mirror of
https://github.com/zitadel/zitadel.git
synced 2025-01-10 04:03:39 +00:00
effc2c23c2
* fix: query tests * fix: use prepare funcs * fix: go mod * fix: generate files * fix(eventstore): tests * fix(eventstore): rename modifier to editor * fix(migrations): add cluster migration, fix(migrations): fix typo of host in clean clsuter * fix(eventstore): move health * fix(eventstore): AggregateTypeFilter aggregateType as param * code quality * fix: go tests * feat: add member funcs * feat: add member model * feat: add member events * feat: add member repo model * fix: better error func testing * fix: project member funcs * fix: add tests * fix: add tests * feat: implement member requests * fix: merge master * fix: merge master * fix: read existing in project repo * fix: fix tests * feat: add internal cache * feat: add cache mock * fix: return values of cache mock * feat: add project role * fix: add cache config * fix: add role to eventstore * fix: use eventstore sdk * fix: use eventstore sdk * fix: add project role grpc requests * fix: fix getby id * fix: changes for mr * fix: change value to interface * feat: add app event creations * fix: searchmethods * Update internal/project/model/project_member.go Co-Authored-By: Silvan <silvan.reusser@gmail.com> * fix: use get project func * fix: append events * fix: check if value is string on equal ignore case * fix: add changes test * fix: add go mod * fix: add some tests * fix: return err not nil * fix: return err not nil * fix: add aggregate funcs and tests * fix: add oidc aggregate funcs and tests * fix: add oidc * fix: add some tests * fix: tests * feat: eventstore repository * fix: remove gorm * version * feat: pkg * feat: eventstore without eventstore-lib * rename files * gnueg * fix: global model * feat: add global view functions * feat(eventstore): sdk * fix(eventstore): rename app to eventstore * delete empty test * fix(models): delete unused struct * feat(eventstore): overwrite context data * fix: use global sql config * fix: oidc validation * fix: generate client secret * fix: generate client id * fix: test change app * fix: deactivate/reactivate application * fix: change oidc config * fix: change oidc config secret * begin models * begin repo * fix: implement grpc app funcs * fix: add application requests * fix: converter * fix: converter * fix: converter and generate clientid * fix: tests * feat: project grant aggregate * feat: project grant * fix: project grant check if role existing * fix: project grant requests * fix: project grant fixes * fix: project grant member model * fix: project grant member aggregate * fix: project grant member eventstore * fix: project grant member requests * feat: user model * begin repo * repo models and more * feat: user command side * lots of functions * user command side * profile requests * commit before rebase on user * save * local config with gopass and more * begin new auth command (user centric) * Update internal/user/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/user_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/eventstore_mock_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * changes from mr review * save files into basedir * changes from mr review * changes from mr review * move to auth request * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * changes requested on mr * fix generate codes * fix return if no events * password code * email verification step * more steps * lot of mfa * begin tests * more next steps * auth api * auth api (user) * auth api (user) * auth api (user) * differ requests * merge * tests * fix compilation error * mock for id generator * Update internal/user/repository/eventsourcing/model/password.