From e55b137455afbe861a591b37004e2afc41493426 Mon Sep 17 00:00:00 2001 From: Fabiennne Date: Mon, 23 Mar 2020 16:56:02 +0100 Subject: [PATCH] fix: generate proto files --- .../protoc/protoc-gen-authoption/templates.go | 4 +- .../templates/auth_method_mapping.go.tmpl | 8 +- pkg/admin/api/grpc/admin.pb.authoptions.go | 41 + pkg/admin/api/grpc/admin.pb.go | 1451 ++ pkg/admin/api/grpc/admin.pb.gw.go | 348 + pkg/admin/api/grpc/admin.swagger.json | 530 + pkg/admin/api/grpc/mock/admin.proto.mock.go | 178 + pkg/admin/api/proto/admin.proto | 4 +- pkg/auth/api/grpc/auth.pb.authoptions.go | 131 + pkg/auth/api/grpc/auth.pb.go | 8128 ++++++++++ pkg/auth/api/grpc/auth.pb.gw.go | 2485 +++ pkg/auth/api/grpc/auth.swagger.json | 2938 ++++ pkg/auth/api/grpc/mock/auth.proto.mock.go | 1078 ++ pkg/auth/api/proto/auth.proto | 4 +- pkg/management/api/grpc/generate.go | 2 +- .../api/grpc/management.pb.authoptions.go | 521 + pkg/management/api/grpc/management.pb.go | 12569 ++++++++++++++++ pkg/management/api/grpc/management.pb.gw.go | 6078 ++++++++ .../api/grpc/management.swagger.json | 5657 +++++++ pkg/management/api/proto/management.proto | 4 +- 20 files changed, 42146 insertions(+), 13 deletions(-) create mode 100644 pkg/admin/api/grpc/admin.pb.authoptions.go create mode 100644 pkg/admin/api/grpc/admin.pb.go create mode 100644 pkg/admin/api/grpc/admin.pb.gw.go create mode 100644 pkg/admin/api/grpc/admin.swagger.json create mode 100644 pkg/admin/api/grpc/mock/admin.proto.mock.go create mode 100644 pkg/auth/api/grpc/auth.pb.authoptions.go create mode 100644 pkg/auth/api/grpc/auth.pb.go create mode 100644 pkg/auth/api/grpc/auth.pb.gw.go create mode 100644 pkg/auth/api/grpc/auth.swagger.json create mode 100644 pkg/auth/api/grpc/mock/auth.proto.mock.go create mode 100644 pkg/management/api/grpc/management.pb.authoptions.go create mode 100644 pkg/management/api/grpc/management.pb.go create mode 100644 pkg/management/api/grpc/management.pb.gw.go create mode 100644 pkg/management/api/grpc/management.swagger.json diff --git a/internal/protoc/protoc-gen-authoption/templates.go b/internal/protoc/protoc-gen-authoption/templates.go index 00bb05a07c..579ed1367b 100644 --- a/internal/protoc/protoc-gen-authoption/templates.go +++ b/internal/protoc/protoc-gen-authoption/templates.go @@ -68,7 +68,7 @@ func (fi bindataFileInfo) Sys() interface{} { return nil } -var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x8d\x91\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x59\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x83\x6c\x67\x76\xd2\x0c\x98\x4f\xb2\xc8\x9f\x3f\x3f\x8a\x8c\xc1\x5a\x57\x08\x02\x15\x5a\xee\xb1\x82\xb7\x77\x30\x56\x7b\x5d\xde\x0b\x54\xf7\xbc\xf3\x75\x8b\xbe\xd6\x15\x85\xc7\x0d\xbc\x6e\x76\xf0\xfd\xf1\x79\x47\x09\x31\xbc\x3c\x72\x81\x10\x02\x7d\x92\x0d\xd2\x1f\x7a\x7b\x14\xf4\x95\xb7\x18\x23\x21\x44\xb6\x46\x5b\x0f\x77\x04\x00\x20\x13\x5a\x8b\x06\xa9\xd0\x0d\x57\x82\x6a\x2b\x98\xb0\xa6\xcc\xfa\x20\xf9\xd2\x79\xd9\xb8\x7d\xb2\x82\x4c\x48\x5f\x77\x6f\xb4\xd4\x2d\x2b\xb9\x76\xec\x43\x7a\x5e\x61\xc3\xa4\xf2\x68\x15\x6f\x18\x37\x92\xb1\x94\x9b\x9d\x85\xa9\xd4\x7f\x0a\x07\xd7\x05\x21\x21\x80\xe5\x4a\x20\xe4\x0e\x56\x0f\x30\x20\xfc\x44\x7b\x92\x25\x3a\x48\x04\xac\x28\x08\x14\x10\x42\xee\xce\x54\x50\x30\x42\x4e\xdc\xce\x2f\xf7\xdf\x3a\x5f\xbf\xf4\x13\x72\xf0\x00\x13\x0a\x9d\x02\x2f\xdc\x18\xa9\x04\x84\x9e\x77\xb2\x6e\x93\x75\xee\xe8\x90\x95\x0c\xc6\x2f\x04\xc8\xdb\xa4\xdf\x18\x9f\x72\xb4\xf1\x52\x2b\xc8\x5b\xba\xe9\x4f\x0e\xb2\xc4\x48\x47\x46\xda\xbb\xd2\xd3\x57\x9a\x8c\xf7\x43\x76\x06\x97\x05\xe5\x01\xb8\xaa\x66\x75\xff\x9e\xe8\x16\x6d\x2b\x9d\x4b\x16\x33\x4d\xff\x70\x2c\x84\x7c\x18\xce\x76\x78\xef\x18\xe9\x8c\x9e\x85\x30\x9e\xb2\xd5\x35\xfb\xd0\x6a\xb8\xa8\x97\xbe\xc9\x6d\x05\x59\x08\xb7\xda\x88\x31\x5b\x7e\xd2\xad\x6b\x2c\x8f\x5b\x6e\x79\x7b\xa5\xeb\x03\x4f\x12\x9b\x6a\x6c\xe5\x52\x1b\x97\xb3\x31\xa0\x3a\xcf\x39\x04\x18\x7e\x22\x21\x87\x4e\x95\x9f\x1e\x55\x5b\xf9\xc1\x13\xc2\xfe\x39\xad\x50\x89\xc6\x6b\x7b\x77\x42\x2b\x0f\x12\xed\x9c\x76\xa7\x8f\xa8\x7e\x8f\x81\x25\xa4\xbb\xb5\x56\x07\x28\xae\x26\x92\x2e\xa5\x58\x40\xda\x42\xfa\x4b\x71\xfb\x9e\x36\x0e\xed\xac\xfe\xb8\x23\x16\x7d\x67\x15\x4c\xfb\x4d\x2f\x3a\xba\xd5\xd0\xe4\xbb\xfc\xd7\x7e\x2e\x12\xeb\xc0\x0d\x31\xfe\x09\x00\x00\xff\xff\x12\xdf\x14\x2b\xfb\x03\x00\x00") +var _templatesAuth_method_mappingGoTmpl = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x8c\x92\xc1\x6e\xdb\x30\x0c\x86\xcf\xd3\x53\x10\x86\x0f\x4d\x90\x4a\xd8\x35\x40\x0f\x43\xba\x0e\x3d\xb4\x09\xb0\x6c\xd7\x40\xb5\x19\x45\x88\x2d\x09\x92\x1c\xa0\x15\xf4\xee\x03\x6d\x67\x71\xd6\x0e\xa8\x4f\x32\x45\xfe\x3f\x3f\x8a\x42\xc0\xca\xd6\x08\x0a\x0d\x7a\x19\xb1\x86\x97\x57\x70\xde\x46\x5b\xdd\x2a\x34\xb7\xb2\x8b\x87\x16\xe3\xc1\xd6\x1c\xee\xd7\xf0\xbc\xde\xc2\xf7\xfb\xc7\x2d\x67\xcc\xc9\xea\x28\x15\x42\x4a\xfc\x41\x37\xc8\x7f\xd8\xcd\x51\xf1\x67\xd9\x62\xce\x8c\x31\xdd\x3a\xeb\x23\xdc\x30\x00\x80\x42\x59\xab\x1a\xe4\xca\x36\xd2\x28\x6e\xbd\x12\xca\xbb\xaa\xe8\x2f\xd9\x97\x2e\xea\x26\xec\xc8\x0a\x0a\xa5\xe3\xa1\x7b\xe1\x95\x6d\x45\x25\x6d\x10\x6f\x3a\xca\x1a\x1b\xa1\x4d\x44\x6f\x64\x23\xa4\xd3\x82\x52\x8b\x73\x1d\x29\x7d\xb2\x6e\x30\x9d\x31\x96\x12\x78\x69\x14\x42\x19\x60\x79\x07\x03\xc1\x4f\xf4\x27\x5d\x61\x00\x02\x10\xf3\x39\x83\x39\xa4\x54\x86\x33\x14\xcc\x05\x63\x27\xe9\xa7\xc1\xdd\xb7\x2e\x1e\x9e\xfa\x01\x05\xb8\x83\x0b\x09\x1f\x82\x4f\xd2\x39\x6d\x14\xa4\x1e\xf5\x62\xdb\x92\x6d\x19\xc6\x2c\x12\x1f\xbf\x94\xa0\x6c\x49\x74\xed\x22\xe5\x58\x17\xb5\x35\x50\xb6\x7c\xdd\x9f\x02\x14\xc4\xc7\x47\x3e\xde\x3b\xf2\xd3\x57\x4e\xa6\xbb\x21\xbb\x80\x6b\x41\xbd\x07\x69\xea\x89\xee\xdf\x13\xdf\xa0\x6f\x75\x08\x64\x31\xa9\xe9\xdf\x4c\xa4\x54\x0e\x83\xd9\x0c\x4f\x9d\x33\x9f\x90\x8b\x94\xc6\x53\xb1\x9c\x72\x0f\x6d\xa6\x2b\x2d\xfa\x2e\x4e\x4b\x28\x52\xfa\xa8\x85\x9c\x8b\xc5\xbb\xba\xd5\x01\xab\xe3\x46\x7a\xd9\xfe\x53\xd7\x5f\x3c\x68\x6c\xea\xb1\x8d\xeb\xda\xbc\x98\x8c\x00\xcd\x79\xc6\x29\xc1\xf0\x93\x19\xdb\x77\xa6\x7a\xf7\x98\xd6\xeb\x37\x49\x08\xbb\x47\x5a\x9d\x0a\x5d\xb4\xfe\xe6\x84\x5e\xef\x35\xfa\x29\xe9\xd6\x1e\xd1\xfc\x1e\x2f\x16\x40\xb1\x95\x35\x7b\x98\x4f\x72\x28\xa0\xd5\x0c\x68\xf3\xf8\x2f\x23\xfd\x2b\x6d\x19\xfa\x89\xf6\xb8\x1b\x1e\x63\xe7\x0d\x5c\x76\x9a\x5f\x75\xf3\x51\x33\x17\xcf\xc5\xff\x76\x72\x46\x9c\x03\x33\xe4\xfc\x27\x00\x00\xff\xff\xb4\x5d\x04\x73\xee\x03\x00\x00") func templatesAuth_method_mappingGoTmplBytes() ([]byte, error) { return bindataRead( @@ -83,7 +83,7 @@ func templatesAuth_method_mappingGoTmpl() (*asset, error) { return nil, err } - info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1019, mode: os.FileMode(420), modTime: time.Unix(1584977173, 0)} + info := bindataFileInfo{name: "templates/auth_method_mapping.go.tmpl", size: 1006, mode: os.FileMode(420), modTime: time.Unix(1584978801, 0)} a := &asset{bytes: bytes, info: info} return a, nil } diff --git a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl index b2b33042d1..4240a0dffd 100644 --- a/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl +++ b/internal/protoc/protoc-gen-authoption/templates/auth_method_mapping.go.tmpl @@ -6,7 +6,7 @@ package {{.File.GoPkg.Name}} import ( "google.golang.org/grpc" - utils_auth "github.com/caos/zitadel/internal/api//auth" + utils_auth "github.com/caos/zitadel/internal/api/auth" utils_grpc "github.com/caos/zitadel/internal/api/grpc" ) @@ -16,11 +16,11 @@ import ( * {{$s.Name}} */ -var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { +var {{$s.Name}}_AuthMethods = utils_auth.MethodMapping { {{ range $m := $s.Method}} {{ $mAuthOpt := option $m.Options "caos.zitadel.utils.v1.auth_option" }} {{ if and $mAuthOpt $mAuthOpt.Permission }} - "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.AuthOption{ + "/{{$.File.Package}}.{{$s.Name}}/{{.Name}}": utils_auth.Option{ Permission: "{{$mAuthOpt.Permission}}", CheckParam: "{{$mAuthOpt.CheckFieldName}}", }, @@ -28,7 +28,7 @@ var {{$s.Name}}_AuthMethods = utils_auth.AuthMethodMapping { {{ end}} } -func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor { +func {{$s.Name}}_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { return utils_grpc.AuthorizationInterceptor(verifier, authConf, {{$s.Name}}_AuthMethods) } diff --git a/pkg/admin/api/grpc/admin.pb.authoptions.go b/pkg/admin/api/grpc/admin.pb.authoptions.go new file mode 100644 index 0000000000..5dc2d20c11 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.authoptions.go @@ -0,0 +1,41 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * AdminService + */ + +var AdminService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.admin.api.v1.AdminService/IsOrgUnique": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/GetOrgByID": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SearchOrgs": utils_auth.Option{ + Permission: "iam.read", + CheckParam: "", + }, + + "/zitadel.admin.api.v1.AdminService/SetUpOrg": utils_auth.Option{ + Permission: "iam.write", + CheckParam: "", + }, +} + +func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods) +} diff --git a/pkg/admin/api/grpc/admin.pb.go b/pkg/admin/api/grpc/admin.pb.go new file mode 100644 index 0000000000..2b22bc25b2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.go @@ -0,0 +1,1451 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: admin.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +type OrgSearchKey int32 + +const ( + OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED OrgSearchKey = 0 + OrgSearchKey_ORGSEARCHKEY_ORG_NAME OrgSearchKey = 1 + OrgSearchKey_ORGSEARCHKEY_DOMAIN OrgSearchKey = 2 + OrgSearchKey_ORGSEARCHKEY_STATE OrgSearchKey = 3 +) + +var OrgSearchKey_name = map[int32]string{ + 0: "ORGSEARCHKEY_UNSPECIFIED", + 1: "ORGSEARCHKEY_ORG_NAME", + 2: "ORGSEARCHKEY_DOMAIN", + 3: "ORGSEARCHKEY_STATE", +} + +var OrgSearchKey_value = map[string]int32{ + "ORGSEARCHKEY_UNSPECIFIED": 0, + "ORGSEARCHKEY_ORG_NAME": 1, + "ORGSEARCHKEY_DOMAIN": 2, + "ORGSEARCHKEY_STATE": 3, +} + +func (x OrgSearchKey) String() string { + return proto.EnumName(OrgSearchKey_name, int32(x)) +} + +func (OrgSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +type OrgSearchMethod int32 + +const ( + OrgSearchMethod_ORGSEARCHMETHOD_EQUALS OrgSearchMethod = 0 + OrgSearchMethod_ORGSEARCHMETHOD_STARTS_WITH OrgSearchMethod = 1 + OrgSearchMethod_ORGSEARCHMETHOD_CONTAINS OrgSearchMethod = 2 +) + +var OrgSearchMethod_name = map[int32]string{ + 0: "ORGSEARCHMETHOD_EQUALS", + 1: "ORGSEARCHMETHOD_STARTS_WITH", + 2: "ORGSEARCHMETHOD_CONTAINS", +} + +var OrgSearchMethod_value = map[string]int32{ + "ORGSEARCHMETHOD_EQUALS": 0, + "ORGSEARCHMETHOD_STARTS_WITH": 1, + "ORGSEARCHMETHOD_CONTAINS": 2, +} + +func (x OrgSearchMethod) String() string { + return proto.EnumName(OrgSearchMethod_name, int32(x)) +} + +func (OrgSearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{0} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UniqueOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgRequest) Reset() { *m = UniqueOrgRequest{} } +func (m *UniqueOrgRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgRequest) ProtoMessage() {} +func (*UniqueOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{1} +} + +func (m *UniqueOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgRequest.Unmarshal(m, b) +} +func (m *UniqueOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgRequest.Marshal(b, m, deterministic) +} +func (m *UniqueOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgRequest.Merge(m, src) +} +func (m *UniqueOrgRequest) XXX_Size() int { + return xxx_messageInfo_UniqueOrgRequest.Size(m) +} +func (m *UniqueOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgRequest proto.InternalMessageInfo + +func (m *UniqueOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *UniqueOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type UniqueOrgResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueOrgResponse) Reset() { *m = UniqueOrgResponse{} } +func (m *UniqueOrgResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueOrgResponse) ProtoMessage() {} +func (*UniqueOrgResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{2} +} + +func (m *UniqueOrgResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueOrgResponse.Unmarshal(m, b) +} +func (m *UniqueOrgResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueOrgResponse.Marshal(b, m, deterministic) +} +func (m *UniqueOrgResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueOrgResponse.Merge(m, src) +} +func (m *UniqueOrgResponse) XXX_Size() int { + return xxx_messageInfo_UniqueOrgResponse.Size(m) +} +func (m *UniqueOrgResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueOrgResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueOrgResponse proto.InternalMessageInfo + +func (m *UniqueOrgResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{3} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn OrgSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*OrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchRequest) Reset() { *m = OrgSearchRequest{} } +func (m *OrgSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSearchRequest) ProtoMessage() {} +func (*OrgSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{4} +} + +func (m *OrgSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchRequest.Unmarshal(m, b) +} +func (m *OrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchRequest.Merge(m, src) +} +func (m *OrgSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgSearchRequest.Size(m) +} +func (m *OrgSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchRequest proto.InternalMessageInfo + +func (m *OrgSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchRequest) GetSortingColumn() OrgSearchKey { + if m != nil { + return m.SortingColumn + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *OrgSearchRequest) GetQueries() []*OrgSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgSearchQuery struct { + Key OrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.admin.api.v1.OrgSearchKey" json:"key,omitempty"` + Method OrgSearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.admin.api.v1.OrgSearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchQuery) Reset() { *m = OrgSearchQuery{} } +func (m *OrgSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgSearchQuery) ProtoMessage() {} +func (*OrgSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{5} +} + +func (m *OrgSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchQuery.Unmarshal(m, b) +} +func (m *OrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchQuery.Merge(m, src) +} +func (m *OrgSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgSearchQuery.Size(m) +} +func (m *OrgSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchQuery proto.InternalMessageInfo + +func (m *OrgSearchQuery) GetKey() OrgSearchKey { + if m != nil { + return m.Key + } + return OrgSearchKey_ORGSEARCHKEY_UNSPECIFIED +} + +func (m *OrgSearchQuery) GetMethod() OrgSearchMethod { + if m != nil { + return m.Method + } + return OrgSearchMethod_ORGSEARCHMETHOD_EQUALS +} + +func (m *OrgSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type OrgSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSearchResponse) Reset() { *m = OrgSearchResponse{} } +func (m *OrgSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSearchResponse) ProtoMessage() {} +func (*OrgSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{6} +} + +func (m *OrgSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSearchResponse.Unmarshal(m, b) +} +func (m *OrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSearchResponse.Merge(m, src) +} +func (m *OrgSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgSearchResponse.Size(m) +} +func (m *OrgSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSearchResponse proto.InternalMessageInfo + +func (m *OrgSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgSearchResponse) GetResult() []*Org { + if m != nil { + return m.Result + } + return nil +} + +type OrgSetUpRequest struct { + Org *CreateOrgRequest `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *RegisterUserRequest `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpRequest) Reset() { *m = OrgSetUpRequest{} } +func (m *OrgSetUpRequest) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpRequest) ProtoMessage() {} +func (*OrgSetUpRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{7} +} + +func (m *OrgSetUpRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpRequest.Unmarshal(m, b) +} +func (m *OrgSetUpRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpRequest.Marshal(b, m, deterministic) +} +func (m *OrgSetUpRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpRequest.Merge(m, src) +} +func (m *OrgSetUpRequest) XXX_Size() int { + return xxx_messageInfo_OrgSetUpRequest.Size(m) +} +func (m *OrgSetUpRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpRequest proto.InternalMessageInfo + +func (m *OrgSetUpRequest) GetOrg() *CreateOrgRequest { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpRequest) GetUser() *RegisterUserRequest { + if m != nil { + return m.User + } + return nil +} + +type OrgSetUpResponse struct { + Org *Org `protobuf:"bytes,1,opt,name=org,proto3" json:"org,omitempty"` + User *User `protobuf:"bytes,2,opt,name=user,proto3" json:"user,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgSetUpResponse) Reset() { *m = OrgSetUpResponse{} } +func (m *OrgSetUpResponse) String() string { return proto.CompactTextString(m) } +func (*OrgSetUpResponse) ProtoMessage() {} +func (*OrgSetUpResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{8} +} + +func (m *OrgSetUpResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgSetUpResponse.Unmarshal(m, b) +} +func (m *OrgSetUpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgSetUpResponse.Marshal(b, m, deterministic) +} +func (m *OrgSetUpResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgSetUpResponse.Merge(m, src) +} +func (m *OrgSetUpResponse) XXX_Size() int { + return xxx_messageInfo_OrgSetUpResponse.Size(m) +} +func (m *OrgSetUpResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgSetUpResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgSetUpResponse proto.InternalMessageInfo + +func (m *OrgSetUpResponse) GetOrg() *Org { + if m != nil { + return m.Org + } + return nil +} + +func (m *OrgSetUpResponse) GetUser() *User { + if m != nil { + return m.User + } + return nil +} + +type RegisterUserRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } +func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserRequest) ProtoMessage() {} +func (*RegisterUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{9} +} + +func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) +} +func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserRequest.Merge(m, src) +} +func (m *RegisterUserRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserRequest.Size(m) +} +func (m *RegisterUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo + +func (m *RegisterUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *RegisterUserRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.admin.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,6,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,7,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,8,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,9,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,10,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,11,opt,name=gender,proto3,enum=zitadel.admin.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,13,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` + Phone string `protobuf:"bytes,14,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,15,opt,name=isPhoneVerified,proto3" json:"isPhoneVerified,omitempty"` + Country string `protobuf:"bytes,16,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,17,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,18,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,19,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,20,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type CreateOrgRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,2,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateOrgRequest) Reset() { *m = CreateOrgRequest{} } +func (m *CreateOrgRequest) String() string { return proto.CompactTextString(m) } +func (*CreateOrgRequest) ProtoMessage() {} +func (*CreateOrgRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_73a7fc70dcc2027c, []int{11} +} + +func (m *CreateOrgRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateOrgRequest.Unmarshal(m, b) +} +func (m *CreateOrgRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateOrgRequest.Marshal(b, m, deterministic) +} +func (m *CreateOrgRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateOrgRequest.Merge(m, src) +} +func (m *CreateOrgRequest) XXX_Size() int { + return xxx_messageInfo_CreateOrgRequest.Size(m) +} +func (m *CreateOrgRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateOrgRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateOrgRequest proto.InternalMessageInfo + +func (m *CreateOrgRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *CreateOrgRequest) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +func init() { + proto.RegisterEnum("zitadel.admin.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchKey", OrgSearchKey_name, OrgSearchKey_value) + proto.RegisterEnum("zitadel.admin.api.v1.OrgSearchMethod", OrgSearchMethod_name, OrgSearchMethod_value) + proto.RegisterEnum("zitadel.admin.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("zitadel.admin.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterType((*OrgID)(nil), "zitadel.admin.api.v1.OrgID") + proto.RegisterType((*UniqueOrgRequest)(nil), "zitadel.admin.api.v1.UniqueOrgRequest") + proto.RegisterType((*UniqueOrgResponse)(nil), "zitadel.admin.api.v1.UniqueOrgResponse") + proto.RegisterType((*Org)(nil), "zitadel.admin.api.v1.Org") + proto.RegisterType((*OrgSearchRequest)(nil), "zitadel.admin.api.v1.OrgSearchRequest") + proto.RegisterType((*OrgSearchQuery)(nil), "zitadel.admin.api.v1.OrgSearchQuery") + proto.RegisterType((*OrgSearchResponse)(nil), "zitadel.admin.api.v1.OrgSearchResponse") + proto.RegisterType((*OrgSetUpRequest)(nil), "zitadel.admin.api.v1.OrgSetUpRequest") + proto.RegisterType((*OrgSetUpResponse)(nil), "zitadel.admin.api.v1.OrgSetUpResponse") + proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.admin.api.v1.RegisterUserRequest") + proto.RegisterType((*User)(nil), "zitadel.admin.api.v1.User") + proto.RegisterType((*CreateOrgRequest)(nil), "zitadel.admin.api.v1.CreateOrgRequest") +} + +func init() { proto.RegisterFile("admin.proto", fileDescriptor_73a7fc70dcc2027c) } + +var fileDescriptor_73a7fc70dcc2027c = []byte{ + // 1667 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x58, 0x4f, 0x73, 0x1b, 0x49, + 0x15, 0xcf, 0xe8, 0x9f, 0x47, 0x4f, 0xfe, 0x33, 0xee, 0x78, 0x9d, 0x59, 0x39, 0xbb, 0xf6, 0x0e, + 0x9b, 0x90, 0xd5, 0x12, 0x69, 0x23, 0x96, 0x2a, 0xca, 0xd4, 0x2e, 0x25, 0x5b, 0xb3, 0x8e, 0x2a, + 0xb6, 0xe4, 0x1d, 0xc9, 0xe1, 0xcf, 0x45, 0x4c, 0x34, 0xed, 0x51, 0x93, 0xd1, 0xcc, 0xa4, 0xbb, + 0x95, 0xa0, 0xa5, 0x38, 0x90, 0x2a, 0x2e, 0x1c, 0x38, 0xc0, 0x81, 0x4f, 0xc0, 0x99, 0x13, 0x57, + 0xbe, 0x04, 0x1f, 0x80, 0x0b, 0x55, 0x5c, 0x38, 0x70, 0xe1, 0xb2, 0x27, 0xaa, 0xbb, 0x47, 0xb2, + 0x46, 0x96, 0x62, 0x52, 0x5c, 0xf6, 0x64, 0xf5, 0xef, 0xf7, 0x7b, 0xaf, 0x5f, 0xbf, 0x7e, 0xfd, + 0xa6, 0xdb, 0x50, 0x72, 0xbd, 0x11, 0x09, 0xab, 0x31, 0x8d, 0x78, 0x84, 0x76, 0xbe, 0x22, 0xdc, + 0xf5, 0x70, 0x50, 0x55, 0xa0, 0x1b, 0x93, 0xea, 0xcb, 0x47, 0xe5, 0xbb, 0x7e, 0x14, 0xf9, 0x01, + 0xae, 0xb9, 0x31, 0xa9, 0xb9, 0x61, 0x18, 0x71, 0x97, 0x93, 0x28, 0x64, 0xca, 0xa6, 0xbc, 0x97, + 0xb0, 0x72, 0xf4, 0x6c, 0x7c, 0x59, 0xc3, 0xa3, 0x98, 0x4f, 0x12, 0x72, 0x7f, 0x91, 0xe4, 0x64, + 0x84, 0x19, 0x77, 0x47, 0x71, 0x22, 0xb8, 0xbb, 0x28, 0x60, 0x9c, 0x8e, 0x07, 0x3c, 0x61, 0xef, + 0xbc, 0x74, 0x03, 0xe2, 0xb9, 0x1c, 0xd7, 0xa6, 0x3f, 0x12, 0xe2, 0x3b, 0xf2, 0xcf, 0xe0, 0xa1, + 0x8f, 0xc3, 0x87, 0xec, 0x95, 0xeb, 0xfb, 0x98, 0xd6, 0xa2, 0x58, 0x86, 0xb5, 0x24, 0x44, 0xd3, + 0x1d, 0xf3, 0xa1, 0xa2, 0xa7, 0x2a, 0xc5, 0x58, 0x77, 0x20, 0xdf, 0xa1, 0x7e, 0xab, 0x89, 0x36, + 0x21, 0x43, 0x3c, 0x53, 0x3b, 0xd0, 0x1e, 0x14, 0x9d, 0x0c, 0xf1, 0xac, 0x73, 0x30, 0x2e, 0x42, + 0xf2, 0x62, 0x8c, 0x3b, 0xd4, 0x77, 0xf0, 0x8b, 0x31, 0x66, 0x1c, 0xed, 0x41, 0x2e, 0x74, 0x47, + 0x58, 0xa9, 0x8e, 0xd6, 0xbe, 0x3e, 0xca, 0xd1, 0x8c, 0xa1, 0x39, 0x12, 0x44, 0xfb, 0x50, 0xf0, + 0xa2, 0x91, 0x4b, 0x42, 0x33, 0x93, 0xa6, 0x13, 0xd8, 0xfa, 0x04, 0xb6, 0xe7, 0x3c, 0xb2, 0x38, + 0x0a, 0x19, 0x46, 0x7b, 0x50, 0x24, 0xac, 0x3f, 0x96, 0xb8, 0xf4, 0xab, 0x3b, 0x3a, 0x61, 0x4a, + 0x67, 0xfd, 0x47, 0x83, 0x6c, 0x87, 0xfa, 0x8b, 0xb1, 0xa1, 0x4f, 0x21, 0xcf, 0xb8, 0xcb, 0xb1, + 0x9c, 0x69, 0xb3, 0xfe, 0x7e, 0x75, 0xd9, 0xae, 0x55, 0x3b, 0xd4, 0xef, 0x0a, 0x95, 0xa3, 0xc4, + 0xe8, 0x87, 0xb0, 0x31, 0xa0, 0x58, 0xe6, 0xa5, 0x2f, 0x32, 0x69, 0x66, 0x0f, 0xb4, 0x07, 0xa5, + 0x7a, 0xb9, 0xaa, 0x76, 0xa0, 0x3a, 0xdd, 0x81, 0x6a, 0x6f, 0xba, 0x45, 0xce, 0xfa, 0xd4, 0xa0, + 0x29, 0x1c, 0xfc, 0x00, 0x4a, 0x83, 0xa1, 0x1b, 0xfa, 0x58, 0x99, 0xe7, 0x6e, 0x34, 0x07, 0x25, + 0x97, 0xc6, 0x28, 0xc9, 0x5d, 0x5e, 0xae, 0x42, 0xa5, 0x6c, 0x77, 0x96, 0xb2, 0x82, 0x44, 0xa7, + 0x99, 0xfa, 0xa7, 0x06, 0x86, 0x88, 0x1e, 0xbb, 0x74, 0x30, 0x9c, 0x26, 0x7f, 0x17, 0x0a, 0xd1, + 0xe5, 0x25, 0xc3, 0x5c, 0x26, 0x22, 0xe7, 0x24, 0x23, 0xb4, 0x03, 0xf9, 0x80, 0x8c, 0x08, 0x97, + 0xc9, 0xc8, 0x39, 0x6a, 0x80, 0xba, 0xb0, 0xc9, 0x22, 0xca, 0x49, 0xe8, 0xf7, 0x07, 0x51, 0x30, + 0x1e, 0x85, 0x72, 0xb5, 0x9b, 0x75, 0x6b, 0x75, 0xae, 0xe4, 0x6c, 0x4f, 0xf0, 0xe4, 0x48, 0xff, + 0xfa, 0x28, 0xff, 0x5a, 0xcb, 0x1c, 0xdc, 0x72, 0x36, 0x12, 0x1f, 0xc7, 0xd2, 0x05, 0x32, 0x20, + 0xeb, 0xb2, 0x81, 0x5c, 0xb8, 0xee, 0x88, 0x9f, 0xe8, 0x73, 0x58, 0x7b, 0x31, 0xc6, 0x94, 0x60, + 0x66, 0xe6, 0x0f, 0xb2, 0x0f, 0x4a, 0xf5, 0x0f, 0x6f, 0xf0, 0xff, 0xe5, 0x18, 0xd3, 0x89, 0x33, + 0x35, 0xb2, 0xfe, 0xa4, 0xc1, 0x66, 0x9a, 0x43, 0x9f, 0x43, 0xf6, 0x39, 0x9e, 0xc8, 0x45, 0xbe, + 0x6d, 0xb8, 0xc2, 0x10, 0x7d, 0x06, 0x85, 0x11, 0xe6, 0xc3, 0xc8, 0x4b, 0xaa, 0xe3, 0xde, 0x0d, + 0x2e, 0xce, 0xa4, 0xd8, 0x49, 0x8c, 0x44, 0x3a, 0x5f, 0xba, 0xc1, 0x58, 0x55, 0x47, 0xd1, 0x51, + 0x03, 0xeb, 0x8f, 0x1a, 0x6c, 0xcf, 0xed, 0x48, 0x52, 0xbc, 0x6f, 0xb7, 0x25, 0x1f, 0xc0, 0x3a, + 0x8f, 0xb8, 0x1b, 0xf4, 0x29, 0x66, 0xe3, 0x80, 0xcb, 0x09, 0x72, 0x4e, 0x49, 0x62, 0x8e, 0x84, + 0xd0, 0x23, 0x28, 0x24, 0x64, 0x4e, 0x66, 0xf3, 0xdd, 0x95, 0xb1, 0x3b, 0x89, 0xd0, 0xfa, 0xad, + 0x06, 0x5b, 0x32, 0x32, 0x7e, 0x11, 0x4f, 0x4b, 0xe5, 0xfb, 0x90, 0x8d, 0xa8, 0x2f, 0x83, 0x2a, + 0xd5, 0xef, 0x2f, 0xf7, 0x71, 0x2c, 0x2a, 0x7b, 0xee, 0x70, 0x3b, 0xc2, 0x04, 0x7d, 0x06, 0xb9, + 0x31, 0xc3, 0x54, 0x06, 0x5e, 0xaa, 0x7f, 0xb4, 0xdc, 0xd4, 0xc1, 0x3e, 0x61, 0x1c, 0xd3, 0x0b, + 0x86, 0xe9, 0xd4, 0x5a, 0x9a, 0x59, 0x51, 0x52, 0xb7, 0x32, 0x96, 0x24, 0x49, 0x1f, 0xcf, 0x07, + 0xf3, 0x86, 0x05, 0xc9, 0xf9, 0xab, 0xa9, 0xf9, 0xcb, 0xcb, 0xd5, 0x72, 0x5e, 0x35, 0xe1, 0xbf, + 0x32, 0x70, 0x7b, 0x49, 0x38, 0xe8, 0x3d, 0xc8, 0xe3, 0x91, 0x4b, 0x82, 0x54, 0xab, 0xfa, 0x99, + 0xe6, 0x28, 0x14, 0xdd, 0x07, 0xb8, 0x24, 0x94, 0xf1, 0xbe, 0x3c, 0x92, 0x0b, 0xfd, 0xaa, 0x28, + 0xa9, 0xb6, 0x38, 0xa0, 0x1f, 0x42, 0x31, 0x70, 0xa7, 0xb2, 0x6c, 0x5a, 0xa6, 0x0b, 0x46, 0xaa, + 0xf6, 0xa0, 0x18, 0x92, 0xc1, 0x73, 0xa5, 0xca, 0xc9, 0xb2, 0xd1, 0x05, 0x20, 0xc9, 0x0f, 0x60, + 0xdd, 0x23, 0x2c, 0x0e, 0xdc, 0x49, 0x7f, 0xee, 0xfc, 0x97, 0x12, 0x4c, 0x4a, 0x1e, 0x02, 0x8a, + 0x29, 0xbe, 0xc4, 0x94, 0x62, 0xaf, 0x1f, 0xb8, 0xa1, 0x3f, 0x76, 0x7d, 0x9c, 0xb4, 0x84, 0xed, + 0x19, 0x73, 0x9a, 0x10, 0xe8, 0x53, 0x28, 0xf8, 0x38, 0xf4, 0x30, 0x35, 0xd7, 0x64, 0x81, 0xdf, + 0x5d, 0x9e, 0xa5, 0x13, 0xa9, 0x71, 0x12, 0x2d, 0xfa, 0x16, 0xe8, 0xb1, 0xcb, 0xd8, 0xab, 0x88, + 0x7a, 0xa6, 0xbe, 0xb0, 0x92, 0x29, 0x81, 0xde, 0x87, 0x42, 0x44, 0xfd, 0x3e, 0xf1, 0xcc, 0x62, + 0x5a, 0x92, 0x8f, 0xa8, 0xdf, 0xf2, 0xac, 0xbf, 0xe7, 0x21, 0x27, 0xd2, 0x7c, 0xad, 0x23, 0x7f, + 0x2f, 0xdd, 0x91, 0xf7, 0x57, 0x6f, 0xdc, 0x37, 0xa8, 0x25, 0xef, 0x41, 0x51, 0x14, 0xd1, 0xfc, + 0xbe, 0xe8, 0x02, 0x90, 0x9b, 0xf2, 0x5e, 0xaa, 0x44, 0xd4, 0x66, 0xcc, 0x55, 0xc6, 0xde, 0x7c, + 0x65, 0xac, 0x29, 0xdb, 0xe5, 0x05, 0xa1, 0xdf, 0x50, 0x10, 0xc5, 0xff, 0xb5, 0x20, 0xe0, 0xe6, + 0x82, 0x28, 0xbd, 0x45, 0x41, 0xec, 0x4c, 0x8f, 0xc8, 0xba, 0x6a, 0x74, 0xea, 0x64, 0x3c, 0x80, + 0x2d, 0xc2, 0x6c, 0xf1, 0xf3, 0x29, 0xa6, 0xe4, 0x92, 0x60, 0xcf, 0xdc, 0x90, 0xed, 0x7e, 0x11, + 0x16, 0xf6, 0xf1, 0x30, 0x0a, 0xb1, 0xb9, 0xa9, 0xec, 0xe5, 0x40, 0xd9, 0x9f, 0x8b, 0x9f, 0x33, + 0xfb, 0xad, 0xa9, 0x7d, 0x0a, 0x46, 0x26, 0xac, 0x0d, 0xa2, 0x71, 0xc8, 0xe9, 0xc4, 0x34, 0xa4, + 0x87, 0xe9, 0x10, 0x95, 0x41, 0x0f, 0xa2, 0x81, 0x1b, 0x10, 0x3e, 0x31, 0xb7, 0x93, 0xd4, 0x26, + 0x63, 0xb4, 0x0f, 0xa5, 0x38, 0x62, 0xa2, 0x8b, 0x0e, 0x22, 0x0f, 0x9b, 0x48, 0xd2, 0xa0, 0xa0, + 0xe3, 0xc8, 0x93, 0x3d, 0x99, 0x62, 0x9f, 0x44, 0xa1, 0x79, 0x5b, 0x7d, 0x53, 0xd5, 0x08, 0xdd, + 0x83, 0x4d, 0xc6, 0x29, 0xc6, 0xbc, 0xef, 0x7a, 0x1e, 0xc5, 0x8c, 0x99, 0x3b, 0x92, 0xdf, 0x50, + 0x68, 0x43, 0x81, 0xe2, 0xda, 0xb3, 0xd8, 0x19, 0xff, 0xbf, 0x6b, 0x4f, 0xe5, 0x1c, 0xf4, 0xe9, + 0x4d, 0x04, 0x99, 0xb0, 0xd3, 0x71, 0x4e, 0xba, 0xbd, 0x46, 0xcf, 0xee, 0x5f, 0xb4, 0xbb, 0xe7, + 0xf6, 0x71, 0xeb, 0x8b, 0x96, 0xdd, 0x34, 0x6e, 0xa1, 0xdb, 0xb0, 0x35, 0x63, 0x1a, 0xc7, 0xbd, + 0xd6, 0x53, 0xdb, 0xd0, 0xd0, 0x3b, 0xb0, 0x3d, 0x03, 0x5b, 0xed, 0x04, 0xce, 0x54, 0x7e, 0x01, + 0xeb, 0xf3, 0x1f, 0x40, 0x74, 0x17, 0x4c, 0x21, 0xb3, 0x1b, 0xce, 0xf1, 0xe3, 0x27, 0xf6, 0x4f, + 0x16, 0x3c, 0xbf, 0x0b, 0xef, 0xa4, 0xd8, 0x8e, 0x73, 0xd2, 0x6f, 0x37, 0xce, 0x84, 0xff, 0x3b, + 0x70, 0x3b, 0x45, 0x35, 0x3b, 0x67, 0x8d, 0x56, 0xdb, 0xc8, 0xa0, 0x5d, 0x40, 0x29, 0x42, 0x86, + 0x60, 0x64, 0x2b, 0x41, 0xf2, 0xad, 0xb9, 0xfa, 0x6e, 0xa2, 0x32, 0xec, 0xce, 0xa4, 0x67, 0x76, + 0xef, 0x71, 0xa7, 0xd9, 0xb7, 0xbf, 0xbc, 0x68, 0x9c, 0x76, 0x8d, 0x5b, 0x68, 0x1f, 0xf6, 0x16, + 0xb9, 0x6e, 0xaf, 0xe1, 0xf4, 0xba, 0xfd, 0x1f, 0xb5, 0x7a, 0x8f, 0x0d, 0x2d, 0x15, 0x79, 0x22, + 0x38, 0xee, 0xb4, 0x7b, 0x8d, 0x56, 0xbb, 0x6b, 0x64, 0x2a, 0x7f, 0xd6, 0xa0, 0x38, 0x6b, 0x19, + 0x62, 0x1d, 0x17, 0x5d, 0xdb, 0x59, 0x96, 0xbc, 0x1d, 0x30, 0xae, 0xa8, 0x59, 0xf6, 0x76, 0x01, + 0x5d, 0xa1, 0x57, 0xe9, 0x13, 0x59, 0xbd, 0xc2, 0x9b, 0xf6, 0xa9, 0xdd, 0xb3, 0x9b, 0x46, 0x36, + 0xed, 0xe4, 0xb4, 0x73, 0xfc, 0xc4, 0x6e, 0x1a, 0xb9, 0xb4, 0xb8, 0x7b, 0xd1, 0x3d, 0xb7, 0xdb, + 0x4d, 0x23, 0x9f, 0x86, 0x5b, 0xed, 0x56, 0xaf, 0xd5, 0x38, 0x35, 0x0a, 0x95, 0x1f, 0x43, 0x41, + 0x9d, 0x32, 0x31, 0xf9, 0x89, 0xdd, 0x6e, 0xda, 0xce, 0x42, 0xa8, 0xdb, 0xb0, 0x91, 0xe0, 0x5f, + 0xd8, 0x67, 0x8d, 0x53, 0x11, 0xe7, 0x16, 0x94, 0x12, 0x48, 0x02, 0x19, 0x84, 0x60, 0x33, 0x01, + 0x9a, 0xad, 0xa7, 0xb6, 0xd3, 0xb5, 0x8d, 0x6c, 0xfd, 0xdf, 0x79, 0x58, 0x6f, 0x88, 0xd3, 0xdc, + 0xc5, 0xf4, 0x25, 0x19, 0x60, 0xf4, 0x04, 0xd6, 0x1e, 0x63, 0x37, 0xe0, 0xc3, 0xaf, 0xd0, 0xee, + 0xb5, 0x7e, 0x67, 0x8b, 0x17, 0x48, 0x79, 0x05, 0x6e, 0x19, 0xaf, 0xff, 0xf6, 0x8f, 0x3f, 0x64, + 0x00, 0xe9, 0xb5, 0x61, 0xe2, 0xe1, 0x04, 0xf2, 0x0e, 0x76, 0xbd, 0xc9, 0x5b, 0xbb, 0xda, 0x94, + 0xae, 0x74, 0x54, 0xa8, 0x51, 0x69, 0xdf, 0x06, 0xfd, 0x69, 0xf2, 0x50, 0x59, 0xe9, 0xeb, 0xce, + 0x35, 0xbc, 0x2b, 0x9f, 0x3c, 0xd6, 0xb6, 0x74, 0x56, 0x42, 0xc5, 0xd9, 0x63, 0x07, 0xfd, 0x46, + 0x83, 0x52, 0x8b, 0x75, 0xa8, 0xaf, 0x5e, 0x04, 0x68, 0xc5, 0x65, 0x66, 0xf1, 0xa5, 0x52, 0xfe, + 0xf6, 0x8d, 0x3a, 0x75, 0x3b, 0xb1, 0xee, 0xbd, 0xfe, 0x8b, 0x09, 0xa0, 0x13, 0x77, 0x54, 0x15, + 0x2b, 0x90, 0x11, 0x6c, 0xa3, 0xad, 0x5a, 0x44, 0x7d, 0x56, 0xeb, 0x13, 0xa6, 0x5e, 0x26, 0xe8, + 0x12, 0xe0, 0x04, 0xf3, 0x0e, 0xf5, 0x8f, 0x26, 0xad, 0x26, 0xda, 0x5b, 0x79, 0x8b, 0x69, 0x35, + 0xcb, 0xab, 0xaf, 0x38, 0xd6, 0xc1, 0x92, 0xc9, 0xd6, 0x11, 0xa8, 0xc9, 0x7e, 0x49, 0xbc, 0x5f, + 0x89, 0xf5, 0x82, 0x3a, 0x5e, 0x1d, 0xea, 0xb3, 0x55, 0xcb, 0x5d, 0x7c, 0x1b, 0xac, 0x5a, 0xee, + 0xb5, 0x1b, 0xab, 0x75, 0x7f, 0x49, 0x04, 0xc8, 0xda, 0x48, 0x96, 0xcb, 0xa4, 0xf8, 0x50, 0xab, + 0xa0, 0x5f, 0x6b, 0xa0, 0xcb, 0x6b, 0x9c, 0x78, 0x7e, 0xbd, 0xe9, 0x06, 0x7d, 0x75, 0xeb, 0x2c, + 0xdf, 0xbf, 0x49, 0x36, 0x17, 0x43, 0x09, 0x8a, 0x22, 0x86, 0x57, 0x94, 0x70, 0xac, 0x72, 0x6e, + 0xad, 0xcf, 0x82, 0xe0, 0xe3, 0xf8, 0x50, 0xab, 0x1c, 0xfd, 0x55, 0xfb, 0x7d, 0xe3, 0x77, 0x1a, + 0x6a, 0xc0, 0x86, 0xf4, 0x77, 0xc0, 0x54, 0xe5, 0x5b, 0x1f, 0xa3, 0x8f, 0x86, 0x9c, 0xc7, 0xec, + 0xb0, 0x56, 0xf3, 0x09, 0x1f, 0x8e, 0x9f, 0x55, 0x07, 0xd1, 0xa8, 0x36, 0x70, 0x23, 0x56, 0x4b, + 0x02, 0xa8, 0xc5, 0xcf, 0xfd, 0x9a, 0x34, 0xaa, 0x67, 0x3f, 0xa9, 0x3e, 0xaa, 0x68, 0x99, 0xba, + 0xe1, 0xc6, 0x71, 0x40, 0x06, 0xf2, 0xe6, 0x50, 0xfb, 0x39, 0x8b, 0xc2, 0x34, 0xe2, 0xd3, 0x78, + 0x70, 0x78, 0x4d, 0x73, 0x78, 0x4d, 0xf3, 0xd3, 0xca, 0x8d, 0x53, 0xca, 0xff, 0x12, 0x08, 0xed, + 0xb3, 0x82, 0x2c, 0xf0, 0xef, 0xfe, 0x37, 0x00, 0x00, 0xff, 0xff, 0x70, 0xfd, 0x92, 0x95, 0x62, + 0x10, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AdminServiceClient is the client API for AdminService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AdminServiceClient interface { + // Healthz returns status OK as soon as the service started + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //ORG + IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) + SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) +} + +type adminServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAdminServiceClient(cc grpc.ClientConnInterface) AdminServiceClient { + return &adminServiceClient{cc} +} + +func (c *adminServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) IsOrgUnique(ctx context.Context, in *UniqueOrgRequest, opts ...grpc.CallOption) (*UniqueOrgResponse, error) { + out := new(UniqueOrgResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/IsOrgUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SearchOrgs(ctx context.Context, in *OrgSearchRequest, opts ...grpc.CallOption) (*OrgSearchResponse, error) { + out := new(OrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SearchOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *adminServiceClient) SetUpOrg(ctx context.Context, in *OrgSetUpRequest, opts ...grpc.CallOption) (*OrgSetUpResponse, error) { + out := new(OrgSetUpResponse) + err := c.cc.Invoke(ctx, "/zitadel.admin.api.v1.AdminService/SetUpOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AdminServiceServer is the server API for AdminService service. +type AdminServiceServer interface { + // Healthz returns status OK as soon as the service started + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + // Ready returns status OK as soon as all dependent services are available + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //ORG + IsOrgUnique(context.Context, *UniqueOrgRequest) (*UniqueOrgResponse, error) + GetOrgByID(context.Context, *OrgID) (*Org, error) + SearchOrgs(context.Context, *OrgSearchRequest) (*OrgSearchResponse, error) + SetUpOrg(context.Context, *OrgSetUpRequest) (*OrgSetUpResponse, error) +} + +// UnimplementedAdminServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAdminServiceServer struct { +} + +func (*UnimplementedAdminServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAdminServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAdminServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAdminServiceServer) IsOrgUnique(ctx context.Context, req *UniqueOrgRequest) (*UniqueOrgResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsOrgUnique not implemented") +} +func (*UnimplementedAdminServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedAdminServiceServer) SearchOrgs(ctx context.Context, req *OrgSearchRequest) (*OrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgs not implemented") +} +func (*UnimplementedAdminServiceServer) SetUpOrg(ctx context.Context, req *OrgSetUpRequest) (*OrgSetUpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetUpOrg not implemented") +} + +func RegisterAdminServiceServer(s *grpc.Server, srv AdminServiceServer) { + s.RegisterService(&_AdminService_serviceDesc, srv) +} + +func _AdminService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_IsOrgUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueOrgRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).IsOrgUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/IsOrgUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).IsOrgUnique(ctx, req.(*UniqueOrgRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SearchOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SearchOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SearchOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SearchOrgs(ctx, req.(*OrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AdminService_SetUpOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgSetUpRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AdminServiceServer).SetUpOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.admin.api.v1.AdminService/SetUpOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AdminServiceServer).SetUpOrg(ctx, req.(*OrgSetUpRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _AdminService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.admin.api.v1.AdminService", + HandlerType: (*AdminServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AdminService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AdminService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AdminService_Validate_Handler, + }, + { + MethodName: "IsOrgUnique", + Handler: _AdminService_IsOrgUnique_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _AdminService_GetOrgByID_Handler, + }, + { + MethodName: "SearchOrgs", + Handler: _AdminService_SearchOrgs_Handler, + }, + { + MethodName: "SetUpOrg", + Handler: _AdminService_SetUpOrg_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "admin.proto", +} diff --git a/pkg/admin/api/grpc/admin.pb.gw.go b/pkg/admin/api/grpc/admin.pb.gw.go new file mode 100644 index 0000000000..d5c56470e2 --- /dev/null +++ b/pkg/admin/api/grpc/admin.pb.gw.go @@ -0,0 +1,348 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: admin.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AdminService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AdminService_IsOrgUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_AdminService_IsOrgUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueOrgRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AdminService_IsOrgUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsOrgUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SearchOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AdminService_SetUpOrg_0(ctx context.Context, marshaler runtime.Marshaler, client AdminServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgSetUpRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetUpOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAdminServiceHandlerFromEndpoint is same as RegisterAdminServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAdminServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAdminServiceHandler(ctx, mux, conn) +} + +// RegisterAdminServiceHandler registers the http handlers for service AdminService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAdminServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAdminServiceHandlerClient(ctx, mux, NewAdminServiceClient(conn)) +} + +// RegisterAdminServiceHandlerClient registers the http handlers for service AdminService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AdminServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AdminServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AdminServiceClient" to call the correct interceptors. +func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AdminServiceClient) error { + + mux.Handle("GET", pattern_AdminService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_IsOrgUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_IsOrgUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_IsOrgUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AdminService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SearchOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SearchOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SearchOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AdminService_SetUpOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AdminService_SetUpOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AdminService_SetUpOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AdminService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AdminService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AdminService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AdminService_IsOrgUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_isunique"}, "")) + + pattern_AdminService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_AdminService_SearchOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_search"}, "")) + + pattern_AdminService_SetUpOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"orgs", "_setup"}, "")) +) + +var ( + forward_AdminService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AdminService_Ready_0 = runtime.ForwardResponseMessage + + forward_AdminService_Validate_0 = runtime.ForwardResponseMessage + + forward_AdminService_IsOrgUnique_0 = runtime.ForwardResponseMessage + + forward_AdminService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_AdminService_SearchOrgs_0 = runtime.ForwardResponseMessage + + forward_AdminService_SetUpOrg_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/admin/api/grpc/admin.swagger.json b/pkg/admin/api/grpc/admin.swagger.json new file mode 100644 index 0000000000..c312a23b6f --- /dev/null +++ b/pkg/admin/api/grpc/admin.swagger.json @@ -0,0 +1,530 @@ +{ + "swagger": "2.0", + "info": { + "title": "admin service", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/admin" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/healthz": { + "get": { + "summary": "Healthz returns status OK as soon as the service started", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_isunique": { + "get": { + "summary": "ORG", + "operationId": "IsOrgUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueOrgResponse" + } + } + }, + "parameters": [ + { + "name": "name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "domain", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_search": { + "post": { + "operationId": "SearchOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSearchRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/_setup": { + "post": { + "operationId": "SetUpOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgSetUpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgSetUpRequest" + } + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/orgs/{id}": { + "get": { + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AdminService" + ] + } + }, + "/ready": { + "get": { + "summary": "Ready returns status OK as soon as all dependent services are available", + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AdminService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AdminService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1CreateOrgRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgSearchKey": { + "type": "string", + "enum": [ + "ORGSEARCHKEY_UNSPECIFIED", + "ORGSEARCHKEY_ORG_NAME", + "ORGSEARCHKEY_DOMAIN", + "ORGSEARCHKEY_STATE" + ], + "default": "ORGSEARCHKEY_UNSPECIFIED" + }, + "v1OrgSearchMethod": { + "type": "string", + "enum": [ + "ORGSEARCHMETHOD_EQUALS", + "ORGSEARCHMETHOD_STARTS_WITH", + "ORGSEARCHMETHOD_CONTAINS" + ], + "default": "ORGSEARCHMETHOD_EQUALS" + }, + "v1OrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1OrgSearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1OrgSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgSearchQuery" + } + } + } + }, + "v1OrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1OrgSetUpRequest": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1CreateOrgRequest" + }, + "user": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + }, + "v1OrgSetUpResponse": { + "type": "object", + "properties": { + "org": { + "$ref": "#/definitions/v1Org" + }, + "user": { + "$ref": "#/definitions/v1User" + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1UniqueOrgResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "isPhoneVerified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/admin/api/grpc/mock/admin.proto.mock.go b/pkg/admin/api/grpc/mock/admin.proto.mock.go new file mode 100644 index 0000000000..253d6aee69 --- /dev/null +++ b/pkg/admin/api/grpc/mock/admin.proto.mock.go @@ -0,0 +1,178 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/admin/api/grpc (interfaces: AdminServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/admin/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAdminServiceClient is a mock of AdminServiceClient interface +type MockAdminServiceClient struct { + ctrl *gomock.Controller + recorder *MockAdminServiceClientMockRecorder +} + +// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient +type MockAdminServiceClientMockRecorder struct { + mock *MockAdminServiceClient +} + +// NewMockAdminServiceClient creates a new mock instance +func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient { + mock := &MockAdminServiceClient{ctrl: ctrl} + mock.recorder = &MockAdminServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder { + return m.recorder +} + +// GetOrgByID mocks base method +func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetOrgByID", varargs...) + ret0, _ := ret[0].(*grpc.Org) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetOrgByID indicates an expected call of GetOrgByID +func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...) +} + +// Healthz mocks base method +func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...) +} + +// IsOrgUnique mocks base method +func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsOrgUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueOrgResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsOrgUnique indicates an expected call of IsOrgUnique +func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...) +} + +// Ready mocks base method +func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...) +} + +// SearchOrgs mocks base method +func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchOrgs", varargs...) + ret0, _ := ret[0].(*grpc.OrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchOrgs indicates an expected call of SearchOrgs +func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...) +} + +// SetUpOrg mocks base method +func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetUpOrg", varargs...) + ret0, _ := ret[0].(*grpc.OrgSetUpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetUpOrg indicates an expected call of SetUpOrg +func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...) +} + +// Validate mocks base method +func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...) +} diff --git a/pkg/admin/api/proto/admin.proto b/pkg/admin/api/proto/admin.proto index ddacca88b9..89a511e792 100644 --- a/pkg/admin/api/proto/admin.proto +++ b/pkg/admin/api/proto/admin.proto @@ -11,14 +11,14 @@ import "authoption/options.proto"; package zitadel.admin.api.v1; -option go_package ="github.com/caos/zitadel/admin/api/grpc"; +option go_package ="github.com/caos/zitadel/pkg/admin/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "admin service"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/admin" + url: "https://github.com/caos/zitadel/pkg/admin" }; }; diff --git a/pkg/auth/api/grpc/auth.pb.authoptions.go b/pkg/auth/api/grpc/auth.pb.authoptions.go new file mode 100644 index 0000000000..669a2836b9 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.authoptions.go @@ -0,0 +1,131 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * AuthService + */ + +var AuthService_AuthMethods = utils_auth.MethodMapping{ + + "/zitadel.auth.api.v1.AuthService/GetMyUserSessions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyMfas": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SetMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/ChangeMyPassword": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/AddMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/IsIamAdmin": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, + + "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions": utils_auth.Option{ + Permission: "authenticated", + CheckParam: "", + }, +} + +func AuthService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, AuthService_AuthMethods) +} diff --git a/pkg/auth/api/grpc/auth.pb.go b/pkg/auth/api/grpc/auth.pb.go new file mode 100644 index 0000000000..523d941590 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.go @@ -0,0 +1,8128 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: auth.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type UserAgentState int32 + +const ( + UserAgentState_USERAGENTSTATE_UNSPECIFIED UserAgentState = 0 + UserAgentState_USERAGENTSTATE_ACTIVE UserAgentState = 1 + UserAgentState_USERAGENTSTATE_TERMINATED UserAgentState = 2 +) + +var UserAgentState_name = map[int32]string{ + 0: "USERAGENTSTATE_UNSPECIFIED", + 1: "USERAGENTSTATE_ACTIVE", + 2: "USERAGENTSTATE_TERMINATED", +} + +var UserAgentState_value = map[string]int32{ + "USERAGENTSTATE_UNSPECIFIED": 0, + "USERAGENTSTATE_ACTIVE": 1, + "USERAGENTSTATE_TERMINATED": 2, +} + +func (x UserAgentState) String() string { + return proto.EnumName(UserAgentState_name, int32(x)) +} + +func (UserAgentState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{0} +} + +type UserSessionState int32 + +const ( + UserSessionState_USERSESSIONSTATE_UNSPECIFIED UserSessionState = 0 + UserSessionState_USERSESSIONSTATE_ACTIVE UserSessionState = 1 + UserSessionState_USERSESSIONSTATE_TERMINATED UserSessionState = 2 +) + +var UserSessionState_name = map[int32]string{ + 0: "USERSESSIONSTATE_UNSPECIFIED", + 1: "USERSESSIONSTATE_ACTIVE", + 2: "USERSESSIONSTATE_TERMINATED", +} + +var UserSessionState_value = map[string]int32{ + "USERSESSIONSTATE_UNSPECIFIED": 0, + "USERSESSIONSTATE_ACTIVE": 1, + "USERSESSIONSTATE_TERMINATED": 2, +} + +func (x UserSessionState) String() string { + return proto.EnumName(UserSessionState_name, int32(x)) +} + +func (UserSessionState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{1} +} + +type NextStepType int32 + +const ( + NextStepType_NEXTSTEP_UNSPECIFIED NextStepType = 0 + NextStepType_NEXTSTEP_LOGIN NextStepType = 1 + NextStepType_NEXTSTEP_PASSWORD NextStepType = 2 + NextStepType_NEXTSTEP_CHANGE_PASSWORD NextStepType = 3 + NextStepType_NEXTSTEP_MFA_PROMPT NextStepType = 4 + NextStepType_NEXTSTEP_MFA_INIT_CHOICE NextStepType = 5 + NextStepType_NEXTSTEP_MFA_INIT_CREATE NextStepType = 6 + NextStepType_NEXTSTEP_MFA_INIT_VERIFY NextStepType = 7 + NextStepType_NEXTSTEP_MFA_INIT_DONE NextStepType = 8 + NextStepType_NEXTSTEP_MFA_VERIFY NextStepType = 9 + NextStepType_NEXTSTEP_MFA_VERIFY_ASYNC NextStepType = 10 + NextStepType_NEXTSTEP_VERIFY_EMAIL NextStepType = 11 + NextStepType_NEXTSTEP_REDIRECT_TO_CALLBACK NextStepType = 12 + NextStepType_NEXTSTEP_INIT_PASSWORD NextStepType = 13 + NextStepType_NEXTSTEP_CHOOSE_USER NextStepType = 14 +) + +var NextStepType_name = map[int32]string{ + 0: "NEXTSTEP_UNSPECIFIED", + 1: "NEXTSTEP_LOGIN", + 2: "NEXTSTEP_PASSWORD", + 3: "NEXTSTEP_CHANGE_PASSWORD", + 4: "NEXTSTEP_MFA_PROMPT", + 5: "NEXTSTEP_MFA_INIT_CHOICE", + 6: "NEXTSTEP_MFA_INIT_CREATE", + 7: "NEXTSTEP_MFA_INIT_VERIFY", + 8: "NEXTSTEP_MFA_INIT_DONE", + 9: "NEXTSTEP_MFA_VERIFY", + 10: "NEXTSTEP_MFA_VERIFY_ASYNC", + 11: "NEXTSTEP_VERIFY_EMAIL", + 12: "NEXTSTEP_REDIRECT_TO_CALLBACK", + 13: "NEXTSTEP_INIT_PASSWORD", + 14: "NEXTSTEP_CHOOSE_USER", +} + +var NextStepType_value = map[string]int32{ + "NEXTSTEP_UNSPECIFIED": 0, + "NEXTSTEP_LOGIN": 1, + "NEXTSTEP_PASSWORD": 2, + "NEXTSTEP_CHANGE_PASSWORD": 3, + "NEXTSTEP_MFA_PROMPT": 4, + "NEXTSTEP_MFA_INIT_CHOICE": 5, + "NEXTSTEP_MFA_INIT_CREATE": 6, + "NEXTSTEP_MFA_INIT_VERIFY": 7, + "NEXTSTEP_MFA_INIT_DONE": 8, + "NEXTSTEP_MFA_VERIFY": 9, + "NEXTSTEP_MFA_VERIFY_ASYNC": 10, + "NEXTSTEP_VERIFY_EMAIL": 11, + "NEXTSTEP_REDIRECT_TO_CALLBACK": 12, + "NEXTSTEP_INIT_PASSWORD": 13, + "NEXTSTEP_CHOOSE_USER": 14, +} + +func (x NextStepType) String() string { + return proto.EnumName(NextStepType_name, int32(x)) +} + +func (NextStepType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{2} +} + +type AuthSessionType int32 + +const ( + AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED AuthSessionType = 0 + AuthSessionType_AUTHSESSIONTYPE_OIDC AuthSessionType = 1 + AuthSessionType_AUTHSESSIONTYPE_SAML AuthSessionType = 2 +) + +var AuthSessionType_name = map[int32]string{ + 0: "AUTHSESSIONTYPE_UNSPECIFIED", + 1: "AUTHSESSIONTYPE_OIDC", + 2: "AUTHSESSIONTYPE_SAML", +} + +var AuthSessionType_value = map[string]int32{ + "AUTHSESSIONTYPE_UNSPECIFIED": 0, + "AUTHSESSIONTYPE_OIDC": 1, + "AUTHSESSIONTYPE_SAML": 2, +} + +func (x AuthSessionType) String() string { + return proto.EnumName(AuthSessionType_name, int32(x)) +} + +func (AuthSessionType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{3} +} + +type Prompt int32 + +const ( + Prompt_PROMPT_UNSPECIFIED Prompt = 0 + Prompt_PROMPT_NONE Prompt = 1 + Prompt_PROMPT_LOGIN Prompt = 2 + Prompt_PROMPT_CONSENT Prompt = 3 + Prompt_PROMPT_SELECT_ACCOUNT Prompt = 4 +) + +var Prompt_name = map[int32]string{ + 0: "PROMPT_UNSPECIFIED", + 1: "PROMPT_NONE", + 2: "PROMPT_LOGIN", + 3: "PROMPT_CONSENT", + 4: "PROMPT_SELECT_ACCOUNT", +} + +var Prompt_value = map[string]int32{ + "PROMPT_UNSPECIFIED": 0, + "PROMPT_NONE": 1, + "PROMPT_LOGIN": 2, + "PROMPT_CONSENT": 3, + "PROMPT_SELECT_ACCOUNT": 4, +} + +func (x Prompt) String() string { + return proto.EnumName(Prompt_name, int32(x)) +} + +func (Prompt) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{4} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN_TOKEN OIDCResponseType = 2 +) + +var OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_ID_TOKEN_TOKEN", +} + +var OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN": 2, +} + +func (x OIDCResponseType) String() string { + return proto.EnumName(OIDCResponseType_name, int32(x)) +} + +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{5} +} + +type CodeChallengeMethod int32 + +const ( + CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN CodeChallengeMethod = 0 + CodeChallengeMethod_CODECHALLENGEMETHOD_S256 CodeChallengeMethod = 1 +) + +var CodeChallengeMethod_name = map[int32]string{ + 0: "CODECHALLENGEMETHOD_PLAIN", + 1: "CODECHALLENGEMETHOD_S256", +} + +var CodeChallengeMethod_value = map[string]int32{ + "CODECHALLENGEMETHOD_PLAIN": 0, + "CODECHALLENGEMETHOD_S256": 1, +} + +func (x CodeChallengeMethod) String() string { + return proto.EnumName(CodeChallengeMethod_name, int32(x)) +} + +func (CodeChallengeMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{6} +} + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIEFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIEFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIEFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{7} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{8} +} + +type NotificationType int32 + +const ( + NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 + NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 +) + +var NotificationType_name = map[int32]string{ + 0: "NOTIFICATIONTYPE_EMAIL", + 1: "NOTIFICATIONTYPE_SMS", +} + +var NotificationType_value = map[string]int32{ + "NOTIFICATIONTYPE_EMAIL": 0, + "NOTIFICATIONTYPE_SMS": 1, +} + +func (x NotificationType) String() string { + return proto.EnumName(NotificationType_name, int32(x)) +} + +func (NotificationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{9} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +var MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", +} + +var MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, +} + +func (x MfaType) String() string { + return proto.EnumName(MfaType_name, int32(x)) +} + +func (MfaType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{10} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +var MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", +} + +var MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, +} + +func (x MFAState) String() string { + return proto.EnumName(MFAState_name, int32(x)) +} + +func (MFAState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{11} +} + +type AppState int32 + +const ( + AppState_APPSTATE_UNSPECIFIED AppState = 0 + AppState_APPSTATE_ACTIVE AppState = 1 + AppState_APPSTATE_INACTIVE AppState = 2 + AppState_APPSTATE_DELETED AppState = 3 +) + +var AppState_name = map[int32]string{ + 0: "APPSTATE_UNSPECIFIED", + 1: "APPSTATE_ACTIVE", + 2: "APPSTATE_INACTIVE", + 3: "APPSTATE_DELETED", +} + +var AppState_value = map[string]int32{ + "APPSTATE_UNSPECIFIED": 0, + "APPSTATE_ACTIVE": 1, + "APPSTATE_INACTIVE": 2, + "APPSTATE_DELETED": 3, +} + +func (x AppState) String() string { + return proto.EnumName(AppState_name, int32(x)) +} + +func (AppState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{12} +} + +type OIDCGrantType int32 + +const ( + OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 + OIDCGrantType_OIDCGRANTTYPE_GRANT_TYPE_NONE OIDCGrantType = 1 + OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +) + +var OIDCGrantType_name = map[int32]string{ + 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", + 1: "OIDCGRANTTYPE_GRANT_TYPE_NONE", + 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +} + +var OIDCGrantType_value = map[string]int32{ + "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, + "OIDCGRANTTYPE_GRANT_TYPE_NONE": 1, + "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +} + +func (x OIDCGrantType) String() string { + return proto.EnumName(OIDCGrantType_name, int32(x)) +} + +func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{13} +} + +type OIDCApplicationType int32 + +const ( + OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 + OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 + OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 +) + +var OIDCApplicationType_name = map[int32]string{ + 0: "OIDCAPPLICATIONTYPE_WEB", + 1: "OIDCAPPLICATIONTYPE_USER_AGENT", + 2: "OIDCAPPLICATIONTYPE_NATIVE", +} + +var OIDCApplicationType_value = map[string]int32{ + "OIDCAPPLICATIONTYPE_WEB": 0, + "OIDCAPPLICATIONTYPE_USER_AGENT": 1, + "OIDCAPPLICATIONTYPE_NATIVE": 2, +} + +func (x OIDCApplicationType) String() string { + return proto.EnumName(OIDCApplicationType_name, int32(x)) +} + +func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{14} +} + +type OIDCAuthMethodType int32 + +const ( + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 +) + +var OIDCAuthMethodType_name = map[int32]string{ + 0: "OIDCAUTHMETHODTYPE_BASIC", + 1: "OIDCAUTHMETHODTYPE_POST", + 2: "OIDCAUTHMETHODTYPE_NONE", +} + +var OIDCAuthMethodType_value = map[string]int32{ + "OIDCAUTHMETHODTYPE_BASIC": 0, + "OIDCAUTHMETHODTYPE_POST": 1, + "OIDCAUTHMETHODTYPE_NONE": 2, +} + +func (x OIDCAuthMethodType) String() string { + return proto.EnumName(OIDCAuthMethodType_name, int32(x)) +} + +func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{15} +} + +type ApplicationSearchKey int32 + +const ( + ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED ApplicationSearchKey = 0 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_TYPE ApplicationSearchKey = 1 + ApplicationSearchKey_APPLICATIONSEARCHKEY_STATE ApplicationSearchKey = 2 + ApplicationSearchKey_APPLICATIONSEARCHKEY_CLIENT_ID ApplicationSearchKey = 3 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 4 + ApplicationSearchKey_APPLICATIONSEARCHKEY_PROJECT_ID ApplicationSearchKey = 5 +) + +var ApplicationSearchKey_name = map[int32]string{ + 0: "APPLICATIONSEARCHKEY_UNSPECIFIED", + 1: "APPLICATIONSEARCHKEY_APP_TYPE", + 2: "APPLICATIONSEARCHKEY_STATE", + 3: "APPLICATIONSEARCHKEY_CLIENT_ID", + 4: "APPLICATIONSEARCHKEY_APP_NAME", + 5: "APPLICATIONSEARCHKEY_PROJECT_ID", +} + +var ApplicationSearchKey_value = map[string]int32{ + "APPLICATIONSEARCHKEY_UNSPECIFIED": 0, + "APPLICATIONSEARCHKEY_APP_TYPE": 1, + "APPLICATIONSEARCHKEY_STATE": 2, + "APPLICATIONSEARCHKEY_CLIENT_ID": 3, + "APPLICATIONSEARCHKEY_APP_NAME": 4, + "APPLICATIONSEARCHKEY_PROJECT_ID": 5, +} + +func (x ApplicationSearchKey) String() string { + return proto.EnumName(ApplicationSearchKey_name, int32(x)) +} + +func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{16} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +var SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", +} + +var SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, +} + +func (x SearchMethod) String() string { + return proto.EnumName(SearchMethod_name, int32(x)) +} + +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{17} +} + +type GrantSearchKey int32 + +const ( + GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED GrantSearchKey = 0 + GrantSearchKey_GRANTSEARCHKEY_ORG_ID GrantSearchKey = 1 + GrantSearchKey_GRANTSEARCHKEY_PROJECT_ID GrantSearchKey = 2 + GrantSearchKey_GRANTSEARCHKEY_USER_ID GrantSearchKey = 3 +) + +var GrantSearchKey_name = map[int32]string{ + 0: "GRANTSEARCHKEY_UNSPECIFIED", + 1: "GRANTSEARCHKEY_ORG_ID", + 2: "GRANTSEARCHKEY_PROJECT_ID", + 3: "GRANTSEARCHKEY_USER_ID", +} + +var GrantSearchKey_value = map[string]int32{ + "GRANTSEARCHKEY_UNSPECIFIED": 0, + "GRANTSEARCHKEY_ORG_ID": 1, + "GRANTSEARCHKEY_PROJECT_ID": 2, + "GRANTSEARCHKEY_USER_ID": 3, +} + +func (x GrantSearchKey) String() string { + return proto.EnumName(GrantSearchKey_name, int32(x)) +} + +func (GrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{18} +} + +type MyProjectOrgSearchKey int32 + +const ( + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED MyProjectOrgSearchKey = 0 + MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_ORG_NAME MyProjectOrgSearchKey = 1 +) + +var MyProjectOrgSearchKey_name = map[int32]string{ + 0: "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + 1: "MYPROJECTORGSEARCHKEY_ORG_NAME", +} + +var MyProjectOrgSearchKey_value = map[string]int32{ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED": 0, + "MYPROJECTORGSEARCHKEY_ORG_NAME": 1, +} + +func (x MyProjectOrgSearchKey) String() string { + return proto.EnumName(MyProjectOrgSearchKey_name, int32(x)) +} + +func (MyProjectOrgSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{19} +} + +type SessionRequest struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SessionRequest) Reset() { *m = SessionRequest{} } +func (m *SessionRequest) String() string { return proto.CompactTextString(m) } +func (*SessionRequest) ProtoMessage() {} +func (*SessionRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{0} +} + +func (m *SessionRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SessionRequest.Unmarshal(m, b) +} +func (m *SessionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SessionRequest.Marshal(b, m, deterministic) +} +func (m *SessionRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SessionRequest.Merge(m, src) +} +func (m *SessionRequest) XXX_Size() int { + return xxx_messageInfo_SessionRequest.Size(m) +} +func (m *SessionRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SessionRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SessionRequest proto.InternalMessageInfo + +func (m *SessionRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *SessionRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type UserAgent struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,2,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + State UserAgentState `protobuf:"varint,3,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserAgentState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgent) Reset() { *m = UserAgent{} } +func (m *UserAgent) String() string { return proto.CompactTextString(m) } +func (*UserAgent) ProtoMessage() {} +func (*UserAgent) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{1} +} + +func (m *UserAgent) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgent.Unmarshal(m, b) +} +func (m *UserAgent) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgent.Marshal(b, m, deterministic) +} +func (m *UserAgent) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgent.Merge(m, src) +} +func (m *UserAgent) XXX_Size() int { + return xxx_messageInfo_UserAgent.Size(m) +} +func (m *UserAgent) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgent.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgent proto.InternalMessageInfo + +func (m *UserAgent) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAgent) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +func (m *UserAgent) GetState() UserAgentState { + if m != nil { + return m.State + } + return UserAgentState_USERAGENTSTATE_UNSPECIFIED +} + +type UserAgentID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgentID) Reset() { *m = UserAgentID{} } +func (m *UserAgentID) String() string { return proto.CompactTextString(m) } +func (*UserAgentID) ProtoMessage() {} +func (*UserAgentID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{2} +} + +func (m *UserAgentID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgentID.Unmarshal(m, b) +} +func (m *UserAgentID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgentID.Marshal(b, m, deterministic) +} +func (m *UserAgentID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgentID.Merge(m, src) +} +func (m *UserAgentID) XXX_Size() int { + return xxx_messageInfo_UserAgentID.Size(m) +} +func (m *UserAgentID) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgentID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgentID proto.InternalMessageInfo + +func (m *UserAgentID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserAgentCreation struct { + BrowserInfo *BrowserInformation `protobuf:"bytes,1,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgentCreation) Reset() { *m = UserAgentCreation{} } +func (m *UserAgentCreation) String() string { return proto.CompactTextString(m) } +func (*UserAgentCreation) ProtoMessage() {} +func (*UserAgentCreation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{3} +} + +func (m *UserAgentCreation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgentCreation.Unmarshal(m, b) +} +func (m *UserAgentCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgentCreation.Marshal(b, m, deterministic) +} +func (m *UserAgentCreation) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgentCreation.Merge(m, src) +} +func (m *UserAgentCreation) XXX_Size() int { + return xxx_messageInfo_UserAgentCreation.Size(m) +} +func (m *UserAgentCreation) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgentCreation.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgentCreation proto.InternalMessageInfo + +func (m *UserAgentCreation) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type UserAgents struct { + Sessions []*UserAgent `protobuf:"bytes,1,rep,name=sessions,proto3" json:"sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAgents) Reset() { *m = UserAgents{} } +func (m *UserAgents) String() string { return proto.CompactTextString(m) } +func (*UserAgents) ProtoMessage() {} +func (*UserAgents) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{4} +} + +func (m *UserAgents) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAgents.Unmarshal(m, b) +} +func (m *UserAgents) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAgents.Marshal(b, m, deterministic) +} +func (m *UserAgents) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAgents.Merge(m, src) +} +func (m *UserAgents) XXX_Size() int { + return xxx_messageInfo_UserAgents.Size(m) +} +func (m *UserAgents) XXX_DiscardUnknown() { + xxx_messageInfo_UserAgents.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAgents proto.InternalMessageInfo + +func (m *UserAgents) GetSessions() []*UserAgent { + if m != nil { + return m.Sessions + } + return nil +} + +type AuthSessionCreation struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + Type AuthSessionType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` + State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` + Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` + AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` + UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` + LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` + MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` + // Types that are valid to be assigned to TypeInfo: + // *AuthSessionCreation_Oidc + TypeInfo isAuthSessionCreation_TypeInfo `protobuf_oneof:"type_info"` + PreselectedUserId string `protobuf:"bytes,13,opt,name=preselected_user_id,json=preselectedUserId,proto3" json:"preselected_user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionCreation) Reset() { *m = AuthSessionCreation{} } +func (m *AuthSessionCreation) String() string { return proto.CompactTextString(m) } +func (*AuthSessionCreation) ProtoMessage() {} +func (*AuthSessionCreation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{5} +} + +func (m *AuthSessionCreation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionCreation.Unmarshal(m, b) +} +func (m *AuthSessionCreation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionCreation.Marshal(b, m, deterministic) +} +func (m *AuthSessionCreation) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionCreation.Merge(m, src) +} +func (m *AuthSessionCreation) XXX_Size() int { + return xxx_messageInfo_AuthSessionCreation.Size(m) +} +func (m *AuthSessionCreation) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionCreation.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionCreation proto.InternalMessageInfo + +func (m *AuthSessionCreation) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionCreation) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionCreation) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +func (m *AuthSessionCreation) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionCreation) GetRedirectUri() string { + if m != nil { + return m.RedirectUri + } + return "" +} + +func (m *AuthSessionCreation) GetState() string { + if m != nil { + return m.State + } + return "" +} + +func (m *AuthSessionCreation) GetPrompt() Prompt { + if m != nil { + return m.Prompt + } + return Prompt_PROMPT_UNSPECIFIED +} + +func (m *AuthSessionCreation) GetAuthContextClassReference() []string { + if m != nil { + return m.AuthContextClassReference + } + return nil +} + +func (m *AuthSessionCreation) GetUiLocales() []string { + if m != nil { + return m.UiLocales + } + return nil +} + +func (m *AuthSessionCreation) GetLoginHint() string { + if m != nil { + return m.LoginHint + } + return "" +} + +func (m *AuthSessionCreation) GetMaxAge() uint32 { + if m != nil { + return m.MaxAge + } + return 0 +} + +type isAuthSessionCreation_TypeInfo interface { + isAuthSessionCreation_TypeInfo() +} + +type AuthSessionCreation_Oidc struct { + Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` +} + +func (*AuthSessionCreation_Oidc) isAuthSessionCreation_TypeInfo() {} + +func (m *AuthSessionCreation) GetTypeInfo() isAuthSessionCreation_TypeInfo { + if m != nil { + return m.TypeInfo + } + return nil +} + +func (m *AuthSessionCreation) GetOidc() *AuthRequestOIDC { + if x, ok := m.GetTypeInfo().(*AuthSessionCreation_Oidc); ok { + return x.Oidc + } + return nil +} + +func (m *AuthSessionCreation) GetPreselectedUserId() string { + if m != nil { + return m.PreselectedUserId + } + return "" +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*AuthSessionCreation) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*AuthSessionCreation_Oidc)(nil), + } +} + +type AuthSessionResponse struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + RedirectUri string `protobuf:"bytes,5,opt,name=redirect_uri,json=redirectUri,proto3" json:"redirect_uri,omitempty"` + State string `protobuf:"bytes,6,opt,name=state,proto3" json:"state,omitempty"` + Prompt Prompt `protobuf:"varint,7,opt,name=prompt,proto3,enum=zitadel.auth.api.v1.Prompt" json:"prompt,omitempty"` + AuthContextClassReference []string `protobuf:"bytes,8,rep,name=auth_context_class_reference,json=authContextClassReference,proto3" json:"auth_context_class_reference,omitempty"` + UiLocales []string `protobuf:"bytes,9,rep,name=ui_locales,json=uiLocales,proto3" json:"ui_locales,omitempty"` + LoginHint string `protobuf:"bytes,10,opt,name=login_hint,json=loginHint,proto3" json:"login_hint,omitempty"` + MaxAge uint32 `protobuf:"varint,11,opt,name=max_age,json=maxAge,proto3" json:"max_age,omitempty"` + // Types that are valid to be assigned to TypeInfo: + // *AuthSessionResponse_Oidc + TypeInfo isAuthSessionResponse_TypeInfo `protobuf_oneof:"type_info"` + PossibleSteps []*NextStep `protobuf:"bytes,13,rep,name=possible_steps,json=possibleSteps,proto3" json:"possible_steps,omitempty"` + ProjectClientIds []string `protobuf:"bytes,14,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` + UserSession *UserSession `protobuf:"bytes,15,opt,name=user_session,json=userSession,proto3" json:"user_session,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionResponse) Reset() { *m = AuthSessionResponse{} } +func (m *AuthSessionResponse) String() string { return proto.CompactTextString(m) } +func (*AuthSessionResponse) ProtoMessage() {} +func (*AuthSessionResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{6} +} + +func (m *AuthSessionResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionResponse.Unmarshal(m, b) +} +func (m *AuthSessionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionResponse.Marshal(b, m, deterministic) +} +func (m *AuthSessionResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionResponse.Merge(m, src) +} +func (m *AuthSessionResponse) XXX_Size() int { + return xxx_messageInfo_AuthSessionResponse.Size(m) +} +func (m *AuthSessionResponse) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionResponse proto.InternalMessageInfo + +func (m *AuthSessionResponse) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionResponse) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *AuthSessionResponse) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionResponse) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionResponse) GetRedirectUri() string { + if m != nil { + return m.RedirectUri + } + return "" +} + +func (m *AuthSessionResponse) GetState() string { + if m != nil { + return m.State + } + return "" +} + +func (m *AuthSessionResponse) GetPrompt() Prompt { + if m != nil { + return m.Prompt + } + return Prompt_PROMPT_UNSPECIFIED +} + +func (m *AuthSessionResponse) GetAuthContextClassReference() []string { + if m != nil { + return m.AuthContextClassReference + } + return nil +} + +func (m *AuthSessionResponse) GetUiLocales() []string { + if m != nil { + return m.UiLocales + } + return nil +} + +func (m *AuthSessionResponse) GetLoginHint() string { + if m != nil { + return m.LoginHint + } + return "" +} + +func (m *AuthSessionResponse) GetMaxAge() uint32 { + if m != nil { + return m.MaxAge + } + return 0 +} + +type isAuthSessionResponse_TypeInfo interface { + isAuthSessionResponse_TypeInfo() +} + +type AuthSessionResponse_Oidc struct { + Oidc *AuthRequestOIDC `protobuf:"bytes,12,opt,name=oidc,proto3,oneof"` +} + +func (*AuthSessionResponse_Oidc) isAuthSessionResponse_TypeInfo() {} + +func (m *AuthSessionResponse) GetTypeInfo() isAuthSessionResponse_TypeInfo { + if m != nil { + return m.TypeInfo + } + return nil +} + +func (m *AuthSessionResponse) GetOidc() *AuthRequestOIDC { + if x, ok := m.GetTypeInfo().(*AuthSessionResponse_Oidc); ok { + return x.Oidc + } + return nil +} + +func (m *AuthSessionResponse) GetPossibleSteps() []*NextStep { + if m != nil { + return m.PossibleSteps + } + return nil +} + +func (m *AuthSessionResponse) GetProjectClientIds() []string { + if m != nil { + return m.ProjectClientIds + } + return nil +} + +func (m *AuthSessionResponse) GetUserSession() *UserSession { + if m != nil { + return m.UserSession + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*AuthSessionResponse) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*AuthSessionResponse_Oidc)(nil), + } +} + +type AuthSessionView struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + Type AuthSessionType `protobuf:"varint,3,opt,name=type,proto3,enum=zitadel.auth.api.v1.AuthSessionType" json:"type,omitempty"` + ClientId string `protobuf:"bytes,4,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + UserSessionId string `protobuf:"bytes,5,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + ProjectClientIds []string `protobuf:"bytes,6,rep,name=project_client_ids,json=projectClientIds,proto3" json:"project_client_ids,omitempty"` + TokenId string `protobuf:"bytes,7,opt,name=token_id,json=tokenId,proto3" json:"token_id,omitempty"` + TokenExpiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=token_expiration,json=tokenExpiration,proto3" json:"token_expiration,omitempty"` + UserId string `protobuf:"bytes,9,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionView) Reset() { *m = AuthSessionView{} } +func (m *AuthSessionView) String() string { return proto.CompactTextString(m) } +func (*AuthSessionView) ProtoMessage() {} +func (*AuthSessionView) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{7} +} + +func (m *AuthSessionView) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionView.Unmarshal(m, b) +} +func (m *AuthSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionView.Marshal(b, m, deterministic) +} +func (m *AuthSessionView) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionView.Merge(m, src) +} +func (m *AuthSessionView) XXX_Size() int { + return xxx_messageInfo_AuthSessionView.Size(m) +} +func (m *AuthSessionView) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionView.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionView proto.InternalMessageInfo + +func (m *AuthSessionView) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionView) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *AuthSessionView) GetType() AuthSessionType { + if m != nil { + return m.Type + } + return AuthSessionType_AUTHSESSIONTYPE_UNSPECIFIED +} + +func (m *AuthSessionView) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *AuthSessionView) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *AuthSessionView) GetProjectClientIds() []string { + if m != nil { + return m.ProjectClientIds + } + return nil +} + +func (m *AuthSessionView) GetTokenId() string { + if m != nil { + return m.TokenId + } + return "" +} + +func (m *AuthSessionView) GetTokenExpiration() *timestamp.Timestamp { + if m != nil { + return m.TokenExpiration + } + return nil +} + +func (m *AuthSessionView) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type TokenID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *TokenID) Reset() { *m = TokenID{} } +func (m *TokenID) String() string { return proto.CompactTextString(m) } +func (*TokenID) ProtoMessage() {} +func (*TokenID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{8} +} + +func (m *TokenID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_TokenID.Unmarshal(m, b) +} +func (m *TokenID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_TokenID.Marshal(b, m, deterministic) +} +func (m *TokenID) XXX_Merge(src proto.Message) { + xxx_messageInfo_TokenID.Merge(m, src) +} +func (m *TokenID) XXX_Size() int { + return xxx_messageInfo_TokenID.Size(m) +} +func (m *TokenID) XXX_DiscardUnknown() { + xxx_messageInfo_TokenID.DiscardUnknown(m) +} + +var xxx_messageInfo_TokenID proto.InternalMessageInfo + +func (m *TokenID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserSessionID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionID) Reset() { *m = UserSessionID{} } +func (m *UserSessionID) String() string { return proto.CompactTextString(m) } +func (*UserSessionID) ProtoMessage() {} +func (*UserSessionID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{9} +} + +func (m *UserSessionID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionID.Unmarshal(m, b) +} +func (m *UserSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionID.Marshal(b, m, deterministic) +} +func (m *UserSessionID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionID.Merge(m, src) +} +func (m *UserSessionID) XXX_Size() int { + return xxx_messageInfo_UserSessionID.Size(m) +} +func (m *UserSessionID) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionID proto.InternalMessageInfo + +func (m *UserSessionID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSessionID) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +type UserSessions struct { + UserSessions []*UserSession `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessions) Reset() { *m = UserSessions{} } +func (m *UserSessions) String() string { return proto.CompactTextString(m) } +func (*UserSessions) ProtoMessage() {} +func (*UserSessions) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{10} +} + +func (m *UserSessions) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessions.Unmarshal(m, b) +} +func (m *UserSessions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessions.Marshal(b, m, deterministic) +} +func (m *UserSessions) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessions.Merge(m, src) +} +func (m *UserSessions) XXX_Size() int { + return xxx_messageInfo_UserSessions.Size(m) +} +func (m *UserSessions) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessions.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessions proto.InternalMessageInfo + +func (m *UserSessions) GetUserSessions() []*UserSession { + if m != nil { + return m.UserSessions + } + return nil +} + +type UserSession struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + User *AuthUser `protobuf:"bytes,4,opt,name=user,proto3" json:"user,omitempty"` + PasswordVerified bool `protobuf:"varint,5,opt,name=password_verified,json=passwordVerified,proto3" json:"password_verified,omitempty"` + Mfa MfaType `protobuf:"varint,6,opt,name=mfa,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa,omitempty"` + MfaVerified bool `protobuf:"varint,7,opt,name=mfa_verified,json=mfaVerified,proto3" json:"mfa_verified,omitempty"` + AuthTime *timestamp.Timestamp `protobuf:"bytes,8,opt,name=auth_time,json=authTime,proto3" json:"auth_time,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSession) Reset() { *m = UserSession{} } +func (m *UserSession) String() string { return proto.CompactTextString(m) } +func (*UserSession) ProtoMessage() {} +func (*UserSession) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{11} +} + +func (m *UserSession) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSession.Unmarshal(m, b) +} +func (m *UserSession) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSession.Marshal(b, m, deterministic) +} +func (m *UserSession) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSession.Merge(m, src) +} +func (m *UserSession) XXX_Size() int { + return xxx_messageInfo_UserSession.Size(m) +} +func (m *UserSession) XXX_DiscardUnknown() { + xxx_messageInfo_UserSession.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSession proto.InternalMessageInfo + +func (m *UserSession) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSession) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *UserSession) GetAuthState() UserSessionState { + if m != nil { + return m.AuthState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +func (m *UserSession) GetUser() *AuthUser { + if m != nil { + return m.User + } + return nil +} + +func (m *UserSession) GetPasswordVerified() bool { + if m != nil { + return m.PasswordVerified + } + return false +} + +func (m *UserSession) GetMfa() MfaType { + if m != nil { + return m.Mfa + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *UserSession) GetMfaVerified() bool { + if m != nil { + return m.MfaVerified + } + return false +} + +func (m *UserSession) GetAuthTime() *timestamp.Timestamp { + if m != nil { + return m.AuthTime + } + return nil +} + +type UserSessionViews struct { + UserSessions []*UserSessionView `protobuf:"bytes,1,rep,name=user_sessions,json=userSessions,proto3" json:"user_sessions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionViews) Reset() { *m = UserSessionViews{} } +func (m *UserSessionViews) String() string { return proto.CompactTextString(m) } +func (*UserSessionViews) ProtoMessage() {} +func (*UserSessionViews) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{12} +} + +func (m *UserSessionViews) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionViews.Unmarshal(m, b) +} +func (m *UserSessionViews) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionViews.Marshal(b, m, deterministic) +} +func (m *UserSessionViews) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionViews.Merge(m, src) +} +func (m *UserSessionViews) XXX_Size() int { + return xxx_messageInfo_UserSessionViews.Size(m) +} +func (m *UserSessionViews) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionViews.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionViews proto.InternalMessageInfo + +func (m *UserSessionViews) GetUserSessions() []*UserSessionView { + if m != nil { + return m.UserSessions + } + return nil +} + +type UserSessionView struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthState UserSessionState `protobuf:"varint,3,opt,name=auth_state,json=authState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"auth_state,omitempty"` + UserId string `protobuf:"bytes,4,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,5,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSessionView) Reset() { *m = UserSessionView{} } +func (m *UserSessionView) String() string { return proto.CompactTextString(m) } +func (*UserSessionView) ProtoMessage() {} +func (*UserSessionView) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{13} +} + +func (m *UserSessionView) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSessionView.Unmarshal(m, b) +} +func (m *UserSessionView) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSessionView.Marshal(b, m, deterministic) +} +func (m *UserSessionView) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSessionView.Merge(m, src) +} +func (m *UserSessionView) XXX_Size() int { + return xxx_messageInfo_UserSessionView.Size(m) +} +func (m *UserSessionView) XXX_DiscardUnknown() { + xxx_messageInfo_UserSessionView.