mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 03:24:26 +00:00
fix: new generated protos (#842)
This commit is contained in:
parent
265b491696
commit
f5a7a0a09f
@ -34,7 +34,7 @@ var AdminService_AuthMethods = authz.MethodMapping{
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIAMPolicy": authz.Option{
|
||||
"/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIamPolicy": authz.Option{
|
||||
Permission: "iam.policy.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
@ -44,12 +44,12 @@ var AdminService_AuthMethods = authz.MethodMapping{
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.zitadel.admin.api.v1.AdminService/GetOrgIAMPolicy": authz.Option{
|
||||
"/caos.zitadel.admin.api.v1.AdminService/GetOrgIamPolicy": authz.Option{
|
||||
Permission: "iam.policy.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.zitadel.admin.api.v1.AdminService/CreateOrgIAMPolicy": authz.Option{
|
||||
"/caos.zitadel.admin.api.v1.AdminService/CreateOrgIamPolicy": authz.Option{
|
||||
Permission: "iam.policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
@ -59,7 +59,7 @@ var AdminService_AuthMethods = authz.MethodMapping{
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIAMPolicy": authz.Option{
|
||||
"/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIamPolicy": authz.Option{
|
||||
Permission: "iam.policy.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
@ -2070,7 +2070,7 @@ func (x *OrgIamPolicy) ProtoReflect() protoreflect.Message {
|
||||
return mi.MessageOf(x)
|
||||
}
|
||||
|
||||
// Deprecated: Use OrgIAMPolicy.ProtoReflect.Descriptor instead.
|
||||
// Deprecated: Use OrgIamPolicy.ProtoReflect.Descriptor instead.
|
||||
func (*OrgIamPolicy) Descriptor() ([]byte, []int) {
|
||||
return file_admin_proto_rawDescGZIP(), []int{17}
|
||||
}
|
||||
@ -6720,7 +6720,7 @@ var file_admin_proto_goTypes = []interface{}{
|
||||
(*MachineResponse)(nil), // 26: caos.zitadel.admin.api.v1.MachineResponse
|
||||
(*MachineKeyResponse)(nil), // 27: caos.zitadel.admin.api.v1.MachineKeyResponse
|
||||
(*CreateOrgRequest)(nil), // 28: caos.zitadel.admin.api.v1.CreateOrgRequest
|
||||
(*OrgIamPolicy)(nil), // 29: caos.zitadel.admin.api.v1.OrgIAMPolicy
|
||||
(*OrgIamPolicy)(nil), // 29: caos.zitadel.admin.api.v1.OrgIamPolicy
|
||||
(*OrgIamPolicyView)(nil), // 30: caos.zitadel.admin.api.v1.OrgIamPolicyView
|
||||
(*OrgIamPolicyRequest)(nil), // 31: caos.zitadel.admin.api.v1.OrgIamPolicyRequest
|
||||
(*OrgIamPolicyID)(nil), // 32: caos.zitadel.admin.api.v1.OrgIamPolicyID
|
||||
@ -6797,8 +6797,8 @@ var file_admin_proto_depIdxs = []int32{
|
||||
5, // 23: caos.zitadel.admin.api.v1.MachineKeyResponse.type:type_name -> caos.zitadel.admin.api.v1.MachineKeyType
|
||||
75, // 24: caos.zitadel.admin.api.v1.MachineKeyResponse.creation_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 25: caos.zitadel.admin.api.v1.MachineKeyResponse.expiration_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 26: caos.zitadel.admin.api.v1.OrgIAMPolicy.creation_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 27: caos.zitadel.admin.api.v1.OrgIAMPolicy.change_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 26: caos.zitadel.admin.api.v1.OrgIamPolicy.creation_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 27: caos.zitadel.admin.api.v1.OrgIamPolicy.change_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 28: caos.zitadel.admin.api.v1.OrgIamPolicyView.creation_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 29: caos.zitadel.admin.api.v1.OrgIamPolicyView.change_date:type_name -> google.protobuf.Timestamp
|
||||
75, // 30: caos.zitadel.admin.api.v1.IamMember.change_date:type_name -> google.protobuf.Timestamp
|
||||
@ -6858,12 +6858,12 @@ var file_admin_proto_depIdxs = []int32{
|
||||
12, // 84: caos.zitadel.admin.api.v1.AdminService.GetOrgByID:input_type -> caos.zitadel.admin.api.v1.OrgID
|
||||
16, // 85: caos.zitadel.admin.api.v1.AdminService.SearchOrgs:input_type -> caos.zitadel.admin.api.v1.OrgSearchRequest
|
||||
19, // 86: caos.zitadel.admin.api.v1.AdminService.SetUpOrg:input_type -> caos.zitadel.admin.api.v1.OrgSetUpRequest
|
||||
76, // 87: caos.zitadel.admin.api.v1.AdminService.GetDefaultOrgIAMPolicy:input_type -> google.protobuf.Empty
|
||||
