zitadel/pkg/management/api/proto/management.proto
Fabi bd33b54ac5
feat: project commands more requests (#47)
* feat: eventstore repository

* fix: remove gorm

* version

* feat: pkg

* feat: add some files for project

* feat: eventstore without eventstore-lib

* rename files

* gnueg

* fix: key json

* fix: add object

* fix: change imports

* fix: internal models

* fix: some imports

* fix: global model

* fix: add some functions on repo

* feat(eventstore): sdk

* fix(eventstore): search query

* fix(eventstore): rename app to eventstore

* delete empty test

* remove unused func

* merge master

* fix(eventstore): tests

* fix(models): delete unused struct

* fix: some funcitons

* feat(eventstore): implemented push events

* fix: move project eventstore to project package

* fix: change project eventstore funcs

* feat(eventstore): overwrite context data

* fix: change project eventstore

* fix: add project repo to mgmt server

* feat(types): SQL-config

* fix: commented code

* feat(eventstore): options to overwrite editor

* feat: auth interceptor and cockroach migrations

* fix: migrations

* fix: fix filter

* fix: not found on getbyid

* fix: add sequence

* fix: add some tests

* fix(eventstore): nullable sequence

* fix: add some tests

* merge

* fix: add some tests

* fix(migrations): correct statements for sequence

* fix: add some tests

* fix: add some tests

* fix: changes from mr

* Update internal/eventstore/models/field.go

Co-Authored-By: livio-a <livio.a@gmail.com>

* fix(eventstore): code quality

* fix: add types to aggregate/Event-types

* fix(eventstore): rename modifier* to editor*

* fix(eventstore): delete editor_org

* fix(migrations): remove editor_org field,
rename modifier_* to editor_*

* fix: generate files

* fix(eventstore): tests

* fix(eventstore): rename modifier to editor

* fix(migrations): add cluster migration,
fix(migrations): fix typo of host in clean clsuter

* fix(eventstore): move health

* fix(eventstore): AggregateTypeFilter aggregateType as param

* code quality

* feat: add member funcs

* feat: add member model

* feat: add member events

* feat: add member repo model

* fix: project member funcs

* fix: add tests

* fix: add tests

* feat: implement member requests

* fix: merge master

* fix: read existing in project repo

* fix: fix tests

* fix: use eventstore sdk

* Update internal/project/model/project_member.go

Co-Authored-By: Silvan <silvan.reusser@gmail.com>

* fix: use get project func

* fix: return err not nil

* fix: change error to caos err

Co-authored-by: adlerhurst <silvan.reusser@gmail.com>
Co-authored-by: livio-a <livio.a@gmail.com>
2020-04-15 17:11:42 +02:00

