - "type": "string", - "enum": [ - "AUTHSESSIONTYPE_UNSPECIFIED", - "AUTHSESSIONTYPE_OIDC", - "AUTHSESSIONTYPE_SAML" - ], - "default": "AUTHSESSIONTYPE_UNSPECIFIED" - }, - "v1AuthSessionView": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - }, - "type": { - "$ref": "#/definitions/v1AuthSessionType" - }, - "client_id": { - "type": "string" - }, - "user_session_id": { - "type": "string" - }, - "project_client_ids": { - "type": "array", - "items": { - "type": "string" - } - }, - "token_id": { - "type": "string" - }, - "token_expiration": { - "type": "string", - "format": "date-time" - }, - "user_id": { - "type": "string" - } - } - }, - "v1AuthUser": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - }, - "user_name": { - "type": "string" - } - } - }, - "v1BrowserInformation": { - "type": "object", - "properties": { - "user_agent": { - "type": "string" - }, - "remote_ip": { - "$ref": "#/definitions/v1IP" - }, - "accept_language": { - "type": "string" - } - } - }, - "v1ChooseUser": { - "type": "object", - "properties": { - "user_session_id": { - "type": "string" - }, - "user_id": { - "type": "string" - }, - "user_name": { - "type": "string" - }, - "user_session_state": { - "$ref": "#/definitions/v1UserSessionState" - } - } - }, - "v1ChooseUserData": { - "type": "object", - "properties": { - "users": { - "type": "array", - "items": { - "$ref": "#/definitions/v1ChooseUser" - } - } - } - }, - "v1CodeChallenge": { - "type": "object", - "properties": { - "challenge": { - "type": "string" - }, - "method": { - "$ref": "#/definitions/v1CodeChallengeMethod" - } - } - }, - "v1CodeChallengeMethod": { - "type": "string", - "enum": [ - "CODECHALLENGEMETHOD_PLAIN", - "CODECHALLENGEMETHOD_S256" - ], - "default": "CODECHALLENGEMETHOD_PLAIN" - }, - "v1CreateTokenRequest": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - } - } - }, "v1Gender": { "type": "string", "enum": [ @@ -1837,124 +647,6 @@ ], "default": "GENDER_UNSPECIFIED" }, - "v1Grant": { - "type": "object", - "properties": { - "OrgId": { - "type": "string" - }, - "ProjectId": { - "type": "string" - }, - "UserId": { - "type": "string" - }, - "Roles": { - "type": "array", - "items": { - "type": "string" - } - }, - "OrgName": { - "type": "string" - } - } - }, - "v1GrantSearchKey": { - "type": "string", - "enum": [ - "GRANTSEARCHKEY_UNSPECIFIED", - "GRANTSEARCHKEY_ORG_ID", - "GRANTSEARCHKEY_PROJECT_ID", - "GRANTSEARCHKEY_USER_ID" - ], - "default": "GRANTSEARCHKEY_UNSPECIFIED" - }, - "v1GrantSearchQuery": { - "type": "object", - "properties": { - "key": { - "$ref": "#/definitions/v1GrantSearchKey" - }, - "method": { - "$ref": "#/definitions/v1SearchMethod" - }, - "value": { - "type": "string" - } - } - }, - "v1GrantSearchRequest": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "sorting_column": { - "$ref": "#/definitions/v1GrantSearchKey" - }, - "asc": { - "type": "boolean", - "format": "boolean" - }, - "queries": { - "type": "array", - "items": { - "$ref": "#/definitions/v1GrantSearchQuery" - } - } - } - }, - "v1GrantSearchResponse": { - "type": "object", - "properties": { - "offset": { - "type": "string", - "format": "uint64" - }, - "limit": { - "type": "string", - "format": "uint64" - }, - "total_result": { - "type": "string", - "format": "uint64" - }, - "result": { - "type": "array", - "items": { - "$ref": "#/definitions/v1Grant" - } - } - } - }, - "v1IDPProvider": { - "type": "object", - "properties": { - "provider": { - "type": "string" - }, - "externalIdpID": { - "type": "string" - } - } - }, - "v1IP": { - "type": "object", - "properties": { - "V4": { - "type": "string" - }, - "V6": { - "type": "string" - } - } - }, "v1IsAdminResponse": { "type": "object", "properties": { @@ -1964,14 +656,6 @@ } } }, - "v1LoginData": { - "type": "object", - "properties": { - "err_msg": { - "type": "string" - } - } - }, "v1MFAState": { "type": "string", "enum": [ @@ -1999,21 +683,6 @@ } } }, - "v1MfaPromptData": { - "type": "object", - "properties": { - "required": { - "type": "boolean", - "format": "boolean" - }, - "mfa_providers": { - "type": "array", - "items": { - "$ref": "#/definitions/v1MfaType" - } - } - } - }, "v1MfaType": { "type": "string", "enum": [ @@ -2023,24 +692,6 @@ ], "default": "MFATYPE_UNSPECIFIED" }, - "v1MfaVerifyData": { - "type": "object", - "properties": { - "err_msg": { - "type": "string" - }, - "failure_count": { - "type": "integer", - "format": "int64" - }, - "mfa_providers": { - "type": "array", - "items": { - "$ref": "#/definitions/v1MfaType" - } - } - } - }, "v1MultiFactor": { "type": "object", "properties": { @@ -2142,146 +793,6 @@ } } }, - "v1NextStep": { - "type": "object", - "properties": { - "type": { - "$ref": "#/definitions/v1NextStepType" - }, - "login": { - "$ref": "#/definitions/v1LoginData" - }, - "password": { - "$ref": "#/definitions/v1PasswordData" - }, - "mfa_verify": { - "$ref": "#/definitions/v1MfaVerifyData" - }, - "mfa_prompt": { - "$ref": "#/definitions/v1MfaPromptData" - }, - "choose_user": { - "$ref": "#/definitions/v1ChooseUserData" - } - } - }, - "v1NextStepType": { - "type": "string", - "enum": [ - "NEXTSTEP_UNSPECIFIED", - "NEXTSTEP_LOGIN", - "NEXTSTEP_PASSWORD", - "NEXTSTEP_CHANGE_PASSWORD", - "NEXTSTEP_MFA_PROMPT", - "NEXTSTEP_MFA_INIT_CHOICE", - "NEXTSTEP_MFA_INIT_CREATE", - "NEXTSTEP_MFA_INIT_VERIFY", - "NEXTSTEP_MFA_INIT_DONE", - "NEXTSTEP_MFA_VERIFY", - "NEXTSTEP_MFA_VERIFY_ASYNC", - "NEXTSTEP_VERIFY_EMAIL", - "NEXTSTEP_REDIRECT_TO_CALLBACK", - "NEXTSTEP_INIT_PASSWORD", - "NEXTSTEP_CHOOSE_USER" - ], - "default": "NEXTSTEP_UNSPECIFIED" - }, - "v1NotificationType": { - "type": "string", - "enum": [ - "NOTIFICATIONTYPE_EMAIL", - "NOTIFICATIONTYPE_SMS" - ], - "default": "NOTIFICATIONTYPE_EMAIL" - }, - "v1OIDCApplicationType": { - "type": "string", - "enum": [ - "OIDCAPPLICATIONTYPE_WEB", - "OIDCAPPLICATIONTYPE_USER_AGENT", - "OIDCAPPLICATIONTYPE_NATIVE" - ], - "default": "OIDCAPPLICATIONTYPE_WEB" - }, - "v1OIDCAuthMethodType": { - "type": "string", - "enum": [ - "OIDCAUTHMETHODTYPE_BASIC", - "OIDCAUTHMETHODTYPE_POST", - "OIDCAUTHMETHODTYPE_NONE" - ], - "default": "OIDCAUTHMETHODTYPE_BASIC" - }, - "v1OIDCClientAuth": { - "type": "object", - "properties": { - "client_id": { - "type": "string" - }, - "client_secret": { - "type": "string" - } - } - }, - "v1OIDCConfig": { - "type": "object", - "properties": { - "redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - }, - "response_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCResponseType" - } - }, - "grant_types": { - "type": "array", - "items": { - "$ref": "#/definitions/v1OIDCGrantType" - } - }, - "application_type": { - "$ref": "#/definitions/v1OIDCApplicationType" - }, - "client_secret": { - "type": "string" - }, - "client_id": { - "type": "string" - }, - "auth_method_type": { - "$ref": "#/definitions/v1OIDCAuthMethodType" - }, - "post_logout_redirect_uris": { - "type": "array", - "items": { - "type": "string" - } - } - } - }, - "v1OIDCGrantType": { - "type": "string", - "enum": [ - "OIDCGRANTTYPE_AUTHORIZATION_CODE", - "OIDCGRANTTYPE_GRANT_TYPE_NONE", - "OIDCGRANTTYPE_REFRESH_TOKEN" - ], - "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" - }, - "v1OIDCResponseType": { - "type": "string", - "enum": [ - "OIDCRESPONSETYPE_CODE", - "OIDCRESPONSETYPE_ID_TOKEN", - "OIDCRESPONSETYPE_ID_TOKEN_TOKEN" - ], - "default": "OIDCRESPONSETYPE_CODE" - }, "v1Org": { "type": "object", "properties": { @@ -2304,18 +815,6 @@ } } }, - "v1PasswordData": { - "type": "object", - "properties": { - "err_msg": { - "type": "string" - }, - "failure_count": { - "type": "integer", - "format": "int64" - } - } - }, "v1PasswordRequest": { "type": "object", "properties": { @@ -2324,106 +823,6 @@ } } }, - "v1Prompt": { - "type": "string", - "enum": [ - "PROMPT_UNSPECIFIED", - "PROMPT_NONE", - "PROMPT_LOGIN", - "PROMPT_CONSENT", - "PROMPT_SELECT_ACCOUNT" - ], - "default": "PROMPT_UNSPECIFIED" - }, - "v1RegisterUserExternalIDPRequest": { - "type": "object", - "properties": { - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "idp_provider": { - "$ref": "#/definitions/v1IDPProvider" - }, - "org_id": { - "type": "string" - } - } - }, - "v1RegisterUserRequest": { - "type": "object", - "properties": { - "email": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "password": { - "type": "string" - }, - "org_id": { - "type": "string" - } - } - }, - "v1ResetPassword": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "code": { - "type": "string" - }, - "new_password": { - "type": "string" - } - } - }, - "v1ResetPasswordRequest": { - "type": "object", - "properties": { - "user_name": { - "type": "string" - }, - "type": { - "$ref": "#/definitions/v1NotificationType" - } - } - }, "v1SearchMethod": { "type": "string", "enum": [ @@ -2433,52 +832,6 @@ ], "default": "SEARCHMETHOD_EQUALS" }, - "v1SelectUserRequest": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - }, - "user_session_id": { - "type": "string" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - } - } - }, - "v1SkipMfaInitRequest": { - "type": "object", - "properties": { - "user_id": { - "type": "string" - } - } - }, - "v1Token": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "expiration": { - "type": "string", - "format": "date-time" - } - } - }, - "v1UniqueUserResponse": { - "type": "object", - "properties": { - "is_unique": { - "type": "boolean", - "format": "boolean" - } - } - }, "v1UpdateUserAddressRequest": { "type": "object", "properties": { @@ -2646,45 +999,6 @@ } } }, - "v1UserAgent": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - }, - "state": { - "$ref": "#/definitions/v1UserAgentState" - } - } - }, - "v1UserAgentCreation": { - "type": "object", - "properties": { - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - } - } - }, - "v1UserAgentID": { - "type": "object", - "properties": { - "id": { - "type": "string" - } - } - }, - "v1UserAgentState": { - "type": "string", - "enum": [ - "USERAGENTSTATE_UNSPECIFIED", - "USERAGENTSTATE_ACTIVE", - "USERAGENTSTATE_TERMINATED" - ], - "default": "USERAGENTSTATE_UNSPECIFIED" - }, "v1UserEmail": { "type": "object", "properties": { @@ -2700,14 +1014,6 @@ } } }, - "v1UserID": { - "type": "object", - "properties": { - "id": { - "type": "string" - } - } - }, "v1UserPhone": { "type": "object", "properties": { @@ -2752,38 +1058,6 @@ } } }, - "v1UserSession": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "agent_id": { - "type": "string" - }, - "auth_state": { - "$ref": "#/definitions/v1UserSessionState" - }, - "user": { - "$ref": "#/definitions/v1AuthUser" - }, - "password_verified": { - "type": "boolean", - "format": "boolean" - }, - "mfa": { - "$ref": "#/definitions/v1MfaType" - }, - "mfa_verified": { - "type": "boolean", - "format": "boolean" - }, - "auth_time": { - "type": "string", - "format": "date-time" - } - } - }, "v1UserSessionState": { "type": "string", "enum": [ @@ -2824,17 +1098,6 @@ } } }, - "v1UserSessions": { - "type": "object", - "properties": { - "user_sessions": { - "type": "array", - "items": { - "$ref": "#/definitions/v1UserSession" - } - } - } - }, "v1UserState": { "type": "string", "enum": [ @@ -2856,23 +1119,6 @@ } } }, - "v1VerifyMfaRequest": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - }, - "otp": { - "$ref": "#/definitions/v1AuthSessionMultiFactorOTP" - } - } - }, "v1VerifyMyUserEmailRequest": { "type": "object", "properties": { @@ -2881,34 +1127,6 @@ } } }, - "v1VerifyPasswordRequest": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - }, - "password": { - "type": "string" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - } - } - }, - "v1VerifyUserEmailRequest": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "code": { - "type": "string" - } - } - }, "v1VerifyUserPhoneRequest": { "type": "object", "properties": { @@ -2916,23 +1134,6 @@ "type": "string" } } - }, - "v1VerifyUserRequest": { - "type": "object", - "properties": { - "agent_id": { - "type": "string" - }, - "auth_session_id": { - "type": "string" - }, - "user_name": { - "type": "string" - }, - "browser_info": { - "$ref": "#/definitions/v1BrowserInformation" - } - } } } } diff --git a/pkg/auth/api/grpc/auth_session.go b/pkg/auth/api/grpc/auth_session.go deleted file mode 100644 index 51574d7647..0000000000 --- a/pkg/auth/api/grpc/auth_session.go +++ /dev/null @@ -1,34 +0,0 @@ -package grpc - -import ( - "context" - "github.com/caos/zitadel/internal/errors" -) - -func (s *Server) CreateAuthSession(ctx context.Context, request *AuthSessionCreation) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dh3Rt", "Not implemented") -} - -func (s *Server) GetAuthSession(ctx context.Context, id *AuthSessionID) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56g", "Not implemented") -} - -func (s *Server) SelectUser(ctx context.Context, request *SelectUserRequest) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dl5gs", "Not implemented") -} - -func (s *Server) VerifyUser(ctx context.Context, request *VerifyUserRequest) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-39dGs", "Not implemented") -} - -func (s *Server) VerifyPassword(ctx context.Context, password *VerifyPasswordRequest) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-tu9j2", "Not implemented") -} - -func (s *Server) VerifyMfa(ctx context.Context, mfa *VerifyMfaRequest) (_ *AuthSessionResponse, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-oi9GB", "Not implemented") -} - -func (s *Server) GetAuthSessionByTokenID(ctx context.Context, id *TokenID) (_ *AuthSessionView, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dk56z", "Not implemented") -} diff --git a/pkg/auth/api/grpc/grant.go b/pkg/auth/api/grpc/grant.go index d755f84281..8eb8681e06 100644 --- a/pkg/auth/api/grpc/grant.go +++ b/pkg/auth/api/grpc/grant.go @@ -6,10 +6,6 @@ import ( "github.com/golang/protobuf/ptypes/empty" ) -func (s *Server) SearchGrant(ctx context.Context, grantSearch *GrantSearchRequest) (*GrantSearchResponse, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-mcn5z", "Not implemented") -} - func (s *Server) SearchMyProjectOrgs(ctx context.Context, request *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-8kdRf", "Not implemented") } diff --git a/pkg/auth/api/grpc/mock/auth.proto.mock.go b/pkg/auth/api/grpc/mock/auth.proto.mock.go index f74e7ad52e..9e277f3c81 100644 --- a/pkg/auth/api/grpc/mock/auth.proto.mock.go +++ b/pkg/auth/api/grpc/mock/auth.proto.mock.go @@ -8,9 +8,9 @@ import ( context "context" grpc "github.com/caos/zitadel/pkg/auth/api/grpc" gomock "github.com/golang/mock/gomock" - empty "github.com/golang/protobuf/ptypes/empty" - struct0 "github.com/golang/protobuf/ptypes/struct" grpc0 "google.golang.org/grpc" + emptypb "google.golang.org/protobuf/types/known/emptypb" + structpb "google.golang.org/protobuf/types/known/structpb" reflect "reflect" ) @@ -38,7 +38,7 @@ func (m *MockAuthServiceClient) EXPECT() *MockAuthServiceClientMockRecorder { } // AddMfaOTP mocks base method -func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { +func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -57,35 +57,15 @@ func (mr *MockAuthServiceClientMockRecorder) AddMfaOTP(arg0, arg1 interface{}, a return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).AddMfaOTP), varargs...) } -// AuthorizeApplication mocks base method -func (m *MockAuthServiceClient) AuthorizeApplication(arg0 context.Context, arg1 *grpc.ApplicationAuthorizeRequest, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "AuthorizeApplication", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// AuthorizeApplication indicates an expected call of AuthorizeApplication -func (mr *MockAuthServiceClientMockRecorder) AuthorizeApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AuthorizeApplication", reflect.TypeOf((*MockAuthServiceClient)(nil).AuthorizeApplication), varargs...) -} - // ChangeMyPassword mocks base method -func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "ChangeMyPassword", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -137,128 +117,8 @@ func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserPhone(arg0, arg1 interf return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserPhone), varargs...) } -// CreateAuthSession mocks base method -func (m *MockAuthServiceClient) CreateAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionCreation, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateAuthSession", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateAuthSession indicates an expected call of CreateAuthSession -func (mr *MockAuthServiceClientMockRecorder) CreateAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateAuthSession), varargs...) -} - -// CreateToken mocks base method -func (m *MockAuthServiceClient) CreateToken(arg0 context.Context, arg1 *grpc.CreateTokenRequest, arg2 ...grpc0.CallOption) (*grpc.Token, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateToken", varargs...) - ret0, _ := ret[0].(*grpc.Token) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateToken indicates an expected call of CreateToken -func (mr *MockAuthServiceClientMockRecorder) CreateToken(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateToken", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateToken), varargs...) -} - -// CreateUserAgent mocks base method -func (m *MockAuthServiceClient) CreateUserAgent(arg0 context.Context, arg1 *grpc.UserAgentCreation, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "CreateUserAgent", varargs...) - ret0, _ := ret[0].(*grpc.UserAgent) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// CreateUserAgent indicates an expected call of CreateUserAgent -func (mr *MockAuthServiceClientMockRecorder) CreateUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateUserAgent), varargs...) -} - -// GetApplicationByID mocks base method -func (m *MockAuthServiceClient) GetApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetApplicationByID", varargs...) - ret0, _ := ret[0].(*grpc.Application) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetApplicationByID indicates an expected call of GetApplicationByID -func (mr *MockAuthServiceClientMockRecorder) GetApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplicationByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetApplicationByID), varargs...) -} - -// GetAuthSession mocks base method -func (m *MockAuthServiceClient) GetAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetAuthSession", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetAuthSession indicates an expected call of GetAuthSession -func (mr *MockAuthServiceClientMockRecorder) GetAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSession), varargs...) -} - -// GetAuthSessionByTokenID mocks base method -func (m *MockAuthServiceClient) GetAuthSessionByTokenID(arg0 context.Context, arg1 *grpc.TokenID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionView, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetAuthSessionByTokenID", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionView) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetAuthSessionByTokenID indicates an expected call of GetAuthSessionByTokenID -func (mr *MockAuthServiceClientMockRecorder) GetAuthSessionByTokenID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSessionByTokenID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSessionByTokenID), varargs...) -} - // GetMyMfas mocks base method -func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { +func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -278,7 +138,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyMfas(arg0, arg1 interface{}, a } // GetMyUserAddress mocks base method -func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { +func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -298,7 +158,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserAddress(arg0, arg1 interfa } // GetMyUserEmail mocks base method -func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { +func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -318,7 +178,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserEmail(arg0, arg1 interface } // GetMyUserPhone mocks base method -func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { +func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -338,7 +198,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserPhone(arg0, arg1 interface } // GetMyUserProfile mocks base method -func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { +func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -358,7 +218,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserProfile(arg0, arg1 interfa } // GetMyUserSessions mocks base method -func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) { +func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -378,7 +238,7 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyUserSessions(arg0, arg1 interf } // GetMyZitadelPermissions mocks base method -func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) { +func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -397,46 +257,6 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1 return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...) } -// GetUserAgent mocks base method -func (m *MockAuthServiceClient) GetUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserAgent", varargs...) - ret0, _ := ret[0].(*grpc.UserAgent) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserAgent indicates an expected call of GetUserAgent -func (mr *MockAuthServiceClientMockRecorder) GetUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgent), varargs...) -} - -// GetUserAgentSessions mocks base method -func (m *MockAuthServiceClient) GetUserAgentSessions(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserSessions, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserAgentSessions", varargs...) - ret0, _ := ret[0].(*grpc.UserSessions) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserAgentSessions indicates an expected call of GetUserAgentSessions -func (mr *MockAuthServiceClientMockRecorder) GetUserAgentSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgentSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgentSessions), varargs...) -} - // GetUserByID mocks base method func (m *MockAuthServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { m.ctrl.T.Helper() @@ -457,35 +277,15 @@ func (mr *MockAuthServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserByID), varargs...) } -// GetUserSession mocks base method -func (m *MockAuthServiceClient) GetUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*grpc.UserSession, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserSession", varargs...) - ret0, _ := ret[0].