76, // 87: caos.zitadel.admin.api.v1.AdminService.GetDefaultOrgIamPolicy:input_type -> google.protobuf.Empty
|
||||
31, // 88: caos.zitadel.admin.api.v1.AdminService.UpdateDefaultOrgIamPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyRequest
|
||||
32, // 89: caos.zitadel.admin.api.v1.AdminService.GetOrgIAMPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyID
|
||||
31, // 90: caos.zitadel.admin.api.v1.AdminService.CreateOrgIAMPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyRequest
|
||||
32, // 89: caos.zitadel.admin.api.v1.AdminService.GetOrgIamPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyID
|
||||
31, // 90: caos.zitadel.admin.api.v1.AdminService.CreateOrgIamPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyRequest
|
||||
31, // 91: caos.zitadel.admin.api.v1.AdminService.UpdateOrgIamPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyRequest
|
||||
32, // 92: caos.zitadel.admin.api.v1.AdminService.RemoveOrgIAMPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyID
|
||||
32, // 92: caos.zitadel.admin.api.v1.AdminService.RemoveOrgIamPolicy:input_type -> caos.zitadel.admin.api.v1.OrgIamPolicyID
|
||||
76, // 93: caos.zitadel.admin.api.v1.AdminService.GetIamMemberRoles:input_type -> google.protobuf.Empty
|
||||
35, // 94: caos.zitadel.admin.api.v1.AdminService.AddIamMember:input_type -> caos.zitadel.admin.api.v1.AddIamMemberRequest
|
||||
36, // 95: caos.zitadel.admin.api.v1.AdminService.ChangeIamMember:input_type -> caos.zitadel.admin.api.v1.ChangeIamMemberRequest
|
||||
@ -6899,12 +6899,12 @@ var file_admin_proto_depIdxs = []int32{
|
||||
15, // 125: caos.zitadel.admin.api.v1.AdminService.GetOrgByID:output_type -> caos.zitadel.admin.api.v1.Org
|
||||
18, // 126: caos.zitadel.admin.api.v1.AdminService.SearchOrgs:output_type -> caos.zitadel.admin.api.v1.OrgSearchResponse
|
||||
20, // 127: caos.zitadel.admin.api.v1.AdminService.SetUpOrg:output_type -> caos.zitadel.admin.api.v1.OrgSetUpResponse
|
||||
30, // 128: caos.zitadel.admin.api.v1.AdminService.GetDefaultOrgIAMPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicyView
|
||||
29, // 129: caos.zitadel.admin.api.v1.AdminService.UpdateDefaultOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIAMPolicy
|
||||
30, // 130: caos.zitadel.admin.api.v1.AdminService.GetOrgIAMPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicyView
|
||||
29, // 131: caos.zitadel.admin.api.v1.AdminService.CreateOrgIAMPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIAMPolicy
|
||||
29, // 132: caos.zitadel.admin.api.v1.AdminService.UpdateOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIAMPolicy
|
||||
76, // 133: caos.zitadel.admin.api.v1.AdminService.RemoveOrgIAMPolicy:output_type -> google.protobuf.Empty
|
||||
30, // 128: caos.zitadel.admin.api.v1.AdminService.GetDefaultOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicyView
|
||||
29, // 129: caos.zitadel.admin.api.v1.AdminService.UpdateDefaultOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicy
|
||||
30, // 130: caos.zitadel.admin.api.v1.AdminService.GetOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicyView
|
||||
29, // 131: caos.zitadel.admin.api.v1.AdminService.CreateOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicy
|
||||
29, // 132: caos.zitadel.admin.api.v1.AdminService.UpdateOrgIamPolicy:output_type -> caos.zitadel.admin.api.v1.OrgIamPolicy
|
||||
76, // 133: caos.zitadel.admin.api.v1.AdminService.RemoveOrgIamPolicy:output_type -> google.protobuf.Empty
|
||||
33, // 134: caos.zitadel.admin.api.v1.AdminService.GetIamMemberRoles:output_type -> caos.zitadel.admin.api.v1.IamMemberRoles
|
||||
34, // 135: caos.zitadel.admin.api.v1.AdminService.AddIamMember:output_type -> caos.zitadel.admin.api.v1.IamMember
|
||||
34, // 136: caos.zitadel.admin.api.v1.AdminService.ChangeIamMember:output_type -> caos.zitadel.admin.api.v1.IamMember
|
||||
@ -7870,7 +7870,7 @@ func (c *adminServiceClient) SetUpOrg(ctx context.Context, in *OrgSetUpRequest,
|
||||
|
||||
func (c *adminServiceClient) GetDefaultOrgIamPolicy(ctx context.Context, in *empty.Empty, opts ...grpc.CallOption) (*OrgIamPolicyView, error) {
|
||||