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSessionView proto.InternalMessageInfo + +func (m *UserSessionView) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserSessionView) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *UserSessionView) GetAuthState() UserSessionState { + if m != nil { + return m.AuthState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +func (m *UserSessionView) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserSessionView) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type AuthUser struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthUser) Reset() { *m = AuthUser{} } +func (m *AuthUser) String() string { return proto.CompactTextString(m) } +func (*AuthUser) ProtoMessage() {} +func (*AuthUser) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{14} +} + +func (m *AuthUser) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthUser.Unmarshal(m, b) +} +func (m *AuthUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthUser.Marshal(b, m, deterministic) +} +func (m *AuthUser) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthUser.Merge(m, src) +} +func (m *AuthUser) XXX_Size() int { + return xxx_messageInfo_AuthUser.Size(m) +} +func (m *AuthUser) XXX_DiscardUnknown() { + xxx_messageInfo_AuthUser.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthUser proto.InternalMessageInfo + +func (m *AuthUser) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AuthUser) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type AuthSessionID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + AgentId string `protobuf:"bytes,2,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionID) Reset() { *m = AuthSessionID{} } +func (m *AuthSessionID) String() string { return proto.CompactTextString(m) } +func (*AuthSessionID) ProtoMessage() {} +func (*AuthSessionID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{15} +} + +func (m *AuthSessionID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionID.Unmarshal(m, b) +} +func (m *AuthSessionID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionID.Marshal(b, m, deterministic) +} +func (m *AuthSessionID) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionID.Merge(m, src) +} +func (m *AuthSessionID) XXX_Size() int { + return xxx_messageInfo_AuthSessionID.Size(m) +} +func (m *AuthSessionID) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionID.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionID proto.InternalMessageInfo + +func (m *AuthSessionID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *AuthSessionID) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *AuthSessionID) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type SelectUserRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + UserSessionId string `protobuf:"bytes,3,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SelectUserRequest) Reset() { *m = SelectUserRequest{} } +func (m *SelectUserRequest) String() string { return proto.CompactTextString(m) } +func (*SelectUserRequest) ProtoMessage() {} +func (*SelectUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{16} +} + +func (m *SelectUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SelectUserRequest.Unmarshal(m, b) +} +func (m *SelectUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SelectUserRequest.Marshal(b, m, deterministic) +} +func (m *SelectUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SelectUserRequest.Merge(m, src) +} +func (m *SelectUserRequest) XXX_Size() int { + return xxx_messageInfo_SelectUserRequest.Size(m) +} +func (m *SelectUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SelectUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SelectUserRequest proto.InternalMessageInfo + +func (m *SelectUserRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *SelectUserRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *SelectUserRequest) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *SelectUserRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyUserRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserRequest) Reset() { *m = VerifyUserRequest{} } +func (m *VerifyUserRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserRequest) ProtoMessage() {} +func (*VerifyUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{17} +} + +func (m *VerifyUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserRequest.Unmarshal(m, b) +} +func (m *VerifyUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserRequest.Merge(m, src) +} +func (m *VerifyUserRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserRequest.Size(m) +} +func (m *VerifyUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserRequest proto.InternalMessageInfo + +func (m *VerifyUserRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyUserRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *VerifyUserRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyPasswordRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,4,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyPasswordRequest) Reset() { *m = VerifyPasswordRequest{} } +func (m *VerifyPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyPasswordRequest) ProtoMessage() {} +func (*VerifyPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{18} +} + +func (m *VerifyPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyPasswordRequest.Unmarshal(m, b) +} +func (m *VerifyPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyPasswordRequest.Marshal(b, m, deterministic) +} +func (m *VerifyPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyPasswordRequest.Merge(m, src) +} +func (m *VerifyPasswordRequest) XXX_Size() int { + return xxx_messageInfo_VerifyPasswordRequest.Size(m) +} +func (m *VerifyPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyPasswordRequest proto.InternalMessageInfo + +func (m *VerifyPasswordRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyPasswordRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyPasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *VerifyPasswordRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type VerifyMfaRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + BrowserInfo *BrowserInformation `protobuf:"bytes,3,opt,name=browser_info,json=browserInfo,proto3" json:"browser_info,omitempty"` + // Types that are valid to be assigned to Mfa: + // *VerifyMfaRequest_Otp + Mfa isVerifyMfaRequest_Mfa `protobuf_oneof:"mfa"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMfaRequest) Reset() { *m = VerifyMfaRequest{} } +func (m *VerifyMfaRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyMfaRequest) ProtoMessage() {} +func (*VerifyMfaRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{19} +} + +func (m *VerifyMfaRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMfaRequest.Unmarshal(m, b) +} +func (m *VerifyMfaRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMfaRequest.Marshal(b, m, deterministic) +} +func (m *VerifyMfaRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMfaRequest.Merge(m, src) +} +func (m *VerifyMfaRequest) XXX_Size() int { + return xxx_messageInfo_VerifyMfaRequest.Size(m) +} +func (m *VerifyMfaRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMfaRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMfaRequest proto.InternalMessageInfo + +func (m *VerifyMfaRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *VerifyMfaRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +func (m *VerifyMfaRequest) GetBrowserInfo() *BrowserInformation { + if m != nil { + return m.BrowserInfo + } + return nil +} + +type isVerifyMfaRequest_Mfa interface { + isVerifyMfaRequest_Mfa() +} + +type VerifyMfaRequest_Otp struct { + Otp *AuthSessionMultiFactorOTP `protobuf:"bytes,4,opt,name=otp,proto3,oneof"` +} + +func (*VerifyMfaRequest_Otp) isVerifyMfaRequest_Mfa() {} + +func (m *VerifyMfaRequest) GetMfa() isVerifyMfaRequest_Mfa { + if m != nil { + return m.Mfa + } + return nil +} + +func (m *VerifyMfaRequest) GetOtp() *AuthSessionMultiFactorOTP { + if x, ok := m.GetMfa().(*VerifyMfaRequest_Otp); ok { + return x.Otp + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*VerifyMfaRequest) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*VerifyMfaRequest_Otp)(nil), + } +} + +type AuthSessionMultiFactorOTP struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthSessionMultiFactorOTP) Reset() { *m = AuthSessionMultiFactorOTP{} } +func (m *AuthSessionMultiFactorOTP) String() string { return proto.CompactTextString(m) } +func (*AuthSessionMultiFactorOTP) ProtoMessage() {} +func (*AuthSessionMultiFactorOTP) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{20} +} + +func (m *AuthSessionMultiFactorOTP) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Unmarshal(m, b) +} +func (m *AuthSessionMultiFactorOTP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Marshal(b, m, deterministic) +} +func (m *AuthSessionMultiFactorOTP) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthSessionMultiFactorOTP.Merge(m, src) +} +func (m *AuthSessionMultiFactorOTP) XXX_Size() int { + return xxx_messageInfo_AuthSessionMultiFactorOTP.Size(m) +} +func (m *AuthSessionMultiFactorOTP) XXX_DiscardUnknown() { + xxx_messageInfo_AuthSessionMultiFactorOTP.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthSessionMultiFactorOTP proto.InternalMessageInfo + +func (m *AuthSessionMultiFactorOTP) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type NextStep struct { + Type NextStepType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.NextStepType" json:"type,omitempty"` + // Types that are valid to be assigned to Data: + // *NextStep_Login + // *NextStep_Password + // *NextStep_MfaVerify + // *NextStep_MfaPrompt + // *NextStep_ChooseUser + Data isNextStep_Data `protobuf_oneof:"data"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *NextStep) Reset() { *m = NextStep{} } +func (m *NextStep) String() string { return proto.CompactTextString(m) } +func (*NextStep) ProtoMessage() {} +func (*NextStep) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{21} +} + +func (m *NextStep) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_NextStep.Unmarshal(m, b) +} +func (m *NextStep) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_NextStep.Marshal(b, m, deterministic) +} +func (m *NextStep) XXX_Merge(src proto.Message) { + xxx_messageInfo_NextStep.Merge(m, src) +} +func (m *NextStep) XXX_Size() int { + return xxx_messageInfo_NextStep.Size(m) +} +func (m *NextStep) XXX_DiscardUnknown() { + xxx_messageInfo_NextStep.DiscardUnknown(m) +} + +var xxx_messageInfo_NextStep proto.InternalMessageInfo + +func (m *NextStep) GetType() NextStepType { + if m != nil { + return m.Type + } + return NextStepType_NEXTSTEP_UNSPECIFIED +} + +type isNextStep_Data interface { + isNextStep_Data() +} + +type NextStep_Login struct { + Login *LoginData `protobuf:"bytes,2,opt,name=login,proto3,oneof"` +} + +type NextStep_Password struct { + Password *PasswordData `protobuf:"bytes,3,opt,name=password,proto3,oneof"` +} + +type NextStep_MfaVerify struct { + MfaVerify *MfaVerifyData `protobuf:"bytes,4,opt,name=mfa_verify,json=mfaVerify,proto3,oneof"` +} + +type NextStep_MfaPrompt struct { + MfaPrompt *MfaPromptData `protobuf:"bytes,5,opt,name=mfa_prompt,json=mfaPrompt,proto3,oneof"` +} + +type NextStep_ChooseUser struct { + ChooseUser *ChooseUserData `protobuf:"bytes,6,opt,name=choose_user,json=chooseUser,proto3,oneof"` +} + +func (*NextStep_Login) isNextStep_Data() {} + +func (*NextStep_Password) isNextStep_Data() {} + +func (*NextStep_MfaVerify) isNextStep_Data() {} + +func (*NextStep_MfaPrompt) isNextStep_Data() {} + +func (*NextStep_ChooseUser) isNextStep_Data() {} + +func (m *NextStep) GetData() isNextStep_Data { + if m != nil { + return m.Data + } + return nil +} + +func (m *NextStep) GetLogin() *LoginData { + if x, ok := m.GetData().(*NextStep_Login); ok { + return x.Login + } + return nil +} + +func (m *NextStep) GetPassword() *PasswordData { + if x, ok := m.GetData().(*NextStep_Password); ok { + return x.Password + } + return nil +} + +func (m *NextStep) GetMfaVerify() *MfaVerifyData { + if x, ok := m.GetData().(*NextStep_MfaVerify); ok { + return x.MfaVerify + } + return nil +} + +func (m *NextStep) GetMfaPrompt() *MfaPromptData { + if x, ok := m.GetData().(*NextStep_MfaPrompt); ok { + return x.MfaPrompt + } + return nil +} + +func (m *NextStep) GetChooseUser() *ChooseUserData { + if x, ok := m.GetData().(*NextStep_ChooseUser); ok { + return x.ChooseUser + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*NextStep) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*NextStep_Login)(nil), + (*NextStep_Password)(nil), + (*NextStep_MfaVerify)(nil), + (*NextStep_MfaPrompt)(nil), + (*NextStep_ChooseUser)(nil), + } +} + +type LoginData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *LoginData) Reset() { *m = LoginData{} } +func (m *LoginData) String() string { return proto.CompactTextString(m) } +func (*LoginData) ProtoMessage() {} +func (*LoginData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{22} +} + +func (m *LoginData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_LoginData.Unmarshal(m, b) +} +func (m *LoginData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_LoginData.Marshal(b, m, deterministic) +} +func (m *LoginData) XXX_Merge(src proto.Message) { + xxx_messageInfo_LoginData.Merge(m, src) +} +func (m *LoginData) XXX_Size() int { + return xxx_messageInfo_LoginData.Size(m) +} +func (m *LoginData) XXX_DiscardUnknown() { + xxx_messageInfo_LoginData.DiscardUnknown(m) +} + +var xxx_messageInfo_LoginData proto.InternalMessageInfo + +func (m *LoginData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +type PasswordData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordData) Reset() { *m = PasswordData{} } +func (m *PasswordData) String() string { return proto.CompactTextString(m) } +func (*PasswordData) ProtoMessage() {} +func (*PasswordData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{23} +} + +func (m *PasswordData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordData.Unmarshal(m, b) +} +func (m *PasswordData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordData.Marshal(b, m, deterministic) +} +func (m *PasswordData) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordData.Merge(m, src) +} +func (m *PasswordData) XXX_Size() int { + return xxx_messageInfo_PasswordData.Size(m) +} +func (m *PasswordData) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordData.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordData proto.InternalMessageInfo + +func (m *PasswordData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +func (m *PasswordData) GetFailureCount() uint32 { + if m != nil { + return m.FailureCount + } + return 0 +} + +type MfaVerifyData struct { + ErrMsg string `protobuf:"bytes,1,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"` + FailureCount uint32 `protobuf:"varint,2,opt,name=failure_count,json=failureCount,proto3" json:"failure_count,omitempty"` + MfaProviders []MfaType `protobuf:"varint,3,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaVerifyData) Reset() { *m = MfaVerifyData{} } +func (m *MfaVerifyData) String() string { return proto.CompactTextString(m) } +func (*MfaVerifyData) ProtoMessage() {} +func (*MfaVerifyData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{24} +} + +func (m *MfaVerifyData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaVerifyData.Unmarshal(m, b) +} +func (m *MfaVerifyData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaVerifyData.Marshal(b, m, deterministic) +} +func (m *MfaVerifyData) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaVerifyData.Merge(m, src) +} +func (m *MfaVerifyData) XXX_Size() int { + return xxx_messageInfo_MfaVerifyData.Size(m) +} +func (m *MfaVerifyData) XXX_DiscardUnknown() { + xxx_messageInfo_MfaVerifyData.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaVerifyData proto.InternalMessageInfo + +func (m *MfaVerifyData) GetErrMsg() string { + if m != nil { + return m.ErrMsg + } + return "" +} + +func (m *MfaVerifyData) GetFailureCount() uint32 { + if m != nil { + return m.FailureCount + } + return 0 +} + +func (m *MfaVerifyData) GetMfaProviders() []MfaType { + if m != nil { + return m.MfaProviders + } + return nil +} + +type MfaPromptData struct { + Required bool `protobuf:"varint,1,opt,name=required,proto3" json:"required,omitempty"` + MfaProviders []MfaType `protobuf:"varint,2,rep,packed,name=mfa_providers,json=mfaProviders,proto3,enum=zitadel.auth.api.v1.MfaType" json:"mfa_providers,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaPromptData) Reset() { *m = MfaPromptData{} } +func (m *MfaPromptData) String() string { return proto.CompactTextString(m) } +func (*MfaPromptData) ProtoMessage() {} +func (*MfaPromptData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{25} +} + +func (m *MfaPromptData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaPromptData.Unmarshal(m, b) +} +func (m *MfaPromptData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaPromptData.Marshal(b, m, deterministic) +} +func (m *MfaPromptData) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaPromptData.Merge(m, src) +} +func (m *MfaPromptData) XXX_Size() int { + return xxx_messageInfo_MfaPromptData.Size(m) +} +func (m *MfaPromptData) XXX_DiscardUnknown() { + xxx_messageInfo_MfaPromptData.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaPromptData proto.InternalMessageInfo + +func (m *MfaPromptData) GetRequired() bool { + if m != nil { + return m.Required + } + return false +} + +func (m *MfaPromptData) GetMfaProviders() []MfaType { + if m != nil { + return m.MfaProviders + } + return nil +} + +type ChooseUserData struct { + Users []*ChooseUser `protobuf:"bytes,1,rep,name=users,proto3" json:"users,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChooseUserData) Reset() { *m = ChooseUserData{} } +func (m *ChooseUserData) String() string { return proto.CompactTextString(m) } +func (*ChooseUserData) ProtoMessage() {} +func (*ChooseUserData) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{26} +} + +func (m *ChooseUserData) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChooseUserData.Unmarshal(m, b) +} +func (m *ChooseUserData) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChooseUserData.Marshal(b, m, deterministic) +} +func (m *ChooseUserData) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChooseUserData.Merge(m, src) +} +func (m *ChooseUserData) XXX_Size() int { + return xxx_messageInfo_ChooseUserData.Size(m) +} +func (m *ChooseUserData) XXX_DiscardUnknown() { + xxx_messageInfo_ChooseUserData.DiscardUnknown(m) +} + +var xxx_messageInfo_ChooseUserData proto.InternalMessageInfo + +func (m *ChooseUserData) GetUsers() []*ChooseUser { + if m != nil { + return m.Users + } + return nil +} + +type ChooseUser struct { + UserSessionId string `protobuf:"bytes,1,opt,name=user_session_id,json=userSessionId,proto3" json:"user_session_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,3,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + UserSessionState UserSessionState `protobuf:"varint,4,opt,name=user_session_state,json=userSessionState,proto3,enum=zitadel.auth.api.v1.UserSessionState" json:"user_session_state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChooseUser) Reset() { *m = ChooseUser{} } +func (m *ChooseUser) String() string { return proto.CompactTextString(m) } +func (*ChooseUser) ProtoMessage() {} +func (*ChooseUser) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{27} +} + +func (m *ChooseUser) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChooseUser.Unmarshal(m, b) +} +func (m *ChooseUser) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChooseUser.Marshal(b, m, deterministic) +} +func (m *ChooseUser) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChooseUser.Merge(m, src) +} +func (m *ChooseUser) XXX_Size() int { + return xxx_messageInfo_ChooseUser.Size(m) +} +func (m *ChooseUser) XXX_DiscardUnknown() { + xxx_messageInfo_ChooseUser.DiscardUnknown(m) +} + +var xxx_messageInfo_ChooseUser proto.InternalMessageInfo + +func (m *ChooseUser) GetUserSessionId() string { + if m != nil { + return m.UserSessionId + } + return "" +} + +func (m *ChooseUser) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ChooseUser) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ChooseUser) GetUserSessionState() UserSessionState { + if m != nil { + return m.UserSessionState + } + return UserSessionState_USERSESSIONSTATE_UNSPECIFIED +} + +type SkipMfaInitRequest struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SkipMfaInitRequest) Reset() { *m = SkipMfaInitRequest{} } +func (m *SkipMfaInitRequest) String() string { return proto.CompactTextString(m) } +func (*SkipMfaInitRequest) ProtoMessage() {} +func (*SkipMfaInitRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{28} +} + +func (m *SkipMfaInitRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SkipMfaInitRequest.Unmarshal(m, b) +} +func (m *SkipMfaInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SkipMfaInitRequest.Marshal(b, m, deterministic) +} +func (m *SkipMfaInitRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SkipMfaInitRequest.Merge(m, src) +} +func (m *SkipMfaInitRequest) XXX_Size() int { + return xxx_messageInfo_SkipMfaInitRequest.Size(m) +} +func (m *SkipMfaInitRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SkipMfaInitRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SkipMfaInitRequest proto.InternalMessageInfo + +func (m *SkipMfaInitRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type BrowserInformation struct { + UserAgent string `protobuf:"bytes,1,opt,name=user_agent,json=userAgent,proto3" json:"user_agent,omitempty"` + RemoteIp *IP `protobuf:"bytes,2,opt,name=remote_ip,json=remoteIp,proto3" json:"remote_ip,omitempty"` + AcceptLanguage string `protobuf:"bytes,3,opt,name=accept_language,json=acceptLanguage,proto3" json:"accept_language,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *BrowserInformation) Reset() { *m = BrowserInformation{} } +func (m *BrowserInformation) String() string { return proto.CompactTextString(m) } +func (*BrowserInformation) ProtoMessage() {} +func (*BrowserInformation) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{29} +} + +func (m *BrowserInformation) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_BrowserInformation.Unmarshal(m, b) +} +func (m *BrowserInformation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_BrowserInformation.Marshal(b, m, deterministic) +} +func (m *BrowserInformation) XXX_Merge(src proto.Message) { + xxx_messageInfo_BrowserInformation.Merge(m, src) +} +func (m *BrowserInformation) XXX_Size() int { + return xxx_messageInfo_BrowserInformation.Size(m) +} +func (m *BrowserInformation) XXX_DiscardUnknown() { + xxx_messageInfo_BrowserInformation.DiscardUnknown(m) +} + +var xxx_messageInfo_BrowserInformation proto.InternalMessageInfo + +func (m *BrowserInformation) GetUserAgent() string { + if m != nil { + return m.UserAgent + } + return "" +} + +func (m *BrowserInformation) GetRemoteIp() *IP { + if m != nil { + return m.RemoteIp + } + return nil +} + +func (m *BrowserInformation) GetAcceptLanguage() string { + if m != nil { + return m.AcceptLanguage + } + return "" +} + +type IP struct { + V4 string `protobuf:"bytes,1,opt,name=V4,proto3" json:"V4,omitempty"` + V6 string `protobuf:"bytes,2,opt,name=V6,proto3" json:"V6,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IP) Reset() { *m = IP{} } +func (m *IP) String() string { return proto.CompactTextString(m) } +func (*IP) ProtoMessage() {} +func (*IP) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{30} +} + +func (m *IP) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IP.Unmarshal(m, b) +} +func (m *IP) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IP.Marshal(b, m, deterministic) +} +func (m *IP) XXX_Merge(src proto.Message) { + xxx_messageInfo_IP.Merge(m, src) +} +func (m *IP) XXX_Size() int { + return xxx_messageInfo_IP.Size(m) +} +func (m *IP) XXX_DiscardUnknown() { + xxx_messageInfo_IP.DiscardUnknown(m) +} + +var xxx_messageInfo_IP proto.InternalMessageInfo + +func (m *IP) GetV4() string { + if m != nil { + return m.V4 + } + return "" +} + +func (m *IP) GetV6() string { + if m != nil { + return m.V6 + } + return "" +} + +type AuthRequestOIDC struct { + Scope []string `protobuf:"bytes,1,rep,name=scope,proto3" json:"scope,omitempty"` + ResponseType OIDCResponseType `protobuf:"varint,2,opt,name=response_type,json=responseType,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_type,omitempty"` + Nonce string `protobuf:"bytes,3,opt,name=nonce,proto3" json:"nonce,omitempty"` + CodeChallenge *CodeChallenge `protobuf:"bytes,4,opt,name=code_challenge,json=codeChallenge,proto3" json:"code_challenge,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthRequestOIDC) Reset() { *m = AuthRequestOIDC{} } +func (m *AuthRequestOIDC) String() string { return proto.CompactTextString(m) } +func (*AuthRequestOIDC) ProtoMessage() {} +func (*AuthRequestOIDC) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{31} +} + +func (m *AuthRequestOIDC) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthRequestOIDC.Unmarshal(m, b) +} +func (m *AuthRequestOIDC) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthRequestOIDC.Marshal(b, m, deterministic) +} +func (m *AuthRequestOIDC) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthRequestOIDC.Merge(m, src) +} +func (m *AuthRequestOIDC) XXX_Size() int { + return xxx_messageInfo_AuthRequestOIDC.Size(m) +} +func (m *AuthRequestOIDC) XXX_DiscardUnknown() { + xxx_messageInfo_AuthRequestOIDC.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthRequestOIDC proto.InternalMessageInfo + +func (m *AuthRequestOIDC) GetScope() []string { + if m != nil { + return m.Scope + } + return nil +} + +func (m *AuthRequestOIDC) GetResponseType() OIDCResponseType { + if m != nil { + return m.ResponseType + } + return OIDCResponseType_OIDCRESPONSETYPE_CODE +} + +func (m *AuthRequestOIDC) GetNonce() string { + if m != nil { + return m.Nonce + } + return "" +} + +func (m *AuthRequestOIDC) GetCodeChallenge() *CodeChallenge { + if m != nil { + return m.CodeChallenge + } + return nil +} + +type CodeChallenge struct { + Challenge string `protobuf:"bytes,1,opt,name=challenge,proto3" json:"challenge,omitempty"` + Method CodeChallengeMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.CodeChallengeMethod" json:"method,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CodeChallenge) Reset() { *m = CodeChallenge{} } +func (m *CodeChallenge) String() string { return proto.CompactTextString(m) } +func (*CodeChallenge) ProtoMessage() {} +func (*CodeChallenge) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{32} +} + +func (m *CodeChallenge) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CodeChallenge.Unmarshal(m, b) +} +func (m *CodeChallenge) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CodeChallenge.Marshal(b, m, deterministic) +} +func (m *CodeChallenge) XXX_Merge(src proto.Message) { + xxx_messageInfo_CodeChallenge.Merge(m, src) +} +func (m *CodeChallenge) XXX_Size() int { + return xxx_messageInfo_CodeChallenge.Size(m) +} +func (m *CodeChallenge) XXX_DiscardUnknown() { + xxx_messageInfo_CodeChallenge.DiscardUnknown(m) +} + +var xxx_messageInfo_CodeChallenge proto.InternalMessageInfo + +func (m *CodeChallenge) GetChallenge() string { + if m != nil { + return m.Challenge + } + return "" +} + +func (m *CodeChallenge) GetMethod() CodeChallengeMethod { + if m != nil { + return m.Method + } + return CodeChallengeMethod_CODECHALLENGEMETHOD_PLAIN +} + +type UserID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserID) Reset() { *m = UserID{} } +func (m *UserID) String() string { return proto.CompactTextString(m) } +func (*UserID) ProtoMessage() {} +func (*UserID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{33} +} + +func (m *UserID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserID.Unmarshal(m, b) +} +func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserID.Marshal(b, m, deterministic) +} +func (m *UserID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserID.Merge(m, src) +} +func (m *UserID) XXX_Size() int { + return xxx_messageInfo_UserID.Size(m) +} +func (m *UserID) XXX_DiscardUnknown() { + xxx_messageInfo_UserID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserID proto.InternalMessageInfo + +func (m *UserID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UniqueUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } +func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueUserRequest) ProtoMessage() {} +func (*UniqueUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{34} +} + +func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) +} +func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) +} +func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserRequest.Merge(m, src) +} +func (m *UniqueUserRequest) XXX_Size() int { + return xxx_messageInfo_UniqueUserRequest.Size(m) +} +func (m *UniqueUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo + +func (m *UniqueUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UniqueUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } +func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueUserResponse) ProtoMessage() {} +func (*UniqueUserResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{35} +} + +func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) +} +func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) +} +func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserResponse.Merge(m, src) +} +func (m *UniqueUserResponse) XXX_Size() int { + return xxx_messageInfo_UniqueUserResponse.Size(m) +} +func (m *UniqueUserResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo + +func (m *UniqueUserResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type RegisterUserRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + Password string `protobuf:"bytes,8,opt,name=password,proto3" json:"password,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserRequest) Reset() { *m = RegisterUserRequest{} } +func (m *RegisterUserRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserRequest) ProtoMessage() {} +func (*RegisterUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{36} +} + +func (m *RegisterUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserRequest.Unmarshal(m, b) +} +func (m *RegisterUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserRequest.Merge(m, src) +} +func (m *RegisterUserRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserRequest.Size(m) +} +func (m *RegisterUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserRequest proto.InternalMessageInfo + +func (m *RegisterUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func (m *RegisterUserRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type RegisterUserExternalIDPRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + IdpProvider *IDPProvider `protobuf:"bytes,8,opt,name=idp_provider,json=idpProvider,proto3" json:"idp_provider,omitempty"` + OrgId string `protobuf:"bytes,9,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RegisterUserExternalIDPRequest) Reset() { *m = RegisterUserExternalIDPRequest{} } +func (m *RegisterUserExternalIDPRequest) String() string { return proto.CompactTextString(m) } +func (*RegisterUserExternalIDPRequest) ProtoMessage() {} +func (*RegisterUserExternalIDPRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{37} +} + +func (m *RegisterUserExternalIDPRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Unmarshal(m, b) +} +func (m *RegisterUserExternalIDPRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Marshal(b, m, deterministic) +} +func (m *RegisterUserExternalIDPRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RegisterUserExternalIDPRequest.Merge(m, src) +} +func (m *RegisterUserExternalIDPRequest) XXX_Size() int { + return xxx_messageInfo_RegisterUserExternalIDPRequest.Size(m) +} +func (m *RegisterUserExternalIDPRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RegisterUserExternalIDPRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RegisterUserExternalIDPRequest proto.InternalMessageInfo + +func (m *RegisterUserExternalIDPRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *RegisterUserExternalIDPRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *RegisterUserExternalIDPRequest) GetIdpProvider() *IDPProvider { + if m != nil { + return m.IdpProvider + } + return nil +} + +func (m *RegisterUserExternalIDPRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +type IDPProvider struct { + Provider string `protobuf:"bytes,8,opt,name=provider,proto3" json:"provider,omitempty"` + ExternalIdpID string `protobuf:"bytes,9,opt,name=externalIdpID,proto3" json:"externalIdpID,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IDPProvider) Reset() { *m = IDPProvider{} } +func (m *IDPProvider) String() string { return proto.CompactTextString(m) } +func (*IDPProvider) ProtoMessage() {} +func (*IDPProvider) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{38} +} + +func (m *IDPProvider) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IDPProvider.Unmarshal(m, b) +} +func (m *IDPProvider) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IDPProvider.Marshal(b, m, deterministic) +} +func (m *IDPProvider) XXX_Merge(src proto.Message) { + xxx_messageInfo_IDPProvider.Merge(m, src) +} +func (m *IDPProvider) XXX_Size() int { + return xxx_messageInfo_IDPProvider.Size(m) +} +func (m *IDPProvider) XXX_DiscardUnknown() { + xxx_messageInfo_IDPProvider.DiscardUnknown(m) +} + +var xxx_messageInfo_IDPProvider proto.InternalMessageInfo + +func (m *IDPProvider) GetProvider() string { + if m != nil { + return m.Provider + } + return "" +} + +func (m *IDPProvider) GetExternalIdpID() string { + if m != nil { + return m.ExternalIdpID + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ActivationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=activation_date,json=activationDate,proto3" json:"activation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,6,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,7,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,8,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,9,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,10,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,12,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,13,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,14,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,15,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,16,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,17,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,18,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,19,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,20,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,21,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,22,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,23,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + PasswordChangeRequired bool `protobuf:"varint,24,opt,name=password_change_required,json=passwordChangeRequired,proto3" json:"password_change_required,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{39} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIEFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetActivationDate() *timestamp.Timestamp { + if m != nil { + return m.ActivationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetLastLogin() *timestamp.Timestamp { + if m != nil { + return m.LastLogin + } + return nil +} + +func (m *User) GetPasswordChanged() *timestamp.Timestamp { + if m != nil { + return m.PasswordChanged + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +func (m *User) GetPasswordChangeRequired() bool { + if m != nil { + return m.PasswordChangeRequired + } + return false +} + +type UserProfile struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserProfile) Reset() { *m = UserProfile{} } +func (m *UserProfile) String() string { return proto.CompactTextString(m) } +func (*UserProfile) ProtoMessage() {} +func (*UserProfile) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{40} +} + +func (m *UserProfile) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserProfile.Unmarshal(m, b) +} +func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) +} +func (m *UserProfile) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserProfile.Merge(m, src) +} +func (m *UserProfile) XXX_Size() int { + return xxx_messageInfo_UserProfile.Size(m) +} +func (m *UserProfile) XXX_DiscardUnknown() { + xxx_messageInfo_UserProfile.DiscardUnknown(m) +} + +var xxx_messageInfo_UserProfile proto.InternalMessageInfo + +func (m *UserProfile) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserProfile) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UserProfile) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserProfile) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserProfile) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UserProfile) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UserProfile) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UserProfile) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UpdateUserProfileRequest struct { + FirstName string `protobuf:"bytes,1,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,2,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,3,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,4,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,5,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,6,opt,name=gender,proto3,enum=zitadel.auth.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } +func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserProfileRequest) ProtoMessage() {} +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{41} +} + +func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) +} +func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) +} +func (m *UpdateUserProfileRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserProfileRequest.Size(m) +} +func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo + +func (m *UpdateUserProfileRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UpdateUserProfileRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=isEmailVerified,proto3" json:"isEmailVerified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmail) Reset() { *m = UserEmail{} } +func (m *UserEmail) String() string { return proto.CompactTextString(m) } +func (*UserEmail) ProtoMessage() {} +func (*UserEmail) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{42} +} + +func (m *UserEmail) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmail.Unmarshal(m, b) +} +func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) +} +func (m *UserEmail) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmail.Merge(m, src) +} +func (m *UserEmail) XXX_Size() int { + return xxx_messageInfo_UserEmail.Size(m) +} +func (m *UserEmail) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmail.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmail proto.InternalMessageInfo + +func (m *UserEmail) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserEmail) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserEmail) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type VerifyMyUserEmailRequest struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMyUserEmailRequest) Reset() { *m = VerifyMyUserEmailRequest{} } +func (m *VerifyMyUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyMyUserEmailRequest) ProtoMessage() {} +func (*VerifyMyUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{43} +} + +func (m *VerifyMyUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMyUserEmailRequest.Unmarshal(m, b) +} +func (m *VerifyMyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMyUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *VerifyMyUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMyUserEmailRequest.Merge(m, src) +} +func (m *VerifyMyUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_VerifyMyUserEmailRequest.Size(m) +} +func (m *VerifyMyUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMyUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMyUserEmailRequest proto.InternalMessageInfo + +func (m *VerifyMyUserEmailRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type VerifyUserEmailRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserEmailRequest) Reset() { *m = VerifyUserEmailRequest{} } +func (m *VerifyUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserEmailRequest) ProtoMessage() {} +func (*VerifyUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{44} +} + +func (m *VerifyUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserEmailRequest.Unmarshal(m, b) +} +func (m *VerifyUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserEmailRequest.Merge(m, src) +} +func (m *VerifyUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserEmailRequest.Size(m) +} +func (m *VerifyUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserEmailRequest proto.InternalMessageInfo + +func (m *VerifyUserEmailRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *VerifyUserEmailRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type UpdateUserEmailRequest struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } +func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserEmailRequest) ProtoMessage() {} +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{45} +} + +func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) +} +func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) +} +func (m *UpdateUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserEmailRequest.Size(m) +} +func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo + +func (m *UpdateUserEmailRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UserPhone struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserPhone) Reset() { *m = UserPhone{} } +func (m *UserPhone) String() string { return proto.CompactTextString(m) } +func (*UserPhone) ProtoMessage() {} +func (*UserPhone) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{46} +} + +func (m *UserPhone) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserPhone.Unmarshal(m, b) +} +func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) +} +func (m *UserPhone) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserPhone.Merge(m, src) +} +func (m *UserPhone) XXX_Size() int { + return xxx_messageInfo_UserPhone.Size(m) +} +func (m *UserPhone) XXX_DiscardUnknown() { + xxx_messageInfo_UserPhone.DiscardUnknown(m) +} + +var xxx_messageInfo_UserPhone proto.InternalMessageInfo + +func (m *UserPhone) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserPhone) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UserPhone) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + Phone string `protobuf:"bytes,1,opt,name=phone,proto3" json:"phone,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } +func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{47} +} + +func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) +} +func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) +} +func (m *UpdateUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) +} +func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo + +func (m *UpdateUserPhoneRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +type VerifyUserPhoneRequest struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserPhoneRequest) Reset() { *m = VerifyUserPhoneRequest{} } +func (m *VerifyUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserPhoneRequest) ProtoMessage() {} +func (*VerifyUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{48} +} + +func (m *VerifyUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserPhoneRequest.Unmarshal(m, b) +} +func (m *VerifyUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserPhoneRequest.Merge(m, src) +} +func (m *VerifyUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserPhoneRequest.Size(m) +} +func (m *VerifyUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserPhoneRequest proto.InternalMessageInfo + +func (m *VerifyUserPhoneRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type UserAddress struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAddress) Reset() { *m = UserAddress{} } +func (m *UserAddress) String() string { return proto.CompactTextString(m) } +func (*UserAddress) ProtoMessage() {} +func (*UserAddress) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{49} +} + +func (m *UserAddress) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAddress.Unmarshal(m, b) +} +func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) +} +func (m *UserAddress) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAddress.Merge(m, src) +} +func (m *UserAddress) XXX_Size() int { + return xxx_messageInfo_UserAddress.Size(m) +} +func (m *UserAddress) XXX_DiscardUnknown() { + xxx_messageInfo_UserAddress.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAddress proto.InternalMessageInfo + +func (m *UserAddress) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAddress) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UserAddress) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UserAddress) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UserAddress) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UserAddress) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + Country string `protobuf:"bytes,1,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,2,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,3,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,4,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,5,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } +func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserAddressRequest) ProtoMessage() {} +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{50} +} + +func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) +} +func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) +} +func (m *UpdateUserAddressRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserAddressRequest.Size(m) +} +func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo + +func (m *UpdateUserAddressRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UpdateUserAddressRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UpdateUserAddressRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UpdateUserAddressRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UpdateUserAddressRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type PasswordID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordID) Reset() { *m = PasswordID{} } +func (m *PasswordID) String() string { return proto.CompactTextString(m) } +func (*PasswordID) ProtoMessage() {} +func (*PasswordID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{51} +} + +func (m *PasswordID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordID.Unmarshal(m, b) +} +func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) +} +func (m *PasswordID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordID.Merge(m, src) +} +func (m *PasswordID) XXX_Size() int { + return xxx_messageInfo_PasswordID.Size(m) +} +func (m *PasswordID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordID proto.InternalMessageInfo + +func (m *PasswordID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordRequest struct { + Password string `protobuf:"bytes,1,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } +func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } +func (*PasswordRequest) ProtoMessage() {} +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{52} +} + +func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) +} +func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) +} +func (m *PasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordRequest.Merge(m, src) +} +func (m *PasswordRequest) XXX_Size() int { + return xxx_messageInfo_PasswordRequest.Size(m) +} +func (m *PasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo + +func (m *PasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type ResetPasswordRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } +func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*ResetPasswordRequest) ProtoMessage() {} +func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{53} +} + +func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) +} +func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) +} +func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPasswordRequest.Merge(m, src) +} +func (m *ResetPasswordRequest) XXX_Size() int { + return xxx_messageInfo_ResetPasswordRequest.Size(m) +} +func (m *ResetPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo + +func (m *ResetPasswordRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ResetPasswordRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type ResetPassword struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + NewPassword string `protobuf:"bytes,3,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPassword) Reset() { *m = ResetPassword{} } +func (m *ResetPassword) String() string { return proto.CompactTextString(m) } +func (*ResetPassword) ProtoMessage() {} +func (*ResetPassword) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{54} +} + +func (m *ResetPassword) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPassword.Unmarshal(m, b) +} +func (m *ResetPassword) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPassword.Marshal(b, m, deterministic) +} +func (m *ResetPassword) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPassword.Merge(m, src) +} +func (m *ResetPassword) XXX_Size() int { + return xxx_messageInfo_ResetPassword.Size(m) +} +func (m *ResetPassword) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPassword.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPassword proto.InternalMessageInfo + +func (m *ResetPassword) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ResetPassword) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +func (m *ResetPassword) GetNewPassword() string { + if m != nil { + return m.NewPassword + } + return "" +} + +type SetPasswordNotificationRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=zitadel.auth.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } +func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } +func (*SetPasswordNotificationRequest) ProtoMessage() {} +func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{55} +} + +func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) +} +func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) +} +func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) +} +func (m *SetPasswordNotificationRequest) XXX_Size() int { + return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) +} +func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo + +func (m *SetPasswordNotificationRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *SetPasswordNotificationRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type PasswordChange struct { + OldPassword string `protobuf:"bytes,1,opt,name=old_password,json=oldPassword,proto3" json:"old_password,omitempty"` + NewPassword string `protobuf:"bytes,2,opt,name=new_password,json=newPassword,proto3" json:"new_password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordChange) Reset() { *m = PasswordChange{} } +func (m *PasswordChange) String() string { return proto.CompactTextString(m) } +func (*PasswordChange) ProtoMessage() {} +func (*PasswordChange) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{56} +} + +func (m *PasswordChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordChange.Unmarshal(m, b) +} +func (m *PasswordChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordChange.Marshal(b, m, deterministic) +} +func (m *PasswordChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordChange.Merge(m, src) +} +func (m *PasswordChange) XXX_Size() int { + return xxx_messageInfo_PasswordChange.Size(m) +} +func (m *PasswordChange) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordChange.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordChange proto.InternalMessageInfo + +func (m *PasswordChange) GetOldPassword() string { + if m != nil { + return m.OldPassword + } + return "" +} + +func (m *PasswordChange) GetNewPassword() string { + if m != nil { + return m.NewPassword + } + return "" +} + +type VerifyMfaOtp struct { + Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyMfaOtp) Reset() { *m = VerifyMfaOtp{} } +func (m *VerifyMfaOtp) String() string { return proto.CompactTextString(m) } +func (*VerifyMfaOtp) ProtoMessage() {} +func (*VerifyMfaOtp) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{57} +} + +func (m *VerifyMfaOtp) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyMfaOtp.Unmarshal(m, b) +} +func (m *VerifyMfaOtp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyMfaOtp.Marshal(b, m, deterministic) +} +func (m *VerifyMfaOtp) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyMfaOtp.Merge(m, src) +} +func (m *VerifyMfaOtp) XXX_Size() int { + return xxx_messageInfo_VerifyMfaOtp.Size(m) +} +func (m *VerifyMfaOtp) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyMfaOtp.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyMfaOtp proto.InternalMessageInfo + +func (m *VerifyMfaOtp) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +type MultiFactors struct { + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactors) Reset() { *m = MultiFactors{} } +func (m *MultiFactors) String() string { return proto.CompactTextString(m) } +func (*MultiFactors) ProtoMessage() {} +func (*MultiFactors) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{58} +} + +func (m *MultiFactors) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactors.Unmarshal(m, b) +} +func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) +} +func (m *MultiFactors) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactors.Merge(m, src) +} +func (m *MultiFactors) XXX_Size() int { + return xxx_messageInfo_MultiFactors.Size(m) +} +func (m *MultiFactors) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactors.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactors proto.InternalMessageInfo + +func (m *MultiFactors) GetMfas() []*MultiFactor { + if m != nil { + return m.Mfas + } + return nil +} + +type MultiFactor struct { + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=zitadel.auth.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactor) Reset() { *m = MultiFactor{} } +func (m *MultiFactor) String() string { return proto.CompactTextString(m) } +func (*MultiFactor) ProtoMessage() {} +func (*MultiFactor) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{59} +} + +func (m *MultiFactor) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactor.Unmarshal(m, b) +} +func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) +} +func (m *MultiFactor) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactor.Merge(m, src) +} +func (m *MultiFactor) XXX_Size() int { + return xxx_messageInfo_MultiFactor.Size(m) +} +func (m *MultiFactor) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactor.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactor proto.InternalMessageInfo + +func (m *MultiFactor) GetType() MfaType { + if m != nil { + return m.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *MultiFactor) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type MfaOtpResponse struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"` + Secret string `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` + State MFAState `protobuf:"varint,4,opt,name=state,proto3,enum=zitadel.auth.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MfaOtpResponse) Reset() { *m = MfaOtpResponse{} } +func (m *MfaOtpResponse) String() string { return proto.CompactTextString(m) } +func (*MfaOtpResponse) ProtoMessage() {} +func (*MfaOtpResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{60} +} + +func (m *MfaOtpResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MfaOtpResponse.Unmarshal(m, b) +} +func (m *MfaOtpResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MfaOtpResponse.Marshal(b, m, deterministic) +} +func (m *MfaOtpResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_MfaOtpResponse.Merge(m, src) +} +func (m *MfaOtpResponse) XXX_Size() int { + return xxx_messageInfo_MfaOtpResponse.Size(m) +} +func (m *MfaOtpResponse) XXX_DiscardUnknown() { + xxx_messageInfo_MfaOtpResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_MfaOtpResponse proto.InternalMessageInfo + +func (m *MfaOtpResponse) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *MfaOtpResponse) GetUrl() string { + if m != nil { + return m.Url + } + return "" +} + +func (m *MfaOtpResponse) GetSecret() string { + if m != nil { + return m.Secret + } + return "" +} + +func (m *MfaOtpResponse) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type ApplicationID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationID) Reset() { *m = ApplicationID{} } +func (m *ApplicationID) String() string { return proto.CompactTextString(m) } +func (*ApplicationID) ProtoMessage() {} +func (*ApplicationID) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{61} +} + +func (m *ApplicationID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationID.Unmarshal(m, b) +} +func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) +} +func (m *ApplicationID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationID.Merge(m, src) +} +func (m *ApplicationID) XXX_Size() int { + return xxx_messageInfo_ApplicationID.Size(m) +} +func (m *ApplicationID) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationID.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationID proto.InternalMessageInfo + +func (m *ApplicationID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type Application struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=zitadel.auth.api.v1.AppState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + // Types that are valid to be assigned to AppConfig: + // *Application_OidcConfig + AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Application) Reset() { *m = Application{} } +func (m *Application) String() string { return proto.CompactTextString(m) } +func (*Application) ProtoMessage() {} +func (*Application) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{62} +} + +func (m *Application) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Application.Unmarshal(m, b) +} +func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Application.Marshal(b, m, deterministic) +} +func (m *Application) XXX_Merge(src proto.Message) { + xxx_messageInfo_Application.Merge(m, src) +} +func (m *Application) XXX_Size() int { + return xxx_messageInfo_Application.Size(m) +} +func (m *Application) XXX_DiscardUnknown() { + xxx_messageInfo_Application.DiscardUnknown(m) +} + +var xxx_messageInfo_Application proto.InternalMessageInfo + +func (m *Application) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Application) GetState() AppState { + if m != nil { + return m.State + } + return AppState_APPSTATE_UNSPECIFIED +} + +func (m *Application) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Application) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Application) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type isApplication_AppConfig interface { + isApplication_AppConfig() +} + +type Application_OidcConfig struct { + OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` +} + +func (*Application_OidcConfig) isApplication_AppConfig() {} + +func (m *Application) GetAppConfig() isApplication_AppConfig { + if m != nil { + return m.AppConfig + } + return nil +} + +func (m *Application) GetOidcConfig() *OIDCConfig { + if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { + return x.OidcConfig + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*Application) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*Application_OidcConfig)(nil), + } +} + +type OIDCConfig struct { + RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=zitadel.auth.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=zitadel.auth.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=zitadel.auth.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + ClientSecret string `protobuf:"bytes,5,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + ClientId string `protobuf:"bytes,6,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=zitadel.auth.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } +func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } +func (*OIDCConfig) ProtoMessage() {} +func (*OIDCConfig) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{63} +} + +func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) +} +func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) +} +func (m *OIDCConfig) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfig.Merge(m, src) +} +func (m *OIDCConfig) XXX_Size() int { + return xxx_messageInfo_OIDCConfig.Size(m) +} +func (m *OIDCConfig) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfig.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo + +func (m *OIDCConfig) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfig) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +func (m *OIDCConfig) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type ApplicationSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn ApplicationSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*ApplicationSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } +func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchRequest) ProtoMessage() {} +func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{64} +} + +func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) +} +func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) +} +func (m *ApplicationSearchRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchRequest.Size(m) +} +func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo + +func (m *ApplicationSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchRequest) GetSortingColumn() ApplicationSearchKey { + if m != nil { + return m.SortingColumn + } + return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ApplicationSearchQuery struct { + Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.ApplicationSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } +func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchQuery) ProtoMessage() {} +func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{65} +} + +func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) +} +func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) +} +func (m *ApplicationSearchQuery) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchQuery.Size(m) +} +func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo + +func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { + if m != nil { + return m.Key + } + return ApplicationSearchKey_APPLICATIONSEARCHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ApplicationSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ApplicationSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } +func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchResponse) ProtoMessage() {} +func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{66} +} + +func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) +} +func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) +} +func (m *ApplicationSearchResponse) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchResponse.Size(m) +} +func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo + +func (m *ApplicationSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ApplicationSearchResponse) GetResult() []*Application { + if m != nil { + return m.Result + } + return nil +} + +type ApplicationAuthorizeRequest struct { + // Types that are valid to be assigned to Auth: + // *ApplicationAuthorizeRequest_OidcClientAuth + Auth isApplicationAuthorizeRequest_Auth `protobuf_oneof:"auth"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationAuthorizeRequest) Reset() { *m = ApplicationAuthorizeRequest{} } +func (m *ApplicationAuthorizeRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationAuthorizeRequest) ProtoMessage() {} +func (*ApplicationAuthorizeRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{67} +} + +func (m *ApplicationAuthorizeRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationAuthorizeRequest.Unmarshal(m, b) +} +func (m *ApplicationAuthorizeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationAuthorizeRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationAuthorizeRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationAuthorizeRequest.Merge(m, src) +} +func (m *ApplicationAuthorizeRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationAuthorizeRequest.Size(m) +} +func (m *ApplicationAuthorizeRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationAuthorizeRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationAuthorizeRequest proto.InternalMessageInfo + +type isApplicationAuthorizeRequest_Auth interface { + isApplicationAuthorizeRequest_Auth() +} + +type ApplicationAuthorizeRequest_OidcClientAuth struct { + OidcClientAuth *OIDCClientAuth `protobuf:"bytes,1,opt,name=oidc_client_auth,json=oidcClientAuth,proto3,oneof"` +} + +func (*ApplicationAuthorizeRequest_OidcClientAuth) isApplicationAuthorizeRequest_Auth() {} + +func (m *ApplicationAuthorizeRequest) GetAuth() isApplicationAuthorizeRequest_Auth { + if m != nil { + return m.Auth + } + return nil +} + +func (m *ApplicationAuthorizeRequest) GetOidcClientAuth() *OIDCClientAuth { + if x, ok := m.GetAuth().(*ApplicationAuthorizeRequest_OidcClientAuth); ok { + return x.OidcClientAuth + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*ApplicationAuthorizeRequest) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*ApplicationAuthorizeRequest_OidcClientAuth)(nil), + } +} + +type OIDCClientAuth struct { + ClientId string `protobuf:"bytes,1,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,2,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCClientAuth) Reset() { *m = OIDCClientAuth{} } +func (m *OIDCClientAuth) String() string { return proto.CompactTextString(m) } +func (*OIDCClientAuth) ProtoMessage() {} +func (*OIDCClientAuth) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{68} +} + +func (m *OIDCClientAuth) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCClientAuth.Unmarshal(m, b) +} +func (m *OIDCClientAuth) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCClientAuth.Marshal(b, m, deterministic) +} +func (m *OIDCClientAuth) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCClientAuth.Merge(m, src) +} +func (m *OIDCClientAuth) XXX_Size() int { + return xxx_messageInfo_OIDCClientAuth.Size(m) +} +func (m *OIDCClientAuth) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCClientAuth.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCClientAuth proto.InternalMessageInfo + +func (m *OIDCClientAuth) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCClientAuth) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +type GrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn GrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*GrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchRequest) Reset() { *m = GrantSearchRequest{} } +func (m *GrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*GrantSearchRequest) ProtoMessage() {} +func (*GrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{69} +} + +func (m *GrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchRequest.Unmarshal(m, b) +} +func (m *GrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *GrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchRequest.Merge(m, src) +} +func (m *GrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_GrantSearchRequest.Size(m) +} +func (m *GrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchRequest proto.InternalMessageInfo + +func (m *GrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *GrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *GrantSearchRequest) GetSortingColumn() GrantSearchKey { + if m != nil { + return m.SortingColumn + } + return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED +} + +func (m *GrantSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *GrantSearchRequest) GetQueries() []*GrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type GrantSearchQuery struct { + Key GrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.GrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchQuery) Reset() { *m = GrantSearchQuery{} } +func (m *GrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*GrantSearchQuery) ProtoMessage() {} +func (*GrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{70} +} + +func (m *GrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchQuery.Unmarshal(m, b) +} +func (m *GrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *GrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchQuery.Merge(m, src) +} +func (m *GrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_GrantSearchQuery.Size(m) +} +func (m *GrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchQuery proto.InternalMessageInfo + +func (m *GrantSearchQuery) GetKey() GrantSearchKey { + if m != nil { + return m.Key + } + return GrantSearchKey_GRANTSEARCHKEY_UNSPECIFIED +} + +func (m *GrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *GrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type GrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Grant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantSearchResponse) Reset() { *m = GrantSearchResponse{} } +func (m *GrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*GrantSearchResponse) ProtoMessage() {} +func (*GrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{71} +} + +func (m *GrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantSearchResponse.Unmarshal(m, b) +} +func (m *GrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *GrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantSearchResponse.Merge(m, src) +} +func (m *GrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_GrantSearchResponse.Size(m) +} +func (m *GrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_GrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantSearchResponse proto.InternalMessageInfo + +func (m *GrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *GrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *GrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *GrantSearchResponse) GetResult() []*Grant { + if m != nil { + return m.Result + } + return nil +} + +type Grant struct { + OrgId string `protobuf:"bytes,1,opt,name=OrgId,proto3" json:"OrgId,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=ProjectId,proto3" json:"ProjectId,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=UserId,proto3" json:"UserId,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=Roles,proto3" json:"Roles,omitempty"` + OrgName string `protobuf:"bytes,5,opt,name=OrgName,proto3" json:"OrgName,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Grant) Reset() { *m = Grant{} } +func (m *Grant) String() string { return proto.CompactTextString(m) } +func (*Grant) ProtoMessage() {} +func (*Grant) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{72} +} + +func (m *Grant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Grant.Unmarshal(m, b) +} +func (m *Grant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Grant.Marshal(b, m, deterministic) +} +func (m *Grant) XXX_Merge(src proto.Message) { + xxx_messageInfo_Grant.Merge(m, src) +} +func (m *Grant) XXX_Size() int { + return xxx_messageInfo_Grant.Size(m) +} +func (m *Grant) XXX_DiscardUnknown() { + xxx_messageInfo_Grant.DiscardUnknown(m) +} + +var xxx_messageInfo_Grant proto.InternalMessageInfo + +func (m *Grant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *Grant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *Grant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *Grant) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *Grant) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +type MyProjectOrgSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*MyProjectOrgSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchRequest) Reset() { *m = MyProjectOrgSearchRequest{} } +func (m *MyProjectOrgSearchRequest) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchRequest) ProtoMessage() {} +func (*MyProjectOrgSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{73} +} + +func (m *MyProjectOrgSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchRequest.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchRequest.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchRequest.Merge(m, src) +} +func (m *MyProjectOrgSearchRequest) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchRequest.Size(m) +} +func (m *MyProjectOrgSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchRequest proto.InternalMessageInfo + +func (m *MyProjectOrgSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *MyProjectOrgSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *MyProjectOrgSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *MyProjectOrgSearchRequest) GetQueries() []*MyProjectOrgSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type MyProjectOrgSearchQuery struct { + Key MyProjectOrgSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=zitadel.auth.api.v1.MyProjectOrgSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=zitadel.auth.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchQuery) Reset() { *m = MyProjectOrgSearchQuery{} } +func (m *MyProjectOrgSearchQuery) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchQuery) ProtoMessage() {} +func (*MyProjectOrgSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{74} +} + +func (m *MyProjectOrgSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchQuery.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchQuery.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchQuery.Merge(m, src) +} +func (m *MyProjectOrgSearchQuery) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchQuery.Size(m) +} +func (m *MyProjectOrgSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchQuery proto.InternalMessageInfo + +func (m *MyProjectOrgSearchQuery) GetKey() MyProjectOrgSearchKey { + if m != nil { + return m.Key + } + return MyProjectOrgSearchKey_MYPROJECTORGSEARCHKEY_UNSPECIFIED +} + +func (m *MyProjectOrgSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *MyProjectOrgSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type MyProjectOrgSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Org `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyProjectOrgSearchResponse) Reset() { *m = MyProjectOrgSearchResponse{} } +func (m *MyProjectOrgSearchResponse) String() string { return proto.CompactTextString(m) } +func (*MyProjectOrgSearchResponse) ProtoMessage() {} +func (*MyProjectOrgSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{75} +} + +func (m *MyProjectOrgSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyProjectOrgSearchResponse.Unmarshal(m, b) +} +func (m *MyProjectOrgSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyProjectOrgSearchResponse.Marshal(b, m, deterministic) +} +func (m *MyProjectOrgSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyProjectOrgSearchResponse.Merge(m, src) +} +func (m *MyProjectOrgSearchResponse) XXX_Size() int { + return xxx_messageInfo_MyProjectOrgSearchResponse.Size(m) +} +func (m *MyProjectOrgSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_MyProjectOrgSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_MyProjectOrgSearchResponse proto.InternalMessageInfo + +func (m *MyProjectOrgSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *MyProjectOrgSearchResponse) GetResult() []*Org { + if m != nil { + return m.Result + } + return nil +} + +type IsAdminResponse struct { + IsAdmin bool `protobuf:"varint,1,opt,name=is_admin,json=isAdmin,proto3" json:"is_admin,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *IsAdminResponse) Reset() { *m = IsAdminResponse{} } +func (m *IsAdminResponse) String() string { return proto.CompactTextString(m) } +func (*IsAdminResponse) ProtoMessage() {} +func (*IsAdminResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{76} +} + +func (m *IsAdminResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_IsAdminResponse.Unmarshal(m, b) +} +func (m *IsAdminResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_IsAdminResponse.Marshal(b, m, deterministic) +} +func (m *IsAdminResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_IsAdminResponse.Merge(m, src) +} +func (m *IsAdminResponse) XXX_Size() int { + return xxx_messageInfo_IsAdminResponse.Size(m) +} +func (m *IsAdminResponse) XXX_DiscardUnknown() { + xxx_messageInfo_IsAdminResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_IsAdminResponse proto.InternalMessageInfo + +func (m *IsAdminResponse) GetIsAdmin() bool { + if m != nil { + return m.IsAdmin + } + return false +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{77} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type CreateTokenRequest struct { + AgentId string `protobuf:"bytes,1,opt,name=agent_id,json=agentId,proto3" json:"agent_id,omitempty"` + AuthSessionId string `protobuf:"bytes,2,opt,name=auth_session_id,json=authSessionId,proto3" json:"auth_session_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateTokenRequest) Reset() { *m = CreateTokenRequest{} } +func (m *CreateTokenRequest) String() string { return proto.CompactTextString(m) } +func (*CreateTokenRequest) ProtoMessage() {} +func (*CreateTokenRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{78} +} + +func (m *CreateTokenRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateTokenRequest.Unmarshal(m, b) +} +func (m *CreateTokenRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateTokenRequest.Marshal(b, m, deterministic) +} +func (m *CreateTokenRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateTokenRequest.Merge(m, src) +} +func (m *CreateTokenRequest) XXX_Size() int { + return xxx_messageInfo_CreateTokenRequest.Size(m) +} +func (m *CreateTokenRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateTokenRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateTokenRequest proto.InternalMessageInfo + +func (m *CreateTokenRequest) GetAgentId() string { + if m != nil { + return m.AgentId + } + return "" +} + +func (m *CreateTokenRequest) GetAuthSessionId() string { + if m != nil { + return m.AuthSessionId + } + return "" +} + +type Token struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Expiration *timestamp.Timestamp `protobuf:"bytes,8,opt,name=expiration,proto3" json:"expiration,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Token) Reset() { *m = Token{} } +func (m *Token) String() string { return proto.CompactTextString(m) } +func (*Token) ProtoMessage() {} +func (*Token) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{79} +} + +func (m *Token) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Token.Unmarshal(m, b) +} +func (m *Token) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Token.Marshal(b, m, deterministic) +} +func (m *Token) XXX_Merge(src proto.Message) { + xxx_messageInfo_Token.Merge(m, src) +} +func (m *Token) XXX_Size() int { + return xxx_messageInfo_Token.Size(m) +} +func (m *Token) XXX_DiscardUnknown() { + xxx_messageInfo_Token.DiscardUnknown(m) +} + +var xxx_messageInfo_Token proto.InternalMessageInfo + +func (m *Token) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Token) GetExpiration() *timestamp.Timestamp { + if m != nil { + return m.Expiration + } + return nil +} + +type MyPermissions struct { + Permissions []string `protobuf:"bytes,1,rep,name=permissions,proto3" json:"permissions,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MyPermissions) Reset() { *m = MyPermissions{} } +func (m *MyPermissions) String() string { return proto.CompactTextString(m) } +func (*MyPermissions) ProtoMessage() {} +func (*MyPermissions) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{80} +} + +func (m *MyPermissions) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MyPermissions.Unmarshal(m, b) +} +func (m *MyPermissions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MyPermissions.Marshal(b, m, deterministic) +} +func (m *MyPermissions) XXX_Merge(src proto.Message) { + xxx_messageInfo_MyPermissions.Merge(m, src) +} +func (m *MyPermissions) XXX_Size() int { + return xxx_messageInfo_MyPermissions.Size(m) +} +func (m *MyPermissions) XXX_DiscardUnknown() { + xxx_messageInfo_MyPermissions.DiscardUnknown(m) +} + +var xxx_messageInfo_MyPermissions proto.InternalMessageInfo + +func (m *MyPermissions) GetPermissions() []string { + if m != nil { + return m.Permissions + } + return nil +} + +type VerifyUserInitRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Code string `protobuf:"bytes,2,opt,name=code,proto3" json:"code,omitempty"` + Password string `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *VerifyUserInitRequest) Reset() { *m = VerifyUserInitRequest{} } +func (m *VerifyUserInitRequest) String() string { return proto.CompactTextString(m) } +func (*VerifyUserInitRequest) ProtoMessage() {} +func (*VerifyUserInitRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_8bbd6f3875b0e874, []int{81} +} + +func (m *VerifyUserInitRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_VerifyUserInitRequest.Unmarshal(m, b) +} +func (m *VerifyUserInitRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_VerifyUserInitRequest.Marshal(b, m, deterministic) +} +func (m *VerifyUserInitRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_VerifyUserInitRequest.Merge(m, src) +} +func (m *VerifyUserInitRequest) XXX_Size() int { + return xxx_messageInfo_VerifyUserInitRequest.Size(m) +} +func (m *VerifyUserInitRequest) XXX_DiscardUnknown() { + xxx_messageInfo_VerifyUserInitRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_VerifyUserInitRequest proto.InternalMessageInfo + +func (m *VerifyUserInitRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *VerifyUserInitRequest) GetCode() string { + if m != nil { + return m.Code + } + return "" +} + +func (m *VerifyUserInitRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +func init() { + proto.RegisterEnum("zitadel.auth.api.v1.UserAgentState", UserAgentState_name, UserAgentState_value) + proto.RegisterEnum("zitadel.auth.api.v1.UserSessionState", UserSessionState_name, UserSessionState_value) + proto.RegisterEnum("zitadel.auth.api.v1.NextStepType", NextStepType_name, NextStepType_value) + proto.RegisterEnum("zitadel.auth.api.v1.AuthSessionType", AuthSessionType_name, AuthSessionType_value) + proto.RegisterEnum("zitadel.auth.api.v1.Prompt", Prompt_name, Prompt_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) + proto.RegisterEnum("zitadel.auth.api.v1.CodeChallengeMethod", CodeChallengeMethod_name, CodeChallengeMethod_value) + proto.RegisterEnum("zitadel.auth.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("zitadel.auth.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterEnum("zitadel.auth.api.v1.NotificationType", NotificationType_name, NotificationType_value) + proto.RegisterEnum("zitadel.auth.api.v1.MfaType", MfaType_name, MfaType_value) + proto.RegisterEnum("zitadel.auth.api.v1.MFAState", MFAState_name, MFAState_value) + proto.RegisterEnum("zitadel.auth.api.v1.AppState", AppState_name, AppState_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) + proto.RegisterEnum("zitadel.auth.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) + proto.RegisterEnum("zitadel.auth.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) + proto.RegisterEnum("zitadel.auth.