(*grpc.UserSession) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserSession indicates an expected call of GetUserSession -func (mr *MockAuthServiceClientMockRecorder) GetUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserSession), varargs...) -} - // Healthz mocks base method -func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Healthz", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -498,7 +298,7 @@ func (mr *MockAuthServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg } // IsIamAdmin mocks base method -func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) { +func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { @@ -517,55 +317,15 @@ func (mr *MockAuthServiceClientMockRecorder) IsIamAdmin(arg0, arg1 interface{}, return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsIamAdmin", reflect.TypeOf((*MockAuthServiceClient)(nil).IsIamAdmin), varargs...) } -// IsUserUnique mocks base method -func (m *MockAuthServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "IsUserUnique", varargs...) - ret0, _ := ret[0].(*grpc.UniqueUserResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// IsUserUnique indicates an expected call of IsUserUnique -func (mr *MockAuthServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockAuthServiceClient)(nil).IsUserUnique), varargs...) -} - -// PasswordReset mocks base method -func (m *MockAuthServiceClient) PasswordReset(arg0 context.Context, arg1 *grpc.ResetPassword, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "PasswordReset", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// PasswordReset indicates an expected call of PasswordReset -func (mr *MockAuthServiceClientMockRecorder) PasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).PasswordReset), varargs...) -} - // Ready mocks base method -func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Ready", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -577,55 +337,15 @@ func (mr *MockAuthServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAuthServiceClient)(nil).Ready), varargs...) } -// RegisterUser mocks base method -func (m *MockAuthServiceClient) RegisterUser(arg0 context.Context, arg1 *grpc.RegisterUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RegisterUser", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RegisterUser indicates an expected call of RegisterUser -func (mr *MockAuthServiceClientMockRecorder) RegisterUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUser", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUser), varargs...) -} - -// RegisterUserWithExternal mocks base method -func (m *MockAuthServiceClient) RegisterUserWithExternal(arg0 context.Context, arg1 *grpc.RegisterUserExternalIDPRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RegisterUserWithExternal", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RegisterUserWithExternal indicates an expected call of RegisterUserWithExternal -func (mr *MockAuthServiceClientMockRecorder) RegisterUserWithExternal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUserWithExternal", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUserWithExternal), varargs...) -} - // RemoveMfaOTP mocks base method -func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "RemoveMfaOTP", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -637,55 +357,15 @@ func (mr *MockAuthServiceClientMockRecorder) RemoveMfaOTP(arg0, arg1 interface{} return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).RemoveMfaOTP), varargs...) } -// RequestPasswordReset mocks base method -func (m *MockAuthServiceClient) RequestPasswordReset(arg0 context.Context, arg1 *grpc.ResetPasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RequestPasswordReset", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RequestPasswordReset indicates an expected call of RequestPasswordReset -func (mr *MockAuthServiceClientMockRecorder) RequestPasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RequestPasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).RequestPasswordReset), varargs...) -} - -// ResendEmailVerificationMail mocks base method -func (m *MockAuthServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail -func (mr *MockAuthServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendEmailVerificationMail), varargs...) -} - // ResendMyEmailVerificationMail mocks base method -func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "ResendMyEmailVerificationMail", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -698,14 +378,14 @@ func (mr *MockAuthServiceClientMockRecorder) ResendMyEmailVerificationMail(arg0, } // ResendMyPhoneVerificationCode mocks base method -func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "ResendMyPhoneVerificationCode", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -717,66 +397,6 @@ func (mr *MockAuthServiceClientMockRecorder) ResendMyPhoneVerificationCode(arg0, return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyPhoneVerificationCode", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyPhoneVerificationCode), varargs...) } -// RevokeUserAgent mocks base method -func (m *MockAuthServiceClient) RevokeUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "RevokeUserAgent", varargs...) - ret0, _ := ret[0].(*grpc.UserAgent) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// RevokeUserAgent indicates an expected call of RevokeUserAgent -func (mr *MockAuthServiceClientMockRecorder) RevokeUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RevokeUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).RevokeUserAgent), varargs...) -} - -// SearchApplications mocks base method -func (m *MockAuthServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchApplications", varargs...) - ret0, _ := ret[0].(*grpc.ApplicationSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchApplications indicates an expected call of SearchApplications -func (mr *MockAuthServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchApplications), varargs...) -} - -// SearchGrant mocks base method -func (m *MockAuthServiceClient) SearchGrant(arg0 context.Context, arg1 *grpc.GrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.GrantSearchResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SearchGrant", varargs...) - ret0, _ := ret[0].(*grpc.GrantSearchResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SearchGrant indicates an expected call of SearchGrant -func (mr *MockAuthServiceClientMockRecorder) SearchGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchGrant", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchGrant), varargs...) -} - // SearchMyProjectOrgs mocks base method func (m *MockAuthServiceClient) SearchMyProjectOrgs(arg0 context.Context, arg1 *grpc.MyProjectOrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.MyProjectOrgSearchResponse, error) { m.ctrl.T.Helper() @@ -797,35 +417,15 @@ func (mr *MockAuthServiceClientMockRecorder) SearchMyProjectOrgs(arg0, arg1 inte return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMyProjectOrgs", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchMyProjectOrgs), varargs...) } -// SelectUser mocks base method -func (m *MockAuthServiceClient) SelectUser(arg0 context.Context, arg1 *grpc.SelectUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SelectUser", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SelectUser indicates an expected call of SelectUser -func (mr *MockAuthServiceClientMockRecorder) SelectUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectUser", reflect.TypeOf((*MockAuthServiceClient)(nil).SelectUser), varargs...) -} - // SetMyPassword mocks base method -func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "SetMyPassword", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -837,46 +437,6 @@ func (mr *MockAuthServiceClientMockRecorder) SetMyPassword(arg0, arg1 interface{ return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).SetMyPassword), varargs...) } -// SkipMfaInit mocks base method -func (m *MockAuthServiceClient) SkipMfaInit(arg0 context.Context, arg1 *grpc.SkipMfaInitRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "SkipMfaInit", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// SkipMfaInit indicates an expected call of SkipMfaInit -func (mr *MockAuthServiceClientMockRecorder) SkipMfaInit(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SkipMfaInit", reflect.TypeOf((*MockAuthServiceClient)(nil).SkipMfaInit), varargs...) -} - -// TerminateUserSession mocks base method -func (m *MockAuthServiceClient) TerminateUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "TerminateUserSession", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// TerminateUserSession indicates an expected call of TerminateUserSession -func (mr *MockAuthServiceClientMockRecorder) TerminateUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TerminateUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).TerminateUserSession), varargs...) -} - // UpdateMyUserAddress mocks base method func (m *MockAuthServiceClient) UpdateMyUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { m.ctrl.T.Helper() @@ -918,14 +478,14 @@ func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserProfile(arg0, arg1 inte } // Validate mocks base method -func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { +func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*structpb.Struct, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Validate", varargs...) - ret0, _ := ret[0].(*struct0.Struct) + ret0, _ := ret[0].(*structpb.Struct) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -937,26 +497,6 @@ func (mr *MockAuthServiceClientMockRecorder) Validate(arg0, arg1 interface{}, ar return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAuthServiceClient)(nil).Validate), varargs...) } -// VerifyMfa mocks base method -func (m *MockAuthServiceClient) VerifyMfa(arg0 context.Context, arg1 *grpc.VerifyMfaRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "VerifyMfa", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// VerifyMfa indicates an expected call of VerifyMfa -func (mr *MockAuthServiceClientMockRecorder) VerifyMfa(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfa", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfa), varargs...) -} - // VerifyMfaOTP mocks base method func (m *MockAuthServiceClient) VerifyMfaOTP(arg0 context.Context, arg1 *grpc.VerifyMfaOtp, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { m.ctrl.T.Helper() @@ -978,14 +518,14 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMfaOTP(arg0, arg1 interface{} } // VerifyMyUserEmail mocks base method -func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "VerifyMyUserEmail", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -998,14 +538,14 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserEmail(arg0, arg1 interf } // VerifyMyUserPhone mocks base method -func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { +func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "VerifyMyUserPhone", varargs...) - ret0, _ := ret[0].(*empty.Empty) + ret0, _ := ret[0].(*emptypb.Empty) ret1, _ := ret[1].(error) return ret0, ret1 } @@ -1016,63 +556,3 @@ func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserPhone(arg0, arg1 interf varargs := append([]interface{}{arg0, arg1}, arg2...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserPhone), varargs...) } - -// VerifyPassword mocks base method -func (m *MockAuthServiceClient) VerifyPassword(arg0 context.Context, arg1 *grpc.VerifyPasswordRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "VerifyPassword", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// VerifyPassword indicates an expected call of VerifyPassword -func (mr *MockAuthServiceClientMockRecorder) VerifyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyPassword), varargs...) -} - -// VerifyUser mocks base method -func (m *MockAuthServiceClient) VerifyUser(arg0 context.Context, arg1 *grpc.VerifyUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "VerifyUser", varargs...) - ret0, _ := ret[0].