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * requests of mr * check email * begin separation of command and query * otp * change packages * some cleanup and fixes * tests for auth request / next steps * add VerificationLifetimes to config and make it run * tests * fix code challenge validation * cleanup * fix merge * begin view * repackaging tests and configs * fix startup config for auth * add migration * add PromptSelectAccount * fix copy / paste * remove user_agent files * fixes * fix sequences in user_session * token commands * token queries and signout * fix * fix set password test * add token handler and table * handle session init * add session state * add user view test cases * change VerifyMyMfaOTP * some fixes * fix user repo in auth api * cleanup * add user session view test * fix merge * fixes * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * extract method usersForUserSelection * add todo for policy check * id on auth req * fix enum name Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com> Co-authored-by: adlerhurst <silvan.reusser@gmail.com> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
523 lines
12 KiB
Protocol Buffer
523 lines
12 KiB
Protocol Buffer
syntax = "proto3";
|
|
|
|
import "google/api/annotations.proto";
|
|
import "google/protobuf/empty.proto";
|
|
import "google/protobuf/struct.proto";
|
|
import "google/protobuf/timestamp.proto";
|
|
import "validate/validate.proto";
|
|
import "protoc-gen-swagger/options/annotations.proto";
|
|
import "authoption/options.proto";
|
|
|
|
package zitadel.auth.api.v1;
|
|
|
|
option go_package = "github.com/caos/zitadel/pkg/auth/api/grpc";
|
|
|
|
option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = {
|
|
info: {
|
|
title: "Auth API";
|
|
version: "0.1";
|
|
contact:{
|
|
url: "https://github.com/caos/zitadel/pkg/auth"
|
|
};
|
|
};
|
|
|
|
schemes: HTTPS;
|
|
|
|
consumes: "application/json";
|
|
consumes: "application/grpc";
|
|
|
|
produces: "application/json";
|
|
produces: "application/grpc";
|
|
};
|
|
|
|
service AuthService {
|
|
// Readiness
|
|
rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
get: "/healthz"
|
|
};
|
|
}
|
|
|
|
rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
get: "/ready"
|
|
};
|
|
}
|
|
|
|
rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) {
|
|
option (google.api.http) = {
|
|
get: "/validate"
|
|
};
|
|
}
|
|
|
|
// Authorization
|
|
rpc GetMyUserSessions(google.protobuf.Empty) returns (UserSessionViews) {
|
|
option (google.api.http) = {
|
|
get: "/me/usersessions"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
//User
|
|
rpc GetMyUserProfile(google.protobuf.Empty) returns (UserProfile) {
|
|
option (google.api.http) = {
|
|
get: "/users/me/profile"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc UpdateMyUserProfile(UpdateUserProfileRequest) returns (UserProfile) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/profile"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc GetMyUserEmail(google.protobuf.Empty) returns (UserEmail) {
|
|
option (google.api.http) = {
|
|
get: "/users/me/email"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc ChangeMyUserEmail(UpdateUserEmailRequest) returns (UserEmail) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/email"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc VerifyMyUserEmail(VerifyMyUserEmailRequest) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
post: "/users/me/email/_verify"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc ResendMyEmailVerificationMail(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
post: "/users/me/email/_resendverification"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc GetMyUserPhone(google.protobuf.Empty) returns (UserPhone) {
|
|
option (google.api.http) = {
|
|
get: "/users/me/phone"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc ChangeMyUserPhone(UpdateUserPhoneRequest) returns (UserPhone) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/phone"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc VerifyMyUserPhone(VerifyUserPhoneRequest) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
post: "/users/me/phone/_verify"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc ResendMyPhoneVerificationCode(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
post: "/users/me/phone/_resendverification"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc GetMyUserAddress(google.protobuf.Empty) returns (UserAddress) {
|
|