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) + proto.RegisterEnum("zitadel.auth.api.v1.GrantSearchKey", GrantSearchKey_name, GrantSearchKey_value) + proto.RegisterEnum("zitadel.auth.api.v1.MyProjectOrgSearchKey", MyProjectOrgSearchKey_name, MyProjectOrgSearchKey_value) + proto.RegisterType((*SessionRequest)(nil), "zitadel.auth.api.v1.SessionRequest") + proto.RegisterType((*UserAgent)(nil), "zitadel.auth.api.v1.UserAgent") + proto.RegisterType((*UserAgentID)(nil), "zitadel.auth.api.v1.UserAgentID") + proto.RegisterType((*UserAgentCreation)(nil), "zitadel.auth.api.v1.UserAgentCreation") + proto.RegisterType((*UserAgents)(nil), "zitadel.auth.api.v1.UserAgents") + proto.RegisterType((*AuthSessionCreation)(nil), "zitadel.auth.api.v1.AuthSessionCreation") + proto.RegisterType((*AuthSessionResponse)(nil), "zitadel.auth.api.v1.AuthSessionResponse") + proto.RegisterType((*AuthSessionView)(nil), "zitadel.auth.api.v1.AuthSessionView") + proto.RegisterType((*TokenID)(nil), "zitadel.auth.api.v1.TokenID") + proto.RegisterType((*UserSessionID)(nil), "zitadel.auth.api.v1.UserSessionID") + proto.RegisterType((*UserSessions)(nil), "zitadel.auth.api.v1.UserSessions") + proto.RegisterType((*UserSession)(nil), "zitadel.auth.api.v1.UserSession") + proto.RegisterType((*UserSessionViews)(nil), "zitadel.auth.api.v1.UserSessionViews") + proto.RegisterType((*UserSessionView)(nil), "zitadel.auth.api.v1.UserSessionView") + proto.RegisterType((*AuthUser)(nil), "zitadel.auth.api.v1.AuthUser") + proto.RegisterType((*AuthSessionID)(nil), "zitadel.auth.api.v1.AuthSessionID") + proto.RegisterType((*SelectUserRequest)(nil), "zitadel.auth.api.v1.SelectUserRequest") + proto.RegisterType((*VerifyUserRequest)(nil), "zitadel.auth.api.v1.VerifyUserRequest") + proto.RegisterType((*VerifyPasswordRequest)(nil), "zitadel.auth.api.v1.VerifyPasswordRequest") + proto.RegisterType((*VerifyMfaRequest)(nil), "zitadel.auth.api.v1.VerifyMfaRequest") + proto.RegisterType((*AuthSessionMultiFactorOTP)(nil), "zitadel.auth.api.v1.AuthSessionMultiFactorOTP") + proto.RegisterType((*NextStep)(nil), "zitadel.auth.api.v1.NextStep") + proto.RegisterType((*LoginData)(nil), "zitadel.auth.api.v1.LoginData") + proto.RegisterType((*PasswordData)(nil), "zitadel.auth.api.v1.PasswordData") + proto.RegisterType((*MfaVerifyData)(nil), "zitadel.auth.api.v1.MfaVerifyData") + proto.RegisterType((*MfaPromptData)(nil), "zitadel.auth.api.v1.MfaPromptData") + proto.RegisterType((*ChooseUserData)(nil), "zitadel.auth.api.v1.ChooseUserData") + proto.RegisterType((*ChooseUser)(nil), "zitadel.auth.api.v1.ChooseUser") + proto.RegisterType((*SkipMfaInitRequest)(nil), "zitadel.auth.api.v1.SkipMfaInitRequest") + proto.RegisterType((*BrowserInformation)(nil), "zitadel.auth.api.v1.BrowserInformation") + proto.RegisterType((*IP)(nil), "zitadel.auth.api.v1.IP") + proto.RegisterType((*AuthRequestOIDC)(nil), "zitadel.auth.api.v1.AuthRequestOIDC") + proto.RegisterType((*CodeChallenge)(nil), "zitadel.auth.api.v1.CodeChallenge") + proto.RegisterType((*UserID)(nil), "zitadel.auth.api.v1.UserID") + proto.RegisterType((*UniqueUserRequest)(nil), "zitadel.auth.api.v1.UniqueUserRequest") + proto.RegisterType((*UniqueUserResponse)(nil), "zitadel.auth.api.v1.UniqueUserResponse") + proto.RegisterType((*RegisterUserRequest)(nil), "zitadel.auth.api.v1.RegisterUserRequest") + proto.RegisterType((*RegisterUserExternalIDPRequest)(nil), "zitadel.auth.api.v1.RegisterUserExternalIDPRequest") + proto.RegisterType((*IDPProvider)(nil), "zitadel.auth.api.v1.IDPProvider") + proto.RegisterType((*User)(nil), "zitadel.auth.api.v1.User") + proto.RegisterType((*UserProfile)(nil), "zitadel.auth.api.v1.UserProfile") + proto.RegisterType((*UpdateUserProfileRequest)(nil), "zitadel.auth.api.v1.UpdateUserProfileRequest") + proto.RegisterType((*UserEmail)(nil), "zitadel.auth.api.v1.UserEmail") + proto.RegisterType((*VerifyMyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyMyUserEmailRequest") + proto.RegisterType((*VerifyUserEmailRequest)(nil), "zitadel.auth.api.v1.VerifyUserEmailRequest") + proto.RegisterType((*UpdateUserEmailRequest)(nil), "zitadel.auth.api.v1.UpdateUserEmailRequest") + proto.RegisterType((*UserPhone)(nil), "zitadel.auth.api.v1.UserPhone") + proto.RegisterType((*UpdateUserPhoneRequest)(nil), "zitadel.auth.api.v1.UpdateUserPhoneRequest") + proto.RegisterType((*VerifyUserPhoneRequest)(nil), "zitadel.auth.api.v1.VerifyUserPhoneRequest") + proto.RegisterType((*UserAddress)(nil), "zitadel.auth.api.v1.UserAddress") + proto.RegisterType((*UpdateUserAddressRequest)(nil), "zitadel.auth.api.v1.UpdateUserAddressRequest") + proto.RegisterType((*PasswordID)(nil), "zitadel.auth.api.v1.PasswordID") + proto.RegisterType((*PasswordRequest)(nil), "zitadel.auth.api.v1.PasswordRequest") + proto.RegisterType((*ResetPasswordRequest)(nil), "zitadel.auth.api.v1.ResetPasswordRequest") + proto.RegisterType((*ResetPassword)(nil), "zitadel.auth.api.v1.ResetPassword") + proto.RegisterType((*SetPasswordNotificationRequest)(nil), "zitadel.auth.api.v1.SetPasswordNotificationRequest") + proto.RegisterType((*PasswordChange)(nil), "zitadel.auth.api.v1.PasswordChange") + proto.RegisterType((*VerifyMfaOtp)(nil), "zitadel.auth.api.v1.VerifyMfaOtp") + proto.RegisterType((*MultiFactors)(nil), "zitadel.auth.api.v1.MultiFactors") + proto.RegisterType((*MultiFactor)(nil), "zitadel.auth.api.v1.MultiFactor") + proto.RegisterType((*MfaOtpResponse)(nil), "zitadel.auth.api.v1.MfaOtpResponse") + proto.RegisterType((*ApplicationID)(nil), "zitadel.auth.api.v1.ApplicationID") + proto.RegisterType((*Application)(nil), "zitadel.auth.api.v1.Application") + proto.RegisterType((*OIDCConfig)(nil), "zitadel.auth.api.v1.OIDCConfig") + proto.RegisterType((*ApplicationSearchRequest)(nil), "zitadel.auth.api.v1.ApplicationSearchRequest") + proto.RegisterType((*ApplicationSearchQuery)(nil), "zitadel.auth.api.v1.ApplicationSearchQuery") + proto.RegisterType((*ApplicationSearchResponse)(nil), "zitadel.auth.api.v1.ApplicationSearchResponse") + proto.RegisterType((*ApplicationAuthorizeRequest)(nil), "zitadel.auth.api.v1.ApplicationAuthorizeRequest") + proto.RegisterType((*OIDCClientAuth)(nil), "zitadel.auth.api.v1.OIDCClientAuth") + proto.RegisterType((*GrantSearchRequest)(nil), "zitadel.auth.api.v1.GrantSearchRequest") + proto.RegisterType((*GrantSearchQuery)(nil), "zitadel.auth.api.v1.GrantSearchQuery") + proto.RegisterType((*GrantSearchResponse)(nil), "zitadel.auth.api.v1.GrantSearchResponse") + proto.RegisterType((*Grant)(nil), "zitadel.auth.api.v1.Grant") + proto.RegisterType((*MyProjectOrgSearchRequest)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchRequest") + proto.RegisterType((*MyProjectOrgSearchQuery)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchQuery") + proto.RegisterType((*MyProjectOrgSearchResponse)(nil), "zitadel.auth.api.v1.MyProjectOrgSearchResponse") + proto.RegisterType((*IsAdminResponse)(nil), "zitadel.auth.api.v1.IsAdminResponse") + proto.RegisterType((*Org)(nil), "zitadel.auth.api.v1.Org") + proto.RegisterType((*CreateTokenRequest)(nil), "zitadel.auth.api.v1.CreateTokenRequest") + proto.RegisterType((*Token)(nil), "zitadel.auth.api.v1.Token") + proto.RegisterType((*MyPermissions)(nil), "zitadel.auth.api.v1.MyPermissions") + proto.RegisterType((*VerifyUserInitRequest)(nil), "zitadel.auth.api.v1.VerifyUserInitRequest") +} + +func init() { proto.RegisterFile("auth.proto", fileDescriptor_8bbd6f3875b0e874) } + +var fileDescriptor_8bbd6f3875b0e874 = []byte{ + // 6219 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7c, 0xdd, 0x6f, 0x1b, 0xd9, + 0x75, 0xb8, 0x87, 0xa4, 0x3e, 0x78, 0x48, 0x4a, 0xa3, 0x2b, 0x59, 0xa6, 0x28, 0x7f, 0xc8, 0x63, + 0x3b, 0xb6, 0xb5, 0x6b, 0x71, 0xd7, 0xfb, 0x91, 0xb5, 0xf3, 0xc3, 0x6f, 0x43, 0x91, 0x63, 0x89, + 0x6b, 0x89, 0x64, 0x86, 0xb4, 0x37, 0xbb, 0x45, 0xca, 0x8c, 0xc9, 0x2b, 0x7a, 0xd6, 0x24, 0x87, + 0x9e, 0x19, 0xca, 0xab, 0x6d, 0x17, 0x2d, 0xb6, 0x41, 0x90, 0xe6, 0x25, 0x69, 0xfa, 0x11, 0x20, + 0x2d, 0x10, 0xa0, 0x2d, 0x0a, 0x14, 0x08, 0xd0, 0xb4, 0x45, 0xd3, 0xbc, 0xe5, 0xb5, 0xef, 0xed, + 0x5f, 0x10, 0x14, 0x28, 0xd2, 0xfc, 0x01, 0x05, 0x16, 0x6d, 0x51, 0xdc, 0x8f, 0x19, 0xde, 0x19, + 0xce, 0x90, 0x54, 0x6c, 0xe7, 0x29, 0x4f, 0xd2, 0xdc, 0x7b, 0xee, 0x39, 0xe7, 0x9e, 0xaf, 0x7b, + 0xee, 0x99, 0x33, 0x04, 0xd0, 0x87, 0xce, 0xe3, 0x9d, 0x81, 0x65, 0x3a, 0x26, 0x5a, 0xfd, 0xc4, + 0x70, 0xf4, 0x36, 0xee, 0xee, 0xd0, 0x31, 0x7d, 0x60, 0xec, 0x1c, 0xbf, 0x9e, 0x3b, 0xdf, 0x31, + 0xcd, 0x4e, 0x17, 0xe7, 0xf5, 0x81, 0x91, 0xd7, 0xfb, 0x7d, 0xd3, 0xd1, 0x1d, 0xc3, 0xec, 0xdb, + 0x6c, 0x49, 0x6e, 0x93, 0xcf, 0xd2, 0xa7, 0x47, 0xc3, 0xa3, 0x3c, 0xee, 0x0d, 0x9c, 0x13, 0x3e, + 0x79, 0x3e, 0x38, 0x69, 0x3b, 0xd6, 0xb0, 0xe5, 0xf0, 0xd9, 0x4b, 0xc1, 0x59, 0xc7, 0xe8, 0x61, + 0xdb, 0xd1, 0x7b, 0x03, 0x0e, 0x70, 0xee, 0x58, 0xef, 0x1a, 0x6d, 0xdd, 0xc1, 0x79, 0xf7, 0x1f, + 0x3e, 0xf1, 0x2a, 0xfd, 0xd3, 0xba, 0xd5, 0xc1, 0xfd, 0x5b, 0xf6, 0x33, 0xbd, 0xd3, 0xc1, 0x56, + 0xde, 0x1c, 0x50, 0xb6, 0x42, 0x58, 0xcc, 0x92, 0xdd, 0xb0, 0x69, 0x17, 0x8a, 0xcd, 0x28, 0x43, + 0x58, 0xaa, 0x63, 0xdb, 0x36, 0xcc, 0xbe, 0x86, 0x9f, 0x0e, 0xb1, 0xed, 0xa0, 0x73, 0xb0, 0x30, + 0xb4, 0xb1, 0xd5, 0x34, 0xda, 0x59, 0x69, 0x4b, 0xba, 0x91, 0xd4, 0xe6, 0xc9, 0x63, 0xb9, 0x8d, + 0xde, 0x83, 0xf4, 0x23, 0xcb, 0x7c, 0x46, 0xe7, 0xfa, 0x47, 0x66, 0x36, 0xb6, 0x25, 0xdd, 0x48, + 0xdd, 0xbe, 0xbe, 0x13, 0x22, 0xb1, 0x9d, 0x5d, 0x06, 0x58, 0xee, 0x1f, 0x99, 0x56, 0x8f, 0xb2, + 0xa2, 0xa5, 0x1e, 0x8d, 0xc6, 0x94, 0xbf, 0x94, 0x20, 0xf9, 0xc0, 0xc6, 0x56, 0xa1, 0x83, 0xfb, + 0x0e, 0x5a, 0x82, 0x98, 0x47, 0x2d, 0x66, 0xbc, 0x50, 0x4a, 0xe8, 0x0e, 0xcc, 0xd9, 0x8e, 0xee, + 0xe0, 0x6c, 0x7c, 0x4b, 0xba, 0xb1, 0x74, 0xfb, 0x4a, 0x28, 0x12, 0x8f, 0x95, 0x3a, 0x01, 0xd5, + 0xd8, 0x0a, 0xe5, 0x02, 0xa4, 0xbc, 0x89, 0x72, 0x29, 0xc8, 0xa5, 0x62, 0xc0, 0x8a, 0x37, 0x5d, + 0xb4, 0x30, 0xa5, 0x8d, 0x1a, 0x01, 0xd6, 0xa5, 0x53, 0xb1, 0xbe, 0xbb, 0xf8, 0xf9, 0xee, 0xdc, + 0xb7, 0xa5, 0x98, 0x2c, 0xf9, 0xc5, 0xb5, 0x0f, 0xe0, 0x91, 0xb2, 0xd1, 0x5d, 0x58, 0xb4, 0x99, + 0xce, 0xec, 0xac, 0xb4, 0x15, 0xbf, 0x91, 0xba, 0x7d, 0x71, 0xf2, 0xae, 0x34, 0x0f, 0x5e, 0xf9, + 0xaf, 0x04, 0xac, 0x16, 0x86, 0xce, 0x63, 0xae, 0x74, 0x8f, 0x6f, 0x05, 0x16, 0x75, 0x02, 0xea, + 0xa9, 0x7d, 0x77, 0xe1, 0xf3, 0xdd, 0x84, 0x45, 0x38, 0x59, 0xa0, 0x13, 0xe5, 0x36, 0x7a, 0x07, + 0x12, 0xce, 0xc9, 0x00, 0x53, 0x75, 0x2c, 0xdd, 0xbe, 0x1a, 0x4a, 0x53, 0xc0, 0xdd, 0x38, 0x19, + 0x60, 0x8d, 0xae, 0x18, 0x93, 0x4a, 0xfc, 0x45, 0x48, 0x05, 0x5d, 0x85, 0x64, 0xab, 0x6b, 0x70, + 0xa6, 0x13, 0x7e, 0xa6, 0x17, 0xd9, 0x4c, 0xb9, 0x8d, 0xb6, 0x21, 0x6d, 0xe1, 0xb6, 0x61, 0xe1, + 0x96, 0xd3, 0x1c, 0x5a, 0x46, 0x76, 0xce, 0x0f, 0x98, 0x72, 0x27, 0x1f, 0x58, 0x06, 0x5a, 0x73, + 0x8d, 0x65, 0x9e, 0x6a, 0x99, 0x3d, 0xa0, 0x37, 0x60, 0x7e, 0x60, 0x99, 0xbd, 0x81, 0x93, 0x5d, + 0xa0, 0x3b, 0xdf, 0x0c, 0xe5, 0xbb, 0x46, 0x41, 0x34, 0x0e, 0x8a, 0xde, 0x85, 0xf3, 0x64, 0xb6, + 0xd9, 0x32, 0xfb, 0x0e, 0xfe, 0xd8, 0x69, 0xb6, 0xba, 0xba, 0x6d, 0x37, 0x2d, 0x7c, 0x84, 0x2d, + 0xdc, 0x6f, 0xe1, 0xec, 0xe2, 0x56, 0xfc, 0x46, 0x52, 0xdb, 0x20, 0x30, 0x45, 0x06, 0x52, 0x24, + 0x10, 0x9a, 0x0b, 0x80, 0x2e, 0x00, 0x0c, 0x8d, 0x66, 0xd7, 0x6c, 0xe9, 0x5d, 0x6c, 0x67, 0x93, + 0x14, 0x3c, 0x39, 0x34, 0x0e, 0xd8, 0x00, 0x99, 0xee, 0x9a, 0x1d, 0xa3, 0xdf, 0x7c, 0x6c, 0xf4, + 0x9d, 0x2c, 0x50, 0x7e, 0x93, 0x74, 0x64, 0xdf, 0xe8, 0x53, 0x2f, 0xee, 0xe9, 0x1f, 0x37, 0xf5, + 0x0e, 0xce, 0xa6, 0xb6, 0xa4, 0x1b, 0x19, 0x6d, 0xbe, 0xa7, 0x7f, 0x5c, 0xe8, 0x60, 0x74, 0x17, + 0x12, 0xa6, 0xd1, 0x6e, 0x65, 0xd3, 0x54, 0x05, 0xd1, 0x4a, 0xe4, 0xe1, 0xa0, 0x5a, 0x2e, 0x15, + 0xf7, 0xcf, 0x68, 0x74, 0x0d, 0xda, 0x81, 0xd5, 0x81, 0x85, 0x6d, 0xdc, 0xc5, 0x2d, 0x07, 0xb7, + 0x9b, 0x6e, 0x98, 0xc8, 0x50, 0xe2, 0x2b, 0xc2, 0xd4, 0x03, 0x1a, 0x31, 0x76, 0x53, 0x90, 0x24, + 0xea, 0xa7, 0x3a, 0x57, 0x7e, 0x38, 0xe7, 0xb3, 0x3c, 0x0d, 0xdb, 0x03, 0xb3, 0x6f, 0x63, 0xb4, + 0x11, 0xb4, 0xbc, 0x91, 0xc1, 0x31, 0x8f, 0x8b, 0x79, 0x71, 0xc1, 0x35, 0xc0, 0xf8, 0xa9, 0x0d, + 0x70, 0x73, 0xcc, 0x54, 0x04, 0x0b, 0xb9, 0x1c, 0x66, 0x21, 0xbf, 0x31, 0x8c, 0x53, 0x18, 0x46, + 0x09, 0x96, 0x06, 0xa6, 0x6d, 0x1b, 0x8f, 0xba, 0xb8, 0x69, 0x3b, 0x78, 0x60, 0x67, 0x33, 0x34, + 0x2e, 0x5d, 0x08, 0xc5, 0x52, 0xc1, 0x1f, 0x3b, 0x75, 0x07, 0x0f, 0xb4, 0x8c, 0xbb, 0x88, 0x3c, + 0xd9, 0xe8, 0x55, 0x40, 0x03, 0xcb, 0xfc, 0x88, 0xa8, 0xc1, 0x53, 0x96, 0x9d, 0x5d, 0xa2, 0x1b, + 0x94, 0xf9, 0x4c, 0x91, 0x2b, 0xcd, 0x46, 0x45, 0x48, 0x53, 0x03, 0xe4, 0xa1, 0x2d, 0xbb, 0x4c, + 0xf9, 0xde, 0x8a, 0x8c, 0x84, 0xae, 0xdd, 0xa5, 0x86, 0xa3, 0x07, 0xbf, 0x85, 0xfe, 0x77, 0x0c, + 0x96, 0x05, 0xf3, 0x79, 0x68, 0xe0, 0x67, 0x93, 0xac, 0xf3, 0x0b, 0xb0, 0x4c, 0x15, 0xc9, 0x19, + 0x68, 0x7a, 0xa6, 0x9a, 0xd1, 0x47, 0x48, 0xca, 0x2f, 0xcd, 0x6a, 0xbf, 0x00, 0xcb, 0xe2, 0xfe, + 0x09, 0x08, 0x33, 0xdc, 0x8c, 0xb0, 0xc1, 0x72, 0x3b, 0x42, 0xaa, 0xf3, 0x11, 0x52, 0xdd, 0x80, + 0x45, 0xc7, 0x7c, 0x82, 0x29, 0xba, 0x05, 0xb6, 0x5f, 0xfa, 0x5c, 0x6e, 0x23, 0x15, 0x64, 0x36, + 0x85, 0x3f, 0x1e, 0x18, 0x16, 0x8d, 0xcc, 0xd9, 0x45, 0x2a, 0xf4, 0xdc, 0x0e, 0xcb, 0x63, 0x76, + 0xdc, 0x3c, 0x66, 0xa7, 0xe1, 0xe6, 0x31, 0xda, 0x32, 0x5d, 0xa3, 0x7a, 0x4b, 0xc4, 0xfc, 0x22, + 0x29, 0xe6, 0x17, 0xca, 0x06, 0x2c, 0x34, 0x28, 0xa9, 0xf1, 0xa3, 0xf6, 0x2e, 0x64, 0x04, 0x15, + 0x8e, 0x03, 0xf8, 0xd4, 0x14, 0xf3, 0xa9, 0x49, 0x79, 0x00, 0x69, 0x61, 0xad, 0x8d, 0x54, 0xc8, + 0x88, 0x72, 0x73, 0x8f, 0xd0, 0xe9, 0x86, 0x93, 0x16, 0xe4, 0x6a, 0x2b, 0xff, 0x19, 0x63, 0xd9, + 0x01, 0x1f, 0x38, 0x05, 0x47, 0xa8, 0xc4, 0x32, 0xce, 0xa6, 0x98, 0x97, 0x5c, 0x9b, 0x46, 0x9e, + 0x65, 0x26, 0x49, 0x6a, 0x5a, 0x34, 0xf8, 0xbc, 0x0e, 0x09, 0xc2, 0x10, 0xb5, 0x8b, 0x28, 0x4f, + 0x23, 0x66, 0x45, 0x70, 0x68, 0x14, 0x14, 0xbd, 0x02, 0x2b, 0x03, 0xdd, 0xb6, 0x9f, 0x99, 0x56, + 0xbb, 0x79, 0x8c, 0x2d, 0xe3, 0xc8, 0xc0, 0xcc, 0x68, 0x16, 0x35, 0xd9, 0x9d, 0x78, 0xc8, 0xc7, + 0xd1, 0x0e, 0xc4, 0x7b, 0x47, 0x3a, 0x0d, 0x78, 0x4b, 0xb7, 0xcf, 0x87, 0xa2, 0x3f, 0x3c, 0xd2, + 0xa9, 0xb5, 0x12, 0x40, 0x12, 0x45, 0x7b, 0x47, 0xfa, 0x08, 0xef, 0x02, 0xc5, 0x9b, 0xea, 0x1d, + 0xe9, 0x1e, 0xca, 0x2f, 0x02, 0xe5, 0xbf, 0x49, 0xb2, 0xdc, 0x19, 0x4c, 0x67, 0x91, 0x00, 0x93, + 0x47, 0xe5, 0x6b, 0x20, 0x0b, 0xa2, 0x20, 0x8e, 0x69, 0xa3, 0x72, 0xb8, 0x1e, 0xaf, 0x4e, 0x13, + 0x24, 0x59, 0x1d, 0xd0, 0xe5, 0x4f, 0x25, 0x58, 0x0e, 0x40, 0xfc, 0xfa, 0xf5, 0x29, 0xf8, 0x45, + 0xc2, 0x97, 0x77, 0x6f, 0x42, 0x92, 0x4e, 0xf4, 0xf5, 0x1e, 0xe6, 0x2e, 0xbe, 0x48, 0x06, 0x2a, + 0x7a, 0x0f, 0x2b, 0x5f, 0x86, 0x45, 0x57, 0xc9, 0xd1, 0x99, 0xbb, 0x0f, 0x43, 0x2c, 0x80, 0xe1, + 0x9b, 0x12, 0x64, 0x84, 0xf0, 0x73, 0x2a, 0xe7, 0x1a, 0xcb, 0xd4, 0xe3, 0xcf, 0x71, 0x27, 0xf8, + 0x37, 0x09, 0x56, 0xea, 0x34, 0x81, 0xa0, 0x26, 0xcb, 0xaf, 0x23, 0x2f, 0x20, 0x00, 0x87, 0x44, + 0xca, 0x78, 0x58, 0xa4, 0x0c, 0x66, 0xa9, 0x89, 0x17, 0x92, 0xbb, 0xff, 0x87, 0x04, 0x2b, 0xd4, + 0x03, 0x4e, 0xc4, 0x6d, 0xcd, 0x92, 0x6f, 0xe7, 0x23, 0xf6, 0x37, 0x02, 0x0d, 0x6c, 0xf4, 0xba, + 0xa8, 0x67, 0xba, 0xc5, 0x5d, 0xf8, 0x7c, 0x77, 0xc1, 0x9a, 0x93, 0xa5, 0xec, 0xbf, 0x48, 0x23, + 0x9d, 0xbf, 0xa4, 0x9d, 0xfe, 0x42, 0x82, 0xb3, 0x6c, 0xa7, 0x35, 0x1e, 0x4c, 0x5e, 0xea, 0x6e, + 0xaf, 0xc1, 0xa2, 0x1b, 0xb4, 0xf8, 0x66, 0x93, 0x9f, 0xef, 0xce, 0x5b, 0x09, 0x59, 0xca, 0xee, + 0x6b, 0xde, 0xd4, 0x4b, 0xda, 0xeb, 0xff, 0x4a, 0x20, 0xb3, 0xbd, 0x1e, 0x1e, 0xe9, 0x2f, 0x75, + 0x9b, 0x2f, 0xd0, 0xc5, 0xd0, 0x2e, 0xc4, 0x4d, 0x67, 0xc0, 0x45, 0xb0, 0x33, 0x2d, 0x13, 0x39, + 0x1c, 0x76, 0x1d, 0xe3, 0x9e, 0xde, 0x72, 0x4c, 0xab, 0xda, 0xa8, 0xed, 0x9f, 0xd1, 0xc8, 0xe2, + 0xdd, 0x39, 0x7a, 0x2e, 0x28, 0x77, 0x60, 0x23, 0x12, 0x14, 0x9d, 0x87, 0x44, 0xcb, 0x6c, 0x63, + 0x2e, 0x04, 0x22, 0x42, 0x2b, 0x4e, 0x2c, 0x90, 0x8e, 0x2a, 0x7f, 0x12, 0x87, 0x45, 0x37, 0x07, + 0x44, 0x6f, 0xf1, 0xec, 0x48, 0xa2, 0x61, 0xf3, 0xf2, 0xc4, 0x84, 0x51, 0x48, 0x8d, 0xde, 0x86, + 0x39, 0x9a, 0xd3, 0xf2, 0xda, 0x40, 0xf8, 0x05, 0xf8, 0x80, 0x40, 0x94, 0x74, 0x47, 0xdf, 0x3f, + 0xa3, 0x31, 0x70, 0xf4, 0x6e, 0xc0, 0x68, 0x52, 0x11, 0x24, 0x5d, 0x0b, 0xe6, 0xab, 0x47, 0xe6, + 0x54, 0x04, 0xf0, 0x8e, 0xb9, 0x13, 0x2e, 0x49, 0x25, 0xea, 0x74, 0x64, 0x16, 0xc2, 0x71, 0x24, + 0xdd, 0xa3, 0xf0, 0xc4, 0x45, 0xc2, 0x2f, 0x0f, 0x73, 0x93, 0x91, 0xb0, 0xfb, 0x83, 0x80, 0x84, + 0x0d, 0xa0, 0x7b, 0x90, 0x6a, 0x3d, 0x36, 0x4d, 0x1b, 0xd3, 0x8b, 0x18, 0x3d, 0xa8, 0x53, 0x11, + 0xf5, 0x8d, 0x22, 0x85, 0x23, 0xf1, 0x87, 0xa3, 0x81, 0x96, 0x37, 0xb2, 0x3b, 0x0f, 0x89, 0xb6, + 0xee, 0xe8, 0xca, 0x55, 0x48, 0x7a, 0x02, 0x23, 0x67, 0x09, 0xb6, 0xac, 0x66, 0xcf, 0xee, 0xb8, + 0x67, 0x09, 0xb6, 0xac, 0x43, 0xbb, 0xa3, 0x1c, 0x40, 0x5a, 0x94, 0x4d, 0x24, 0x20, 0xba, 0x02, + 0x99, 0x23, 0xdd, 0xe8, 0x0e, 0x2d, 0xdc, 0x6c, 0x99, 0xc3, 0xbe, 0x43, 0x35, 0x95, 0xd1, 0xd2, + 0x7c, 0xb0, 0x48, 0xc6, 0x94, 0xef, 0x4a, 0x90, 0xf1, 0xc9, 0xe9, 0xf9, 0xf0, 0xa1, 0x02, 0x64, + 0xb8, 0x60, 0x8f, 0x8d, 0x36, 0xb6, 0xec, 0x6c, 0x7c, 0x2b, 0x3e, 0x35, 0x7d, 0x49, 0x33, 0x99, + 0xb2, 0x15, 0x4a, 0x9f, 0x72, 0x34, 0x12, 0x3a, 0xca, 0xc1, 0xa2, 0x85, 0x9f, 0x0e, 0x0d, 0x0b, + 0x33, 0xaf, 0x5e, 0xd4, 0xbc, 0xe7, 0x71, 0x7a, 0xb1, 0x53, 0xd3, 0xdb, 0x83, 0x25, 0xbf, 0x7a, + 0xd0, 0x5b, 0x30, 0x47, 0x34, 0xea, 0x66, 0x34, 0x97, 0xa6, 0xa8, 0x54, 0x63, 0xd0, 0xca, 0xcf, + 0x24, 0x80, 0xd1, 0x68, 0xd8, 0xa9, 0x27, 0x85, 0x9d, 0x7a, 0x42, 0xd6, 0x10, 0x8b, 0xce, 0x1a, + 0xe2, 0xfe, 0xac, 0x01, 0xd5, 0x01, 0xf9, 0xb0, 0xb3, 0xdc, 0x27, 0x71, 0x9a, 0xdc, 0x47, 0x1e, + 0x06, 0x46, 0x94, 0x5b, 0x80, 0xea, 0x4f, 0x8c, 0xc1, 0xe1, 0x91, 0x5e, 0xee, 0x1b, 0xce, 0xb4, + 0x82, 0xa4, 0xf2, 0x17, 0x12, 0xa0, 0xf1, 0x88, 0x47, 0xef, 0xc7, 0x04, 0x9e, 0x46, 0x5c, 0xbe, + 0x84, 0xee, 0x84, 0x15, 0x1b, 0xff, 0x3f, 0x24, 0x2d, 0xdc, 0x33, 0x1d, 0xdc, 0x34, 0x06, 0x3c, + 0x7a, 0x9c, 0x0b, 0x65, 0xb8, 0x5c, 0x13, 0x82, 0xff, 0x22, 0x5b, 0x53, 0x1e, 0xa0, 0xeb, 0xb0, + 0xac, 0xb7, 0x5a, 0x78, 0xe0, 0x34, 0xbb, 0x7a, 0xbf, 0x33, 0x24, 0x17, 0x69, 0x26, 0x9c, 0x25, + 0x36, 0x7c, 0xc0, 0x47, 0x95, 0xab, 0x10, 0x2b, 0xd7, 0x48, 0x32, 0xf5, 0xf0, 0x4d, 0x37, 0x99, + 0x7a, 0xf8, 0x26, 0x7d, 0x7e, 0xdb, 0xad, 0x69, 0x3c, 0x7c, 0x9b, 0x64, 0x3d, 0xcb, 0x81, 0x6b, + 0x35, 0xad, 0x36, 0xb4, 0x4c, 0x1a, 0x14, 0xe3, 0xb4, 0xda, 0x40, 0x1e, 0xd0, 0x7b, 0x90, 0xb1, + 0x78, 0xd1, 0xa4, 0x29, 0xd4, 0xe1, 0xc2, 0xa5, 0x4d, 0xf0, 0xb8, 0x25, 0x16, 0x66, 0x74, 0x96, + 0xf0, 0x44, 0x28, 0xf4, 0xcd, 0x7e, 0xcb, 0x65, 0x9d, 0x3d, 0xa0, 0x32, 0x2c, 0x91, 0x00, 0xdd, + 0x6c, 0x3d, 0xd6, 0xbb, 0x5d, 0xdc, 0xef, 0xe0, 0x89, 0xf1, 0xad, 0x68, 0xb6, 0x71, 0xd1, 0x85, + 0xd4, 0x32, 0x2d, 0xf1, 0x51, 0x31, 0x21, 0xe3, 0x9b, 0x47, 0xe7, 0x21, 0x39, 0x42, 0xcb, 0x95, + 0xe2, 0x0d, 0xa0, 0x2f, 0xc3, 0x7c, 0x0f, 0x3b, 0x8f, 0xcd, 0x36, 0xdf, 0xd4, 0x8d, 0xe9, 0x14, + 0x0f, 0x29, 0xbc, 0xc6, 0xd7, 0x29, 0x59, 0x98, 0xa7, 0x55, 0xa7, 0xf1, 0xcb, 0xe3, 0x6f, 0xc3, + 0xca, 0x83, 0xbe, 0xf1, 0x74, 0x88, 0xc5, 0xfc, 0xcb, 0x97, 0x2a, 0x49, 0x13, 0x52, 0xa5, 0x2d, + 0x98, 0xc3, 0x3d, 0xdd, 0xe8, 0xf2, 0x53, 0x5a, 0x04, 0x62, 0x13, 0xca, 0xeb, 0x80, 0x44, 0xfc, + 0xbc, 0xac, 0xb5, 0x09, 0x49, 0xc3, 0x6e, 0x0e, 0xe9, 0x84, 0x1b, 0x36, 0x0c, 0x9b, 0x01, 0x2a, + 0x7f, 0x16, 0x87, 0x55, 0x0d, 0x77, 0x0c, 0xdb, 0xc1, 0x96, 0x3f, 0x2b, 0xe4, 0xc4, 0x18, 0x47, + 0xe9, 0xcf, 0x77, 0x93, 0xd6, 0x02, 0x25, 0xf6, 0x75, 0x97, 0x1c, 0xba, 0x09, 0x70, 0x64, 0x58, + 0xb6, 0x23, 0x64, 0xf3, 0x3e, 0xae, 0x92, 0x74, 0x96, 0xf2, 0x7e, 0x1d, 0x92, 0x5d, 0xdd, 0x85, + 0x0c, 0xc9, 0x07, 0xc9, 0x24, 0x05, 0xbc, 0x06, 0xc9, 0xbe, 0xd1, 0x7a, 0xc2, 0x00, 0x13, 0x81, + 0x43, 0x7b, 0x91, 0x4c, 0x51, 0xb0, 0x57, 0x20, 0xdd, 0x36, 0xec, 0x41, 0x57, 0x3f, 0x11, 0x2e, + 0x23, 0x02, 0x64, 0x8a, 0xcf, 0x52, 0xe0, 0x2f, 0x02, 0x1a, 0xd0, 0xaa, 0x96, 0x85, 0xdb, 0x23, + 0x57, 0x99, 0x0f, 0x2c, 0x59, 0xf1, 0x60, 0x5c, 0xbf, 0x41, 0x6f, 0xc0, 0x7c, 0x07, 0xf7, 0xdb, + 0xd8, 0x9a, 0x58, 0x55, 0xdb, 0xa3, 0x20, 0x1a, 0x07, 0xf5, 0x25, 0x83, 0x8b, 0xd1, 0xc9, 0xe0, + 0x45, 0x98, 0x37, 0xad, 0x8e, 0x57, 0x7b, 0x18, 0x25, 0x5d, 0x73, 0xa6, 0xd5, 0x29, 0xb7, 0x95, + 0x9f, 0xc5, 0xe1, 0xa2, 0xa8, 0x18, 0xf5, 0x63, 0x07, 0x5b, 0x7d, 0xbd, 0x5b, 0x2e, 0xd5, 0x7e, + 0xa3, 0xa3, 0xe7, 0xd5, 0x51, 0x11, 0xd2, 0x46, 0x7b, 0xe0, 0x1d, 0x96, 0xbc, 0x02, 0x10, 0x5e, + 0x78, 0x29, 0x97, 0x6a, 0xee, 0x11, 0xa9, 0xa5, 0x8c, 0xf6, 0xc0, 0x7d, 0x98, 0xaa, 0xc1, 0x2a, + 0xa4, 0x84, 0xb5, 0xe4, 0xf0, 0xf6, 0xd1, 0x4b, 0x6a, 0xde, 0x33, 0xba, 0x0a, 0x19, 0xec, 0xea, + 0xb7, 0x3d, 0x28, 0x97, 0x78, 0x3d, 0xca, 0x3f, 0xa8, 0xfc, 0x7c, 0x01, 0x12, 0xf4, 0x40, 0x0d, + 0x5e, 0x8b, 0xdf, 0x74, 0x6b, 0xc2, 0x2c, 0x64, 0x45, 0xbf, 0x83, 0x11, 0x5f, 0x2a, 0xa1, 0x77, + 0x21, 0xd3, 0xe2, 0x2f, 0x5d, 0x9a, 0x6d, 0xb7, 0x5e, 0x30, 0xb9, 0x0e, 0x92, 0x76, 0x17, 0x94, + 0x08, 0x82, 0x22, 0x39, 0x7f, 0x1c, 0xe3, 0x58, 0x40, 0x91, 0x98, 0x8a, 0x62, 0x69, 0xb4, 0x84, + 0x22, 0xf9, 0x12, 0xc9, 0x1d, 0xf5, 0x7e, 0x07, 0x33, 0x04, 0x73, 0x53, 0x11, 0x00, 0x03, 0xa7, + 0x8b, 0xef, 0x00, 0x50, 0x93, 0x65, 0x09, 0xf8, 0xfc, 0xd4, 0xb5, 0xd4, 0xc0, 0x69, 0x6a, 0x89, + 0x54, 0xf0, 0x0a, 0x4d, 0x4d, 0x86, 0x91, 0x15, 0x8a, 0xa6, 0xd4, 0x10, 0xdd, 0x35, 0x45, 0xb6, + 0xc4, 0x9f, 0x9a, 0x2c, 0x06, 0x52, 0x93, 0x0b, 0x3e, 0xe7, 0x63, 0x3a, 0x15, 0x1c, 0x6e, 0x53, + 0x74, 0x38, 0x56, 0x1e, 0x1f, 0x39, 0xd9, 0xa6, 0xe8, 0x64, 0x29, 0x36, 0xe9, 0xb9, 0xd6, 0xe5, + 0x80, 0x6b, 0xa5, 0xd9, 0x7b, 0x02, 0xd1, 0xa1, 0x6e, 0x85, 0x3a, 0xd4, 0xe8, 0x05, 0x49, 0xa4, + 0x1b, 0x2d, 0xcd, 0xee, 0x46, 0x6b, 0x6e, 0x00, 0x5a, 0x66, 0x67, 0x37, 0x0b, 0x39, 0xdb, 0xb0, + 0x62, 0xd8, 0x4d, 0xfa, 0xff, 0xa8, 0x06, 0x27, 0xd3, 0x73, 0x67, 0xd9, 0xb0, 0x55, 0x32, 0xee, + 0xd5, 0xe1, 0xd6, 0x60, 0x6e, 0xf0, 0xd8, 0xec, 0xe3, 0xec, 0x0a, 0xc3, 0x40, 0x1f, 0x38, 0x06, + 0xfa, 0xff, 0x08, 0x03, 0x72, 0x31, 0xd4, 0xc8, 0xb8, 0x87, 0x21, 0x0b, 0x0b, 0x34, 0x09, 0xb7, + 0x4e, 0xb2, 0xab, 0xac, 0x28, 0xc3, 0x1f, 0x89, 0xc3, 0xd1, 0x57, 0x13, 0x86, 0x73, 0x92, 0x5d, + 0xe3, 0xd2, 0xe5, 0xcf, 0xe8, 0x12, 0xa4, 0x06, 0xa6, 0xed, 0xe8, 0xdd, 0x26, 0xbd, 0x1d, 0x9e, + 0xa5, 0xd3, 0xc0, 0x86, 0xc8, 0xd9, 0x8e, 0xd6, 0x61, 0xde, 0xc2, 0x1d, 0xc3, 0xec, 0x67, 0xd7, + 0x59, 0xa6, 0xc7, 0x9e, 0xd0, 0x35, 0x58, 0xb2, 0x1d, 0x0b, 0x63, 0xa7, 0xa9, 0xb7, 0xdb, 0x16, + 0xb6, 0xed, 0xec, 0x39, 0xe6, 0xaa, 0x6c, 0xb4, 0xc0, 0x06, 0xd1, 0x3b, 0x90, 0x0d, 0x58, 0x57, + 0xd3, 0xcb, 0xdc, 0xb3, 0x74, 0x23, 0xeb, 0x7e, 0x4b, 0xd2, 0xf8, 0xac, 0xf2, 0x03, 0x5e, 0xcd, + 0xad, 0x59, 0xe6, 0x91, 0xd1, 0xc5, 0x63, 0xbe, 0x3e, 0xa9, 0x82, 0x16, 0x30, 0xb8, 0xf8, 0x44, + 0x83, 0x4b, 0x4c, 0x32, 0xb8, 0xb9, 0x29, 0x06, 0x37, 0x3f, 0xab, 0xc1, 0x2d, 0x4c, 0x37, 0xb8, + 0xc5, 0x99, 0x0d, 0x4e, 0xf9, 0x49, 0x0c, 0xb2, 0x0f, 0x06, 0x24, 0x50, 0x08, 0x22, 0x72, 0x8f, + 0x43, 0xff, 0x51, 0x27, 0xcd, 0x7c, 0xd4, 0xc5, 0x26, 0x1c, 0x75, 0xd7, 0x45, 0xa1, 0x84, 0x9c, + 0x89, 0x9e, 0x80, 0x6e, 0x05, 0x04, 0x94, 0x18, 0x83, 0xf5, 0x09, 0xeb, 0x4e, 0xa8, 0xb0, 0xe6, + 0xc6, 0x16, 0x4d, 0x14, 0xdc, 0xfc, 0xec, 0x82, 0xfb, 0x2d, 0xd6, 0xe4, 0x40, 0x9d, 0x6f, 0xcc, + 0xa4, 0xd6, 0x7c, 0x89, 0xa5, 0xeb, 0xc6, 0x37, 0x20, 0xe8, 0xad, 0x54, 0x00, 0xe3, 0x4e, 0xac, + 0xdc, 0x85, 0x2c, 0x2f, 0x40, 0x9d, 0x78, 0x44, 0x5c, 0xa5, 0x5c, 0xf4, 0xd5, 0x5f, 0xc4, 0xad, + 0xb1, 0x0a, 0xcc, 0x3e, 0xac, 0x8f, 0x4a, 0x92, 0xbe, 0x95, 0x41, 0x2e, 0x5d, 0x4c, 0xb1, 0x08, + 0x4c, 0x77, 0x61, 0x7d, 0x64, 0x1a, 0x3e, 0x4c, 0x5b, 0xfe, 0x3c, 0x29, 0x24, 0x71, 0xfe, 0x1a, + 0x13, 0x0f, 0x8d, 0x2c, 0x61, 0xe2, 0x61, 0x31, 0x2a, 0x36, 0x35, 0x46, 0xc5, 0x43, 0x63, 0x94, + 0x72, 0x47, 0x64, 0x8d, 0x4e, 0xb9, 0xac, 0x5d, 0x72, 0x71, 0x4b, 0xfe, 0x4c, 0x71, 0x8d, 0x93, + 0x51, 0xde, 0x11, 0xe5, 0xe3, 0x5b, 0x3a, 0x4d, 0xb2, 0xff, 0x28, 0xf1, 0xa6, 0x11, 0x1e, 0x92, + 0x82, 0xdb, 0x12, 0x02, 0x67, 0x2c, 0x3a, 0x70, 0xc6, 0x27, 0x07, 0xce, 0xc4, 0x84, 0xc0, 0x39, + 0x37, 0x25, 0x70, 0xce, 0x87, 0x04, 0x4e, 0xe5, 0xe7, 0x92, 0xe8, 0xe1, 0x7c, 0x74, 0x94, 0xf0, + 0x7a, 0x2c, 0x07, 0xeb, 0x79, 0x1e, 0xf3, 0x57, 0x05, 0xe6, 0x63, 0xc1, 0xdc, 0xd4, 0xdb, 0xc6, + 0x4d, 0xff, 0x36, 0xe2, 0x01, 0x40, 0x71, 0x43, 0x5b, 0xde, 0x86, 0x82, 0xa9, 0xae, 0xbb, 0xb5, + 0xfc, 0xd8, 0xd6, 0x82, 0xa9, 0x6e, 0x60, 0x93, 0xe7, 0x01, 0xdc, 0xca, 0x55, 0xc8, 0x2d, 0xf1, + 0x1d, 0x58, 0x0e, 0x56, 0xad, 0xc5, 0x3b, 0x85, 0x14, 0x79, 0xa7, 0x50, 0x3e, 0x81, 0x35, 0x0d, + 0xdb, 0xd8, 0x09, 0x2e, 0x9f, 0xf9, 0x8a, 0x79, 0xc7, 0xd7, 0x57, 0x13, 0x7e, 0x9f, 0xaf, 0x98, + 0x8e, 0x71, 0x64, 0xb4, 0x68, 0x06, 0x37, 0x2a, 0x83, 0x2a, 0xc7, 0x90, 0xf1, 0xd1, 0x46, 0xe7, + 0x46, 0xdb, 0x1a, 0xa5, 0xc6, 0x33, 0x38, 0x32, 0x7a, 0x15, 0xd2, 0x7d, 0xfc, 0xac, 0x19, 0x5d, + 0x51, 0x4f, 0xf5, 0xf1, 0x33, 0x97, 0x8c, 0xf2, 0x04, 0x2e, 0xd6, 0x47, 0x54, 0x45, 0xe6, 0xa2, + 0x02, 0xc9, 0x73, 0x6c, 0xb2, 0x0b, 0x4b, 0x35, 0xdf, 0xb1, 0x4d, 0x98, 0x35, 0xbb, 0xed, 0x66, + 0xb4, 0x76, 0x52, 0x66, 0xb7, 0xed, 0xc9, 0x24, 0xb8, 0xb5, 0xd8, 0xc4, 0xad, 0x29, 0x90, 0xf6, + 0x0a, 0xfb, 0x55, 0x67, 0x80, 0x90, 0xe8, 0xf1, 0xdc, 0xcb, 0x4b, 0x90, 0x16, 0x2a, 0xde, 0x36, + 0x7a, 0x13, 0x12, 0xbd, 0x23, 0x7d, 0xf2, 0xab, 0x64, 0x61, 0x81, 0x46, 0xa1, 0x15, 0x07, 0x52, + 0xc2, 0x20, 0x7a, 0xcd, 0x57, 0x09, 0x9f, 0x5c, 0x42, 0x64, 0x45, 0xf0, 0x37, 0xfc, 0x37, 0x90, + 0xf0, 0x77, 0xc0, 0x87, 0xf7, 0x0a, 0xbe, 0xae, 0xb6, 0x6f, 0x49, 0xb0, 0xc4, 0xb6, 0xe6, 0xd5, + 0x2a, 0x22, 0x5f, 0x1c, 0xca, 0x10, 0x1f, 0x5a, 0xee, 0x09, 0x45, 0xfe, 0x25, 0x81, 0xc6, 0xc6, + 0x2d, 0x0b, 0x3b, 0x3c, 0x46, 0xf1, 0xa7, 0x11, 0x2b, 0x89, 0x53, 0xb0, 0x72, 0x09, 0x32, 0x85, + 0xc1, 0xa0, 0xcb, 0x35, 0x1e, 0xe2, 0x94, 0x3f, 0x89, 0x41, 0x4a, 0x80, 0x18, 0x33, 0xaa, 0x99, + 0x04, 0x50, 0x18, 0x0c, 0x5e, 0xec, 0x0d, 0x2c, 0x70, 0x79, 0x4a, 0x9c, 0xea, 0xf2, 0x84, 0x20, + 0x21, 0xe4, 0x7a, 0xf4, 0x7f, 0xb4, 0x0b, 0x29, 0xd3, 0x68, 0xb7, 0x9a, 0x2d, 0xb3, 0x7f, 0x64, + 0x74, 0xf8, 0xbd, 0xf8, 0x52, 0x64, 0x5d, 0xaf, 0x48, 0xc1, 0xf6, 0xcf, 0x68, 0x40, 0x56, 0xb1, + 0xa7, 0xdd, 0x34, 0x80, 0x3e, 0x18, 0x70, 0x14, 0xca, 0x2f, 0xe2, 0x00, 0x23, 0x50, 0x74, 0x05, + 0x32, 0x62, 0x87, 0x93, 0xcd, 0x0b, 0x8b, 0x69, 0xa1, 0xc5, 0xc9, 0x46, 0x07, 0xb0, 0xe4, 0xab, + 0x2f, 0xba, 0xc5, 0xec, 0x19, 0x0b, 0x8c, 0x19, 0xb1, 0xc0, 0x68, 0xa3, 0x22, 0xa4, 0x3a, 0x96, + 0xde, 0x77, 0x38, 0x2a, 0x56, 0x87, 0x57, 0x22, 0x51, 0xed, 0x11, 0x58, 0x8a, 0x07, 0x3a, 0xee, + 0xbf, 0x36, 0xaa, 0x83, 0xac, 0x8f, 0xd4, 0xcf, 0xaa, 0x9e, 0x89, 0x09, 0x05, 0x42, 0x82, 0x49, + 0xb0, 0x17, 0x8a, 0x6f, 0x59, 0xf7, 0x0f, 0x10, 0x61, 0xf0, 0x46, 0x18, 0x6e, 0xc9, 0x4c, 0x15, + 0x69, 0x36, 0x58, 0x67, 0xf6, 0xec, 0x6b, 0xbd, 0x99, 0x0f, 0xb4, 0xde, 0x7c, 0x05, 0x64, 0xfa, + 0x0e, 0x8f, 0x95, 0x1e, 0x19, 0x5b, 0xac, 0x0e, 0x72, 0x3d, 0x9a, 0xad, 0xa1, 0xf3, 0x98, 0x95, + 0x2c, 0x29, 0x57, 0x4b, 0xba, 0xef, 0x19, 0xdd, 0x81, 0x0d, 0x72, 0xfa, 0x91, 0x3b, 0xb5, 0x39, + 0x74, 0x9a, 0x7e, 0x6d, 0xb1, 0x96, 0xb0, 0x75, 0x02, 0x70, 0x40, 0xe7, 0x35, 0x41, 0x6f, 0xca, + 0xff, 0x48, 0x90, 0x15, 0x36, 0x5d, 0xc7, 0xba, 0xd5, 0x72, 0xcb, 0xc9, 0xc4, 0x5f, 0xcd, 0xa3, + 0x23, 0x1b, 0xb3, 0x42, 0x78, 0x42, 0xe3, 0x4f, 0x24, 0xbd, 0xea, 0x1a, 0x3d, 0x83, 0xbd, 0x45, + 0x49, 0x68, 0xec, 0x01, 0x7d, 0x08, 0x4b, 0xb6, 0x69, 0x39, 0x46, 0xbf, 0xd3, 0x6c, 0x99, 0xdd, + 0x61, 0xaf, 0xcf, 0xbb, 0x19, 0x6e, 0x46, 0x39, 0x96, 0x9f, 0xe8, 0x7d, 0x7c, 0x42, 0x8f, 0xdf, + 0xcf, 0xa4, 0xd8, 0xd6, 0x19, 0x2d, 0xc3, 0x51, 0x15, 0x29, 0x26, 0x12, 0x4b, 0x74, 0xbb, 0x45, + 0xd5, 0xb7, 0xa8, 0x91, 0x7f, 0x91, 0x0a, 0x0b, 0x4f, 0x87, 0xd8, 0x32, 0x30, 0x39, 0xba, 0x49, + 0xe0, 0x7c, 0x65, 0x36, 0x32, 0x5f, 0x19, 0x62, 0xeb, 0x44, 0x73, 0xd7, 0x2a, 0x3f, 0x96, 0x60, + 0x3d, 0x1c, 0x06, 0xa9, 0x10, 0x7f, 0x82, 0x4f, 0x78, 0x44, 0xfd, 0x95, 0x36, 0x41, 0xd6, 0xa3, + 0x3b, 0x81, 0xea, 0x74, 0xf8, 0x2b, 0x43, 0xb6, 0xdc, 0x5f, 0x96, 0x26, 0x72, 0x3e, 0xd6, 0xbb, + 0x43, 0xaf, 0xd0, 0x4e, 0x1f, 0x94, 0xbf, 0x91, 0x60, 0x23, 0x44, 0x65, 0x3c, 0x1c, 0x9f, 0x4e, + 0x67, 0x97, 0x21, 0xed, 0x98, 0x24, 0xa7, 0xb2, 0xb0, 0x3d, 0xec, 0xb2, 0xb8, 0x9c, 0xd0, 0x52, + 0x74, 0x4c, 0xa3, 0x43, 0xe8, 0x1d, 0x92, 0x4c, 0xd1, 0xc9, 0xc4, 0x84, 0x03, 0x4a, 0x60, 0x48, + 0xe3, 0xf0, 0xca, 0x31, 0x6c, 0x0a, 0xc3, 0xc4, 0x86, 0x4d, 0xcb, 0xf8, 0xc4, 0xcb, 0x86, 0xab, + 0x20, 0xb3, 0xc0, 0xc5, 0x5c, 0x85, 0x60, 0xe3, 0x1d, 0xcf, 0x57, 0xa2, 0xa3, 0x17, 0x85, 0x25, + 0xa8, 0xf6, 0xcf, 0x68, 0x4b, 0x34, 0x82, 0x79, 0x23, 0xbb, 0xf3, 0x90, 0x20, 0xf0, 0x8a, 0x06, + 0x4b, 0x7e, 0x58, 0xbf, 0x43, 0x4a, 0x01, 0x87, 0x1c, 0x73, 0xe9, 0xd8, 0xb8, 0x4b, 0x2b, 0xbf, + 0x94, 0x00, 0xd1, 0x30, 0xf3, 0x3c, 0x1e, 0xd2, 0x88, 0xf0, 0x90, 0xf0, 0xfd, 0x0a, 0xe4, 0x4e, + 0xe9, 0x1b, 0xef, 0x06, 0x7d, 0xe3, 0xda, 0x34, 0x02, 0x01, 0xaf, 0xf8, 0x6b, 0x09, 0xe4, 0xe0, + 0x2c, 0x7a, 0x57, 0xf4, 0x87, 0x53, 0xb2, 0xfc, 0x72, 0x3c, 0xe1, 0x07, 0x12, 0xac, 0xfa, 0x94, + 0xf2, 0xb2, 0x7c, 0xe0, 0x76, 0xc0, 0x07, 0x72, 0xd1, 0xbb, 0xf7, 0xac, 0xff, 0x0f, 0x24, 0x98, + 0xa3, 0x23, 0x84, 0x6c, 0xd5, 0xea, 0x94, 0x5d, 0xcb, 0x63, 0x0f, 0xe8, 0x3c, 0x24, 0x6b, 0xac, + 0x81, 0xb2, 0xec, 0xbe, 0x3c, 0x1d, 0x0d, 0x90, 0x2d, 0xb0, 0x3e, 0x68, 0x37, 0x55, 0x62, 0x4f, + 0x04, 0x97, 0x66, 0x76, 0xb1, 0x4d, 0x19, 0x49, 0x6a, 0xec, 0x81, 0x5c, 0x0c, 0xab, 0x56, 0xa7, + 0x32, 0x4a, 0x0d, 0xdc, 0x47, 0xe5, 0xaf, 0x24, 0xd8, 0x38, 0x3c, 0xe1, 0x78, 0xab, 0x56, 0xe7, + 0x79, 0xcc, 0x77, 0xdc, 0xd0, 0xee, 0x05, 0x0d, 0xed, 0xd5, 0xf0, 0xd4, 0x6d, 0x8c, 0x81, 0x80, + 0xbd, 0xfd, 0x83, 0x04, 0xe7, 0x22, 0x80, 0xd0, 0x3d, 0xd1, 0xec, 0xb6, 0x67, 0xc4, 0xff, 0xeb, + 0xb0, 0xbe, 0x1f, 0x4a, 0x90, 0x0b, 0x13, 0xed, 0xcb, 0x32, 0xc2, 0xd7, 0x02, 0x46, 0x98, 0x0d, + 0x8f, 0x92, 0x56, 0xc7, 0x33, 0xc1, 0x57, 0x61, 0xb9, 0x6c, 0x17, 0xda, 0x3d, 0xc3, 0xd7, 0x30, + 0x6f, 0xd8, 0x4d, 0x9d, 0x8c, 0xf1, 0x17, 0x8b, 0x0b, 0x06, 0x03, 0x51, 0x6e, 0x42, 0xbc, 0x6a, + 0x75, 0xc6, 0xd2, 0x64, 0x37, 0xe7, 0x8c, 0x8d, 0x72, 0x4e, 0xc5, 0x00, 0x44, 0x3f, 0xfe, 0xc0, + 0xb4, 0xe7, 0xf6, 0x65, 0x76, 0x30, 0x29, 0x75, 0x98, 0xa3, 0x44, 0xc6, 0xf8, 0xba, 0x0b, 0x70, + 0xaa, 0x5e, 0x62, 0x01, 0x5a, 0x79, 0x1d, 0x32, 0x87, 0x27, 0x35, 0x6c, 0xf5, 0x0c, 0xde, 0xd7, + 0xbb, 0x05, 0xa9, 0xc1, 0xe8, 0x91, 0x67, 0xb8, 0xe2, 0x90, 0xf2, 0xbe, 0xdb, 0x9e, 0x46, 0x1d, + 0x51, 0xe8, 0x30, 0x08, 0x91, 0xd7, 0xe8, 0xae, 0xcc, 0xef, 0xc7, 0xb9, 0x60, 0xb7, 0xd9, 0xa8, + 0x02, 0xb0, 0xfd, 0x11, 0x2c, 0xf9, 0xbf, 0x20, 0x42, 0x17, 0x21, 0xf7, 0xa0, 0xae, 0x6a, 0x85, + 0x3d, 0xb5, 0xd2, 0xa8, 0x37, 0x0a, 0x0d, 0xb5, 0xf9, 0xa0, 0x52, 0xaf, 0xa9, 0xc5, 0xf2, 0xbd, + 0xb2, 0x5a, 0x92, 0xcf, 0xa0, 0x0d, 0x38, 0x1b, 0x98, 0x2f, 0x14, 0x1b, 0xe5, 0x87, 0xaa, 0x2c, + 0xa1, 0x0b, 0xb0, 0x11, 0x98, 0x6a, 0xa8, 0xda, 0x61, 0xb9, 0x52, 0x68, 0xa8, 0x25, 0x39, 0xb6, + 0x6d, 0xf9, 0x5a, 0x61, 0x19, 0xb5, 0x2d, 0x38, 0x4f, 0x96, 0xd4, 0xd5, 0x7a, 0xbd, 0x5c, 0xad, + 0x84, 0xd1, 0xdb, 0x84, 0x73, 0x63, 0x10, 0x1e, 0xc5, 0x4b, 0xb0, 0x39, 0x36, 0xe9, 0xa3, 0xf9, + 0xa3, 0x38, 0xa4, 0xc5, 0x1e, 0x2c, 0x94, 0x85, 0xb5, 0x8a, 0xfa, 0xd5, 0x46, 0xbd, 0xa1, 0xd6, + 0x02, 0x84, 0x10, 0x2c, 0x79, 0x33, 0x07, 0xd5, 0xbd, 0x72, 0x45, 0x96, 0xd0, 0x59, 0x58, 0xf1, + 0xc6, 0x6a, 0x85, 0x7a, 0xfd, 0xfd, 0xaa, 0x56, 0x92, 0x63, 0xe8, 0x3c, 0x64, 0xbd, 0xe1, 0xe2, + 0x7e, 0xa1, 0xb2, 0xa7, 0x8e, 0x66, 0xe3, 0xe8, 0x1c, 0xac, 0x7a, 0xb3, 0x87, 0xf7, 0x0a, 0xcd, + 0x9a, 0x56, 0x3d, 0xac, 0x35, 0xe4, 0x84, 0x6f, 0x19, 0x99, 0x28, 0x57, 0xca, 0x8d, 0x66, 0x71, + 0xbf, 0x5a, 0x2e, 0xaa, 0xf2, 0x5c, 0xc4, 0xac, 0xa6, 0x16, 0x1a, 0xaa, 0x3c, 0x1f, 0x3e, 0xfb, + 0x50, 0xd5, 0xca, 0xf7, 0x3e, 0x90, 0x17, 0x50, 0x0e, 0xd6, 0xc7, 0x67, 0x4b, 0xd5, 0x8a, 0x2a, + 0x2f, 0x8e, 0xb1, 0xc3, 0x17, 0x25, 0x89, 0xba, 0x42, 0x26, 0x9a, 0x85, 0xfa, 0x07, 0x95, 0xa2, + 0x0c, 0x44, 0xd1, 0xde, 0x34, 0x9f, 0x52, 0x0f, 0x0b, 0xe5, 0x03, 0x39, 0x85, 0x2e, 0xc3, 0x05, + 0x6f, 0x4a, 0x53, 0x4b, 0x65, 0x4d, 0x2d, 0x36, 0x9a, 0x8d, 0x6a, 0xb3, 0x58, 0x38, 0x38, 0xd8, + 0x2d, 0x14, 0xef, 0xcb, 0x69, 0x1f, 0x47, 0x94, 0x1b, 0x4f, 0x40, 0x19, 0x9f, 0x0e, 0x8a, 0xfb, + 0xd5, 0x6a, 0x5d, 0x6d, 0x12, 0x2d, 0xca, 0x4b, 0xdb, 0x47, 0xbe, 0xcf, 0x18, 0xa8, 0xc2, 0x2e, + 0xc1, 0x66, 0xe1, 0x41, 0x63, 0x9f, 0xab, 0xb8, 0xf1, 0x41, 0x2d, 0x68, 0x20, 0x59, 0x58, 0x0b, + 0x02, 0x90, 0x04, 0x4c, 0x96, 0xc2, 0x66, 0xea, 0x85, 0xc3, 0x03, 0x6a, 0x8a, 0xf3, 0xbc, 0x15, + 0x6d, 0x1d, 0x10, 0xd3, 0x4f, 0x00, 0xeb, 0x32, 0xa4, 0xf8, 0x78, 0x85, 0x88, 0x51, 0x42, 0x32, + 0xa4, 0xf9, 0x00, 0x33, 0x8e, 0x18, 0x31, 0x18, 0x3e, 0x52, 0xac, 0x56, 0xea, 0x6a, 0xa5, 0x21, + 0xc7, 0x89, 0xd0, 0xf8, 0x58, 0x5d, 0x3d, 0x20, 0x52, 0x29, 0x14, 0x8b, 0xd5, 0x07, 0x95, 0x86, + 0x9c, 0xd8, 0x7e, 0x0a, 0x72, 0xf0, 0xe6, 0x49, 0xc0, 0xe9, 0x98, 0x5a, 0xaf, 0x11, 0x14, 0x94, + 0xc5, 0x62, 0xb5, 0xa4, 0xca, 0x67, 0x88, 0x76, 0xc6, 0xa6, 0xca, 0xa5, 0x66, 0xa3, 0x7a, 0x5f, + 0x25, 0x96, 0x79, 0x05, 0x2e, 0x45, 0x4e, 0x73, 0xa0, 0xd8, 0xb6, 0x06, 0xab, 0x21, 0x8d, 0x27, + 0x04, 0x35, 0x21, 0x52, 0xdc, 0x2f, 0x1c, 0x1c, 0xa8, 0x95, 0x3d, 0xf5, 0x50, 0x6d, 0xec, 0x57, + 0x4b, 0xcd, 0xda, 0x41, 0xa1, 0x5c, 0x91, 0xcf, 0x10, 0x53, 0x0b, 0x9b, 0xae, 0xdf, 0x7e, 0xeb, + 0x6d, 0x59, 0xda, 0xfe, 0x31, 0xff, 0xfe, 0x91, 0xf9, 0x6f, 0x0e, 0xd6, 0xa9, 0x03, 0x8a, 0x8e, + 0xab, 0x72, 0x11, 0xae, 0x81, 0x3c, 0x9a, 0xf3, 0x5c, 0x76, 0x1d, 0xd0, 0x68, 0xb4, 0x5c, 0xe1, + 0xe3, 0x31, 0xe2, 0x6a, 0xa3, 0xf1, 0x92, 0x7a, 0xa0, 0x12, 0x07, 0x8e, 0xfb, 0x91, 0x1c, 0x54, + 0x8b, 0xf7, 0xd5, 0x92, 0x9c, 0xf0, 0x03, 0xd7, 0x1f, 0xd4, 0x6b, 0x6a, 0xa5, 0x24, 0xcf, 0xf9, + 0x87, 0x89, 0xd5, 0x95, 0x0b, 0x07, 0xf2, 0xfc, 0xf6, 0x57, 0x61, 0x9e, 0xbd, 0xde, 0x20, 0xc4, + 0xf7, 0xd4, 0x4a, 0x49, 0xd5, 0x02, 0xda, 0x5e, 0x81, 0x0c, 0x1f, 0xbf, 0xa7, 0x1e, 0x16, 0x0e, + 0x08, 0x9f, 0xcb, 0x90, 0xe2, 0x43, 0x74, 0x80, 0xaa, 0x9b, 0x0f, 0x94, 0xca, 0x0f, 0x49, 0xcc, + 0x91, 0xe3, 0xdb, 0xfb, 0x20, 0x07, 0x2b, 0x7f, 0xd4, 0xf2, 0xab, 0x8d, 0xf2, 0xbd, 0x72, 0xb1, + 0xd0, 0x70, 0xcd, 0x8e, 0x39, 0x0e, 0xb5, 0xd5, 0xb1, 0xb9, 0xfa, 0x61, 0x5d, 0x96, 0xb6, 0x4b, + 0xb0, 0xc0, 0x2b, 0x64, 0xc4, 0x61, 0x0f, 0xef, 0x15, 0x42, 0x2c, 0x7d, 0x19, 0x52, 0xee, 0x04, + 0x5d, 0x24, 0x0e, 0x54, 0x1b, 0x35, 0x39, 0xb6, 0x7d, 0x04, 0x8b, 0x6e, 0xa5, 0x8a, 0xd0, 0x22, + 0xff, 0x87, 0x84, 0xd4, 0x75, 0x40, 0xde, 0x4c, 0xa5, 0xda, 0x68, 0x6a, 0x6a, 0xa1, 0xf4, 0x81, + 0x2c, 0x91, 0x1d, 0x7a, 0xe3, 0x6c, 0x2c, 0x46, 0xe4, 0x2f, 0x8c, 0x1d, 0x56, 0x1f, 0x12, 0xad, + 0x10, 0x3a, 0x6e, 0x6d, 0x8a, 0x7a, 0x59, 0xad, 0x16, 0x46, 0x67, 0x15, 0x96, 0xbd, 0x19, 0x4f, + 0xff, 0x67, 0x61, 0xc5, 0x1b, 0x14, 0xd4, 0xbf, 0x06, 0xb2, 0x37, 0xec, 0x69, 0x7f, 0xfb, 0x04, + 0x32, 0xbe, 0x12, 0x0b, 0xba, 0x0a, 0x5b, 0x74, 0x40, 0x2b, 0x54, 0x1a, 0x74, 0xdf, 0xc4, 0xc1, + 0xab, 0x5a, 0xf9, 0x43, 0x2a, 0x4f, 0xd7, 0x77, 0x2e, 0xc3, 0x05, 0x3f, 0x14, 0xfd, 0xaf, 0x49, + 0xff, 0xe5, 0xee, 0x7c, 0x09, 0x36, 0xfd, 0x20, 0x9a, 0x7a, 0x4f, 0x53, 0xeb, 0xfb, 0x9e, 0xef, + 0x1c, 0xc3, 0x6a, 0x48, 0x4d, 0x86, 0x1c, 0x47, 0x74, 0xb8, 0x56, 0x3b, 0x10, 0x95, 0xf8, 0xbe, + 0xba, 0x2b, 0x9f, 0x41, 0x0a, 0x5c, 0x0c, 0x9b, 0x24, 0x36, 0xd9, 0xa4, 0xa7, 0xa2, 0x2c, 0x91, + 0xf3, 0x35, 0x0c, 0xa6, 0x52, 0x60, 0x82, 0xd8, 0xee, 0x02, 0x1a, 0x2f, 0xba, 0x10, 0x9f, 0xa4, + 0xa3, 0x0f, 0x1a, 0xfb, 0xcc, 0x1d, 0xe9, 0xa2, 0xdd, 0x42, 0xbd, 0x5c, 0x64, 0x67, 0x64, 0xc8, + 0x6c, 0xad, 0x5a, 0x27, 0x04, 0xc3, 0x27, 0xa9, 0x18, 0x62, 0xdb, 0xbf, 0x94, 0x60, 0x2d, 0xac, + 0x8e, 0x40, 0x04, 0x2d, 0xb0, 0x58, 0x57, 0x0b, 0x5a, 0x71, 0xff, 0xbe, 0xfa, 0x41, 0x40, 0xc3, + 0x97, 0xe1, 0x42, 0x28, 0x54, 0xa1, 0x56, 0xa3, 0xd2, 0x66, 0xfb, 0x0d, 0x05, 0xa1, 0xaa, 0x96, + 0x63, 0x44, 0x66, 0xa1, 0xf3, 0xc5, 0x83, 0xb2, 0x5a, 0x69, 0x34, 0xcb, 0x24, 0x08, 0x4c, 0x22, + 0x53, 0x29, 0x1c, 0xaa, 0x72, 0x82, 0xc4, 0xc3, 0x50, 0x90, 0x9a, 0x56, 0x7d, 0x8f, 0xc4, 0xe1, + 0x72, 0x49, 0x9e, 0xdb, 0xfe, 0x3a, 0xa4, 0xc5, 0x14, 0x9b, 0x78, 0x1a, 0x83, 0xe4, 0x21, 0x4e, + 0xfd, 0xca, 0x83, 0xc2, 0x41, 0x9d, 0x85, 0x40, 0xdf, 0x44, 0xbd, 0x51, 0xd0, 0x1a, 0xf5, 0xe6, + 0xfb, 0xe5, 0xc6, 0xbe, 0x2c, 0x91, 0xa8, 0xed, 0x9b, 0x2d, 0x56, 0x2b, 0x8d, 0x42, 0xb9, 0x52, + 0x97, 0x63, 0xdb, 0xdf, 0x94, 0x60, 0xc9, 0x7f, 0x0f, 0x25, 0x02, 0xa0, 0x56, 0x16, 0x25, 0xc3, + 0x0d, 0x38, 0x1b, 0x98, 0xaf, 0x6a, 0x7b, 0x84, 0x5f, 0x9a, 0x50, 0x05, 0xa6, 0x84, 0xed, 0xc4, + 0x48, 0xa4, 0x09, 0x62, 0x26, 0x96, 0x46, 0x44, 0xb6, 0xfd, 0x08, 0xce, 0x86, 0x5e, 0x4c, 0xd0, + 0x35, 0xb8, 0x7c, 0xf8, 0x01, 0x47, 0x53, 0xd5, 0xf6, 0xa2, 0xb8, 0x52, 0xe0, 0x62, 0x38, 0x18, + 0x61, 0x8e, 0xca, 0x5c, 0xba, 0xfd, 0x77, 0x6f, 0x43, 0x8a, 0x1d, 0xd7, 0xd6, 0xb1, 0xd1, 0xc2, + 0xe8, 0x3e, 0x2c, 0xec, 0x63, 0xbd, 0xeb, 0x3c, 0xfe, 0x04, 0xad, 0x8f, 0xe5, 0xc2, 0x6a, 0x6f, + 0xe0, 0x9c, 0xe4, 0x22, 0xc6, 0x15, 0xf9, 0xb3, 0x7f, 0xfd, 0xf7, 0x3f, 0x8e, 0x01, 0x5a, 0xcc, + 0x3f, 0xe6, 0x18, 0xf6, 0x60, 0x4e, 0xc3, 0x7a, 0xfb, 0xe4, 0xd4, 0xa8, 0x96, 0x28, 0xaa, 0x45, + 0x34, 0x9f, 0xb7, 0xe8, 0xfa, 0x0a, 0x2c, 0x3e, 0xe4, 0xbf, 0x40, 0x10, 0x89, 0xeb, 0xdc, 0xd8, + 0x78, 0x9d, 0xfe, 0xd8, 0x81, 0xb2, 0x42, 0x91, 0xa5, 0x50, 0xd2, 0xfb, 0x15, 0x03, 0xf4, 0x11, + 0xa4, 0xf7, 0xb0, 0x33, 0xfa, 0x09, 0x80, 0xad, 0xc9, 0x5f, 0xb0, 0x97, 0x4b, 0xb9, 0x29, 0xdf, + 0xb8, 0x2b, 0x59, 0x4a, 0x04, 0x21, 0x39, 0x3f, 0xb4, 0xb1, 0x45, 0x2f, 0x2b, 0x76, 0xfe, 0x77, + 0x8c, 0xf6, 0xa7, 0xe8, 0x29, 0x2c, 0xb3, 0xab, 0xce, 0x88, 0xdc, 0x17, 0x26, 0x23, 0x73, 0x3f, + 0x8b, 0x9f, 0x4a, 0x74, 0x9d, 0x12, 0x95, 0x95, 0x94, 0x40, 0xf4, 0xae, 0xb4, 0x8d, 0x06, 0xb0, + 0xac, 0xe1, 0x63, 0xf3, 0x09, 0x7e, 0x91, 0x3b, 0xdc, 0xa4, 0xc4, 0xce, 0xe6, 0xc6, 0x76, 0x48, + 0x28, 0x7e, 0x5f, 0x82, 0x15, 0xb6, 0x4b, 0x21, 0xf7, 0x43, 0x37, 0xa6, 0x7d, 0xe3, 0xe1, 0xed, + 0x74, 0x2a, 0xa4, 0x9b, 0x72, 0x29, 0x3b, 0x94, 0x8d, 0x1b, 0xca, 0x15, 0x1f, 0x1b, 0xee, 0xb5, + 0xf1, 0xd3, 0x3c, 0x59, 0xef, 0x7e, 0x94, 0x47, 0x38, 0xfb, 0x2e, 0xf1, 0x66, 0xec, 0x88, 0x6c, + 0x29, 0xd3, 0x88, 0x95, 0x4b, 0xa7, 0x60, 0xe8, 0x35, 0xca, 0xd0, 0x36, 0xba, 0x31, 0x03, 0x43, + 0xcc, 0x22, 0x7e, 0x0f, 0xce, 0xf9, 0x39, 0xda, 0x3d, 0x71, 0x3f, 0x3d, 0x0d, 0x7f, 0xef, 0xc6, + 0x67, 0x73, 0x53, 0xbf, 0xde, 0x7d, 0x68, 0xe0, 0x67, 0xca, 0x16, 0x65, 0x28, 0x87, 0xb2, 0x79, + 0xfa, 0xf1, 0x2b, 0x23, 0x2a, 0xb2, 0x81, 0x7e, 0x24, 0x01, 0x8c, 0xbe, 0x75, 0x8b, 0x30, 0xc7, + 0xb1, 0x8f, 0xe1, 0x4e, 0x21, 0x93, 0x03, 0xca, 0xc2, 0xbd, 0x5c, 0x61, 0x26, 0x99, 0x04, 0xee, + 0xf3, 0x9f, 0xe6, 0x9b, 0xec, 0x4b, 0x7e, 0xb2, 0x96, 0xa8, 0x90, 0xb0, 0x3b, 0xba, 0x3a, 0x47, + 0xb0, 0x3b, 0xf6, 0x91, 0xdb, 0xaf, 0x91, 0x5d, 0xf6, 0x39, 0x8e, 0xcb, 0xee, 0x4f, 0x25, 0x58, + 0xf2, 0x7f, 0x88, 0x86, 0xb6, 0x27, 0xb0, 0x1c, 0x78, 0x71, 0x7f, 0x0a, 0xb6, 0x6b, 0x94, 0xed, + 0xf7, 0x72, 0xea, 0x73, 0xb1, 0xed, 0xd6, 0x11, 0x08, 0xeb, 0x7f, 0x2b, 0x41, 0xd2, 0x7b, 0xfd, + 0x8c, 0xae, 0x4d, 0xe0, 0x7a, 0xf4, 0xdd, 0xd9, 0x29, 0x18, 0xbe, 0x4f, 0x19, 0x56, 0x73, 0x5f, + 0x7e, 0x2e, 0x86, 0x7b, 0x47, 0x3a, 0xe1, 0xf5, 0x33, 0x09, 0xd6, 0xc4, 0x20, 0xee, 0x7d, 0x62, + 0x3d, 0x3d, 0xd4, 0x5d, 0x9e, 0xf6, 0x89, 0x88, 0xad, 0x5c, 0xa3, 0xac, 0x5e, 0x42, 0x17, 0x82, + 0xd1, 0x8e, 0x3e, 0xbb, 0x4c, 0xa2, 0x6f, 0xb1, 0xe8, 0x22, 0x7e, 0x8a, 0xad, 0x4c, 0x43, 0x5e, + 0x2e, 0xe5, 0xa6, 0x7e, 0xee, 0x3d, 0x35, 0xaa, 0x88, 0x5c, 0xb8, 0x51, 0x65, 0x65, 0x0f, 0x3b, + 0xac, 0x1d, 0xcb, 0x93, 0x45, 0xd4, 0x61, 0x79, 0x6d, 0x96, 0xef, 0x94, 0x6d, 0xe5, 0x95, 0xcf, + 0xfe, 0x29, 0xbb, 0x0c, 0xb4, 0xa0, 0x86, 0xfb, 0x0e, 0x49, 0x30, 0x71, 0xdb, 0x3b, 0xe8, 0x7a, + 0xd8, 0x2f, 0x8b, 0x6f, 0x48, 0xb0, 0xd6, 0xc0, 0x56, 0xcf, 0xe8, 0xf3, 0xc3, 0xee, 0x34, 0x12, + 0x89, 0xca, 0x04, 0xb8, 0x1c, 0xb6, 0x67, 0x97, 0xc3, 0x9f, 0x4b, 0x90, 0x12, 0x6a, 0x8b, 0x28, + 0xfc, 0xa5, 0xe8, 0x78, 0xf5, 0x31, 0x97, 0x8b, 0x8e, 0xbd, 0xca, 0x1e, 0x65, 0xa3, 0xa0, 0xfc, + 0xbf, 0x5f, 0xcd, 0x72, 0x59, 0x20, 0x26, 0x56, 0x7b, 0x02, 0xe9, 0xb2, 0x4d, 0xb6, 0xce, 0xbe, + 0xc5, 0x88, 0x4a, 0x05, 0x82, 0x5f, 0x8c, 0xe4, 0xae, 0x4f, 0x85, 0xe3, 0x3e, 0xe6, 0x4f, 0x44, + 0xec, 0x7c, 0xd3, 0xb0, 0xd9, 0x67, 0x20, 0x68, 0x00, 0x69, 0xf1, 0xe3, 0x82, 0x88, 0xd3, 0x39, + 0xe4, 0xc3, 0x90, 0xdc, 0x46, 0xa4, 0x02, 0xdd, 0xac, 0x40, 0xf1, 0xc8, 0x59, 0x7c, 0x3d, 0xd9, + 0xec, 0x77, 0x24, 0xc8, 0x8a, 0xf8, 0xde, 0x37, 0x9c, 0xc7, 0xee, 0x37, 0x0d, 0xe8, 0x8d, 0xa9, + 0xe4, 0xc7, 0x3f, 0x7f, 0x98, 0xc4, 0xc9, 0x15, 0xca, 0xc9, 0x05, 0x25, 0xeb, 0x72, 0xe2, 0x36, + 0xd2, 0x8b, 0x1c, 0x7d, 0x02, 0xb2, 0xe7, 0x24, 0x6e, 0xb7, 0x6d, 0x94, 0x8f, 0x44, 0x3b, 0x29, + 0x5f, 0xa9, 0xbc, 0x1a, 0xe5, 0x1e, 0xab, 0x68, 0x85, 0x73, 0xd1, 0xa3, 0x3f, 0xaf, 0x45, 0xe9, + 0x7c, 0x5f, 0x82, 0x55, 0xd6, 0xe6, 0xe6, 0xa7, 0x7f, 0x2b, 0x9c, 0x4e, 0x44, 0xcb, 0xeb, 0x0c, + 0x6c, 0xe5, 0xa3, 0xd8, 0x5a, 0xcf, 0x8d, 0xb3, 0x45, 0xa4, 0xe2, 0xd0, 0x20, 0x26, 0x74, 0x72, + 0x46, 0xca, 0x24, 0x3a, 0x49, 0xa4, 0xeb, 0x94, 0xed, 0x28, 0xd2, 0x2b, 0x68, 0x79, 0x44, 0x9a, + 0x35, 0x9b, 0x7e, 0x87, 0xe4, 0x8c, 0xb4, 0x35, 0x45, 0xa4, 0xfc, 0xca, 0x14, 0x69, 0x88, 0x5d, + 0x9e, 0x53, 0xd9, 0xb9, 0x15, 0xc5, 0xce, 0x5a, 0x2e, 0xc8, 0x0e, 0x91, 0xc3, 0x1f, 0x79, 0x1f, + 0xcb, 0x8b, 0x1c, 0xdd, 0x9a, 0x74, 0x0c, 0x8e, 0xf5, 0xb0, 0x46, 0x46, 0xb2, 0xb7, 0xa2, 0x78, + 0x39, 0xaf, 0x9c, 0x0b, 0xf0, 0xe2, 0x9e, 0x74, 0x84, 0xa7, 0xdf, 0x85, 0xe5, 0x40, 0xb3, 0x6c, + 0x84, 0x88, 0xc2, 0x5b, 0x6a, 0x23, 0xd9, 0xb9, 0x4a, 0x69, 0x5f, 0x54, 0x36, 0x38, 0x6d, 0x7a, + 0xb6, 0x8d, 0x51, 0xff, 0x9e, 0x04, 0x17, 0x34, 0x6c, 0xe3, 0x7e, 0xfb, 0xf0, 0x44, 0x68, 0x00, + 0x66, 0x95, 0x86, 0xc3, 0x49, 0x96, 0x12, 0x45, 0xb7, 0x10, 0x25, 0x06, 0x37, 0xa5, 0x17, 0xc5, + 0x60, 0x51, 0xd2, 0xc7, 0x02, 0x4d, 0xc2, 0xd4, 0x37, 0x24, 0xd8, 0x64, 0x4c, 0x85, 0xb3, 0xb4, + 0x19, 0x69, 0x15, 0xd3, 0x0f, 0x1a, 0xe5, 0x5a, 0x88, 0x3c, 0xc2, 0xd9, 0x10, 0xbd, 0x86, 0x75, + 0x11, 0x9f, 0xde, 0x6b, 0xe8, 0xba, 0x19, 0xbd, 0x86, 0xf5, 0x20, 0x07, 0xbd, 0x86, 0x51, 0x9e, + 0xe6, 0x35, 0x62, 0x17, 0xf1, 0x54, 0x76, 0x66, 0xf3, 0x1a, 0xca, 0x0e, 0x8f, 0xf2, 0x3e, 0xaf, + 0x99, 0xc4, 0x51, 0x78, 0x5f, 0xf3, 0x73, 0xfa, 0x0c, 0xe5, 0x24, 0xca, 0x6a, 0x85, 0xae, 0x6c, + 0xa6, 0x3a, 0xd6, 0xb1, 0xfc, 0x52, 0xac, 0x96, 0x33, 0x12, 0x6e, 0x2e, 0xe2, 0xd1, 0xe3, 0xf6, + 0x67, 0x9f, 0xfe, 0xe8, 0x71, 0xdb, 0x89, 0x67, 0x3b, 0x7a, 0x78, 0x6f, 0xf2, 0xd8, 0xd1, 0xe3, + 0xd2, 0x9f, 0x76, 0xf4, 0xf8, 0x7b, 0xb1, 0x67, 0x60, 0x6b, 0xb6, 0xa3, 0x87, 0xb3, 0x45, 0xa4, + 0xf2, 0x14, 0x92, 0x54, 0x2a, 0x87, 0x47, 0x7a, 0xb4, 0x38, 0x2e, 0x4f, 0x6b, 0x69, 0xb5, 0x95, + 0x9b, 0x51, 0x84, 0x65, 0xb4, 0x34, 0x22, 0xdc, 0x23, 0x54, 0x7e, 0x5f, 0x82, 0x4c, 0x9d, 0xd0, + 0xf4, 0xae, 0x67, 0x57, 0x27, 0xfe, 0x08, 0xc3, 0x34, 0x23, 0x7d, 0x3d, 0x8a, 0x74, 0x36, 0xb7, + 0x2a, 0xd8, 0x06, 0xc7, 0x46, 0x77, 0xfd, 0x4d, 0x09, 0xd6, 0x38, 0xda, 0x11, 0x15, 0x1b, 0x3b, + 0xe8, 0x66, 0x44, 0x52, 0x34, 0xde, 0xe0, 0x1d, 0xc9, 0xce, 0x2b, 0x94, 0xf6, 0x35, 0x65, 0x8b, + 0xd3, 0xf6, 0x08, 0xe7, 0xe9, 0xe7, 0x48, 0xd8, 0x76, 0x06, 0xcf, 0x88, 0x85, 0x3a, 0x84, 0x91, + 0x63, 0xc8, 0xf8, 0x19, 0x50, 0xa6, 0x33, 0x10, 0x49, 0xf9, 0x26, 0xa5, 0x7c, 0x45, 0xb9, 0x28, + 0x86, 0x50, 0x1f, 0x79, 0x1b, 0x3b, 0x83, 0x67, 0x84, 0xee, 0xb7, 0x25, 0x90, 0xdd, 0x28, 0xe6, + 0xa9, 0xe1, 0xca, 0x44, 0x35, 0x30, 0xf0, 0x48, 0xe2, 0x77, 0xa2, 0xb4, 0xb0, 0x95, 0xdb, 0x0c, + 0xd1, 0x42, 0x9e, 0x7f, 0xa2, 0xc5, 0x72, 0xf2, 0x64, 0xa1, 0xdd, 0x3e, 0x3c, 0xd2, 0xab, 0x8d, + 0x5a, 0xa4, 0x0d, 0x5e, 0x89, 0xea, 0x88, 0x16, 0x5a, 0x99, 0x27, 0x98, 0xbf, 0xb2, 0xe2, 0xb3, + 0xc2, 0xbc, 0xe9, 0x0c, 0x78, 0xec, 0x14, 0xfa, 0xbd, 0x1b, 0x35, 0x74, 0x79, 0xf2, 0x9d, 0xbb, + 0xea, 0x0c, 0x66, 0xe3, 0xe4, 0x8b, 0x51, 0x9c, 0x5c, 0xcc, 0x6d, 0x8c, 0x71, 0x22, 0xc6, 0xce, + 0x2e, 0xb9, 0x25, 0xf4, 0xcc, 0x63, 0x3c, 0x45, 0x1e, 0x51, 0x7a, 0x88, 0x0e, 0x4c, 0xdb, 0xe3, + 0x22, 0x40, 0x27, 0x90, 0x12, 0x7e, 0x73, 0x21, 0xe2, 0xae, 0x36, 0xfe, 0xab, 0x0c, 0xb3, 0x9b, + 0x20, 0xef, 0x2c, 0xff, 0x94, 0x52, 0x6c, 0xda, 0x4f, 0x8c, 0x81, 0xd1, 0x37, 0xa8, 0xe9, 0x7f, + 0x08, 0x29, 0x7e, 0x73, 0xdf, 0x3d, 0x29, 0x97, 0x26, 0x27, 0x0d, 0x13, 0xae, 0x1d, 0xab, 0x94, + 0x62, 0x06, 0xa5, 0x04, 0xa3, 0x47, 0xc7, 0x80, 0xf6, 0xb0, 0x23, 0xbc, 0x94, 0xa1, 0x24, 0x94, + 0x69, 0x8d, 0x8f, 0x91, 0x95, 0x01, 0x01, 0x46, 0xc9, 0xb1, 0xa3, 0x18, 0xa1, 0xbc, 0xd0, 0x5a, + 0xcc, 0xe9, 0xfe, 0xa9, 0x04, 0x88, 0xbd, 0x26, 0x10, 0x56, 0x44, 0x85, 0xf9, 0xa8, 0xae, 0xdd, + 0xdc, 0xce, 0xac, 0xe0, 0xdc, 0xd6, 0x78, 0xc1, 0x51, 0x39, 0xeb, 0xe7, 0xa8, 0x69, 0x53, 0x30, + 0x6e, 0xe6, 0x6b, 0x5e, 0xfb, 0xa6, 0xd8, 0x52, 0xff, 0xda, 0x34, 0x52, 0xc1, 0xa6, 0xcf, 0x19, + 0x04, 0x34, 0xba, 0x08, 0xfa, 0xd9, 0xd1, 0x5d, 0x54, 0x2c, 0xad, 0x4e, 0xb1, 0x5d, 0xb0, 0x0e, + 0xbb, 0xeb, 0xd3, 0xba, 0x11, 0x27, 0x17, 0xbb, 0x42, 0x7a, 0x08, 0x5d, 0x3d, 0x29, 0xcb, 0x79, + 0xda, 0x52, 0xee, 0x93, 0xc7, 0xdf, 0x4b, 0xb0, 0xca, 0xdf, 0x62, 0x09, 0x2f, 0x78, 0x6c, 0xb4, + 0x33, 0x63, 0x77, 0x9a, 0xcb, 0x4d, 0x7e, 0x66, 0x78, 0xce, 0x54, 0x74, 0x94, 0x54, 0x36, 0xf3, + 0x9d, 0xae, 0xf9, 0x48, 0xef, 0xe6, 0xf9, 0xaf, 0x32, 0x9a, 0x56, 0xc7, 0xc7, 0xf3, 0x27, 0x00, + 0x65, 0xbb, 0xac, 0xf7, 0x68, 0xaf, 0x57, 0x64, 0x58, 0x08, 0x3f, 0x4a, 0x03, 0x4d, 0x64, 0xca, + 0x4e, 0x14, 0x1b, 0x67, 0xd1, 0xaa, 0xcb, 0x46, 0xd3, 0xb0, 0x0d, 0xbd, 0x47, 0x1b, 0xcd, 0xd0, + 0x1f, 0x4a, 0xb4, 0x64, 0x7e, 0x78, 0xf2, 0x21, 0x43, 0x2e, 0x76, 0x5e, 0x45, 0x71, 0xa2, 0x44, + 0xc9, 0x46, 0xe8, 0xc9, 0xba, 0x1d, 0xc5, 0xc7, 0x06, 0x3a, 0x97, 0x17, 0x9a, 0xb7, 0xf2, 0x1c, + 0x55, 0xbe, 0x87, 0x77, 0xff, 0x59, 0xfa, 0x5e, 0xe1, 0x5b, 0x12, 0xfa, 0x12, 0xfb, 0xe9, 0xbb, + 0xad, 0x42, 0xad, 0xac, 0x6c, 0xa3, 0x1b, 0x8f, 0x1d, 0x67, 0x60, 0xdf, 0xcd, 0xe7, 0x3b, 0x86, + 0xf3, 0x78, 0xf8, 0x68, 0xa7, 0x65, 0xf6, 0xf2, 0x2d, 0xdd, 0x1c, 0x2d, 0x1c, 0x3c, 0xe9, 0xd0, + 0x22, 0xd1, 0xed, 0xf8, 0x6b, 0x3b, 0xaf, 0x6f, 0x4b, 0xb1, 0xdb, 0xe2, 0xa7, 0x05, 0xf9, 0x8f, + 0x6c, 0xb3, 0xef, 0x1f, 0xe9, 0x58, 0x83, 0xd6, 0xdd, 0x31, 0x98, 0xbb, 0x63, 0x30, 0x1f, 0xde, + 0x9c, 0x46, 0x91, 0xfe, 0x6e, 0x38, 0x01, 0x7d, 0x34, 0x4f, 0x25, 0xf4, 0xc6, 0xff, 0x05, 0x00, + 0x00, 0xff, 0xff, 0xa5, 0x71, 0x9e, 0x99, 0x72, 0x5c, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// AuthServiceClient is the client API for AuthService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type AuthServiceClient interface { + // Readiness + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + // Authorization + GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) + CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) + RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) + CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) + SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) + GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) + GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) + GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) + TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) + CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) + //User + IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) + RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) + RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) + GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) + UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) + ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) + VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) + ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) + UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) + SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) + // MFA + AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) + VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) + RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) + //TODO: Remove func only for tests + GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + //Application + GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) + AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) + //Grant + SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) + SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) +} + +type authServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewAuthServiceClient(cc grpc.ClientConnInterface) AuthServiceClient { + return &authServiceClient{cc} +} + +func (c *authServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateUserAgent(ctx context.Context, in *UserAgentCreation, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RevokeUserAgent(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserAgent, error) { + out := new(UserAgent) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateAuthSession(ctx context.Context, in *AuthSessionCreation, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateAuthSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetAuthSession(ctx context.Context, in *AuthSessionID, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetAuthSessionByTokenID(ctx context.Context, in *TokenID, opts ...grpc.CallOption) (*AuthSessionView, error) { + out := new(AuthSessionView) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SelectUser(ctx context.Context, in *SelectUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SelectUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyUser(ctx context.Context, in *VerifyUserRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyPassword(ctx context.Context, in *VerifyPasswordRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMfa(ctx context.Context, in *VerifyMfaRequest, opts ...grpc.CallOption) (*AuthSessionResponse, error) { + out := new(AuthSessionResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfa", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserAgentSessions(ctx context.Context, in *UserAgentID, opts ...grpc.CallOption) (*UserSessions, error) { + out := new(UserSessions) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*UserSession, error) { + out := new(UserSession) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserSessions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserSessionViews, error) { + out := new(UserSessionViews) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) TerminateUserSession(ctx context.Context, in *UserSessionID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/TerminateUserSession", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) CreateToken(ctx context.Context, in *CreateTokenRequest, opts ...grpc.CallOption) (*Token, error) { + out := new(Token) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/CreateToken", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { + out := new(UniqueUserResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsUserUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RegisterUser(ctx context.Context, in *RegisterUserRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RegisterUserWithExternal(ctx context.Context, in *RegisterUserExternalIDPRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserProfile(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserEmail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserEmail(ctx context.Context, in *VerifyMyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyUserEmail(ctx context.Context, in *VerifyUserEmailRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyEmailVerificationMail(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserPhone(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMyUserPhone(ctx context.Context, in *VerifyUserPhoneRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ResendMyPhoneVerificationCode(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyUserAddress(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) UpdateMyUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyMfas(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SetMyPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SetMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RequestPasswordReset(ctx context.Context, in *ResetPasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) PasswordReset(ctx context.Context, in *ResetPassword, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/PasswordReset", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) ChangeMyPassword(ctx context.Context, in *PasswordChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) AddMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AddMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) VerifyMfaOTP(ctx context.Context, in *VerifyMfaOtp, opts ...grpc.CallOption) (*MfaOtpResponse, error) { + out := new(MfaOtpResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) RemoveMfaOTP(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SkipMfaInit(ctx context.Context, in *SkipMfaInitRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SkipMfaInit", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetUserByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetApplicationByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { + out := new(ApplicationSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchApplications", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) AuthorizeApplication(ctx context.Context, in *ApplicationAuthorizeRequest, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchGrant(ctx context.Context, in *GrantSearchRequest, opts ...grpc.CallOption) (*GrantSearchResponse, error) { + out := new(GrantSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) SearchMyProjectOrgs(ctx context.Context, in *MyProjectOrgSearchRequest, opts ...grpc.CallOption) (*MyProjectOrgSearchResponse, error) { + out := new(MyProjectOrgSearchResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) IsIamAdmin(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*IsAdminResponse, error) { + out := new(IsAdminResponse) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/IsIamAdmin", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *authServiceClient) GetMyZitadelPermissions(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*MyPermissions, error) { + out := new(MyPermissions) + err := c.cc.Invoke(ctx, "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// AuthServiceServer is the server API for AuthService service. +type AuthServiceServer interface { + // Readiness + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + // Authorization + GetUserAgent(context.Context, *UserAgentID) (*UserAgent, error) + CreateUserAgent(context.Context, *UserAgentCreation) (*UserAgent, error) + RevokeUserAgent(context.Context, *UserAgentID) (*UserAgent, error) + CreateAuthSession(context.Context, *AuthSessionCreation) (*AuthSessionResponse, error) + GetAuthSession(context.Context, *AuthSessionID) (*AuthSessionResponse, error) + GetAuthSessionByTokenID(context.Context, *TokenID) (*AuthSessionView, error) + SelectUser(context.Context, *SelectUserRequest) (*AuthSessionResponse, error) + VerifyUser(context.Context, *VerifyUserRequest) (*AuthSessionResponse, error) + VerifyPassword(context.Context, *VerifyPasswordRequest) (*AuthSessionResponse, error) + VerifyMfa(context.Context, *VerifyMfaRequest) (*AuthSessionResponse, error) + GetUserAgentSessions(context.Context, *UserAgentID) (*UserSessions, error) + GetUserSession(context.Context, *UserSessionID) (*UserSession, error) + GetMyUserSessions(context.Context, *empty.Empty) (*UserSessionViews, error) + TerminateUserSession(context.Context, *UserSessionID) (*empty.Empty, error) + CreateToken(context.Context, *CreateTokenRequest) (*Token, error) + //User + IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) + RegisterUser(context.Context, *RegisterUserRequest) (*User, error) + RegisterUserWithExternal(context.Context, *RegisterUserExternalIDPRequest) (*User, error) + GetMyUserProfile(context.Context, *empty.Empty) (*UserProfile, error) + UpdateMyUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + GetMyUserEmail(context.Context, *empty.Empty) (*UserEmail, error) + ChangeMyUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + VerifyMyUserEmail(context.Context, *VerifyMyUserEmailRequest) (*empty.Empty, error) + VerifyUserEmail(context.Context, *VerifyUserEmailRequest) (*empty.Empty, error) + ResendMyEmailVerificationMail(context.Context, *empty.Empty) (*empty.Empty, error) + ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) + GetMyUserPhone(context.Context, *empty.Empty) (*UserPhone, error) + ChangeMyUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + VerifyMyUserPhone(context.Context, *VerifyUserPhoneRequest) (*empty.Empty, error) + ResendMyPhoneVerificationCode(context.Context, *empty.Empty) (*empty.Empty, error) + GetMyUserAddress(context.Context, *empty.Empty) (*UserAddress, error) + UpdateMyUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + GetMyMfas(context.Context, *empty.Empty) (*MultiFactors, error) + SetMyPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + RequestPasswordReset(context.Context, *ResetPasswordRequest) (*empty.Empty, error) + PasswordReset(context.Context, *ResetPassword) (*empty.Empty, error) + ChangeMyPassword(context.Context, *PasswordChange) (*empty.Empty, error) + // MFA + AddMfaOTP(context.Context, *empty.Empty) (*MfaOtpResponse, error) + VerifyMfaOTP(context.Context, *VerifyMfaOtp) (*MfaOtpResponse, error) + RemoveMfaOTP(context.Context, *empty.Empty) (*empty.Empty, error) + SkipMfaInit(context.Context, *SkipMfaInitRequest) (*empty.Empty, error) + //TODO: Remove func only for tests + GetUserByID(context.Context, *UserID) (*User, error) + //Application + GetApplicationByID(context.Context, *ApplicationID) (*Application, error) + SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) + AuthorizeApplication(context.Context, *ApplicationAuthorizeRequest) (*Application, error) + //Grant + SearchGrant(context.Context, *GrantSearchRequest) (*GrantSearchResponse, error) + SearchMyProjectOrgs(context.Context, *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) + IsIamAdmin(context.Context, *empty.Empty) (*IsAdminResponse, error) + //Permission + GetMyZitadelPermissions(context.Context, *empty.Empty) (*MyPermissions, error) +} + +// UnimplementedAuthServiceServer can be embedded to have forward compatible implementations. +type UnimplementedAuthServiceServer struct { +} + +func (*UnimplementedAuthServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedAuthServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedAuthServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) CreateUserAgent(ctx context.Context, req *UserAgentCreation) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) RevokeUserAgent(ctx context.Context, req *UserAgentID) (*UserAgent, error) { + return nil, status.Errorf(codes.Unimplemented, "method RevokeUserAgent not implemented") +} +func (*UnimplementedAuthServiceServer) CreateAuthSession(ctx context.Context, req *AuthSessionCreation) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateAuthSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetAuthSession(ctx context.Context, req *AuthSessionID) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetAuthSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetAuthSessionByTokenID(ctx context.Context, req *TokenID) (*AuthSessionView, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetAuthSessionByTokenID not implemented") +} +func (*UnimplementedAuthServiceServer) SelectUser(ctx context.Context, req *SelectUserRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SelectUser not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyUser(ctx context.Context, req *VerifyUserRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyUser not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyPassword(ctx context.Context, req *VerifyPasswordRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMfa(ctx context.Context, req *VerifyMfaRequest) (*AuthSessionResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMfa not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserAgentSessions(ctx context.Context, req *UserAgentID) (*UserSessions, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAgentSessions not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserSession(ctx context.Context, req *UserSessionID) (*UserSession, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserSession not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserSessions(ctx context.Context, req *empty.Empty) (*UserSessionViews, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserSessions not implemented") +} +func (*UnimplementedAuthServiceServer) TerminateUserSession(ctx context.Context, req *UserSessionID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method TerminateUserSession not implemented") +} +func (*UnimplementedAuthServiceServer) CreateToken(ctx context.Context, req *CreateTokenRequest) (*Token, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateToken not implemented") +} +func (*UnimplementedAuthServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") +} +func (*UnimplementedAuthServiceServer) RegisterUser(ctx context.Context, req *RegisterUserRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegisterUser not implemented") +} +func (*UnimplementedAuthServiceServer) RegisterUserWithExternal(ctx context.Context, req *RegisterUserExternalIDPRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegisterUserWithExternal not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserProfile(ctx context.Context, req *empty.Empty) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserProfile not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserEmail(ctx context.Context, req *empty.Empty) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserEmail(ctx context.Context, req *VerifyMyUserEmailRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyUserEmail(ctx context.Context, req *VerifyUserEmailRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyUserEmail not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyEmailVerificationMail(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyEmailVerificationMail not implemented") +} +func (*UnimplementedAuthServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserPhone(ctx context.Context, req *empty.Empty) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMyUserPhone(ctx context.Context, req *VerifyUserPhoneRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMyUserPhone not implemented") +} +func (*UnimplementedAuthServiceServer) ResendMyPhoneVerificationCode(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendMyPhoneVerificationCode not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyUserAddress(ctx context.Context, req *empty.Empty) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) UpdateMyUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateMyUserAddress not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyMfas(ctx context.Context, req *empty.Empty) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyMfas not implemented") +} +func (*UnimplementedAuthServiceServer) SetMyPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) RequestPasswordReset(ctx context.Context, req *ResetPasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RequestPasswordReset not implemented") +} +func (*UnimplementedAuthServiceServer) PasswordReset(ctx context.Context, req *ResetPassword) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method PasswordReset not implemented") +} +func (*UnimplementedAuthServiceServer) ChangeMyPassword(ctx context.Context, req *PasswordChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeMyPassword not implemented") +} +func (*UnimplementedAuthServiceServer) AddMfaOTP(ctx context.Context, req *empty.Empty) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) VerifyMfaOTP(ctx context.Context, req *VerifyMfaOtp) (*MfaOtpResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method VerifyMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) RemoveMfaOTP(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveMfaOTP not implemented") +} +func (*UnimplementedAuthServiceServer) SkipMfaInit(ctx context.Context, req *SkipMfaInitRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SkipMfaInit not implemented") +} +func (*UnimplementedAuthServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") +} +func (*UnimplementedAuthServiceServer) GetApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetApplicationByID not implemented") +} +func (*UnimplementedAuthServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") +} +func (*UnimplementedAuthServiceServer) AuthorizeApplication(ctx context.Context, req *ApplicationAuthorizeRequest) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method AuthorizeApplication not implemented") +} +func (*UnimplementedAuthServiceServer) SearchGrant(ctx context.Context, req *GrantSearchRequest) (*GrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchGrant not implemented") +} +func (*UnimplementedAuthServiceServer) SearchMyProjectOrgs(ctx context.Context, req *MyProjectOrgSearchRequest) (*MyProjectOrgSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchMyProjectOrgs not implemented") +} +func (*UnimplementedAuthServiceServer) IsIamAdmin(ctx context.Context, req *empty.Empty) (*IsAdminResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsIamAdmin not implemented") +} +func (*UnimplementedAuthServiceServer) GetMyZitadelPermissions(ctx context.Context, req *empty.Empty) (*MyPermissions, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetMyZitadelPermissions not implemented") +} + +func RegisterAuthServiceServer(s *grpc.Server, srv AuthServiceServer) { + s.RegisterService(&_AuthService_serviceDesc, srv) +} + +func _AuthService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserAgent(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentCreation) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateUserAgent(ctx, req.(*UserAgentCreation)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RevokeUserAgent_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RevokeUserAgent(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RevokeUserAgent", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RevokeUserAgent(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthSessionCreation) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateAuthSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateAuthSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateAuthSession(ctx, req.(*AuthSessionCreation)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetAuthSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetAuthSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetAuthSession(ctx, req.(*AuthSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetAuthSessionByTokenID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(TokenID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetAuthSessionByTokenID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetAuthSessionByTokenID(ctx, req.(*TokenID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SelectUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SelectUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SelectUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SelectUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SelectUser(ctx, req.(*SelectUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyUser(ctx, req.(*VerifyUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyPasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyPassword(ctx, req.(*VerifyPasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMfa_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMfaRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMfa(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfa", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMfa(ctx, req.(*VerifyMfaRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserAgentSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserAgentID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserAgentSessions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserAgentSessions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserAgentSessions(ctx, req.(*UserAgentID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserSession(ctx, req.(*UserSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserSessions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserSessions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserSessions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_TerminateUserSession_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSessionID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).TerminateUserSession(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/TerminateUserSession", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).TerminateUserSession(ctx, req.(*UserSessionID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_CreateToken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateTokenRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).CreateToken(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/CreateToken", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).CreateToken(ctx, req.(*CreateTokenRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).IsUserUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/IsUserUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RegisterUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RegisterUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RegisterUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RegisterUser(ctx, req.(*RegisterUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RegisterUserWithExternal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RegisterUserExternalIDPRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RegisterUserWithExternal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RegisterUserWithExternal(ctx, req.(*RegisterUserExternalIDPRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserProfile(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserEmail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMyUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserEmail(ctx, req.(*VerifyMyUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyUserEmail(ctx, req.(*VerifyUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyEmailVerificationMail(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserPhone(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMyUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMyUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMyUserPhone(ctx, req.(*VerifyUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ResendMyPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ResendMyPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ResendMyPhoneVerificationCode(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyUserAddress(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_UpdateMyUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/UpdateMyUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).UpdateMyUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyMfas(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SetMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SetMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SetMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SetMyPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RequestPasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ResetPasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RequestPasswordReset(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RequestPasswordReset", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RequestPasswordReset(ctx, req.(*ResetPasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_PasswordReset_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ResetPassword) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).PasswordReset(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/PasswordReset", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).PasswordReset(ctx, req.(*ResetPassword)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_ChangeMyPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/ChangeMyPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).ChangeMyPassword(ctx, req.(*PasswordChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_AddMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).AddMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/AddMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).AddMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_VerifyMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(VerifyMfaOtp) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/VerifyMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).VerifyMfaOTP(ctx, req.(*VerifyMfaOtp)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_RemoveMfaOTP_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/RemoveMfaOTP", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).RemoveMfaOTP(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SkipMfaInit_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SkipMfaInitRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SkipMfaInit(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SkipMfaInit", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SkipMfaInit(ctx, req.(*SkipMfaInitRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetUserByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetUserByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetUserByID(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetApplicationByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetApplicationByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetApplicationByID(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchApplications(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchApplications", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_AuthorizeApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationAuthorizeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).AuthorizeApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/AuthorizeApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).AuthorizeApplication(ctx, req.(*ApplicationAuthorizeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(GrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchGrant(ctx, req.(*GrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_SearchMyProjectOrgs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(MyProjectOrgSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/SearchMyProjectOrgs", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).SearchMyProjectOrgs(ctx, req.(*MyProjectOrgSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_IsIamAdmin_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).IsIamAdmin(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/IsIamAdmin", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).IsIamAdmin(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _AuthService_GetMyZitadelPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/zitadel.auth.api.v1.AuthService/GetMyZitadelPermissions", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(AuthServiceServer).GetMyZitadelPermissions(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +var _AuthService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "zitadel.auth.api.v1.AuthService", + HandlerType: (*AuthServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _AuthService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _AuthService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _AuthService_Validate_Handler, + }, + { + MethodName: "GetUserAgent", + Handler: _AuthService_GetUserAgent_Handler, + }, + { + MethodName: "CreateUserAgent", + Handler: _AuthService_CreateUserAgent_Handler, + }, + { + MethodName: "RevokeUserAgent", + Handler: _AuthService_RevokeUserAgent_Handler, + }, + { + MethodName: "CreateAuthSession", + Handler: _AuthService_CreateAuthSession_Handler, + }, + { + MethodName: "GetAuthSession", + Handler: _AuthService_GetAuthSession_Handler, + }, + { + MethodName: "GetAuthSessionByTokenID", + Handler: _AuthService_GetAuthSessionByTokenID_Handler, + }, + { + MethodName: "SelectUser", + Handler: _AuthService_SelectUser_Handler, + }, + { + MethodName: "VerifyUser", + Handler: _AuthService_VerifyUser_Handler, + }, + { + MethodName: "VerifyPassword", + Handler: _AuthService_VerifyPassword_Handler, + }, + { + MethodName: "VerifyMfa", + Handler: _AuthService_VerifyMfa_Handler, + }, + { + MethodName: "GetUserAgentSessions", + Handler: _AuthService_GetUserAgentSessions_Handler, + }, + { + MethodName: "GetUserSession", + Handler: _AuthService_GetUserSession_Handler, + }, + { + MethodName: "GetMyUserSessions", + Handler: _AuthService_GetMyUserSessions_Handler, + }, + { + MethodName: "TerminateUserSession", + Handler: _AuthService_TerminateUserSession_Handler, + }, + { + MethodName: "CreateToken", + Handler: _AuthService_CreateToken_Handler, + }, + { + MethodName: "IsUserUnique", + Handler: _AuthService_IsUserUnique_Handler, + }, + { + MethodName: "RegisterUser", + Handler: _AuthService_RegisterUser_Handler, + }, + { + MethodName: "RegisterUserWithExternal", + Handler: _AuthService_RegisterUserWithExternal_Handler, + }, + { + MethodName: "GetMyUserProfile", + Handler: _AuthService_GetMyUserProfile_Handler, + }, + { + MethodName: "UpdateMyUserProfile", + Handler: _AuthService_UpdateMyUserProfile_Handler, + }, + { + MethodName: "GetMyUserEmail", + Handler: _AuthService_GetMyUserEmail_Handler, + }, + { + MethodName: "ChangeMyUserEmail", + Handler: _AuthService_ChangeMyUserEmail_Handler, + }, + { + MethodName: "VerifyMyUserEmail", + Handler: _AuthService_VerifyMyUserEmail_Handler, + }, + { + MethodName: "VerifyUserEmail", + Handler: _AuthService_VerifyUserEmail_Handler, + }, + { + MethodName: "ResendMyEmailVerificationMail", + Handler: _AuthService_ResendMyEmailVerificationMail_Handler, + }, + { + MethodName: "ResendEmailVerificationMail", + Handler: _AuthService_ResendEmailVerificationMail_Handler, + }, + { + MethodName: "GetMyUserPhone", + Handler: _AuthService_GetMyUserPhone_Handler, + }, + { + MethodName: "ChangeMyUserPhone", + Handler: _AuthService_ChangeMyUserPhone_Handler, + }, + { + MethodName: "VerifyMyUserPhone", + Handler: _AuthService_VerifyMyUserPhone_Handler, + }, + { + MethodName: "ResendMyPhoneVerificationCode", + Handler: _AuthService_ResendMyPhoneVerificationCode_Handler, + }, + { + MethodName: "GetMyUserAddress", + Handler: _AuthService_GetMyUserAddress_Handler, + }, + { + MethodName: "UpdateMyUserAddress", + Handler: _AuthService_UpdateMyUserAddress_Handler, + }, + { + MethodName: "GetMyMfas", + Handler: _AuthService_GetMyMfas_Handler, + }, + { + MethodName: "SetMyPassword", + Handler: _AuthService_SetMyPassword_Handler, + }, + { + MethodName: "RequestPasswordReset", + Handler: _AuthService_RequestPasswordReset_Handler, + }, + { + MethodName: "PasswordReset", + Handler: _AuthService_PasswordReset_Handler, + }, + { + MethodName: "ChangeMyPassword", + Handler: _AuthService_ChangeMyPassword_Handler, + }, + { + MethodName: "AddMfaOTP", + Handler: _AuthService_AddMfaOTP_Handler, + }, + { + MethodName: "VerifyMfaOTP", + Handler: _AuthService_VerifyMfaOTP_Handler, + }, + { + MethodName: "RemoveMfaOTP", + Handler: _AuthService_RemoveMfaOTP_Handler, + }, + { + MethodName: "SkipMfaInit", + Handler: _AuthService_SkipMfaInit_Handler, + }, + { + MethodName: "GetUserByID", + Handler: _AuthService_GetUserByID_Handler, + }, + { + MethodName: "GetApplicationByID", + Handler: _AuthService_GetApplicationByID_Handler, + }, + { + MethodName: "SearchApplications", + Handler: _AuthService_SearchApplications_Handler, + }, + { + MethodName: "AuthorizeApplication", + Handler: _AuthService_AuthorizeApplication_Handler, + }, + { + MethodName: "SearchGrant", + Handler: _AuthService_SearchGrant_Handler, + }, + { + MethodName: "SearchMyProjectOrgs", + Handler: _AuthService_SearchMyProjectOrgs_Handler, + }, + { + MethodName: "IsIamAdmin", + Handler: _AuthService_IsIamAdmin_Handler, + }, + { + MethodName: "GetMyZitadelPermissions", + Handler: _AuthService_GetMyZitadelPermissions_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "auth.proto", +} diff --git a/pkg/auth/api/grpc/auth.pb.gw.go b/pkg/auth/api/grpc/auth.pb.gw.go new file mode 100644 index 0000000000..00607cd705 --- /dev/null +++ b/pkg/auth/api/grpc/auth.pb.gw.go @@ -0,0 +1,2485 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: auth.