(*grpc.AuthSessionResponse) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// VerifyUser indicates an expected call of VerifyUser -func (mr *MockAuthServiceClientMockRecorder) VerifyUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUser", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUser), varargs...) -} - -// VerifyUserEmail mocks base method -func (m *MockAuthServiceClient) VerifyUserEmail(arg0 context.Context, arg1 *grpc.VerifyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "VerifyUserEmail", varargs...) - ret0, _ := ret[0].(*empty.Empty) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// VerifyUserEmail indicates an expected call of VerifyUserEmail -func (mr *MockAuthServiceClientMockRecorder) VerifyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUserEmail), varargs...) -} diff --git a/pkg/auth/api/grpc/token.go b/pkg/auth/api/grpc/token.go deleted file mode 100644 index 36d523329e..0000000000 --- a/pkg/auth/api/grpc/token.go +++ /dev/null @@ -1,10 +0,0 @@ -package grpc - -import ( - "context" - "github.com/caos/zitadel/internal/errors" -) - -func (s *Server) CreateToken(ctx context.Context, request *CreateTokenRequest) (_ *Token, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-86dG3", "Not implemented") -} diff --git a/pkg/auth/api/grpc/user.go b/pkg/auth/api/grpc/user.go index 7d114943b6..073168a6ab 100644 --- a/pkg/auth/api/grpc/user.go +++ b/pkg/auth/api/grpc/user.go @@ -10,10 +10,6 @@ func (s *Server) GetUserByID(ctx context.Context, request *UserID) (*User, error return nil, errors.ThrowUnimplemented(nil, "GRPC-fj74G", "Not implemented") } -func (s *Server) IsUserUnique(ctx context.Context, request *UniqueUserRequest) (*UniqueUserResponse, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dke9f", "Not implemented") -} - func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*UserProfile, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-fis93", "Not implemented") } @@ -34,14 +30,6 @@ func (s *Server) GetMyMfas(ctx context.Context, _ *empty.Empty) (*MultiFactors, return nil, errors.ThrowUnimplemented(nil, "GRPC-vkl9i", "Not implemented") } -func (s *Server) RegisterUser(ctx context.Context, request *RegisterUserRequest) (*User, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-03idx", "Not implemented") -} - -func (s *Server) RegisterUserWithExternal(ctx context.Context, request *RegisterUserExternalIDPRequest) (*User, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dlwpd", "Not implemented") -} - func (s *Server) UpdateMyUserProfile(ctx context.Context, request *UpdateUserProfileRequest) (*UserProfile, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-dlep3", "Not implemented") } @@ -85,13 +73,6 @@ func (s *Server) UpdateMyUserAddress(ctx context.Context, request *UpdateUserAdd func (s *Server) SetMyPassword(ctx context.Context, request *PasswordRequest) (*empty.Empty, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-pl9c2", "Not implemented") } -func (s *Server) RequestPasswordReset(ctx context.Context, request *ResetPasswordRequest) (*empty.Empty, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-xm5hW", "Not implemented") -} - -func (s *Server) PasswordReset(ctx context.Context, request *ResetPassword) (*empty.Empty, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-mce5W", "Not implemented") -} func (s *Server) ChangeMyPassword(ctx context.Context, request *PasswordChange) (*empty.Empty, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-dlo6G", "Not implemented") @@ -109,14 +90,6 @@ func (s *Server) RemoveMfaOTP(ctx context.Context, _ *empty.Empty) (_ *empty.Emp return nil, errors.ThrowUnimplemented(nil, "GRPC-9k46d", "Not implemented") } -func (s *Server) SkipMfaInit(ctx context.Context, request *SkipMfaInitRequest) (_ *empty.Empty, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-dl3i5", "Not implemented") -} - -func (s *Server) VerifyUserInit(ctx context.Context, request *VerifyUserInitRequest) (_ *empty.Empty, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-itk6h", "Not implemented") -} - func (s *Server) ResendUserInitMail(ctx context.Context, request *UserID) (_ *empty.Empty, err error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-dk467", "Not implemented") } diff --git a/pkg/auth/api/grpc/user_agent.go b/pkg/auth/api/grpc/user_agent.go deleted file mode 100644 index 6ea88ca235..0000000000 --- a/pkg/auth/api/grpc/user_agent.go +++ /dev/null @@ -1,18 +0,0 @@ -package grpc - -import ( - "context" - "github.com/caos/zitadel/internal/errors" -) - -func (s *Server) GetUserAgent(ctx context.Context, request *UserAgentID) (_ *UserAgent, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-iu7jF", "Not implemented") -} - -func (s *Server) CreateUserAgent(ctx context.Context, request *UserAgentCreation) (_ *UserAgent, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-sdfk3", "Not implemented") -} - -func (s *Server) RevokeUserAgent(ctx context.Context, id *UserAgentID) (_ *UserAgent, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-09HjK", "Not implemented") -} diff --git a/pkg/auth/api/grpc/user_session.go b/pkg/auth/api/grpc/user_session.go index 10a3cf3a0e..05460f85ef 100644 --- a/pkg/auth/api/grpc/user_session.go +++ b/pkg/auth/api/grpc/user_session.go @@ -6,18 +6,6 @@ import ( "github.com/golang/protobuf/ptypes/empty" ) -func (s *Server) GetUserAgentSessions(ctx context.Context, id *UserAgentID) (_ *UserSessions, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-ue45f", "Not implemented") -} - -func (s *Server) GetUserSession(ctx context.Context, id *UserSessionID) (_ *UserSession, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-lor5h", "Not implemented") -} - -func (s *Server) TerminateUserSession(ctx context.Context, id *UserSessionID) (_ *empty.Empty, err error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-bnmt6", "Not implemented") -} - func (s *Server) GetMyUserSessions(ctx context.Context, _ *empty.Empty) (_ *UserSessionViews, err error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-nc52s", "Not implemented") } diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto index dd6c399ab2..025f3676b5 100644 --- a/pkg/auth/api/proto/auth.proto +++ b/pkg/auth/api/proto/auth.proto @@ -51,85 +51,6 @@ service AuthService { } // Authorization - rpc GetUserAgent(UserAgentID) returns (UserAgent) { - option (google.api.http) = { - get: "/useragents/{id}" - }; - } - - rpc CreateUserAgent(UserAgentCreation) returns (UserAgent) { - option (google.api.http) = { - post: "/useragents" - body: "*" - }; - } - - rpc RevokeUserAgent(UserAgentID) returns (UserAgent) { - option (google.api.http) = { - put: "/useragents/{id}" - body: "*" - }; - } - - rpc CreateAuthSession(AuthSessionCreation) returns (AuthSessionResponse) { - option (google.api.http) = { - post: "/useragents/{agent_id}/authsessions" - body: "*" - }; - } - - rpc GetAuthSession(AuthSessionID) returns (AuthSessionResponse) { - option (google.api.http) = { - get: "/useragents/{agent_id}/authsessions/{id}" - }; - } - - rpc GetAuthSessionByTokenID(TokenID) returns (AuthSessionView) { - option (google.api.http) = { - get: "/tokens/{id}/authsession" - }; - } - - rpc SelectUser(SelectUserRequest) returns (AuthSessionResponse) { - option (google.api.http) = { - put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser" - body: "*" - }; - } - - rpc VerifyUser(VerifyUserRequest) returns (AuthSessionResponse) { - option (google.api.http) = { - put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser" - body: "*" - }; - } - - rpc VerifyPassword(VerifyPasswordRequest) returns (AuthSessionResponse) { - option (google.api.http) = { - put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword" - body: "*" - }; - } - - rpc VerifyMfa(VerifyMfaRequest) returns (AuthSessionResponse) { - option (google.api.http) = { - put: "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa" - body: "*" - }; - } - - rpc GetUserAgentSessions(UserAgentID) returns (UserSessions) { - option (google.api.http) = { - get: "/useragents/{id}/usersessions" - }; - } - - rpc GetUserSession(UserSessionID) returns (UserSession) { - option (google.api.http) = { - get: "/useragents/{agent_id}/usersessions/{id}" - }; - } - rpc GetMyUserSessions(google.protobuf.Empty) returns (UserSessionViews) { option (google.api.http) = { get: "/me/usersessions" @@ -140,40 +61,7 @@ service AuthService { }; } - rpc TerminateUserSession(UserSessionID) returns (google.protobuf.Empty) { - option (google.api.http) = { - delete: "/useragents/{agent_id}/usersessions/{id}" - }; - } - - rpc CreateToken(CreateTokenRequest) returns (Token) { - option (google.api.http) = { - post: "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens" - body: "*" - }; - } - //User - rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) { - option (google.api.http) = { - get: "/users/_isunique" - }; - } - - rpc RegisterUser(RegisterUserRequest) returns (User) { - option (google.api.http) = { - post: "/users/_register" - body: "*" - }; - } - - rpc RegisterUserWithExternal(RegisterUserExternalIDPRequest) returns (User) { - option (google.api.http) = { - post: "/users/_externalregister" - body: "*" - }; - } - rpc GetMyUserProfile(google.protobuf.Empty) returns (UserProfile) { option (google.api.http) = { get: "/users/me/profile" @@ -227,14 +115,6 @@ service AuthService { }; } - rpc VerifyUserEmail(VerifyUserEmailRequest) returns (google.protobuf.Empty) { - option (google.api.http) = { - post: "/users/{id}/email/_verify" - body: "*" - }; - - } - rpc ResendMyEmailVerificationMail(google.protobuf.Empty) returns (google.protobuf.Empty) { option (google.api.http) = { post: "/users/me/email/_resendverification" @@ -246,14 +126,6 @@ service AuthService { }; } - rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) { - option (google.api.http) = { - post: "/users/{id}/email/_resendverification" - body: "*" - }; - - } - rpc GetMyUserPhone(google.protobuf.Empty) returns (UserPhone) { option (google.api.http) = { get: "/users/me/phone" @@ -340,20 +212,6 @@ service AuthService { }; } - rpc RequestPasswordReset(ResetPasswordRequest) returns (google.protobuf.Empty) { - option (google.api.http) = { - post: "/users/passwords/_requestpwreset" - body: "*" - }; - } - - rpc PasswordReset(ResetPassword) returns (google.protobuf.Empty) { - option (google.api.http) = { - post: "/users/{id}/passwords/_resetpw" - body: "*" - }; - } - rpc ChangeMyPassword(PasswordChange) returns (google.protobuf.Empty) { option (google.api.http) = { put: "/users/me/passwords/_change" @@ -397,14 +255,6 @@ service AuthService { }; } - rpc SkipMfaInit(SkipMfaInitRequest) returns (google.protobuf.Empty) { - option (google.api.http) = { - post: "/users/{user_id}/mfa/_skipinit" - body: "*" - }; - } - - //TODO: Remove func only for tests rpc GetUserByID(UserID) returns (User) { option (google.api.http) = { @@ -412,35 +262,6 @@ service AuthService { }; } - //Application - rpc GetApplicationByID(ApplicationID) returns (Application) { - option (google.api.http) = { - get: "/applications/{id}" - }; - } - - rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) { - option (google.api.http) = { - post: "/applications/_search" - body: "*" - }; - } - - rpc