out := new(OrgIamPolicyView)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIAMPolicy", in, out, opts...)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIamPolicy", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -7888,7 +7888,7 @@ func (c *adminServiceClient) UpdateDefaultOrgIamPolicy(ctx context.Context, in *
|
||||
|
||||
func (c *adminServiceClient) GetOrgIamPolicy(ctx context.Context, in *OrgIamPolicyID, opts ...grpc.CallOption) (*OrgIamPolicyView, error) {
|
||||
out := new(OrgIamPolicyView)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/GetOrgIAMPolicy", in, out, opts...)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/GetOrgIamPolicy", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -7897,7 +7897,7 @@ func (c *adminServiceClient) GetOrgIamPolicy(ctx context.Context, in *OrgIamPoli
|
||||
|
||||
func (c *adminServiceClient) CreateOrgIamPolicy(ctx context.Context, in *OrgIamPolicyRequest, opts ...grpc.CallOption) (*OrgIamPolicy, error) {
|
||||
out := new(OrgIamPolicy)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/CreateOrgIAMPolicy", in, out, opts...)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/CreateOrgIamPolicy", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -7915,7 +7915,7 @@ func (c *adminServiceClient) UpdateOrgIamPolicy(ctx context.Context, in *OrgIamP
|
||||
|
||||
func (c *adminServiceClient) RemoveOrgIamPolicy(ctx context.Context, in *OrgIamPolicyID, opts ...grpc.CallOption) (*empty.Empty, error) {
|
||||
out := new(empty.Empty)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIAMPolicy", in, out, opts...)
|
||||
err := c.cc.Invoke(ctx, "/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIamPolicy", in, out, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@ -8249,22 +8249,22 @@ func (*UnimplementedAdminServiceServer) SetUpOrg(context.Context, *OrgSetUpReque
|
||||
return nil, status.Errorf(codes.Unimplemented, "method SetUpOrg not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) GetDefaultOrgIamPolicy(context.Context, *empty.Empty) (*OrgIamPolicyView, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method GetDefaultOrgIAMPolicy not implemented")
|
||||
return nil, status.Errorf(codes.Unimplemented, "method GetDefaultOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) UpdateDefaultOrgIamPolicy(context.Context, *OrgIamPolicyRequest) (*OrgIamPolicy, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method UpdateDefaultOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) GetOrgIamPolicy(context.Context, *OrgIamPolicyID) (*OrgIamPolicyView, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method GetOrgIAMPolicy not implemented")
|
||||
return nil, status.Errorf(codes.Unimplemented, "method GetOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) CreateOrgIamPolicy(context.Context, *OrgIamPolicyRequest) (*OrgIamPolicy, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method CreateOrgIAMPolicy not implemented")
|
||||
return nil, status.Errorf(codes.Unimplemented, "method CreateOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) UpdateOrgIamPolicy(context.Context, *OrgIamPolicyRequest) (*OrgIamPolicy, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method UpdateOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) RemoveOrgIamPolicy(context.Context, *OrgIamPolicyID) (*empty.Empty, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method RemoveOrgIAMPolicy not implemented")
|
||||
return nil, status.Errorf(codes.Unimplemented, "method RemoveOrgIamPolicy not implemented")
|
||||
}
|
||||
func (*UnimplementedAdminServiceServer) GetIamMemberRoles(context.Context, *empty.Empty) (*IamMemberRoles, error) {
|
||||
return nil, status.Errorf(codes.Unimplemented, "method GetIamMemberRoles not implemented")
|
||||
@ -8491,7 +8491,7 @@ func _AdminService_GetDefaultOrgIamPolicy_Handler(srv interface{}, ctx context.C
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIAMPolicy",
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/GetDefaultOrgIamPolicy",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(AdminServiceServer).GetDefaultOrgIamPolicy(ctx, req.(*empty.Empty))
|
||||
@ -8527,7 +8527,7 @@ func _AdminService_GetOrgIamPolicy_Handler(srv interface{}, ctx context.Context,
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/GetOrgIAMPolicy",