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_AuthService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentCreation + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RevokeUserAgent_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.RevokeUserAgent(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthSessionCreation + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + msg, err := client.CreateAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AuthService_GetAuthSession_0 = &utilities.DoubleArray{Encoding: map[string]int{"agent_id": 0, "id": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} +) + +func request_AuthService_GetAuthSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_GetAuthSession_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.GetAuthSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetAuthSessionByTokenID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq TokenID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetAuthSessionByTokenID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SelectUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SelectUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.SelectUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyPasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfa_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.VerifyMfa(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserAgentSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserAgentID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAgentSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserSessions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserSessions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_TerminateUserSession_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSessionID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.TerminateUserSession(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_CreateToken_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateTokenRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["agent_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "agent_id") + } + + protoReq.AgentId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "agent_id", err) + } + + val, ok = pathParams["auth_session_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "auth_session_id") + } + + protoReq.AuthSessionId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "auth_session_id", err) + } + + msg, err := client.CreateToken(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_AuthService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_AuthService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueUserRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_AuthService_IsUserUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RegisterUser_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RegisterUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RegisterUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RegisterUserWithExternal_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RegisterUserExternalIDPRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RegisterUserWithExternal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.VerifyUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMyUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMyUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ResendMyPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ResendMyPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_UpdateMyUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UpdateMyUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyMfas_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SetMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SetMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RequestPasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ResetPasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.RequestPasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_PasswordReset_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ResetPassword + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.PasswordReset(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_ChangeMyPassword_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ChangeMyPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AddMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AddMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_VerifyMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq VerifyMfaOtp + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.VerifyMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_RemoveMfaOTP_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.RemoveMfaOTP(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SkipMfaInit_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SkipMfaInitRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.SkipMfaInit(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_AuthorizeApplication_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationAuthorizeRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.AuthorizeApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchGrant_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq GrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_SearchMyProjectOrgs_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq MyProjectOrgSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchMyProjectOrgs(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_IsIamAdmin_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.IsIamAdmin(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_AuthService_GetMyZitadelPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client AuthServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetMyZitadelPermissions(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterAuthServiceHandlerFromEndpoint is same as RegisterAuthServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterAuthServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterAuthServiceHandler(ctx, mux, conn) +} + +// RegisterAuthServiceHandler registers the http handlers for service AuthService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterAuthServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterAuthServiceHandlerClient(ctx, mux, NewAuthServiceClient(conn)) +} + +// RegisterAuthServiceHandlerClient registers the http handlers for service AuthService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "AuthServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "AuthServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "AuthServiceClient" to call the correct interceptors. +func RegisterAuthServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client AuthServiceClient) error { + + mux.Handle("GET", pattern_AuthService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_RevokeUserAgent_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RevokeUserAgent_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RevokeUserAgent_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetAuthSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetAuthSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetAuthSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetAuthSessionByTokenID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetAuthSessionByTokenID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetAuthSessionByTokenID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SelectUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SelectUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SelectUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfa_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfa_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfa_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserAgentSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserAgentSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserAgentSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserSessions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserSessions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserSessions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_TerminateUserSession_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_TerminateUserSession_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_TerminateUserSession_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_CreateToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_CreateToken_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_CreateToken_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RegisterUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RegisterUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RegisterUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RegisterUserWithExternal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RegisterUserWithExternal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RegisterUserWithExternal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_VerifyMyUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMyUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMyUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_ResendMyPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ResendMyPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ResendMyPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_UpdateMyUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_UpdateMyUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_UpdateMyUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_SetMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SetMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SetMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_RequestPasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RequestPasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RequestPasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_PasswordReset_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_PasswordReset_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_PasswordReset_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_ChangeMyPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_ChangeMyPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_ChangeMyPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AddMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AddMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AddMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_AuthService_VerifyMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_VerifyMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_VerifyMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_AuthService_RemoveMfaOTP_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_RemoveMfaOTP_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_RemoveMfaOTP_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SkipMfaInit_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SkipMfaInit_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SkipMfaInit_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_AuthorizeApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_AuthorizeApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_AuthorizeApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_AuthService_SearchMyProjectOrgs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_SearchMyProjectOrgs_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_SearchMyProjectOrgs_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_IsIamAdmin_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_IsIamAdmin_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_IsIamAdmin_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_AuthService_GetMyZitadelPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_AuthService_GetMyZitadelPermissions_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_AuthService_GetMyZitadelPermissions_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_AuthService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_AuthService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_AuthService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_AuthService_GetUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) + + pattern_AuthService_CreateUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"useragents"}, "")) + + pattern_AuthService_RevokeUserAgent_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"useragents", "id"}, "")) + + pattern_AuthService_CreateAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "agent_id", "authsessions"}, "")) + + pattern_AuthService_GetAuthSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "authsessions", "id"}, "")) + + pattern_AuthService_GetAuthSessionByTokenID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"tokens", "id", "authsession"}, "")) + + pattern_AuthService_SelectUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_selectuser"}, "")) + + pattern_AuthService_VerifyUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifyuser"}, "")) + + pattern_AuthService_VerifyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifypassword"}, "")) + + pattern_AuthService_VerifyMfa_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "_verifymfa"}, "")) + + pattern_AuthService_GetUserAgentSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"useragents", "id", "usersessions"}, "")) + + pattern_AuthService_GetUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) + + pattern_AuthService_GetMyUserSessions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"me", "usersessions"}, "")) + + pattern_AuthService_TerminateUserSession_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"useragents", "agent_id", "usersessions", "id"}, "")) + + pattern_AuthService_CreateToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"useragents", "agent_id", "authsessions", "auth_session_id", "tokens"}, "")) + + pattern_AuthService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) + + pattern_AuthService_RegisterUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_register"}, "")) + + pattern_AuthService_RegisterUserWithExternal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_externalregister"}, "")) + + pattern_AuthService_GetMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_UpdateMyUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "profile"}, "")) + + pattern_AuthService_GetMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_ChangeMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "email"}, "")) + + pattern_AuthService_VerifyMyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_verify"}, "")) + + pattern_AuthService_VerifyUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_verify"}, "")) + + pattern_AuthService_ResendMyEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "email", "_resendverification"}, "")) + + pattern_AuthService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_ChangeMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "phone"}, "")) + + pattern_AuthService_VerifyMyUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_verify"}, "")) + + pattern_AuthService_ResendMyPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "phone", "_resendverification"}, "")) + + pattern_AuthService_GetMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_UpdateMyUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "address"}, "")) + + pattern_AuthService_GetMyMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "mfas"}, "")) + + pattern_AuthService_SetMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "me", "passwords"}, "")) + + pattern_AuthService_RequestPasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "passwords", "_requestpwreset"}, "")) + + pattern_AuthService_PasswordReset_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "passwords", "_resetpw"}, "")) + + pattern_AuthService_ChangeMyPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "passwords", "_change"}, "")) + + pattern_AuthService_AddMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_VerifyMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3, 2, 4}, []string{"users", "me", "mfa", "otp", "_verify"}, "")) + + pattern_AuthService_RemoveMfaOTP_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"users", "me", "mfa", "otp"}, "")) + + pattern_AuthService_SkipMfaInit_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "user_id", "mfa", "_skipinit"}, "")) + + pattern_AuthService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_AuthService_GetApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"applications", "id"}, "")) + + pattern_AuthService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_search"}, "")) + + pattern_AuthService_AuthorizeApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"applications", "_authorize"}, "")) + + pattern_AuthService_SearchGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"grants", "_search"}, "")) + + pattern_AuthService_SearchMyProjectOrgs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"global", "projectorgs", "_search"}, "")) + + pattern_AuthService_IsIamAdmin_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"global", "_isiamadmin"}, "")) + + pattern_AuthService_GetMyZitadelPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"permissions", "zitadel", "me"}, "")) +) + +var ( + forward_AuthService_Healthz_0 = runtime.ForwardResponseMessage + + forward_AuthService_Ready_0 = runtime.ForwardResponseMessage + + forward_AuthService_Validate_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_RevokeUserAgent_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateAuthSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetAuthSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetAuthSessionByTokenID_0 = runtime.ForwardResponseMessage + + forward_AuthService_SelectUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfa_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserAgentSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserSessions_0 = runtime.ForwardResponseMessage + + forward_AuthService_TerminateUserSession_0 = runtime.ForwardResponseMessage + + forward_AuthService_CreateToken_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsUserUnique_0 = runtime.ForwardResponseMessage + + forward_AuthService_RegisterUser_0 = runtime.ForwardResponseMessage + + forward_AuthService_RegisterUserWithExternal_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserProfile_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyUserEmail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMyUserPhone_0 = runtime.ForwardResponseMessage + + forward_AuthService_ResendMyPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_UpdateMyUserAddress_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyMfas_0 = runtime.ForwardResponseMessage + + forward_AuthService_SetMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_RequestPasswordReset_0 = runtime.ForwardResponseMessage + + forward_AuthService_PasswordReset_0 = runtime.ForwardResponseMessage + + forward_AuthService_ChangeMyPassword_0 = runtime.ForwardResponseMessage + + forward_AuthService_AddMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_VerifyMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_RemoveMfaOTP_0 = runtime.ForwardResponseMessage + + forward_AuthService_SkipMfaInit_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetApplicationByID_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchApplications_0 = runtime.ForwardResponseMessage + + forward_AuthService_AuthorizeApplication_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchGrant_0 = runtime.ForwardResponseMessage + + forward_AuthService_SearchMyProjectOrgs_0 = runtime.ForwardResponseMessage + + forward_AuthService_IsIamAdmin_0 = runtime.ForwardResponseMessage + + forward_AuthService_GetMyZitadelPermissions_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/auth/api/grpc/auth.swagger.json b/pkg/auth/api/grpc/auth.swagger.json new file mode 100644 index 0000000000..a90c611941 --- /dev/null +++ b/pkg/auth/api/grpc/auth.swagger.json @@ -0,0 +1,2938 @@ +{ + "swagger": "2.0", + "info": { + "title": "Auth API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/pkg/auth" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/_authorize": { + "post": { + "operationId": "AuthorizeApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationAuthorizeRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/applications/_search": { + "post": { + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/applications/{id}": { + "get": { + "summary": "Application", + "operationId": "GetApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/global/_isiamadmin": { + "get": { + "operationId": "IsIamAdmin", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1IsAdminResponse" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/global/projectorgs/_search": { + "post": { + "operationId": "SearchMyProjectOrgs", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1MyProjectOrgSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/grants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1GrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1GrantSearchRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/healthz": { + "get": { + "summary": "Readiness", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/me/usersessions": { + "get": { + "operationId": "GetMyUserSessions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSessionViews" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/permissions/zitadel/me": { + "get": { + "summary": "Permission", + "operationId": "GetMyZitadelPermissions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MyPermissions" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/tokens/{id}/authsession": { + "get": { + "operationId": "GetAuthSessionByTokenID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionView" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents": { + "post": { + "operationId": "CreateUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserAgentCreation" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions": { + "post": { + "operationId": "CreateAuthSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthSessionCreation" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_selectuser": { + "put": { + "operationId": "SelectUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SelectUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifymfa": { + "put": { + "operationId": "VerifyMfa", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMfaRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifypassword": { + "put": { + "operationId": "VerifyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyPasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/_verifyuser": { + "put": { + "operationId": "VerifyUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{auth_session_id}/tokens": { + "post": { + "operationId": "CreateToken", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Token" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "auth_session_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateTokenRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/authsessions/{id}": { + "get": { + "operationId": "GetAuthSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthSessionResponse" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "browser_info.user_agent", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.remote_ip.V4", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.remote_ip.V6", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "browser_info.accept_language", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{agent_id}/usersessions/{id}": { + "get": { + "operationId": "GetUserSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSession" + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + }, + "delete": { + "operationId": "TerminateUserSession", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "agent_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{id}": { + "get": { + "summary": "Authorization", + "operationId": "GetUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "RevokeUserAgent", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAgent" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserAgentID" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/useragents/{id}/usersessions": { + "get": { + "operationId": "GetUserAgentSessions", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSessions" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_externalregister": { + "post": { + "operationId": "RegisterUserWithExternal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1RegisterUserExternalIDPRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_isunique": { + "get": { + "summary": "User", + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/_register": { + "post": { + "operationId": "RegisterUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1RegisterUserRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/address": { + "get": { + "operationId": "GetMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email": { + "get": { + "operationId": "GetMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_resendverification": { + "post": { + "operationId": "ResendMyEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/email/_verify": { + "post": { + "operationId": "VerifyMyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMyUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp": { + "delete": { + "operationId": "RemoveMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "AuthService" + ] + }, + "post": { + "summary": "MFA", + "operationId": "AddMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfa/otp/_verify": { + "put": { + "operationId": "VerifyMfaOTP", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MfaOtpResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyMfaOtp" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/mfas": { + "get": { + "operationId": "GetMyMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords": { + "put": { + "operationId": "SetMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/passwords/_change": { + "put": { + "operationId": "ChangeMyPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordChange" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone": { + "get": { + "operationId": "GetMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "ChangeMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_resendverification": { + "post": { + "operationId": "ResendMyPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "properties": {} + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/phone/_verify": { + "post": { + "operationId": "VerifyMyUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserPhoneRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/me/profile": { + "get": { + "operationId": "GetMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "tags": [ + "AuthService" + ] + }, + "put": { + "operationId": "UpdateMyUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/passwords/_requestpwreset": { + "post": { + "operationId": "RequestPasswordReset", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ResetPasswordRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "TODO: Remove func only for tests", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/email/_verify": { + "post": { + "operationId": "VerifyUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1VerifyUserEmailRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{id}/passwords/_resetpw": { + "post": { + "operationId": "PasswordReset", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ResetPassword" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/users/{user_id}/mfa/_skipinit": { + "post": { + "operationId": "SkipMfaInit", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SkipMfaInitRequest" + } + } + ], + "tags": [ + "AuthService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "AuthService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE", + "APPSTATE_DELETED" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationAuthorizeRequest": { + "type": "object", + "properties": { + "oidc_client_auth": { + "$ref": "#/definitions/v1OIDCClientAuth" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSEARCHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_TYPE", + "APPLICATIONSEARCHKEY_STATE", + "APPLICATIONSEARCHKEY_CLIENT_ID", + "APPLICATIONSEARCHKEY_APP_NAME", + "APPLICATIONSEARCHKEY_PROJECT_ID" + ], + "default": "APPLICATIONSEARCHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1AuthRequestOIDC": { + "type": "object", + "properties": { + "scope": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_type": { + "$ref": "#/definitions/v1OIDCResponseType" + }, + "nonce": { + "type": "string" + }, + "code_challenge": { + "$ref": "#/definitions/v1CodeChallenge" + } + } + }, + "v1AuthSessionCreation": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "client_id": { + "type": "string" + }, + "redirect_uri": { + "type": "string" + }, + "state": { + "type": "string" + }, + "prompt": { + "$ref": "#/definitions/v1Prompt" + }, + "auth_context_class_reference": { + "type": "array", + "items": { + "type": "string" + } + }, + "ui_locales": { + "type": "array", + "items": { + "type": "string" + } + }, + "login_hint": { + "type": "string" + }, + "max_age": { + "type": "integer", + "format": "int64" + }, + "oidc": { + "$ref": "#/definitions/v1AuthRequestOIDC" + }, + "preselected_user_id": { + "type": "string" + } + } + }, + "v1AuthSessionMultiFactorOTP": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1AuthSessionResponse": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "client_id": { + "type": "string" + }, + "redirect_uri": { + "type": "string" + }, + "state": { + "type": "string" + }, + "prompt": { + "$ref": "#/definitions/v1Prompt" + }, + "auth_context_class_reference": { + "type": "array", + "items": { + "type": "string" + } + }, + "ui_locales": { + "type": "array", + "items": { + "type": "string" + } + }, + "login_hint": { + "type": "string" + }, + "max_age": { + "type": "integer", + "format": "int64" + }, + "oidc": { + "$ref": "#/definitions/v1AuthRequestOIDC" + }, + "possible_steps": { + "type": "array", + "items": { + "$ref": "#/definitions/v1NextStep" + } + }, + "project_client_ids": { + "type": "array", + "items": { + "type": "string" + } + }, + "user_session": { + "$ref": "#/definitions/v1UserSession" + } + } + }, + "v1AuthSessionType": { + "type": "string", + "enum": [ + "AUTHSESSIONTYPE_UNSPECIFIED", + "AUTHSESSIONTYPE_OIDC", + "AUTHSESSIONTYPE_SAML" + ], + "default": "AUTHSESSIONTYPE_UNSPECIFIED" + }, + "v1AuthSessionView": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1AuthSessionType" + }, + "client_id": { + "type": "string" + }, + "user_session_id": { + "type": "string" + }, + "project_client_ids": { + "type": "array", + "items": { + "type": "string" + } + }, + "token_id": { + "type": "string" + }, + "token_expiration": { + "type": "string", + "format": "date-time" + }, + "user_id": { + "type": "string" + } + } + }, + "v1AuthUser": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + } + } + }, + "v1BrowserInformation": { + "type": "object", + "properties": { + "user_agent": { + "type": "string" + }, + "remote_ip": { + "$ref": "#/definitions/v1IP" + }, + "accept_language": { + "type": "string" + } + } + }, + "v1ChooseUser": { + "type": "object", + "properties": { + "user_session_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "user_session_state": { + "$ref": "#/definitions/v1UserSessionState" + } + } + }, + "v1ChooseUserData": { + "type": "object", + "properties": { + "users": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ChooseUser" + } + } + } + }, + "v1CodeChallenge": { + "type": "object", + "properties": { + "challenge": { + "type": "string" + }, + "method": { + "$ref": "#/definitions/v1CodeChallengeMethod" + } + } + }, + "v1CodeChallengeMethod": { + "type": "string", + "enum": [ + "CODECHALLENGEMETHOD_PLAIN", + "CODECHALLENGEMETHOD_S256" + ], + "default": "CODECHALLENGEMETHOD_PLAIN" + }, + "v1CreateTokenRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1Grant": { + "type": "object", + "properties": { + "OrgId": { + "type": "string" + }, + "ProjectId": { + "type": "string" + }, + "UserId": { + "type": "string" + }, + "Roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "OrgName": { + "type": "string" + } + } + }, + "v1GrantSearchKey": { + "type": "string", + "enum": [ + "GRANTSEARCHKEY_UNSPECIFIED", + "GRANTSEARCHKEY_ORG_ID", + "GRANTSEARCHKEY_PROJECT_ID", + "GRANTSEARCHKEY_USER_ID" + ], + "default": "GRANTSEARCHKEY_UNSPECIFIED" + }, + "v1GrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1GrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1GrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1GrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1GrantSearchQuery" + } + } + } + }, + "v1GrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Grant" + } + } + } + }, + "v1IDPProvider": { + "type": "object", + "properties": { + "provider": { + "type": "string" + }, + "externalIdpID": { + "type": "string" + } + } + }, + "v1IP": { + "type": "object", + "properties": { + "V4": { + "type": "string" + }, + "V6": { + "type": "string" + } + } + }, + "v1IsAdminResponse": { + "type": "object", + "properties": { + "is_admin": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1LoginData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + } + } + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaOtpResponse": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "url": { + "type": "string" + }, + "secret": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MfaPromptData": { + "type": "object", + "properties": { + "required": { + "type": "boolean", + "format": "boolean" + }, + "mfa_providers": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MfaType" + } + } + } + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MfaVerifyData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + }, + "failure_count": { + "type": "integer", + "format": "int64" + }, + "mfa_providers": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MfaType" + } + } + } + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1MyPermissions": { + "type": "object", + "properties": { + "permissions": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1MyProjectOrgSearchKey": { + "type": "string", + "enum": [ + "MYPROJECTORGSEARCHKEY_UNSPECIFIED", + "MYPROJECTORGSEARCHKEY_ORG_NAME" + ], + "default": "MYPROJECTORGSEARCHKEY_UNSPECIFIED" + }, + "v1MyProjectOrgSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1MyProjectOrgSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1MyProjectOrgSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MyProjectOrgSearchQuery" + } + } + } + }, + "v1MyProjectOrgSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Org" + } + } + } + }, + "v1NextStep": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1NextStepType" + }, + "login": { + "$ref": "#/definitions/v1LoginData" + }, + "password": { + "$ref": "#/definitions/v1PasswordData" + }, + "mfa_verify": { + "$ref": "#/definitions/v1MfaVerifyData" + }, + "mfa_prompt": { + "$ref": "#/definitions/v1MfaPromptData" + }, + "choose_user": { + "$ref": "#/definitions/v1ChooseUserData" + } + } + }, + "v1NextStepType": { + "type": "string", + "enum": [ + "NEXTSTEP_UNSPECIFIED", + "NEXTSTEP_LOGIN", + "NEXTSTEP_PASSWORD", + "NEXTSTEP_CHANGE_PASSWORD", + "NEXTSTEP_MFA_PROMPT", + "NEXTSTEP_MFA_INIT_CHOICE", + "NEXTSTEP_MFA_INIT_CREATE", + "NEXTSTEP_MFA_INIT_VERIFY", + "NEXTSTEP_MFA_INIT_DONE", + "NEXTSTEP_MFA_VERIFY", + "NEXTSTEP_MFA_VERIFY_ASYNC", + "NEXTSTEP_VERIFY_EMAIL", + "NEXTSTEP_REDIRECT_TO_CALLBACK", + "NEXTSTEP_INIT_PASSWORD", + "NEXTSTEP_CHOOSE_USER" + ], + "default": "NEXTSTEP_UNSPECIFIED" + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCClientAuth": { + "type": "object", + "properties": { + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + } + } + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_secret": { + "type": "string" + }, + "client_id": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_GRANT_TYPE_NONE", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_ID_TOKEN_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1PasswordChange": { + "type": "object", + "properties": { + "old_password": { + "type": "string" + }, + "new_password": { + "type": "string" + } + } + }, + "v1PasswordData": { + "type": "object", + "properties": { + "err_msg": { + "type": "string" + }, + "failure_count": { + "type": "integer", + "format": "int64" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "password": { + "type": "string" + } + } + }, + "v1Prompt": { + "type": "string", + "enum": [ + "PROMPT_UNSPECIFIED", + "PROMPT_NONE", + "PROMPT_LOGIN", + "PROMPT_CONSENT", + "PROMPT_SELECT_ACCOUNT" + ], + "default": "PROMPT_UNSPECIFIED" + }, + "v1RegisterUserExternalIDPRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "idp_provider": { + "$ref": "#/definitions/v1IDPProvider" + }, + "org_id": { + "type": "string" + } + } + }, + "v1RegisterUserRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "password": { + "type": "string" + }, + "org_id": { + "type": "string" + } + } + }, + "v1ResetPassword": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "code": { + "type": "string" + }, + "new_password": { + "type": "string" + } + } + }, + "v1ResetPasswordRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SelectUserRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "user_session_id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1SkipMfaInitRequest": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + } + } + }, + "v1Token": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "expiration": { + "type": "string", + "format": "date-time" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "email": { + "type": "string" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "phone": { + "type": "string" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "activation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password_change_required": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAgent": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "state": { + "$ref": "#/definitions/v1UserAgentState" + } + } + }, + "v1UserAgentCreation": { + "type": "object", + "properties": { + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1UserAgentID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserAgentState": { + "type": "string", + "enum": [ + "USERAGENTSTATE_UNSPECIFIED", + "USERAGENTSTATE_ACTIVE", + "USERAGENTSTATE_TERMINATED" + ], + "default": "USERAGENTSTATE_UNSPECIFIED" + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "isEmailVerified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1UserSession": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "agent_id": { + "type": "string" + }, + "auth_state": { + "$ref": "#/definitions/v1UserSessionState" + }, + "user": { + "$ref": "#/definitions/v1AuthUser" + }, + "password_verified": { + "type": "boolean", + "format": "boolean" + }, + "mfa": { + "$ref": "#/definitions/v1MfaType" + }, + "mfa_verified": { + "type": "boolean", + "format": "boolean" + }, + "auth_time": { + "type": "string", + "format": "date-time" + } + } + }, + "v1UserSessionState": { + "type": "string", + "enum": [ + "USERSESSIONSTATE_UNSPECIFIED", + "USERSESSIONSTATE_ACTIVE", + "USERSESSIONSTATE_TERMINATED" + ], + "default": "USERSESSIONSTATE_UNSPECIFIED" + }, + "v1UserSessionView": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "agent_id": { + "type": "string" + }, + "auth_state": { + "$ref": "#/definitions/v1UserSessionState" + }, + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSessionViews": { + "type": "object", + "properties": { + "user_sessions": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSessionView" + } + } + } + }, + "v1UserSessions": { + "type": "object", + "properties": { + "user_sessions": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSession" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIEFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIEFIED" + }, + "v1VerifyMfaOtp": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyMfaRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + }, + "otp": { + "$ref": "#/definitions/v1AuthSessionMultiFactorOTP" + } + } + }, + "v1VerifyMyUserEmailRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyPasswordRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "password": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + }, + "v1VerifyUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "code": { + "type": "string" + } + } + }, + "v1VerifyUserPhoneRequest": { + "type": "object", + "properties": { + "code": { + "type": "string" + } + } + }, + "v1VerifyUserRequest": { + "type": "object", + "properties": { + "agent_id": { + "type": "string" + }, + "auth_session_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "browser_info": { + "$ref": "#/definitions/v1BrowserInformation" + } + } + } + } +} diff --git a/pkg/auth/api/grpc/mock/auth.proto.mock.go b/pkg/auth/api/grpc/mock/auth.proto.mock.go new file mode 100644 index 0000000000..f74e7ad52e --- /dev/null +++ b/pkg/auth/api/grpc/mock/auth.proto.mock.go @@ -0,0 +1,1078 @@ +// Code generated by MockGen. DO NOT EDIT. +// Source: github.com/caos/zitadel/pkg/auth/api/grpc (interfaces: AuthServiceClient) + +// Package api is a generated GoMock package. +package api + +import ( + context "context" + grpc "github.com/caos/zitadel/pkg/auth/api/grpc" + gomock "github.com/golang/mock/gomock" + empty "github.com/golang/protobuf/ptypes/empty" + struct0 "github.com/golang/protobuf/ptypes/struct" + grpc0 "google.golang.org/grpc" + reflect "reflect" +) + +// MockAuthServiceClient is a mock of AuthServiceClient interface +type MockAuthServiceClient struct { + ctrl *gomock.Controller + recorder *MockAuthServiceClientMockRecorder +} + +// MockAuthServiceClientMockRecorder is the mock recorder for MockAuthServiceClient +type MockAuthServiceClientMockRecorder struct { + mock *MockAuthServiceClient +} + +// NewMockAuthServiceClient creates a new mock instance +func NewMockAuthServiceClient(ctrl *gomock.Controller) *MockAuthServiceClient { + mock := &MockAuthServiceClient{ctrl: ctrl} + mock.recorder = &MockAuthServiceClientMockRecorder{mock} + return mock +} + +// EXPECT returns an object that allows the caller to indicate expected use +func (m *MockAuthServiceClient) EXPECT() *MockAuthServiceClientMockRecorder { + return m.recorder +} + +// AddMfaOTP mocks base method +func (m *MockAuthServiceClient) AddMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AddMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AddMfaOTP indicates an expected call of AddMfaOTP +func (mr *MockAuthServiceClientMockRecorder) AddMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).AddMfaOTP), varargs...) +} + +// AuthorizeApplication mocks base method +func (m *MockAuthServiceClient) AuthorizeApplication(arg0 context.Context, arg1 *grpc.ApplicationAuthorizeRequest, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "AuthorizeApplication", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// AuthorizeApplication indicates an expected call of AuthorizeApplication +func (mr *MockAuthServiceClientMockRecorder) AuthorizeApplication(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AuthorizeApplication", reflect.TypeOf((*MockAuthServiceClient)(nil).AuthorizeApplication), varargs...) +} + +// ChangeMyPassword mocks base method +func (m *MockAuthServiceClient) ChangeMyPassword(arg0 context.Context, arg1 *grpc.PasswordChange, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyPassword", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyPassword indicates an expected call of ChangeMyPassword +func (mr *MockAuthServiceClientMockRecorder) ChangeMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyPassword), varargs...) +} + +// ChangeMyUserEmail mocks base method +func (m *MockAuthServiceClient) ChangeMyUserEmail(arg0 context.Context, arg1 *grpc.UpdateUserEmailRequest, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserEmail indicates an expected call of ChangeMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserEmail), varargs...) +} + +// ChangeMyUserPhone mocks base method +func (m *MockAuthServiceClient) ChangeMyUserPhone(arg0 context.Context, arg1 *grpc.UpdateUserPhoneRequest, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ChangeMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ChangeMyUserPhone indicates an expected call of ChangeMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) ChangeMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).ChangeMyUserPhone), varargs...) +} + +// CreateAuthSession mocks base method +func (m *MockAuthServiceClient) CreateAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionCreation, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateAuthSession", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateAuthSession indicates an expected call of CreateAuthSession +func (mr *MockAuthServiceClientMockRecorder) CreateAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateAuthSession), varargs...) +} + +// CreateToken mocks base method +func (m *MockAuthServiceClient) CreateToken(arg0 context.Context, arg1 *grpc.CreateTokenRequest, arg2 ...grpc0.CallOption) (*grpc.Token, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateToken", varargs...) + ret0, _ := ret[0].(*grpc.Token) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateToken indicates an expected call of CreateToken +func (mr *MockAuthServiceClientMockRecorder) CreateToken(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateToken", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateToken), varargs...) +} + +// CreateUserAgent mocks base method +func (m *MockAuthServiceClient) CreateUserAgent(arg0 context.Context, arg1 *grpc.UserAgentCreation, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "CreateUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// CreateUserAgent indicates an expected call of CreateUserAgent +func (mr *MockAuthServiceClientMockRecorder) CreateUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).CreateUserAgent), varargs...) +} + +// GetApplicationByID mocks base method +func (m *MockAuthServiceClient) GetApplicationByID(arg0 context.Context, arg1 *grpc.ApplicationID, arg2 ...grpc0.CallOption) (*grpc.Application, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetApplicationByID", varargs...) + ret0, _ := ret[0].(*grpc.Application) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetApplicationByID indicates an expected call of GetApplicationByID +func (mr *MockAuthServiceClientMockRecorder) GetApplicationByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplicationByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetApplicationByID), varargs...) +} + +// GetAuthSession mocks base method +func (m *MockAuthServiceClient) GetAuthSession(arg0 context.Context, arg1 *grpc.AuthSessionID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetAuthSession", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetAuthSession indicates an expected call of GetAuthSession +func (mr *MockAuthServiceClientMockRecorder) GetAuthSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSession), varargs...) +} + +// GetAuthSessionByTokenID mocks base method +func (m *MockAuthServiceClient) GetAuthSessionByTokenID(arg0 context.Context, arg1 *grpc.TokenID, arg2 ...grpc0.CallOption) (*grpc.AuthSessionView, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetAuthSessionByTokenID", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionView) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetAuthSessionByTokenID indicates an expected call of GetAuthSessionByTokenID +func (mr *MockAuthServiceClientMockRecorder) GetAuthSessionByTokenID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAuthSessionByTokenID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetAuthSessionByTokenID), varargs...) +} + +// GetMyMfas mocks base method +func (m *MockAuthServiceClient) GetMyMfas(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MultiFactors, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyMfas", varargs...) + ret0, _ := ret[0].(*grpc.MultiFactors) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyMfas indicates an expected call of GetMyMfas +func (mr *MockAuthServiceClientMockRecorder) GetMyMfas(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyMfas", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyMfas), varargs...) +} + +// GetMyUserAddress mocks base method +func (m *MockAuthServiceClient) GetMyUserAddress(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserAddress indicates an expected call of GetMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) GetMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserAddress), varargs...) +} + +// GetMyUserEmail mocks base method +func (m *MockAuthServiceClient) GetMyUserEmail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserEmail, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserEmail", varargs...) + ret0, _ := ret[0].(*grpc.UserEmail) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserEmail indicates an expected call of GetMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) GetMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserEmail), varargs...) +} + +// GetMyUserPhone mocks base method +func (m *MockAuthServiceClient) GetMyUserPhone(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserPhone, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserPhone", varargs...) + ret0, _ := ret[0].(*grpc.UserPhone) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserPhone indicates an expected call of GetMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) GetMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserPhone), varargs...) +} + +// GetMyUserProfile mocks base method +func (m *MockAuthServiceClient) GetMyUserProfile(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserProfile indicates an expected call of GetMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) GetMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserProfile), varargs...) +} + +// GetMyUserSessions mocks base method +func (m *MockAuthServiceClient) GetMyUserSessions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.UserSessionViews, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyUserSessions", varargs...) + ret0, _ := ret[0].(*grpc.UserSessionViews) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyUserSessions indicates an expected call of GetMyUserSessions +func (mr *MockAuthServiceClientMockRecorder) GetMyUserSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyUserSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyUserSessions), varargs...) +} + +// GetMyZitadelPermissions mocks base method +func (m *MockAuthServiceClient) GetMyZitadelPermissions(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.MyPermissions, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetMyZitadelPermissions", varargs...) + ret0, _ := ret[0].(*grpc.MyPermissions) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetMyZitadelPermissions indicates an expected call of GetMyZitadelPermissions +func (mr *MockAuthServiceClientMockRecorder) GetMyZitadelPermissions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetMyZitadelPermissions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetMyZitadelPermissions), varargs...) +} + +// GetUserAgent mocks base method +func (m *MockAuthServiceClient) GetUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserAgent indicates an expected call of GetUserAgent +func (mr *MockAuthServiceClientMockRecorder) GetUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgent), varargs...) +} + +// GetUserAgentSessions mocks base method +func (m *MockAuthServiceClient) GetUserAgentSessions(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserSessions, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserAgentSessions", varargs...) + ret0, _ := ret[0].(*grpc.UserSessions) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserAgentSessions indicates an expected call of GetUserAgentSessions +func (mr *MockAuthServiceClientMockRecorder) GetUserAgentSessions(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserAgentSessions", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserAgentSessions), varargs...) +} + +// GetUserByID mocks base method +func (m *MockAuthServiceClient) GetUserByID(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserByID", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserByID indicates an expected call of GetUserByID +func (mr *MockAuthServiceClientMockRecorder) GetUserByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserByID", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserByID), varargs...) +} + +// GetUserSession mocks base method +func (m *MockAuthServiceClient) GetUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*grpc.UserSession, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "GetUserSession", varargs...) + ret0, _ := ret[0].(*grpc.UserSession) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// GetUserSession indicates an expected call of GetUserSession +func (mr *MockAuthServiceClientMockRecorder) GetUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).GetUserSession), varargs...) +} + +// Healthz mocks base method +func (m *MockAuthServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Healthz", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Healthz indicates an expected call of Healthz +func (mr *MockAuthServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAuthServiceClient)(nil).Healthz), varargs...) +} + +// IsIamAdmin mocks base method +func (m *MockAuthServiceClient) IsIamAdmin(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*grpc.IsAdminResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsIamAdmin", varargs...) + ret0, _ := ret[0].(*grpc.IsAdminResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsIamAdmin indicates an expected call of IsIamAdmin +func (mr *MockAuthServiceClientMockRecorder) IsIamAdmin(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsIamAdmin", reflect.TypeOf((*MockAuthServiceClient)(nil).IsIamAdmin), varargs...) +} + +// IsUserUnique mocks base method +func (m *MockAuthServiceClient) IsUserUnique(arg0 context.Context, arg1 *grpc.UniqueUserRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueUserResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "IsUserUnique", varargs...) + ret0, _ := ret[0].(*grpc.UniqueUserResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// IsUserUnique indicates an expected call of IsUserUnique +func (mr *MockAuthServiceClientMockRecorder) IsUserUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsUserUnique", reflect.TypeOf((*MockAuthServiceClient)(nil).IsUserUnique), varargs...) +} + +// PasswordReset mocks base method +func (m *MockAuthServiceClient) PasswordReset(arg0 context.Context, arg1 *grpc.ResetPassword, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "PasswordReset", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// PasswordReset indicates an expected call of PasswordReset +func (mr *MockAuthServiceClientMockRecorder) PasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).PasswordReset), varargs...) +} + +// Ready mocks base method +func (m *MockAuthServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Ready", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Ready indicates an expected call of Ready +func (mr *MockAuthServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAuthServiceClient)(nil).Ready), varargs...) +} + +// RegisterUser mocks base method +func (m *MockAuthServiceClient) RegisterUser(arg0 context.Context, arg1 *grpc.RegisterUserRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RegisterUser", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RegisterUser indicates an expected call of RegisterUser +func (mr *MockAuthServiceClientMockRecorder) RegisterUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUser", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUser), varargs...) +} + +// RegisterUserWithExternal mocks base method +func (m *MockAuthServiceClient) RegisterUserWithExternal(arg0 context.Context, arg1 *grpc.RegisterUserExternalIDPRequest, arg2 ...grpc0.CallOption) (*grpc.User, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RegisterUserWithExternal", varargs...) + ret0, _ := ret[0].(*grpc.User) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RegisterUserWithExternal indicates an expected call of RegisterUserWithExternal +func (mr *MockAuthServiceClientMockRecorder) RegisterUserWithExternal(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RegisterUserWithExternal", reflect.TypeOf((*MockAuthServiceClient)(nil).RegisterUserWithExternal), varargs...) +} + +// RemoveMfaOTP mocks base method +func (m *MockAuthServiceClient) RemoveMfaOTP(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RemoveMfaOTP", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RemoveMfaOTP indicates an expected call of RemoveMfaOTP +func (mr *MockAuthServiceClientMockRecorder) RemoveMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).RemoveMfaOTP), varargs...) +} + +// RequestPasswordReset mocks base method +func (m *MockAuthServiceClient) RequestPasswordReset(arg0 context.Context, arg1 *grpc.ResetPasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RequestPasswordReset", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RequestPasswordReset indicates an expected call of RequestPasswordReset +func (mr *MockAuthServiceClientMockRecorder) RequestPasswordReset(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RequestPasswordReset", reflect.TypeOf((*MockAuthServiceClient)(nil).RequestPasswordReset), varargs...) +} + +// ResendEmailVerificationMail mocks base method +func (m *MockAuthServiceClient) ResendEmailVerificationMail(arg0 context.Context, arg1 *grpc.UserID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendEmailVerificationMail indicates an expected call of ResendEmailVerificationMail +func (mr *MockAuthServiceClientMockRecorder) ResendEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendEmailVerificationMail), varargs...) +} + +// ResendMyEmailVerificationMail mocks base method +func (m *MockAuthServiceClient) ResendMyEmailVerificationMail(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyEmailVerificationMail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyEmailVerificationMail indicates an expected call of ResendMyEmailVerificationMail +func (mr *MockAuthServiceClientMockRecorder) ResendMyEmailVerificationMail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyEmailVerificationMail", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyEmailVerificationMail), varargs...) +} + +// ResendMyPhoneVerificationCode mocks base method +func (m *MockAuthServiceClient) ResendMyPhoneVerificationCode(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ResendMyPhoneVerificationCode", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ResendMyPhoneVerificationCode indicates an expected call of ResendMyPhoneVerificationCode +func (mr *MockAuthServiceClientMockRecorder) ResendMyPhoneVerificationCode(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResendMyPhoneVerificationCode", reflect.TypeOf((*MockAuthServiceClient)(nil).ResendMyPhoneVerificationCode), varargs...) +} + +// RevokeUserAgent mocks base method +func (m *MockAuthServiceClient) RevokeUserAgent(arg0 context.Context, arg1 *grpc.UserAgentID, arg2 ...grpc0.CallOption) (*grpc.UserAgent, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "RevokeUserAgent", varargs...) + ret0, _ := ret[0].(*grpc.UserAgent) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// RevokeUserAgent indicates an expected call of RevokeUserAgent +func (mr *MockAuthServiceClientMockRecorder) RevokeUserAgent(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RevokeUserAgent", reflect.TypeOf((*MockAuthServiceClient)(nil).RevokeUserAgent), varargs...) +} + +// SearchApplications mocks base method +func (m *MockAuthServiceClient) SearchApplications(arg0 context.Context, arg1 *grpc.ApplicationSearchRequest, arg2 ...grpc0.CallOption) (*grpc.ApplicationSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchApplications", varargs...) + ret0, _ := ret[0].(*grpc.ApplicationSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchApplications indicates an expected call of SearchApplications +func (mr *MockAuthServiceClientMockRecorder) SearchApplications(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchApplications", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchApplications), varargs...) +} + +// SearchGrant mocks base method +func (m *MockAuthServiceClient) SearchGrant(arg0 context.Context, arg1 *grpc.GrantSearchRequest, arg2 ...grpc0.CallOption) (*grpc.GrantSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchGrant", varargs...) + ret0, _ := ret[0].(*grpc.GrantSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchGrant indicates an expected call of SearchGrant +func (mr *MockAuthServiceClientMockRecorder) SearchGrant(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchGrant", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchGrant), varargs...) +} + +// SearchMyProjectOrgs mocks base method +func (m *MockAuthServiceClient) SearchMyProjectOrgs(arg0 context.Context, arg1 *grpc.MyProjectOrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.MyProjectOrgSearchResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SearchMyProjectOrgs", varargs...) + ret0, _ := ret[0].(*grpc.MyProjectOrgSearchResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SearchMyProjectOrgs indicates an expected call of SearchMyProjectOrgs +func (mr *MockAuthServiceClientMockRecorder) SearchMyProjectOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMyProjectOrgs", reflect.TypeOf((*MockAuthServiceClient)(nil).SearchMyProjectOrgs), varargs...) +} + +// SelectUser mocks base method +func (m *MockAuthServiceClient) SelectUser(arg0 context.Context, arg1 *grpc.SelectUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SelectUser", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SelectUser indicates an expected call of SelectUser +func (mr *MockAuthServiceClientMockRecorder) SelectUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectUser", reflect.TypeOf((*MockAuthServiceClient)(nil).SelectUser), varargs...) +} + +// SetMyPassword mocks base method +func (m *MockAuthServiceClient) SetMyPassword(arg0 context.Context, arg1 *grpc.PasswordRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SetMyPassword", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SetMyPassword indicates an expected call of SetMyPassword +func (mr *MockAuthServiceClientMockRecorder) SetMyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).SetMyPassword), varargs...) +} + +// SkipMfaInit mocks base method +func (m *MockAuthServiceClient) SkipMfaInit(arg0 context.Context, arg1 *grpc.SkipMfaInitRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "SkipMfaInit", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// SkipMfaInit indicates an expected call of SkipMfaInit +func (mr *MockAuthServiceClientMockRecorder) SkipMfaInit(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SkipMfaInit", reflect.TypeOf((*MockAuthServiceClient)(nil).SkipMfaInit), varargs...) +} + +// TerminateUserSession mocks base method +func (m *MockAuthServiceClient) TerminateUserSession(arg0 context.Context, arg1 *grpc.UserSessionID, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "TerminateUserSession", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// TerminateUserSession indicates an expected call of TerminateUserSession +func (mr *MockAuthServiceClientMockRecorder) TerminateUserSession(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TerminateUserSession", reflect.TypeOf((*MockAuthServiceClient)(nil).TerminateUserSession), varargs...) +} + +// UpdateMyUserAddress mocks base method +func (m *MockAuthServiceClient) UpdateMyUserAddress(arg0 context.Context, arg1 *grpc.UpdateUserAddressRequest, arg2 ...grpc0.CallOption) (*grpc.UserAddress, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserAddress", varargs...) + ret0, _ := ret[0].(*grpc.UserAddress) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserAddress indicates an expected call of UpdateMyUserAddress +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserAddress(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserAddress", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserAddress), varargs...) +} + +// UpdateMyUserProfile mocks base method +func (m *MockAuthServiceClient) UpdateMyUserProfile(arg0 context.Context, arg1 *grpc.UpdateUserProfileRequest, arg2 ...grpc0.CallOption) (*grpc.UserProfile, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "UpdateMyUserProfile", varargs...) + ret0, _ := ret[0].(*grpc.UserProfile) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// UpdateMyUserProfile indicates an expected call of UpdateMyUserProfile +func (mr *MockAuthServiceClientMockRecorder) UpdateMyUserProfile(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateMyUserProfile", reflect.TypeOf((*MockAuthServiceClient)(nil).UpdateMyUserProfile), varargs...) +} + +// Validate mocks base method +func (m *MockAuthServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "Validate", varargs...) + ret0, _ := ret[0].(*struct0.Struct) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// Validate indicates an expected call of Validate +func (mr *MockAuthServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAuthServiceClient)(nil).Validate), varargs...) +} + +// VerifyMfa mocks base method +func (m *MockAuthServiceClient) VerifyMfa(arg0 context.Context, arg1 *grpc.VerifyMfaRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMfa", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMfa indicates an expected call of VerifyMfa +func (mr *MockAuthServiceClientMockRecorder) VerifyMfa(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfa", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfa), varargs...) +} + +// VerifyMfaOTP mocks base method +func (m *MockAuthServiceClient) VerifyMfaOTP(arg0 context.Context, arg1 *grpc.VerifyMfaOtp, arg2 ...grpc0.CallOption) (*grpc.MfaOtpResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMfaOTP", varargs...) + ret0, _ := ret[0].(*grpc.MfaOtpResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMfaOTP indicates an expected call of VerifyMfaOTP +func (mr *MockAuthServiceClientMockRecorder) VerifyMfaOTP(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMfaOTP", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMfaOTP), varargs...) +} + +// VerifyMyUserEmail mocks base method +func (m *MockAuthServiceClient) VerifyMyUserEmail(arg0 context.Context, arg1 *grpc.VerifyMyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserEmail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserEmail indicates an expected call of VerifyMyUserEmail +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserEmail), varargs...) +} + +// VerifyMyUserPhone mocks base method +func (m *MockAuthServiceClient) VerifyMyUserPhone(arg0 context.Context, arg1 *grpc.VerifyUserPhoneRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyMyUserPhone", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyMyUserPhone indicates an expected call of VerifyMyUserPhone +func (mr *MockAuthServiceClientMockRecorder) VerifyMyUserPhone(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyMyUserPhone", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyMyUserPhone), varargs...) +} + +// VerifyPassword mocks base method +func (m *MockAuthServiceClient) VerifyPassword(arg0 context.Context, arg1 *grpc.VerifyPasswordRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyPassword", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyPassword indicates an expected call of VerifyPassword +func (mr *MockAuthServiceClientMockRecorder) VerifyPassword(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyPassword", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyPassword), varargs...) +} + +// VerifyUser mocks base method +func (m *MockAuthServiceClient) VerifyUser(arg0 context.Context, arg1 *grpc.VerifyUserRequest, arg2 ...grpc0.CallOption) (*grpc.AuthSessionResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyUser", varargs...) + ret0, _ := ret[0].(*grpc.AuthSessionResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyUser indicates an expected call of VerifyUser +func (mr *MockAuthServiceClientMockRecorder) VerifyUser(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUser", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUser), varargs...) +} + +// VerifyUserEmail mocks base method +func (m *MockAuthServiceClient) VerifyUserEmail(arg0 context.Context, arg1 *grpc.VerifyUserEmailRequest, arg2 ...grpc0.CallOption) (*empty.Empty, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "VerifyUserEmail", varargs...) + ret0, _ := ret[0].(*empty.Empty) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// VerifyUserEmail indicates an expected call of VerifyUserEmail +func (mr *MockAuthServiceClientMockRecorder) VerifyUserEmail(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VerifyUserEmail", reflect.TypeOf((*MockAuthServiceClient)(nil).VerifyUserEmail), varargs...) +} diff --git a/pkg/auth/api/proto/auth.proto b/pkg/auth/api/proto/auth.proto index 3c47b5b543..dd6c399ab2 100644 --- a/pkg/auth/api/proto/auth.proto +++ b/pkg/auth/api/proto/auth.proto @@ -10,14 +10,14 @@ import "authoption/options.proto"; package zitadel.auth.api.v1; -option go_package = "github.com/caos/zitadel/auth/api/grpc"; +option go_package = "github.com/caos/zitadel/pkg/auth/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Auth API"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/auth" + url: "https://github.com/caos/zitadel/pkg/auth" }; }; diff --git a/pkg/management/api/grpc/generate.go b/pkg/management/api/grpc/generate.go index 7217c62cfb..b9067afe7b 100644 --- a/pkg/management/api/grpc/generate.go +++ b/pkg/management/api/grpc/generate.go @@ -1,6 +1,6 @@ package grpc //go:generate protoc -I$GOPATH/src -I../proto -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis -I${GOPATH}/src/github.com/envoyproxy/protoc-gen-validate -I${GOPATH}/src/github.com/caos/zitadel/internal/protoc/protoc-gen-authoption --go_out=plugins=grpc:$GOPATH/src --grpc-gateway_out=logtostderr=true:$GOPATH/src --swagger_out=logtostderr=true:. --authoption_out=. ../proto/management.proto -//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/management/api/grpc ManagementServiceClient +//go:generate mockgen -package api -destination ./mock/management.proto.mock.go github.com/caos/zitadel/pkg/management/api/grpc ManagementServiceClient //go:generate ../../../console/etc/generate-grpc.sh diff --git a/pkg/management/api/grpc/management.pb.authoptions.go b/pkg/management/api/grpc/management.pb.authoptions.go new file mode 100644 index 0000000000..11207192ee --- /dev/null +++ b/pkg/management/api/grpc/management.pb.authoptions.go @@ -0,0 +1,521 @@ +// Code generated by protoc-gen-authmethod. DO NOT EDIT. + +package grpc + +import ( + "google.golang.org/grpc" + + utils_auth "github.com/caos/zitadel/internal/api/auth" + utils_grpc "github.com/caos/zitadel/internal/api/grpc" +) + +/** + * ManagementService + */ + +var ManagementService_AuthMethods = utils_auth.MethodMapping{ + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByID": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUsers": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/LockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UnlockUser": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeleteUser": utils_auth.Option{ + Permission: "user.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserChanges": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/OrgChanges": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.Option{ + Permission: "user.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.Option{ + Permission: "user.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.Option{ + Permission: "policy.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.Option{ + Permission: "org.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.Option{ + Permission: "org.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.Option{ + Permission: "org.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.Option{ + Permission: "org.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.Option{ + Permission: "org.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjects": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.Option{ + Permission: "project.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.Option{ + Permission: "project.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.Option{ + Permission: "project.member.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.Option{ + Permission: "project.member.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.Option{ + Permission: "project.member.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.Option{ + Permission: "project.role.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.Option{ + Permission: "project.role.write", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.Option{ + Permission: "project.role.delete", + CheckParam: "Id", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchApplications": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.Option{ + Permission: "project.app.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.Option{ + Permission: "project.app.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.Option{ + Permission: "project.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.Option{ + Permission: "project.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.Option{ + Permission: "project.grant.member.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.Option{ + Permission: "project.grant.member.delete", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.Option{ + Permission: "user.grant.read", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.Option{ + Permission: "user.grant.write", + CheckParam: "", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.Option{ + Permission: "project.user.grant.read", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.Option{ + Permission: "project.user.grant.write", + CheckParam: "ProjectId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.Option{ + Permission: "project.grant.user.grant.read", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, + + "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.Option{ + Permission: "project.grant.user.grant.write", + CheckParam: "ProjectGrantId", + }, +} + +func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.Config) grpc.UnaryServerInterceptor { + return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods) +} diff --git a/pkg/management/api/grpc/management.pb.go b/pkg/management/api/grpc/management.pb.go new file mode 100644 index 0000000000..81e574c5c5 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.go @@ -0,0 +1,12569 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: management.proto + +package grpc + +import ( + context "context" + fmt "fmt" + _ "github.com/caos/zitadel/internal/protoc/protoc-gen-authoption/authoption" + _ "github.com/envoyproxy/protoc-gen-validate/validate" + proto "github.com/golang/protobuf/proto" + _ "github.com/golang/protobuf/protoc-gen-go/descriptor" + empty "github.com/golang/protobuf/ptypes/empty" + _struct "github.com/golang/protobuf/ptypes/struct" + timestamp "github.com/golang/protobuf/ptypes/timestamp" + _ "github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger/options" + _ "google.golang.org/genproto/googleapis/api/annotations" + grpc "google.golang.org/grpc" + codes "google.golang.org/grpc/codes" + status "google.golang.org/grpc/status" + math "math" +) + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package + +type UserState int32 + +const ( + UserState_USERSTATE_UNSPECIFIED UserState = 0 + UserState_USERSTATE_ACTIVE UserState = 1 + UserState_USERSTATE_INACTIVE UserState = 2 + UserState_USERSTATE_DELETED UserState = 3 + UserState_USERSTATE_LOCKED UserState = 4 + UserState_USERSTATE_SUSPEND UserState = 5 + UserState_USERSTATE_INITIAL UserState = 6 +) + +var UserState_name = map[int32]string{ + 0: "USERSTATE_UNSPECIFIED", + 1: "USERSTATE_ACTIVE", + 2: "USERSTATE_INACTIVE", + 3: "USERSTATE_DELETED", + 4: "USERSTATE_LOCKED", + 5: "USERSTATE_SUSPEND", + 6: "USERSTATE_INITIAL", +} + +var UserState_value = map[string]int32{ + "USERSTATE_UNSPECIFIED": 0, + "USERSTATE_ACTIVE": 1, + "USERSTATE_INACTIVE": 2, + "USERSTATE_DELETED": 3, + "USERSTATE_LOCKED": 4, + "USERSTATE_SUSPEND": 5, + "USERSTATE_INITIAL": 6, +} + +func (x UserState) String() string { + return proto.EnumName(UserState_name, int32(x)) +} + +func (UserState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +type Gender int32 + +const ( + Gender_GENDER_UNSPECIFIED Gender = 0 + Gender_GENDER_FEMALE Gender = 1 + Gender_GENDER_MALE Gender = 2 + Gender_GENDER_DIVERSE Gender = 3 +) + +var Gender_name = map[int32]string{ + 0: "GENDER_UNSPECIFIED", + 1: "GENDER_FEMALE", + 2: "GENDER_MALE", + 3: "GENDER_DIVERSE", +} + +var Gender_value = map[string]int32{ + "GENDER_UNSPECIFIED": 0, + "GENDER_FEMALE": 1, + "GENDER_MALE": 2, + "GENDER_DIVERSE": 3, +} + +func (x Gender) String() string { + return proto.EnumName(Gender_name, int32(x)) +} + +func (Gender) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +type UserSearchKey int32 + +const ( + UserSearchKey_USERSEARCHKEY_UNSPECIFIED UserSearchKey = 0 + UserSearchKey_USERSEARCHKEY_USER_NAME UserSearchKey = 1 + UserSearchKey_USERSEARCHKEY_FIRST_NAME UserSearchKey = 2 + UserSearchKey_USERSEARCHKEY_LAST_NAME UserSearchKey = 3 + UserSearchKey_USERSEARCHKEY_NICK_NAME UserSearchKey = 4 + UserSearchKey_USERSEARCHKEY_DISPLAY_NAME UserSearchKey = 5 + UserSearchKey_USERSEARCHKEY_EMAIL UserSearchKey = 6 + UserSearchKey_USERSEARCHKEY_STATE UserSearchKey = 7 +) + +var UserSearchKey_name = map[int32]string{ + 0: "USERSEARCHKEY_UNSPECIFIED", + 1: "USERSEARCHKEY_USER_NAME", + 2: "USERSEARCHKEY_FIRST_NAME", + 3: "USERSEARCHKEY_LAST_NAME", + 4: "USERSEARCHKEY_NICK_NAME", + 5: "USERSEARCHKEY_DISPLAY_NAME", + 6: "USERSEARCHKEY_EMAIL", + 7: "USERSEARCHKEY_STATE", +} + +var UserSearchKey_value = map[string]int32{ + "USERSEARCHKEY_UNSPECIFIED": 0, + "USERSEARCHKEY_USER_NAME": 1, + "USERSEARCHKEY_FIRST_NAME": 2, + "USERSEARCHKEY_LAST_NAME": 3, + "USERSEARCHKEY_NICK_NAME": 4, + "USERSEARCHKEY_DISPLAY_NAME": 5, + "USERSEARCHKEY_EMAIL": 6, + "USERSEARCHKEY_STATE": 7, +} + +func (x UserSearchKey) String() string { + return proto.EnumName(UserSearchKey_name, int32(x)) +} + +func (UserSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +type SearchMethod int32 + +const ( + SearchMethod_SEARCHMETHOD_EQUALS SearchMethod = 0 + SearchMethod_SEARCHMETHOD_STARTS_WITH SearchMethod = 1 + SearchMethod_SEARCHMETHOD_CONTAINS SearchMethod = 2 +) + +var SearchMethod_name = map[int32]string{ + 0: "SEARCHMETHOD_EQUALS", + 1: "SEARCHMETHOD_STARTS_WITH", + 2: "SEARCHMETHOD_CONTAINS", +} + +var SearchMethod_value = map[string]int32{ + "SEARCHMETHOD_EQUALS": 0, + "SEARCHMETHOD_STARTS_WITH": 1, + "SEARCHMETHOD_CONTAINS": 2, +} + +func (x SearchMethod) String() string { + return proto.EnumName(SearchMethod_name, int32(x)) +} + +func (SearchMethod) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +type MfaType int32 + +const ( + MfaType_MFATYPE_UNSPECIFIED MfaType = 0 + MfaType_MFATYPE_SMS MfaType = 1 + MfaType_MFATYPE_OTP MfaType = 2 +) + +var MfaType_name = map[int32]string{ + 0: "MFATYPE_UNSPECIFIED", + 1: "MFATYPE_SMS", + 2: "MFATYPE_OTP", +} + +var MfaType_value = map[string]int32{ + "MFATYPE_UNSPECIFIED": 0, + "MFATYPE_SMS": 1, + "MFATYPE_OTP": 2, +} + +func (x MfaType) String() string { + return proto.EnumName(MfaType_name, int32(x)) +} + +func (MfaType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +type MFAState int32 + +const ( + MFAState_MFASTATE_UNSPECIFIED MFAState = 0 + MFAState_MFASTATE_NOT_READY MFAState = 1 + MFAState_MFASTATE_READY MFAState = 2 + MFAState_MFASTATE_REMOVED MFAState = 3 +) + +var MFAState_name = map[int32]string{ + 0: "MFASTATE_UNSPECIFIED", + 1: "MFASTATE_NOT_READY", + 2: "MFASTATE_READY", + 3: "MFASTATE_REMOVED", +} + +var MFAState_value = map[string]int32{ + "MFASTATE_UNSPECIFIED": 0, + "MFASTATE_NOT_READY": 1, + "MFASTATE_READY": 2, + "MFASTATE_REMOVED": 3, +} + +func (x MFAState) String() string { + return proto.EnumName(MFAState_name, int32(x)) +} + +func (MFAState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +type NotificationType int32 + +const ( + NotificationType_NOTIFICATIONTYPE_EMAIL NotificationType = 0 + NotificationType_NOTIFICATIONTYPE_SMS NotificationType = 1 +) + +var NotificationType_name = map[int32]string{ + 0: "NOTIFICATIONTYPE_EMAIL", + 1: "NOTIFICATIONTYPE_SMS", +} + +var NotificationType_value = map[string]int32{ + "NOTIFICATIONTYPE_EMAIL": 0, + "NOTIFICATIONTYPE_SMS": 1, +} + +func (x NotificationType) String() string { + return proto.EnumName(NotificationType_name, int32(x)) +} + +func (NotificationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +type PolicyState int32 + +const ( + PolicyState_POLICYSTATE_UNSPECIFIED PolicyState = 0 + PolicyState_POLICYSTATE_ACTIVE PolicyState = 1 + PolicyState_POLICYSTATE_INACTIVE PolicyState = 2 + PolicyState_POLICYSTATE_DELETED PolicyState = 3 +) + +var PolicyState_name = map[int32]string{ + 0: "POLICYSTATE_UNSPECIFIED", + 1: "POLICYSTATE_ACTIVE", + 2: "POLICYSTATE_INACTIVE", + 3: "POLICYSTATE_DELETED", +} + +var PolicyState_value = map[string]int32{ + "POLICYSTATE_UNSPECIFIED": 0, + "POLICYSTATE_ACTIVE": 1, + "POLICYSTATE_INACTIVE": 2, + "POLICYSTATE_DELETED": 3, +} + +func (x PolicyState) String() string { + return proto.EnumName(PolicyState_name, int32(x)) +} + +func (PolicyState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +type OrgState int32 + +const ( + OrgState_ORGSTATE_UNSPECIFIED OrgState = 0 + OrgState_ORGSTATE_ACTIVE OrgState = 1 + OrgState_ORGSTATE_INACTIVE OrgState = 2 +) + +var OrgState_name = map[int32]string{ + 0: "ORGSTATE_UNSPECIFIED", + 1: "ORGSTATE_ACTIVE", + 2: "ORGSTATE_INACTIVE", +} + +var OrgState_value = map[string]int32{ + "ORGSTATE_UNSPECIFIED": 0, + "ORGSTATE_ACTIVE": 1, + "ORGSTATE_INACTIVE": 2, +} + +func (x OrgState) String() string { + return proto.EnumName(OrgState_name, int32(x)) +} + +func (OrgState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +type OrgMemberSearchKey int32 + +const ( + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED OrgMemberSearchKey = 0 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_FIRST_NAME OrgMemberSearchKey = 1 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_LAST_NAME OrgMemberSearchKey = 2 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_EMAIL OrgMemberSearchKey = 3 + OrgMemberSearchKey_ORGMEMBERSEARCHKEY_USER_ID OrgMemberSearchKey = 4 +) + +var OrgMemberSearchKey_name = map[int32]string{ + 0: "ORGMEMBERSEARCHKEY_UNSPECIFIED", + 1: "ORGMEMBERSEARCHKEY_FIRST_NAME", + 2: "ORGMEMBERSEARCHKEY_LAST_NAME", + 3: "ORGMEMBERSEARCHKEY_EMAIL", + 4: "ORGMEMBERSEARCHKEY_USER_ID", +} + +var OrgMemberSearchKey_value = map[string]int32{ + "ORGMEMBERSEARCHKEY_UNSPECIFIED": 0, + "ORGMEMBERSEARCHKEY_FIRST_NAME": 1, + "ORGMEMBERSEARCHKEY_LAST_NAME": 2, + "ORGMEMBERSEARCHKEY_EMAIL": 3, + "ORGMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x OrgMemberSearchKey) String() string { + return proto.EnumName(OrgMemberSearchKey_name, int32(x)) +} + +func (OrgMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +type ProjectState int32 + +const ( + ProjectState_PROJECTSTATE_UNSPECIFIED ProjectState = 0 + ProjectState_PROJECTSTATE_ACTIVE ProjectState = 1 + ProjectState_PROJECTSSTATE_INACTIVE ProjectState = 2 +) + +var ProjectState_name = map[int32]string{ + 0: "PROJECTSTATE_UNSPECIFIED", + 1: "PROJECTSTATE_ACTIVE", + 2: "PROJECTSSTATE_INACTIVE", +} + +var ProjectState_value = map[string]int32{ + "PROJECTSTATE_UNSPECIFIED": 0, + "PROJECTSTATE_ACTIVE": 1, + "PROJECTSSTATE_INACTIVE": 2, +} + +func (x ProjectState) String() string { + return proto.EnumName(ProjectState_name, int32(x)) +} + +func (ProjectState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +type ProjectType int32 + +const ( + ProjectType_PROJECTTYPE_UNKNOWN ProjectType = 0 + ProjectType_PROJECTTYPE_SELF ProjectType = 1 + ProjectType_PROJECTTYPE_GRANTED ProjectType = 2 +) + +var ProjectType_name = map[int32]string{ + 0: "PROJECTTYPE_UNKNOWN", + 1: "PROJECTTYPE_SELF", + 2: "PROJECTTYPE_GRANTED", +} + +var ProjectType_value = map[string]int32{ + "PROJECTTYPE_UNKNOWN": 0, + "PROJECTTYPE_SELF": 1, + "PROJECTTYPE_GRANTED": 2, +} + +func (x ProjectType) String() string { + return proto.EnumName(ProjectType_name, int32(x)) +} + +func (ProjectType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +type ProjectSearchKey int32 + +const ( + ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED ProjectSearchKey = 0 + ProjectSearchKey_PROJECTSEARCHKEY_PROJECT_NAME ProjectSearchKey = 1 +) + +var ProjectSearchKey_name = map[int32]string{ + 0: "PROJECTSEARCHKEY_UNSPECIFIED", + 1: "PROJECTSEARCHKEY_PROJECT_NAME", +} + +var ProjectSearchKey_value = map[string]int32{ + "PROJECTSEARCHKEY_UNSPECIFIED": 0, + "PROJECTSEARCHKEY_PROJECT_NAME": 1, +} + +func (x ProjectSearchKey) String() string { + return proto.EnumName(ProjectSearchKey_name, int32(x)) +} + +func (ProjectSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +type ProjectRoleSearchKey int32 + +const ( + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED ProjectRoleSearchKey = 0 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_NAME ProjectRoleSearchKey = 1 + ProjectRoleSearchKey_PROJECTROLESEARCHKEY_DISPLAY_NAME ProjectRoleSearchKey = 2 +) + +var ProjectRoleSearchKey_name = map[int32]string{ + 0: "PROJECTROLESEARCHKEY_UNSPECIFIED", + 1: "PROJECTROLESEARCHKEY_NAME", + 2: "PROJECTROLESEARCHKEY_DISPLAY_NAME", +} + +var ProjectRoleSearchKey_value = map[string]int32{ + "PROJECTROLESEARCHKEY_UNSPECIFIED": 0, + "PROJECTROLESEARCHKEY_NAME": 1, + "PROJECTROLESEARCHKEY_DISPLAY_NAME": 2, +} + +func (x ProjectRoleSearchKey) String() string { + return proto.EnumName(ProjectRoleSearchKey_name, int32(x)) +} + +func (ProjectRoleSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +type ProjectMemberSearchKey int32 + +const ( + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED ProjectMemberSearchKey = 0 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_FIRST_NAME ProjectMemberSearchKey = 1 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_LAST_NAME ProjectMemberSearchKey = 2 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_EMAIL ProjectMemberSearchKey = 3 + ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_USER_ID ProjectMemberSearchKey = 4 +) + +var ProjectMemberSearchKey_name = map[int32]string{ + 0: "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectMemberSearchKey_value = map[string]int32{ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectMemberSearchKey) String() string { + return proto.EnumName(ProjectMemberSearchKey_name, int32(x)) +} + +func (ProjectMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +type AppState int32 + +const ( + AppState_APPSTATE_UNSPECIFIED AppState = 0 + AppState_APPSTATE_ACTIVE AppState = 1 + AppState_APPSTATE_INACTIVE AppState = 2 +) + +var AppState_name = map[int32]string{ + 0: "APPSTATE_UNSPECIFIED", + 1: "APPSTATE_ACTIVE", + 2: "APPSTATE_INACTIVE", +} + +var AppState_value = map[string]int32{ + "APPSTATE_UNSPECIFIED": 0, + "APPSTATE_ACTIVE": 1, + "APPSTATE_INACTIVE": 2, +} + +func (x AppState) String() string { + return proto.EnumName(AppState_name, int32(x)) +} + +func (AppState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +type OIDCResponseType int32 + +const ( + OIDCResponseType_OIDCRESPONSETYPE_CODE OIDCResponseType = 0 + OIDCResponseType_OIDCRESPONSETYPE_ID_TOKEN OIDCResponseType = 1 + OIDCResponseType_OIDCRESPONSETYPE_TOKEN_ID_TOKEN OIDCResponseType = 2 +) + +var OIDCResponseType_name = map[int32]string{ + 0: "OIDCRESPONSETYPE_CODE", + 1: "OIDCRESPONSETYPE_ID_TOKEN", + 2: "OIDCRESPONSETYPE_TOKEN_ID_TOKEN", +} + +var OIDCResponseType_value = map[string]int32{ + "OIDCRESPONSETYPE_CODE": 0, + "OIDCRESPONSETYPE_ID_TOKEN": 1, + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN": 2, +} + +func (x OIDCResponseType) String() string { + return proto.EnumName(OIDCResponseType_name, int32(x)) +} + +func (OIDCResponseType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +type OIDCGrantType int32 + +const ( + OIDCGrantType_OIDCGRANTTYPE_AUTHORIZATION_CODE OIDCGrantType = 0 + OIDCGrantType_OIDCGRANTTYPE_IMPLICIT OIDCGrantType = 1 + OIDCGrantType_OIDCGRANTTYPE_REFRESH_TOKEN OIDCGrantType = 2 +) + +var OIDCGrantType_name = map[int32]string{ + 0: "OIDCGRANTTYPE_AUTHORIZATION_CODE", + 1: "OIDCGRANTTYPE_IMPLICIT", + 2: "OIDCGRANTTYPE_REFRESH_TOKEN", +} + +var OIDCGrantType_value = map[string]int32{ + "OIDCGRANTTYPE_AUTHORIZATION_CODE": 0, + "OIDCGRANTTYPE_IMPLICIT": 1, + "OIDCGRANTTYPE_REFRESH_TOKEN": 2, +} + +func (x OIDCGrantType) String() string { + return proto.EnumName(OIDCGrantType_name, int32(x)) +} + +func (OIDCGrantType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +type OIDCApplicationType int32 + +const ( + OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB OIDCApplicationType = 0 + OIDCApplicationType_OIDCAPPLICATIONTYPE_USER_AGENT OIDCApplicationType = 1 + OIDCApplicationType_OIDCAPPLICATIONTYPE_NATIVE OIDCApplicationType = 2 +) + +var OIDCApplicationType_name = map[int32]string{ + 0: "OIDCAPPLICATIONTYPE_WEB", + 1: "OIDCAPPLICATIONTYPE_USER_AGENT", + 2: "OIDCAPPLICATIONTYPE_NATIVE", +} + +var OIDCApplicationType_value = map[string]int32{ + "OIDCAPPLICATIONTYPE_WEB": 0, + "OIDCAPPLICATIONTYPE_USER_AGENT": 1, + "OIDCAPPLICATIONTYPE_NATIVE": 2, +} + +func (x OIDCApplicationType) String() string { + return proto.EnumName(OIDCApplicationType_name, int32(x)) +} + +func (OIDCApplicationType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +type OIDCAuthMethodType int32 + +const ( + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC OIDCAuthMethodType = 0 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_POST OIDCAuthMethodType = 1 + OIDCAuthMethodType_OIDCAUTHMETHODTYPE_NONE OIDCAuthMethodType = 2 +) + +var OIDCAuthMethodType_name = map[int32]string{ + 0: "OIDCAUTHMETHODTYPE_BASIC", + 1: "OIDCAUTHMETHODTYPE_POST", + 2: "OIDCAUTHMETHODTYPE_NONE", +} + +var OIDCAuthMethodType_value = map[string]int32{ + "OIDCAUTHMETHODTYPE_BASIC": 0, + "OIDCAUTHMETHODTYPE_POST": 1, + "OIDCAUTHMETHODTYPE_NONE": 2, +} + +func (x OIDCAuthMethodType) String() string { + return proto.EnumName(OIDCAuthMethodType_name, int32(x)) +} + +func (OIDCAuthMethodType) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +type ApplicationSearchKey int32 + +const ( + ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED ApplicationSearchKey = 0 + ApplicationSearchKey_APPLICATIONSEARCHKEY_APP_NAME ApplicationSearchKey = 1 +) + +var ApplicationSearchKey_name = map[int32]string{ + 0: "APPLICATIONSERACHKEY_UNSPECIFIED", + 1: "APPLICATIONSEARCHKEY_APP_NAME", +} + +var ApplicationSearchKey_value = map[string]int32{ + "APPLICATIONSERACHKEY_UNSPECIFIED": 0, + "APPLICATIONSEARCHKEY_APP_NAME": 1, +} + +func (x ApplicationSearchKey) String() string { + return proto.EnumName(ApplicationSearchKey_name, int32(x)) +} + +func (ApplicationSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +type ProjectGrantState int32 + +const ( + ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED ProjectGrantState = 0 + ProjectGrantState_PROJECTGRANTSTATE_ACTIVE ProjectGrantState = 1 + ProjectGrantState_PROJECTGRANTSTATE_INACTIVE ProjectGrantState = 2 +) + +var ProjectGrantState_name = map[int32]string{ + 0: "PROJECTGRANTSTATE_UNSPECIFIED", + 1: "PROJECTGRANTSTATE_ACTIVE", + 2: "PROJECTGRANTSTATE_INACTIVE", +} + +var ProjectGrantState_value = map[string]int32{ + "PROJECTGRANTSTATE_UNSPECIFIED": 0, + "PROJECTGRANTSTATE_ACTIVE": 1, + "PROJECTGRANTSTATE_INACTIVE": 2, +} + +func (x ProjectGrantState) String() string { + return proto.EnumName(ProjectGrantState_name, int32(x)) +} + +func (ProjectGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +type ProjectGrantMemberSearchKey int32 + +const ( + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED ProjectGrantMemberSearchKey = 0 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME ProjectGrantMemberSearchKey = 1 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME ProjectGrantMemberSearchKey = 2 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_EMAIL ProjectGrantMemberSearchKey = 3 + ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_USER_ID ProjectGrantMemberSearchKey = 4 +) + +var ProjectGrantMemberSearchKey_name = map[int32]string{ + 0: "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + 1: "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + 2: "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + 3: "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + 4: "PROJECTGRANTMEMBERSEARCHKEY_USER_ID", +} + +var ProjectGrantMemberSearchKey_value = map[string]int32{ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED": 0, + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME": 1, + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME": 2, + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL": 3, + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID": 4, +} + +func (x ProjectGrantMemberSearchKey) String() string { + return proto.EnumName(ProjectGrantMemberSearchKey_name, int32(x)) +} + +func (ProjectGrantMemberSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +type UserGrantState int32 + +const ( + UserGrantState_USERGRANTSTATE_UNSPECIFIED UserGrantState = 0 + UserGrantState_USERGRANTSTATE_ACTIVE UserGrantState = 1 + UserGrantState_USERGRANTSTATE_INACTIVE UserGrantState = 2 +) + +var UserGrantState_name = map[int32]string{ + 0: "USERGRANTSTATE_UNSPECIFIED", + 1: "USERGRANTSTATE_ACTIVE", + 2: "USERGRANTSTATE_INACTIVE", +} + +var UserGrantState_value = map[string]int32{ + "USERGRANTSTATE_UNSPECIFIED": 0, + "USERGRANTSTATE_ACTIVE": 1, + "USERGRANTSTATE_INACTIVE": 2, +} + +func (x UserGrantState) String() string { + return proto.EnumName(UserGrantState_name, int32(x)) +} + +func (UserGrantState) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +type UserGrantSearchKey int32 + +const ( + UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED UserGrantSearchKey = 0 + UserGrantSearchKey_USERGRANTSEARCHKEY_PROJECT_ID UserGrantSearchKey = 1 + UserGrantSearchKey_USERGRANTSEARCHKEY_USER_ID UserGrantSearchKey = 2 + UserGrantSearchKey_USERGRANTSEARCHKEY_ORG_ID UserGrantSearchKey = 3 +) + +var UserGrantSearchKey_name = map[int32]string{ + 0: "USERGRANTSEARCHKEY_UNSPECIFIED", + 1: "USERGRANTSEARCHKEY_PROJECT_ID", + 2: "USERGRANTSEARCHKEY_USER_ID", + 3: "USERGRANTSEARCHKEY_ORG_ID", +} + +var UserGrantSearchKey_value = map[string]int32{ + "USERGRANTSEARCHKEY_UNSPECIFIED": 0, + "USERGRANTSEARCHKEY_PROJECT_ID": 1, + "USERGRANTSEARCHKEY_USER_ID": 2, + "USERGRANTSEARCHKEY_ORG_ID": 3, +} + +func (x UserGrantSearchKey) String() string { + return proto.EnumName(UserGrantSearchKey_name, int32(x)) +} + +func (UserGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +type AuthGrantSearchKey int32 + +const ( + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED AuthGrantSearchKey = 0 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_ORG_ID AuthGrantSearchKey = 1 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_PROJECT_ID AuthGrantSearchKey = 2 + AuthGrantSearchKey_AUTHGRANTSEARCHKEY_USER_ID AuthGrantSearchKey = 3 +) + +var AuthGrantSearchKey_name = map[int32]string{ + 0: "AUTHGRANTSEARCHKEY_UNSPECIFIED", + 1: "AUTHGRANTSEARCHKEY_ORG_ID", + 2: "AUTHGRANTSEARCHKEY_PROJECT_ID", + 3: "AUTHGRANTSEARCHKEY_USER_ID", +} + +var AuthGrantSearchKey_value = map[string]int32{ + "AUTHGRANTSEARCHKEY_UNSPECIFIED": 0, + "AUTHGRANTSEARCHKEY_ORG_ID": 1, + "AUTHGRANTSEARCHKEY_PROJECT_ID": 2, + "AUTHGRANTSEARCHKEY_USER_ID": 3, +} + +func (x AuthGrantSearchKey) String() string { + return proto.EnumName(AuthGrantSearchKey_name, int32(x)) +} + +func (AuthGrantSearchKey) EnumDescriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +type ChangeRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SequenceOffset uint64 `protobuf:"varint,3,opt,name=sequence_offset,json=sequenceOffset,proto3" json:"sequence_offset,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeRequest) Reset() { *m = ChangeRequest{} } +func (m *ChangeRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeRequest) ProtoMessage() {} +func (*ChangeRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{0} +} + +func (m *ChangeRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeRequest.Unmarshal(m, b) +} +func (m *ChangeRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeRequest.Marshal(b, m, deterministic) +} +func (m *ChangeRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeRequest.Merge(m, src) +} +func (m *ChangeRequest) XXX_Size() int { + return xxx_messageInfo_ChangeRequest.Size(m) +} +func (m *ChangeRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeRequest proto.InternalMessageInfo + +func (m *ChangeRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ChangeRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ChangeRequest) GetSequenceOffset() uint64 { + if m != nil { + return m.SequenceOffset + } + return 0 +} + +type Changes struct { + Changes []*Change `protobuf:"bytes,1,rep,name=changes,proto3" json:"changes,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Changes) Reset() { *m = Changes{} } +func (m *Changes) String() string { return proto.CompactTextString(m) } +func (*Changes) ProtoMessage() {} +func (*Changes) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{1} +} + +func (m *Changes) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Changes.Unmarshal(m, b) +} +func (m *Changes) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Changes.Marshal(b, m, deterministic) +} +func (m *Changes) XXX_Merge(src proto.Message) { + xxx_messageInfo_Changes.Merge(m, src) +} +func (m *Changes) XXX_Size() int { + return xxx_messageInfo_Changes.Size(m) +} +func (m *Changes) XXX_DiscardUnknown() { + xxx_messageInfo_Changes.DiscardUnknown(m) +} + +var xxx_messageInfo_Changes proto.InternalMessageInfo + +func (m *Changes) GetChanges() []*Change { + if m != nil { + return m.Changes + } + return nil +} + +func (m *Changes) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *Changes) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type Change struct { + ChangeDate *timestamp.Timestamp `protobuf:"bytes,1,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + EventType string `protobuf:"bytes,2,opt,name=event_type,json=eventType,proto3" json:"event_type,omitempty"` + Sequence uint64 `protobuf:"varint,3,opt,name=sequence,proto3" json:"sequence,omitempty"` + Modifier string `protobuf:"bytes,4,opt,name=modifier,proto3" json:"modifier,omitempty"` + Data *_struct.Struct `protobuf:"bytes,5,opt,name=data,proto3" json:"data,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Change) Reset() { *m = Change{} } +func (m *Change) String() string { return proto.CompactTextString(m) } +func (*Change) ProtoMessage() {} +func (*Change) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{2} +} + +func (m *Change) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Change.Unmarshal(m, b) +} +func (m *Change) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Change.Marshal(b, m, deterministic) +} +func (m *Change) XXX_Merge(src proto.Message) { + xxx_messageInfo_Change.Merge(m, src) +} +func (m *Change) XXX_Size() int { + return xxx_messageInfo_Change.Size(m) +} +func (m *Change) XXX_DiscardUnknown() { + xxx_messageInfo_Change.DiscardUnknown(m) +} + +var xxx_messageInfo_Change proto.InternalMessageInfo + +func (m *Change) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Change) GetEventType() string { + if m != nil { + return m.EventType + } + return "" +} + +func (m *Change) GetSequence() uint64 { + if m != nil { + return m.Sequence + } + return 0 +} + +func (m *Change) GetModifier() string { + if m != nil { + return m.Modifier + } + return "" +} + +func (m *Change) GetData() *_struct.Struct { + if m != nil { + return m.Data + } + return nil +} + +type ApplicationID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationID) Reset() { *m = ApplicationID{} } +func (m *ApplicationID) String() string { return proto.CompactTextString(m) } +func (*ApplicationID) ProtoMessage() {} +func (*ApplicationID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{3} +} + +func (m *ApplicationID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationID.Unmarshal(m, b) +} +func (m *ApplicationID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationID.Marshal(b, m, deterministic) +} +func (m *ApplicationID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationID.Merge(m, src) +} +func (m *ApplicationID) XXX_Size() int { + return xxx_messageInfo_ApplicationID.Size(m) +} +func (m *ApplicationID) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationID.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationID proto.InternalMessageInfo + +func (m *ApplicationID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +type ProjectID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectID) Reset() { *m = ProjectID{} } +func (m *ProjectID) String() string { return proto.CompactTextString(m) } +func (*ProjectID) ProtoMessage() {} +func (*ProjectID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{4} +} + +func (m *ProjectID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectID.Unmarshal(m, b) +} +func (m *ProjectID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectID.Marshal(b, m, deterministic) +} +func (m *ProjectID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectID.Merge(m, src) +} +func (m *ProjectID) XXX_Size() int { + return xxx_messageInfo_ProjectID.Size(m) +} +func (m *ProjectID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectID proto.InternalMessageInfo + +func (m *ProjectID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserID) Reset() { *m = UserID{} } +func (m *UserID) String() string { return proto.CompactTextString(m) } +func (*UserID) ProtoMessage() {} +func (*UserID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{5} +} + +func (m *UserID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserID.Unmarshal(m, b) +} +func (m *UserID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserID.Marshal(b, m, deterministic) +} +func (m *UserID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserID.Merge(m, src) +} +func (m *UserID) XXX_Size() int { + return xxx_messageInfo_UserID.Size(m) +} +func (m *UserID) XXX_DiscardUnknown() { + xxx_messageInfo_UserID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserID proto.InternalMessageInfo + +func (m *UserID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type UserEmailID struct { + Email string `protobuf:"bytes,1,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmailID) Reset() { *m = UserEmailID{} } +func (m *UserEmailID) String() string { return proto.CompactTextString(m) } +func (*UserEmailID) ProtoMessage() {} +func (*UserEmailID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{6} +} + +func (m *UserEmailID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmailID.Unmarshal(m, b) +} +func (m *UserEmailID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmailID.Marshal(b, m, deterministic) +} +func (m *UserEmailID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmailID.Merge(m, src) +} +func (m *UserEmailID) XXX_Size() int { + return xxx_messageInfo_UserEmailID.Size(m) +} +func (m *UserEmailID) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmailID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmailID proto.InternalMessageInfo + +func (m *UserEmailID) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserRequest) Reset() { *m = UniqueUserRequest{} } +func (m *UniqueUserRequest) String() string { return proto.CompactTextString(m) } +func (*UniqueUserRequest) ProtoMessage() {} +func (*UniqueUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{7} +} + +func (m *UniqueUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserRequest.Unmarshal(m, b) +} +func (m *UniqueUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserRequest.Marshal(b, m, deterministic) +} +func (m *UniqueUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserRequest.Merge(m, src) +} +func (m *UniqueUserRequest) XXX_Size() int { + return xxx_messageInfo_UniqueUserRequest.Size(m) +} +func (m *UniqueUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserRequest proto.InternalMessageInfo + +func (m *UniqueUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UniqueUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +type UniqueUserResponse struct { + IsUnique bool `protobuf:"varint,1,opt,name=is_unique,json=isUnique,proto3" json:"is_unique,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UniqueUserResponse) Reset() { *m = UniqueUserResponse{} } +func (m *UniqueUserResponse) String() string { return proto.CompactTextString(m) } +func (*UniqueUserResponse) ProtoMessage() {} +func (*UniqueUserResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{8} +} + +func (m *UniqueUserResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UniqueUserResponse.Unmarshal(m, b) +} +func (m *UniqueUserResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UniqueUserResponse.Marshal(b, m, deterministic) +} +func (m *UniqueUserResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UniqueUserResponse.Merge(m, src) +} +func (m *UniqueUserResponse) XXX_Size() int { + return xxx_messageInfo_UniqueUserResponse.Size(m) +} +func (m *UniqueUserResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UniqueUserResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UniqueUserResponse proto.InternalMessageInfo + +func (m *UniqueUserResponse) GetIsUnique() bool { + if m != nil { + return m.IsUnique + } + return false +} + +type CreateUserRequest struct { + UserName string `protobuf:"bytes,1,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,8,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,9,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,11,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,12,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,13,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,14,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,15,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,16,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,17,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + Password string `protobuf:"bytes,18,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *CreateUserRequest) Reset() { *m = CreateUserRequest{} } +func (m *CreateUserRequest) String() string { return proto.CompactTextString(m) } +func (*CreateUserRequest) ProtoMessage() {} +func (*CreateUserRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{9} +} + +func (m *CreateUserRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_CreateUserRequest.Unmarshal(m, b) +} +func (m *CreateUserRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_CreateUserRequest.Marshal(b, m, deterministic) +} +func (m *CreateUserRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_CreateUserRequest.Merge(m, src) +} +func (m *CreateUserRequest) XXX_Size() int { + return xxx_messageInfo_CreateUserRequest.Size(m) +} +func (m *CreateUserRequest) XXX_DiscardUnknown() { + xxx_messageInfo_CreateUserRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_CreateUserRequest proto.InternalMessageInfo + +func (m *CreateUserRequest) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *CreateUserRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *CreateUserRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *CreateUserRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *CreateUserRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *CreateUserRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *CreateUserRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *CreateUserRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *CreateUserRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *CreateUserRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *CreateUserRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *CreateUserRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *CreateUserRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *CreateUserRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *CreateUserRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *CreateUserRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +func (m *CreateUserRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type User struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + LastLogin *timestamp.Timestamp `protobuf:"bytes,5,opt,name=last_login,json=lastLogin,proto3" json:"last_login,omitempty"` + PasswordChanged *timestamp.Timestamp `protobuf:"bytes,6,opt,name=password_changed,json=passwordChanged,proto3" json:"password_changed,omitempty"` + UserName string `protobuf:"bytes,7,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,8,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,9,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + DisplayName string `protobuf:"bytes,10,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + NickName string `protobuf:"bytes,11,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,12,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,13,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + Email string `protobuf:"bytes,14,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,15,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + Phone string `protobuf:"bytes,16,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,17,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + Country string `protobuf:"bytes,18,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,19,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,20,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,21,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,22,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *User) Reset() { *m = User{} } +func (m *User) String() string { return proto.CompactTextString(m) } +func (*User) ProtoMessage() {} +func (*User) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{10} +} + +func (m *User) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_User.Unmarshal(m, b) +} +func (m *User) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_User.Marshal(b, m, deterministic) +} +func (m *User) XXX_Merge(src proto.Message) { + xxx_messageInfo_User.Merge(m, src) +} +func (m *User) XXX_Size() int { + return xxx_messageInfo_User.Size(m) +} +func (m *User) XXX_DiscardUnknown() { + xxx_messageInfo_User.DiscardUnknown(m) +} + +var xxx_messageInfo_User proto.InternalMessageInfo + +func (m *User) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *User) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *User) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *User) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *User) GetLastLogin() *timestamp.Timestamp { + if m != nil { + return m.LastLogin + } + return nil +} + +func (m *User) GetPasswordChanged() *timestamp.Timestamp { + if m != nil { + return m.PasswordChanged + } + return nil +} + +func (m *User) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *User) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *User) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *User) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *User) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *User) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *User) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *User) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *User) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +func (m *User) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *User) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +func (m *User) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *User) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *User) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *User) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *User) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UserSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn UserSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*UserSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchRequest) Reset() { *m = UserSearchRequest{} } +func (m *UserSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserSearchRequest) ProtoMessage() {} +func (*UserSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{11} +} + +func (m *UserSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchRequest.Unmarshal(m, b) +} +func (m *UserSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchRequest.Merge(m, src) +} +func (m *UserSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserSearchRequest.Size(m) +} +func (m *UserSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchRequest proto.InternalMessageInfo + +func (m *UserSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchRequest) GetSortingColumn() UserSearchKey { + if m != nil { + return m.SortingColumn + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *UserSearchRequest) GetQueries() []*UserSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserSearchQuery struct { + Key UserSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchQuery) Reset() { *m = UserSearchQuery{} } +func (m *UserSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserSearchQuery) ProtoMessage() {} +func (*UserSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{12} +} + +func (m *UserSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchQuery.Unmarshal(m, b) +} +func (m *UserSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchQuery.Merge(m, src) +} +func (m *UserSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserSearchQuery.Size(m) +} +func (m *UserSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchQuery proto.InternalMessageInfo + +func (m *UserSearchQuery) GetKey() UserSearchKey { + if m != nil { + return m.Key + } + return UserSearchKey_USERSEARCHKEY_UNSPECIFIED +} + +func (m *UserSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*User `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserSearchResponse) Reset() { *m = UserSearchResponse{} } +func (m *UserSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserSearchResponse) ProtoMessage() {} +func (*UserSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{13} +} + +func (m *UserSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserSearchResponse.Unmarshal(m, b) +} +func (m *UserSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserSearchResponse.Merge(m, src) +} +func (m *UserSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserSearchResponse.Size(m) +} +func (m *UserSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserSearchResponse proto.InternalMessageInfo + +func (m *UserSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserSearchResponse) GetResult() []*User { + if m != nil { + return m.Result + } + return nil +} + +type UserProfile struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State UserState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserState" json:"state,omitempty"` + FirstName string `protobuf:"bytes,3,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,4,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,5,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,6,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,7,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,8,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserProfile) Reset() { *m = UserProfile{} } +func (m *UserProfile) String() string { return proto.CompactTextString(m) } +func (*UserProfile) ProtoMessage() {} +func (*UserProfile) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{14} +} + +func (m *UserProfile) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserProfile.Unmarshal(m, b) +} +func (m *UserProfile) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserProfile.Marshal(b, m, deterministic) +} +func (m *UserProfile) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserProfile.Merge(m, src) +} +func (m *UserProfile) XXX_Size() int { + return xxx_messageInfo_UserProfile.Size(m) +} +func (m *UserProfile) XXX_DiscardUnknown() { + xxx_messageInfo_UserProfile.DiscardUnknown(m) +} + +var xxx_messageInfo_UserProfile proto.InternalMessageInfo + +func (m *UserProfile) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserProfile) GetState() UserState { + if m != nil { + return m.State + } + return UserState_USERSTATE_UNSPECIFIED +} + +func (m *UserProfile) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserProfile) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserProfile) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UserProfile) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UserProfile) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UserProfile) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +func (m *UserProfile) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +type UpdateUserProfileRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + FirstName string `protobuf:"bytes,2,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,3,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + NickName string `protobuf:"bytes,4,opt,name=nick_name,json=nickName,proto3" json:"nick_name,omitempty"` + DisplayName string `protobuf:"bytes,5,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + PreferredLanguage string `protobuf:"bytes,6,opt,name=preferred_language,json=preferredLanguage,proto3" json:"preferred_language,omitempty"` + Gender Gender `protobuf:"varint,7,opt,name=gender,proto3,enum=caos.zitadel.management.api.v1.Gender" json:"gender,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserProfileRequest) Reset() { *m = UpdateUserProfileRequest{} } +func (m *UpdateUserProfileRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserProfileRequest) ProtoMessage() {} +func (*UpdateUserProfileRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{15} +} + +func (m *UpdateUserProfileRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserProfileRequest.Unmarshal(m, b) +} +func (m *UpdateUserProfileRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserProfileRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserProfileRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserProfileRequest.Merge(m, src) +} +func (m *UpdateUserProfileRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserProfileRequest.Size(m) +} +func (m *UpdateUserProfileRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserProfileRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserProfileRequest proto.InternalMessageInfo + +func (m *UpdateUserProfileRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserProfileRequest) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetNickName() string { + if m != nil { + return m.NickName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *UpdateUserProfileRequest) GetPreferredLanguage() string { + if m != nil { + return m.PreferredLanguage + } + return "" +} + +func (m *UpdateUserProfileRequest) GetGender() Gender { + if m != nil { + return m.Gender + } + return Gender_GENDER_UNSPECIFIED +} + +type UserEmail struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserEmail) Reset() { *m = UserEmail{} } +func (m *UserEmail) String() string { return proto.CompactTextString(m) } +func (*UserEmail) ProtoMessage() {} +func (*UserEmail) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{16} +} + +func (m *UserEmail) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserEmail.Unmarshal(m, b) +} +func (m *UserEmail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserEmail.Marshal(b, m, deterministic) +} +func (m *UserEmail) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserEmail.Merge(m, src) +} +func (m *UserEmail) XXX_Size() int { + return xxx_messageInfo_UserEmail.Size(m) +} +func (m *UserEmail) XXX_DiscardUnknown() { + xxx_messageInfo_UserEmail.DiscardUnknown(m) +} + +var xxx_messageInfo_UserEmail proto.InternalMessageInfo + +func (m *UserEmail) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserEmail) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserEmail) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UpdateUserEmailRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Email string `protobuf:"bytes,2,opt,name=email,proto3" json:"email,omitempty"` + IsEmailVerified bool `protobuf:"varint,3,opt,name=is_email_verified,json=isEmailVerified,proto3" json:"is_email_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserEmailRequest) Reset() { *m = UpdateUserEmailRequest{} } +func (m *UpdateUserEmailRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserEmailRequest) ProtoMessage() {} +func (*UpdateUserEmailRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{17} +} + +func (m *UpdateUserEmailRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserEmailRequest.Unmarshal(m, b) +} +func (m *UpdateUserEmailRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserEmailRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserEmailRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserEmailRequest.Merge(m, src) +} +func (m *UpdateUserEmailRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserEmailRequest.Size(m) +} +func (m *UpdateUserEmailRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserEmailRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserEmailRequest proto.InternalMessageInfo + +func (m *UpdateUserEmailRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserEmailRequest) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UpdateUserEmailRequest) GetIsEmailVerified() bool { + if m != nil { + return m.IsEmailVerified + } + return false +} + +type UserPhone struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserPhone) Reset() { *m = UserPhone{} } +func (m *UserPhone) String() string { return proto.CompactTextString(m) } +func (*UserPhone) ProtoMessage() {} +func (*UserPhone) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{18} +} + +func (m *UserPhone) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserPhone.Unmarshal(m, b) +} +func (m *UserPhone) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserPhone.Marshal(b, m, deterministic) +} +func (m *UserPhone) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserPhone.Merge(m, src) +} +func (m *UserPhone) XXX_Size() int { + return xxx_messageInfo_UserPhone.Size(m) +} +func (m *UserPhone) XXX_DiscardUnknown() { + xxx_messageInfo_UserPhone.DiscardUnknown(m) +} + +var xxx_messageInfo_UserPhone proto.InternalMessageInfo + +func (m *UserPhone) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserPhone) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UserPhone) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UpdateUserPhoneRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Phone string `protobuf:"bytes,2,opt,name=phone,proto3" json:"phone,omitempty"` + IsPhoneVerified bool `protobuf:"varint,3,opt,name=is_phone_verified,json=isPhoneVerified,proto3" json:"is_phone_verified,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserPhoneRequest) Reset() { *m = UpdateUserPhoneRequest{} } +func (m *UpdateUserPhoneRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserPhoneRequest) ProtoMessage() {} +func (*UpdateUserPhoneRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{19} +} + +func (m *UpdateUserPhoneRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserPhoneRequest.Unmarshal(m, b) +} +func (m *UpdateUserPhoneRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserPhoneRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserPhoneRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserPhoneRequest.Merge(m, src) +} +func (m *UpdateUserPhoneRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserPhoneRequest.Size(m) +} +func (m *UpdateUserPhoneRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserPhoneRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserPhoneRequest proto.InternalMessageInfo + +func (m *UpdateUserPhoneRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetPhone() string { + if m != nil { + return m.Phone + } + return "" +} + +func (m *UpdateUserPhoneRequest) GetIsPhoneVerified() bool { + if m != nil { + return m.IsPhoneVerified + } + return false +} + +type UserAddress struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserAddress) Reset() { *m = UserAddress{} } +func (m *UserAddress) String() string { return proto.CompactTextString(m) } +func (*UserAddress) ProtoMessage() {} +func (*UserAddress) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{20} +} + +func (m *UserAddress) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserAddress.Unmarshal(m, b) +} +func (m *UserAddress) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserAddress.Marshal(b, m, deterministic) +} +func (m *UserAddress) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserAddress.Merge(m, src) +} +func (m *UserAddress) XXX_Size() int { + return xxx_messageInfo_UserAddress.Size(m) +} +func (m *UserAddress) XXX_DiscardUnknown() { + xxx_messageInfo_UserAddress.DiscardUnknown(m) +} + +var xxx_messageInfo_UserAddress proto.InternalMessageInfo + +func (m *UserAddress) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserAddress) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UserAddress) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UserAddress) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UserAddress) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UserAddress) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type UpdateUserAddressRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Country string `protobuf:"bytes,2,opt,name=country,proto3" json:"country,omitempty"` + Locality string `protobuf:"bytes,3,opt,name=locality,proto3" json:"locality,omitempty"` + PostalCode string `protobuf:"bytes,4,opt,name=postal_code,json=postalCode,proto3" json:"postal_code,omitempty"` + Region string `protobuf:"bytes,5,opt,name=region,proto3" json:"region,omitempty"` + StreetAddress string `protobuf:"bytes,6,opt,name=street_address,json=streetAddress,proto3" json:"street_address,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UpdateUserAddressRequest) Reset() { *m = UpdateUserAddressRequest{} } +func (m *UpdateUserAddressRequest) String() string { return proto.CompactTextString(m) } +func (*UpdateUserAddressRequest) ProtoMessage() {} +func (*UpdateUserAddressRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{21} +} + +func (m *UpdateUserAddressRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UpdateUserAddressRequest.Unmarshal(m, b) +} +func (m *UpdateUserAddressRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UpdateUserAddressRequest.Marshal(b, m, deterministic) +} +func (m *UpdateUserAddressRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UpdateUserAddressRequest.Merge(m, src) +} +func (m *UpdateUserAddressRequest) XXX_Size() int { + return xxx_messageInfo_UpdateUserAddressRequest.Size(m) +} +func (m *UpdateUserAddressRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UpdateUserAddressRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UpdateUserAddressRequest proto.InternalMessageInfo + +func (m *UpdateUserAddressRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UpdateUserAddressRequest) GetCountry() string { + if m != nil { + return m.Country + } + return "" +} + +func (m *UpdateUserAddressRequest) GetLocality() string { + if m != nil { + return m.Locality + } + return "" +} + +func (m *UpdateUserAddressRequest) GetPostalCode() string { + if m != nil { + return m.PostalCode + } + return "" +} + +func (m *UpdateUserAddressRequest) GetRegion() string { + if m != nil { + return m.Region + } + return "" +} + +func (m *UpdateUserAddressRequest) GetStreetAddress() string { + if m != nil { + return m.StreetAddress + } + return "" +} + +type MultiFactors struct { + Mfas []*MultiFactor `protobuf:"bytes,1,rep,name=mfas,proto3" json:"mfas,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactors) Reset() { *m = MultiFactors{} } +func (m *MultiFactors) String() string { return proto.CompactTextString(m) } +func (*MultiFactors) ProtoMessage() {} +func (*MultiFactors) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{22} +} + +func (m *MultiFactors) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactors.Unmarshal(m, b) +} +func (m *MultiFactors) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactors.Marshal(b, m, deterministic) +} +func (m *MultiFactors) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactors.Merge(m, src) +} +func (m *MultiFactors) XXX_Size() int { + return xxx_messageInfo_MultiFactors.Size(m) +} +func (m *MultiFactors) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactors.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactors proto.InternalMessageInfo + +func (m *MultiFactors) GetMfas() []*MultiFactor { + if m != nil { + return m.Mfas + } + return nil +} + +type MultiFactor struct { + Type MfaType `protobuf:"varint,1,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.MfaType" json:"type,omitempty"` + State MFAState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.MFAState" json:"state,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *MultiFactor) Reset() { *m = MultiFactor{} } +func (m *MultiFactor) String() string { return proto.CompactTextString(m) } +func (*MultiFactor) ProtoMessage() {} +func (*MultiFactor) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{23} +} + +func (m *MultiFactor) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_MultiFactor.Unmarshal(m, b) +} +func (m *MultiFactor) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_MultiFactor.Marshal(b, m, deterministic) +} +func (m *MultiFactor) XXX_Merge(src proto.Message) { + xxx_messageInfo_MultiFactor.Merge(m, src) +} +func (m *MultiFactor) XXX_Size() int { + return xxx_messageInfo_MultiFactor.Size(m) +} +func (m *MultiFactor) XXX_DiscardUnknown() { + xxx_messageInfo_MultiFactor.DiscardUnknown(m) +} + +var xxx_messageInfo_MultiFactor proto.InternalMessageInfo + +func (m *MultiFactor) GetType() MfaType { + if m != nil { + return m.Type + } + return MfaType_MFATYPE_UNSPECIFIED +} + +func (m *MultiFactor) GetState() MFAState { + if m != nil { + return m.State + } + return MFAState_MFASTATE_UNSPECIFIED +} + +type PasswordID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordID) Reset() { *m = PasswordID{} } +func (m *PasswordID) String() string { return proto.CompactTextString(m) } +func (*PasswordID) ProtoMessage() {} +func (*PasswordID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{24} +} + +func (m *PasswordID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordID.Unmarshal(m, b) +} +func (m *PasswordID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordID.Marshal(b, m, deterministic) +} +func (m *PasswordID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordID.Merge(m, src) +} +func (m *PasswordID) XXX_Size() int { + return xxx_messageInfo_PasswordID.Size(m) +} +func (m *PasswordID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordID proto.InternalMessageInfo + +func (m *PasswordID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Password string `protobuf:"bytes,2,opt,name=password,proto3" json:"password,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordRequest) Reset() { *m = PasswordRequest{} } +func (m *PasswordRequest) String() string { return proto.CompactTextString(m) } +func (*PasswordRequest) ProtoMessage() {} +func (*PasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{25} +} + +func (m *PasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordRequest.Unmarshal(m, b) +} +func (m *PasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordRequest.Marshal(b, m, deterministic) +} +func (m *PasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordRequest.Merge(m, src) +} +func (m *PasswordRequest) XXX_Size() int { + return xxx_messageInfo_PasswordRequest.Size(m) +} +func (m *PasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordRequest proto.InternalMessageInfo + +func (m *PasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordRequest) GetPassword() string { + if m != nil { + return m.Password + } + return "" +} + +type ResetPasswordRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ResetPasswordRequest) Reset() { *m = ResetPasswordRequest{} } +func (m *ResetPasswordRequest) String() string { return proto.CompactTextString(m) } +func (*ResetPasswordRequest) ProtoMessage() {} +func (*ResetPasswordRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{26} +} + +func (m *ResetPasswordRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ResetPasswordRequest.Unmarshal(m, b) +} +func (m *ResetPasswordRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ResetPasswordRequest.Marshal(b, m, deterministic) +} +func (m *ResetPasswordRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ResetPasswordRequest.Merge(m, src) +} +func (m *ResetPasswordRequest) XXX_Size() int { + return xxx_messageInfo_ResetPasswordRequest.Size(m) +} +func (m *ResetPasswordRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ResetPasswordRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ResetPasswordRequest proto.InternalMessageInfo + +func (m *ResetPasswordRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type SetPasswordNotificationRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Type NotificationType `protobuf:"varint,2,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.NotificationType" json:"type,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *SetPasswordNotificationRequest) Reset() { *m = SetPasswordNotificationRequest{} } +func (m *SetPasswordNotificationRequest) String() string { return proto.CompactTextString(m) } +func (*SetPasswordNotificationRequest) ProtoMessage() {} +func (*SetPasswordNotificationRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{27} +} + +func (m *SetPasswordNotificationRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_SetPasswordNotificationRequest.Unmarshal(m, b) +} +func (m *SetPasswordNotificationRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_SetPasswordNotificationRequest.Marshal(b, m, deterministic) +} +func (m *SetPasswordNotificationRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_SetPasswordNotificationRequest.Merge(m, src) +} +func (m *SetPasswordNotificationRequest) XXX_Size() int { + return xxx_messageInfo_SetPasswordNotificationRequest.Size(m) +} +func (m *SetPasswordNotificationRequest) XXX_DiscardUnknown() { + xxx_messageInfo_SetPasswordNotificationRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_SetPasswordNotificationRequest proto.InternalMessageInfo + +func (m *SetPasswordNotificationRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *SetPasswordNotificationRequest) GetType() NotificationType { + if m != nil { + return m.Type + } + return NotificationType_NOTIFICATIONTYPE_EMAIL +} + +type PasswordComplexityPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyID) Reset() { *m = PasswordComplexityPolicyID{} } +func (m *PasswordComplexityPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyID) ProtoMessage() {} +func (*PasswordComplexityPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{28} +} + +func (m *PasswordComplexityPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyID.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyID.Merge(m, src) +} +func (m *PasswordComplexityPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyID.Size(m) +} +func (m *PasswordComplexityPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyID proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordComplexityPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MinLength uint64 `protobuf:"varint,6,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,7,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,8,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,9,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,10,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicy) Reset() { *m = PasswordComplexityPolicy{} } +func (m *PasswordComplexityPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicy) ProtoMessage() {} +func (*PasswordComplexityPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{29} +} + +func (m *PasswordComplexityPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicy.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicy.Merge(m, src) +} +func (m *PasswordComplexityPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicy.Size(m) +} +func (m *PasswordComplexityPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicy proto.InternalMessageInfo + +func (m *PasswordComplexityPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordComplexityPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordComplexityPolicy) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicy) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicy) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,2,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,3,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,4,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,5,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,6,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyCreate) Reset() { *m = PasswordComplexityPolicyCreate{} } +func (m *PasswordComplexityPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyCreate) ProtoMessage() {} +func (*PasswordComplexityPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{30} +} + +func (m *PasswordComplexityPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyCreate.Merge(m, src) +} +func (m *PasswordComplexityPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyCreate.Size(m) +} +func (m *PasswordComplexityPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyCreate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyCreate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyCreate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyCreate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordComplexityPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MinLength uint64 `protobuf:"varint,3,opt,name=min_length,json=minLength,proto3" json:"min_length,omitempty"` + HasLowercase bool `protobuf:"varint,4,opt,name=has_lowercase,json=hasLowercase,proto3" json:"has_lowercase,omitempty"` + HasUppercase bool `protobuf:"varint,5,opt,name=has_uppercase,json=hasUppercase,proto3" json:"has_uppercase,omitempty"` + HasNumber bool `protobuf:"varint,6,opt,name=has_number,json=hasNumber,proto3" json:"has_number,omitempty"` + HasSymbol bool `protobuf:"varint,7,opt,name=has_symbol,json=hasSymbol,proto3" json:"has_symbol,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordComplexityPolicyUpdate) Reset() { *m = PasswordComplexityPolicyUpdate{} } +func (m *PasswordComplexityPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordComplexityPolicyUpdate) ProtoMessage() {} +func (*PasswordComplexityPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{31} +} + +func (m *PasswordComplexityPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordComplexityPolicyUpdate.Merge(m, src) +} +func (m *PasswordComplexityPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordComplexityPolicyUpdate.Size(m) +} +func (m *PasswordComplexityPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordComplexityPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordComplexityPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordComplexityPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordComplexityPolicyUpdate) GetMinLength() uint64 { + if m != nil { + return m.MinLength + } + return 0 +} + +func (m *PasswordComplexityPolicyUpdate) GetHasLowercase() bool { + if m != nil { + return m.HasLowercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasUppercase() bool { + if m != nil { + return m.HasUppercase + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasNumber() bool { + if m != nil { + return m.HasNumber + } + return false +} + +func (m *PasswordComplexityPolicyUpdate) GetHasSymbol() bool { + if m != nil { + return m.HasSymbol + } + return false +} + +type PasswordAgePolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyID) Reset() { *m = PasswordAgePolicyID{} } +func (m *PasswordAgePolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyID) ProtoMessage() {} +func (*PasswordAgePolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{32} +} + +func (m *PasswordAgePolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyID.Unmarshal(m, b) +} +func (m *PasswordAgePolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyID.Merge(m, src) +} +func (m *PasswordAgePolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyID.Size(m) +} +func (m *PasswordAgePolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyID proto.InternalMessageInfo + +func (m *PasswordAgePolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordAgePolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,6,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,7,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicy) Reset() { *m = PasswordAgePolicy{} } +func (m *PasswordAgePolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicy) ProtoMessage() {} +func (*PasswordAgePolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{33} +} + +func (m *PasswordAgePolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicy.Unmarshal(m, b) +} +func (m *PasswordAgePolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicy.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicy.Merge(m, src) +} +func (m *PasswordAgePolicy) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicy.Size(m) +} +func (m *PasswordAgePolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicy proto.InternalMessageInfo + +func (m *PasswordAgePolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordAgePolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordAgePolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordAgePolicy) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicy) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,2,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,3,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyCreate) Reset() { *m = PasswordAgePolicyCreate{} } +func (m *PasswordAgePolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyCreate) ProtoMessage() {} +func (*PasswordAgePolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{34} +} + +func (m *PasswordAgePolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyCreate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyCreate.Merge(m, src) +} +func (m *PasswordAgePolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyCreate.Size(m) +} +func (m *PasswordAgePolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyCreate proto.InternalMessageInfo + +func (m *PasswordAgePolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyCreate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyCreate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordAgePolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAgeDays uint64 `protobuf:"varint,3,opt,name=max_age_days,json=maxAgeDays,proto3" json:"max_age_days,omitempty"` + ExpireWarnDays uint64 `protobuf:"varint,4,opt,name=expire_warn_days,json=expireWarnDays,proto3" json:"expire_warn_days,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordAgePolicyUpdate) Reset() { *m = PasswordAgePolicyUpdate{} } +func (m *PasswordAgePolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordAgePolicyUpdate) ProtoMessage() {} +func (*PasswordAgePolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{35} +} + +func (m *PasswordAgePolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordAgePolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordAgePolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordAgePolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordAgePolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordAgePolicyUpdate.Merge(m, src) +} +func (m *PasswordAgePolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordAgePolicyUpdate.Size(m) +} +func (m *PasswordAgePolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordAgePolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordAgePolicyUpdate proto.InternalMessageInfo + +func (m *PasswordAgePolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordAgePolicyUpdate) GetMaxAgeDays() uint64 { + if m != nil { + return m.MaxAgeDays + } + return 0 +} + +func (m *PasswordAgePolicyUpdate) GetExpireWarnDays() uint64 { + if m != nil { + return m.ExpireWarnDays + } + return 0 +} + +type PasswordLockoutPolicyID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyID) Reset() { *m = PasswordLockoutPolicyID{} } +func (m *PasswordLockoutPolicyID) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyID) ProtoMessage() {} +func (*PasswordLockoutPolicyID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{36} +} + +func (m *PasswordLockoutPolicyID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyID.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyID.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyID) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyID.Merge(m, src) +} +func (m *PasswordLockoutPolicyID) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyID.Size(m) +} +func (m *PasswordLockoutPolicyID) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyID.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyID proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type PasswordLockoutPolicy struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + State PolicyState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.PolicyState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + MaxAttempts uint64 `protobuf:"varint,6,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,7,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicy) Reset() { *m = PasswordLockoutPolicy{} } +func (m *PasswordLockoutPolicy) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicy) ProtoMessage() {} +func (*PasswordLockoutPolicy) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{37} +} + +func (m *PasswordLockoutPolicy) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicy.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicy.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicy) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicy.Merge(m, src) +} +func (m *PasswordLockoutPolicy) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicy.Size(m) +} +func (m *PasswordLockoutPolicy) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicy.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicy proto.InternalMessageInfo + +func (m *PasswordLockoutPolicy) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicy) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicy) GetState() PolicyState { + if m != nil { + return m.State + } + return PolicyState_POLICYSTATE_UNSPECIFIED +} + +func (m *PasswordLockoutPolicy) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *PasswordLockoutPolicy) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicy) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyCreate struct { + Description string `protobuf:"bytes,1,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,2,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,3,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyCreate) Reset() { *m = PasswordLockoutPolicyCreate{} } +func (m *PasswordLockoutPolicyCreate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyCreate) ProtoMessage() {} +func (*PasswordLockoutPolicyCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{38} +} + +func (m *PasswordLockoutPolicyCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyCreate.Merge(m, src) +} +func (m *PasswordLockoutPolicyCreate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyCreate.Size(m) +} +func (m *PasswordLockoutPolicyCreate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyCreate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyCreate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyCreate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyCreate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type PasswordLockoutPolicyUpdate struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"` + MaxAttempts uint64 `protobuf:"varint,3,opt,name=max_attempts,json=maxAttempts,proto3" json:"max_attempts,omitempty"` + ShowLockOutFailures bool `protobuf:"varint,4,opt,name=show_lock_out_failures,json=showLockOutFailures,proto3" json:"show_lock_out_failures,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *PasswordLockoutPolicyUpdate) Reset() { *m = PasswordLockoutPolicyUpdate{} } +func (m *PasswordLockoutPolicyUpdate) String() string { return proto.CompactTextString(m) } +func (*PasswordLockoutPolicyUpdate) ProtoMessage() {} +func (*PasswordLockoutPolicyUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{39} +} + +func (m *PasswordLockoutPolicyUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Unmarshal(m, b) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Marshal(b, m, deterministic) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_PasswordLockoutPolicyUpdate.Merge(m, src) +} +func (m *PasswordLockoutPolicyUpdate) XXX_Size() int { + return xxx_messageInfo_PasswordLockoutPolicyUpdate.Size(m) +} +func (m *PasswordLockoutPolicyUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_PasswordLockoutPolicyUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_PasswordLockoutPolicyUpdate proto.InternalMessageInfo + +func (m *PasswordLockoutPolicyUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetDescription() string { + if m != nil { + return m.Description + } + return "" +} + +func (m *PasswordLockoutPolicyUpdate) GetMaxAttempts() uint64 { + if m != nil { + return m.MaxAttempts + } + return 0 +} + +func (m *PasswordLockoutPolicyUpdate) GetShowLockOutFailures() bool { + if m != nil { + return m.ShowLockOutFailures + } + return false +} + +type OrgID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgID) Reset() { *m = OrgID{} } +func (m *OrgID) String() string { return proto.CompactTextString(m) } +func (*OrgID) ProtoMessage() {} +func (*OrgID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{40} +} + +func (m *OrgID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgID.Unmarshal(m, b) +} +func (m *OrgID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgID.Marshal(b, m, deterministic) +} +func (m *OrgID) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgID.Merge(m, src) +} +func (m *OrgID) XXX_Size() int { + return xxx_messageInfo_OrgID.Size(m) +} +func (m *OrgID) XXX_DiscardUnknown() { + xxx_messageInfo_OrgID.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgID proto.InternalMessageInfo + +func (m *OrgID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type OrgDomain struct { + Domain string `protobuf:"bytes,1,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgDomain) Reset() { *m = OrgDomain{} } +func (m *OrgDomain) String() string { return proto.CompactTextString(m) } +func (*OrgDomain) ProtoMessage() {} +func (*OrgDomain) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{41} +} + +func (m *OrgDomain) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgDomain.Unmarshal(m, b) +} +func (m *OrgDomain) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgDomain.Marshal(b, m, deterministic) +} +func (m *OrgDomain) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgDomain.Merge(m, src) +} +func (m *OrgDomain) XXX_Size() int { + return xxx_messageInfo_OrgDomain.Size(m) +} +func (m *OrgDomain) XXX_DiscardUnknown() { + xxx_messageInfo_OrgDomain.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgDomain proto.InternalMessageInfo + +func (m *OrgDomain) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type Org struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State OrgState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.OrgState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + Domain string `protobuf:"bytes,6,opt,name=domain,proto3" json:"domain,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Org) Reset() { *m = Org{} } +func (m *Org) String() string { return proto.CompactTextString(m) } +func (*Org) ProtoMessage() {} +func (*Org) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{42} +} + +func (m *Org) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Org.Unmarshal(m, b) +} +func (m *Org) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Org.Marshal(b, m, deterministic) +} +func (m *Org) XXX_Merge(src proto.Message) { + xxx_messageInfo_Org.Merge(m, src) +} +func (m *Org) XXX_Size() int { + return xxx_messageInfo_Org.Size(m) +} +func (m *Org) XXX_DiscardUnknown() { + xxx_messageInfo_Org.DiscardUnknown(m) +} + +var xxx_messageInfo_Org proto.InternalMessageInfo + +func (m *Org) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Org) GetState() OrgState { + if m != nil { + return m.State + } + return OrgState_ORGSTATE_UNSPECIFIED +} + +func (m *Org) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Org) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Org) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Org) GetDomain() string { + if m != nil { + return m.Domain + } + return "" +} + +type OrgMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberRoles) Reset() { *m = OrgMemberRoles{} } +func (m *OrgMemberRoles) String() string { return proto.CompactTextString(m) } +func (*OrgMemberRoles) ProtoMessage() {} +func (*OrgMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{43} +} + +func (m *OrgMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberRoles.Unmarshal(m, b) +} +func (m *OrgMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberRoles.Marshal(b, m, deterministic) +} +func (m *OrgMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberRoles.Merge(m, src) +} +func (m *OrgMemberRoles) XXX_Size() int { + return xxx_messageInfo_OrgMemberRoles.Size(m) +} +func (m *OrgMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberRoles proto.InternalMessageInfo + +func (m *OrgMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type OrgMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMember) Reset() { *m = OrgMember{} } +func (m *OrgMember) String() string { return proto.CompactTextString(m) } +func (*OrgMember) ProtoMessage() {} +func (*OrgMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{44} +} + +func (m *OrgMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMember.Unmarshal(m, b) +} +func (m *OrgMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMember.Marshal(b, m, deterministic) +} +func (m *OrgMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMember.Merge(m, src) +} +func (m *OrgMember) XXX_Size() int { + return xxx_messageInfo_OrgMember.Size(m) +} +func (m *OrgMember) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMember.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMember proto.InternalMessageInfo + +func (m *OrgMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *OrgMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *OrgMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *OrgMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *OrgMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *OrgMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *OrgMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *OrgMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type AddOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AddOrgMemberRequest) Reset() { *m = AddOrgMemberRequest{} } +func (m *AddOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*AddOrgMemberRequest) ProtoMessage() {} +func (*AddOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{45} +} + +func (m *AddOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AddOrgMemberRequest.Unmarshal(m, b) +} +func (m *AddOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AddOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *AddOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AddOrgMemberRequest.Merge(m, src) +} +func (m *AddOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_AddOrgMemberRequest.Size(m) +} +func (m *AddOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AddOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AddOrgMemberRequest proto.InternalMessageInfo + +func (m *AddOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AddOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AddOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ChangeOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ChangeOrgMemberRequest) Reset() { *m = ChangeOrgMemberRequest{} } +func (m *ChangeOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*ChangeOrgMemberRequest) ProtoMessage() {} +func (*ChangeOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{46} +} + +func (m *ChangeOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ChangeOrgMemberRequest.Unmarshal(m, b) +} +func (m *ChangeOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ChangeOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *ChangeOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ChangeOrgMemberRequest.Merge(m, src) +} +func (m *ChangeOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_ChangeOrgMemberRequest.Size(m) +} +func (m *ChangeOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ChangeOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ChangeOrgMemberRequest proto.InternalMessageInfo + +func (m *ChangeOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ChangeOrgMemberRequest) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type RemoveOrgMemberRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *RemoveOrgMemberRequest) Reset() { *m = RemoveOrgMemberRequest{} } +func (m *RemoveOrgMemberRequest) String() string { return proto.CompactTextString(m) } +func (*RemoveOrgMemberRequest) ProtoMessage() {} +func (*RemoveOrgMemberRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{47} +} + +func (m *RemoveOrgMemberRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_RemoveOrgMemberRequest.Unmarshal(m, b) +} +func (m *RemoveOrgMemberRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_RemoveOrgMemberRequest.Marshal(b, m, deterministic) +} +func (m *RemoveOrgMemberRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_RemoveOrgMemberRequest.Merge(m, src) +} +func (m *RemoveOrgMemberRequest) XXX_Size() int { + return xxx_messageInfo_RemoveOrgMemberRequest.Size(m) +} +func (m *RemoveOrgMemberRequest) XXX_DiscardUnknown() { + xxx_messageInfo_RemoveOrgMemberRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_RemoveOrgMemberRequest proto.InternalMessageInfo + +func (m *RemoveOrgMemberRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *RemoveOrgMemberRequest) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type OrgMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*OrgMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchResponse) Reset() { *m = OrgMemberSearchResponse{} } +func (m *OrgMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchResponse) ProtoMessage() {} +func (*OrgMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{48} +} + +func (m *OrgMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchResponse.Unmarshal(m, b) +} +func (m *OrgMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchResponse.Merge(m, src) +} +func (m *OrgMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchResponse.Size(m) +} +func (m *OrgMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchResponse proto.InternalMessageInfo + +func (m *OrgMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *OrgMemberSearchResponse) GetResult() []*OrgMember { + if m != nil { + return m.Result + } + return nil +} + +type OrgMemberSearchRequest struct { + OrgId string `protobuf:"bytes,1,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*OrgMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchRequest) Reset() { *m = OrgMemberSearchRequest{} } +func (m *OrgMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchRequest) ProtoMessage() {} +func (*OrgMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{49} +} + +func (m *OrgMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchRequest.Unmarshal(m, b) +} +func (m *OrgMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchRequest.Merge(m, src) +} +func (m *OrgMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchRequest.Size(m) +} +func (m *OrgMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchRequest proto.InternalMessageInfo + +func (m *OrgMemberSearchRequest) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *OrgMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *OrgMemberSearchRequest) GetQueries() []*OrgMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type OrgMemberSearchQuery struct { + Key OrgMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.OrgMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OrgMemberSearchQuery) Reset() { *m = OrgMemberSearchQuery{} } +func (m *OrgMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*OrgMemberSearchQuery) ProtoMessage() {} +func (*OrgMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{50} +} + +func (m *OrgMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OrgMemberSearchQuery.Unmarshal(m, b) +} +func (m *OrgMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OrgMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *OrgMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_OrgMemberSearchQuery.Merge(m, src) +} +func (m *OrgMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_OrgMemberSearchQuery.Size(m) +} +func (m *OrgMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_OrgMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_OrgMemberSearchQuery proto.InternalMessageInfo + +func (m *OrgMemberSearchQuery) GetKey() OrgMemberSearchKey { + if m != nil { + return m.Key + } + return OrgMemberSearchKey_ORGMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *OrgMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *OrgMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectCreateRequest struct { + Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectCreateRequest) Reset() { *m = ProjectCreateRequest{} } +func (m *ProjectCreateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectCreateRequest) ProtoMessage() {} +func (*ProjectCreateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{51} +} + +func (m *ProjectCreateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectCreateRequest.Unmarshal(m, b) +} +func (m *ProjectCreateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectCreateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectCreateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectCreateRequest.Merge(m, src) +} +func (m *ProjectCreateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectCreateRequest.Size(m) +} +func (m *ProjectCreateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectCreateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectCreateRequest proto.InternalMessageInfo + +func (m *ProjectCreateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectUpdateRequest struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUpdateRequest) Reset() { *m = ProjectUpdateRequest{} } +func (m *ProjectUpdateRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUpdateRequest) ProtoMessage() {} +func (*ProjectUpdateRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{52} +} + +func (m *ProjectUpdateRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUpdateRequest.Unmarshal(m, b) +} +func (m *ProjectUpdateRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUpdateRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUpdateRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUpdateRequest.Merge(m, src) +} +func (m *ProjectUpdateRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUpdateRequest.Size(m) +} +func (m *ProjectUpdateRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUpdateRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUpdateRequest proto.InternalMessageInfo + +func (m *ProjectUpdateRequest) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUpdateRequest) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type Projects struct { + Projects []*Project `protobuf:"bytes,1,rep,name=projects,proto3" json:"projects,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Projects) Reset() { *m = Projects{} } +func (m *Projects) String() string { return proto.CompactTextString(m) } +func (*Projects) ProtoMessage() {} +func (*Projects) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{53} +} + +func (m *Projects) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Projects.Unmarshal(m, b) +} +func (m *Projects) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Projects.Marshal(b, m, deterministic) +} +func (m *Projects) XXX_Merge(src proto.Message) { + xxx_messageInfo_Projects.Merge(m, src) +} +func (m *Projects) XXX_Size() int { + return xxx_messageInfo_Projects.Size(m) +} +func (m *Projects) XXX_DiscardUnknown() { + xxx_messageInfo_Projects.DiscardUnknown(m) +} + +var xxx_messageInfo_Projects proto.InternalMessageInfo + +func (m *Projects) GetProjects() []*Project { + if m != nil { + return m.Projects + } + return nil +} + +type Project struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + State ProjectState `protobuf:"varint,3,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectState" json:"state,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,5,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Type ProjectType `protobuf:"varint,6,opt,name=type,proto3,enum=caos.zitadel.management.api.v1.ProjectType" json:"type,omitempty"` + ResourceOwner string `protobuf:"bytes,7,opt,name=resource_owner,json=resourceOwner,proto3" json:"resource_owner,omitempty"` + OrgId string `protobuf:"bytes,8,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + OrgName string `protobuf:"bytes,9,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,10,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + GrantId string `protobuf:"bytes,11,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Project) Reset() { *m = Project{} } +func (m *Project) String() string { return proto.CompactTextString(m) } +func (*Project) ProtoMessage() {} +func (*Project) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{54} +} + +func (m *Project) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Project.Unmarshal(m, b) +} +func (m *Project) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Project.Marshal(b, m, deterministic) +} +func (m *Project) XXX_Merge(src proto.Message) { + xxx_messageInfo_Project.Merge(m, src) +} +func (m *Project) XXX_Size() int { + return xxx_messageInfo_Project.Size(m) +} +func (m *Project) XXX_DiscardUnknown() { + xxx_messageInfo_Project.DiscardUnknown(m) +} + +var xxx_messageInfo_Project proto.InternalMessageInfo + +func (m *Project) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Project) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *Project) GetState() ProjectState { + if m != nil { + return m.State + } + return ProjectState_PROJECTSTATE_UNSPECIFIED +} + +func (m *Project) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Project) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Project) GetType() ProjectType { + if m != nil { + return m.Type + } + return ProjectType_PROJECTTYPE_UNKNOWN +} + +func (m *Project) GetResourceOwner() string { + if m != nil { + return m.ResourceOwner + } + return "" +} + +func (m *Project) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *Project) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *Project) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *Project) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +type ProjectSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Project `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchResponse) Reset() { *m = ProjectSearchResponse{} } +func (m *ProjectSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchResponse) ProtoMessage() {} +func (*ProjectSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{55} +} + +func (m *ProjectSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchResponse.Unmarshal(m, b) +} +func (m *ProjectSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchResponse.Merge(m, src) +} +func (m *ProjectSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectSearchResponse.Size(m) +} +func (m *ProjectSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchResponse proto.InternalMessageInfo + +func (m *ProjectSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectSearchResponse) GetResult() []*Project { + if m != nil { + return m.Result + } + return nil +} + +type ProjectSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchRequest) Reset() { *m = ProjectSearchRequest{} } +func (m *ProjectSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchRequest) ProtoMessage() {} +func (*ProjectSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{56} +} + +func (m *ProjectSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchRequest.Unmarshal(m, b) +} +func (m *ProjectSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchRequest.Merge(m, src) +} +func (m *ProjectSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectSearchRequest.Size(m) +} +func (m *ProjectSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchRequest proto.InternalMessageInfo + +func (m *ProjectSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectSearchRequest) GetQueries() []*ProjectSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectSearchQuery struct { + Key ProjectSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectSearchQuery) Reset() { *m = ProjectSearchQuery{} } +func (m *ProjectSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectSearchQuery) ProtoMessage() {} +func (*ProjectSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{57} +} + +func (m *ProjectSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectSearchQuery.Unmarshal(m, b) +} +func (m *ProjectSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectSearchQuery.Merge(m, src) +} +func (m *ProjectSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectSearchQuery.Size(m) +} +func (m *ProjectSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectSearchQuery proto.InternalMessageInfo + +func (m *ProjectSearchQuery) GetKey() ProjectSearchKey { + if m != nil { + return m.Key + } + return ProjectSearchKey_PROJECTSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRoles) Reset() { *m = ProjectMemberRoles{} } +func (m *ProjectMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRoles) ProtoMessage() {} +func (*ProjectMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{58} +} + +func (m *ProjectMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRoles.Unmarshal(m, b) +} +func (m *ProjectMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRoles.Merge(m, src) +} +func (m *ProjectMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRoles.Size(m) +} +func (m *ProjectMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRoles proto.InternalMessageInfo + +func (m *ProjectMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMember) Reset() { *m = ProjectMember{} } +func (m *ProjectMember) String() string { return proto.CompactTextString(m) } +func (*ProjectMember) ProtoMessage() {} +func (*ProjectMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{59} +} + +func (m *ProjectMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMember.Unmarshal(m, b) +} +func (m *ProjectMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMember.Marshal(b, m, deterministic) +} +func (m *ProjectMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMember.Merge(m, src) +} +func (m *ProjectMember) XXX_Size() int { + return xxx_messageInfo_ProjectMember.Size(m) +} +func (m *ProjectMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMember proto.InternalMessageInfo + +func (m *ProjectMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectMemberAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberAdd) Reset() { *m = ProjectMemberAdd{} } +func (m *ProjectMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberAdd) ProtoMessage() {} +func (*ProjectMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{60} +} + +func (m *ProjectMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberAdd.Unmarshal(m, b) +} +func (m *ProjectMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberAdd.Merge(m, src) +} +func (m *ProjectMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectMemberAdd.Size(m) +} +func (m *ProjectMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberAdd proto.InternalMessageInfo + +func (m *ProjectMemberAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberChange struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,3,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberChange) Reset() { *m = ProjectMemberChange{} } +func (m *ProjectMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberChange) ProtoMessage() {} +func (*ProjectMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{61} +} + +func (m *ProjectMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberChange.Unmarshal(m, b) +} +func (m *ProjectMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberChange.Merge(m, src) +} +func (m *ProjectMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectMemberChange.Size(m) +} +func (m *ProjectMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberChange proto.InternalMessageInfo + +func (m *ProjectMemberChange) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectMemberRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberRemove) Reset() { *m = ProjectMemberRemove{} } +func (m *ProjectMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberRemove) ProtoMessage() {} +func (*ProjectMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{62} +} + +func (m *ProjectMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberRemove.Unmarshal(m, b) +} +func (m *ProjectMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberRemove.Merge(m, src) +} +func (m *ProjectMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectMemberRemove.Size(m) +} +func (m *ProjectMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberRemove proto.InternalMessageInfo + +func (m *ProjectMemberRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectRoleAdd struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + Group string `protobuf:"bytes,4,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleAdd) Reset() { *m = ProjectRoleAdd{} } +func (m *ProjectRoleAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleAdd) ProtoMessage() {} +func (*ProjectRoleAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{63} +} + +func (m *ProjectRoleAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleAdd.Unmarshal(m, b) +} +func (m *ProjectRoleAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleAdd.Marshal(b, m, deterministic) +} +func (m *ProjectRoleAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleAdd.Merge(m, src) +} +func (m *ProjectRoleAdd) XXX_Size() int { + return xxx_messageInfo_ProjectRoleAdd.Size(m) +} +func (m *ProjectRoleAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleAdd proto.InternalMessageInfo + +func (m *ProjectRoleAdd) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleAdd) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRoleAdd) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRoleAdd) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRole struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + DisplayName string `protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + Group string `protobuf:"bytes,5,opt,name=group,proto3" json:"group,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRole) Reset() { *m = ProjectRole{} } +func (m *ProjectRole) String() string { return proto.CompactTextString(m) } +func (*ProjectRole) ProtoMessage() {} +func (*ProjectRole) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{64} +} + +func (m *ProjectRole) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRole.Unmarshal(m, b) +} +func (m *ProjectRole) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRole.Marshal(b, m, deterministic) +} +func (m *ProjectRole) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRole.Merge(m, src) +} +func (m *ProjectRole) XXX_Size() int { + return xxx_messageInfo_ProjectRole.Size(m) +} +func (m *ProjectRole) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRole.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRole proto.InternalMessageInfo + +func (m *ProjectRole) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRole) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *ProjectRole) GetDisplayName() string { + if m != nil { + return m.DisplayName + } + return "" +} + +func (m *ProjectRole) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectRole) GetGroup() string { + if m != nil { + return m.Group + } + return "" +} + +type ProjectRoleRemove struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleRemove) Reset() { *m = ProjectRoleRemove{} } +func (m *ProjectRoleRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleRemove) ProtoMessage() {} +func (*ProjectRoleRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{65} +} + +func (m *ProjectRoleRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleRemove.Unmarshal(m, b) +} +func (m *ProjectRoleRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleRemove.Marshal(b, m, deterministic) +} +func (m *ProjectRoleRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleRemove.Merge(m, src) +} +func (m *ProjectRoleRemove) XXX_Size() int { + return xxx_messageInfo_ProjectRoleRemove.Size(m) +} +func (m *ProjectRoleRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleRemove proto.InternalMessageInfo + +func (m *ProjectRoleRemove) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectRoleRemove) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type ProjectRoleSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectRole `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchResponse) Reset() { *m = ProjectRoleSearchResponse{} } +func (m *ProjectRoleSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchResponse) ProtoMessage() {} +func (*ProjectRoleSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{66} +} + +func (m *ProjectRoleSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchResponse.Unmarshal(m, b) +} +func (m *ProjectRoleSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchResponse.Merge(m, src) +} +func (m *ProjectRoleSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchResponse.Size(m) +} +func (m *ProjectRoleSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchResponse proto.InternalMessageInfo + +func (m *ProjectRoleSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectRoleSearchResponse) GetResult() []*ProjectRole { + if m != nil { + return m.Result + } + return nil +} + +type ProjectRoleSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectRoleSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchRequest) Reset() { *m = ProjectRoleSearchRequest{} } +func (m *ProjectRoleSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchRequest) ProtoMessage() {} +func (*ProjectRoleSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{67} +} + +func (m *ProjectRoleSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchRequest.Unmarshal(m, b) +} +func (m *ProjectRoleSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchRequest.Merge(m, src) +} +func (m *ProjectRoleSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchRequest.Size(m) +} +func (m *ProjectRoleSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchRequest proto.InternalMessageInfo + +func (m *ProjectRoleSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectRoleSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectRoleSearchRequest) GetQueries() []*ProjectRoleSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectRoleSearchQuery struct { + Key ProjectRoleSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectRoleSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectRoleSearchQuery) Reset() { *m = ProjectRoleSearchQuery{} } +func (m *ProjectRoleSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectRoleSearchQuery) ProtoMessage() {} +func (*ProjectRoleSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{68} +} + +func (m *ProjectRoleSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectRoleSearchQuery.Unmarshal(m, b) +} +func (m *ProjectRoleSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectRoleSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectRoleSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectRoleSearchQuery.Merge(m, src) +} +func (m *ProjectRoleSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectRoleSearchQuery.Size(m) +} +func (m *ProjectRoleSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectRoleSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectRoleSearchQuery proto.InternalMessageInfo + +func (m *ProjectRoleSearchQuery) GetKey() ProjectRoleSearchKey { + if m != nil { + return m.Key + } + return ProjectRoleSearchKey_PROJECTROLESEARCHKEY_UNSPECIFIED +} + +func (m *ProjectRoleSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectRoleSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchResponse) Reset() { *m = ProjectMemberSearchResponse{} } +func (m *ProjectMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchResponse) ProtoMessage() {} +func (*ProjectMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{69} +} + +func (m *ProjectMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchResponse.Merge(m, src) +} +func (m *ProjectMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchResponse.Size(m) +} +func (m *ProjectMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectMemberSearchResponse) GetResult() []*ProjectMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectMemberSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchRequest) Reset() { *m = ProjectMemberSearchRequest{} } +func (m *ProjectMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchRequest) ProtoMessage() {} +func (*ProjectMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{70} +} + +func (m *ProjectMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchRequest.Merge(m, src) +} +func (m *ProjectMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchRequest.Size(m) +} +func (m *ProjectMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectMemberSearchRequest) GetQueries() []*ProjectMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectMemberSearchQuery struct { + Key ProjectMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectMemberSearchQuery) Reset() { *m = ProjectMemberSearchQuery{} } +func (m *ProjectMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectMemberSearchQuery) ProtoMessage() {} +func (*ProjectMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{71} +} + +func (m *ProjectMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectMemberSearchQuery.Merge(m, src) +} +func (m *ProjectMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectMemberSearchQuery.Size(m) +} +func (m *ProjectMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectMemberSearchQuery) GetKey() ProjectMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectMemberSearchKey_PROJECTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type Application struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + State AppState `protobuf:"varint,2,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.AppState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,3,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,4,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + // Types that are valid to be assigned to AppConfig: + // *Application_OidcConfig + AppConfig isApplication_AppConfig `protobuf_oneof:"app_config"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *Application) Reset() { *m = Application{} } +func (m *Application) String() string { return proto.CompactTextString(m) } +func (*Application) ProtoMessage() {} +func (*Application) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{72} +} + +func (m *Application) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_Application.Unmarshal(m, b) +} +func (m *Application) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_Application.Marshal(b, m, deterministic) +} +func (m *Application) XXX_Merge(src proto.Message) { + xxx_messageInfo_Application.Merge(m, src) +} +func (m *Application) XXX_Size() int { + return xxx_messageInfo_Application.Size(m) +} +func (m *Application) XXX_DiscardUnknown() { + xxx_messageInfo_Application.DiscardUnknown(m) +} + +var xxx_messageInfo_Application proto.InternalMessageInfo + +func (m *Application) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *Application) GetState() AppState { + if m != nil { + return m.State + } + return AppState_APPSTATE_UNSPECIFIED +} + +func (m *Application) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *Application) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *Application) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type isApplication_AppConfig interface { + isApplication_AppConfig() +} + +type Application_OidcConfig struct { + OidcConfig *OIDCConfig `protobuf:"bytes,8,opt,name=oidc_config,json=oidcConfig,proto3,oneof"` +} + +func (*Application_OidcConfig) isApplication_AppConfig() {} + +func (m *Application) GetAppConfig() isApplication_AppConfig { + if m != nil { + return m.AppConfig + } + return nil +} + +func (m *Application) GetOidcConfig() *OIDCConfig { + if x, ok := m.GetAppConfig().(*Application_OidcConfig); ok { + return x.OidcConfig + } + return nil +} + +// XXX_OneofWrappers is for the internal use of the proto package. +func (*Application) XXX_OneofWrappers() []interface{} { + return []interface{}{ + (*Application_OidcConfig)(nil), + } +} + +type ApplicationUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationUpdate) Reset() { *m = ApplicationUpdate{} } +func (m *ApplicationUpdate) String() string { return proto.CompactTextString(m) } +func (*ApplicationUpdate) ProtoMessage() {} +func (*ApplicationUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{73} +} + +func (m *ApplicationUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationUpdate.Unmarshal(m, b) +} +func (m *ApplicationUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationUpdate.Marshal(b, m, deterministic) +} +func (m *ApplicationUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationUpdate.Merge(m, src) +} +func (m *ApplicationUpdate) XXX_Size() int { + return xxx_messageInfo_ApplicationUpdate.Size(m) +} +func (m *ApplicationUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationUpdate proto.InternalMessageInfo + +func (m *ApplicationUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ApplicationUpdate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +type OIDCConfig struct { + RedirectUris []string `protobuf:"bytes,1,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,2,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,3,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,4,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + ClientId string `protobuf:"bytes,5,opt,name=client_id,json=clientId,proto3" json:"client_id,omitempty"` + ClientSecret string `protobuf:"bytes,6,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfig) Reset() { *m = OIDCConfig{} } +func (m *OIDCConfig) String() string { return proto.CompactTextString(m) } +func (*OIDCConfig) ProtoMessage() {} +func (*OIDCConfig) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{74} +} + +func (m *OIDCConfig) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfig.Unmarshal(m, b) +} +func (m *OIDCConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfig.Marshal(b, m, deterministic) +} +func (m *OIDCConfig) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfig.Merge(m, src) +} +func (m *OIDCConfig) XXX_Size() int { + return xxx_messageInfo_OIDCConfig.Size(m) +} +func (m *OIDCConfig) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfig.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfig proto.InternalMessageInfo + +func (m *OIDCConfig) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfig) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfig) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfig) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfig) GetClientId() string { + if m != nil { + return m.ClientId + } + return "" +} + +func (m *OIDCConfig) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +func (m *OIDCConfig) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfig) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCApplicationCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCApplicationCreate) Reset() { *m = OIDCApplicationCreate{} } +func (m *OIDCApplicationCreate) String() string { return proto.CompactTextString(m) } +func (*OIDCApplicationCreate) ProtoMessage() {} +func (*OIDCApplicationCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{75} +} + +func (m *OIDCApplicationCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCApplicationCreate.Unmarshal(m, b) +} +func (m *OIDCApplicationCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCApplicationCreate.Marshal(b, m, deterministic) +} +func (m *OIDCApplicationCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCApplicationCreate.Merge(m, src) +} +func (m *OIDCApplicationCreate) XXX_Size() int { + return xxx_messageInfo_OIDCApplicationCreate.Size(m) +} +func (m *OIDCApplicationCreate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCApplicationCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCApplicationCreate proto.InternalMessageInfo + +func (m *OIDCApplicationCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCApplicationCreate) GetName() string { + if m != nil { + return m.Name + } + return "" +} + +func (m *OIDCApplicationCreate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCApplicationCreate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCApplicationCreate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCApplicationCreate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCApplicationCreate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type OIDCConfigUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + ApplicationId string `protobuf:"bytes,2,opt,name=application_id,json=applicationId,proto3" json:"application_id,omitempty"` + RedirectUris []string `protobuf:"bytes,3,rep,name=redirect_uris,json=redirectUris,proto3" json:"redirect_uris,omitempty"` + ResponseTypes []OIDCResponseType `protobuf:"varint,4,rep,packed,name=response_types,json=responseTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCResponseType" json:"response_types,omitempty"` + GrantTypes []OIDCGrantType `protobuf:"varint,5,rep,packed,name=grant_types,json=grantTypes,proto3,enum=caos.zitadel.management.api.v1.OIDCGrantType" json:"grant_types,omitempty"` + ApplicationType OIDCApplicationType `protobuf:"varint,6,opt,name=application_type,json=applicationType,proto3,enum=caos.zitadel.management.api.v1.OIDCApplicationType" json:"application_type,omitempty"` + AuthMethodType OIDCAuthMethodType `protobuf:"varint,7,opt,name=auth_method_type,json=authMethodType,proto3,enum=caos.zitadel.management.api.v1.OIDCAuthMethodType" json:"auth_method_type,omitempty"` + PostLogoutRedirectUris []string `protobuf:"bytes,8,rep,name=post_logout_redirect_uris,json=postLogoutRedirectUris,proto3" json:"post_logout_redirect_uris,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *OIDCConfigUpdate) Reset() { *m = OIDCConfigUpdate{} } +func (m *OIDCConfigUpdate) String() string { return proto.CompactTextString(m) } +func (*OIDCConfigUpdate) ProtoMessage() {} +func (*OIDCConfigUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{76} +} + +func (m *OIDCConfigUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_OIDCConfigUpdate.Unmarshal(m, b) +} +func (m *OIDCConfigUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_OIDCConfigUpdate.Marshal(b, m, deterministic) +} +func (m *OIDCConfigUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_OIDCConfigUpdate.Merge(m, src) +} +func (m *OIDCConfigUpdate) XXX_Size() int { + return xxx_messageInfo_OIDCConfigUpdate.Size(m) +} +func (m *OIDCConfigUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_OIDCConfigUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_OIDCConfigUpdate proto.InternalMessageInfo + +func (m *OIDCConfigUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *OIDCConfigUpdate) GetApplicationId() string { + if m != nil { + return m.ApplicationId + } + return "" +} + +func (m *OIDCConfigUpdate) GetRedirectUris() []string { + if m != nil { + return m.RedirectUris + } + return nil +} + +func (m *OIDCConfigUpdate) GetResponseTypes() []OIDCResponseType { + if m != nil { + return m.ResponseTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetGrantTypes() []OIDCGrantType { + if m != nil { + return m.GrantTypes + } + return nil +} + +func (m *OIDCConfigUpdate) GetApplicationType() OIDCApplicationType { + if m != nil { + return m.ApplicationType + } + return OIDCApplicationType_OIDCAPPLICATIONTYPE_WEB +} + +func (m *OIDCConfigUpdate) GetAuthMethodType() OIDCAuthMethodType { + if m != nil { + return m.AuthMethodType + } + return OIDCAuthMethodType_OIDCAUTHMETHODTYPE_BASIC +} + +func (m *OIDCConfigUpdate) GetPostLogoutRedirectUris() []string { + if m != nil { + return m.PostLogoutRedirectUris + } + return nil +} + +type ClientSecret struct { + ClientSecret string `protobuf:"bytes,1,opt,name=client_secret,json=clientSecret,proto3" json:"client_secret,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ClientSecret) Reset() { *m = ClientSecret{} } +func (m *ClientSecret) String() string { return proto.CompactTextString(m) } +func (*ClientSecret) ProtoMessage() {} +func (*ClientSecret) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{77} +} + +func (m *ClientSecret) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ClientSecret.Unmarshal(m, b) +} +func (m *ClientSecret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ClientSecret.Marshal(b, m, deterministic) +} +func (m *ClientSecret) XXX_Merge(src proto.Message) { + xxx_messageInfo_ClientSecret.Merge(m, src) +} +func (m *ClientSecret) XXX_Size() int { + return xxx_messageInfo_ClientSecret.Size(m) +} +func (m *ClientSecret) XXX_DiscardUnknown() { + xxx_messageInfo_ClientSecret.DiscardUnknown(m) +} + +var xxx_messageInfo_ClientSecret proto.InternalMessageInfo + +func (m *ClientSecret) GetClientSecret() string { + if m != nil { + return m.ClientSecret + } + return "" +} + +type ApplicationSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*Application `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchResponse) Reset() { *m = ApplicationSearchResponse{} } +func (m *ApplicationSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchResponse) ProtoMessage() {} +func (*ApplicationSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{78} +} + +func (m *ApplicationSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchResponse.Unmarshal(m, b) +} +func (m *ApplicationSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchResponse.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchResponse.Merge(m, src) +} +func (m *ApplicationSearchResponse) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchResponse.Size(m) +} +func (m *ApplicationSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchResponse proto.InternalMessageInfo + +func (m *ApplicationSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ApplicationSearchResponse) GetResult() []*Application { + if m != nil { + return m.Result + } + return nil +} + +type ApplicationSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ApplicationSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchRequest) Reset() { *m = ApplicationSearchRequest{} } +func (m *ApplicationSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchRequest) ProtoMessage() {} +func (*ApplicationSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{79} +} + +func (m *ApplicationSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchRequest.Unmarshal(m, b) +} +func (m *ApplicationSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchRequest.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchRequest.Merge(m, src) +} +func (m *ApplicationSearchRequest) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchRequest.Size(m) +} +func (m *ApplicationSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchRequest proto.InternalMessageInfo + +func (m *ApplicationSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ApplicationSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ApplicationSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ApplicationSearchRequest) GetQueries() []*ApplicationSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ApplicationSearchQuery struct { + Key ApplicationSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ApplicationSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ApplicationSearchQuery) Reset() { *m = ApplicationSearchQuery{} } +func (m *ApplicationSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ApplicationSearchQuery) ProtoMessage() {} +func (*ApplicationSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{80} +} + +func (m *ApplicationSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ApplicationSearchQuery.Unmarshal(m, b) +} +func (m *ApplicationSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ApplicationSearchQuery.Marshal(b, m, deterministic) +} +func (m *ApplicationSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ApplicationSearchQuery.Merge(m, src) +} +func (m *ApplicationSearchQuery) XXX_Size() int { + return xxx_messageInfo_ApplicationSearchQuery.Size(m) +} +func (m *ApplicationSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ApplicationSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ApplicationSearchQuery proto.InternalMessageInfo + +func (m *ApplicationSearchQuery) GetKey() ApplicationSearchKey { + if m != nil { + return m.Key + } + return ApplicationSearchKey_APPLICATIONSERACHKEY_UNSPECIFIED +} + +func (m *ApplicationSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ApplicationSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,3,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + GrantedOrgName string `protobuf:"bytes,4,opt,name=granted_org_name,json=grantedOrgName,proto3" json:"granted_org_name,omitempty"` + GrantedOrgDomain string `protobuf:"bytes,5,opt,name=granted_org_domain,json=grantedOrgDomain,proto3" json:"granted_org_domain,omitempty"` + RoleNames []string `protobuf:"bytes,6,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State ProjectGrantState `protobuf:"varint,7,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,9,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + ProjectName string `protobuf:"bytes,10,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrant) Reset() { *m = ProjectGrant{} } +func (m *ProjectGrant) String() string { return proto.CompactTextString(m) } +func (*ProjectGrant) ProtoMessage() {} +func (*ProjectGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{81} +} + +func (m *ProjectGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrant.Unmarshal(m, b) +} +func (m *ProjectGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrant.Marshal(b, m, deterministic) +} +func (m *ProjectGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrant.Merge(m, src) +} +func (m *ProjectGrant) XXX_Size() int { + return xxx_messageInfo_ProjectGrant.Size(m) +} +func (m *ProjectGrant) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrant proto.InternalMessageInfo + +func (m *ProjectGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgName() string { + if m != nil { + return m.GrantedOrgName + } + return "" +} + +func (m *ProjectGrant) GetGrantedOrgDomain() string { + if m != nil { + return m.GrantedOrgDomain + } + return "" +} + +func (m *ProjectGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *ProjectGrant) GetState() ProjectGrantState { + if m != nil { + return m.State + } + return ProjectGrantState_PROJECTGRANTSTATE_UNSPECIFIED +} + +func (m *ProjectGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *ProjectGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type ProjectGrantCreate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantedOrgId string `protobuf:"bytes,2,opt,name=granted_org_id,json=grantedOrgId,proto3" json:"granted_org_id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantCreate) Reset() { *m = ProjectGrantCreate{} } +func (m *ProjectGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantCreate) ProtoMessage() {} +func (*ProjectGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{82} +} + +func (m *ProjectGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantCreate.Merge(m, src) +} +func (m *ProjectGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantCreate.Size(m) +} +func (m *ProjectGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantCreate) GetGrantedOrgId() string { + if m != nil { + return m.GrantedOrgId + } + return "" +} + +func (m *ProjectGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUpdate) Reset() { *m = ProjectGrantUpdate{} } +func (m *ProjectGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{83} +} + +func (m *ProjectGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUpdate.Size(m) +} +func (m *ProjectGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantID) Reset() { *m = ProjectGrantID{} } +func (m *ProjectGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantID) ProtoMessage() {} +func (*ProjectGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{84} +} + +func (m *ProjectGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantID.Merge(m, src) +} +func (m *ProjectGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantID.Size(m) +} +func (m *ProjectGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantID proto.InternalMessageInfo + +func (m *ProjectGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type GrantedGrantID struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *GrantedGrantID) Reset() { *m = GrantedGrantID{} } +func (m *GrantedGrantID) String() string { return proto.CompactTextString(m) } +func (*GrantedGrantID) ProtoMessage() {} +func (*GrantedGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{85} +} + +func (m *GrantedGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_GrantedGrantID.Unmarshal(m, b) +} +func (m *GrantedGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_GrantedGrantID.Marshal(b, m, deterministic) +} +func (m *GrantedGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_GrantedGrantID.Merge(m, src) +} +func (m *GrantedGrantID) XXX_Size() int { + return xxx_messageInfo_GrantedGrantID.Size(m) +} +func (m *GrantedGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_GrantedGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_GrantedGrantID proto.InternalMessageInfo + +func (m *GrantedGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchResponse) Reset() { *m = ProjectGrantSearchResponse{} } +func (m *ProjectGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchResponse) ProtoMessage() {} +func (*ProjectGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{86} +} + +func (m *ProjectGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchResponse.Merge(m, src) +} +func (m *ProjectGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchResponse.Size(m) +} +func (m *ProjectGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantSearchResponse) GetResult() []*ProjectGrant { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantSearchRequest) Reset() { *m = ProjectGrantSearchRequest{} } +func (m *ProjectGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{87} +} + +func (m *ProjectGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantSearchRequest.Size(m) +} +func (m *ProjectGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +type ProjectGrantMemberRoles struct { + Roles []string `protobuf:"bytes,1,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRoles) Reset() { *m = ProjectGrantMemberRoles{} } +func (m *ProjectGrantMemberRoles) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRoles) ProtoMessage() {} +func (*ProjectGrantMemberRoles) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{88} +} + +func (m *ProjectGrantMemberRoles) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRoles.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRoles) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRoles.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRoles) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRoles.Merge(m, src) +} +func (m *ProjectGrantMemberRoles) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRoles.Size(m) +} +func (m *ProjectGrantMemberRoles) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRoles.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRoles proto.InternalMessageInfo + +func (m *ProjectGrantMemberRoles) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMember struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + UserName string `protobuf:"bytes,2,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + Email string `protobuf:"bytes,3,opt,name=email,proto3" json:"email,omitempty"` + FirstName string `protobuf:"bytes,4,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,5,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Roles []string `protobuf:"bytes,6,rep,name=roles,proto3" json:"roles,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMember) Reset() { *m = ProjectGrantMember{} } +func (m *ProjectGrantMember) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMember) ProtoMessage() {} +func (*ProjectGrantMember) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{89} +} + +func (m *ProjectGrantMember) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMember.Unmarshal(m, b) +} +func (m *ProjectGrantMember) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMember.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMember) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMember.Merge(m, src) +} +func (m *ProjectGrantMember) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMember.Size(m) +} +func (m *ProjectGrantMember) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMember.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMember proto.InternalMessageInfo + +func (m *ProjectGrantMember) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMember) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *ProjectGrantMember) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *ProjectGrantMember) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *ProjectGrantMember) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *ProjectGrantMember) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func (m *ProjectGrantMember) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *ProjectGrantMember) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +type ProjectGrantMemberAdd struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberAdd) Reset() { *m = ProjectGrantMemberAdd{} } +func (m *ProjectGrantMemberAdd) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberAdd) ProtoMessage() {} +func (*ProjectGrantMemberAdd) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{90} +} + +func (m *ProjectGrantMemberAdd) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberAdd.Unmarshal(m, b) +} +func (m *ProjectGrantMemberAdd) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberAdd.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberAdd) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberAdd.Merge(m, src) +} +func (m *ProjectGrantMemberAdd) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberAdd.Size(m) +} +func (m *ProjectGrantMemberAdd) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberAdd.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberAdd proto.InternalMessageInfo + +func (m *ProjectGrantMemberAdd) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberAdd) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberChange struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberChange) Reset() { *m = ProjectGrantMemberChange{} } +func (m *ProjectGrantMemberChange) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberChange) ProtoMessage() {} +func (*ProjectGrantMemberChange) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{91} +} + +func (m *ProjectGrantMemberChange) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberChange.Unmarshal(m, b) +} +func (m *ProjectGrantMemberChange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberChange.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberChange) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberChange.Merge(m, src) +} +func (m *ProjectGrantMemberChange) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberChange.Size(m) +} +func (m *ProjectGrantMemberChange) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberChange.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberChange proto.InternalMessageInfo + +func (m *ProjectGrantMemberChange) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantMemberChange) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +type ProjectGrantMemberRemove struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberRemove) Reset() { *m = ProjectGrantMemberRemove{} } +func (m *ProjectGrantMemberRemove) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberRemove) ProtoMessage() {} +func (*ProjectGrantMemberRemove) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{92} +} + +func (m *ProjectGrantMemberRemove) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberRemove.Unmarshal(m, b) +} +func (m *ProjectGrantMemberRemove) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberRemove.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberRemove) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberRemove.Merge(m, src) +} +func (m *ProjectGrantMemberRemove) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberRemove.Size(m) +} +func (m *ProjectGrantMemberRemove) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberRemove.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberRemove proto.InternalMessageInfo + +func (m *ProjectGrantMemberRemove) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberRemove) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +type ProjectGrantMemberSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*ProjectGrantMember `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchResponse) Reset() { *m = ProjectGrantMemberSearchResponse{} } +func (m *ProjectGrantMemberSearchResponse) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchResponse) ProtoMessage() {} +func (*ProjectGrantMemberSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{93} +} + +func (m *ProjectGrantMemberSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchResponse.Merge(m, src) +} +func (m *ProjectGrantMemberSearchResponse) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchResponse.Size(m) +} +func (m *ProjectGrantMemberSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchResponse proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *ProjectGrantMemberSearchResponse) GetResult() []*ProjectGrantMember { + if m != nil { + return m.Result + } + return nil +} + +type ProjectGrantMemberSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + GrantId string `protobuf:"bytes,2,opt,name=grant_id,json=grantId,proto3" json:"grant_id,omitempty"` + Offset uint64 `protobuf:"varint,3,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,4,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*ProjectGrantMemberSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchRequest) Reset() { *m = ProjectGrantMemberSearchRequest{} } +func (m *ProjectGrantMemberSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchRequest) ProtoMessage() {} +func (*ProjectGrantMemberSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{94} +} + +func (m *ProjectGrantMemberSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchRequest.Merge(m, src) +} +func (m *ProjectGrantMemberSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchRequest.Size(m) +} +func (m *ProjectGrantMemberSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetGrantId() string { + if m != nil { + return m.GrantId + } + return "" +} + +func (m *ProjectGrantMemberSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantMemberSearchRequest) GetQueries() []*ProjectGrantMemberSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantMemberSearchQuery struct { + Key ProjectGrantMemberSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantMemberSearchQuery) Reset() { *m = ProjectGrantMemberSearchQuery{} } +func (m *ProjectGrantMemberSearchQuery) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantMemberSearchQuery) ProtoMessage() {} +func (*ProjectGrantMemberSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{95} +} + +func (m *ProjectGrantMemberSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Unmarshal(m, b) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Marshal(b, m, deterministic) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantMemberSearchQuery.Merge(m, src) +} +func (m *ProjectGrantMemberSearchQuery) XXX_Size() int { + return xxx_messageInfo_ProjectGrantMemberSearchQuery.Size(m) +} +func (m *ProjectGrantMemberSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantMemberSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantMemberSearchQuery proto.InternalMessageInfo + +func (m *ProjectGrantMemberSearchQuery) GetKey() ProjectGrantMemberSearchKey { + if m != nil { + return m.Key + } + return ProjectGrantMemberSearchKey_PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED +} + +func (m *ProjectGrantMemberSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *ProjectGrantMemberSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type UserGrant struct { + Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,3,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + State UserGrantState `protobuf:"varint,6,opt,name=state,proto3,enum=caos.zitadel.management.api.v1.UserGrantState" json:"state,omitempty"` + CreationDate *timestamp.Timestamp `protobuf:"bytes,7,opt,name=creation_date,json=creationDate,proto3" json:"creation_date,omitempty"` + ChangeDate *timestamp.Timestamp `protobuf:"bytes,8,opt,name=change_date,json=changeDate,proto3" json:"change_date,omitempty"` + UserName string `protobuf:"bytes,9,opt,name=user_name,json=userName,proto3" json:"user_name,omitempty"` + FirstName string `protobuf:"bytes,10,opt,name=first_name,json=firstName,proto3" json:"first_name,omitempty"` + LastName string `protobuf:"bytes,11,opt,name=last_name,json=lastName,proto3" json:"last_name,omitempty"` + Email string `protobuf:"bytes,12,opt,name=email,proto3" json:"email,omitempty"` + OrgName string `protobuf:"bytes,13,opt,name=org_name,json=orgName,proto3" json:"org_name,omitempty"` + OrgDomain string `protobuf:"bytes,14,opt,name=org_domain,json=orgDomain,proto3" json:"org_domain,omitempty"` + ProjectName string `protobuf:"bytes,15,opt,name=project_name,json=projectName,proto3" json:"project_name,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrant) Reset() { *m = UserGrant{} } +func (m *UserGrant) String() string { return proto.CompactTextString(m) } +func (*UserGrant) ProtoMessage() {} +func (*UserGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{96} +} + +func (m *UserGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrant.Unmarshal(m, b) +} +func (m *UserGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrant.Marshal(b, m, deterministic) +} +func (m *UserGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrant.Merge(m, src) +} +func (m *UserGrant) XXX_Size() int { + return xxx_messageInfo_UserGrant.Size(m) +} +func (m *UserGrant) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrant proto.InternalMessageInfo + +func (m *UserGrant) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrant) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +func (m *UserGrant) GetState() UserGrantState { + if m != nil { + return m.State + } + return UserGrantState_USERGRANTSTATE_UNSPECIFIED +} + +func (m *UserGrant) GetCreationDate() *timestamp.Timestamp { + if m != nil { + return m.CreationDate + } + return nil +} + +func (m *UserGrant) GetChangeDate() *timestamp.Timestamp { + if m != nil { + return m.ChangeDate + } + return nil +} + +func (m *UserGrant) GetUserName() string { + if m != nil { + return m.UserName + } + return "" +} + +func (m *UserGrant) GetFirstName() string { + if m != nil { + return m.FirstName + } + return "" +} + +func (m *UserGrant) GetLastName() string { + if m != nil { + return m.LastName + } + return "" +} + +func (m *UserGrant) GetEmail() string { + if m != nil { + return m.Email + } + return "" +} + +func (m *UserGrant) GetOrgName() string { + if m != nil { + return m.OrgName + } + return "" +} + +func (m *UserGrant) GetOrgDomain() string { + if m != nil { + return m.OrgDomain + } + return "" +} + +func (m *UserGrant) GetProjectName() string { + if m != nil { + return m.ProjectName + } + return "" +} + +type UserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectId string `protobuf:"bytes,3,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantCreate) Reset() { *m = UserGrantCreate{} } +func (m *UserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*UserGrantCreate) ProtoMessage() {} +func (*UserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{97} +} + +func (m *UserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantCreate.Unmarshal(m, b) +} +func (m *UserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantCreate.Marshal(b, m, deterministic) +} +func (m *UserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantCreate.Merge(m, src) +} +func (m *UserGrantCreate) XXX_Size() int { + return xxx_messageInfo_UserGrantCreate.Size(m) +} +func (m *UserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantCreate proto.InternalMessageInfo + +func (m *UserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *UserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *UserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantUpdate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,3,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantUpdate) Reset() { *m = UserGrantUpdate{} } +func (m *UserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*UserGrantUpdate) ProtoMessage() {} +func (*UserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{98} +} + +func (m *UserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantUpdate.Unmarshal(m, b) +} +func (m *UserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *UserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantUpdate.Merge(m, src) +} +func (m *UserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_UserGrantUpdate.Size(m) +} +func (m *UserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantUpdate proto.InternalMessageInfo + +func (m *UserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *UserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantID struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,2,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantID) Reset() { *m = UserGrantID{} } +func (m *UserGrantID) String() string { return proto.CompactTextString(m) } +func (*UserGrantID) ProtoMessage() {} +func (*UserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{99} +} + +func (m *UserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantID.Unmarshal(m, b) +} +func (m *UserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantID.Marshal(b, m, deterministic) +} +func (m *UserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantID.Merge(m, src) +} +func (m *UserGrantID) XXX_Size() int { + return xxx_messageInfo_UserGrantID.Size(m) +} +func (m *UserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantID proto.InternalMessageInfo + +func (m *UserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *UserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantID struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantID) Reset() { *m = ProjectUserGrantID{} } +func (m *ProjectUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantID) ProtoMessage() {} +func (*ProjectUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{100} +} + +func (m *ProjectUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantID.Unmarshal(m, b) +} +func (m *ProjectUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantID.Merge(m, src) +} +func (m *ProjectUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantID.Size(m) +} +func (m *ProjectUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantID proto.InternalMessageInfo + +func (m *ProjectUserGrantID) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectUserGrantUpdate struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantUpdate) Reset() { *m = ProjectUserGrantUpdate{} } +func (m *ProjectUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantUpdate) ProtoMessage() {} +func (*ProjectUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{101} +} + +func (m *ProjectUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantUpdate.Merge(m, src) +} +func (m *ProjectUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantUpdate.Size(m) +} +func (m *ProjectUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectUserGrantUpdate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantID struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantID) Reset() { *m = ProjectGrantUserGrantID{} } +func (m *ProjectGrantUserGrantID) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantID) ProtoMessage() {} +func (*ProjectGrantUserGrantID) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{102} +} + +func (m *ProjectGrantUserGrantID) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantID.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantID) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantID.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantID) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantID.Merge(m, src) +} +func (m *ProjectGrantUserGrantID) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantID.Size(m) +} +func (m *ProjectGrantUserGrantID) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantID.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantID proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantID) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantID) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +type ProjectGrantUserGrantCreate struct { + UserId string `protobuf:"bytes,1,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + OrgId string `protobuf:"bytes,2,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` + ProjectGrantId string `protobuf:"bytes,3,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + ProjectId string `protobuf:"bytes,4,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + RoleNames []string `protobuf:"bytes,5,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantCreate) Reset() { *m = ProjectGrantUserGrantCreate{} } +func (m *ProjectGrantUserGrantCreate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantCreate) ProtoMessage() {} +func (*ProjectGrantUserGrantCreate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{103} +} + +func (m *ProjectGrantUserGrantCreate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantCreate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantCreate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantCreate.Merge(m, src) +} +func (m *ProjectGrantUserGrantCreate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantCreate.Size(m) +} +func (m *ProjectGrantUserGrantCreate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantCreate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantCreate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantCreate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectGrantUserGrantCreate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type ProjectGrantUserGrantUpdate struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + UserId string `protobuf:"bytes,2,opt,name=user_id,json=userId,proto3" json:"user_id,omitempty"` + Id string `protobuf:"bytes,3,opt,name=id,proto3" json:"id,omitempty"` + RoleNames []string `protobuf:"bytes,4,rep,name=role_names,json=roleNames,proto3" json:"role_names,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantUpdate) Reset() { *m = ProjectGrantUserGrantUpdate{} } +func (m *ProjectGrantUserGrantUpdate) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantUpdate) ProtoMessage() {} +func (*ProjectGrantUserGrantUpdate) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{104} +} + +func (m *ProjectGrantUserGrantUpdate) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantUpdate.Merge(m, src) +} +func (m *ProjectGrantUserGrantUpdate) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantUpdate.Size(m) +} +func (m *ProjectGrantUserGrantUpdate) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantUpdate.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantUpdate proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantUpdate) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetId() string { + if m != nil { + return m.Id + } + return "" +} + +func (m *ProjectGrantUserGrantUpdate) GetRoleNames() []string { + if m != nil { + return m.RoleNames + } + return nil +} + +type UserGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*UserGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchResponse) Reset() { *m = UserGrantSearchResponse{} } +func (m *UserGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchResponse) ProtoMessage() {} +func (*UserGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{105} +} + +func (m *UserGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchResponse.Unmarshal(m, b) +} +func (m *UserGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchResponse.Merge(m, src) +} +func (m *UserGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchResponse.Size(m) +} +func (m *UserGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchResponse proto.InternalMessageInfo + +func (m *UserGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *UserGrantSearchResponse) GetResult() []*UserGrant { + if m != nil { + return m.Result + } + return nil +} + +type UserGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,3,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchRequest) Reset() { *m = UserGrantSearchRequest{} } +func (m *UserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchRequest) ProtoMessage() {} +func (*UserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{106} +} + +func (m *UserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchRequest.Unmarshal(m, b) +} +func (m *UserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchRequest.Merge(m, src) +} +func (m *UserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchRequest.Size(m) +} +func (m *UserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchRequest proto.InternalMessageInfo + +func (m *UserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *UserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *UserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type UserGrantSearchQuery struct { + Key UserGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.UserGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *UserGrantSearchQuery) Reset() { *m = UserGrantSearchQuery{} } +func (m *UserGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*UserGrantSearchQuery) ProtoMessage() {} +func (*UserGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{107} +} + +func (m *UserGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_UserGrantSearchQuery.Unmarshal(m, b) +} +func (m *UserGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_UserGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *UserGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_UserGrantSearchQuery.Merge(m, src) +} +func (m *UserGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_UserGrantSearchQuery.Size(m) +} +func (m *UserGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_UserGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_UserGrantSearchQuery proto.InternalMessageInfo + +func (m *UserGrantSearchQuery) GetKey() UserGrantSearchKey { + if m != nil { + return m.Key + } + return UserGrantSearchKey_USERGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *UserGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *UserGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type ProjectUserGrantSearchRequest struct { + ProjectId string `protobuf:"bytes,1,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectUserGrantSearchRequest) Reset() { *m = ProjectUserGrantSearchRequest{} } +func (m *ProjectUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{108} +} + +func (m *ProjectUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectUserGrantSearchRequest.Size(m) +} +func (m *ProjectUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectUserGrantSearchRequest) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *ProjectUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type ProjectGrantUserGrantSearchRequest struct { + ProjectGrantId string `protobuf:"bytes,1,opt,name=project_grant_id,json=projectGrantId,proto3" json:"project_grant_id,omitempty"` + Offset uint64 `protobuf:"varint,2,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,3,opt,name=limit,proto3" json:"limit,omitempty"` + Queries []*UserGrantSearchQuery `protobuf:"bytes,4,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *ProjectGrantUserGrantSearchRequest) Reset() { *m = ProjectGrantUserGrantSearchRequest{} } +func (m *ProjectGrantUserGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*ProjectGrantUserGrantSearchRequest) ProtoMessage() {} +func (*ProjectGrantUserGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{109} +} + +func (m *ProjectGrantUserGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Unmarshal(m, b) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Merge(m, src) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_ProjectGrantUserGrantSearchRequest.Size(m) +} +func (m *ProjectGrantUserGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_ProjectGrantUserGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_ProjectGrantUserGrantSearchRequest proto.InternalMessageInfo + +func (m *ProjectGrantUserGrantSearchRequest) GetProjectGrantId() string { + if m != nil { + return m.ProjectGrantId + } + return "" +} + +func (m *ProjectGrantUserGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *ProjectGrantUserGrantSearchRequest) GetQueries() []*UserGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchRequest struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + SortingColumn AuthGrantSearchKey `protobuf:"varint,3,opt,name=sorting_column,json=sortingColumn,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"sorting_column,omitempty"` + Asc bool `protobuf:"varint,4,opt,name=asc,proto3" json:"asc,omitempty"` + Queries []*AuthGrantSearchQuery `protobuf:"bytes,5,rep,name=queries,proto3" json:"queries,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchRequest) Reset() { *m = AuthGrantSearchRequest{} } +func (m *AuthGrantSearchRequest) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchRequest) ProtoMessage() {} +func (*AuthGrantSearchRequest) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{110} +} + +func (m *AuthGrantSearchRequest) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchRequest.Unmarshal(m, b) +} +func (m *AuthGrantSearchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchRequest.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchRequest) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchRequest.Merge(m, src) +} +func (m *AuthGrantSearchRequest) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchRequest.Size(m) +} +func (m *AuthGrantSearchRequest) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchRequest.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchRequest proto.InternalMessageInfo + +func (m *AuthGrantSearchRequest) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchRequest) GetSortingColumn() AuthGrantSearchKey { + if m != nil { + return m.SortingColumn + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchRequest) GetAsc() bool { + if m != nil { + return m.Asc + } + return false +} + +func (m *AuthGrantSearchRequest) GetQueries() []*AuthGrantSearchQuery { + if m != nil { + return m.Queries + } + return nil +} + +type AuthGrantSearchQuery struct { + Key AuthGrantSearchKey `protobuf:"varint,1,opt,name=key,proto3,enum=caos.zitadel.management.api.v1.AuthGrantSearchKey" json:"key,omitempty"` + Method SearchMethod `protobuf:"varint,2,opt,name=method,proto3,enum=caos.zitadel.management.api.v1.SearchMethod" json:"method,omitempty"` + Value string `protobuf:"bytes,3,opt,name=value,proto3" json:"value,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchQuery) Reset() { *m = AuthGrantSearchQuery{} } +func (m *AuthGrantSearchQuery) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchQuery) ProtoMessage() {} +func (*AuthGrantSearchQuery) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{111} +} + +func (m *AuthGrantSearchQuery) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchQuery.Unmarshal(m, b) +} +func (m *AuthGrantSearchQuery) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchQuery.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchQuery) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchQuery.Merge(m, src) +} +func (m *AuthGrantSearchQuery) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchQuery.Size(m) +} +func (m *AuthGrantSearchQuery) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchQuery.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchQuery proto.InternalMessageInfo + +func (m *AuthGrantSearchQuery) GetKey() AuthGrantSearchKey { + if m != nil { + return m.Key + } + return AuthGrantSearchKey_AUTHGRANTSEARCHKEY_UNSPECIFIED +} + +func (m *AuthGrantSearchQuery) GetMethod() SearchMethod { + if m != nil { + return m.Method + } + return SearchMethod_SEARCHMETHOD_EQUALS +} + +func (m *AuthGrantSearchQuery) GetValue() string { + if m != nil { + return m.Value + } + return "" +} + +type AuthGrantSearchResponse struct { + Offset uint64 `protobuf:"varint,1,opt,name=offset,proto3" json:"offset,omitempty"` + Limit uint64 `protobuf:"varint,2,opt,name=limit,proto3" json:"limit,omitempty"` + TotalResult uint64 `protobuf:"varint,3,opt,name=total_result,json=totalResult,proto3" json:"total_result,omitempty"` + Result []*AuthGrant `protobuf:"bytes,4,rep,name=result,proto3" json:"result,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrantSearchResponse) Reset() { *m = AuthGrantSearchResponse{} } +func (m *AuthGrantSearchResponse) String() string { return proto.CompactTextString(m) } +func (*AuthGrantSearchResponse) ProtoMessage() {} +func (*AuthGrantSearchResponse) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{112} +} + +func (m *AuthGrantSearchResponse) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrantSearchResponse.Unmarshal(m, b) +} +func (m *AuthGrantSearchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrantSearchResponse.Marshal(b, m, deterministic) +} +func (m *AuthGrantSearchResponse) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrantSearchResponse.Merge(m, src) +} +func (m *AuthGrantSearchResponse) XXX_Size() int { + return xxx_messageInfo_AuthGrantSearchResponse.Size(m) +} +func (m *AuthGrantSearchResponse) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrantSearchResponse.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrantSearchResponse proto.InternalMessageInfo + +func (m *AuthGrantSearchResponse) GetOffset() uint64 { + if m != nil { + return m.Offset + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetLimit() uint64 { + if m != nil { + return m.Limit + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetTotalResult() uint64 { + if m != nil { + return m.TotalResult + } + return 0 +} + +func (m *AuthGrantSearchResponse) GetResult() []*AuthGrant { + if m != nil { + return m.Result + } + return nil +} + +type AuthGrant struct { + OrgId string `protobuf:"bytes,1,opt,name=orgId,proto3" json:"orgId,omitempty"` + ProjectId string `protobuf:"bytes,2,opt,name=projectId,proto3" json:"projectId,omitempty"` + UserId string `protobuf:"bytes,3,opt,name=userId,proto3" json:"userId,omitempty"` + Roles []string `protobuf:"bytes,4,rep,name=roles,proto3" json:"roles,omitempty"` + XXX_NoUnkeyedLiteral struct{} `json:"-"` + XXX_unrecognized []byte `json:"-"` + XXX_sizecache int32 `json:"-"` +} + +func (m *AuthGrant) Reset() { *m = AuthGrant{} } +func (m *AuthGrant) String() string { return proto.CompactTextString(m) } +func (*AuthGrant) ProtoMessage() {} +func (*AuthGrant) Descriptor() ([]byte, []int) { + return fileDescriptor_edc174f991dc0a25, []int{113} +} + +func (m *AuthGrant) XXX_Unmarshal(b []byte) error { + return xxx_messageInfo_AuthGrant.Unmarshal(m, b) +} +func (m *AuthGrant) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { + return xxx_messageInfo_AuthGrant.Marshal(b, m, deterministic) +} +func (m *AuthGrant) XXX_Merge(src proto.Message) { + xxx_messageInfo_AuthGrant.Merge(m, src) +} +func (m *AuthGrant) XXX_Size() int { + return xxx_messageInfo_AuthGrant.Size(m) +} +func (m *AuthGrant) XXX_DiscardUnknown() { + xxx_messageInfo_AuthGrant.DiscardUnknown(m) +} + +var xxx_messageInfo_AuthGrant proto.InternalMessageInfo + +func (m *AuthGrant) GetOrgId() string { + if m != nil { + return m.OrgId + } + return "" +} + +func (m *AuthGrant) GetProjectId() string { + if m != nil { + return m.ProjectId + } + return "" +} + +func (m *AuthGrant) GetUserId() string { + if m != nil { + return m.UserId + } + return "" +} + +func (m *AuthGrant) GetRoles() []string { + if m != nil { + return m.Roles + } + return nil +} + +func init() { + proto.RegisterEnum("caos.zitadel.management.api.v1.UserState", UserState_name, UserState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.Gender", Gender_name, Gender_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserSearchKey", UserSearchKey_name, UserSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.SearchMethod", SearchMethod_name, SearchMethod_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MfaType", MfaType_name, MfaType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.MFAState", MFAState_name, MFAState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.NotificationType", NotificationType_name, NotificationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.PolicyState", PolicyState_name, PolicyState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgState", OrgState_name, OrgState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OrgMemberSearchKey", OrgMemberSearchKey_name, OrgMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectState", ProjectState_name, ProjectState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectType", ProjectType_name, ProjectType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectSearchKey", ProjectSearchKey_name, ProjectSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectRoleSearchKey", ProjectRoleSearchKey_name, ProjectRoleSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectMemberSearchKey", ProjectMemberSearchKey_name, ProjectMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AppState", AppState_name, AppState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCResponseType", OIDCResponseType_name, OIDCResponseType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCGrantType", OIDCGrantType_name, OIDCGrantType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCApplicationType", OIDCApplicationType_name, OIDCApplicationType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.OIDCAuthMethodType", OIDCAuthMethodType_name, OIDCAuthMethodType_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ApplicationSearchKey", ApplicationSearchKey_name, ApplicationSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantState", ProjectGrantState_name, ProjectGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.ProjectGrantMemberSearchKey", ProjectGrantMemberSearchKey_name, ProjectGrantMemberSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantState", UserGrantState_name, UserGrantState_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.UserGrantSearchKey", UserGrantSearchKey_name, UserGrantSearchKey_value) + proto.RegisterEnum("caos.zitadel.management.api.v1.AuthGrantSearchKey", AuthGrantSearchKey_name, AuthGrantSearchKey_value) + proto.RegisterType((*ChangeRequest)(nil), "caos.zitadel.management.api.v1.ChangeRequest") + proto.RegisterType((*Changes)(nil), "caos.zitadel.management.api.v1.Changes") + proto.RegisterType((*Change)(nil), "caos.zitadel.management.api.v1.Change") + proto.RegisterType((*ApplicationID)(nil), "caos.zitadel.management.api.v1.ApplicationID") + proto.RegisterType((*ProjectID)(nil), "caos.zitadel.management.api.v1.ProjectID") + proto.RegisterType((*UserID)(nil), "caos.zitadel.management.api.v1.UserID") + proto.RegisterType((*UserEmailID)(nil), "caos.zitadel.management.api.v1.UserEmailID") + proto.RegisterType((*UniqueUserRequest)(nil), "caos.zitadel.management.api.v1.UniqueUserRequest") + proto.RegisterType((*UniqueUserResponse)(nil), "caos.zitadel.management.api.v1.UniqueUserResponse") + proto.RegisterType((*CreateUserRequest)(nil), "caos.zitadel.management.api.v1.CreateUserRequest") + proto.RegisterType((*User)(nil), "caos.zitadel.management.api.v1.User") + proto.RegisterType((*UserSearchRequest)(nil), "caos.zitadel.management.api.v1.UserSearchRequest") + proto.RegisterType((*UserSearchQuery)(nil), "caos.zitadel.management.api.v1.UserSearchQuery") + proto.RegisterType((*UserSearchResponse)(nil), "caos.zitadel.management.api.v1.UserSearchResponse") + proto.RegisterType((*UserProfile)(nil), "caos.zitadel.management.api.v1.UserProfile") + proto.RegisterType((*UpdateUserProfileRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserProfileRequest") + proto.RegisterType((*UserEmail)(nil), "caos.zitadel.management.api.v1.UserEmail") + proto.RegisterType((*UpdateUserEmailRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserEmailRequest") + proto.RegisterType((*UserPhone)(nil), "caos.zitadel.management.api.v1.UserPhone") + proto.RegisterType((*UpdateUserPhoneRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserPhoneRequest") + proto.RegisterType((*UserAddress)(nil), "caos.zitadel.management.api.v1.UserAddress") + proto.RegisterType((*UpdateUserAddressRequest)(nil), "caos.zitadel.management.api.v1.UpdateUserAddressRequest") + proto.RegisterType((*MultiFactors)(nil), "caos.zitadel.management.api.v1.MultiFactors") + proto.RegisterType((*MultiFactor)(nil), "caos.zitadel.management.api.v1.MultiFactor") + proto.RegisterType((*PasswordID)(nil), "caos.zitadel.management.api.v1.PasswordID") + proto.RegisterType((*PasswordRequest)(nil), "caos.zitadel.management.api.v1.PasswordRequest") + proto.RegisterType((*ResetPasswordRequest)(nil), "caos.zitadel.management.api.v1.ResetPasswordRequest") + proto.RegisterType((*SetPasswordNotificationRequest)(nil), "caos.zitadel.management.api.v1.SetPasswordNotificationRequest") + proto.RegisterType((*PasswordComplexityPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyID") + proto.RegisterType((*PasswordComplexityPolicy)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicy") + proto.RegisterType((*PasswordComplexityPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyCreate") + proto.RegisterType((*PasswordComplexityPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordComplexityPolicyUpdate") + proto.RegisterType((*PasswordAgePolicyID)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyID") + proto.RegisterType((*PasswordAgePolicy)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicy") + proto.RegisterType((*PasswordAgePolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyCreate") + proto.RegisterType((*PasswordAgePolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordAgePolicyUpdate") + proto.RegisterType((*PasswordLockoutPolicyID)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyID") + proto.RegisterType((*PasswordLockoutPolicy)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicy") + proto.RegisterType((*PasswordLockoutPolicyCreate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyCreate") + proto.RegisterType((*PasswordLockoutPolicyUpdate)(nil), "caos.zitadel.management.api.v1.PasswordLockoutPolicyUpdate") + proto.RegisterType((*OrgID)(nil), "caos.zitadel.management.api.v1.OrgID") + proto.RegisterType((*OrgDomain)(nil), "caos.zitadel.management.api.v1.OrgDomain") + proto.RegisterType((*Org)(nil), "caos.zitadel.management.api.v1.Org") + proto.RegisterType((*OrgMemberRoles)(nil), "caos.zitadel.management.api.v1.OrgMemberRoles") + proto.RegisterType((*OrgMember)(nil), "caos.zitadel.management.api.v1.OrgMember") + proto.RegisterType((*AddOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.AddOrgMemberRequest") + proto.RegisterType((*ChangeOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.ChangeOrgMemberRequest") + proto.RegisterType((*RemoveOrgMemberRequest)(nil), "caos.zitadel.management.api.v1.RemoveOrgMemberRequest") + proto.RegisterType((*OrgMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchResponse") + proto.RegisterType((*OrgMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchRequest") + proto.RegisterType((*OrgMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.OrgMemberSearchQuery") + proto.RegisterType((*ProjectCreateRequest)(nil), "caos.zitadel.management.api.v1.ProjectCreateRequest") + proto.RegisterType((*ProjectUpdateRequest)(nil), "caos.zitadel.management.api.v1.ProjectUpdateRequest") + proto.RegisterType((*Projects)(nil), "caos.zitadel.management.api.v1.Projects") + proto.RegisterType((*Project)(nil), "caos.zitadel.management.api.v1.Project") + proto.RegisterType((*ProjectSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectSearchResponse") + proto.RegisterType((*ProjectSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectSearchRequest") + proto.RegisterType((*ProjectSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectSearchQuery") + proto.RegisterType((*ProjectMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectMemberRoles") + proto.RegisterType((*ProjectMember)(nil), "caos.zitadel.management.api.v1.ProjectMember") + proto.RegisterType((*ProjectMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectMemberAdd") + proto.RegisterType((*ProjectMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectMemberChange") + proto.RegisterType((*ProjectMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectMemberRemove") + proto.RegisterType((*ProjectRoleAdd)(nil), "caos.zitadel.management.api.v1.ProjectRoleAdd") + proto.RegisterType((*ProjectRole)(nil), "caos.zitadel.management.api.v1.ProjectRole") + proto.RegisterType((*ProjectRoleRemove)(nil), "caos.zitadel.management.api.v1.ProjectRoleRemove") + proto.RegisterType((*ProjectRoleSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchResponse") + proto.RegisterType((*ProjectRoleSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchRequest") + proto.RegisterType((*ProjectRoleSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectRoleSearchQuery") + proto.RegisterType((*ProjectMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchResponse") + proto.RegisterType((*ProjectMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchRequest") + proto.RegisterType((*ProjectMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectMemberSearchQuery") + proto.RegisterType((*Application)(nil), "caos.zitadel.management.api.v1.Application") + proto.RegisterType((*ApplicationUpdate)(nil), "caos.zitadel.management.api.v1.ApplicationUpdate") + proto.RegisterType((*OIDCConfig)(nil), "caos.zitadel.management.api.v1.OIDCConfig") + proto.RegisterType((*OIDCApplicationCreate)(nil), "caos.zitadel.management.api.v1.OIDCApplicationCreate") + proto.RegisterType((*OIDCConfigUpdate)(nil), "caos.zitadel.management.api.v1.OIDCConfigUpdate") + proto.RegisterType((*ClientSecret)(nil), "caos.zitadel.management.api.v1.ClientSecret") + proto.RegisterType((*ApplicationSearchResponse)(nil), "caos.zitadel.management.api.v1.ApplicationSearchResponse") + proto.RegisterType((*ApplicationSearchRequest)(nil), "caos.zitadel.management.api.v1.ApplicationSearchRequest") + proto.RegisterType((*ApplicationSearchQuery)(nil), "caos.zitadel.management.api.v1.ApplicationSearchQuery") + proto.RegisterType((*ProjectGrant)(nil), "caos.zitadel.management.api.v1.ProjectGrant") + proto.RegisterType((*ProjectGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantCreate") + proto.RegisterType((*ProjectGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUpdate") + proto.RegisterType((*ProjectGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantID") + proto.RegisterType((*GrantedGrantID)(nil), "caos.zitadel.management.api.v1.GrantedGrantID") + proto.RegisterType((*ProjectGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchResponse") + proto.RegisterType((*ProjectGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantSearchRequest") + proto.RegisterType((*ProjectGrantMemberRoles)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRoles") + proto.RegisterType((*ProjectGrantMember)(nil), "caos.zitadel.management.api.v1.ProjectGrantMember") + proto.RegisterType((*ProjectGrantMemberAdd)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberAdd") + proto.RegisterType((*ProjectGrantMemberChange)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberChange") + proto.RegisterType((*ProjectGrantMemberRemove)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberRemove") + proto.RegisterType((*ProjectGrantMemberSearchResponse)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchResponse") + proto.RegisterType((*ProjectGrantMemberSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchRequest") + proto.RegisterType((*ProjectGrantMemberSearchQuery)(nil), "caos.zitadel.management.api.v1.ProjectGrantMemberSearchQuery") + proto.RegisterType((*UserGrant)(nil), "caos.zitadel.management.api.v1.UserGrant") + proto.RegisterType((*UserGrantCreate)(nil), "caos.zitadel.management.api.v1.UserGrantCreate") + proto.RegisterType((*UserGrantUpdate)(nil), "caos.zitadel.management.api.v1.UserGrantUpdate") + proto.RegisterType((*UserGrantID)(nil), "caos.zitadel.management.api.v1.UserGrantID") + proto.RegisterType((*ProjectUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantID") + proto.RegisterType((*ProjectUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantUpdate") + proto.RegisterType((*ProjectGrantUserGrantID)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantID") + proto.RegisterType((*ProjectGrantUserGrantCreate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantCreate") + proto.RegisterType((*ProjectGrantUserGrantUpdate)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantUpdate") + proto.RegisterType((*UserGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.UserGrantSearchResponse") + proto.RegisterType((*UserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.UserGrantSearchRequest") + proto.RegisterType((*UserGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.UserGrantSearchQuery") + proto.RegisterType((*ProjectUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectUserGrantSearchRequest") + proto.RegisterType((*ProjectGrantUserGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.ProjectGrantUserGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchRequest)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchRequest") + proto.RegisterType((*AuthGrantSearchQuery)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchQuery") + proto.RegisterType((*AuthGrantSearchResponse)(nil), "caos.zitadel.management.api.v1.AuthGrantSearchResponse") + proto.RegisterType((*AuthGrant)(nil), "caos.zitadel.management.api.v1.AuthGrant") +} + +func init() { proto.RegisterFile("management.proto", fileDescriptor_edc174f991dc0a25) } + +var fileDescriptor_edc174f991dc0a25 = []byte{ + // 7935 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xec, 0x7d, 0x6b, 0x70, 0x1b, 0x59, + 0x76, 0xde, 0x34, 0x00, 0xbe, 0x0e, 0x5f, 0xe0, 0xe5, 0x0b, 0x02, 0x1f, 0xa2, 0x5a, 0x6f, 0x48, + 0x22, 0x24, 0x8e, 0x46, 0x9a, 0x91, 0x76, 0xa4, 0x01, 0x09, 0x88, 0x82, 0x87, 0x04, 0xb8, 0x20, + 0x35, 0xca, 0xd8, 0xce, 0xc0, 0x2d, 0xa0, 0x05, 0xc2, 0x03, 0xa2, 0xb1, 0xdd, 0x0d, 0x69, 0xb8, + 0x93, 0xa9, 0x4d, 0x71, 0xab, 0x52, 0x2e, 0x27, 0x8e, 0xbd, 0xbb, 0x71, 0x52, 0xd9, 0xaa, 0xcd, + 0x26, 0x9b, 0x87, 0x93, 0x6c, 0x26, 0x8f, 0xf2, 0xb0, 0x6a, 0x6d, 0x27, 0x1b, 0x57, 0x36, 0x49, + 0x25, 0xb6, 0x7f, 0xc4, 0xd9, 0x54, 0x5c, 0xa9, 0xf2, 0x9f, 0x6c, 0x12, 0x57, 0xe5, 0x57, 0xca, + 0x79, 0xfc, 0xf0, 0xfc, 0x70, 0x5c, 0xf7, 0xd1, 0xdd, 0xb7, 0x5f, 0x40, 0x37, 0x48, 0x6a, 0xb5, + 0xde, 0xf9, 0x25, 0xe2, 0x3e, 0xbf, 0x73, 0xee, 0x39, 0xe7, 0x9e, 0x7b, 0xee, 0xed, 0x23, 0x88, + 0xef, 0x49, 0x4d, 0xa9, 0x26, 0xef, 0xc9, 0x4d, 0x7d, 0xb9, 0xa5, 0x2a, 0xba, 0x82, 0x16, 0x2b, + 0x92, 0xa2, 0x2d, 0x7f, 0xb1, 0xae, 0x4b, 0x55, 0xb9, 0xb1, 0xcc, 0x55, 0x4b, 0xad, 0xfa, 0xf2, + 0xb3, 0x1b, 0xc9, 0xf9, 0x9a, 0xa2, 0xd4, 0x1a, 0x72, 0x5a, 0x6a, 0xd5, 0xd3, 0x52, 0xb3, 0xa9, + 0xe8, 0x92, 0x5e, 0x57, 0x9a, 0x1a, 0xed, 0x9d, 0x9c, 0x63, 0xb5, 0xe4, 0xd7, 0x93, 0xf6, 0xd3, + 0xb4, 0xbc, 0xd7, 0xd2, 0xf7, 0x59, 0xe5, 0xbc, 0xb3, 0x52, 0xd3, 0xd5, 0x76, 0x85, 0x4d, 0x9c, + 0x3c, 0xed, 0xac, 0xd5, 0xeb, 0x7b, 0xb2, 0xa6, 0x4b, 0x7b, 0x2d, 0xd6, 0xe0, 0x2a, 0xf9, 0xa7, + 0x72, 0xad, 0x26, 0x37, 0xaf, 0x69, 0xcf, 0xa5, 0x5a, 0x4d, 0x56, 0xd3, 0x4a, 0x8b, 0xcc, 0xee, + 0x81, 0x64, 0xf6, 0x99, 0xd4, 0xa8, 0x57, 0x25, 0x5d, 0x4e, 0x1b, 0x7f, 0xb0, 0x8a, 0x25, 0xe7, + 0x3c, 0x55, 0x59, 0xab, 0xa8, 0xf5, 0x96, 0xae, 0xa8, 0xac, 0x45, 0x42, 0x6a, 0xeb, 0xbb, 0x74, + 0x64, 0x63, 0x02, 0x5a, 0x23, 0xbe, 0x07, 0xa3, 0x6b, 0xbb, 0x52, 0xb3, 0x26, 0x97, 0xe4, 0x2f, + 0xb4, 0x65, 0x4d, 0x47, 0x63, 0x10, 0xa9, 0x57, 0x13, 0xc2, 0x92, 0x70, 0x69, 0xa8, 0x14, 0xa9, + 0x57, 0xd1, 0x14, 0xf4, 0x35, 0xea, 0x7b, 0x75, 0x3d, 0x11, 0x59, 0x12, 0x2e, 0xc5, 0x4a, 0xf4, + 0x07, 0xba, 0x08, 0xe3, 0x1a, 0xee, 0xd0, 0xac, 0xc8, 0x65, 0xe5, 0xe9, 0x53, 0x4d, 0xd6, 0x13, + 0x51, 0x52, 0x3f, 0x66, 0x14, 0x17, 0x49, 0xa9, 0xb8, 0x0f, 0x03, 0x74, 0x7c, 0x0d, 0xbd, 0x05, + 0x03, 0x15, 0xfa, 0x67, 0x42, 0x58, 0x8a, 0x5e, 0x1a, 0x5e, 0xb9, 0xb0, 0xdc, 0x79, 0x65, 0x96, + 0x19, 0x32, 0xa3, 0x1b, 0x9a, 0x81, 0x7e, 0x36, 0x19, 0x05, 0xc3, 0x7e, 0x59, 0x18, 0xa3, 0x1c, + 0x46, 0xf1, 0xdf, 0x0b, 0xd0, 0x4f, 0x47, 0x40, 0x77, 0x61, 0x98, 0x8e, 0x51, 0xc6, 0x6c, 0x23, + 0xd4, 0x0d, 0xaf, 0x24, 0x97, 0x29, 0xdf, 0x96, 0x0d, 0xbe, 0x2d, 0xef, 0x18, 0xeb, 0x53, 0x02, + 0xda, 0x3c, 0x2b, 0xe9, 0x32, 0x5a, 0x00, 0x90, 0x9f, 0xc9, 0x4d, 0xbd, 0xac, 0xef, 0xb7, 0x64, + 0x32, 0xf3, 0x50, 0x69, 0x88, 0x94, 0xec, 0xec, 0xb7, 0x64, 0x94, 0x84, 0x41, 0x83, 0x66, 0x36, + 0xbf, 0xf9, 0x1b, 0xd7, 0xed, 0x29, 0xd5, 0xfa, 0xd3, 0xba, 0xac, 0x26, 0x62, 0xa4, 0xa3, 0xf9, + 0x1b, 0x5d, 0x81, 0x58, 0x55, 0xd2, 0xa5, 0x44, 0x1f, 0x01, 0x33, 0xeb, 0x02, 0xb3, 0x4d, 0x44, + 0xa9, 0x44, 0x1a, 0x89, 0xf7, 0x60, 0x34, 0xd3, 0x6a, 0x35, 0xea, 0x15, 0x22, 0x11, 0xf9, 0xac, + 0x6b, 0x99, 0x16, 0x00, 0x5a, 0xaa, 0xf2, 0xb3, 0x72, 0x45, 0x2f, 0xd7, 0xab, 0x06, 0x48, 0x56, + 0x92, 0xaf, 0x8a, 0x73, 0x30, 0xb4, 0xc5, 0x7e, 0xb8, 0xfa, 0x8a, 0x09, 0xe8, 0x7f, 0xa4, 0xc9, + 0xaa, 0x47, 0xcd, 0x59, 0x18, 0xc6, 0x35, 0xb9, 0x3d, 0xa9, 0xde, 0xc8, 0x67, 0x31, 0x9f, 0x65, + 0xfc, 0x27, 0x6b, 0x41, 0x7f, 0x88, 0xef, 0xc1, 0xc4, 0xa3, 0x66, 0xfd, 0x0b, 0x6d, 0x19, 0x37, + 0x35, 0xc4, 0xe8, 0x22, 0x0c, 0xb5, 0x35, 0x59, 0x2d, 0x37, 0xa5, 0x3d, 0xca, 0xef, 0xa1, 0x55, + 0xf8, 0x74, 0x75, 0x40, 0xed, 0x8b, 0x0b, 0x89, 0x7f, 0x27, 0x94, 0x06, 0x71, 0x65, 0x41, 0xda, + 0x93, 0xd1, 0x92, 0x31, 0x66, 0xc4, 0xd5, 0x88, 0x8d, 0x7f, 0x03, 0x10, 0x3f, 0xbe, 0xd6, 0x52, + 0x9a, 0x9a, 0x8c, 0xe6, 0x60, 0xa8, 0xae, 0x95, 0xdb, 0xa4, 0x82, 0x4c, 0x30, 0x58, 0x1a, 0xac, + 0x6b, 0xb4, 0xa1, 0xf8, 0x3f, 0xfa, 0x60, 0x62, 0x4d, 0x95, 0x25, 0xbd, 0x37, 0x4c, 0x97, 0x01, + 0x9e, 0xd6, 0x55, 0x4d, 0xa7, 0x2d, 0xdd, 0xc0, 0x86, 0x48, 0x2d, 0x69, 0x7a, 0x11, 0x86, 0x1a, + 0x92, 0xd1, 0x32, 0xea, 0x1e, 0x13, 0x57, 0x92, 0x86, 0xe7, 0x61, 0xa8, 0x59, 0xaf, 0xbc, 0x4f, + 0x1b, 0x12, 0x59, 0x58, 0x1d, 0xfc, 0x74, 0xb5, 0x4f, 0x8d, 0x92, 0x66, 0xb8, 0x8a, 0x34, 0xbb, + 0x02, 0x23, 0xd5, 0xba, 0xd6, 0x6a, 0x48, 0xfb, 0xb4, 0x65, 0x9f, 0xa3, 0xe5, 0x30, 0xab, 0x25, + 0x8d, 0x6f, 0x03, 0x6a, 0xa9, 0xf2, 0x53, 0x59, 0x55, 0xe5, 0x6a, 0xb9, 0x21, 0x35, 0x6b, 0x6d, + 0xa9, 0x26, 0x27, 0xfa, 0x1d, 0x5d, 0x26, 0xcc, 0x36, 0x1b, 0xac, 0x09, 0xba, 0x07, 0xfd, 0x35, + 0xb9, 0x59, 0x95, 0xd5, 0xc4, 0xc0, 0x92, 0x70, 0x69, 0xac, 0xbb, 0x26, 0xae, 0x93, 0xd6, 0x25, + 0xd6, 0x0b, 0x89, 0xc6, 0xa2, 0x0d, 0x92, 0xb9, 0x46, 0x3e, 0x5d, 0x1d, 0x52, 0x07, 0x08, 0xc5, + 0x3f, 0x63, 0x2c, 0x1b, 0x4a, 0xc1, 0x44, 0x5d, 0x2b, 0x93, 0xbf, 0xcb, 0xcf, 0x64, 0x15, 0x0b, + 0x7d, 0x35, 0x31, 0x44, 0x16, 0x6a, 0xbc, 0xae, 0x11, 0x91, 0x7a, 0x87, 0x15, 0xa3, 0x05, 0xe8, + 0x6b, 0xed, 0x2a, 0x4d, 0x39, 0x31, 0x4c, 0xc6, 0x1b, 0xf8, 0x74, 0x35, 0xa6, 0x46, 0x12, 0x53, + 0x25, 0x5a, 0xca, 0x86, 0x22, 0x7f, 0x5b, 0x43, 0x8d, 0x18, 0x43, 0x6d, 0xe1, 0x72, 0x73, 0x28, + 0x11, 0x06, 0x2a, 0x4a, 0xbb, 0xa9, 0xab, 0xfb, 0x89, 0x51, 0x07, 0x23, 0x8c, 0x0a, 0x74, 0x0e, + 0x06, 0x1b, 0x4a, 0x45, 0x6a, 0xd4, 0xf5, 0xfd, 0xc4, 0x98, 0x73, 0x29, 0x8c, 0x1a, 0x74, 0x19, + 0x86, 0x5b, 0x8a, 0xa6, 0x4b, 0x8d, 0x72, 0x45, 0xa9, 0xca, 0x89, 0x71, 0x47, 0x43, 0xa0, 0x95, + 0x6b, 0x4a, 0x15, 0x0b, 0x71, 0xbf, 0x2a, 0xd7, 0xea, 0x4a, 0x33, 0x11, 0x77, 0xb4, 0x62, 0xe5, + 0x28, 0x0d, 0x63, 0x9a, 0xae, 0xca, 0xb2, 0x5e, 0x96, 0xaa, 0x55, 0x55, 0xd6, 0xb4, 0xc4, 0x84, + 0xa3, 0xe5, 0x28, 0xad, 0xcf, 0xd0, 0x6a, 0x74, 0x16, 0x06, 0x5b, 0x92, 0xa6, 0x3d, 0x57, 0xd4, + 0x6a, 0x02, 0xf1, 0x5c, 0x79, 0x58, 0x32, 0x2b, 0xc4, 0x3f, 0xea, 0x87, 0x18, 0x96, 0x70, 0x97, + 0x39, 0xb8, 0x0f, 0x7d, 0x9a, 0x8e, 0x4d, 0x5d, 0x84, 0xac, 0xef, 0xe5, 0x6e, 0xeb, 0x8b, 0x07, + 0xd9, 0xc6, 0x1d, 0x4a, 0xb4, 0x1f, 0xba, 0x0f, 0xa3, 0x15, 0xac, 0x40, 0x75, 0xa5, 0x49, 0x6d, + 0x66, 0xb4, 0xab, 0xcd, 0x1c, 0x31, 0x3a, 0x10, 0xab, 0xe9, 0x30, 0xb9, 0xb1, 0x50, 0x26, 0xf7, + 0x0d, 0x00, 0xa2, 0x55, 0x0d, 0xa5, 0x56, 0x6f, 0x32, 0x0b, 0xd9, 0xa9, 0x2f, 0xd1, 0xc1, 0x0d, + 0xdc, 0x18, 0xe5, 0x20, 0x6e, 0xb0, 0xa7, 0x4c, 0x47, 0xac, 0x12, 0x8d, 0xe8, 0x3c, 0xc0, 0xb8, + 0xd1, 0x87, 0x6e, 0x18, 0x55, 0x6c, 0x5e, 0x2c, 0x5b, 0x31, 0x40, 0x4d, 0xb7, 0x69, 0x1f, 0x16, + 0x6c, 0xf6, 0x61, 0x90, 0x1a, 0x5b, 0xcb, 0x26, 0xcc, 0xf1, 0x36, 0x61, 0x88, 0xf6, 0x35, 0xed, + 0xc0, 0x19, 0x87, 0x82, 0x03, 0xa9, 0xb7, 0xa9, 0xf5, 0x1c, 0x6f, 0x2a, 0x86, 0x69, 0x7f, 0xd3, + 0x40, 0x5c, 0xf3, 0xd4, 0xf9, 0x11, 0xd2, 0xaa, 0xa3, 0xa6, 0x8f, 0xf6, 0xa4, 0xe9, 0xa6, 0xc9, + 0x1f, 0xe3, 0x4c, 0xbe, 0xb7, 0x6e, 0x8f, 0x7b, 0xeb, 0xf6, 0x94, 0xa1, 0xdb, 0x71, 0x3a, 0x42, + 0x07, 0x95, 0x9e, 0xf0, 0x56, 0xe9, 0x84, 0xa5, 0xd2, 0x44, 0x13, 0x2c, 0x45, 0x4e, 0x72, 0x8a, + 0x3c, 0xc9, 0x18, 0x6d, 0xa8, 0xef, 0x69, 0xbb, 0xfa, 0x4e, 0x91, 0x6a, 0x5e, 0x69, 0x67, 0x4c, + 0xa5, 0x9d, 0x26, 0x75, 0x86, 0xaa, 0x9e, 0x77, 0xa9, 0xea, 0x0c, 0xa9, 0xb7, 0x2b, 0xa8, 0xf8, + 0xc7, 0x02, 0x4c, 0x10, 0xb5, 0x91, 0x25, 0xb5, 0xb2, 0x6b, 0xec, 0x31, 0x96, 0x8b, 0x22, 0x78, + 0xbb, 0x28, 0x36, 0x37, 0xea, 0x3d, 0x18, 0xd3, 0x14, 0x55, 0xaf, 0x37, 0x6b, 0xe5, 0x8a, 0xd2, + 0x68, 0xef, 0x35, 0x89, 0x9a, 0x8d, 0xad, 0x5c, 0x0b, 0xa4, 0xaf, 0x64, 0xe2, 0xb7, 0xe5, 0x7d, + 0x62, 0x44, 0x0e, 0x84, 0xc8, 0xd2, 0x2b, 0xa5, 0x51, 0x36, 0xdc, 0x1a, 0x19, 0x0d, 0xc5, 0x21, + 0x2a, 0x69, 0x15, 0xa2, 0x7c, 0x83, 0x25, 0xfc, 0x27, 0xca, 0xc3, 0xc0, 0x17, 0xda, 0xb2, 0x5a, + 0x97, 0xb5, 0x44, 0x1f, 0x71, 0xc2, 0xd2, 0xc1, 0xa7, 0xfa, 0x7c, 0x5b, 0x56, 0xf7, 0x4b, 0x46, + 0x7f, 0xf1, 0x3b, 0x02, 0x8c, 0x3b, 0x2a, 0x51, 0x1e, 0xa2, 0xef, 0xcb, 0xfb, 0x84, 0xf6, 0x23, + 0x50, 0x81, 0xc7, 0x40, 0x59, 0xe8, 0xdf, 0x93, 0xf5, 0x5d, 0xa5, 0xca, 0x6c, 0xd8, 0xd5, 0x6e, + 0xa3, 0xd1, 0x91, 0x36, 0x49, 0x9f, 0x12, 0xeb, 0x8b, 0xf9, 0xfe, 0x4c, 0x6a, 0xb4, 0xd9, 0xde, + 0x5c, 0xa2, 0x3f, 0xc4, 0xbf, 0x2d, 0x00, 0xe2, 0xd7, 0x8e, 0xf9, 0x14, 0xe1, 0x16, 0xef, 0x0c, + 0x8c, 0xe8, 0x0a, 0x96, 0x2f, 0x55, 0xd6, 0xda, 0x0d, 0xc3, 0xf9, 0x1c, 0x26, 0x65, 0x25, 0x52, + 0x84, 0x3e, 0x87, 0x45, 0x8c, 0x54, 0xc6, 0x08, 0xb3, 0xcf, 0x05, 0xe1, 0x48, 0x89, 0xf5, 0x11, + 0xff, 0x20, 0x42, 0xdd, 0xaf, 0x2d, 0x55, 0x79, 0x5a, 0x6f, 0xc8, 0xc7, 0x6f, 0xe4, 0xed, 0x76, + 0x2c, 0xda, 0xd1, 0x8e, 0xc5, 0x1c, 0x76, 0xcc, 0x66, 0xa4, 0xfa, 0x1c, 0x46, 0xca, 0x69, 0xe4, + 0xfa, 0xdd, 0x46, 0xce, 0xdb, 0x8e, 0x0d, 0x74, 0xb7, 0x63, 0x83, 0x3d, 0xd9, 0x31, 0x9b, 0x3d, + 0x1f, 0xb2, 0xdb, 0x73, 0xf1, 0xb7, 0x23, 0x90, 0x78, 0xd4, 0xaa, 0x32, 0x77, 0x91, 0xb1, 0xdb, + 0xef, 0x40, 0xf4, 0x99, 0x73, 0xd8, 0x99, 0xd5, 0xe2, 0x9f, 0x85, 0x21, 0xf3, 0xd0, 0xe0, 0x75, + 0x9c, 0xe4, 0xdc, 0xfd, 0x8e, 0xfb, 0x49, 0xd4, 0x73, 0x3f, 0x11, 0x9f, 0xc1, 0x8c, 0xb5, 0x56, + 0xa4, 0xca, 0x6f, 0xa5, 0xba, 0x1e, 0x2d, 0x42, 0xcd, 0xcb, 0xc8, 0x22, 0x5b, 0x93, 0x17, 0x59, + 0x74, 0x93, 0x8b, 0x74, 0xdd, 0xe4, 0xa2, 0x9e, 0x9b, 0x9c, 0xd8, 0xe6, 0xc9, 0x22, 0x55, 0x7e, + 0x64, 0x9d, 0xb6, 0xcd, 0xb5, 0x3a, 0xf4, 0xe9, 0x6a, 0xbf, 0x1a, 0x8b, 0x0b, 0x5d, 0xdc, 0x65, + 0x9f, 0x69, 0x7f, 0x55, 0xa0, 0x36, 0xc6, 0x70, 0x3b, 0x9d, 0x93, 0x71, 0x7b, 0x6f, 0xc4, 0x7f, + 0xef, 0x8d, 0x76, 0xde, 0x7b, 0x63, 0x1d, 0xf6, 0xde, 0xbe, 0x2e, 0x7b, 0x6f, 0xbf, 0xd7, 0xde, + 0xfb, 0xbf, 0x05, 0x5e, 0x61, 0x59, 0xa9, 0x1f, 0xbf, 0x44, 0x07, 0x09, 0xdd, 0x4e, 0x04, 0xd1, + 0xa0, 0x27, 0x82, 0x58, 0xa0, 0x13, 0x41, 0x5f, 0xe0, 0x13, 0x41, 0x7f, 0xc7, 0x13, 0x81, 0x58, + 0x84, 0x91, 0xcd, 0x76, 0x43, 0xaf, 0x3f, 0x90, 0x2a, 0xba, 0xa2, 0x6a, 0xe8, 0x3e, 0xc4, 0xf6, + 0x9e, 0x4a, 0x46, 0x30, 0xe5, 0x4a, 0x37, 0x2d, 0xe5, 0xfa, 0x96, 0x48, 0x47, 0xf1, 0xe7, 0x05, + 0x18, 0xe6, 0x4a, 0xd1, 0x5d, 0x88, 0x91, 0x10, 0x07, 0xdd, 0xbd, 0x2f, 0x76, 0x1d, 0xf0, 0xa9, + 0xb4, 0xb3, 0xdf, 0x92, 0x4b, 0xa4, 0x13, 0xba, 0x67, 0xdf, 0x8c, 0x2e, 0x75, 0xed, 0xfd, 0x20, + 0xc3, 0xef, 0x45, 0xe2, 0x3c, 0xc0, 0x16, 0xf3, 0xc1, 0x3d, 0x02, 0x11, 0x0f, 0x61, 0xdc, 0xa8, + 0xf5, 0x5b, 0xe6, 0xf3, 0xdc, 0x81, 0xc9, 0xa1, 0x19, 0xfc, 0x91, 0xe9, 0x02, 0x4c, 0x95, 0x64, + 0x4d, 0xd6, 0xbb, 0x0c, 0x27, 0x3e, 0x83, 0xc5, 0x6d, 0xab, 0x55, 0x41, 0xd1, 0xeb, 0x4f, 0x59, + 0xf4, 0xc5, 0x0f, 0x40, 0x96, 0xb1, 0x8f, 0x32, 0xe0, 0x7a, 0x37, 0x06, 0xf0, 0x43, 0x5a, 0x7c, + 0x14, 0xaf, 0x42, 0xd2, 0x98, 0x74, 0x4d, 0xd9, 0x6b, 0x35, 0xe4, 0x0f, 0xea, 0xfa, 0xfe, 0x96, + 0xd2, 0xa8, 0x57, 0xf6, 0x3d, 0xf8, 0xf2, 0x49, 0x14, 0x12, 0x7e, 0xcd, 0x3d, 0xec, 0xe1, 0xb0, + 0x11, 0x19, 0xc4, 0x82, 0x19, 0x61, 0x9b, 0xb2, 0x55, 0x84, 0x32, 0xc6, 0x22, 0x52, 0x37, 0xb4, + 0xab, 0x4c, 0xd1, 0x89, 0x3a, 0x1f, 0x1c, 0x63, 0x47, 0x3b, 0x38, 0xf6, 0x85, 0x8d, 0xd5, 0xed, + 0xd5, 0x9b, 0xe5, 0x86, 0xdc, 0xac, 0xe9, 0xbb, 0x44, 0xa1, 0x62, 0xa5, 0xa1, 0xbd, 0x7a, 0x73, + 0x83, 0x14, 0xa0, 0xb3, 0x30, 0xba, 0x2b, 0x69, 0xe5, 0x86, 0xf2, 0x5c, 0x56, 0x2b, 0x92, 0x46, + 0xfd, 0x8d, 0xc1, 0xd2, 0xc8, 0xae, 0xa4, 0x6d, 0x18, 0x65, 0x46, 0xa3, 0x76, 0xab, 0xc5, 0x1a, + 0x0d, 0x9a, 0x8d, 0x1e, 0x19, 0x65, 0x78, 0x22, 0xdc, 0xa8, 0xd9, 0xde, 0x7b, 0x22, 0xab, 0x2c, + 0xac, 0x31, 0xb4, 0x2b, 0x69, 0x05, 0x52, 0x60, 0x54, 0x6b, 0xfb, 0x7b, 0x4f, 0x94, 0x06, 0x39, + 0xe3, 0xd1, 0xea, 0x6d, 0x52, 0x20, 0xfe, 0x1f, 0x01, 0x16, 0xfd, 0x96, 0x8d, 0xc6, 0xad, 0x50, + 0xca, 0xbe, 0x58, 0x02, 0x6f, 0x1b, 0xfe, 0x6f, 0xd4, 0xbe, 0x6c, 0x76, 0xaa, 0x23, 0x5d, 0xa9, + 0x8e, 0x06, 0xa1, 0x3a, 0xd6, 0x95, 0xea, 0xbe, 0xce, 0x54, 0xf7, 0x3b, 0xa9, 0xfe, 0x72, 0xc4, + 0x9f, 0x6a, 0x6a, 0xcd, 0x5d, 0x22, 0x9b, 0xf2, 0x10, 0xd9, 0x60, 0x5c, 0x88, 0x76, 0xe5, 0x42, + 0x2c, 0x08, 0x17, 0xfa, 0xba, 0x72, 0xa1, 0xbf, 0x33, 0x17, 0x06, 0x9c, 0x5c, 0x38, 0x0f, 0x93, + 0x06, 0x13, 0x32, 0x35, 0xd9, 0x57, 0xb3, 0xff, 0x63, 0x04, 0x26, 0x5c, 0xed, 0x7e, 0x1c, 0x55, + 0x7a, 0x09, 0x46, 0xf6, 0xa4, 0x0f, 0xca, 0x12, 0xe9, 0xbd, 0xaf, 0x31, 0xa5, 0x86, 0x3d, 0xe9, + 0x83, 0x0c, 0x6e, 0xb1, 0xaf, 0xa1, 0x4b, 0x10, 0x97, 0x3f, 0x68, 0xd5, 0x55, 0xb9, 0xfc, 0x5c, + 0x52, 0x9b, 0xb4, 0xd5, 0x00, 0xbd, 0x8d, 0xa0, 0xe5, 0x8f, 0x25, 0xb5, 0x89, 0x5b, 0x8a, 0x5f, + 0x11, 0x60, 0xd6, 0xc5, 0xd4, 0x1e, 0x14, 0xce, 0x89, 0x29, 0x12, 0x08, 0x53, 0xd4, 0x13, 0xd3, + 0xdf, 0xf2, 0xc2, 0x74, 0x0c, 0xea, 0xe0, 0xc4, 0x18, 0x0d, 0x84, 0x31, 0xe6, 0x89, 0xf1, 0xb2, + 0x05, 0x71, 0x43, 0xa9, 0xbc, 0xaf, 0xb4, 0x75, 0x5f, 0xb9, 0xfd, 0x41, 0x04, 0xa6, 0x3d, 0xdb, + 0xfe, 0x38, 0xca, 0xee, 0x19, 0xb6, 0x06, 0xba, 0x2e, 0xef, 0xb5, 0x74, 0x43, 0x76, 0x87, 0xf1, + 0x1a, 0xb0, 0x22, 0xf4, 0x2a, 0xcc, 0x68, 0xbb, 0xca, 0xf3, 0x72, 0x43, 0xa9, 0xbc, 0x5f, 0x56, + 0xda, 0x7a, 0xf9, 0xa9, 0x54, 0x6f, 0xb4, 0x55, 0x59, 0x63, 0x96, 0x63, 0x12, 0xd7, 0x62, 0x46, + 0x16, 0xdb, 0xfa, 0x03, 0x56, 0x85, 0x65, 0x66, 0xce, 0x93, 0xc9, 0x3d, 0xc8, 0xb2, 0x13, 0x63, + 0x24, 0x0c, 0xc6, 0xa8, 0x3f, 0xc6, 0x7f, 0xe6, 0x87, 0xf1, 0x18, 0x64, 0xdb, 0x89, 0x39, 0x1a, + 0x06, 0x73, 0xcc, 0x1f, 0xf3, 0x2c, 0xf4, 0x15, 0xd5, 0x9a, 0xe7, 0x45, 0xd8, 0x50, 0x51, 0xad, + 0x65, 0x95, 0x3d, 0xa9, 0xde, 0xc4, 0x87, 0x97, 0x2a, 0xf9, 0x8b, 0x35, 0x60, 0xbf, 0xc4, 0xff, + 0x2f, 0x40, 0xb4, 0xa8, 0xd6, 0x5c, 0x94, 0x85, 0x75, 0x8d, 0x8b, 0x6a, 0xed, 0x25, 0x8a, 0xc5, + 0x23, 0x88, 0x71, 0x31, 0x1e, 0xf2, 0x37, 0xc7, 0x81, 0x7e, 0x1b, 0x07, 0x2e, 0xc0, 0x58, 0x51, + 0xad, 0x6d, 0xca, 0x78, 0x1f, 0x2c, 0x29, 0x0d, 0x59, 0xc3, 0x07, 0x63, 0x15, 0xff, 0x41, 0x4e, + 0x29, 0x43, 0x25, 0xfa, 0x43, 0xfc, 0x95, 0x08, 0xe1, 0x27, 0x6d, 0x88, 0x66, 0x61, 0x80, 0xc4, + 0x66, 0x4c, 0xa6, 0xf5, 0xe3, 0x9f, 0x79, 0x47, 0x10, 0x3e, 0xe2, 0x08, 0xc2, 0x9b, 0x91, 0x84, + 0x28, 0x1f, 0x49, 0xb0, 0x87, 0xb4, 0x62, 0x1d, 0x43, 0x5a, 0x7d, 0x8e, 0x90, 0x96, 0x89, 0xb5, + 0x9f, 0xc3, 0xea, 0x64, 0xde, 0x40, 0x28, 0xe6, 0xb9, 0x96, 0x6e, 0x30, 0xdc, 0xd2, 0x89, 0x3f, + 0x05, 0x93, 0x99, 0x6a, 0xd5, 0x62, 0x2a, 0x3b, 0x7b, 0x4c, 0x43, 0xbf, 0xa2, 0xd6, 0x2c, 0x8e, + 0xf5, 0x29, 0x6a, 0x2d, 0x5f, 0xe5, 0x39, 0x19, 0xb1, 0x71, 0xd2, 0x24, 0x2d, 0xca, 0x2f, 0xc3, + 0x7b, 0x30, 0x43, 0xef, 0x3b, 0x4e, 0x68, 0xfc, 0x87, 0x30, 0x53, 0x92, 0xf7, 0x94, 0x67, 0x47, + 0x1e, 0x5f, 0xfc, 0x58, 0x80, 0x59, 0x73, 0x90, 0x93, 0x8e, 0xda, 0x66, 0x1c, 0x51, 0xdb, 0xcb, + 0x01, 0x14, 0x96, 0x91, 0x67, 0x84, 0x6e, 0x3f, 0x16, 0x60, 0xc6, 0x85, 0xb7, 0x23, 0xe9, 0xa1, + 0xde, 0x36, 0xa0, 0x82, 0x15, 0xc6, 0xa7, 0x18, 0x6f, 0x06, 0xc6, 0xe8, 0x19, 0xcb, 0xff, 