AuthorizeApplication(ApplicationAuthorizeRequest) returns (Application) { - option (google.api.http) = { - post: "/applications/_authorize" - body: "*" - }; - } - - //Grant - rpc SearchGrant(GrantSearchRequest) returns (GrantSearchResponse) { - option (google.api.http) = { - post: "/grants/_search" - body: "*" - }; - } - rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) { option (google.api.http) = { post: "/global/projectorgs/_search" @@ -474,111 +295,6 @@ service AuthService { } } - -message SessionRequest { - string user_id = 1; - BrowserInformation browser_info = 2; -} - -message UserAgent { - string id = 1; - BrowserInformation browser_info = 2; - UserAgentState state = 3; -} - - -enum UserAgentState { - USERAGENTSTATE_UNSPECIFIED = 0; - USERAGENTSTATE_ACTIVE = 1; - USERAGENTSTATE_TERMINATED = 2; -} - -message UserAgentID { - string id = 1; -} - -message UserAgentCreation { - BrowserInformation browser_info = 1 [(validate.rules).message.required = true]; -} - -message UserAgents { - repeated UserAgent sessions = 1; -} - -message AuthSessionCreation { - string agent_id = 1 [(validate.rules).string.min_len = 1]; - AuthSessionType type = 2; - BrowserInformation browser_info = 3 [(validate.rules).message.required = true]; - string client_id = 4 [(validate.rules).string.min_len = 1]; - string redirect_uri = 5 [(validate.rules).string.min_len = 1]; - string state = 6; - Prompt prompt = 7; - repeated string auth_context_class_reference = 8; - repeated string ui_locales = 9; - string login_hint = 10; - uint32 max_age = 11; - oneof type_info { - AuthRequestOIDC oidc = 12; - } - string preselected_user_id = 13; -} - -message AuthSessionResponse { - string agent_id = 1; - string id = 2; - AuthSessionType type = 3; - string client_id = 4; - string redirect_uri = 5; - string state = 6; - Prompt prompt = 7; - repeated string auth_context_class_reference = 8; - repeated string ui_locales = 9; - string login_hint = 10; - uint32 max_age = 11; - oneof type_info { - AuthRequestOIDC oidc = 12; - } - repeated NextStep possible_steps = 13; - repeated string project_client_ids = 14; - UserSession user_session = 15; -} - -message AuthSessionView { - string agent_id = 1; - string auth_session_id = 2; - AuthSessionType type = 3; - string client_id = 4; - string user_session_id = 5; - repeated string project_client_ids = 6; - string token_id = 7; - google.protobuf.Timestamp token_expiration = 8; - string user_id = 9; -} - -message TokenID { - string id = 1; -} - -message UserSessionID { - string id = 1; - string agent_id = 2; -} - -message UserSessions { - repeated UserSession user_sessions = 1; -} - -message UserSession { - string id = 1; - string agent_id = 2; - UserSessionState auth_state = 3; - AuthUser user = 4; - bool password_verified = 5; - MfaType mfa = 6; - bool mfa_verified = 7; - google.protobuf.Timestamp auth_time = 8; -} - message UserSessionViews { repeated UserSessionView user_sessions = 1; } @@ -590,212 +306,22 @@ message UserSessionView { string user_name = 5; } -message AuthUser { - string user_id = 1; - string user_name = 2; -} - enum UserSessionState { USERSESSIONSTATE_UNSPECIFIED = 0; USERSESSIONSTATE_ACTIVE = 1; USERSESSIONSTATE_TERMINATED = 2; } -message AuthSessionID { - string id = 1; - string agent_id = 2; - BrowserInformation browser_info = 3; -} - -message SelectUserRequest { - string agent_id = 1; - string auth_session_id = 2; - string user_session_id = 3; - BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; -} - -message VerifyUserRequest { - string agent_id = 1 [(validate.rules).string.min_len = 1]; - string auth_session_id = 2 [(validate.rules).string.min_len = 1]; - string user_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; - BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; -} - -message VerifyPasswordRequest { - string agent_id = 1 [(validate.rules).string.min_len = 1]; - string auth_session_id = 2 [(validate.rules).string.min_len = 1]; - string password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}]; - BrowserInformation browser_info = 4 [(validate.rules).message.required = true]; -} - -message VerifyMfaRequest { - string agent_id = 1 [(validate.rules).string.min_len = 1]; - string auth_session_id = 2 [(validate.rules).string.min_len = 1]; - BrowserInformation browser_info = 3; - oneof mfa { - AuthSessionMultiFactorOTP otp = 4; - } -} - -message AuthSessionMultiFactorOTP { - string code = 1 [(validate.rules).string = {max_len: 200}]; -} - -message NextStep { - NextStepType type = 1; - oneof data { - LoginData login = 2; - PasswordData password = 3; - MfaVerifyData mfa_verify = 4; - MfaPromptData mfa_prompt = 5; - ChooseUserData choose_user = 6; - } -} - -enum NextStepType { - NEXTSTEP_UNSPECIFIED = 0; - NEXTSTEP_LOGIN = 1; - NEXTSTEP_PASSWORD = 2; - NEXTSTEP_CHANGE_PASSWORD = 3; - NEXTSTEP_MFA_PROMPT = 4; //TODO: ? - NEXTSTEP_MFA_INIT_CHOICE = 5; //TODO: ? - NEXTSTEP_MFA_INIT_CREATE = 6; - NEXTSTEP_MFA_INIT_VERIFY = 7; - NEXTSTEP_MFA_INIT_DONE = 8; - NEXTSTEP_MFA_VERIFY = 9; - NEXTSTEP_MFA_VERIFY_ASYNC = 10; - NEXTSTEP_VERIFY_EMAIL = 11; - NEXTSTEP_REDIRECT_TO_CALLBACK = 12; - NEXTSTEP_INIT_PASSWORD = 13; - NEXTSTEP_CHOOSE_USER = 14; -} - -message LoginData { - string err_msg = 1; -} - -message PasswordData { - string err_msg = 1; - uint32 failure_count = 2; -} - -message MfaVerifyData { - string err_msg = 1; - uint32 failure_count = 2; - repeated MfaType mfa_providers = 3; -} - -message MfaPromptData { - bool required = 1; - repeated MfaType mfa_providers = 2; -} - -message ChooseUserData { - repeated ChooseUser users = 1; -} - -message ChooseUser { - string user_session_id = 1; - string user_id = 2; - string user_name = 3; - UserSessionState user_session_state = 4; -} - -message SkipMfaInitRequest { - string user_id = 1; -} - -enum AuthSessionType { - AUTHSESSIONTYPE_UNSPECIFIED = 0; //TODO: necessary? - AUTHSESSIONTYPE_OIDC = 1; - AUTHSESSIONTYPE_SAML = 2; -} - -message BrowserInformation { - string user_agent = 1; - IP remote_ip = 2 [(validate.rules).message.required = true]; - string accept_language = 3; -} - -message IP { - string V4 = 1; - string V6 = 2; -} - -enum Prompt { - PROMPT_UNSPECIFIED = 0; - PROMPT_NONE = 1; - PROMPT_LOGIN = 2; - PROMPT_CONSENT = 3; - PROMPT_SELECT_ACCOUNT = 4; -} - -message AuthRequestOIDC { - repeated string scope = 1; - OIDCResponseType response_type = 2; - string nonce = 3; - CodeChallenge code_challenge = 4; -} - enum OIDCResponseType { OIDCRESPONSETYPE_CODE = 0; OIDCRESPONSETYPE_ID_TOKEN = 1; OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2; } -message CodeChallenge { - string challenge = 1; - CodeChallengeMethod method = 2; -} - -enum CodeChallengeMethod { - CODECHALLENGEMETHOD_PLAIN = 0; - CODECHALLENGEMETHOD_S256 = 1; -} - message UserID { string id = 1; } -message UniqueUserRequest { - string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; -} - -message UniqueUserResponse { - bool is_unique = 1; -} - - -message RegisterUserRequest { - string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; - string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string nick_name = 4 [(validate.rules).string = {max_len: 200}]; - string display_name = 5 [(validate.rules).string = {max_len: 200}]; - string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; - Gender gender = 7; - string password = 8 [(validate.rules).string = {min_len: 1, max_len: 72}]; - string org_id = 9 [(validate.rules).string.min_len = 1]; -} - -message RegisterUserExternalIDPRequest { - string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}]; - string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string nick_name = 4 [(validate.rules).string = {max_len: 200}]; - string display_name = 5 [(validate.rules).string = {max_len: 200}]; - string preferred_language = 6 [(validate.rules).string = {max_len: 200}]; - Gender gender = 7; - IDPProvider idp_provider = 8; - string org_id = 9 [(validate.rules).string.min_len = 1]; -} - -message IDPProvider { - string provider = 8; - string externalIdpID = 9; -} - message User { string id = 1; UserState state = 2; @@ -910,7 +436,7 @@ message UpdateUserAddressRequest { string street_address = 5 [(validate.rules).string = {max_len: 200}]; } -message PasswordID{ +message PasswordID { string id = 1; } @@ -918,27 +444,6 @@ message PasswordRequest { string password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; } -message ResetPasswordRequest { - string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}]; - NotificationType type = 2; -} - -message ResetPassword { - string id = 1 [(validate.rules).string.min_len = 1]; - string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}]; - string new_password = 3 [(validate.rules).string = {min_len: 1, max_len: 72}]; -} - -message SetPasswordNotificationRequest { - string id = 1; - NotificationType type = 2; -} - -enum NotificationType { - NOTIFICATIONTYPE_EMAIL = 0; - NOTIFICATIONTYPE_SMS = 1; -} - message PasswordChange { string old_password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}]; string new_password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}]; @@ -977,143 +482,11 @@ enum MFAState { MFASTATE_REMOVED = 3; } -message ApplicationID { - string id = 1; -} - -message Application { - string id = 1; - AppState state = 2; - google.protobuf.Timestamp creation_date = 3; - google.protobuf.Timestamp change_date = 4; - string name = 5; - oneof app_config { - OIDCConfig oidc_config = 8; - } -} - - -enum AppState { - APPSTATE_UNSPECIFIED = 0; - APPSTATE_ACTIVE = 1; - APPSTATE_INACTIVE = 2; - APPSTATE_DELETED = 3; -} - - -message OIDCConfig { - repeated string redirect_uris = 1; - repeated OIDCResponseType response_types = 2; - repeated OIDCGrantType grant_types = 3; - OIDCApplicationType application_type = 4; - string client_secret = 5; - string client_id = 6; - OIDCAuthMethodType auth_method_type = 7; - repeated string post_logout_redirect_uris = 8; -} - -enum OIDCGrantType { - OIDCGRANTTYPE_AUTHORIZATION_CODE = 0; - OIDCGRANTTYPE_GRANT_TYPE_NONE = 1; - OIDCGRANTTYPE_REFRESH_TOKEN = 2; -} - -enum OIDCApplicationType { - OIDCAPPLICATIONTYPE_WEB = 0; - OIDCAPPLICATIONTYPE_USER_AGENT = 1; - OIDCAPPLICATIONTYPE_NATIVE = 2; -} - -enum OIDCAuthMethodType { - OIDCAUTHMETHODTYPE_BASIC = 0; - OIDCAUTHMETHODTYPE_POST = 1; - OIDCAUTHMETHODTYPE_NONE = 2; -} - -message ApplicationSearchRequest { - uint64 offset = 1; - uint64 limit = 2; - ApplicationSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; - bool asc = 4; - repeated ApplicationSearchQuery queries = 5; -} - -message ApplicationSearchQuery { - ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; - SearchMethod method = 2; - string value = 3; -} - -enum ApplicationSearchKey { - APPLICATIONSEARCHKEY_UNSPECIFIED = 0; - APPLICATIONSEARCHKEY_APP_TYPE = 1; - APPLICATIONSEARCHKEY_STATE = 2; - APPLICATIONSEARCHKEY_CLIENT_ID = 3; - APPLICATIONSEARCHKEY_APP_NAME = 4; - APPLICATIONSEARCHKEY_PROJECT_ID = 5; -} - -message ApplicationSearchResponse { - uint64 offset = 1; - uint64 limit = 2; - uint64 total_result = 3; - repeated Application result = 4; -} - -enum SearchMethod { - SEARCHMETHOD_EQUALS = 0; - SEARCHMETHOD_STARTS_WITH = 1; - SEARCHMETHOD_CONTAINS = 2; -} - -message ApplicationAuthorizeRequest { - oneof auth { - OIDCClientAuth oidc_client_auth = 1; - } -} - message OIDCClientAuth { string client_id = 1; string client_secret = 2; } - -message GrantSearchRequest { - uint64 offset = 1; - uint64 limit = 2; - GrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];; - bool