option (google.api.http) = {
|
|
get: "/users/me/address"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc UpdateMyUserAddress(UpdateUserAddressRequest) returns (UserAddress) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/address"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc GetMyMfas(google.protobuf.Empty) returns (MultiFactors) {
|
|
option (google.api.http) = {
|
|
get: "/users/me/mfas"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
//Password
|
|
rpc ChangeMyPassword(PasswordChange) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/passwords/_change"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
// MFA
|
|
rpc AddMfaOTP(google.protobuf.Empty) returns (MfaOtpResponse) {
|
|
option (google.api.http) = {
|
|
post: "/users/me/mfa/otp"
|
|
body: "*"
|
|
};
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc VerifyMfaOTP(VerifyMfaOtp) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
put: "/users/me/mfa/otp/_verify"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc RemoveMfaOTP(google.protobuf.Empty) returns (google.protobuf.Empty) {
|
|
option (google.api.http) = {
|
|
delete: "/users/me/mfa/otp"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc SearchMyProjectOrgs(MyProjectOrgSearchRequest) returns (MyProjectOrgSearchResponse) {
|
|
option (google.api.http) = {
|
|
post: "/global/projectorgs/_search"
|
|
body: "*"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
rpc IsIamAdmin(google.protobuf.Empty) returns (IsAdminResponse) {
|
|
option (google.api.http) = {
|
|
get: "/global/_isiamadmin"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
|
|
//Permission
|
|
rpc GetMyZitadelPermissions(google.protobuf.Empty) returns (MyPermissions) {
|
|
option (google.api.http) = {
|
|
get: "/permissions/zitadel/me"
|
|
};
|
|
|
|
option (caos.zitadel.utils.v1.auth_option) = {
|
|
permission: "authenticated"
|
|
};
|
|
}
|
|
}
|
|
|
|
message UserSessionViews {
|
|
repeated UserSessionView user_sessions = 1;
|
|
}
|
|
message UserSessionView {
|
|
string id = 1;
|
|
string agent_id = 2;
|
|
UserSessionState auth_state = 3;
|
|
string user_id = 4;
|
|
string user_name = 5;
|
|
uint64 sequence = 6;
|
|
}
|
|
|
|
enum UserSessionState {
|
|
USERSESSIONSTATE_UNSPECIFIED = 0;
|
|
USERSESSIONSTATE_ACTIVE = 1;
|
|
USERSESSIONSTATE_TERMINATED = 2;
|
|
}
|
|
|
|
enum OIDCResponseType {
|
|
OIDCRESPONSETYPE_CODE = 0;
|
|
OIDCRESPONSETYPE_ID_TOKEN = 1;
|
|
OIDCRESPONSETYPE_ID_TOKEN_TOKEN = 2;
|
|
}
|
|
|
|
message User {
|
|
string id = 1;
|
|
UserState state = 2;
|
|
google.protobuf.Timestamp creation_date = 3;
|
|
google.protobuf.Timestamp activation_date = 4;
|
|
google.protobuf.Timestamp change_date = 5;
|
|
google.protobuf.Timestamp last_login = 6;
|
|
google.protobuf.Timestamp password_changed = 7;
|
|
string user_name = 8;
|
|
string first_name = 9;
|
|
string last_name = 10;
|
|
string nick_name = 11;
|
|
string display_name = 12;
|
|
string preferred_language = 13;
|
|
Gender gender = 14;
|
|
string email = 15;
|
|
bool is_email_verified = 16;
|
|
string phone = 17;
|
|
bool is_phone_verified = 18;
|
|
string country = 19;
|
|
string locality = 20;
|
|
string postal_code = 21;
|
|
string region = 22;
|
|
string street_address = 23;
|
|
bool password_change_required = 24;
|
|
uint64 sequence = 25;
|
|
}
|
|
|
|
enum UserState {
|
|
USERSTATE_UNSPECIEFIED = 0;
|
|
USERSTATE_ACTIVE = 1;
|
|
USERSTATE_INACTIVE = 2;
|
|
USERSTATE_DELETED = 3;
|
|
USERSTATE_LOCKED = 4;
|
|
USERSTATE_SUSPEND = 5;
|
|
USERSTATE_INITIAL = 6;
|
|
}
|
|
|
|
enum Gender {
|
|
GENDER_UNSPECIFIED = 0;
|
|
GENDER_FEMALE = 1;
|
|
GENDER_MALE = 2;
|
|
GENDER_DIVERSE = 3;
|
|
}
|
|
|
|
message UserProfile {
|
|
string id = 1;
|
|
string user_name = 2;
|
|
string first_name = 3;
|
|
string last_name = 4;
|
|
string nick_name = 5;
|
|
string display_name = 6;
|
|
string preferred_language = 7;
|
|
Gender gender = 8;
|
|
uint64 sequence = 9;
|
|
google.protobuf.Timestamp creation_date = 10;
|
|
google.protobuf.Timestamp change_date = 11;
|
|
}
|
|
|
|
message UpdateUserProfileRequest {
|
|