0x57, + 0x02, 0x4c, 0x79, 0xb5, 0x40, 0x05, 0x3e, 0xa0, 0xbf, 0x12, 0x72, 0x92, 0x17, 0x1c, 0xd5, 0xbf, + 0x05, 0x53, 0xec, 0x91, 0x03, 0xdd, 0x06, 0x0d, 0x8e, 0x2f, 0x32, 0x0b, 0xe6, 0xbe, 0xf2, 0x27, + 0xe5, 0xe2, 0x03, 0xb3, 0x1f, 0xdd, 0x9a, 0xfc, 0x0e, 0xf8, 0xc6, 0x38, 0x11, 0x9f, 0x71, 0x8a, + 0x30, 0xc8, 0xc6, 0xd1, 0xd0, 0x1a, 0x0c, 0xb2, 0xd7, 0x17, 0x46, 0x80, 0xa6, 0x6b, 0x3c, 0x85, + 0xf5, 0x2d, 0x99, 0x1d, 0xc5, 0xef, 0x45, 0x61, 0x80, 0x95, 0xba, 0xc0, 0x20, 0x1e, 0x0c, 0x33, + 0xcb, 0xab, 0x76, 0x7f, 0xe9, 0x6a, 0xc0, 0x19, 0x6d, 0x9b, 0xcd, 0x91, 0xf6, 0x0a, 0x97, 0xb9, + 0xeb, 0x0b, 0xb9, 0x53, 0xdd, 0x67, 0x31, 0x94, 0xfe, 0x80, 0x0e, 0x1f, 0x25, 0x80, 0x0b, 0x43, + 0x9d, 0x87, 0x31, 0x55, 0xd6, 0x94, 0xb6, 0x5a, 0x91, 0xcb, 0xca, 0xf3, 0x26, 0x0b, 0x62, 0x0f, + 0x95, 0x46, 0x8d, 0xd2, 0x22, 0x2e, 0xe4, 0x94, 0x70, 0x90, 0x57, 0xc2, 0x53, 0x30, 0x88, 0x8b, + 0xb9, 0x4b, 0x82, 0x01, 0x45, 0xad, 0x19, 0x77, 0xbe, 0xb8, 0x8a, 0x6d, 0x7b, 0xf4, 0xd6, 0x76, + 0x48, 0x31, 0x7d, 0x82, 0x53, 0x30, 0x58, 0x53, 0xa5, 0x26, 0x79, 0x7d, 0x43, 0xaf, 0x6c, 0x07, + 0xc8, 0xef, 0x7c, 0x55, 0xfc, 0x07, 0x02, 0x4c, 0x1b, 0x9c, 0x3e, 0x61, 0xcb, 0x75, 0xdf, 0x61, + 0xb9, 0x02, 0xcb, 0x9c, 0x61, 0xb7, 0xbe, 0x2a, 0x98, 0xba, 0x70, 0x94, 0x7b, 0xcd, 0x0d, 0xcb, + 0x3c, 0x45, 0x09, 0x90, 0x95, 0xa0, 0xa2, 0xe8, 0x65, 0x9c, 0xbe, 0x2b, 0x00, 0x72, 0xd7, 0xa3, + 0x0d, 0xde, 0x34, 0x5d, 0x0f, 0x35, 0xc1, 0x0b, 0x36, 0x4c, 0x29, 0x13, 0x7f, 0x77, 0xd7, 0xe8, + 0xdb, 0x11, 0x18, 0xb5, 0x35, 0xfe, 0xcc, 0x3d, 0xea, 0xe0, 0x1e, 0x7d, 0x1e, 0xe2, 0x36, 0x66, + 0x65, 0xaa, 0x55, 0x97, 0xa5, 0x0c, 0xe9, 0xb4, 0xec, 0xc0, 0xa4, 0x6d, 0x48, 0xf6, 0x84, 0xf0, + 0x88, 0xa3, 0xde, 0x73, 0x8c, 0x4a, 0xfd, 0xa2, 0xc0, 0xa3, 0x8a, 0x7b, 0x30, 0x66, 0xe8, 0xaa, + 0xd2, 0x90, 0xbd, 0xc8, 0xf4, 0xda, 0x10, 0x9c, 0xf7, 0xb0, 0x51, 0xf7, 0x3d, 0xec, 0x14, 0xf4, + 0xd5, 0x54, 0xa5, 0xdd, 0x62, 0xc2, 0x40, 0x7f, 0x88, 0xbf, 0x2e, 0xc0, 0x30, 0x37, 0x9f, 0xe3, + 0x79, 0xa1, 0xe0, 0x78, 0x5e, 0xd8, 0xeb, 0xdc, 0x47, 0x3e, 0x9c, 0x9b, 0xe0, 0xfb, 0x78, 0xf0, + 0xb7, 0x61, 0x82, 0xc3, 0xee, 0xc3, 0x69, 0x0f, 0xc8, 0xf8, 0xc8, 0x7a, 0x8a, 0xeb, 0x79, 0xd2, + 0xd6, 0x7a, 0xcd, 0x61, 0xad, 0x83, 0x6e, 0x77, 0x84, 0x2a, 0xc3, 0x62, 0xff, 0x9a, 0x00, 0x09, + 0x0f, 0xcc, 0xd4, 0x6a, 0x77, 0x59, 0xb6, 0x70, 0x3e, 0xe7, 0x96, 0xd3, 0xe7, 0xbc, 0x15, 0x02, + 0xaf, 0xa7, 0x61, 0xff, 0xb7, 0x02, 0xcc, 0x78, 0xb7, 0x41, 0x5b, 0xbc, 0x71, 0xbf, 0x19, 0x7a, + 0xa2, 0x17, 0x6c, 0xe0, 0x0f, 0x05, 0x98, 0xb3, 0xa9, 0xf7, 0x49, 0x8b, 0x4e, 0xce, 0x21, 0x3a, + 0xd7, 0x02, 0x72, 0xc8, 0x71, 0x4c, 0xf9, 0x17, 0x02, 0x24, 0x3d, 0x71, 0x9f, 0x80, 0xf8, 0x94, + 0x9c, 0xe2, 0xf3, 0x7a, 0x28, 0xcc, 0x9e, 0x02, 0xf4, 0x5b, 0x96, 0xf0, 0xbb, 0x8f, 0x2e, 0x25, + 0x5e, 0x84, 0x6e, 0xf5, 0x30, 0xd9, 0x0b, 0x16, 0xa2, 0xdf, 0x89, 0xc0, 0x30, 0xf7, 0xc8, 0xfb, + 0xc8, 0x61, 0xa4, 0x4c, 0xab, 0xf5, 0x92, 0x87, 0x91, 0x36, 0x61, 0x58, 0xa9, 0x57, 0x2b, 0xe5, + 0x8a, 0xd2, 0x7c, 0x5a, 0xaf, 0xb1, 0xcd, 0x3f, 0xd5, 0xf5, 0x90, 0x99, 0xcf, 0xae, 0xad, 0x91, + 0x1e, 0x0f, 0x5f, 0x29, 0x01, 0x1e, 0x80, 0xfe, 0x5a, 0x1d, 0x01, 0x90, 0x5a, 0x2d, 0x36, 0x9a, + 0xf8, 0x04, 0x26, 0x38, 0x6e, 0xb2, 0xa0, 0x63, 0x17, 0x89, 0xa6, 0x2c, 0x8f, 0xb8, 0x4e, 0x7c, + 0x7d, 0x3e, 0x27, 0xbe, 0x5f, 0x8e, 0x01, 0x58, 0x70, 0xd0, 0x59, 0x18, 0x55, 0xe5, 0x6a, 0x5d, + 0xc5, 0xc3, 0xb7, 0xd5, 0xba, 0xe1, 0xd9, 0x8d, 0x18, 0x85, 0x8f, 0xd4, 0xba, 0x86, 0x1e, 0x93, + 0x13, 0x0a, 0xb1, 0x0b, 0xe4, 0x8b, 0x02, 0x2d, 0x11, 0x59, 0x8a, 0x06, 0xf1, 0x60, 0xf1, 0x44, + 0x86, 0x45, 0x21, 0x27, 0x9e, 0x51, 0x95, 0xfb, 0xa5, 0xa1, 0x02, 0x0c, 0xd3, 0x23, 0x08, 0x1d, + 0x35, 0x4a, 0x46, 0xbd, 0x16, 0x64, 0xd4, 0x75, 0xdc, 0x8d, 0x0c, 0x09, 0x35, 0xe3, 0x4f, 0x0d, + 0xbd, 0x07, 0x71, 0xc9, 0x62, 0x20, 0xfd, 0xfa, 0x21, 0x46, 0x44, 0xef, 0xd5, 0x20, 0x83, 0x72, + 0xcc, 0x27, 0x43, 0x8f, 0x4b, 0xf6, 0x02, 0xec, 0x6c, 0x56, 0x1a, 0x75, 0x99, 0x9e, 0x99, 0x98, + 0xb3, 0x49, 0x0b, 0xf2, 0x55, 0xcc, 0x4a, 0x56, 0xa9, 0xc9, 0x15, 0x55, 0xd6, 0x59, 0xa0, 0x71, + 0x84, 0x16, 0x6e, 0x93, 0x32, 0xf4, 0xd3, 0x10, 0x97, 0xda, 0xfa, 0x6e, 0x99, 0xaa, 0x15, 0x45, + 0x38, 0x10, 0x30, 0x52, 0x81, 0x11, 0xb6, 0x75, 0xa6, 0x99, 0x04, 0xe0, 0x98, 0x64, 0xfb, 0x8d, + 0xde, 0x80, 0x53, 0x2d, 0x85, 0x3e, 0x42, 0x56, 0xda, 0x7a, 0xd9, 0xbe, 0xb2, 0x83, 0x64, 0x65, + 0x67, 0x70, 0x83, 0x0d, 0x52, 0x5f, 0xe2, 0xd6, 0x58, 0xfc, 0x46, 0x0c, 0xa6, 0x1d, 0x3c, 0x60, + 0x91, 0xf9, 0x2e, 0x02, 0xd8, 0x25, 0xc4, 0xe0, 0x96, 0xb0, 0x68, 0x20, 0x09, 0x8b, 0x9d, 0x88, + 0x84, 0xf5, 0x9d, 0x84, 0x84, 0xf5, 0x1f, 0xa3, 0x84, 0xbd, 0xb4, 0xf2, 0xf1, 0xcd, 0x18, 0xc4, + 0x2d, 0xbb, 0x11, 0xcc, 0x36, 0x9d, 0x87, 0x31, 0x9e, 0x59, 0xa6, 0x9d, 0x1a, 0xe5, 0x4a, 0xa9, + 0xe2, 0x7c, 0x26, 0x21, 0x3f, 0xfa, 0x12, 0xf2, 0x2a, 0x8c, 0xac, 0xf1, 0xa6, 0xce, 0x65, 0x0f, + 0x05, 0xb7, 0x3d, 0x24, 0xe7, 0x17, 0x8e, 0xe4, 0x97, 0xee, 0xfc, 0xc2, 0x61, 0xb3, 0x9d, 0x5f, + 0x3c, 0x30, 0xbf, 0x14, 0xe7, 0x17, 0x17, 0x2e, 0x8f, 0xf3, 0x8b, 0x77, 0x9b, 0x90, 0xe7, 0x17, + 0xd7, 0x20, 0x2f, 0xd8, 0xf5, 0xfc, 0xd7, 0x51, 0x18, 0x61, 0x0e, 0x30, 0xd1, 0xc3, 0x90, 0x9f, + 0x17, 0xa2, 0x73, 0x30, 0x46, 0x94, 0x56, 0xae, 0x96, 0x59, 0x58, 0x95, 0x0e, 0x3f, 0xc2, 0x4a, + 0x8b, 0x24, 0xba, 0x7a, 0x09, 0xe2, 0x7c, 0x2b, 0x2e, 0x04, 0x35, 0x66, 0xb5, 0x23, 0x81, 0x81, + 0xab, 0x80, 0xf8, 0x96, 0x2c, 0xe8, 0x4a, 0x7d, 0x84, 0xb8, 0xd5, 0x96, 0xc5, 0x5e, 0x17, 0x00, + 0x54, 0xa5, 0x21, 0x93, 0x01, 0x8d, 0xe8, 0xd4, 0x10, 0x2e, 0xc1, 0x63, 0x69, 0x68, 0xdd, 0xf0, + 0x9b, 0xa9, 0x62, 0xdf, 0x08, 0x78, 0x12, 0x20, 0x8c, 0xe8, 0xec, 0x40, 0x0f, 0x1e, 0xcd, 0x81, + 0x1e, 0x0a, 0xfb, 0x96, 0xc0, 0x58, 0x02, 0xfe, 0xc3, 0x21, 0x56, 0x46, 0xde, 0xb1, 0x7f, 0x60, + 0xc6, 0x19, 0x09, 0xf8, 0x60, 0x2e, 0x87, 0x7b, 0xed, 0x22, 0x1e, 0x6b, 0x67, 0xe7, 0x71, 0xd4, + 0xc1, 0x63, 0xf1, 0x89, 0x7d, 0xe6, 0xde, 0xbc, 0xed, 0x2e, 0x73, 0xdc, 0x37, 0x43, 0x60, 0x64, + 0x8e, 0x7c, 0x36, 0xe4, 0xf8, 0xe2, 0x12, 0x8c, 0xad, 0x53, 0x9a, 0x8c, 0x01, 0x9c, 0xd7, 0xfc, + 0xbf, 0x6a, 0x9d, 0x87, 0xe9, 0xf2, 0x9f, 0xb0, 0x05, 0xcd, 0x3a, 0x2c, 0xe8, 0xd5, 0x30, 0xb2, + 0x69, 0x9a, 0xd0, 0x5d, 0x33, 0x6a, 0x65, 0x03, 0x7d, 0xfc, 0x26, 0x54, 0x4c, 0xc3, 0x2c, 0x3f, + 0x53, 0xf7, 0x68, 0xf6, 0x3f, 0x8d, 0xd8, 0x05, 0xe3, 0xb3, 0x90, 0x76, 0xd7, 0x90, 0xf6, 0x9f, + 0xb7, 0xae, 0x8b, 0x38, 0x96, 0x65, 0xaa, 0xd5, 0x6e, 0x4b, 0xc9, 0x5f, 0x41, 0x45, 0x6c, 0x57, + 0x50, 0x3c, 0xbf, 0xa3, 0xde, 0xc1, 0xea, 0x18, 0xbf, 0x6a, 0x5f, 0xb6, 0xc2, 0x2a, 0x1c, 0x04, + 0x16, 0x08, 0x7f, 0x61, 0x28, 0xf6, 0xbc, 0x40, 0xb0, 0x68, 0xee, 0xf1, 0x83, 0x10, 0xff, 0xa5, + 0x00, 0x4b, 0xee, 0xf9, 0x4e, 0xda, 0x02, 0xfc, 0x84, 0xc3, 0x02, 0xac, 0x84, 0xb1, 0x00, 0x8e, + 0x68, 0xde, 0x0f, 0x04, 0x38, 0xed, 0x4f, 0x41, 0x20, 0x73, 0xd0, 0x81, 0x71, 0x16, 0xe9, 0x51, + 0x6f, 0xd2, 0x63, 0x3c, 0xe9, 0x8f, 0x9d, 0xdf, 0x19, 0xbe, 0x19, 0x9e, 0x30, 0x4f, 0x9f, 0xeb, + 0x3f, 0x09, 0xb0, 0xd0, 0xb1, 0x29, 0x7a, 0xcc, 0xbb, 0x5e, 0x77, 0x7b, 0x9d, 0xf6, 0x05, 0x7b, + 0x60, 0x7f, 0x3d, 0x46, 0x3f, 0x2f, 0xf2, 0x76, 0xbf, 0x7c, 0x2f, 0x9b, 0xac, 0x7b, 0xec, 0x28, + 0x7f, 0x8f, 0x6d, 0x5f, 0xe5, 0x98, 0x73, 0x95, 0xed, 0x1b, 0x6d, 0x9f, 0xd3, 0x61, 0xca, 0x1a, + 0x0e, 0x13, 0x3d, 0x69, 0x2d, 0x07, 0xf9, 0xae, 0x30, 0x80, 0xb7, 0x34, 0x70, 0x34, 0x6f, 0x69, + 0x30, 0x94, 0x19, 0xee, 0xf4, 0xbd, 0x9f, 0x63, 0xcb, 0x80, 0x8e, 0x5b, 0xc6, 0xb0, 0x7b, 0xcb, + 0xa0, 0x9b, 0xd0, 0x08, 0xbf, 0x09, 0xf1, 0x0f, 0x07, 0x46, 0x3b, 0x3d, 0x1c, 0x18, 0x73, 0x3e, + 0x1c, 0x70, 0xba, 0x75, 0xe3, 0x6e, 0xb7, 0xee, 0x4b, 0xf4, 0x3b, 0x5b, 0xde, 0xa7, 0xf3, 0xdd, + 0x40, 0x2d, 0x81, 0x88, 0xf8, 0x0b, 0x44, 0xb4, 0xb3, 0x40, 0xc4, 0x9c, 0x9e, 0xd7, 0xbb, 0x1c, + 0x00, 0xe6, 0xda, 0xf9, 0x02, 0x08, 0xe9, 0xd4, 0xdd, 0xa2, 0x9f, 0x9f, 0x19, 0x0e, 0x59, 0xd0, + 0x61, 0xc5, 0x9f, 0x36, 0xfd, 0x0a, 0xbe, 0x7b, 0x17, 0xeb, 0xe6, 0xab, 0x46, 0x74, 0xf4, 0xa8, + 0x39, 0xfa, 0x97, 0xcc, 0x7b, 0x29, 0x27, 0xdd, 0xc7, 0x34, 0x43, 0x37, 0x8e, 0x37, 0xec, 0x8e, + 0x16, 0x4f, 0xe3, 0x25, 0x88, 0x1b, 0x08, 0x4c, 0x53, 0x4d, 0x71, 0x8c, 0xb5, 0x78, 0xf7, 0x38, + 0x04, 0xb9, 0xdf, 0xb5, 0xae, 0xaf, 0xec, 0xd3, 0xf5, 0x28, 0x6d, 0x5e, 0x10, 0xa3, 0x9e, 0x10, + 0x2f, 0xb8, 0x0d, 0x15, 0xcb, 0x73, 0x11, 0x17, 0x82, 0x5b, 0x2c, 0xf1, 0x17, 0xfd, 0x08, 0x60, + 0xab, 0x76, 0xfc, 0x3c, 0xeb, 0xb6, 0x80, 0x1f, 0x0b, 0x30, 0x6b, 0xd9, 0xc5, 0x97, 0xed, 0xc1, + 0xa2, 0x89, 0xcc, 0xf4, 0x1d, 0xfe, 0xaa, 0x00, 0x33, 0x2e, 0xbc, 0xbd, 0x3c, 0xfd, 0x29, 0x38, + 0x9f, 0xfe, 0xdc, 0x0c, 0xbe, 0x7d, 0x78, 0xed, 0xf7, 0xbf, 0x23, 0xc0, 0x94, 0x57, 0x8b, 0x90, + 0x2f, 0x13, 0x1d, 0x43, 0x78, 0xec, 0xee, 0x85, 0xa3, 0xec, 0xee, 0xc6, 0x60, 0x89, 0x57, 0xba, + 0xec, 0xf3, 0xff, 0xdc, 0x72, 0x5f, 0x7c, 0xd8, 0x7d, 0xac, 0x31, 0xaf, 0xf0, 0xef, 0x44, 0xbb, + 0xae, 0x86, 0xe8, 0xa9, 0x68, 0x76, 0x1a, 0x82, 0xeb, 0xdb, 0x0f, 0x97, 0x9c, 0x5f, 0x88, 0xc0, + 0x4c, 0xa6, 0xad, 0xef, 0x1e, 0x59, 0xea, 0x2b, 0x3e, 0x89, 0x3c, 0xba, 0xca, 0xa5, 0x63, 0xf6, + 0x90, 0xd9, 0x3c, 0x0a, 0x4e, 0x2f, 0xfb, 0x66, 0xc8, 0xf9, 0x3c, 0x94, 0xcd, 0xab, 0x45, 0x48, + 0x65, 0xeb, 0x48, 0xd4, 0x0b, 0x54, 0x36, 0x6c, 0x84, 0x5d, 0xcb, 0xfb, 0xd2, 0x18, 0x61, 0x13, + 0x99, 0x69, 0x84, 0xf7, 0x60, 0xc8, 0x2c, 0xc4, 0x40, 0xc8, 0x6e, 0x6a, 0x7f, 0x26, 0x3e, 0x0f, + 0x96, 0x2d, 0x70, 0xc7, 0x61, 0x67, 0x80, 0x6d, 0x57, 0x41, 0x0e, 0xd8, 0xa9, 0x7f, 0x22, 0xd0, + 0x33, 0x07, 0x71, 0xdb, 0xd1, 0x29, 0x98, 0x7e, 0xb4, 0x9d, 0x2b, 0x6d, 0xef, 0x64, 0x76, 0x72, + 0xe5, 0x47, 0x85, 0xed, 0xad, 0xdc, 0x5a, 0xfe, 0x41, 0x3e, 0x97, 0x8d, 0xbf, 0x82, 0xa6, 0x20, + 0x6e, 0x55, 0x65, 0xd6, 0x76, 0xf2, 0xef, 0xe4, 0xe2, 0x02, 0x9a, 0x01, 0x64, 0x95, 0xe6, 0x0b, + 0xac, 0x3c, 0x82, 0xa6, 0x61, 0xc2, 0x2a, 0xcf, 0xe6, 0x36, 0x72, 0x3b, 0xb9, 0x6c, 0x3c, 0x6a, + 0x1f, 0x64, 0xa3, 0xb8, 0xf6, 0x76, 0x2e, 0x1b, 0x8f, 0xd9, 0x1b, 0x6f, 0x3f, 0xda, 0xde, 0xca, + 0x15, 0xb2, 0xf1, 0x3e, 0x7b, 0x71, 0xbe, 0x90, 0xdf, 0xc9, 0x67, 0x36, 0xe2, 0xfd, 0xa9, 0x3f, + 0x03, 0xfd, 0x34, 0xd9, 0x04, 0x9e, 0x7c, 0x3d, 0x57, 0xc8, 0xe6, 0x4a, 0x0e, 0xa8, 0x13, 0x30, + 0xca, 0xca, 0x1f, 0xe4, 0x36, 0x33, 0x1b, 0x18, 0xe7, 0x38, 0x0c, 0xb3, 0x22, 0x52, 0x10, 0x41, + 0x08, 0xc6, 0x58, 0x41, 0x36, 0xff, 0x4e, 0xae, 0xb4, 0x9d, 0x8b, 0x47, 0x53, 0xff, 0x4f, 0x80, + 0x51, 0x5b, 0x3a, 0x1a, 0xb4, 0x00, 0xa7, 0x08, 0x84, 0x5c, 0xa6, 0xb4, 0xf6, 0xf0, 0xed, 0xdc, + 0xbb, 0x8e, 0x89, 0xe6, 0x60, 0xd6, 0x51, 0xbd, 0x9d, 0x2b, 0x95, 0x0b, 0x99, 0x4d, 0x3c, 0xe5, + 0x3c, 0x24, 0xec, 0x95, 0x0f, 0xf2, 0xa5, 0xed, 0x1d, 0x5a, 0x1b, 0x71, 0x77, 0xdd, 0xc8, 0x18, + 0x95, 0x51, 0x77, 0x65, 0x21, 0xbf, 0xf6, 0x36, 0xad, 0x8c, 0xa1, 0x45, 0x48, 0xda, 0x2b, 0xb3, + 0xf9, 0xed, 0xad, 0x8d, 0xcc, 0xbb, 0xb4, 0xbe, 0x0f, 0xcd, 0xc2, 0xa4, 0xbd, 0x3e, 0xb7, 0x99, + 0xc9, 0x6f, 0xc4, 0xfb, 0xdd, 0x15, 0x84, 0xb3, 0xf1, 0x81, 0xd4, 0xcf, 0xc0, 0x08, 0xaf, 0x5a, + 0xb8, 0x21, 0x6d, 0xb4, 0x99, 0xdb, 0x79, 0x58, 0xcc, 0x96, 0x73, 0x9f, 0x7f, 0x94, 0xd9, 0xd8, + 0x8e, 0xbf, 0x82, 0x49, 0xb2, 0x55, 0x6c, 0xef, 0x64, 0x4a, 0x3b, 0xdb, 0xe5, 0xc7, 0xf9, 0x9d, + 0x87, 0x71, 0x01, 0x0b, 0x8f, 0xad, 0x76, 0xad, 0x58, 0xd8, 0xc9, 0xe4, 0x0b, 0xdb, 0xf1, 0x48, + 0x2a, 0x0b, 0x03, 0x2c, 0x53, 0x00, 0x1e, 0x7c, 0xf3, 0x41, 0x66, 0xe7, 0xdd, 0x2d, 0xa7, 0x80, + 0x8d, 0xc3, 0xb0, 0x51, 0xb1, 0xbd, 0xb9, 0x4d, 0xd7, 0xcc, 0x28, 0x28, 0xee, 0x6c, 0xc5, 0x23, + 0xa9, 0xa7, 0x30, 0x68, 0x64, 0x0c, 0x40, 0x09, 0x98, 0xc2, 0x7f, 0x7b, 0x08, 0xea, 0x0c, 0x20, + 0xb3, 0xa6, 0x50, 0xdc, 0x29, 0x97, 0x72, 0x99, 0xec, 0xbb, 0x71, 0x01, 0xaf, 0xb8, 0x59, 0x4e, + 0xcb, 0x22, 0x58, 0x1e, 0xb9, 0xb2, 0xcd, 0xe2, 0x3b, 0x58, 0x4a, 0x53, 0x0f, 0x21, 0xee, 0xfc, + 0x30, 0x1f, 0x25, 0x61, 0xa6, 0x50, 0xdc, 0xc9, 0x3f, 0xc8, 0xaf, 0x65, 0x76, 0xf2, 0xc5, 0x02, + 0x41, 0x45, 0x19, 0xfb, 0x0a, 0xc6, 0xe2, 0xaa, 0x23, 0x24, 0xa4, 0xda, 0x30, 0xcc, 0x7d, 0x8f, + 0x88, 0xd7, 0x75, 0xab, 0xb8, 0x91, 0x5f, 0x7b, 0xd7, 0x07, 0x37, 0x5f, 0x69, 0xaa, 0x58, 0x02, + 0xa6, 0xf8, 0x72, 0x4e, 0xc9, 0x66, 0x61, 0x92, 0xaf, 0x31, 0xd5, 0x2c, 0xb5, 0x05, 0x83, 0xc6, + 0xf7, 0x63, 0xb8, 0x7b, 0xb1, 0xb4, 0xee, 0x35, 0xe1, 0x24, 0x8c, 0x9b, 0x35, 0xe6, 0x6c, 0xd3, + 0x30, 0x61, 0x16, 0x5a, 0x53, 0xa5, 0x7e, 0x43, 0x00, 0xe4, 0xfe, 0xb0, 0x03, 0x89, 0xb0, 0x58, + 0x2c, 0xad, 0x6f, 0xe6, 0x36, 0x57, 0xfd, 0x95, 0xe4, 0x0c, 0x2c, 0x78, 0xb4, 0xe1, 0x94, 0x41, + 0x40, 0x4b, 0x30, 0xef, 0xd1, 0xc4, 0xd2, 0x88, 0x08, 0x96, 0x3c, 0x8f, 0x16, 0x74, 0x01, 0xa2, + 0x58, 0x25, 0xbc, 0x60, 0x60, 0x65, 0xcc, 0x67, 0xe3, 0xb1, 0x94, 0x64, 0xde, 0x6c, 0x51, 0x9e, + 0xcc, 0x43, 0x62, 0xab, 0x54, 0xfc, 0x89, 0xdc, 0xda, 0x8e, 0x17, 0x5f, 0x30, 0x5b, 0xf9, 0x5a, + 0x93, 0x37, 0x49, 0x98, 0x31, 0x2a, 0x5c, 0x0c, 0x7a, 0x64, 0xbe, 0x95, 0x35, 0xa4, 0x9c, 0x35, + 0x65, 0x92, 0xfe, 0x76, 0xa1, 0xf8, 0xb8, 0x40, 0xcd, 0x28, 0x5f, 0xb1, 0x9d, 0xdb, 0x78, 0x10, + 0x17, 0x9c, 0xcd, 0xd7, 0x4b, 0x99, 0x02, 0x5e, 0xc9, 0x48, 0xea, 0xb1, 0xf9, 0xb6, 0xd9, 0x62, + 0xfa, 0x12, 0xcc, 0x1b, 0x30, 0xfc, 0x59, 0xee, 0x6a, 0xc1, 0x0a, 0x18, 0xcb, 0x53, 0x07, 0xd6, + 0x23, 0x7f, 0xdb, 0x8b, 0x49, 0x74, 0x0e, 0x96, 0x58, 0xd3, 0x52, 0x71, 0x23, 0xe7, 0x37, 0xc3, + 0x02, 0x9c, 0xf2, 0x6c, 0xc5, 0x16, 0xf4, 0x3c, 0x9c, 0xf1, 0xac, 0xb6, 0x99, 0xaa, 0x48, 0xea, + 0xfb, 0xd6, 0xdb, 0x4f, 0xa7, 0x64, 0x5d, 0x00, 0x91, 0x8d, 0xd0, 0x59, 0xba, 0xac, 0x99, 0x3a, + 0x4a, 0x98, 0x45, 0x55, 0x27, 0x29, 0xb3, 0x38, 0xeb, 0x27, 0x69, 0x22, 0x2c, 0xfa, 0xc1, 0x32, + 0xa5, 0x6d, 0x0b, 0x06, 0x8d, 0x67, 0x77, 0x58, 0xfb, 0x32, 0x5b, 0x5b, 0x3e, 0xda, 0x67, 0xd6, + 0xf0, 0xda, 0x67, 0x16, 0x72, 0xc2, 0xf5, 0x05, 0xfa, 0x52, 0x84, 0x7f, 0x74, 0x81, 0xad, 0x2d, + 0x29, 0xcb, 0x6d, 0x6f, 0x15, 0x0b, 0xdb, 0x39, 0x22, 0x37, 0x6b, 0xc5, 0x6c, 0x8e, 0x2e, 0x8e, + 0xab, 0x2a, 0x9f, 0x2d, 0xef, 0x14, 0xdf, 0xce, 0x15, 0xe2, 0x02, 0x3a, 0x0b, 0xa7, 0x5d, 0xd5, + 0xa4, 0xce, 0x6a, 0x14, 0x49, 0xa9, 0x30, 0x6a, 0x7b, 0x91, 0x81, 0x39, 0x48, 0x0a, 0xb0, 0x68, + 0x92, 0x2e, 0x99, 0x47, 0x3b, 0x0f, 0x8b, 0xa5, 0xfc, 0x4f, 0x12, 0x9b, 0x67, 0x4c, 0x9d, 0x84, + 0x19, 0x7b, 0xab, 0xfc, 0xe6, 0xd6, 0x46, 0x7e, 0x2d, 0xbf, 0x13, 0x17, 0xd0, 0x69, 0x98, 0xb3, + 0xd7, 0x95, 0x72, 0x0f, 0x4a, 0xb9, 0xed, 0x87, 0xe6, 0x9c, 0xcf, 0x60, 0xd2, 0xe3, 0xc1, 0x06, + 0xb6, 0x9a, 0xa4, 0x78, 0x0b, 0x8f, 0x64, 0x59, 0xd8, 0xc7, 0xb9, 0xd5, 0xf8, 0x2b, 0xc4, 0x02, + 0x79, 0x54, 0x92, 0xd5, 0xc8, 0xac, 0xe7, 0x0a, 0x78, 0x62, 0x6c, 0x1e, 0x3c, 0xda, 0x14, 0x32, + 0x8c, 0xbd, 0x0d, 0x40, 0xee, 0x87, 0x1c, 0xc4, 0xe4, 0xe0, 0xd2, 0x47, 0x3b, 0x6c, 0x43, 0x23, + 0x9d, 0x56, 0x33, 0xdb, 0xf9, 0x35, 0xba, 0xf5, 0x7b, 0xd4, 0x6e, 0x15, 0xb7, 0xf1, 0x84, 0xde, + 0x95, 0x85, 0x62, 0x01, 0xcf, 0x56, 0x86, 0x29, 0xaf, 0xab, 0x7e, 0xcc, 0x60, 0x0e, 0xe1, 0x76, + 0xae, 0x94, 0xf1, 0x51, 0x6d, 0x5b, 0x2b, 0x43, 0xfc, 0x32, 0x5b, 0x5b, 0x86, 0x6a, 0xeb, 0xe6, + 0xd3, 0x77, 0x2b, 0x20, 0xcb, 0x99, 0x04, 0xc2, 0x7f, 0x2f, 0x89, 0xb4, 0xac, 0x22, 0xd7, 0xc4, + 0x14, 0xcd, 0x45, 0x48, 0xba, 0x6b, 0x39, 0x19, 0xfd, 0x43, 0x47, 0xf8, 0xc5, 0xa9, 0xd0, 0x57, + 0xe0, 0x22, 0xdf, 0xbf, 0xb3, 0x56, 0xa7, 0xe0, 0x42, 0xa7, 0xc6, 0x36, 0xd5, 0xbe, 0x0c, 0xe7, + 0x3b, 0xb5, 0xe5, 0xf5, 0xdb, 0x32, 0x16, 0x9e, 0x4d, 0x0d, 0x25, 0xbf, 0x08, 0x67, 0x3b, 0x42, + 0x35, 0x35, 0x7d, 0x17, 0xc6, 0xec, 0x71, 0x6f, 0xc3, 0x39, 0xf3, 0xe5, 0x31, 0x73, 0xb0, 0xbd, + 0x18, 0xcc, 0x9c, 0x3e, 0x6f, 0xee, 0x7e, 0x9d, 0x25, 0x2b, 0xb4, 0x9f, 0xa8, 0xb0, 0xf4, 0x5b, + 0x7d, 0xfc, 0x37, 0x03, 0x8f, 0x36, 0xc6, 0x76, 0x90, 0xcf, 0xd2, 0xb5, 0xf5, 0x1a, 0x86, 0xd1, + 0x19, 0x31, 0xdc, 0x60, 0x47, 0x7d, 0xb1, 0xb4, 0x8e, 0xab, 0xa3, 0x04, 0x9c, 0xfb, 0xb8, 0x87, + 0xc1, 0x61, 0x0d, 0xe8, 0x08, 0x6e, 0x01, 0x4e, 0x79, 0xb4, 0x61, 0x23, 0x0b, 0x44, 0xda, 0xdd, + 0xd5, 0x1c, 0xf6, 0x08, 0xc6, 0xee, 0x35, 0x0b, 0xc3, 0x1e, 0x5d, 0xf9, 0xea, 0xd7, 0x04, 0x98, + 0xd8, 0x34, 0x0f, 0x5e, 0xdb, 0xb2, 0xfa, 0xac, 0x5e, 0x91, 0xd1, 0xdb, 0x30, 0xf0, 0x50, 0x96, + 0x1a, 0xfa, 0xee, 0x17, 0xd1, 0x8c, 0xeb, 0x3a, 0x21, 0xb7, 0xd7, 0xd2, 0xf7, 0x93, 0x3e, 0xe5, + 0x62, 0xfc, 0xe0, 0xfb, 0xff, 0xfd, 0x6b, 0x11, 0x40, 0x83, 0xe9, 0x5d, 0x36, 0xc2, 0x3a, 0xf4, + 0x95, 0x64, 0xa9, 0xba, 0x1f, 0x7a, 0xa8, 0x31, 0x32, 0xd4, 0x20, 0xea, 0x4f, 0xab, 0xa4, 0x7f, + 0x01, 0x06, 0xdf, 0x61, 0x79, 0xdd, 0x7d, 0xc7, 0xf2, 0xcb, 0x12, 0x2e, 0x4e, 0x90, 0xc1, 0x86, + 0xd1, 0x90, 0x99, 0x1b, 0x1e, 0x7d, 0x09, 0x86, 0xd7, 0x65, 0x12, 0xa0, 0x59, 0xdd, 0xcf, 0x67, + 0xd1, 0x85, 0x20, 0x91, 0x92, 0x7c, 0x36, 0x19, 0x28, 0x45, 0xa5, 0x28, 0x1e, 0x1c, 0x26, 0x86, + 0xe9, 0x15, 0xcb, 0x32, 0x86, 0x4f, 0xa6, 0x1f, 0x45, 0xc3, 0x69, 0x5c, 0xa2, 0xa5, 0x3f, 0xac, + 0x57, 0x3f, 0x42, 0xdf, 0x10, 0x60, 0xca, 0x44, 0x40, 0x72, 0xe9, 0xad, 0x37, 0x94, 0x27, 0x52, + 0x03, 0x5d, 0x09, 0x32, 0x05, 0xcb, 0x39, 0x1e, 0x10, 0xcf, 0x8a, 0x17, 0x9e, 0x05, 0x34, 0x97, + 0xae, 0x91, 0x29, 0x19, 0x2c, 0x72, 0x57, 0x93, 0xfe, 0x90, 0xfc, 0xf3, 0x11, 0xfa, 0x1b, 0x02, + 0x0c, 0x53, 0x89, 0xc5, 0x43, 0x68, 0xe8, 0x46, 0xf0, 0x74, 0xa5, 0x2c, 0x48, 0x94, 0x5c, 0x09, + 0xd3, 0x85, 0x6e, 0xe0, 0xe2, 0x25, 0x2f, 0xa8, 0x93, 0xe2, 0x18, 0xc3, 0x58, 0xd6, 0x48, 0xf3, + 0x3b, 0x42, 0x0a, 0x03, 0x1c, 0xc9, 0x6b, 0x78, 0x08, 0x9a, 0xd6, 0x3c, 0x00, 0x42, 0x67, 0x1e, + 0xf6, 0x00, 0x08, 0x5d, 0xa9, 0xd5, 0xc5, 0x8b, 0x5e, 0x08, 0x11, 0x8a, 0x1b, 0x08, 0xeb, 0x1a, + 0x4d, 0xbb, 0x8e, 0x7e, 0x4e, 0x00, 0xb0, 0xd2, 0xac, 0x77, 0x87, 0xe7, 0x4a, 0xc9, 0x1e, 0x70, + 0x75, 0xcf, 0x1c, 0x1c, 0x26, 0x46, 0x00, 0x08, 0xa0, 0xe7, 0x6a, 0x5d, 0x97, 0xa9, 0xb4, 0x8b, + 0xfd, 0x14, 0x11, 0xe6, 0xd5, 0x57, 0x05, 0x18, 0xcb, 0xca, 0x52, 0x45, 0xaf, 0x3f, 0x33, 0xe0, + 0x1c, 0xaf, 0xc4, 0xaf, 0x78, 0x62, 0x98, 0x4f, 0xce, 0x72, 0x22, 0x9f, 0x2e, 0x57, 0x4d, 0x08, + 0x06, 0xa8, 0xd2, 0x0f, 0x1f, 0x94, 0x6a, 0x03, 0xf5, 0x17, 0x04, 0x18, 0xdc, 0x50, 0x2a, 0xef, + 0x9f, 0x00, 0x9c, 0xab, 0x9e, 0x70, 0x66, 0x92, 0x13, 0x36, 0x38, 0x0d, 0xa5, 0xf2, 0x3e, 0x06, + 0xf2, 0xf3, 0x02, 0xc0, 0xa3, 0x66, 0xe3, 0x64, 0xa0, 0x2c, 0x7b, 0x42, 0x49, 0x24, 0x27, 0x6d, + 0x50, 0xda, 0x4d, 0x03, 0x8c, 0x0a, 0x90, 0x95, 0x1b, 0x72, 0xc8, 0x55, 0xf2, 0xb3, 0xed, 0xe7, + 0x0e, 0x0e, 0x13, 0xa3, 0x30, 0x4c, 0x66, 0xaf, 0x92, 0x61, 0xa9, 0x81, 0x4c, 0xd9, 0x0c, 0xe4, + 0x57, 0x58, 0xee, 0x4d, 0xe3, 0x3f, 0xc8, 0xb8, 0x16, 0xf0, 0xff, 0xc3, 0x60, 0xba, 0x73, 0x31, + 0x58, 0x73, 0x4d, 0x4c, 0x79, 0xe9, 0xf3, 0x34, 0xb2, 0xb1, 0xc2, 0xf8, 0x2f, 0x36, 0xfe, 0x1e, + 0xde, 0xcf, 0xb9, 0xaf, 0x16, 0x4e, 0x18, 0xda, 0xeb, 0x07, 0x87, 0x09, 0x64, 0x5e, 0x16, 0x2c, + 0x4b, 0xad, 0x96, 0x85, 0x70, 0x1e, 0x25, 0xd3, 0xdc, 0x7b, 0x6d, 0x07, 0xd0, 0xbf, 0x2c, 0x00, + 0x14, 0xd5, 0xda, 0x49, 0x03, 0xc4, 0xd6, 0x1a, 0xc8, 0xe5, 0xbe, 0x05, 0x6c, 0x0a, 0xa1, 0xb4, + 0xa2, 0xd6, 0x1c, 0x80, 0xbe, 0x2e, 0x98, 0xef, 0x13, 0x4f, 0x1a, 0xd4, 0xf5, 0x83, 0xc3, 0xc4, + 0x98, 0xf9, 0x6e, 0xc0, 0x02, 0x96, 0x40, 0x33, 0x69, 0x23, 0x79, 0x84, 0x1d, 0xdc, 0x57, 0x04, + 0x18, 0x63, 0x7b, 0xb1, 0x91, 0x4d, 0x3a, 0xa8, 0x8c, 0x07, 0xda, 0xad, 0xd9, 0xa0, 0x81, 0x44, + 0xad, 0xc5, 0x00, 0xfc, 0x43, 0x01, 0x26, 0x5c, 0x59, 0x97, 0x51, 0xd7, 0xaf, 0x02, 0xfd, 0x12, + 0x35, 0x87, 0x03, 0x1a, 0xc8, 0x3e, 0x30, 0xa4, 0xd8, 0x3e, 0xfc, 0x45, 0x01, 0x46, 0x18, 0x03, + 0x69, 0x62, 0xe3, 0xa0, 0xec, 0xbb, 0x1c, 0xd8, 0xd9, 0xf1, 0xf1, 0x0c, 0x90, 0xcd, 0x7a, 0xd2, + 0xe7, 0x26, 0xdf, 0x12, 0x60, 0x9c, 0x0a, 0x83, 0x05, 0xe8, 0x56, 0x70, 0xc6, 0xf1, 0x59, 0x93, + 0xc3, 0x00, 0x0c, 0x64, 0xdf, 0x09, 0x42, 0xcc, 0xb2, 0x6f, 0x0a, 0x30, 0x57, 0x92, 0x35, 0xb9, + 0x59, 0xe5, 0x12, 0x29, 0x53, 0x5d, 0xde, 0x0c, 0xc3, 0x41, 0x3f, 0x23, 0xfb, 0x96, 0x27, 0x9a, + 0x94, 0x78, 0xde, 0x85, 0x06, 0x6f, 0x81, 0x18, 0xc7, 0x33, 0x0e, 0x82, 0x63, 0x51, 0x69, 0x5a, + 0xe7, 0x63, 0x5d, 0x54, 0x32, 0x64, 0xa0, 0x45, 0xa5, 0x69, 0x9b, 0xed, 0x8b, 0x4a, 0x01, 0x85, + 0x58, 0x54, 0x3e, 0x67, 0x74, 0x18, 0x80, 0x81, 0x16, 0x95, 0x20, 0xb4, 0x2f, 0x2a, 0x97, 0x47, + 0x9a, 0xed, 0x15, 0x4a, 0x55, 0x7e, 0x31, 0x8b, 0x4a, 0xd0, 0xf8, 0x2d, 0x2a, 0x67, 0xea, 0x8c, + 0xa4, 0xd6, 0xc7, 0x6a, 0xea, 0x8c, 0x74, 0xcc, 0x41, 0x4c, 0x1d, 0xcb, 0xec, 0xec, 0x30, 0x75, + 0x06, 0xac, 0x10, 0xa6, 0xce, 0x9e, 0xe2, 0x3a, 0x1c, 0xd0, 0x40, 0xa6, 0x8e, 0x21, 0xc5, 0x0c, + 0xfc, 0x4b, 0x82, 0x79, 0x72, 0xdc, 0x7c, 0x2a, 0x05, 0xe7, 0xde, 0xd5, 0x10, 0x19, 0xa8, 0xb5, + 0x6e, 0x87, 0x0c, 0x02, 0x6a, 0x0f, 0x4f, 0xff, 0x8f, 0x05, 0x98, 0xdb, 0x96, 0x9b, 0x55, 0x9f, + 0x6c, 0xcc, 0xe8, 0x5e, 0xf7, 0xab, 0xe3, 0x4e, 0x69, 0x9c, 0x7d, 0x25, 0xf1, 0xb6, 0x27, 0xdb, + 0xce, 0x88, 0xf3, 0x36, 0x0f, 0x12, 0x4b, 0xa0, 0x26, 0xeb, 0xad, 0xe7, 0x4d, 0x3c, 0xf4, 0x3e, + 0xe6, 0xdf, 0xd7, 0x04, 0x40, 0xdb, 0xb2, 0x9e, 0x6f, 0xd6, 0xf5, 0xba, 0xd4, 0x30, 0xa6, 0x46, + 0x5d, 0xff, 0xa3, 0x0d, 0x47, 0x46, 0x6a, 0x5f, 0x60, 0x37, 0x3d, 0x81, 0x2d, 0x8a, 0xa7, 0x1c, + 0xc0, 0xf4, 0x3a, 0x45, 0xd0, 0x7a, 0x8e, 0x51, 0xfd, 0x7d, 0x01, 0xe6, 0xd6, 0x2d, 0x4e, 0xb8, + 0x92, 0x45, 0xfb, 0x85, 0x1c, 0x5e, 0x0f, 0x0a, 0xdb, 0x39, 0x22, 0x61, 0xe0, 0x28, 0x0c, 0xb7, + 0xc8, 0x2f, 0x6b, 0x8d, 0x97, 0xd0, 0x62, 0x9a, 0x94, 0xd5, 0x65, 0x2d, 0x6d, 0xa4, 0xe5, 0xd6, + 0xd2, 0x15, 0xb3, 0x3b, 0xfa, 0x3d, 0x01, 0x16, 0xe9, 0x51, 0xd1, 0x17, 0xed, 0xbd, 0x5e, 0x51, + 0xd1, 0x71, 0x8f, 0x40, 0xd5, 0x5d, 0xe6, 0x7b, 0x51, 0xaa, 0x2c, 0xfe, 0x9f, 0x15, 0xbb, 0x90, + 0x85, 0x17, 0xe1, 0xf7, 0x05, 0x58, 0xa4, 0x4a, 0x7d, 0xfc, 0x94, 0xd1, 0x71, 0x8f, 0x40, 0xd9, + 0x5b, 0x3e, 0x94, 0x5d, 0x4a, 0x9e, 0xed, 0x4c, 0x19, 0x91, 0x38, 0x4c, 0xde, 0x27, 0x02, 0x2c, + 0xd2, 0x53, 0x94, 0x2f, 0x79, 0x77, 0x7a, 0x85, 0xd7, 0x61, 0xcf, 0xb8, 0x77, 0x70, 0x98, 0x18, + 0x87, 0x51, 0x06, 0x9c, 0x3b, 0x6f, 0x9d, 0x4f, 0x05, 0x41, 0x8e, 0x15, 0x76, 0x8a, 0x53, 0x0d, + 0x2b, 0xdb, 0xb2, 0x9f, 0x4e, 0xdc, 0x08, 0x4a, 0x84, 0x39, 0x14, 0x71, 0xd9, 0x3d, 0x94, 0xe1, + 0x14, 0x9a, 0xf5, 0x42, 0x28, 0xd5, 0x64, 0xf4, 0x1b, 0x02, 0xcc, 0xda, 0xb5, 0xc0, 0x02, 0x76, + 0x3b, 0x34, 0x00, 0x26, 0xf7, 0x3d, 0x20, 0xbf, 0xe9, 0x23, 0x16, 0xf3, 0xa2, 0x1f, 0x74, 0x2c, + 0x0a, 0xbf, 0x29, 0xc0, 0xac, 0x5d, 0xd2, 0x8f, 0x82, 0x9e, 0xc9, 0x76, 0x0f, 0xe8, 0xdf, 0xf0, + 0x41, 0x7f, 0x26, 0x39, 0xef, 0x83, 0xde, 0x94, 0xe6, 0x6f, 0x0a, 0x30, 0x6b, 0x97, 0x66, 0x8b, + 0x84, 0x57, 0x43, 0x23, 0xe9, 0x20, 0xbf, 0xb7, 0xfd, 0xe4, 0x77, 0x31, 0xd5, 0x11, 0x24, 0x46, + 0x98, 0xe0, 0x04, 0xd7, 0x9e, 0x6e, 0xd9, 0x4f, 0x78, 0x5f, 0x0b, 0x0a, 0xdd, 0x36, 0x1c, 0x11, + 0x03, 0x0f, 0x01, 0x5e, 0x40, 0x73, 0x5e, 0x10, 0x1b, 0xb4, 0x2f, 0xfa, 0x6d, 0x01, 0xe6, 0xec, + 0x42, 0x6c, 0x07, 0x79, 0xb7, 0x27, 0x30, 0x4c, 0x98, 0x7b, 0xa4, 0xe4, 0x75, 0x1f, 0x91, 0x58, + 0x12, 0x3b, 0x91, 0x82, 0x25, 0xe2, 0x3f, 0x08, 0x30, 0x67, 0x17, 0xea, 0xe3, 0xa0, 0x86, 0x09, + 0x77, 0x8f, 0xd4, 0xbc, 0xe9, 0x43, 0xcd, 0xf9, 0xe4, 0x52, 0x07, 0x6a, 0x4c, 0x21, 0xff, 0xb6, + 0x00, 0x73, 0x76, 0x21, 0xb7, 0x93, 0x74, 0xbb, 0x27, 0x54, 0x1d, 0x84, 0xfd, 0xae, 0x9f, 0xb0, + 0x8b, 0xa9, 0xae, 0x80, 0xd1, 0x17, 0x01, 0xd6, 0x65, 0xbd, 0xa8, 0xd6, 0xc8, 0x95, 0xc6, 0xf9, + 0x00, 0xe9, 0x48, 0xf3, 0xd9, 0xe4, 0xd9, 0x00, 0xcd, 0xc4, 0x25, 0x8f, 0x38, 0xcf, 0x08, 0x02, + 0x2b, 0xce, 0x83, 0xbe, 0x4e, 0x77, 0x09, 0x32, 0x39, 0xfd, 0x76, 0x83, 0x5d, 0x67, 0x04, 0x49, + 0x0f, 0x4b, 0x3b, 0x04, 0x83, 0xb2, 0xe2, 0x01, 0x65, 0x11, 0xcd, 0x1b, 0x57, 0x19, 0x04, 0x11, + 0xfd, 0x9a, 0x24, 0xfd, 0x21, 0xfd, 0xf7, 0x23, 0xf4, 0x0b, 0x02, 0x8c, 0x5a, 0xe1, 0xef, 0xa2, + 0x5a, 0x3b, 0x56, 0xe6, 0x5c, 0xa7, 0xbe, 0x3a, 0x46, 0x64, 0x09, 0xd8, 0x5c, 0x72, 0x86, 0x8b, + 0x82, 0x39, 0x22, 0xdf, 0x18, 0x4f, 0xe9, 0x87, 0x8a, 0x47, 0x75, 0xe2, 0x99, 0xa0, 0x8b, 0xc7, + 0x7f, 0xb3, 0xea, 0x67, 0x22, 0x97, 0x83, 0x27, 0xfc, 0x25, 0x5f, 0x2a, 0x62, 0x3c, 0x13, 0x30, + 0x8e, 0xf1, 0xec, 0x91, 0x62, 0xfb, 0x81, 0x90, 0xa0, 0xa2, 0x15, 0x5a, 0x9a, 0x7e, 0x62, 0xfa, + 0x57, 0x04, 0x18, 0xe1, 0xf3, 0x3a, 0x77, 0xdf, 0x50, 0x3c, 0xb2, 0x40, 0x77, 0xdc, 0x50, 0x10, + 0xc4, 0x39, 0x3c, 0x1c, 0x9b, 0x44, 0x83, 0x4d, 0xf4, 0xcb, 0x8d, 0x8f, 0x0c, 0x64, 0x98, 0x4d, + 0x7f, 0xc7, 0x0c, 0x41, 0x58, 0xc8, 0x6e, 0x05, 0x8b, 0x4a, 0x06, 0x06, 0x97, 0xe9, 0x00, 0x0e, + 0x1b, 0x2d, 0x4f, 0x70, 0xe9, 0x0f, 0xd9, 0x57, 0x19, 0xc4, 0x68, 0x7d, 0x4b, 0x80, 0x71, 0x47, + 0x62, 0xe9, 0xee, 0x30, 0xbd, 0x33, 0x51, 0xfb, 0xc2, 0xbc, 0x7f, 0x70, 0x98, 0x98, 0x84, 0x09, + 0x0e, 0xa6, 0xc3, 0x56, 0x75, 0xc1, 0x89, 0xbe, 0x27, 0x40, 0x9c, 0x5e, 0xfd, 0x99, 0x73, 0x6a, + 0xdd, 0x51, 0x7a, 0x27, 0x8d, 0x4e, 0xde, 0x0e, 0xdd, 0x8f, 0xdd, 0xe5, 0xdd, 0xf3, 0x17, 0x4d, + 0x7c, 0x62, 0xf1, 0x26, 0x82, 0xbb, 0x83, 0xfc, 0x58, 0x80, 0x31, 0x3a, 0xa4, 0x99, 0xda, 0xf8, + 0x66, 0xa8, 0x54, 0xab, 0x06, 0x05, 0xaf, 0x85, 0xec, 0xc5, 0xf0, 0x2f, 0xfb, 0x84, 0xba, 0x67, + 0xc4, 0x09, 0x2b, 0xd4, 0xcd, 0xe1, 0xfd, 0x45, 0x2b, 0x71, 0x25, 0xd9, 0x23, 0x2e, 0x07, 0x9c, + 0x36, 0x9f, 0x4d, 0x06, 0x4d, 0x96, 0x4b, 0x22, 0x66, 0xc8, 0x8e, 0x09, 0x45, 0xf2, 0x14, 0x57, + 0x1c, 0x8d, 0xd9, 0x43, 0xf0, 0xe8, 0xaf, 0x09, 0x30, 0xca, 0x5c, 0x20, 0x96, 0xca, 0x39, 0x28, + 0x03, 0x6d, 0x59, 0xac, 0x83, 0xc3, 0xbb, 0xc8, 0x76, 0x58, 0x06, 0xcf, 0xd2, 0xae, 0x31, 0x71, + 0xc8, 0xc4, 0x86, 0x79, 0xf5, 0x37, 0x05, 0x18, 0x65, 0xee, 0x4c, 0x48, 0x64, 0xb6, 0x3c, 0xd9, + 0xc1, 0x91, 0x5d, 0x27, 0x3a, 0x65, 0x47, 0x66, 0x72, 0x6e, 0x32, 0xe9, 0xe0, 0x1c, 0x86, 0xf8, + 0x77, 0x05, 0x98, 0xb0, 0xf6, 0x35, 0x03, 0xe6, 0x49, 0x2c, 0xea, 0xe7, 0x3a, 0x61, 0x3b, 0x9d, + 0x4c, 0x3a, 0x2e, 0x56, 0x1c, 0xfb, 0x1d, 0xc6, 0x59, 0x7a, 0x29, 0x71, 0xda, 0xf7, 0xc1, 0x6f, + 0x09, 0x90, 0x5c, 0x97, 0x75, 0x96, 0x06, 0x83, 0x7f, 0xb3, 0x45, 0xb4, 0xa5, 0xeb, 0xc6, 0x67, + 0xcf, 0x9f, 0x91, 0x0c, 0x95, 0xaf, 0x42, 0xbc, 0xe0, 0xa3, 0xcb, 0x63, 0x68, 0x24, 0x4d, 0x3e, + 0x13, 0xb2, 0x1e, 0x8e, 0x4c, 0xe3, 0x63, 0x8d, 0x3b, 0x65, 0xb2, 0xdf, 0x86, 0xbd, 0x12, 0x2e, + 0xfd, 0x25, 0xd9, 0xb4, 0xf1, 0x31, 0x60, 0x1a, 0x26, 0x0d, 0x34, 0x4e, 0xeb, 0x48, 0x4e, 0xe6, + 0x06, 0x2b, 0xed, 0x9b, 0xf7, 0x1f, 0x08, 0x30, 0x65, 0xb3, 0x89, 0x86, 0x75, 0xbf, 0xd3, 0x43, + 0x92, 0x49, 0x43, 0x89, 0xee, 0xf6, 0xd4, 0x97, 0x59, 0xc9, 0x47, 0x07, 0x87, 0x89, 0x25, 0x4f, + 0x5a, 0x90, 0xf9, 0xff, 0xfe, 0x53, 0xb2, 0xae, 0x88, 0x17, 0x38, 0x09, 0xb1, 0x3e, 0x34, 0xf3, + 0x34, 0xfe, 0xdf, 0x10, 0x20, 0x9e, 0xa9, 0x56, 0xed, 0xe9, 0xa8, 0xaf, 0x87, 0x02, 0x9a, 0xa9, + 0x56, 0x3b, 0x6e, 0xb1, 0x49, 0x98, 0x72, 0xa0, 0xb6, 0x4b, 0x34, 0x76, 0x57, 0xec, 0x12, 0xcd, + 0xb9, 0x2b, 0x1f, 0x0b, 0x30, 0x49, 0xbd, 0x0f, 0x3b, 0xc4, 0x57, 0x43, 0x41, 0xa4, 0x23, 0xf8, + 0xa2, 0xcc, 0x07, 0x40, 0x49, 0x0e, 0x5b, 0x5e, 0x28, 0xed, 0x7e, 0xcb, 0xb7, 0x05, 0x98, 0xa4, + 0x6e, 0xc8, 0x51, 0xf0, 0xd2, 0x11, 0x7c, 0xf1, 0xae, 0x1f, 0x1c, 0x26, 0xe6, 0x60, 0xda, 0x81, + 0x97, 0x3a, 0x2f, 0x26, 0x60, 0x72, 0xd8, 0xea, 0x0c, 0x18, 0xfd, 0x3e, 0x89, 0x63, 0x73, 0x62, + 0x4e, 0x75, 0xf0, 0xf5, 0xd0, 0xc9, 0x78, 0x0d, 0x11, 0x7f, 0xa3, 0x87, 0x9e, 0x4c, 0xc0, 0x3f, + 0x7f, 0x70, 0x98, 0x58, 0x84, 0x09, 0xd3, 0x74, 0x28, 0x0d, 0xd9, 0x53, 0xbc, 0x2f, 0x8b, 0xe7, + 0x7c, 0xc4, 0x9b, 0xa8, 0x2e, 0x2f, 0xdc, 0xbf, 0x2c, 0xc0, 0x98, 0x25, 0xdc, 0x24, 0xcb, 0xf5, + 0x72, 0x08, 0x80, 0x9d, 0x04, 0x1b, 0x9f, 0x71, 0x13, 0x80, 0x6c, 0x68, 0xed, 0x02, 0x73, 0x4a, + 0x9c, 0x72, 0xf0, 0x9f, 0xe0, 0x63, 0xbb, 0xf2, 0x84, 0x4d, 0x48, 0x08, 0xb4, 0x1b, 0x61, 0x72, + 0x43, 0x77, 0x16, 0x90, 0xb7, 0x0e, 0x0e, 0x13, 0xa7, 0x2c, 0x63, 0x41, 0xd0, 0x39, 0xc4, 0x63, + 0x21, 0x35, 0xe7, 0x05, 0x2f, 0xfd, 0x61, 0x53, 0xda, 0x93, 0x3f, 0x42, 0x3f, 0x30, 0x25, 0x83, + 0x7b, 0x2a, 0x12, 0x40, 0x32, 0xfc, 0xf2, 0xbc, 0x75, 0x97, 0x0c, 0xdf, 0xac, 0x76, 0xe2, 0xe3, + 0x83, 0xc3, 0xc4, 0x82, 0xfb, 0x05, 0x89, 0x53, 0x30, 0xae, 0x8b, 0x57, 0x7c, 0x04, 0xc3, 0xf6, + 0xc4, 0x84, 0x93, 0x8f, 0xdf, 0x14, 0x60, 0x9c, 0x9b, 0x96, 0xec, 0x8f, 0xd7, 0x42, 0xe0, 0x0c, + 0x72, 0x9f, 0xc8, 0x35, 0x27, 0x22, 0x1e, 0x80, 0x90, 0x14, 0xba, 0x14, 0x84, 0x10, 0xb2, 0x91, + 0xfe, 0xae, 0x00, 0xd3, 0xd4, 0x89, 0x74, 0xbc, 0xad, 0x47, 0xaf, 0x85, 0xcc, 0x9e, 0xc8, 0x22, + 0x6e, 0xa1, 0x08, 0xda, 0xb1, 0xeb, 0x2c, 0x26, 0x88, 0x2a, 0x81, 0x83, 0xa2, 0xab, 0xe2, 0x45, + 0x1f, 0x8a, 0x94, 0x7a, 0xb5, 0xc2, 0x53, 0x85, 0x97, 0xe5, 0xb7, 0xcc, 0xab, 0x54, 0x9e, 0x9e, + 0x1b, 0x21, 0x80, 0xb1, 0x78, 0x5b, 0x28, 0x5a, 0x1e, 0x05, 0xa4, 0xe5, 0x5a, 0x32, 0xf0, 0xea, + 0x60, 0x62, 0xfe, 0xb3, 0x00, 0xd3, 0x96, 0x7b, 0xcb, 0x13, 0x74, 0x92, 0x92, 0x26, 0x05, 0x24, + 0xe6, 0x8d, 0xe4, 0xcd, 0xa0, 0xc4, 0x38, 0xfd, 0x61, 0x4c, 0x58, 0xe9, 0x4f, 0x07, 0x61, 0x76, + 0x07, 0xfa, 0x7f, 0x9a, 0x21, 0x60, 0x6e, 0x62, 0x2e, 0x05, 0xf4, 0xf5, 0xe0, 0xd9, 0xab, 0x99, + 0x1c, 0x86, 0xc8, 0x77, 0x2d, 0x36, 0x02, 0x12, 0x98, 0x4d, 0xde, 0x0f, 0x44, 0xa0, 0x3d, 0xa1, + 0x2c, 0x55, 0x38, 0x9a, 0x3e, 0x1b, 0xd3, 0xfa, 0xbf, 0x04, 0x48, 0x96, 0xe4, 0x9a, 0xdc, 0x94, + 0x55, 0x66, 0x42, 0x6c, 0x29, 0x49, 0x43, 0xae, 0x64, 0xd7, 0xb3, 0x02, 0x3f, 0xb8, 0xa8, 0x07, + 0xa4, 0x74, 0x23, 0xb9, 0x1e, 0x78, 0x29, 0x2d, 0xea, 0xd2, 0x65, 0xfa, 0x30, 0x8e, 0x66, 0x4f, + 0xa5, 0x19, 0x55, 0x31, 0xc5, 0xff, 0x55, 0x80, 0x49, 0x9b, 0xcb, 0x43, 0x0e, 0x2e, 0x1a, 0x7a, + 0x23, 0x54, 0xce, 0x48, 0xdb, 0xd6, 0x76, 0xa7, 0x97, 0xae, 0x6c, 0x6f, 0xdb, 0x3e, 0x38, 0x4c, + 0x9c, 0xb6, 0xfc, 0x08, 0x72, 0x46, 0xf2, 0xde, 0x14, 0xc4, 0xf3, 0x3e, 0x5c, 0x60, 0xe7, 0x2a, + 0x6e, 0x5f, 0xfb, 0x44, 0x30, 0xbf, 0x2b, 0x0c, 0x71, 0xf0, 0xb3, 0x67, 0x5e, 0x0c, 0x79, 0xf0, + 0x5b, 0x3d, 0x38, 0x4c, 0x4c, 0x79, 0xd1, 0x41, 0xc0, 0x9f, 0x43, 0x62, 0x67, 0xf0, 0x64, 0x2f, + 0xfb, 0x35, 0x01, 0x90, 0x2d, 0x8c, 0x42, 0xbf, 0x92, 0x0f, 0x95, 0x2f, 0x8d, 0xed, 0x62, 0xe1, + 0xc0, 0x67, 0xec, 0xe7, 0x44, 0x0a, 0xde, 0x0a, 0xaa, 0x88, 0xe2, 0x42, 0x47, 0xf4, 0x98, 0xe5, + 0xdf, 0x15, 0x00, 0xd9, 0x02, 0x2d, 0x3d, 0x60, 0x67, 0xd6, 0x22, 0x1c, 0xf6, 0x07, 0x9d, 0xb1, + 0x5f, 0x4c, 0x06, 0xe0, 0x3c, 0xdb, 0x74, 0x67, 0x5c, 0x61, 0x18, 0x4a, 0xc4, 0xc9, 0x4a, 0x4e, + 0xa9, 0x33, 0x01, 0xaf, 0x26, 0x97, 0xbb, 0x13, 0xe0, 0xdc, 0x9b, 0x30, 0x31, 0xa5, 0x1f, 0x5d, + 0x62, 0xec, 0xfb, 0xd1, 0x27, 0x34, 0xa0, 0xe3, 0x97, 0x95, 0xd3, 0x2f, 0x60, 0x72, 0xbb, 0x87, + 0x34, 0x83, 0x24, 0x6a, 0x92, 0x23, 0xa7, 0xcb, 0x53, 0x76, 0x1a, 0x9c, 0xb1, 0x13, 0xf2, 0xc4, + 0xc7, 0xa0, 0x84, 0x81, 0xb7, 0x87, 0x50, 0x0e, 0x22, 0x70, 0xca, 0x6d, 0x68, 0x8d, 0x38, 0xca, + 0xfd, 0x5e, 0x93, 0xf6, 0x19, 0x46, 0xf7, 0xad, 0xde, 0x07, 0x60, 0xa6, 0xf7, 0x49, 0x10, 0x3a, + 0xdf, 0x14, 0x5f, 0xef, 0xb2, 0x62, 0x46, 0xf6, 0x1b, 0xcf, 0xf0, 0xca, 0xf7, 0x04, 0x98, 0xb6, + 0x4e, 0xa0, 0x7c, 0x7e, 0xd4, 0xd7, 0xc2, 0xe3, 0xef, 0x74, 0x1e, 0xfd, 0xa9, 0x83, 0xc3, 0xc4, + 0x3c, 0x24, 0x3d, 0x89, 0xb1, 0xe4, 0xef, 0x35, 0xf1, 0x7a, 0x58, 0x6a, 0x30, 0x15, 0xdf, 0x17, + 0x20, 0x61, 0x0b, 0xc2, 0xf0, 0x84, 0xbc, 0x1e, 0x9e, 0x90, 0x2e, 0xe1, 0x18, 0x39, 0x10, 0x2d, + 0xf7, 0x93, 0x77, 0x42, 0xaf, 0x8c, 0x2d, 0x54, 0xf3, 0xbb, 0x02, 0x24, 0x6c, 0xa7, 0xf0, 0x23, + 0x52, 0xd5, 0xe5, 0x4c, 0x5e, 0x21, 0x87, 0xbf, 0x39, 0x4f, 0xaa, 0xb8, 0x7b, 0xa7, 0xcf, 0xa5, + 0x8e, 0x40, 0x16, 0xfa, 0x75, 0xf3, 0x46, 0xca, 0xfc, 0x9c, 0x34, 0xc0, 0x8d, 0x94, 0x77, 0x8a, + 0xa7, 0xee, 0x16, 0xc4, 0x27, 0xfb, 0x99, 0xf8, 0x1a, 0xbd, 0x91, 0x22, 0xcf, 0x17, 0x1d, 0x9e, + 0x40, 0x52, 0x9c, 0x66, 0x6f, 0x18, 0xdd, 0x6e, 0xcb, 0xb7, 0x58, 0x82, 0x16, 0xcb, 0x67, 0xb9, + 0x12, 0x18, 0x41, 0xd0, 0x17, 0xdb, 0xd4, 0x4c, 0xbf, 0xe1, 0x0f, 0x70, 0x11, 0x99, 0xaf, 0x3f, + 0x0d, 0xae, 0xda, 0x9c, 0x94, 0x5f, 0x11, 0x60, 0xdc, 0xfa, 0xc8, 0x8d, 0xee, 0x29, 0xe9, 0xc0, + 0x33, 0x33, 0xf7, 0x24, 0x04, 0x54, 0xf6, 0xf9, 0x0c, 0x07, 0xd5, 0xfe, 0x3e, 0xcb, 0x1b, 0x2b, + 0x66, 0xe7, 0x3f, 0x12, 0x60, 0xdc, 0x7a, 0x5e, 0x1c, 0x16, 0x29, 0x73, 0x46, 0x42, 0x20, 0x7d, + 0xb3, 0x03, 0xd2, 0x33, 0xc9, 0x8e, 0x5c, 0xc5, 0x70, 0xbf, 0x23, 0xc0, 0xa4, 0xfd, 0xf3, 0x3e, + 0x0a, 0xf9, 0xa4, 0x64, 0x20, 0xdf, 0x01, 0x2e, 0x3e, 0xe3, 0x77, 0x80, 0xeb, 0x74, 0x37, 0xbe, + 0x43, 0x82, 0xbe, 0x3f, 0x22, 0xd0, 0xed, 0xce, 0xc5, 0x1f, 0x0a, 0x30, 0x6b, 0xdb, 0xa5, 0x39, + 0xbb, 0x11, 0x34, 0x9f, 0xef, 0x71, 0x9b, 0x8f, 0xf7, 0x0e, 0x0e, 0x13, 0xe7, 0x60, 0xd6, 0xb0, + 0x94, 0x0e, 0x2d, 0x0d, 0x1e, 0xf6, 0xf3, 0xb3, 0x33, 0xff, 0xc5, 0x4a, 0x8e, 0x62, 0x37, 0x37, + 0x2b, 0x61, 0x09, 0x0e, 0xb7, 0x6c, 0x4f, 0x42, 0xd1, 0x75, 0x13, 0xad, 0x74, 0xa4, 0xcb, 0xdb, + 0x3c, 0xfd, 0x9e, 0x00, 0x33, 0xb6, 0x33, 0xd4, 0x8b, 0xb1, 0x52, 0xd2, 0xc1, 0x61, 0xe2, 0x3c, + 0x24, 0x3c, 0x48, 0xf3, 0x3c, 0xd2, 0xaf, 0x88, 0xd7, 0x42, 0xd1, 0x86, 0x57, 0xed, 0xbf, 0x09, + 0x30, 0x63, 0x3b, 0x61, 0x59, 0x94, 0xdd, 0x0a, 0xbb, 0x6e, 0xe1, 0x8d, 0xdb, 0xd3, 0x70, 0x04, + 0xde, 0x4e, 0xf6, 0xb0, 0x78, 0x46, 0x40, 0xc6, 0x75, 0x0c, 0xb3, 0x28, 0x3d, 0x61, 0x09, 0x55, + 0xc3, 0x51, 0xb9, 0x96, 0xbc, 0x17, 0x9e, 0x4a, 0xa7, 0xf1, 0xa4, 0x21, 0xa8, 0x3f, 0xdd, 0x14, + 0xdb, 0x6d, 0xee, 0x57, 0x22, 0x30, 0xef, 0x3e, 0x19, 0x71, 0x86, 0x77, 0x35, 0x54, 0xd4, 0xe0, + 0x98, 0xad, 0xaf, 0x7e, 0x70, 0x98, 0x48, 0xc3, 0x82, 0xdd, 0x4f, 0x75, 0xda, 0x2a, 0xfb, 0x7f, + 0xd3, 0x41, 0x79, 0x73, 0x57, 0xbc, 0x65, 0xf0, 0xc6, 0x20, 0xde, 0x99, 0x21, 0xd4, 0xdf, 0x26, + 0xff, 0x91, 0x60, 0xff, 0x1f, 0x2e, 0xec, 0x86, 0xf9, 0x76, 0x4f, 0x0c, 0x09, 0x27, 0x09, 0x1f, + 0xf4, 0x4a, 0xf7, 0x7d, 0xf4, 0x66, 0x50, 0xba, 0xbd, 0x6d, 0xf6, 0x1f, 0x5b, 0x2f, 0xa8, 0xbd, + 0xc8, 0x40, 0x77, 0x7b, 0xa2, 0x3e, 0xbc, 0x11, 0x7f, 0x7e, 0x70, 0x98, 0xb8, 0x0e, 0x8b, 0xbe, + 0x1c, 0xa0, 0x1a, 0xe1, 0xc5, 0x02, 0xee, 0x94, 0x1c, 0x96, 0x05, 0x78, 0xf1, 0xbf, 0x1c, 0x31, + 0x1f, 0x5d, 0x1f, 0x23, 0x03, 0xc2, 0x1b, 0xf9, 0x3f, 0xd7, 0x33, 0x03, 0x56, 0x93, 0x47, 0x93, + 0x01, 0xcc, 0x85, 0x5f, 0x8a, 0xc0, 0x69, 0xef, 0x08, 0x9c, 0xc5, 0x89, 0x17, 0xa1, 0x08, 0x3f, + 0x27, 0xf4, 0xcc, 0x86, 0x42, 0x32, 0x7f, 0x24, 0x36, 0x38, 0xf7, 0x06, 0xcc, 0x92, 0xd2, 0x8f, + 0x3b, 0x4b, 0x5c, 0xcf, 0xbb, 0xc6, 0xd9, 0xc5, 0xbc, 0x99, 0x47, 0xf6, 0x56, 0xc8, 0x6c, 0xbd, + 0x81, 0xf7, 0x08, 0x9f, 0xcc, 0xba, 0xe2, 0x22, 0xfd, 0xbe, 0x54, 0x9c, 0x4c, 0x4b, 0x6d, 0x7d, + 0xd7, 0x65, 0xcd, 0x57, 0xff, 0x8d, 0xf0, 0xd5, 0xcc, 0x2f, 0x09, 0x68, 0x0d, 0xc6, 0xac, 0xd4, + 0x4c, 0x4b, 0x99, 0xad, 0xbc, 0x78, 0x15, 0xa5, 0x76, 0x75, 0xbd, 0xa5, 0xdd, 0x49, 0xa7, 0x6b, + 0x75, 0x7d, 0xb7, 0xfd, 0x64, 0xb9, 0xa2, 0xec, 0xa5, 0x31, 0x8a, 0x34, 0x43, 0x91, 0xb6, 0x50, + 0xac, 0x44, 0xaf, 0x2f, 0xdf, 0x48, 0x09, 0x91, 0x15, 0xfe, 0x3f, 0x08, 0x4c, 0xff, 0xac, 0xa6, + 0x34, 0xed, 0x25, 0x35, 0xb5, 0x55, 0xb9, 0xe3, 0x6a, 0x73, 0xc7, 0xd5, 0xe6, 0x27, 0x7d, 0xe7, + 0x6c, 0xbd, 0x5f, 0xe3, 0xe6, 0x4d, 0x4b, 0xad, 0x3a, 0xe9, 0xf0, 0xa4, 0x9f, 0xc4, 0x70, 0x5e, + 0xfd, 0x93, 0x00, 0x00, 0x00, 0xff, 0xff, 0x95, 0x4a, 0x9c, 0x64, 0x72, 0xa8, 0x00, 0x00, +} + +// Reference imports to suppress errors if they are not otherwise used. +var _ context.Context +var _ grpc.ClientConnInterface + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the grpc package it is being compiled against. +const _ = grpc.SupportPackageIsVersion6 + +// ManagementServiceClient is the client API for ManagementService service. +// +// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. +type ManagementServiceClient interface { + //READINESS + Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) + Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) + //USER + GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) + SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) + IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) + CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) + DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) + DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) + //USER_PROFILE + GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) + UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) + ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) + ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) + ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) + ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) + UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) + //MFA + GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) + //ORG + GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) + DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) + AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) + SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) + ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) + UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) + DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) + SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) + AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) + AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) + ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) + UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) + DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) + UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) + RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) + UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) + DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) + ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) + RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) + UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) + DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) + //Grant + SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) +} + +type managementServiceClient struct { + cc grpc.ClientConnInterface +} + +func NewManagementServiceClient(cc grpc.ClientConnInterface) ManagementServiceClient { + return &managementServiceClient{cc} +} + +func (c *managementServiceClient) Healthz(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Healthz", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Ready(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Ready", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) Validate(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*_struct.Struct, error) { + out := new(_struct.Struct) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/Validate", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByID(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserByEmailGlobal(ctx context.Context, in *UserEmailID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUsers(ctx context.Context, in *UserSearchRequest, opts ...grpc.CallOption) (*UserSearchResponse, error) { + out := new(UserSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) IsUserUnique(ctx context.Context, in *UniqueUserRequest, opts ...grpc.CallOption) (*UniqueUserResponse, error) { + out := new(UniqueUserResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) LockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/LockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UnlockUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*User, error) { + out := new(User) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeleteUser(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) OrgChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectChanges(ctx context.Context, in *ChangeRequest, opts ...grpc.CallOption) (*Changes, error) { + out := new(Changes) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserProfile(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserProfile(ctx context.Context, in *UpdateUserProfileRequest, opts ...grpc.CallOption) (*UserProfile, error) { + out := new(UserProfile) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserEmail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserEmail(ctx context.Context, in *UpdateUserEmailRequest, opts ...grpc.CallOption) (*UserEmail, error) { + out := new(UserEmail) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendEmailVerificationMail(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserPhone(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeUserPhone(ctx context.Context, in *UpdateUserPhoneRequest, opts ...grpc.CallOption) (*UserPhone, error) { + out := new(UserPhone) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ResendPhoneVerificationCode(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserAddress(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserAddress(ctx context.Context, in *UpdateUserAddressRequest, opts ...grpc.CallOption) (*UserAddress, error) { + out := new(UserAddress) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetUserMfas(ctx context.Context, in *UserID, opts ...grpc.CallOption) (*MultiFactors, error) { + out := new(MultiFactors) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SendSetPasswordNotification(ctx context.Context, in *SetPasswordNotificationRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SetInitialPassword(ctx context.Context, in *PasswordRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordComplexityPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyCreate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyUpdate, opts ...grpc.CallOption) (*PasswordComplexityPolicy, error) { + out := new(PasswordComplexityPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordComplexityPolicy(ctx context.Context, in *PasswordComplexityPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordAgePolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyCreate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyUpdate, opts ...grpc.CallOption) (*PasswordAgePolicy, error) { + out := new(PasswordAgePolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordAgePolicy(ctx context.Context, in *PasswordAgePolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetPasswordLockoutPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyCreate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdatePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyUpdate, opts ...grpc.CallOption) (*PasswordLockoutPolicy, error) { + out := new(PasswordLockoutPolicy) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeletePasswordLockoutPolicy(ctx context.Context, in *PasswordLockoutPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByID(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgByDomainGlobal(ctx context.Context, in *OrgDomain, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateOrg(ctx context.Context, in *OrgID, opts ...grpc.CallOption) (*Org, error) { + out := new(Org) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetOrgMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgMemberRoles, error) { + out := new(OrgMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddOrgMember(ctx context.Context, in *AddOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeOrgMember(ctx context.Context, in *ChangeOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveOrgMember(ctx context.Context, in *RemoveOrgMemberRequest, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchOrgMembers(ctx context.Context, in *OrgMemberSearchRequest, opts ...grpc.CallOption) (*OrgMemberSearchResponse, error) { + out := new(OrgMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjects(ctx context.Context, in *ProjectSearchRequest, opts ...grpc.CallOption) (*ProjectSearchResponse, error) { + out := new(ProjectSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectByID(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProject(ctx context.Context, in *ProjectCreateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProject(ctx context.Context, in *ProjectUpdateRequest, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProject(ctx context.Context, in *ProjectID, opts ...grpc.CallOption) (*Project, error) { + out := new(Project) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetGrantedProjectGrantByID(ctx context.Context, in *GrantedGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectMemberRoles, error) { + out := new(ProjectMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectMembers(ctx context.Context, in *ProjectMemberSearchRequest, opts ...grpc.CallOption) (*ProjectMemberSearchResponse, error) { + out := new(ProjectMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectMember(ctx context.Context, in *ProjectMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectMember(ctx context.Context, in *ProjectMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectMember(ctx context.Context, in *ProjectMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRequest, opts ...grpc.CallOption) (*ProjectRoleSearchResponse, error) { + out := new(ProjectRoleSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectRole(ctx context.Context, in *ProjectRoleAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchApplications(ctx context.Context, in *ApplicationSearchRequest, opts ...grpc.CallOption) (*ApplicationSearchResponse, error) { + out := new(ApplicationSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ApplicationByID(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateOIDCApplication(ctx context.Context, in *OIDCApplicationCreate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplication(ctx context.Context, in *ApplicationUpdate, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateApplication(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*Application, error) { + out := new(Application) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate, opts ...grpc.CallOption) (*OIDCConfig, error) { + out := new(OIDCConfig) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID, opts ...grpc.CallOption) (*ClientSecret, error) { + out := new(ClientSecret) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrants(ctx context.Context, in *ProjectGrantSearchRequest, opts ...grpc.CallOption) (*ProjectGrantSearchResponse, error) { + out := new(ProjectGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantByID(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrant(ctx context.Context, in *ProjectGrantCreate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrant(ctx context.Context, in *ProjectGrantUpdate, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrant(ctx context.Context, in *ProjectGrantID, opts ...grpc.CallOption) (*ProjectGrant, error) { + out := new(ProjectGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) GetProjectGrantMemberRoles(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*ProjectGrantMemberRoles, error) { + out := new(ProjectGrantMemberRoles) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantMembers(ctx context.Context, in *ProjectGrantMemberSearchRequest, opts ...grpc.CallOption) (*ProjectGrantMemberSearchResponse, error) { + out := new(ProjectGrantMemberSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) AddProjectGrantMember(ctx context.Context, in *ProjectGrantMemberAdd, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ChangeProjectGrantMember(ctx context.Context, in *ProjectGrantMemberChange, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) RemoveProjectGrantMember(ctx context.Context, in *ProjectGrantMemberRemove, opts ...grpc.CallOption) (*empty.Empty, error) { + out := new(empty.Empty) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchUserGrants(ctx context.Context, in *UserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UserGrantByID(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateUserGrant(ctx context.Context, in *UserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateUserGrant(ctx context.Context, in *UserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectUserGrants(ctx context.Context, in *ProjectUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectUserGrantByID(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectUserGrant(ctx context.Context, in *UserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectUserGrant(ctx context.Context, in *ProjectUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectUserGrant(ctx context.Context, in *ProjectUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchProjectGrantUserGrants(ctx context.Context, in *ProjectGrantUserGrantSearchRequest, opts ...grpc.CallOption) (*UserGrantSearchResponse, error) { + out := new(UserGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ProjectGrantUserGrantByID(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) CreateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantCreate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) UpdateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantUpdate, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) DeactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) ReactivateProjectGrantUserGrant(ctx context.Context, in *ProjectGrantUserGrantID, opts ...grpc.CallOption) (*UserGrant, error) { + out := new(UserGrant) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *managementServiceClient) SearchAuthGrant(ctx context.Context, in *AuthGrantSearchRequest, opts ...grpc.CallOption) (*AuthGrantSearchResponse, error) { + out := new(AuthGrantSearchResponse) + err := c.cc.Invoke(ctx, "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +// ManagementServiceServer is the server API for ManagementService service. +type ManagementServiceServer interface { + //READINESS + Healthz(context.Context, *empty.Empty) (*empty.Empty, error) + Ready(context.Context, *empty.Empty) (*empty.Empty, error) + Validate(context.Context, *empty.Empty) (*_struct.Struct, error) + //USER + GetUserByID(context.Context, *UserID) (*User, error) + GetUserByEmailGlobal(context.Context, *UserEmailID) (*User, error) + SearchUsers(context.Context, *UserSearchRequest) (*UserSearchResponse, error) + IsUserUnique(context.Context, *UniqueUserRequest) (*UniqueUserResponse, error) + CreateUser(context.Context, *CreateUserRequest) (*User, error) + DeactivateUser(context.Context, *UserID) (*User, error) + ReactivateUser(context.Context, *UserID) (*User, error) + LockUser(context.Context, *UserID) (*User, error) + UnlockUser(context.Context, *UserID) (*User, error) + DeleteUser(context.Context, *UserID) (*empty.Empty, error) + UserChanges(context.Context, *ChangeRequest) (*Changes, error) + ApplicationChanges(context.Context, *ChangeRequest) (*Changes, error) + OrgChanges(context.Context, *ChangeRequest) (*Changes, error) + ProjectChanges(context.Context, *ChangeRequest) (*Changes, error) + //USER_PROFILE + GetUserProfile(context.Context, *UserID) (*UserProfile, error) + UpdateUserProfile(context.Context, *UpdateUserProfileRequest) (*UserProfile, error) + //USER_EMAIL + GetUserEmail(context.Context, *UserID) (*UserEmail, error) + ChangeUserEmail(context.Context, *UpdateUserEmailRequest) (*UserEmail, error) + ResendEmailVerificationMail(context.Context, *UserID) (*empty.Empty, error) + //USER_PHONE + GetUserPhone(context.Context, *UserID) (*UserPhone, error) + ChangeUserPhone(context.Context, *UpdateUserPhoneRequest) (*UserPhone, error) + ResendPhoneVerificationCode(context.Context, *UserID) (*empty.Empty, error) + //USER_ADDRESS + GetUserAddress(context.Context, *UserID) (*UserAddress, error) + UpdateUserAddress(context.Context, *UpdateUserAddressRequest) (*UserAddress, error) + //MFA + GetUserMfas(context.Context, *UserID) (*MultiFactors, error) + //PASSWORD + // Sends an Notification (Email/SMS) with a password reset Link + SendSetPasswordNotification(context.Context, *SetPasswordNotificationRequest) (*empty.Empty, error) + // A Manager is only allowed to set an initial password, on the next login the user has to change his password + SetInitialPassword(context.Context, *PasswordRequest) (*empty.Empty, error) + //PASSWORD_COMPLEXITY_POLICY + GetPasswordComplexityPolicy(context.Context, *empty.Empty) (*PasswordComplexityPolicy, error) + CreatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) + UpdatePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) + DeletePasswordComplexityPolicy(context.Context, *PasswordComplexityPolicyID) (*empty.Empty, error) + //PASSWORD_AGE_POLICY + GetPasswordAgePolicy(context.Context, *empty.Empty) (*PasswordAgePolicy, error) + CreatePasswordAgePolicy(context.Context, *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) + UpdatePasswordAgePolicy(context.Context, *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) + DeletePasswordAgePolicy(context.Context, *PasswordAgePolicyID) (*empty.Empty, error) + //PASSWORD_LOCKOUT_POLICY + GetPasswordLockoutPolicy(context.Context, *empty.Empty) (*PasswordLockoutPolicy, error) + CreatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) + UpdatePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) + DeletePasswordLockoutPolicy(context.Context, *PasswordLockoutPolicyID) (*empty.Empty, error) + //ORG + GetOrgByID(context.Context, *OrgID) (*Org, error) + GetOrgByDomainGlobal(context.Context, *OrgDomain) (*Org, error) + DeactivateOrg(context.Context, *OrgID) (*Org, error) + ReactivateOrg(context.Context, *OrgID) (*Org, error) + //ORG_MEMBERS + GetOrgMemberRoles(context.Context, *empty.Empty) (*OrgMemberRoles, error) + AddOrgMember(context.Context, *AddOrgMemberRequest) (*empty.Empty, error) + ChangeOrgMember(context.Context, *ChangeOrgMemberRequest) (*empty.Empty, error) + RemoveOrgMember(context.Context, *RemoveOrgMemberRequest) (*empty.Empty, error) + SearchOrgMembers(context.Context, *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) + //PROJECTS + SearchProjects(context.Context, *ProjectSearchRequest) (*ProjectSearchResponse, error) + ProjectByID(context.Context, *ProjectID) (*Project, error) + CreateProject(context.Context, *ProjectCreateRequest) (*Project, error) + UpdateProject(context.Context, *ProjectUpdateRequest) (*Project, error) + DeactivateProject(context.Context, *ProjectID) (*Project, error) + ReactivateProject(context.Context, *ProjectID) (*Project, error) + //GRANTED_PROJECT_GRANTS + GetGrantedProjectGrantByID(context.Context, *GrantedGrantID) (*ProjectGrant, error) + //PROJECT_MEMBERS + GetProjectMemberRoles(context.Context, *empty.Empty) (*ProjectMemberRoles, error) + SearchProjectMembers(context.Context, *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) + AddProjectMember(context.Context, *ProjectMemberAdd) (*empty.Empty, error) + ChangeProjectMember(context.Context, *ProjectMemberChange) (*empty.Empty, error) + RemoveProjectMember(context.Context, *ProjectMemberRemove) (*empty.Empty, error) + //PROJECT_ROLES + SearchProjectRoles(context.Context, *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) + AddProjectRole(context.Context, *ProjectRoleAdd) (*empty.Empty, error) + RemoveProjectRole(context.Context, *ProjectRoleRemove) (*empty.Empty, error) + //APPLICATIONS + SearchApplications(context.Context, *ApplicationSearchRequest) (*ApplicationSearchResponse, error) + ApplicationByID(context.Context, *ApplicationID) (*Application, error) + CreateOIDCApplication(context.Context, *OIDCApplicationCreate) (*Application, error) + UpdateApplication(context.Context, *ApplicationUpdate) (*Application, error) + DeactivateApplication(context.Context, *ApplicationID) (*Application, error) + ReactivateApplication(context.Context, *ApplicationID) (*Application, error) + UpdateApplicationOIDCConfig(context.Context, *OIDCConfigUpdate) (*OIDCConfig, error) + RegenerateOIDCClientSecret(context.Context, *ApplicationID) (*ClientSecret, error) + //PROJECT_GRANT + SearchProjectGrants(context.Context, *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) + ProjectGrantByID(context.Context, *ProjectGrantID) (*ProjectGrant, error) + CreateProjectGrant(context.Context, *ProjectGrantCreate) (*ProjectGrant, error) + UpdateProjectGrant(context.Context, *ProjectGrantUpdate) (*ProjectGrant, error) + DeactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + ReactivateProjectGrant(context.Context, *ProjectGrantID) (*ProjectGrant, error) + //PROJECT_GRANT_MEMBER + GetProjectGrantMemberRoles(context.Context, *empty.Empty) (*ProjectGrantMemberRoles, error) + SearchProjectGrantMembers(context.Context, *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) + AddProjectGrantMember(context.Context, *ProjectGrantMemberAdd) (*empty.Empty, error) + ChangeProjectGrantMember(context.Context, *ProjectGrantMemberChange) (*empty.Empty, error) + RemoveProjectGrantMember(context.Context, *ProjectGrantMemberRemove) (*empty.Empty, error) + //USER_GRANT + SearchUserGrants(context.Context, *UserGrantSearchRequest) (*UserGrantSearchResponse, error) + UserGrantByID(context.Context, *UserGrantID) (*UserGrant, error) + CreateUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateUserGrant(context.Context, *UserGrantUpdate) (*UserGrant, error) + DeactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + ReactivateUserGrant(context.Context, *UserGrantID) (*UserGrant, error) + //PROJECT_USER_GRANT + SearchProjectUserGrants(context.Context, *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectUserGrantByID(context.Context, *ProjectUserGrantID) (*UserGrant, error) + CreateProjectUserGrant(context.Context, *UserGrantCreate) (*UserGrant, error) + UpdateProjectUserGrant(context.Context, *ProjectUserGrantUpdate) (*UserGrant, error) + DeactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + ReactivateProjectUserGrant(context.Context, *ProjectUserGrantID) (*UserGrant, error) + //PROJECT_GRANT_USER_GRANT + SearchProjectGrantUserGrants(context.Context, *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) + ProjectGrantUserGrantByID(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + CreateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantCreate) (*UserGrant, error) + UpdateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantUpdate) (*UserGrant, error) + DeactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + ReactivateProjectGrantUserGrant(context.Context, *ProjectGrantUserGrantID) (*UserGrant, error) + //Grant + SearchAuthGrant(context.Context, *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) +} + +// UnimplementedManagementServiceServer can be embedded to have forward compatible implementations. +type UnimplementedManagementServiceServer struct { +} + +func (*UnimplementedManagementServiceServer) Healthz(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Healthz not implemented") +} +func (*UnimplementedManagementServiceServer) Ready(ctx context.Context, req *empty.Empty) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method Ready not implemented") +} +func (*UnimplementedManagementServiceServer) Validate(ctx context.Context, req *empty.Empty) (*_struct.Struct, error) { + return nil, status.Errorf(codes.Unimplemented, "method Validate not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByID(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserByEmailGlobal(ctx context.Context, req *UserEmailID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserByEmailGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUsers(ctx context.Context, req *UserSearchRequest) (*UserSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUsers not implemented") +} +func (*UnimplementedManagementServiceServer) IsUserUnique(ctx context.Context, req *UniqueUserRequest) (*UniqueUserResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method IsUserUnique not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUser(ctx context.Context, req *CreateUserRequest) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUser not implemented") +} +func (*UnimplementedManagementServiceServer) LockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method LockUser not implemented") +} +func (*UnimplementedManagementServiceServer) UnlockUser(ctx context.Context, req *UserID) (*User, error) { + return nil, status.Errorf(codes.Unimplemented, "method UnlockUser not implemented") +} +func (*UnimplementedManagementServiceServer) DeleteUser(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeleteUser not implemented") +} +func (*UnimplementedManagementServiceServer) UserChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationChanges not implemented") +} +func (*UnimplementedManagementServiceServer) OrgChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method OrgChanges not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectChanges(ctx context.Context, req *ChangeRequest) (*Changes, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectChanges not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserProfile(ctx context.Context, req *UserID) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserProfile(ctx context.Context, req *UpdateUserProfileRequest) (*UserProfile, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserProfile not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserEmail(ctx context.Context, req *UserID) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserEmail(ctx context.Context, req *UpdateUserEmailRequest) (*UserEmail, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserEmail not implemented") +} +func (*UnimplementedManagementServiceServer) ResendEmailVerificationMail(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendEmailVerificationMail not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserPhone(ctx context.Context, req *UserID) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeUserPhone(ctx context.Context, req *UpdateUserPhoneRequest) (*UserPhone, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeUserPhone not implemented") +} +func (*UnimplementedManagementServiceServer) ResendPhoneVerificationCode(ctx context.Context, req *UserID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ResendPhoneVerificationCode not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserAddress(ctx context.Context, req *UserID) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserAddress(ctx context.Context, req *UpdateUserAddressRequest) (*UserAddress, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserAddress not implemented") +} +func (*UnimplementedManagementServiceServer) GetUserMfas(ctx context.Context, req *UserID) (*MultiFactors, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetUserMfas not implemented") +} +func (*UnimplementedManagementServiceServer) SendSetPasswordNotification(ctx context.Context, req *SetPasswordNotificationRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SendSetPasswordNotification not implemented") +} +func (*UnimplementedManagementServiceServer) SetInitialPassword(ctx context.Context, req *PasswordRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method SetInitialPassword not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordComplexityPolicy(ctx context.Context, req *empty.Empty) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyCreate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyUpdate) (*PasswordComplexityPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordComplexityPolicy(ctx context.Context, req *PasswordComplexityPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordComplexityPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordAgePolicy(ctx context.Context, req *empty.Empty) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyCreate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyUpdate) (*PasswordAgePolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordAgePolicy(ctx context.Context, req *PasswordAgePolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordAgePolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetPasswordLockoutPolicy(ctx context.Context, req *empty.Empty) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetPasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) CreatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyCreate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) UpdatePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyUpdate) (*PasswordLockoutPolicy, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdatePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) DeletePasswordLockoutPolicy(ctx context.Context, req *PasswordLockoutPolicyID) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeletePasswordLockoutPolicy not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByID(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgByDomainGlobal(ctx context.Context, req *OrgDomain) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgByDomainGlobal not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateOrg(ctx context.Context, req *OrgID) (*Org, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateOrg not implemented") +} +func (*UnimplementedManagementServiceServer) GetOrgMemberRoles(ctx context.Context, req *empty.Empty) (*OrgMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetOrgMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddOrgMember(ctx context.Context, req *AddOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeOrgMember(ctx context.Context, req *ChangeOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveOrgMember(ctx context.Context, req *RemoveOrgMemberRequest) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveOrgMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchOrgMembers(ctx context.Context, req *OrgMemberSearchRequest) (*OrgMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchOrgMembers not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjects(ctx context.Context, req *ProjectSearchRequest) (*ProjectSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjects not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectByID(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProject(ctx context.Context, req *ProjectCreateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProject not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProject(ctx context.Context, req *ProjectUpdateRequest) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProject not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProject(ctx context.Context, req *ProjectID) (*Project, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProject not implemented") +} +func (*UnimplementedManagementServiceServer) GetGrantedProjectGrantByID(ctx context.Context, req *GrantedGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetGrantedProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectMembers(ctx context.Context, req *ProjectMemberSearchRequest) (*ProjectMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectMember(ctx context.Context, req *ProjectMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectMember(ctx context.Context, req *ProjectMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectMember(ctx context.Context, req *ProjectMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectRoles(ctx context.Context, req *ProjectRoleSearchRequest) (*ProjectRoleSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectRoles not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectRole(ctx context.Context, req *ProjectRoleAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectRole(ctx context.Context, req *ProjectRoleRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectRole not implemented") +} +func (*UnimplementedManagementServiceServer) SearchApplications(ctx context.Context, req *ApplicationSearchRequest) (*ApplicationSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchApplications not implemented") +} +func (*UnimplementedManagementServiceServer) ApplicationByID(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ApplicationByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateOIDCApplication(ctx context.Context, req *OIDCApplicationCreate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateOIDCApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplication(ctx context.Context, req *ApplicationUpdate) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateApplication(ctx context.Context, req *ApplicationID) (*Application, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateApplication not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateApplicationOIDCConfig(ctx context.Context, req *OIDCConfigUpdate) (*OIDCConfig, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateApplicationOIDCConfig not implemented") +} +func (*UnimplementedManagementServiceServer) RegenerateOIDCClientSecret(ctx context.Context, req *ApplicationID) (*ClientSecret, error) { + return nil, status.Errorf(codes.Unimplemented, "method RegenerateOIDCClientSecret not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrants(ctx context.Context, req *ProjectGrantSearchRequest) (*ProjectGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantByID(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrant(ctx context.Context, req *ProjectGrantCreate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrant(ctx context.Context, req *ProjectGrantUpdate) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrant(ctx context.Context, req *ProjectGrantID) (*ProjectGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrant not implemented") +} +func (*UnimplementedManagementServiceServer) GetProjectGrantMemberRoles(ctx context.Context, req *empty.Empty) (*ProjectGrantMemberRoles, error) { + return nil, status.Errorf(codes.Unimplemented, "method GetProjectGrantMemberRoles not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantMembers(ctx context.Context, req *ProjectGrantMemberSearchRequest) (*ProjectGrantMemberSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantMembers not implemented") +} +func (*UnimplementedManagementServiceServer) AddProjectGrantMember(ctx context.Context, req *ProjectGrantMemberAdd) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method AddProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) ChangeProjectGrantMember(ctx context.Context, req *ProjectGrantMemberChange) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method ChangeProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) RemoveProjectGrantMember(ctx context.Context, req *ProjectGrantMemberRemove) (*empty.Empty, error) { + return nil, status.Errorf(codes.Unimplemented, "method RemoveProjectGrantMember not implemented") +} +func (*UnimplementedManagementServiceServer) SearchUserGrants(ctx context.Context, req *UserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) UserGrantByID(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateUserGrant(ctx context.Context, req *UserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateUserGrant(ctx context.Context, req *UserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectUserGrants(ctx context.Context, req *ProjectUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectUserGrantByID(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectUserGrant(ctx context.Context, req *UserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectUserGrant(ctx context.Context, req *ProjectUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectUserGrant(ctx context.Context, req *ProjectUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchProjectGrantUserGrants(ctx context.Context, req *ProjectGrantUserGrantSearchRequest) (*UserGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchProjectGrantUserGrants not implemented") +} +func (*UnimplementedManagementServiceServer) ProjectGrantUserGrantByID(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ProjectGrantUserGrantByID not implemented") +} +func (*UnimplementedManagementServiceServer) CreateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantCreate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) UpdateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantUpdate) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) DeactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method DeactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) ReactivateProjectGrantUserGrant(ctx context.Context, req *ProjectGrantUserGrantID) (*UserGrant, error) { + return nil, status.Errorf(codes.Unimplemented, "method ReactivateProjectGrantUserGrant not implemented") +} +func (*UnimplementedManagementServiceServer) SearchAuthGrant(ctx context.Context, req *AuthGrantSearchRequest) (*AuthGrantSearchResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method SearchAuthGrant not implemented") +} + +func RegisterManagementServiceServer(s *grpc.Server, srv ManagementServiceServer) { + s.RegisterService(&_ManagementService_serviceDesc, srv) +} + +func _ManagementService_Healthz_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Healthz(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Healthz", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Healthz(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Ready_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Ready(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Ready", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Ready(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_Validate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).Validate(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/Validate", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).Validate(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByID(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserByEmailGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserEmailID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserByEmailGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserByEmailGlobal(ctx, req.(*UserEmailID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUsers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUsers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUsers(ctx, req.(*UserSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_IsUserUnique_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UniqueUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).IsUserUnique(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/IsUserUnique", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).IsUserUnique(ctx, req.(*UniqueUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateUserRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUser(ctx, req.(*CreateUserRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_LockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).LockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/LockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).LockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UnlockUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UnlockUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UnlockUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UnlockUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeleteUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeleteUser(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeleteUser", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeleteUser(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_OrgChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).OrgChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/OrgChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).OrgChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectChanges_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectChanges(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectChanges", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectChanges(ctx, req.(*ChangeRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserProfile(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserProfile_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserProfileRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserProfile", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserProfile(ctx, req.(*UpdateUserProfileRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserEmail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserEmail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserEmailRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserEmail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserEmail(ctx, req.(*UpdateUserEmailRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendEmailVerificationMail_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendEmailVerificationMail", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendEmailVerificationMail(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserPhone(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeUserPhone_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserPhoneRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeUserPhone", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeUserPhone(ctx, req.(*UpdateUserPhoneRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ResendPhoneVerificationCode_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ResendPhoneVerificationCode", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ResendPhoneVerificationCode(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserAddress(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserAddress_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UpdateUserAddressRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserAddress", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserAddress(ctx, req.(*UpdateUserAddressRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetUserMfas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetUserMfas(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetUserMfas", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetUserMfas(ctx, req.(*UserID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SendSetPasswordNotification_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(SetPasswordNotificationRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SendSetPasswordNotification", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SendSetPasswordNotification(ctx, req.(*SetPasswordNotificationRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SetInitialPassword_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SetInitialPassword", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SetInitialPassword(ctx, req.(*PasswordRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordComplexityPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordComplexityPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordComplexityPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordComplexityPolicy(ctx, req.(*PasswordComplexityPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordAgePolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordAgePolicy(ctx, req.(*PasswordAgePolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordAgePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordAgePolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordAgePolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordAgePolicy(ctx, req.(*PasswordAgePolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetPasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetPasswordLockoutPolicy(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdatePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdatePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeletePasswordLockoutPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(PasswordLockoutPolicyID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeletePasswordLockoutPolicy(ctx, req.(*PasswordLockoutPolicyID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByID(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgByDomainGlobal_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgDomain) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgByDomainGlobal", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgByDomainGlobal(ctx, req.(*OrgDomain)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateOrg_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateOrg", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateOrg(ctx, req.(*OrgID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetOrgMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetOrgMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetOrgMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AddOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddOrgMember(ctx, req.(*AddOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ChangeOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeOrgMember(ctx, req.(*ChangeOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveOrgMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(RemoveOrgMemberRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveOrgMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveOrgMember(ctx, req.(*RemoveOrgMemberRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchOrgMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OrgMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchOrgMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchOrgMembers(ctx, req.(*OrgMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjects_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjects(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjects", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjects(ctx, req.(*ProjectSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectByID(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectCreateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProject(ctx, req.(*ProjectCreateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUpdateRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProject(ctx, req.(*ProjectUpdateRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProject(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProject", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProject(ctx, req.(*ProjectID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetGrantedProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(GrantedGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetGrantedProjectGrantByID(ctx, req.(*GrantedGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectMembers(ctx, req.(*ProjectMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectMember(ctx, req.(*ProjectMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectMember(ctx, req.(*ProjectMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectMember(ctx, req.(*ProjectMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectRoles(ctx, req.(*ProjectRoleSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectRole(ctx, req.(*ProjectRoleAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectRoleRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectRole", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectRole(ctx, req.(*ProjectRoleRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchApplications_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchApplications(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchApplications", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchApplications(ctx, req.(*ApplicationSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ApplicationByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ApplicationByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ApplicationByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ApplicationByID(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateOIDCApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCApplicationCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateOIDCApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateOIDCApplication(ctx, req.(*OIDCApplicationCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplication(ctx, req.(*ApplicationUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateApplication_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateApplication", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateApplication(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateApplicationOIDCConfig_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(OIDCConfigUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateApplicationOIDCConfig(ctx, req.(*OIDCConfigUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RegenerateOIDCClientSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ApplicationID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RegenerateOIDCClientSecret(ctx, req.(*ApplicationID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrants(ctx, req.(*ProjectGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantByID(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrant(ctx, req.(*ProjectGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrant(ctx, req.(*ProjectGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrant(ctx, req.(*ProjectGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_GetProjectGrantMemberRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(empty.Empty) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).GetProjectGrantMemberRoles(ctx, req.(*empty.Empty)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantMembers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantMembers", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantMembers(ctx, req.(*ProjectGrantMemberSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_AddProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberAdd) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/AddProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).AddProjectGrantMember(ctx, req.(*ProjectGrantMemberAdd)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ChangeProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberChange) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ChangeProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ChangeProjectGrantMember(ctx, req.(*ProjectGrantMemberChange)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_RemoveProjectGrantMember_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantMemberRemove) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/RemoveProjectGrantMember", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).RemoveProjectGrantMember(ctx, req.(*ProjectGrantMemberRemove)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchUserGrants(ctx, req.(*UserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UserGrantByID(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateUserGrant(ctx, req.(*UserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateUserGrant(ctx, req.(*UserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectUserGrants(ctx, req.(*ProjectUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectUserGrantByID(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(UserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectUserGrant(ctx, req.(*UserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectUserGrant(ctx, req.(*ProjectUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectUserGrant(ctx, req.(*ProjectUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchProjectGrantUserGrants_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchProjectGrantUserGrants(ctx, req.