asc = 4; - repeated GrantSearchQuery queries = 5; -} - -message GrantSearchQuery { - GrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];; - SearchMethod method = 2; - string value = 3; -} - -enum GrantSearchKey { - GRANTSEARCHKEY_UNSPECIFIED = 0; - GRANTSEARCHKEY_ORG_ID = 1; - GRANTSEARCHKEY_PROJECT_ID = 2; - GRANTSEARCHKEY_USER_ID = 3; -} - -message GrantSearchResponse { - uint64 offset = 1; - uint64 limit = 2; - uint64 total_result = 3; - repeated Grant result = 4; -} - -message Grant { - string OrgId = 1; - string ProjectId = 2; - string UserId = 3; - repeated string Roles = 4; - string OrgName = 5; -} - message MyProjectOrgSearchRequest { uint64 offset = 1; uint64 limit = 2; @@ -1148,23 +521,12 @@ message Org { string name = 2; } -message CreateTokenRequest { - string agent_id = 1 [(validate.rules).string.min_len = 1]; - string auth_session_id = 2 [(validate.rules).string.min_len = 1]; -} - -message Token { - string id = 1; - google.protobuf.Timestamp expiration = 8; -} - message MyPermissions { repeated string permissions = 1; } - -message VerifyUserInitRequest { - string id = 1; - string code = 2; - string password = 3; -} +enum SearchMethod { + SEARCHMETHOD_EQUALS = 0; + SEARCHMETHOD_STARTS_WITH = 1; + SEARCHMETHOD_CONTAINS = 2; +} \ No newline at end of file diff --git a/pkg/auth/auth.go b/pkg/auth/auth.go index 52929e11a9..5fca24a0d0 100644 --- a/pkg/auth/auth.go +++ b/pkg/auth/auth.go @@ -2,8 +2,6 @@ package auth import ( "context" - "github.com/caos/logging" - "github.com/caos/zitadel/internal/api/auth" app "github.com/caos/zitadel/internal/auth" "github.com/caos/zitadel/pkg/auth/api" @@ -14,8 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - err := api.Start(ctx, config.API) - logging.Log("MAIN-udjed").OnError(err).Panic("unable to start api") - return err +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) } diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go index 3a95803f05..bf5bbf6d7f 100644 --- a/pkg/management/api/api.go +++ b/pkg/management/api/api.go @@ -17,13 +17,10 @@ type Config struct { GRPC grpc_util.Config } -func Start(ctx context.Context, conf Config) error { - api := &API{ - grpcServer: *grpc.StartServer(conf.GRPC.ToServerConfig()), - gateway: *grpc.StartGateway(conf.GRPC.ToGatewayConfig()), - } - server.StartServer(ctx, &api.grpcServer) - server.StartGateway(ctx, &api.gateway) +func Start(ctx context.Context, conf Config) { + grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig()) + grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) - return nil + server.StartServer(ctx, grpcServer) + server.StartGateway(ctx, grpcGateway) } diff --git a/pkg/management/management.go b/pkg/management/management.go index 4defc40c9d..1aaea27617 100644 --- a/pkg/management/management.go +++ b/pkg/management/management.go @@ -2,8 +2,6 @@ package management import ( "context" - "github.com/caos/logging" - "github.com/caos/zitadel/internal/api/auth" app "github.com/caos/zitadel/internal/management" "github.com/caos/zitadel/pkg/management/api" @@ -14,8 +12,6 @@ type Config struct { API api.Config } -func Start(ctx context.Context, config Config, authZ auth.Config) error { - err := api.Start(ctx, config.API) - logging.Log("MAIN-6dhRs").OnError(err).Panic("unable to start api") - return err +func Start(ctx context.Context, config Config, authZ auth.Config) { + api.Start(ctx, config.API) } From a1dbc7da8f838fa5e229f3b6901645041fab433d Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 31 Mar 2020 11:08:36 +0200 Subject: [PATCH 18/19] fix: add gateway file --- pkg/auth/api/grpc/auth.pb.gw.go | 1055 +++++++++++++++++++++++++++++++ 1 file changed, 1055 insertions(+) create mode 100644 pkg/auth/api/grpc/auth.pb.gw.go diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go new file mode 100644 index 0000000000..1489ea1fa0 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.gw.go @@ -0,0 +1,1055 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: auth.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AuthService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyMfas_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SetMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AddMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AddMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaOtp + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.RemoveMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq MyProjectOrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchMyProjectOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_IsIamAdmin_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.IsIamAdmin(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyZitadelPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyZitadelPermissions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAuthServiceHandler(ctx, mux, conn) +} + +// RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn)) +} + +// RegisterAuthServiceHandlerClient registers the http handlers for service AuthService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AuthServiceClient" to call the correct interceptors. +func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error { + + mux.Handle("GET", pattern_AuthService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SetMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SetMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SetMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AddMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AddMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AddMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_RemoveMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RemoveMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RemoveMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchMyProjectOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchMyProjectOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsIamAdmin_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsIamAdmin_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsIamAdmin_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyZitadelPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyZitadelPermissions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyZitadelPermissions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AuthService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AuthService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AuthService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AuthService_GetMyUserSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"me", "usersessions"}, "")) + + pattern_AuthService_GetMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_UpdateMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_GetMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_ChangeMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_VerifyMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_verify"}, "")) + + pattern_AuthService_ResendMyEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_ChangeMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_VerifyMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_verify"}, "")) + + pattern_AuthService_ResendMyPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_UpdateMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_GetMyMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "mfas"}, "")) + + pattern_AuthService_SetMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "passwords"}, "")) + + pattern_AuthService_ChangeMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "passwords", "_change"}, "")) + + pattern_AuthService_AddMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_VerifyMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"users", "me", "mfa", "otp", "_verify"}, "")) + + pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) + + pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) + + pattern_AuthService_GetMyZitadelPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"permissions", "zitadel", "me"}, "")) +) + +var ( + forward_AuthService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AuthService_Ready_0 = runtime.ForwardResponseMessage + + forward_AuthService_Validate_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyMfas_0 = runtime.ForwardResponseMessage + + forward_AuthService_SetMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_AddMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyZitadelPermissions_0 = runtime.ForwardResponseMessage +) From 2c5c2917f17253d4ba32479bc014a0d099abe46a Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Tue, 31 Mar 2020 11:44:48 +0200 Subject: [PATCH 19/19] fix: remove unnecessary things --- pkg/admin/api/api.go | 5 - pkg/auth/api/grpc/auth.pb.go | 184 ++++++++-------------- pkg/auth/api/grpc/auth.pb.gw.go | 51 ------ pkg/auth/api/grpc/auth.swagger.json | 123 --------------- pkg/auth/api/grpc/mock/auth.proto.mock.go | 20 --- pkg/auth/api/grpc/user.go | 4 - pkg/auth/api/proto/auth.proto | 11 -- pkg/management/api/api.go | 5 - 8 files changed, 69 insertions(+), 334 deletions(-) diff --git a/pkg/admin/api/api.go b/pkg/admin/api/api.go index 92604a142f..c197885dfb 100644 --- a/pkg/admin/api/api.go +++ b/pkg/admin/api/api.go @@ -7,11 +7,6 @@ import ( "github.com/caos/zitadel/pkg/admin/api/grpc" ) -type API struct { - grpcServer grpc.Server - gateway grpc.Gateway -} - type Config struct { GRPC grpc_util.Config } diff --git a/pkg/auth/api/grpc/auth.pb.go b/pkg/auth/api/grpc/auth.pb.go index 0166dff10d..9742ac4500 100644 --- a/pkg/auth/api/grpc/auth.pb.go +++ b/pkg/auth/api/grpc/auth.pb.go @@ -2680,7 +2680,7 @@ var file_auth_proto_rawDesc = []byte{ 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x53, 0x54, 0x41, 0x52, 0x54, 0x53, 0x5f, 0x57, 0x49, 0x54, 0x48, 0x10, 0x01, 0x12, 0x19, 0x0a, 0x15, 0x53, 0x45, 0x41, 0x52, 0x43, 0x48, 0x4d, 0x45, 0x54, 0x48, 0x4f, 0x44, 0x5f, 0x43, 0x4f, 0x4e, 0x54, 0x41, 0x49, 0x4e, 0x53, 0x10, 0x02, 0x32, - 0x96, 0x1a, 0x0a, 0x0b, 0x41, 0x75, 0x74, 0x68, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, + 0xba, 0x19, 0x0a, 0x0b, 0x41, 0x75, 0x74, 0x68, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, 0x4b, 0x0a, 0x07, 0x48, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x7a, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, @@ -2856,52 +2856,46 @@ var file_auth_proto_rawDesc = []byte{ 0x74, 0x79, 0x22, 0x2c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x2a, 0x11, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x6d, 0x65, 0x2f, 0x6d, 0x66, 0x61, 0x2f, 0x6f, 0x74, 0x70, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, - 0x12, 0x5a, 0x0a, 0x0b, 0x47, 0x65, 0x74, 0x55, 0x73, 0x65, 0x72, 0x42, 0x79, 0x49, 0x44, 0x12, - 0x1b, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, - 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x49, 0x44, 0x1a, 0x19, 0x2e, 0x7a, - 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, - 0x76, 0x31, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x22, 0x13, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x0d, 0x12, - 0x0b, 0x2f, 0x75, 0x73, 0x65, 0x72, 0x73, 0x2f, 0x7b, 0x69, 0x64, 0x7d, 0x12, 0xb1, 0x01, 0x0a, - 0x13, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, - 0x4f, 0x72, 0x67, 0x73, 0x12, 0x2e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, - 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, - 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x71, - 0x75, 0x65, 0x73, 0x74, 