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/GetOrgIamPolicy",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(AdminServiceServer).GetOrgIamPolicy(ctx, req.(*OrgIamPolicyID))
|
||||
@ -8545,7 +8545,7 @@ func _AdminService_CreateOrgIamPolicy_Handler(srv interface{}, ctx context.Conte
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/CreateOrgIAMPolicy",
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/CreateOrgIamPolicy",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(AdminServiceServer).CreateOrgIamPolicy(ctx, req.(*OrgIamPolicyRequest))
|
||||
@ -8581,7 +8581,7 @@ func _AdminService_RemoveOrgIamPolicy_Handler(srv interface{}, ctx context.Conte
|
||||
}
|
||||
info := &grpc.UnaryServerInfo{
|
||||
Server: srv,
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIAMPolicy",
|
||||
FullMethod: "/caos.zitadel.admin.api.v1.AdminService/RemoveOrgIamPolicy",
|
||||
}
|
||||
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||||
return srv.(AdminServiceServer).RemoveOrgIamPolicy(ctx, req.(*OrgIamPolicyID))
|
||||
@ -9126,7 +9126,7 @@ var _AdminService_serviceDesc = grpc.ServiceDesc{
|
||||
Handler: _AdminService_SetUpOrg_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "GetDefaultOrgIAMPolicy",
|
||||
MethodName: "GetDefaultOrgIamPolicy",
|
||||
Handler: _AdminService_GetDefaultOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
@ -9134,11 +9134,11 @@ var _AdminService_serviceDesc = grpc.ServiceDesc{
|
||||
Handler: _AdminService_UpdateDefaultOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "GetOrgIAMPolicy",
|
||||
MethodName: "GetOrgIamPolicy",
|
||||
Handler: _AdminService_GetOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "CreateOrgIAMPolicy",
|
||||
MethodName: "CreateOrgIamPolicy",
|
||||
Handler: _AdminService_CreateOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
@ -9146,7 +9146,7 @@ var _AdminService_serviceDesc = grpc.ServiceDesc{
|
||||
Handler: _AdminService_UpdateOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
MethodName: "RemoveOrgIAMPolicy",
|
||||
MethodName: "RemoveOrgIamPolicy",
|
||||
Handler: _AdminService_RemoveOrgIamPolicy_Handler,
|
||||
},
|
||||
{
|
||||
|
@ -1687,7 +1687,7 @@ var _ interface {
|
||||
ErrorName() string
|
||||
} = CreateOrgRequestValidationError{}
|
||||
|
||||
// Validate checks the field values on OrgIAMPolicy with the rules defined in
|
||||
// Validate checks the field values on OrgIamPolicy with the rules defined in
|
||||
// the proto definition for this message. If any rules are violated, an error
|
||||
// is returned.
|
||||
func (m *OrgIamPolicy) Validate() error {
|
||||
@ -1727,7 +1727,7 @@ func (m *OrgIamPolicy) Validate() error {
|
||||
}
|
||||
|
||||
// OrgIamPolicyValidationError is the validation error returned by
|
||||
// OrgIAMPolicy.Validate if the designated constraints aren't met.
|
||||
// OrgIamPolicy.Validate if the designated constraints aren't met.
|
||||
type OrgIamPolicyValidationError struct {
|
||||
field string
|
||||
reason string
|
||||
|
@ -137,24 +137,24 @@ func (mr *MockAdminServiceClientMockRecorder) CreateOidcIdp(arg0, arg1 interface
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateOidcIdp", reflect.TypeOf((*MockAdminServiceClient)(nil).CreateOidcIdp), varargs...)
|
||||
}
|
||||
|
||||
// CreateOrgIAMPolicy mocks base method
|
||||
// CreateOrgIamPolicy mocks base method
|
||||
func (m *MockAdminServiceClient) CreateOrgIamPolicy(arg0 context.Context, arg1 *admin.OrgIamPolicyRequest, arg2 ...grpc.CallOption) (*admin.OrgIamPolicy, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "CreateOrgIAMPolicy", varargs...)
|
||||
ret := m.ctrl.Call(m, "CreateOrgIamPolicy", varargs...)
|
||||
ret0, _ := ret[0].(*admin.OrgIamPolicy)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// CreateOrgIAMPolicy indicates an expected call of CreateOrgIAMPolicy
|
||||
// CreateOrgIamPolicy indicates an expected call of CreateOrgIamPolicy
|
||||
func (mr *MockAdminServiceClientMockRecorder) CreateOrgIamPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateOrgIAMPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).CreateOrgIamPolicy), varargs...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateOrgIamPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).CreateOrgIamPolicy), varargs...)