(*ProjectGrantUserGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ProjectGrantUserGrantByID_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ProjectGrantUserGrantByID(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_CreateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantCreate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).CreateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantCreate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_UpdateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantUpdate) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).UpdateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantUpdate)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_DeactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).DeactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_ReactivateProjectGrantUserGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ProjectGrantUserGrantID) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).ReactivateProjectGrantUserGrant(ctx, req.(*ProjectGrantUserGrantID)) + } + return interceptor(ctx, in, info, handler) +} + +func _ManagementService_SearchAuthGrant_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(AuthGrantSearchRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/caos.zitadel.management.api.v1.ManagementService/SearchAuthGrant", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(ManagementServiceServer).SearchAuthGrant(ctx, req.(*AuthGrantSearchRequest)) + } + return interceptor(ctx, in, info, handler) +} + +var _ManagementService_serviceDesc = grpc.ServiceDesc{ + ServiceName: "caos.zitadel.management.api.v1.ManagementService", + HandlerType: (*ManagementServiceServer)(nil), + Methods: []grpc.MethodDesc{ + { + MethodName: "Healthz", + Handler: _ManagementService_Healthz_Handler, + }, + { + MethodName: "Ready", + Handler: _ManagementService_Ready_Handler, + }, + { + MethodName: "Validate", + Handler: _ManagementService_Validate_Handler, + }, + { + MethodName: "GetUserByID", + Handler: _ManagementService_GetUserByID_Handler, + }, + { + MethodName: "GetUserByEmailGlobal", + Handler: _ManagementService_GetUserByEmailGlobal_Handler, + }, + { + MethodName: "SearchUsers", + Handler: _ManagementService_SearchUsers_Handler, + }, + { + MethodName: "IsUserUnique", + Handler: _ManagementService_IsUserUnique_Handler, + }, + { + MethodName: "CreateUser", + Handler: _ManagementService_CreateUser_Handler, + }, + { + MethodName: "DeactivateUser", + Handler: _ManagementService_DeactivateUser_Handler, + }, + { + MethodName: "ReactivateUser", + Handler: _ManagementService_ReactivateUser_Handler, + }, + { + MethodName: "LockUser", + Handler: _ManagementService_LockUser_Handler, + }, + { + MethodName: "UnlockUser", + Handler: _ManagementService_UnlockUser_Handler, + }, + { + MethodName: "DeleteUser", + Handler: _ManagementService_DeleteUser_Handler, + }, + { + MethodName: "UserChanges", + Handler: _ManagementService_UserChanges_Handler, + }, + { + MethodName: "ApplicationChanges", + Handler: _ManagementService_ApplicationChanges_Handler, + }, + { + MethodName: "OrgChanges", + Handler: _ManagementService_OrgChanges_Handler, + }, + { + MethodName: "ProjectChanges", + Handler: _ManagementService_ProjectChanges_Handler, + }, + { + MethodName: "GetUserProfile", + Handler: _ManagementService_GetUserProfile_Handler, + }, + { + MethodName: "UpdateUserProfile", + Handler: _ManagementService_UpdateUserProfile_Handler, + }, + { + MethodName: "GetUserEmail", + Handler: _ManagementService_GetUserEmail_Handler, + }, + { + MethodName: "ChangeUserEmail", + Handler: _ManagementService_ChangeUserEmail_Handler, + }, + { + MethodName: "ResendEmailVerificationMail", + Handler: _ManagementService_ResendEmailVerificationMail_Handler, + }, + { + MethodName: "GetUserPhone", + Handler: _ManagementService_GetUserPhone_Handler, + }, + { + MethodName: "ChangeUserPhone", + Handler: _ManagementService_ChangeUserPhone_Handler, + }, + { + MethodName: "ResendPhoneVerificationCode", + Handler: _ManagementService_ResendPhoneVerificationCode_Handler, + }, + { + MethodName: "GetUserAddress", + Handler: _ManagementService_GetUserAddress_Handler, + }, + { + MethodName: "UpdateUserAddress", + Handler: _ManagementService_UpdateUserAddress_Handler, + }, + { + MethodName: "GetUserMfas", + Handler: _ManagementService_GetUserMfas_Handler, + }, + { + MethodName: "SendSetPasswordNotification", + Handler: _ManagementService_SendSetPasswordNotification_Handler, + }, + { + MethodName: "SetInitialPassword", + Handler: _ManagementService_SetInitialPassword_Handler, + }, + { + MethodName: "GetPasswordComplexityPolicy", + Handler: _ManagementService_GetPasswordComplexityPolicy_Handler, + }, + { + MethodName: "CreatePasswordComplexityPolicy", + Handler: _ManagementService_CreatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "UpdatePasswordComplexityPolicy", + Handler: _ManagementService_UpdatePasswordComplexityPolicy_Handler, + }, + { + MethodName: "DeletePasswordComplexityPolicy", + Handler: _ManagementService_DeletePasswordComplexityPolicy_Handler, + }, + { + MethodName: "GetPasswordAgePolicy", + Handler: _ManagementService_GetPasswordAgePolicy_Handler, + }, + { + MethodName: "CreatePasswordAgePolicy", + Handler: _ManagementService_CreatePasswordAgePolicy_Handler, + }, + { + MethodName: "UpdatePasswordAgePolicy", + Handler: _ManagementService_UpdatePasswordAgePolicy_Handler, + }, + { + MethodName: "DeletePasswordAgePolicy", + Handler: _ManagementService_DeletePasswordAgePolicy_Handler, + }, + { + MethodName: "GetPasswordLockoutPolicy", + Handler: _ManagementService_GetPasswordLockoutPolicy_Handler, + }, + { + MethodName: "CreatePasswordLockoutPolicy", + Handler: _ManagementService_CreatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "UpdatePasswordLockoutPolicy", + Handler: _ManagementService_UpdatePasswordLockoutPolicy_Handler, + }, + { + MethodName: "DeletePasswordLockoutPolicy", + Handler: _ManagementService_DeletePasswordLockoutPolicy_Handler, + }, + { + MethodName: "GetOrgByID", + Handler: _ManagementService_GetOrgByID_Handler, + }, + { + MethodName: "GetOrgByDomainGlobal", + Handler: _ManagementService_GetOrgByDomainGlobal_Handler, + }, + { + MethodName: "DeactivateOrg", + Handler: _ManagementService_DeactivateOrg_Handler, + }, + { + MethodName: "ReactivateOrg", + Handler: _ManagementService_ReactivateOrg_Handler, + }, + { + MethodName: "GetOrgMemberRoles", + Handler: _ManagementService_GetOrgMemberRoles_Handler, + }, + { + MethodName: "AddOrgMember", + Handler: _ManagementService_AddOrgMember_Handler, + }, + { + MethodName: "ChangeOrgMember", + Handler: _ManagementService_ChangeOrgMember_Handler, + }, + { + MethodName: "RemoveOrgMember", + Handler: _ManagementService_RemoveOrgMember_Handler, + }, + { + MethodName: "SearchOrgMembers", + Handler: _ManagementService_SearchOrgMembers_Handler, + }, + { + MethodName: "SearchProjects", + Handler: _ManagementService_SearchProjects_Handler, + }, + { + MethodName: "ProjectByID", + Handler: _ManagementService_ProjectByID_Handler, + }, + { + MethodName: "CreateProject", + Handler: _ManagementService_CreateProject_Handler, + }, + { + MethodName: "UpdateProject", + Handler: _ManagementService_UpdateProject_Handler, + }, + { + MethodName: "DeactivateProject", + Handler: _ManagementService_DeactivateProject_Handler, + }, + { + MethodName: "ReactivateProject", + Handler: _ManagementService_ReactivateProject_Handler, + }, + { + MethodName: "GetGrantedProjectGrantByID", + Handler: _ManagementService_GetGrantedProjectGrantByID_Handler, + }, + { + MethodName: "GetProjectMemberRoles", + Handler: _ManagementService_GetProjectMemberRoles_Handler, + }, + { + MethodName: "SearchProjectMembers", + Handler: _ManagementService_SearchProjectMembers_Handler, + }, + { + MethodName: "AddProjectMember", + Handler: _ManagementService_AddProjectMember_Handler, + }, + { + MethodName: "ChangeProjectMember", + Handler: _ManagementService_ChangeProjectMember_Handler, + }, + { + MethodName: "RemoveProjectMember", + Handler: _ManagementService_RemoveProjectMember_Handler, + }, + { + MethodName: "SearchProjectRoles", + Handler: _ManagementService_SearchProjectRoles_Handler, + }, + { + MethodName: "AddProjectRole", + Handler: _ManagementService_AddProjectRole_Handler, + }, + { + MethodName: "RemoveProjectRole", + Handler: _ManagementService_RemoveProjectRole_Handler, + }, + { + MethodName: "SearchApplications", + Handler: _ManagementService_SearchApplications_Handler, + }, + { + MethodName: "ApplicationByID", + Handler: _ManagementService_ApplicationByID_Handler, + }, + { + MethodName: "CreateOIDCApplication", + Handler: _ManagementService_CreateOIDCApplication_Handler, + }, + { + MethodName: "UpdateApplication", + Handler: _ManagementService_UpdateApplication_Handler, + }, + { + MethodName: "DeactivateApplication", + Handler: _ManagementService_DeactivateApplication_Handler, + }, + { + MethodName: "ReactivateApplication", + Handler: _ManagementService_ReactivateApplication_Handler, + }, + { + MethodName: "UpdateApplicationOIDCConfig", + Handler: _ManagementService_UpdateApplicationOIDCConfig_Handler, + }, + { + MethodName: "RegenerateOIDCClientSecret", + Handler: _ManagementService_RegenerateOIDCClientSecret_Handler, + }, + { + MethodName: "SearchProjectGrants", + Handler: _ManagementService_SearchProjectGrants_Handler, + }, + { + MethodName: "ProjectGrantByID", + Handler: _ManagementService_ProjectGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrant", + Handler: _ManagementService_CreateProjectGrant_Handler, + }, + { + MethodName: "UpdateProjectGrant", + Handler: _ManagementService_UpdateProjectGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrant", + Handler: _ManagementService_DeactivateProjectGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrant", + Handler: _ManagementService_ReactivateProjectGrant_Handler, + }, + { + MethodName: "GetProjectGrantMemberRoles", + Handler: _ManagementService_GetProjectGrantMemberRoles_Handler, + }, + { + MethodName: "SearchProjectGrantMembers", + Handler: _ManagementService_SearchProjectGrantMembers_Handler, + }, + { + MethodName: "AddProjectGrantMember", + Handler: _ManagementService_AddProjectGrantMember_Handler, + }, + { + MethodName: "ChangeProjectGrantMember", + Handler: _ManagementService_ChangeProjectGrantMember_Handler, + }, + { + MethodName: "RemoveProjectGrantMember", + Handler: _ManagementService_RemoveProjectGrantMember_Handler, + }, + { + MethodName: "SearchUserGrants", + Handler: _ManagementService_SearchUserGrants_Handler, + }, + { + MethodName: "UserGrantByID", + Handler: _ManagementService_UserGrantByID_Handler, + }, + { + MethodName: "CreateUserGrant", + Handler: _ManagementService_CreateUserGrant_Handler, + }, + { + MethodName: "UpdateUserGrant", + Handler: _ManagementService_UpdateUserGrant_Handler, + }, + { + MethodName: "DeactivateUserGrant", + Handler: _ManagementService_DeactivateUserGrant_Handler, + }, + { + MethodName: "ReactivateUserGrant", + Handler: _ManagementService_ReactivateUserGrant_Handler, + }, + { + MethodName: "SearchProjectUserGrants", + Handler: _ManagementService_SearchProjectUserGrants_Handler, + }, + { + MethodName: "ProjectUserGrantByID", + Handler: _ManagementService_ProjectUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectUserGrant", + Handler: _ManagementService_CreateProjectUserGrant_Handler, + }, + { + MethodName: "UpdateProjectUserGrant", + Handler: _ManagementService_UpdateProjectUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectUserGrant", + Handler: _ManagementService_DeactivateProjectUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectUserGrant", + Handler: _ManagementService_ReactivateProjectUserGrant_Handler, + }, + { + MethodName: "SearchProjectGrantUserGrants", + Handler: _ManagementService_SearchProjectGrantUserGrants_Handler, + }, + { + MethodName: "ProjectGrantUserGrantByID", + Handler: _ManagementService_ProjectGrantUserGrantByID_Handler, + }, + { + MethodName: "CreateProjectGrantUserGrant", + Handler: _ManagementService_CreateProjectGrantUserGrant_Handler, + }, + { + MethodName: "UpdateProjectGrantUserGrant", + Handler: _ManagementService_UpdateProjectGrantUserGrant_Handler, + }, + { + MethodName: "DeactivateProjectGrantUserGrant", + Handler: _ManagementService_DeactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "ReactivateProjectGrantUserGrant", + Handler: _ManagementService_ReactivateProjectGrantUserGrant_Handler, + }, + { + MethodName: "SearchAuthGrant", + Handler: _ManagementService_SearchAuthGrant_Handler, + }, + }, + Streams: []grpc.StreamDesc{}, + Metadata: "management.proto", +} diff --git a/pkg/management/api/grpc/management.pb.gw.go b/pkg/management/api/grpc/management.pb.gw.go new file mode 100644 index 0000000000..8ac730cbf5 --- /dev/null +++ b/pkg/management/api/grpc/management.pb.gw.go @@ -0,0 +1,6078 @@ +// Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. +// source: management.proto + +/* +Package grpc is a reverse proxy. + +It translates gRPC into RESTful JSON APIs. +*/ +package grpc + +import ( + "context" + "io" + "net/http" + + "github.com/golang/protobuf/proto" + "github.com/golang/protobuf/ptypes/empty" + "github.com/grpc-ecosystem/grpc-gateway/runtime" + "github.com/grpc-ecosystem/grpc-gateway/utilities" + "google.golang.org/grpc" + "google.golang.org/grpc/codes" + "google.golang.org/grpc/grpclog" + "google.golang.org/grpc/status" +) + +var _ codes.Code +var _ io.Reader +var _ status.Status +var _ = runtime.String +var _ = utilities.NewDoubleArray + +func request_ManagementService_Healthz_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Healthz(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Ready_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Ready(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_Validate_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.Validate(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserByEmailGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserEmailID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["email"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "email") + } + + protoReq.Email, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "email", err) + } + + msg, err := client.GetUserByEmailGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUsers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_IsUserUnique_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} +) + +func request_ManagementService_IsUserUnique_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UniqueUserRequest + var metadata runtime.ServerMetadata + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_IsUserUnique_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.IsUserUnique(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateUserRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_LockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.LockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UnlockUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UnlockUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeleteUser(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_UserChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_UserChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_UserChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.UserChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ApplicationChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ApplicationChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ApplicationChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ApplicationChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_OrgChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_OrgChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_OrgChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.OrgChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +var ( + filter_ManagementService_ProjectChanges_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 1, 0}, Check: []int{0, 1, 2}} +) + +func request_ManagementService_ProjectChanges_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + if err := runtime.PopulateQueryParameters(&protoReq, req.URL.Query(), filter_ManagementService_ProjectChanges_0); err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ProjectChanges(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserProfile_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserProfileRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserProfile(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserEmail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserEmailRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserEmail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendEmailVerificationMail_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendEmailVerificationMail(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeUserPhone_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserPhoneRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ChangeUserPhone(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ResendPhoneVerificationCode_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ResendPhoneVerificationCode(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserAddress_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UpdateUserAddressRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserAddress(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetUserMfas_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetUserMfas(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SendSetPasswordNotification_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq SetPasswordNotificationRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SendSetPasswordNotification(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SetInitialPassword_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.SetInitialPassword(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordComplexityPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordComplexityPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordComplexityPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordAgePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordAgePolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordAgePolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetPasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetPasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdatePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdatePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeletePasswordLockoutPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq PasswordLockoutPolicyID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeletePasswordLockoutPolicy(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetOrgByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgByDomainGlobal_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgDomain + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["domain"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "domain") + } + + protoReq.Domain, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "domain", err) + } + + msg, err := client.GetOrgByDomainGlobal(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateOrg_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateOrg(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetOrgMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetOrgMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AddOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.AddOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ChangeOrgMemberRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveOrgMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq RemoveOrgMemberRequest + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveOrgMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchOrgMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OrgMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["org_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "org_id") + } + + protoReq.OrgId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "org_id", err) + } + + msg, err := client.SearchOrgMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjects_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchProjects(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectCreateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUpdateRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProject(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetGrantedProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq GrantedGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.GetGrantedProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.AddProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectRole_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectRoleRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + val, ok = pathParams["name"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "name") + } + + protoReq.Name, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "name", err) + } + + msg, err := client.RemoveProjectRole(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchApplications_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchApplications(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ApplicationByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ApplicationByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateOIDCApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCApplicationCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateOIDCApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateApplication_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateApplication(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateApplicationOIDCConfig_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq OIDCConfigUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["application_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "application_id") + } + + protoReq.ApplicationId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "application_id", err) + } + + msg, err := client.UpdateApplicationOIDCConfig(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RegenerateOIDCClientSecret_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ApplicationID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.RegenerateOIDCClientSecret(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.CreateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_GetProjectGrantMemberRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq empty.Empty + var metadata runtime.ServerMetadata + + msg, err := client.GetProjectGrantMemberRoles(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantMembers_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.SearchProjectGrantMembers(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_AddProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberAdd + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + msg, err := client.AddProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ChangeProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberChange + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.ChangeProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_RemoveProjectGrantMember_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantMemberRemove + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "grant_id") + } + + protoReq.GrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.RemoveProjectGrantMember(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + msg, err := client.SearchProjectUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq UserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_id") + } + + protoReq.ProjectId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchProjectGrantUserGrants_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + msg, err := client.SearchProjectGrantUserGrants(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ProjectGrantUserGrantByID_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ProjectGrantUserGrantByID(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_CreateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantCreate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + msg, err := client.CreateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_UpdateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantUpdate + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.UpdateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_DeactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.DeactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_ReactivateProjectGrantUserGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ProjectGrantUserGrantID + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + var ( + val string + ok bool + err error + _ = err + ) + + val, ok = pathParams["project_grant_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "project_grant_id") + } + + protoReq.ProjectGrantId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "project_grant_id", err) + } + + val, ok = pathParams["user_id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "user_id") + } + + protoReq.UserId, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "user_id", err) + } + + val, ok = pathParams["id"] + if !ok { + return nil, metadata, status.Errorf(codes.InvalidArgument, "missing parameter %s", "id") + } + + protoReq.Id, err = runtime.String(val) + + if err != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "type mismatch, parameter: %s, error: %v", "id", err) + } + + msg, err := client.ReactivateProjectGrantUserGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func request_ManagementService_SearchAuthGrant_0(ctx context.Context, marshaler runtime.Marshaler, client ManagementServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq AuthGrantSearchRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.SearchAuthGrant(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +// RegisterManagementServiceHandlerFromEndpoint is same as RegisterManagementServiceHandler but +// automatically dials to "endpoint" and closes the connection when "ctx" gets done. +func RegisterManagementServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { + conn, err := grpc.Dial(endpoint, opts...) + if err != nil { + return err + } + defer func() { + if err != nil { + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + return + } + go func() { + <-ctx.Done() + if cerr := conn.Close(); cerr != nil { + grpclog.Infof("Failed to close conn to %s: %v", endpoint, cerr) + } + }() + }() + + return RegisterManagementServiceHandler(ctx, mux, conn) +} + +// RegisterManagementServiceHandler registers the http handlers for service ManagementService to "mux". +// The handlers forward requests to the grpc endpoint over "conn". +func RegisterManagementServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterManagementServiceHandlerClient(ctx, mux, NewManagementServiceClient(conn)) +} + +// RegisterManagementServiceHandlerClient registers the http handlers for service ManagementService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "ManagementServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ManagementServiceClient" +// doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in +// "ManagementServiceClient" to call the correct interceptors. +func RegisterManagementServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client ManagementServiceClient) error { + + mux.Handle("GET", pattern_ManagementService_Healthz_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Healthz_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Healthz_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Ready_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Ready_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Ready_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_Validate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_Validate_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_Validate_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserByEmailGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserByEmailGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserByEmailGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUsers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUsers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_IsUserUnique_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_IsUserUnique_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_IsUserUnique_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_LockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_LockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_LockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UnlockUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UnlockUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UnlockUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeleteUser_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeleteUser_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_OrgChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_OrgChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_OrgChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectChanges_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectChanges_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectChanges_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserProfile_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserProfile_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserProfile_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserEmail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserEmail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserEmail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendEmailVerificationMail_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendEmailVerificationMail_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendEmailVerificationMail_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeUserPhone_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeUserPhone_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeUserPhone_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_ResendPhoneVerificationCode_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ResendPhoneVerificationCode_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ResendPhoneVerificationCode_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserAddress_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserAddress_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserAddress_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetUserMfas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetUserMfas_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetUserMfas_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SendSetPasswordNotification_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SendSetPasswordNotification_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SendSetPasswordNotification_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SetInitialPassword_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SetInitialPassword_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SetInitialPassword_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordComplexityPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordComplexityPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordComplexityPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordAgePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordAgePolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordAgePolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetPasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetPasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetPasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdatePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdatePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdatePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_DeletePasswordLockoutPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeletePasswordLockoutPolicy_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeletePasswordLockoutPolicy_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgByDomainGlobal_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgByDomainGlobal_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgByDomainGlobal_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateOrg_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateOrg_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateOrg_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetOrgMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetOrgMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetOrgMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveOrgMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveOrgMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveOrgMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchOrgMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchOrgMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchOrgMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjects_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjects_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProject_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProject_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetGrantedProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetGrantedProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetGrantedProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectRole_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectRole_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchApplications_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchApplications_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchApplications_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ApplicationByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ApplicationByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ApplicationByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateOIDCApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateOIDCApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateOIDCApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateApplication_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateApplication_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateApplication_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateApplicationOIDCConfig_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateApplicationOIDCConfig_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateApplicationOIDCConfig_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_RegenerateOIDCClientSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RegenerateOIDCClientSecret_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RegenerateOIDCClientSecret_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_GetProjectGrantMemberRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_GetProjectGrantMemberRoles_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_GetProjectGrantMemberRoles_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantMembers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantMembers_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantMembers_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_AddProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_AddProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_AddProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ChangeProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ChangeProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ChangeProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("DELETE", pattern_ManagementService_RemoveProjectGrantMember_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_RemoveProjectGrantMember_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_RemoveProjectGrantMember_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_UserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchProjectGrantUserGrants_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchProjectGrantUserGrants_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchProjectGrantUserGrants_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_ManagementService_ProjectGrantUserGrantByID_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ProjectGrantUserGrantByID_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ProjectGrantUserGrantByID_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_CreateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_CreateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_CreateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_UpdateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_UpdateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_UpdateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_DeactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_DeactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_DeactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("PUT", pattern_ManagementService_ReactivateProjectGrantUserGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_ReactivateProjectGrantUserGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_ReactivateProjectGrantUserGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_ManagementService_SearchAuthGrant_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_ManagementService_SearchAuthGrant_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_ManagementService_SearchAuthGrant_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + return nil +} + +var ( + pattern_ManagementService_Healthz_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"healthz"}, "")) + + pattern_ManagementService_Ready_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"ready"}, "")) + + pattern_ManagementService_Validate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"validate"}, "")) + + pattern_ManagementService_GetUserByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_GetUserByEmailGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "users", "email"}, "")) + + pattern_ManagementService_SearchUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_search"}, "")) + + pattern_ManagementService_IsUserUnique_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"users", "_isunique"}, "")) + + pattern_ManagementService_CreateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"users"}, "")) + + pattern_ManagementService_DeactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_reactivate"}, "")) + + pattern_ManagementService_LockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_lock"}, "")) + + pattern_ManagementService_UnlockUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_unlock"}, "")) + + pattern_ManagementService_DeleteUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"users", "id"}, "")) + + pattern_ManagementService_UserChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "changes"}, "")) + + pattern_ManagementService_ApplicationChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"applications", "id", "changes"}, "")) + + pattern_ManagementService_OrgChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "changes"}, "")) + + pattern_ManagementService_ProjectChanges_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "changes"}, "")) + + pattern_ManagementService_GetUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_UpdateUserProfile_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "profile"}, "")) + + pattern_ManagementService_GetUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ChangeUserEmail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "email"}, "")) + + pattern_ManagementService_ResendEmailVerificationMail_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "email", "_resendverification"}, "")) + + pattern_ManagementService_GetUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ChangeUserPhone_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "phone"}, "")) + + pattern_ManagementService_ResendPhoneVerificationCode_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"users", "id", "phone", "_resendverification"}, "")) + + pattern_ManagementService_GetUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_UpdateUserAddress_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "address"}, "")) + + pattern_ManagementService_GetUserMfas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "mfas"}, "")) + + pattern_ManagementService_SendSetPasswordNotification_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_sendsetpwnotify"}, "")) + + pattern_ManagementService_SetInitialPassword_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "id", "_setinitialpw"}, "")) + + pattern_ManagementService_GetPasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "complexity"}, "")) + + pattern_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "complexity", "id"}, "")) + + pattern_ManagementService_GetPasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_CreatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "age"}, "")) + + pattern_ManagementService_UpdatePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_DeletePasswordAgePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "age", "id"}, "")) + + pattern_ManagementService_GetPasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"policies", "passwords", "lockout"}, "")) + + pattern_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"policies", "passwords", "lockout", "id"}, "")) + + pattern_ManagementService_GetOrgByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"orgs", "id"}, "")) + + pattern_ManagementService_GetOrgByDomainGlobal_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 2}, []string{"global", "orgs", "domain"}, "")) + + pattern_ManagementService_DeactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateOrg_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetOrgMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"orgs", "members", "roles"}, "")) + + pattern_ManagementService_AddOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"orgs", "org_id", "members"}, "")) + + pattern_ManagementService_ChangeOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveOrgMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"orgs", "org_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchOrgMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"orgs", "org_id", "members", "_search"}, "")) + + pattern_ManagementService_SearchProjects_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"projects", "_search"}, "")) + + pattern_ManagementService_ProjectByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_CreateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0}, []string{"projects"}, "")) + + pattern_ManagementService_UpdateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"projects", "id"}, "")) + + pattern_ManagementService_DeactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetGrantedProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1}, []string{"grants", "id"}, "")) + + pattern_ManagementService_GetProjectMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"projects", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "members"}, "")) + + pattern_ManagementService_ChangeProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchProjectRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "roles", "_search"}, "")) + + pattern_ManagementService_AddProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "id", "roles"}, "")) + + pattern_ManagementService_RemoveProjectRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "id", "roles", "name"}, "")) + + pattern_ManagementService_SearchApplications_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "applications", "_search"}, "")) + + pattern_ManagementService_ApplicationByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_CreateOIDCApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "oidcapplications"}, "")) + + pattern_ManagementService_UpdateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "applications", "id"}, "")) + + pattern_ManagementService_DeactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateApplication_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "id", "_reactivate"}, "")) + + pattern_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "applications", "application_id", "oidcconfig"}, "")) + + pattern_ManagementService_RegenerateOIDCClientSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "applications", "id", "oidcconfig", "_changeclientsecret"}, "")) + + pattern_ManagementService_SearchProjectGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3}, []string{"projects", "project_id", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"projects", "project_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"projects", "project_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_GetProjectGrantMemberRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"projects", "grants", "members", "roles"}, "")) + + pattern_ManagementService_SearchProjectGrantMembers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 2, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "_search"}, "")) + + pattern_ManagementService_AddProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "grants", "grant_id", "members"}, "")) + + pattern_ManagementService_ChangeProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_RemoveProjectGrantMember_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "grants", "grant_id", "members", "user_id"}, "")) + + pattern_ManagementService_SearchUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"users", "grants", "_search"}, "")) + + pattern_ManagementService_UserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2}, []string{"users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projects", "project_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projects", "project_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projects", "project_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projects", "project_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchProjectGrantUserGrants_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 2, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "grants", "_search"}, "")) + + pattern_ManagementService_ProjectGrantUserGrantByID_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_CreateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants"}, "")) + + pattern_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id"}, "")) + + pattern_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_deactivate"}, "")) + + pattern_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 1, 0, 4, 1, 5, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 5, 2, 6}, []string{"projectgrants", "project_grant_id", "users", "user_id", "grants", "id", "_reactivate"}, "")) + + pattern_ManagementService_SearchAuthGrant_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"authgrants", "_search"}, "")) +) + +var ( + forward_ManagementService_Healthz_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Ready_0 = runtime.ForwardResponseMessage + + forward_ManagementService_Validate_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserByEmailGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUsers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_IsUserUnique_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_LockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UnlockUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeleteUser_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_OrgChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectChanges_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserProfile_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserEmail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendEmailVerificationMail_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeUserPhone_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ResendPhoneVerificationCode_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserAddress_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetUserMfas_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SendSetPasswordNotification_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SetInitialPassword_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordComplexityPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordAgePolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetPasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdatePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeletePasswordLockoutPolicy_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgByDomainGlobal_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateOrg_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetOrgMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveOrgMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchOrgMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjects_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProject_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetGrantedProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectRole_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchApplications_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ApplicationByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateOIDCApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateApplication_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateApplicationOIDCConfig_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RegenerateOIDCClientSecret_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_GetProjectGrantMemberRoles_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantMembers_0 = runtime.ForwardResponseMessage + + forward_ManagementService_AddProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ChangeProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_RemoveProjectGrantMember_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchProjectGrantUserGrants_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ProjectGrantUserGrantByID_0 = runtime.ForwardResponseMessage + + forward_ManagementService_CreateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_UpdateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_DeactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_ReactivateProjectGrantUserGrant_0 = runtime.ForwardResponseMessage + + forward_ManagementService_SearchAuthGrant_0 = runtime.ForwardResponseMessage +) diff --git a/pkg/management/api/grpc/management.swagger.json b/pkg/management/api/grpc/management.swagger.json new file mode 100644 index 0000000000..57adde4771 --- /dev/null +++ b/pkg/management/api/grpc/management.swagger.json @@ -0,0 +1,5657 @@ +{ + "swagger": "2.0", + "info": { + "title": "Management API", + "version": "0.1", + "contact": { + "url": "https://github.com/caos/zitadel/management" + } + }, + "schemes": [ + "https" + ], + "consumes": [ + "application/json", + "application/grpc" + ], + "produces": [ + "application/json", + "application/grpc" + ], + "paths": { + "/applications/{id}/changes": { + "get": { + "operationId": "ApplicationChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/authgrants/_search": { + "post": { + "summary": "Grant", + "operationId": "SearchAuthGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AuthGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/orgs/domain/{domain}": { + "get": { + "operationId": "GetOrgByDomainGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "domain", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/global/users/email/{email}": { + "get": { + "operationId": "GetUserByEmailGlobal", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "email", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/grants/{id}": { + "get": { + "summary": "GRANTED_PROJECT_GRANTS", + "operationId": "GetGrantedProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/healthz": { + "get": { + "summary": "READINESS", + "operationId": "Healthz", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/members/roles": { + "get": { + "summary": "ORG_MEMBERS", + "operationId": "GetOrgMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}": { + "get": { + "summary": "ORG", + "operationId": "GetOrgByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_deactivate": { + "put": { + "operationId": "DeactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/_reactivate": { + "put": { + "operationId": "ReactivateOrg", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Org" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{id}/changes": { + "get": { + "operationId": "OrgChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members": { + "post": { + "operationId": "AddOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1AddOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/_search": { + "post": { + "operationId": "SearchOrgMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OrgMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/orgs/{org_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeOrgMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "org_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ChangeOrgMemberRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age": { + "get": { + "summary": "PASSWORD_AGE_POLICY", + "operationId": "GetPasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/age/{id}": { + "delete": { + "operationId": "DeletePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordAgePolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordAgePolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity": { + "get": { + "summary": "PASSWORD_COMPLEXITY_POLICY", + "operationId": "GetPasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/complexity/{id}": { + "delete": { + "operationId": "DeletePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordComplexityPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordComplexityPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout": { + "get": { + "summary": "PASSWORD_LOCKOUT_POLICY", + "operationId": "GetPasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "tags": [ + "ManagementService" + ] + }, + "post": { + "operationId": "CreatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/policies/passwords/lockout/{id}": { + "delete": { + "operationId": "DeletePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdatePasswordLockoutPolicy", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicy" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordLockoutPolicyUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_GRANT_USER_GRANT", + "operationId": "SearchProjectGrantUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrantUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects": { + "post": { + "operationId": "CreateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectCreateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/_search": { + "post": { + "summary": "PROJECTS", + "operationId": "SearchProjects", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/grants/members/roles": { + "get": { + "summary": "PROJECT_GRANT_MEMBER", + "operationId": "GetProjectGrantMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/members/roles": { + "get": { + "summary": "PROJECT_MEMBERS", + "operationId": "GetProjectMemberRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberRoles" + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}": { + "get": { + "operationId": "ProjectByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUpdateRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProject", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Project" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/changes": { + "get": { + "operationId": "ProjectChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members": { + "post": { + "operationId": "AddProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles": { + "post": { + "operationId": "AddProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{id}/roles/{name}": { + "delete": { + "operationId": "RemoveProjectRole", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "name", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/_search": { + "post": { + "summary": "APPLICATIONS", + "operationId": "SearchApplications", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ApplicationSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{application_id}/oidcconfig": { + "put": { + "operationId": "UpdateApplicationOIDCConfig", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "application_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCConfigUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}": { + "get": { + "operationId": "ApplicationByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_deactivate": { + "put": { + "operationId": "DeactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/_reactivate": { + "put": { + "operationId": "ReactivateApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret": { + "put": { + "operationId": "RegenerateOIDCClientSecret", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ClientSecret" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ApplicationID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants": { + "post": { + "operationId": "CreateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/_search": { + "post": { + "summary": "PROJECT_GRANT", + "operationId": "SearchProjectGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members": { + "post": { + "operationId": "AddProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberAdd" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/_search": { + "post": { + "operationId": "SearchProjectGrantMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{grant_id}/members/{user_id}": { + "delete": { + "operationId": "RemoveProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeProjectGrantMember", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "grant_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantMemberChange" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}": { + "get": { + "operationId": "ProjectGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/members/_search": { + "post": { + "operationId": "SearchProjectMembers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectMemberSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/oidcapplications": { + "post": { + "operationId": "CreateOIDCApplication", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Application" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1OIDCApplicationCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/roles/_search": { + "post": { + "summary": "PROJECT_ROLES", + "operationId": "SearchProjectRoles", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectRoleSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/grants/_search": { + "post": { + "summary": "PROJECT_USER_GRANT", + "operationId": "SearchProjectUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants": { + "post": { + "operationId": "CreateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}": { + "get": { + "operationId": "ProjectUserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateProjectUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "project_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ProjectUserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/ready": { + "get": { + "operationId": "Ready", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "tags": [ + "ManagementService" + ] + } + }, + "/users": { + "post": { + "operationId": "CreateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateUserRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_isunique": { + "get": { + "operationId": "IsUserUnique", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UniqueUserResponse" + } + } + }, + "parameters": [ + { + "name": "user_name", + "in": "query", + "required": false, + "type": "string" + }, + { + "name": "email", + "in": "query", + "required": false, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/_search": { + "post": { + "operationId": "SearchUsers", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/grants/_search": { + "post": { + "summary": "USER_GRANT", + "operationId": "SearchUserGrants", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrantSearchResponse" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantSearchRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}": { + "get": { + "summary": "USER", + "operationId": "GetUserByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "delete": { + "operationId": "DeleteUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_lock": { + "put": { + "operationId": "LockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_sendsetpwnotify": { + "post": { + "summary": "PASSWORD\nSends an Notification (Email/SMS) with a password reset Link", + "operationId": "SendSetPasswordNotification", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1SetPasswordNotificationRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_setinitialpw": { + "post": { + "summary": "A Manager is only allowed to set an initial password, on the next login the user has to change his password", + "operationId": "SetInitialPassword", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1PasswordRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/_unlock": { + "put": { + "operationId": "UnlockUser", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1User" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/address": { + "get": { + "summary": "USER_ADDRESS", + "operationId": "GetUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserAddress", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserAddress" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserAddressRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/changes": { + "get": { + "operationId": "UserChanges", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1Changes" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "limit", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + }, + { + "name": "sequence_offset", + "in": "query", + "required": false, + "type": "string", + "format": "uint64" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email": { + "get": { + "summary": "USER_EMAIL", + "operationId": "GetUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserEmail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserEmail" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserEmailRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/email/_resendverification": { + "post": { + "operationId": "ResendEmailVerificationMail", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/mfas": { + "get": { + "summary": "MFA", + "operationId": "GetUserMfas", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1MultiFactors" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone": { + "get": { + "summary": "USER_PHONE", + "operationId": "GetUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "ChangeUserPhone", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserPhone" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserPhoneRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/phone/_resendverification": { + "post": { + "operationId": "ResendPhoneVerificationCode", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "properties": {} + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{id}/profile": { + "get": { + "summary": "USER_PROFILE", + "operationId": "GetUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserProfile", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserProfile" + } + } + }, + "parameters": [ + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UpdateUserProfileRequest" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants": { + "post": { + "operationId": "CreateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantCreate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}": { + "get": { + "operationId": "UserGrantByID", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + } + ], + "tags": [ + "ManagementService" + ] + }, + "put": { + "operationId": "UpdateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantUpdate" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_deactivate": { + "put": { + "operationId": "DeactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/users/{user_id}/grants/{id}/_reactivate": { + "put": { + "operationId": "ReactivateUserGrant", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1UserGrant" + } + } + }, + "parameters": [ + { + "name": "user_id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "id", + "in": "path", + "required": true, + "type": "string" + }, + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1UserGrantID" + } + } + ], + "tags": [ + "ManagementService" + ] + } + }, + "/validate": { + "get": { + "operationId": "Validate", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "tags": [ + "ManagementService" + ] + } + } + }, + "definitions": { + "protobufListValue": { + "type": "object", + "properties": { + "values": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Repeated field of dynamically typed values." + } + }, + "description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array." + }, + "protobufNullValue": { + "type": "string", + "enum": [ + "NULL_VALUE" + ], + "default": "NULL_VALUE", + "description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value." + }, + "protobufStruct": { + "type": "object", + "properties": { + "fields": { + "type": "object", + "additionalProperties": { + "$ref": "#/definitions/protobufValue" + }, + "description": "Unordered map of dynamically typed values." + } + }, + "description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object." + }, + "protobufValue": { + "type": "object", + "properties": { + "null_value": { + "$ref": "#/definitions/protobufNullValue", + "description": "Represents a null value." + }, + "number_value": { + "type": "number", + "format": "double", + "description": "Represents a double value." + }, + "string_value": { + "type": "string", + "description": "Represents a string value." + }, + "bool_value": { + "type": "boolean", + "format": "boolean", + "description": "Represents a boolean value." + }, + "struct_value": { + "$ref": "#/definitions/protobufStruct", + "description": "Represents a structured value." + }, + "list_value": { + "$ref": "#/definitions/protobufListValue", + "description": "Represents a repeated `Value`." + } + }, + "description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value." + }, + "v1AddOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AppState": { + "type": "string", + "enum": [ + "APPSTATE_UNSPECIFIED", + "APPSTATE_ACTIVE", + "APPSTATE_INACTIVE" + ], + "default": "APPSTATE_UNSPECIFIED" + }, + "v1Application": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1AppState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "oidc_config": { + "$ref": "#/definitions/v1OIDCConfig" + } + } + }, + "v1ApplicationID": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + } + } + }, + "v1ApplicationSearchKey": { + "type": "string", + "enum": [ + "APPLICATIONSERACHKEY_UNSPECIFIED", + "APPLICATIONSEARCHKEY_APP_NAME" + ], + "default": "APPLICATIONSERACHKEY_UNSPECIFIED" + }, + "v1ApplicationSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ApplicationSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ApplicationSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApplicationSearchQuery" + } + } + } + }, + "v1ApplicationSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Application" + } + } + } + }, + "v1ApplicationUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1AuthGrant": { + "type": "object", + "properties": { + "orgId": { + "type": "string" + }, + "projectId": { + "type": "string" + }, + "userId": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1AuthGrantSearchKey": { + "type": "string", + "enum": [ + "AUTHGRANTSEARCHKEY_UNSPECIFIED", + "AUTHGRANTSEARCHKEY_ORG_ID", + "AUTHGRANTSEARCHKEY_PROJECT_ID", + "AUTHGRANTSEARCHKEY_USER_ID" + ], + "default": "AUTHGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1AuthGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1AuthGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1AuthGrantSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrantSearchQuery" + } + } + } + }, + "v1AuthGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1AuthGrant" + } + } + } + }, + "v1Change": { + "type": "object", + "properties": { + "change_date": { + "type": "string", + "format": "date-time" + }, + "event_type": { + "type": "string" + }, + "sequence": { + "type": "string", + "format": "uint64" + }, + "modifier": { + "type": "string" + }, + "data": { + "$ref": "#/definitions/protobufStruct" + } + } + }, + "v1ChangeOrgMemberRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1Changes": { + "type": "object", + "properties": { + "changes": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Change" + } + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ClientSecret": { + "type": "object", + "properties": { + "client_secret": { + "type": "string" + } + } + }, + "v1CreateUserRequest": { + "type": "object", + "properties": { + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1Gender": { + "type": "string", + "enum": [ + "GENDER_UNSPECIFIED", + "GENDER_FEMALE", + "GENDER_MALE", + "GENDER_DIVERSE" + ], + "default": "GENDER_UNSPECIFIED" + }, + "v1MFAState": { + "type": "string", + "enum": [ + "MFASTATE_UNSPECIFIED", + "MFASTATE_NOT_READY", + "MFASTATE_READY", + "MFASTATE_REMOVED" + ], + "default": "MFASTATE_UNSPECIFIED" + }, + "v1MfaType": { + "type": "string", + "enum": [ + "MFATYPE_UNSPECIFIED", + "MFATYPE_SMS", + "MFATYPE_OTP" + ], + "default": "MFATYPE_UNSPECIFIED" + }, + "v1MultiFactor": { + "type": "object", + "properties": { + "type": { + "$ref": "#/definitions/v1MfaType" + }, + "state": { + "$ref": "#/definitions/v1MFAState" + } + } + }, + "v1MultiFactors": { + "type": "object", + "properties": { + "mfas": { + "type": "array", + "items": { + "$ref": "#/definitions/v1MultiFactor" + } + } + } + }, + "v1NotificationType": { + "type": "string", + "enum": [ + "NOTIFICATIONTYPE_EMAIL", + "NOTIFICATIONTYPE_SMS" + ], + "default": "NOTIFICATIONTYPE_EMAIL" + }, + "v1OIDCApplicationCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCApplicationType": { + "type": "string", + "enum": [ + "OIDCAPPLICATIONTYPE_WEB", + "OIDCAPPLICATIONTYPE_USER_AGENT", + "OIDCAPPLICATIONTYPE_NATIVE" + ], + "default": "OIDCAPPLICATIONTYPE_WEB" + }, + "v1OIDCAuthMethodType": { + "type": "string", + "enum": [ + "OIDCAUTHMETHODTYPE_BASIC", + "OIDCAUTHMETHODTYPE_POST", + "OIDCAUTHMETHODTYPE_NONE" + ], + "default": "OIDCAUTHMETHODTYPE_BASIC" + }, + "v1OIDCConfig": { + "type": "object", + "properties": { + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "client_id": { + "type": "string" + }, + "client_secret": { + "type": "string" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCConfigUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "application_id": { + "type": "string" + }, + "redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + }, + "response_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCResponseType" + } + }, + "grant_types": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OIDCGrantType" + } + }, + "application_type": { + "$ref": "#/definitions/v1OIDCApplicationType" + }, + "auth_method_type": { + "$ref": "#/definitions/v1OIDCAuthMethodType" + }, + "post_logout_redirect_uris": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OIDCGrantType": { + "type": "string", + "enum": [ + "OIDCGRANTTYPE_AUTHORIZATION_CODE", + "OIDCGRANTTYPE_IMPLICIT", + "OIDCGRANTTYPE_REFRESH_TOKEN" + ], + "default": "OIDCGRANTTYPE_AUTHORIZATION_CODE" + }, + "v1OIDCResponseType": { + "type": "string", + "enum": [ + "OIDCRESPONSETYPE_CODE", + "OIDCRESPONSETYPE_ID_TOKEN", + "OIDCRESPONSETYPE_TOKEN_ID_TOKEN" + ], + "default": "OIDCRESPONSETYPE_CODE" + }, + "v1Org": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1OrgState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "name": { + "type": "string" + }, + "domain": { + "type": "string" + } + } + }, + "v1OrgID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1OrgMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1OrgMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1OrgMemberSearchKey": { + "type": "string", + "enum": [ + "ORGMEMBERSEARCHKEY_UNSPECIFIED", + "ORGMEMBERSEARCHKEY_FIRST_NAME", + "ORGMEMBERSEARCHKEY_LAST_NAME", + "ORGMEMBERSEARCHKEY_EMAIL", + "ORGMEMBERSEARCHKEY_USER_ID" + ], + "default": "ORGMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1OrgMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1OrgMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1OrgMemberSearchRequest": { + "type": "object", + "properties": { + "org_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMemberSearchQuery" + } + } + } + }, + "v1OrgMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1OrgMember" + } + } + } + }, + "v1OrgState": { + "type": "string", + "enum": [ + "ORGSTATE_UNSPECIFIED", + "ORGSTATE_ACTIVE", + "ORGSTATE_INACTIVE" + ], + "default": "ORGSTATE_UNSPECIFIED" + }, + "v1PasswordAgePolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordAgePolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_age_days": { + "type": "string", + "format": "uint64" + }, + "expire_warn_days": { + "type": "string", + "format": "uint64" + } + } + }, + "v1PasswordComplexityPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordComplexityPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "min_length": { + "type": "string", + "format": "uint64" + }, + "has_lowercase": { + "type": "boolean", + "format": "boolean" + }, + "has_uppercase": { + "type": "boolean", + "format": "boolean" + }, + "has_number": { + "type": "boolean", + "format": "boolean" + }, + "has_symbol": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicy": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1PolicyState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyCreate": { + "type": "object", + "properties": { + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordLockoutPolicyUpdate": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "description": { + "type": "string" + }, + "max_attempts": { + "type": "string", + "format": "uint64" + }, + "show_lock_out_failures": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1PasswordRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "password": { + "type": "string" + } + } + }, + "v1PolicyState": { + "type": "string", + "enum": [ + "POLICYSTATE_UNSPECIFIED", + "POLICYSTATE_ACTIVE", + "POLICYSTATE_INACTIVE", + "POLICYSTATE_DELETED" + ], + "default": "POLICYSTATE_UNSPECIFIED" + }, + "v1Project": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1ProjectState" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "type": { + "$ref": "#/definitions/v1ProjectType" + }, + "resource_owner": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "grant_id": { + "type": "string" + } + } + }, + "v1ProjectCreateRequest": { + "type": "object", + "properties": { + "name": { + "type": "string" + } + } + }, + "v1ProjectGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "granted_org_name": { + "type": "string" + }, + "granted_org_domain": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1ProjectGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "project_name": { + "type": "string" + } + } + }, + "v1ProjectGrantCreate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "granted_org_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectGrantMemberAdd": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberChange": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTGRANTMEMBERSEARCHKEY_EMAIL", + "PROJECTGRANTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectGrantMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectGrantMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMemberSearchQuery" + } + } + } + }, + "v1ProjectGrantMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrantMember" + } + } + } + }, + "v1ProjectGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + } + } + }, + "v1ProjectGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectGrant" + } + } + } + }, + "v1ProjectGrantState": { + "type": "string", + "enum": [ + "PROJECTGRANTSTATE_UNSPECIFIED", + "PROJECTGRANTSTATE_ACTIVE", + "PROJECTGRANTSTATE_INACTIVE" + ], + "default": "PROJECTGRANTSTATE_UNSPECIFIED" + }, + "v1ProjectGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_grant_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectGrantUserGrantID": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectGrantUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectGrantUserGrantUpdate": { + "type": "object", + "properties": { + "project_grant_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1ProjectMember": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "user_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "creation_date": { + "type": "string", + "format": "date-time" + } + } + }, + "v1ProjectMemberAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberChange": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberRoles": { + "type": "object", + "properties": { + "roles": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1ProjectMemberSearchKey": { + "type": "string", + "enum": [ + "PROJECTMEMBERSEARCHKEY_UNSPECIFIED", + "PROJECTMEMBERSEARCHKEY_FIRST_NAME", + "PROJECTMEMBERSEARCHKEY_LAST_NAME", + "PROJECTMEMBERSEARCHKEY_EMAIL", + "PROJECTMEMBERSEARCHKEY_USER_ID" + ], + "default": "PROJECTMEMBERSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectMemberSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectMemberSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectMemberSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMemberSearchQuery" + } + } + } + }, + "v1ProjectMemberSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectMember" + } + } + } + }, + "v1ProjectRole": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleAdd": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "group": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchKey": { + "type": "string", + "enum": [ + "PROJECTROLESEARCHKEY_UNSPECIFIED", + "PROJECTROLESEARCHKEY_NAME", + "PROJECTROLESEARCHKEY_DISPLAY_NAME" + ], + "default": "PROJECTROLESEARCHKEY_UNSPECIFIED" + }, + "v1ProjectRoleSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectRoleSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectRoleSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRoleSearchQuery" + } + } + } + }, + "v1ProjectRoleSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectRole" + } + } + } + }, + "v1ProjectSearchKey": { + "type": "string", + "enum": [ + "PROJECTSEARCHKEY_UNSPECIFIED", + "PROJECTSEARCHKEY_PROJECT_NAME" + ], + "default": "PROJECTSEARCHKEY_UNSPECIFIED" + }, + "v1ProjectSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1ProjectSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1ProjectSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ProjectSearchQuery" + } + } + } + }, + "v1ProjectSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1Project" + } + } + } + }, + "v1ProjectState": { + "type": "string", + "enum": [ + "PROJECTSTATE_UNSPECIFIED", + "PROJECTSTATE_ACTIVE", + "PROJECTSSTATE_INACTIVE" + ], + "default": "PROJECTSTATE_UNSPECIFIED" + }, + "v1ProjectType": { + "type": "string", + "enum": [ + "PROJECTTYPE_UNKNOWN", + "PROJECTTYPE_SELF", + "PROJECTTYPE_GRANTED" + ], + "default": "PROJECTTYPE_UNKNOWN" + }, + "v1ProjectUpdateRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + } + } + }, + "v1ProjectUserGrantID": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1ProjectUserGrantSearchRequest": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1ProjectUserGrantUpdate": { + "type": "object", + "properties": { + "project_id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1SearchMethod": { + "type": "string", + "enum": [ + "SEARCHMETHOD_EQUALS", + "SEARCHMETHOD_STARTS_WITH", + "SEARCHMETHOD_CONTAINS" + ], + "default": "SEARCHMETHOD_EQUALS" + }, + "v1SetPasswordNotificationRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "type": { + "$ref": "#/definitions/v1NotificationType" + } + } + }, + "v1UniqueUserResponse": { + "type": "object", + "properties": { + "is_unique": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserAddressRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UpdateUserEmailRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserPhoneRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UpdateUserProfileRequest": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + } + } + }, + "v1User": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "last_login": { + "type": "string", + "format": "date-time" + }, + "password_changed": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserAddress": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "country": { + "type": "string" + }, + "locality": { + "type": "string" + }, + "postal_code": { + "type": "string" + }, + "region": { + "type": "string" + }, + "street_address": { + "type": "string" + } + } + }, + "v1UserEmail": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "email": { + "type": "string" + }, + "is_email_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserGrant": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + }, + "state": { + "$ref": "#/definitions/v1UserGrantState" + }, + "creation_date": { + "type": "string", + "format": "date-time" + }, + "change_date": { + "type": "string", + "format": "date-time" + }, + "user_name": { + "type": "string" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "email": { + "type": "string" + }, + "org_name": { + "type": "string" + }, + "org_domain": { + "type": "string" + }, + "project_name": { + "type": "string" + } + } + }, + "v1UserGrantCreate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "org_id": { + "type": "string" + }, + "project_id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserGrantID": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + } + } + }, + "v1UserGrantSearchKey": { + "type": "string", + "enum": [ + "USERGRANTSEARCHKEY_UNSPECIFIED", + "USERGRANTSEARCHKEY_PROJECT_ID", + "USERGRANTSEARCHKEY_USER_ID", + "USERGRANTSEARCHKEY_ORG_ID" + ], + "default": "USERGRANTSEARCHKEY_UNSPECIFIED" + }, + "v1UserGrantSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserGrantSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserGrantSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrantSearchQuery" + } + } + } + }, + "v1UserGrantSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserGrant" + } + } + } + }, + "v1UserGrantState": { + "type": "string", + "enum": [ + "USERGRANTSTATE_UNSPECIFIED", + "USERGRANTSTATE_ACTIVE", + "USERGRANTSTATE_INACTIVE" + ], + "default": "USERGRANTSTATE_UNSPECIFIED" + }, + "v1UserGrantUpdate": { + "type": "object", + "properties": { + "user_id": { + "type": "string" + }, + "id": { + "type": "string" + }, + "role_names": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "v1UserID": { + "type": "object", + "properties": { + "id": { + "type": "string" + } + } + }, + "v1UserPhone": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "phone": { + "type": "string" + }, + "is_phone_verified": { + "type": "boolean", + "format": "boolean" + } + } + }, + "v1UserProfile": { + "type": "object", + "properties": { + "id": { + "type": "string" + }, + "state": { + "$ref": "#/definitions/v1UserState" + }, + "first_name": { + "type": "string" + }, + "last_name": { + "type": "string" + }, + "nick_name": { + "type": "string" + }, + "display_name": { + "type": "string" + }, + "preferred_language": { + "type": "string" + }, + "gender": { + "$ref": "#/definitions/v1Gender" + }, + "user_name": { + "type": "string" + } + } + }, + "v1UserSearchKey": { + "type": "string", + "enum": [ + "USERSEARCHKEY_UNSPECIFIED", + "USERSEARCHKEY_USER_NAME", + "USERSEARCHKEY_FIRST_NAME", + "USERSEARCHKEY_LAST_NAME", + "USERSEARCHKEY_NICK_NAME", + "USERSEARCHKEY_DISPLAY_NAME", + "USERSEARCHKEY_EMAIL", + "USERSEARCHKEY_STATE" + ], + "default": "USERSEARCHKEY_UNSPECIFIED" + }, + "v1UserSearchQuery": { + "type": "object", + "properties": { + "key": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "method": { + "$ref": "#/definitions/v1SearchMethod" + }, + "value": { + "type": "string" + } + } + }, + "v1UserSearchRequest": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "sorting_column": { + "$ref": "#/definitions/v1UserSearchKey" + }, + "asc": { + "type": "boolean", + "format": "boolean" + }, + "queries": { + "type": "array", + "items": { + "$ref": "#/definitions/v1UserSearchQuery" + } + } + } + }, + "v1UserSearchResponse": { + "type": "object", + "properties": { + "offset": { + "type": "string", + "format": "uint64" + }, + "limit": { + "type": "string", + "format": "uint64" + }, + "total_result": { + "type": "string", + "format": "uint64" + }, + "result": { + "type": "array", + "items": { + "$ref": "#/definitions/v1User" + } + } + } + }, + "v1UserState": { + "type": "string", + "enum": [ + "USERSTATE_UNSPECIFIED", + "USERSTATE_ACTIVE", + "USERSTATE_INACTIVE", + "USERSTATE_DELETED", + "USERSTATE_LOCKED", + "USERSTATE_SUSPEND", + "USERSTATE_INITIAL" + ], + "default": "USERSTATE_UNSPECIFIED" + } + } +} diff --git a/pkg/management/api/proto/management.proto b/pkg/management/api/proto/management.proto index b9d3854c99..8fe7c857e4 100644 --- a/pkg/management/api/proto/management.proto +++ b/pkg/management/api/proto/management.proto @@ -11,14 +11,14 @@ import "authoption/options.proto"; package caos.zitadel.management.api.v1; -option go_package = "github.com/caos/zitadel/management/api/grpc"; +option go_package = "github.com/caos/zitadel/pkg/management/api/grpc"; option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = { info: { title: "Management API"; version: "0.1"; contact:{ - url: "https://github.com/caos/zitadel/management" + url: "https://github.com/caos/zitadel/pkg/management" }; };