string first_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
string last_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
string nick_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
string display_name = 4 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
string preferred_language = 5 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
Gender gender = 6;
|
|
}
|
|
|
|
message UserEmail {
|
|
string id = 1;
|
|
string email = 2;
|
|
bool isEmailVerified = 3;
|
|
uint64 sequence = 4;
|
|
google.protobuf.Timestamp creation_date = 5;
|
|
google.protobuf.Timestamp change_date = 6;
|
|
}
|
|
|
|
message VerifyMyUserEmailRequest {
|
|
string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
}
|
|
|
|
message VerifyUserEmailRequest {
|
|
string id = 1;
|
|
string code = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
}
|
|
|
|
message UpdateUserEmailRequest {
|
|
string email = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
}
|
|
|
|
message UserPhone {
|
|
string id = 1;
|
|
string phone = 2;
|
|
bool is_phone_verified = 3;
|
|
uint64 sequence = 4;
|
|
google.protobuf.Timestamp creation_date = 5;
|
|
google.protobuf.Timestamp change_date = 6;
|
|
}
|
|
|
|
message UpdateUserPhoneRequest {
|
|
string phone = 1 [(validate.rules).string = {min_len: 1, max_len: 20}];
|
|
}
|
|
|
|
message VerifyUserPhoneRequest {
|
|
string code = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
|
|
}
|
|
|
|
message UserAddress {
|
|
string id = 1;
|
|
string country = 2;
|
|
string locality = 3;
|
|
string postal_code = 4;
|
|
string region = 5;
|
|
string street_address = 6;
|
|
uint64 sequence = 7;
|
|
google.protobuf.Timestamp creation_date = 8;
|
|
google.protobuf.Timestamp change_date = 9;
|
|
}
|
|
|
|
message UpdateUserAddressRequest {
|
|
string country = 1 [(validate.rules).string = {max_len: 200}];
|
|
string locality = 2 [(validate.rules).string = {max_len: 200}];
|
|
string postal_code = 3 [(validate.rules).string = {max_len: 200}];
|
|
string region = 4 [(validate.rules).string = {max_len: 200}];
|
|
string street_address = 5 [(validate.rules).string = {max_len: 200}];
|
|
}
|
|
|
|
message PasswordID {
|
|
string id = 1;
|
|
}
|
|
|
|
message PasswordRequest {
|
|
string password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
|
}
|
|
|
|
message PasswordChange {
|
|
string old_password = 1 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
|
string new_password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}];
|
|
}
|
|
|
|
enum MfaType {
|
|
MFATYPE_UNSPECIFIED = 0;
|
|
MFATYPE_SMS = 1;
|
|
MFATYPE_OTP = 2;
|
|
}
|
|
|
|
message VerifyMfaOtp {
|
|
string code = 1;
|
|
}
|
|
|
|
message MultiFactors {
|
|
repeated MultiFactor mfas = 1;
|
|
}
|
|
|
|
message MultiFactor {
|
|
MfaType type = 1;
|
|
MFAState state = 2;
|
|
}
|
|
|
|
message MfaOtpResponse {
|
|
string user_id = 1;
|
|
string url = 2;
|
|
string secret = 3;
|
|
MFAState state = 4;
|
|
}
|
|
|
|
enum MFAState {
|
|
MFASTATE_UNSPECIFIED = 0;
|
|
MFASTATE_NOT_READY = 1;
|
|
MFASTATE_READY = 2;
|
|
MFASTATE_REMOVED = 3;
|
|
}
|
|
|
|
message OIDCClientAuth {
|
|
string client_id = 1;
|
|
string client_secret = 2;
|
|
}
|
|
|
|
message MyProjectOrgSearchRequest {
|
|
uint64 offset = 1;
|
|
uint64 limit = 2;
|
|
bool asc = 4;
|
|
repeated MyProjectOrgSearchQuery queries = 5;
|
|
}
|
|
|
|
message MyProjectOrgSearchQuery {
|
|
MyProjectOrgSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];;
|
|
SearchMethod method = 2;
|
|
string value = 3;
|
|
}
|
|
|
|
enum MyProjectOrgSearchKey {
|
|
MYPROJECTORGSEARCHKEY_UNSPECIFIED = 0;
|
|
MYPROJECTORGSEARCHKEY_ORG_NAME = 1;
|
|
}
|
|
|
|
message MyProjectOrgSearchResponse {
|
|
uint64 offset = 1;
|
|
uint64 limit = 2;
|
|
uint64 total_result = 3;
|
|
repeated Org result = 4;
|
|
}
|
|
|
|
message IsAdminResponse {
|
|
bool is_admin = 1;
|
|
}
|
|
|
|
message Org {
|
|
string id = 1;
|
|
string name = 2;
|
|
}
|
|
|
|
message MyPermissions {
|
|
repeated string permissions = 1;
|
|
}
|
|
|
|
enum SearchMethod {
|
|
SEARCHMETHOD_EQUALS = 0;
|
|
SEARCHMETHOD_STARTS_WITH = 1;
|
|
SEARCHMETHOD_CONTAINS = 2;
|
|
} |