0x1a, 0x2f, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, - 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x72, 0x6f, - 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x52, 0x65, 0x73, - 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x20, 0x22, 0x1b, 0x2f, - 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x6f, 0x72, - 0x67, 0x73, 0x2f, 0x5f, 0x73, 0x65, 0x61, 0x72, 0x63, 0x68, 0x3a, 0x01, 0x2a, 0x82, 0xb5, 0x18, + 0x12, 0xb1, 0x01, 0x0a, 0x13, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x4d, 0x79, 0x50, 0x72, 0x6f, + 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x73, 0x12, 0x2e, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, + 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, + 0x68, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x2f, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, + 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, + 0x79, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x4f, 0x72, 0x67, 0x53, 0x65, 0x61, 0x72, 0x63, + 0x68, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x39, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x20, 0x22, 0x1b, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x70, 0x72, 0x6f, 0x6a, 0x65, + 0x63, 0x74, 0x6f, 0x72, 0x67, 0x73, 0x2f, 0x5f, 0x73, 0x65, 0x61, 0x72, 0x63, 0x68, 0x3a, 0x01, + 0x2a, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, + 0x61, 0x74, 0x65, 0x64, 0x12, 0x7a, 0x0a, 0x0a, 0x49, 0x73, 0x49, 0x61, 0x6d, 0x41, 0x64, 0x6d, + 0x69, 0x6e, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, + 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x24, 0x2e, 0x7a, 0x69, 0x74, + 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, + 0x2e, 0x49, 0x73, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, + 0x22, 0x2e, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x15, 0x12, 0x13, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, + 0x6c, 0x2f, 0x5f, 0x69, 0x73, 0x69, 0x61, 0x6d, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, - 0x12, 0x7a, 0x0a, 0x0a, 0x49, 0x73, 0x49, 0x61, 0x6d, 0x41, 0x64, 0x6d, 0x69, 0x6e, 0x12, 0x16, - 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, - 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x24, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, - 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x49, 0x73, 0x41, - 0x64, 0x6d, 0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2e, 0x82, 0xd3, - 0xe4, 0x93, 0x02, 0x15, 0x12, 0x13, 0x2f, 0x67, 0x6c, 0x6f, 0x62, 0x61, 0x6c, 0x2f, 0x5f, 0x69, - 0x73, 0x69, 0x61, 0x6d, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, - 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x12, 0x89, 0x01, 0x0a, - 0x17, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x5a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x50, 0x65, 0x72, - 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, - 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, - 0x1a, 0x22, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, - 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, - 0x69, 0x6f, 0x6e, 0x73, 0x22, 0x32, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x19, 0x12, 0x17, 0x2f, 0x70, - 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, - 0x65, 0x6c, 0x2f, 0x6d, 0x65, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, 0x75, 0x74, 0x68, 0x65, - 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x42, 0xb7, 0x01, 0x5a, 0x29, 0x67, 0x69, 0x74, - 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, 0x73, 0x2f, 0x7a, 0x69, 0x74, - 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, 0x74, 0x68, 0x2f, 0x61, 0x70, - 0x69, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x92, 0x41, 0x88, 0x01, 0x12, 0x3b, 0x0a, 0x08, 0x41, 0x75, - 0x74, 0x68, 0x20, 0x41, 0x50, 0x49, 0x22, 0x2a, 0x12, 0x28, 0x68, 0x74, 0x74, 0x70, 0x73, 0x3a, - 0x2f, 0x2f, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, - 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, - 0x74, 0x68, 0x32, 0x03, 0x30, 0x2e, 0x31, 0x2a, 0x01, 0x02, 0x32, 0x10, 0x61, 0x70, 0x70, 0x6c, - 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6a, 0x73, 0x6f, 0x6e, 0x32, 0x10, 0x61, 0x70, - 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x3a, 0x10, + 0x12, 0x89, 0x01, 0x0a, 0x17, 0x47, 0x65, 0x74, 0x4d, 0x79, 0x5a, 0x69, 0x74, 0x61, 0x64, 0x65, + 0x6c, 0x50, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x16, 0x2e, 0x67, + 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x45, + 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x22, 0x2e, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2e, 0x61, + 0x75, 0x74, 0x68, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x31, 0x2e, 0x4d, 0x79, 0x50, 0x65, 0x72, + 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x22, 0x32, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x19, + 0x12, 0x17, 0x2f, 0x70, 0x65, 0x72, 0x6d, 0x69, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7a, + 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x6d, 0x65, 0x82, 0xb5, 0x18, 0x0f, 0x0a, 0x0d, 0x61, + 0x75, 0x74, 0x68, 0x65, 0x6e, 0x74, 0x69, 0x63, 0x61, 0x74, 0x65, 0x64, 0x42, 0xb7, 0x01, 0x5a, + 0x29, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x63, 0x61, 0x6f, 0x73, + 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, 0x67, 0x2f, 0x61, 0x75, 0x74, + 0x68, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x92, 0x41, 0x88, 0x01, 0x12, 0x3b, + 0x0a, 0x08, 0x41, 0x75, 0x74, 0x68, 0x20, 0x41, 0x50, 0x49, 0x22, 0x2a, 0x12, 0x28, 0x68, 0x74, + 0x74, 0x70, 0x73, 0x3a, 0x2f, 0x2f, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, + 0x2f, 0x63, 0x61, 0x6f, 0x73, 0x2f, 0x7a, 0x69, 0x74, 0x61, 0x64, 0x65, 0x6c, 0x2f, 0x70, 0x6b, + 0x67, 0x2f, 0x61, 0x75, 0x74, 0x68, 0x32, 0x03, 0x30, 0x2e, 0x31, 0x2a, 0x01, 0x02, 0x32, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x6a, 0x73, 0x6f, 0x6e, - 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, - 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, + 0x32, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x67, 0x72, + 0x70, 0x63, 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, + 0x6a, 0x73, 0x6f, 0x6e, 0x3a, 0x10, 0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, + 0x6e, 0x2f, 0x67, 0x72, 0x70, 0x63, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, } var ( @@ -3002,38 +2996,36 @@ var file_auth_proto_depIdxs = []int32{ 38, // 38: zitadel.auth.api.v1.AuthService.AddMfaOTP:input_type -> google.protobuf.Empty 26, // 39: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:input_type -> zitadel.auth.api.v1.VerifyMfaOtp 38, // 40: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:input_type -> google.protobuf.Empty - 10, // 41: zitadel.auth.api.v1.AuthService.GetUserByID:input_type -> zitadel.auth.api.v1.UserID - 31, // 42: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:input_type -> zitadel.auth.api.v1.MyProjectOrgSearchRequest - 38, // 43: zitadel.auth.api.v1.AuthService.IsIamAdmin:input_type -> google.protobuf.Empty - 38, // 44: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:input_type -> google.protobuf.Empty - 38, // 45: zitadel.auth.api.v1.AuthService.Healthz:output_type -> google.protobuf.Empty - 38, // 46: zitadel.auth.api.v1.AuthService.Ready:output_type -> google.protobuf.Empty - 39, // 47: zitadel.auth.api.v1.AuthService.Validate:output_type -> google.protobuf.Struct - 8, // 48: zitadel.auth.api.v1.AuthService.GetMyUserSessions:output_type -> zitadel.auth.api.v1.UserSessionViews - 12, // 49: zitadel.auth.api.v1.AuthService.GetMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile - 12, // 50: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile - 14, // 51: zitadel.auth.api.v1.AuthService.GetMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail - 14, // 52: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail - 38, // 53: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:output_type -> google.protobuf.Empty - 38, // 54: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:output_type -> google.protobuf.Empty - 18, // 55: zitadel.auth.api.v1.AuthService.GetMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone - 18, // 56: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone - 38, // 57: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:output_type -> google.protobuf.Empty - 38, // 58: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:output_type -> google.protobuf.Empty - 21, // 59: zitadel.auth.api.v1.AuthService.GetMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress - 21, // 60: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress - 27, // 61: zitadel.auth.api.v1.AuthService.GetMyMfas:output_type -> zitadel.auth.api.v1.MultiFactors - 38, // 62: zitadel.auth.api.v1.AuthService.SetMyPassword:output_type -> google.protobuf.Empty - 38, // 63: zitadel.auth.api.v1.AuthService.ChangeMyPassword:output_type -> google.protobuf.Empty - 29, // 64: zitadel.auth.api.v1.AuthService.AddMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse - 29, // 65: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse - 38, // 66: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:output_type -> google.protobuf.Empty - 11, // 67: zitadel.auth.api.v1.AuthService.GetUserByID:output_type -> zitadel.auth.api.v1.User - 33, // 68: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:output_type -> zitadel.auth.api.v1.MyProjectOrgSearchResponse - 34, // 69: zitadel.auth.api.v1.AuthService.IsIamAdmin:output_type -> zitadel.auth.api.v1.IsAdminResponse - 36, // 70: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:output_type -> zitadel.auth.api.v1.MyPermissions - 45, // [45:71] is the sub-list for method output_type - 19, // [19:45] is the sub-list for method input_type + 31, // 41: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:input_type -> zitadel.auth.api.v1.MyProjectOrgSearchRequest + 38, // 42: zitadel.auth.api.v1.AuthService.IsIamAdmin:input_type -> google.protobuf.Empty + 38, // 43: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:input_type -> google.protobuf.Empty + 38, // 44: zitadel.auth.api.v1.AuthService.Healthz:output_type -> google.protobuf.Empty + 38, // 45: zitadel.auth.api.v1.AuthService.Ready:output_type -> google.protobuf.Empty + 39, // 46: zitadel.auth.api.v1.AuthService.Validate:output_type -> google.protobuf.Struct + 8, // 47: zitadel.auth.api.v1.AuthService.GetMyUserSessions:output_type -> zitadel.auth.api.v1.UserSessionViews + 12, // 48: zitadel.auth.api.v1.AuthService.GetMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 12, // 49: zitadel.auth.api.v1.AuthService.UpdateMyUserProfile:output_type -> zitadel.auth.api.v1.UserProfile + 14, // 50: zitadel.auth.api.v1.AuthService.GetMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 14, // 51: zitadel.auth.api.v1.AuthService.ChangeMyUserEmail:output_type -> zitadel.auth.api.v1.UserEmail + 38, // 52: zitadel.auth.api.v1.AuthService.VerifyMyUserEmail:output_type -> google.protobuf.Empty + 38, // 53: zitadel.auth.api.v1.AuthService.ResendMyEmailVerificationMail:output_type -> google.protobuf.Empty + 18, // 54: zitadel.auth.api.v1.AuthService.GetMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 18, // 55: zitadel.auth.api.v1.AuthService.ChangeMyUserPhone:output_type -> zitadel.auth.api.v1.UserPhone + 38, // 56: zitadel.auth.api.v1.AuthService.VerifyMyUserPhone:output_type -> google.protobuf.Empty + 38, // 57: zitadel.auth.api.v1.AuthService.ResendMyPhoneVerificationCode:output_type -> google.protobuf.Empty + 21, // 58: zitadel.auth.api.v1.AuthService.GetMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 21, // 59: zitadel.auth.api.v1.AuthService.UpdateMyUserAddress:output_type -> zitadel.auth.api.v1.UserAddress + 27, // 60: zitadel.auth.api.v1.AuthService.GetMyMfas:output_type -> zitadel.auth.api.v1.MultiFactors + 38, // 61: zitadel.auth.api.v1.AuthService.SetMyPassword:output_type -> google.protobuf.Empty + 38, // 62: zitadel.auth.api.v1.AuthService.ChangeMyPassword:output_type -> google.protobuf.Empty + 29, // 63: zitadel.auth.api.v1.AuthService.AddMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 29, // 64: zitadel.auth.api.v1.AuthService.VerifyMfaOTP:output_type -> zitadel.auth.api.v1.MfaOtpResponse + 38, // 65: zitadel.auth.api.v1.AuthService.RemoveMfaOTP:output_type -> google.protobuf.Empty + 33, // 66: zitadel.auth.api.v1.AuthService.SearchMyProjectOrgs:output_type -> zitadel.auth.api.v1.MyProjectOrgSearchResponse + 34, // 67: zitadel.auth.api.v1.AuthService.IsIamAdmin:output_type -> zitadel.auth.api.v1.IsAdminResponse + 36, // 68: zitadel.auth.api.v1.AuthService.GetMyZitadelPermissions:output_type -> zitadel.auth.api.v1.MyPermissions + 44, // [44:69] is the sub-list for method output_type + 19, // [19:44] is the sub-list for method input_type 19, // [19:19] is the sub-list for extension type_name 19, // [19:19] is the sub-list for extension extendee 0, // [0:19] is the sub-list for field type_name @@ -3453,8 +3445,6 @@ type AuthServiceClient interface { AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) - //TODO: Remove func only for tests - GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) //Permission @@ -3667,15 +3657,6 @@ func (c *authServiceClient) RemoveMfaOTP(ctx context.Context, in *empty.Empty, o return out, nil } -func (c *authServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { - out := new(User) - err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserByID", in, out, opts...) - if err != nil { - return nil, err - } - return out, nil -} - func (c *authServiceClient) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) { out := new(MyProjectOrgSearchResponse) err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", in, out, opts...) @@ -3731,8 +3712,6 @@ type AuthServiceServer interface { AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) - //TODO: Remove func only for tests - GetUserByID(context.Context, *UserID) (*User, error) SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) //Permission @@ -3809,9 +3788,6 @@ func (*UnimplementedAuthServiceServer) VerifyMfaOTP(context.Context, *VerifyMfaO func (*UnimplementedAuthServiceServer) RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) { return nil, status.Errorf(codes.Unimplemented, "method RemoveMfaOTP not implemented") } -func (*UnimplementedAuthServiceServer) GetUserByID(context.Context, *UserID) (*User, error) { - return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") -} func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method SearchMyProjectOrgs not implemented") } @@ -4222,24 +4198,6 @@ func _AuthService_RemoveMfaOTP_Handler(srv interface{}, ctx context.Context, dec return interceptor(ctx, in, info, handler) } -func _AuthService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { - in := new(UserID) - if err := dec(in); err != nil { - return nil, err - } - if interceptor == nil { - return srv.(AuthServiceServer).GetUserByID(ctx, in) - } - info := &grpc.UnaryServerInfo{ - Server: srv, - FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserByID", - } - handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(AuthServiceServer).GetUserByID(ctx, req.(*UserID)) - } - return interceptor(ctx, in, info, handler) -} - func _AuthService_SearchMyProjectOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(MyProjectOrgSearchRequest) if err := dec(in); err != nil { @@ -4386,10 +4344,6 @@ var _AuthService_serviceDesc = grpc.ServiceDesc{ MethodName: "RemoveMfaOTP", Handler: _AuthService_RemoveMfaOTP_Handler, }, - { - MethodName: "GetUserByID", - Handler: _AuthService_GetUserByID_Handler, - }, { MethodName: "SearchMyProjectOrgs", Handler: _AuthService_SearchMyProjectOrgs_Handler, diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go index 1489ea1fa0..d089ded1b3 100644 --- a/pkg/auth/api/grpc/auth.pb.gw.go +++ b/pkg/auth/api/grpc/auth.pb.gw.go @@ -323,33 +323,6 @@ func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.M } -func request_AuthService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { - var protoReq UserID - var metadata runtime.ServerMetadata - - var ( - val string - ok bool - err error - _ = err - ) - - val, ok = pathParams["id"] - if !ok { - return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") - } - - protoReq.Id, err = runtime.String(val) - - if err != nil { - return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) - } - - msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) - return msg, metadata, err - -} - func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq MyProjectOrgSearchRequest var metadata runtime.ServerMetadata @@ -863,26 +836,6 @@ func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux }) - mux.Handle("GET", pattern_AuthService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { - ctx, cancel := context.WithCancel(req.Context()) - defer cancel() - inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) - rctx, err := runtime.AnnotateContext(ctx, mux, req) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - resp, md, err := request_AuthService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) - ctx = runtime.NewServerMetadataContext(ctx, md) - if err != nil { - runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) - return - } - - forward_AuthService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) - - }) - mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() @@ -991,8 +944,6 @@ var ( pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) - pattern_AuthService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) - pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) @@ -1045,8 +996,6 @@ var ( forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage - forward_AuthService_GetUserByID_0 = runtime.ForwardResponseMessage - forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage diff --git a/pkg/auth/api/grpc/auth.swagger.json b/pkg/auth/api/grpc/auth.swagger.json index c73ed1a85f..aafd5141dc 100644 --- a/pkg/auth/api/grpc/auth.swagger.json +++ b/pkg/auth/api/grpc/auth.swagger.json @@ -528,31 +528,6 @@ ] } }, - "/users/{id}": { - "get": { - "summary": "TODO: Remove func only for tests", - "operationId": "GetUserByID", - "responses": { - "200": { - "description": "A successful response.", - "schema": { - "$ref": "#/definitions/v1User" - } - } - }, - "parameters": [ - { - "name": "id", - "in": "path", - "required": true, - "type": "string" - } - ], - "tags": [ - "AuthService" - ] - } - }, "/validate": { "get": { "operationId": "Validate", @@ -891,91 +866,6 @@ } } }, - "v1User": { - "type": "object", - "properties": { - "id": { - "type": "string" - }, - "state": { - "$ref": "#/definitions/v1UserState" - }, - "creation_date": { - "type": "string", - "format": "date-time" - }, - "activation_date": { - "type": "string", - "format": "date-time" - }, - "change_date": { - "type": "string", - "format": "date-time" - }, - "last_login": { - "type": "string", - "format": "date-time" - }, - "password_changed": { - "type": "string", - "format": "date-time" - }, - "user_name": { - "type": "string" - }, - "first_name": { - "type": "string" - }, - "last_name": { - "type": "string" - }, - "nick_name": { - "type": "string" - }, - "display_name": { - "type": "string" - }, - "preferred_language": { - "type": "string" - }, - "gender": { - "$ref": "#/definitions/v1Gender" - }, - "email": { - "type": "string" - }, - "is_email_verified": { - "type": "boolean", - "format": "boolean" - }, - "phone": { - "type": "string" - }, - "is_phone_verified": { - "type": "boolean", - "format": "boolean" - }, - "country": { - "type": "string" - }, - "locality": { - "type": "string" - }, - "postal_code": { - "type": "string" - }, - "region": { - "type": "string" - }, - "street_address": { - "type": "string" - }, - "password_change_required": { - "type": "boolean", - "format": "boolean" - } - } - }, "v1UserAddress": { "type": "object", "properties": { @@ -1098,19 +988,6 @@ } } }, - "v1UserState": { - "type": "string", - "enum": [ - "USERSTATE_UNSPECIEFIED", - "USERSTATE_ACTIVE", - "USERSTATE_INACTIVE", - "USERSTATE_DELETED", - "USERSTATE_LOCKED", - "USERSTATE_SUSPEND", - "USERSTATE_INITIAL" - ], - "default": "USERSTATE_UNSPECIEFIED" - }, "v1VerifyMfaOtp": { "type": "object", "properties": { diff --git a/pkg/auth/api/grpc/mock/auth.proto.mock.go b/pkg/auth/api/grpc/mock/auth.proto.mock.go index 9e277f3c81..f829479430 100644 --- a/pkg/auth/api/grpc/mock/auth.proto.mock.go +++ b/pkg/auth/api/grpc/mock/auth.proto.mock.go @@ -257,26 +257,6 @@ func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1 return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...) } -// GetUserByID mocks base method -func (m *MockAuthServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { - m.ctrl.T.Helper() - varargs := []interface{}{arg0, arg1} - for _, a := range arg2 { - varargs = append(varargs, a) - } - ret := m.ctrl.Call(m, "GetUserByID", varargs...) - ret0, _ := ret[0].(*grpc.User) - ret1, _ := ret[1].(error) - return ret0, ret1 -} - -// GetUserByID indicates an expected call of GetUserByID -func (mr *MockAuthServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { - mr.mock.ctrl.T.Helper() - varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserByID), varargs...) -} - // Healthz mocks base method func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc0.CallOption) (*emptypb.Empty, error) { m.ctrl.T.Helper() diff --git a/pkg/auth/api/grpc/user.go b/pkg/auth/api/grpc/user.go index 073168a6ab..fb7604189f 100644 --- a/pkg/auth/api/grpc/user.go +++ b/pkg/auth/api/grpc/user.go @@ -6,10 +6,6 @@ import ( "github.com/golang/protobuf/ptypes/empty" ) -func (s *Server) GetUserByID(ctx context.Context, request *UserID) (*User, error) { - return nil, errors.ThrowUnimplemented(nil, "GRPC-fj74G", "Not implemented") -} - func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*UserProfile, error) { return nil, errors.ThrowUnimplemented(nil, "GRPC-fis93", "Not implemented") } diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto index 025f3676b5..9055d7f241 100644 --- a/pkg/auth/api/proto/auth.proto +++ b/pkg/auth/api/proto/auth.proto @@ -255,13 +255,6 @@ service AuthService { }; } - //TODO: Remove func only for tests - rpc GetUserByID(UserID) returns (User) { - option (google.api.http) = { - get: "/users/{id}" - }; - } - rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) { option (google.api.http) = { post: "/global/projectorgs/_search" @@ -318,10 +311,6 @@ enum OIDCResponseType { OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2; } -message UserID { - string id = 1; -} - message User { string id = 1; UserState state = 2; diff --git a/pkg/management/api/api.go b/pkg/management/api/api.go index bf5bbf6d7f..39b479dc14 100644 --- a/pkg/management/api/api.go +++ b/pkg/management/api/api.go @@ -8,11 +8,6 @@ import ( "github.com/caos/zitadel/pkg/management/api/grpc" ) -type API struct { - grpcServer grpc.Server - gateway grpc.Gateway -} - type Config struct { GRPC grpc_util.Config }