|
||||
}
|
||||
|
||||
// DeactivateIdpConfig mocks base method
|
||||
@ -217,24 +217,24 @@ func (mr *MockAdminServiceClientMockRecorder) GetDefaultLoginPolicyIdpProviders(
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetDefaultLoginPolicyIdpProviders", reflect.TypeOf((*MockAdminServiceClient)(nil).GetDefaultLoginPolicyIdpProviders), varargs...)
|
||||
}
|
||||
|
||||
// GetDefaultOrgIAMPolicy mocks base method
|
||||
// GetDefaultOrgIamPolicy mocks base method
|
||||
func (m *MockAdminServiceClient) GetDefaultOrgIamPolicy(arg0 context.Context, arg1 *emptypb.Empty, arg2 ...grpc.CallOption) (*admin.OrgIamPolicyView, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetDefaultOrgIAMPolicy", varargs...)
|
||||
ret := m.ctrl.Call(m, "GetDefaultOrgIamPolicy", varargs...)
|
||||
ret0, _ := ret[0].(*admin.OrgIamPolicyView)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetDefaultOrgIAMPolicy indicates an expected call of GetDefaultOrgIAMPolicy
|
||||
// GetDefaultOrgIamPolicy indicates an expected call of GetDefaultOrgIamPolicy
|
||||
func (mr *MockAdminServiceClientMockRecorder) GetDefaultOrgIamPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetDefaultOrgIAMPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).GetDefaultOrgIamPolicy), varargs...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetDefaultOrgIamPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).GetDefaultOrgIamPolicy), varargs...)
|
||||
}
|
||||
|
||||
// GetDefaultPasswordAgePolicy mocks base method
|
||||
@ -357,24 +357,24 @@ func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{},
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...)
|
||||
}
|
||||
|
||||
// GetOrgIAMPolicy mocks base method
|
||||
// GetOrgIamPolicy mocks base method
|
||||
func (m *MockAdminServiceClient) GetOrgIamPolicy(arg0 context.Context, arg1 *admin.OrgIamPolicyID, arg2 ...grpc.CallOption) (*admin.OrgIamPolicyView, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetOrgIAMPolicy", varargs...)
|
||||
ret := m.ctrl.Call(m, "GetOrgIamPolicy", varargs...)
|
||||
ret0, _ := ret[0].(*admin.OrgIamPolicyView)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetOrgIAMPolicy indicates an expected call of GetOrgIAMPolicy
|
||||
// GetOrgIamPolicy indicates an expected call of GetOrgIamPolicy
|
||||
func (mr *MockAdminServiceClientMockRecorder) GetOrgIamPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgIAMPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgIamPolicy), varargs...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgIamPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgIamPolicy), varargs...)
|
||||
}
|
||||
|
||||
// GetViews mocks base method
|
||||
@ -577,24 +577,24 @@ func (mr *MockAdminServiceClientMockRecorder) RemoveIdpProviderFromDefaultLoginP
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveIdpProviderFromDefaultLoginPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).RemoveIdpProviderFromDefaultLoginPolicy), varargs...)
|
||||
}
|
||||
|
||||
// RemoveOrgIAMPolicy mocks base method
|
||||
// RemoveOrgIamPolicy mocks base method
|
||||
func (m *MockAdminServiceClient) RemoveOrgIamPolicy(arg0 context.Context, arg1 *admin.OrgIamPolicyID, arg2 ...grpc.CallOption) (*emptypb.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "RemoveOrgIAMPolicy", varargs...)
|
||||
ret := m.ctrl.Call(m, "RemoveOrgIamPolicy", varargs...)
|
||||
ret0, _ := ret[0].(*emptypb.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// RemoveOrgIAMPolicy indicates an expected call of RemoveOrgIAMPolicy
|
||||
// RemoveOrgIamPolicy indicates an expected call of RemoveOrgIamPolicy
|
||||
func (mr *MockAdminServiceClientMockRecorder) RemoveOrgIamPolicy(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveOrgIAMPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).RemoveOrgIamPolicy), varargs...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveOrgIamPolicy", reflect.TypeOf((*MockAdminServiceClient)(nil).RemoveOrgIamPolicy), varargs...)
|
||||
}
|
||||
|
||||
// SearchIamMembers mocks base method
|
||||
|
Loading…
Reference in New Issue
Block a user