2182 lines
56 KiB
Protocol Buffer

syntax = "proto3";
import "google/api/annotations.proto";
import "google/protobuf/empty.proto";
import "google/protobuf/struct.proto";
import "google/protobuf/timestamp.proto";
import "protoc-gen-swagger/options/annotations.proto";
import "validate/validate.proto";
import "google/protobuf/descriptor.proto";
import "authoption/options.proto";
package caos.zitadel.management.api.v1;
option go_package = "github.com/caos/zitadel/pkg/management/api/grpc";
option (grpc.gateway.protoc_gen_swagger.options.openapiv2_swagger) = {
info: {
title: "Management API";
version: "0.1";
contact:{
url: "https://github.com/caos/zitadel/pkg/management"
};
};
schemes: HTTPS;
consumes: "application/json";
consumes: "application/grpc";
produces: "application/json";
produces: "application/grpc";
};
service ManagementService {
//READINESS
rpc Healthz(google.protobuf.Empty) returns (google.protobuf.Empty) {
option (google.api.http) = {
get: "/healthz"
};
}
rpc Ready(google.protobuf.Empty) returns (google.protobuf.Empty) {
option (google.api.http) = {
get: "/ready"
};
}
rpc Validate(google.protobuf.Empty) returns (google.protobuf.Struct) {
option (google.api.http) = {
get: "/validate"
};
}
//USER
rpc GetUserByID(UserID) returns (User) {
option (google.api.http) = {
get: "/users/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc GetUserByEmailGlobal(UserEmailID) returns (User) {
option (google.api.http) = {
get: "/global/users/email/{email}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc SearchUsers(UserSearchRequest) returns (UserSearchResponse) {
option (google.api.http) = {
post: "/users/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc IsUserUnique(UniqueUserRequest) returns (UniqueUserResponse) {
option (google.api.http) = {
get: "/users/_isunique"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc CreateUser(CreateUserRequest) returns (User) {
option (google.api.http) = {
post: "/users"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc DeactivateUser(UserID) returns (User) {
option (google.api.http) = {
put: "/users/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc ReactivateUser(UserID) returns (User) {
option (google.api.http) = {
put: "/users/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc LockUser(UserID) returns (User) {
option (google.api.http) = {
put: "/users/{id}/_lock"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc UnlockUser(UserID) returns (User) {
option (google.api.http) = {
put: "/users/{id}/_unlock"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc DeleteUser(UserID) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/users/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.delete"
};
}
rpc UserChanges(ChangeRequest) returns (Changes) {
option (google.api.http) = {
get: "/users/{id}/changes"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc ApplicationChanges(ChangeRequest) returns (Changes) {
option (google.api.http) = {
get: "/applications/{id}/changes"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
};
}
rpc OrgChanges(ChangeRequest) returns (Changes) {
option (google.api.http) = {
get: "/orgs/{id}/changes"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
rpc ProjectChanges(ChangeRequest) returns (Changes) {
option (google.api.http) = {
get: "/projects/{id}/changes"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
//USER_PROFILE
rpc GetUserProfile(UserID) returns (UserProfile) {
option (google.api.http) = {
get: "/users/{id}/profile"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc UpdateUserProfile(UpdateUserProfileRequest) returns (UserProfile) {
option (google.api.http) = {
put: "/users/{id}/profile"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
//USER_EMAIL
rpc GetUserEmail(UserID) returns (UserEmail) {
option (google.api.http) = {
get: "/users/{id}/email"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc ChangeUserEmail(UpdateUserEmailRequest) returns (UserEmail) {
option (google.api.http) = {
put: "/users/{id}/email"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc ResendEmailVerificationMail(UserID) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/users/{id}/email/_resendverification"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
//USER_PHONE
rpc GetUserPhone(UserID) returns (UserPhone) {
option (google.api.http) = {
get: "/users/{id}/phone"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc ChangeUserPhone(UpdateUserPhoneRequest) returns (UserPhone) {
option (google.api.http) = {
put: "/users/{id}/phone"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
rpc ResendPhoneVerificationCode(UserID) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/users/{id}/phone/_resendverification"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
//USER_ADDRESS
rpc GetUserAddress(UserID) returns (UserAddress) {
option (google.api.http) = {
get: "/users/{id}/address"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
rpc UpdateUserAddress(UpdateUserAddressRequest) returns (UserAddress) {
option (google.api.http) = {
put: "/users/{id}/address"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
//MFA
rpc GetUserMfas(UserID) returns (MultiFactors) {
option (google.api.http) = {
get: "/users/{id}/mfas"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.read"
};
}
//PASSWORD
// Sends an Notification (Email/SMS) with a password reset Link
rpc SendSetPasswordNotification(SetPasswordNotificationRequest) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/users/{id}/_sendsetpwnotify"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
// A Manager is only allowed to set an initial password, on the next login the user has to change his password
rpc SetInitialPassword(PasswordRequest) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/users/{id}/_setinitialpw"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.write"
};
}
//PASSWORD_COMPLEXITY_POLICY
rpc GetPasswordComplexityPolicy(google.protobuf.Empty) returns (PasswordComplexityPolicy) {
option (google.api.http) = {
get: "/policies/passwords/complexity"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
rpc CreatePasswordComplexityPolicy(PasswordComplexityPolicyCreate) returns (PasswordComplexityPolicy) {
option (google.api.http) = {
post: "/policies/passwords/complexity"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc UpdatePasswordComplexityPolicy(PasswordComplexityPolicyUpdate) returns (PasswordComplexityPolicy) {
option (google.api.http) = {
put: "/policies/passwords/complexity/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc DeletePasswordComplexityPolicy(PasswordComplexityPolicyID) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/policies/passwords/complexity/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
//PASSWORD_AGE_POLICY
rpc GetPasswordAgePolicy(google.protobuf.Empty) returns (PasswordAgePolicy) {
option (google.api.http) = {
get: "/policies/passwords/age"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
rpc CreatePasswordAgePolicy(PasswordAgePolicyCreate) returns (PasswordAgePolicy) {
option (google.api.http) = {
post: "/policies/passwords/age"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc UpdatePasswordAgePolicy(PasswordAgePolicyUpdate) returns (PasswordAgePolicy) {
option (google.api.http) = {
put: "/policies/passwords/age/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc DeletePasswordAgePolicy(PasswordAgePolicyID) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/policies/passwords/age/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
//PASSWORD_LOCKOUT_POLICY
rpc GetPasswordLockoutPolicy(google.protobuf.Empty) returns (PasswordLockoutPolicy) {
option (google.api.http) = {
get: "/policies/passwords/lockout"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.read"
};
}
rpc CreatePasswordLockoutPolicy(PasswordLockoutPolicyCreate) returns (PasswordLockoutPolicy) {
option (google.api.http) = {
post: "/policies/passwords/lockout"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc UpdatePasswordLockoutPolicy(PasswordLockoutPolicyUpdate) returns (PasswordLockoutPolicy) {
option (google.api.http) = {
put: "/policies/passwords/lockout/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.write"
};
}
rpc DeletePasswordLockoutPolicy(PasswordLockoutPolicyID) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/policies/passwords/lockout/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "policy.delete"
};
}
//ORG
rpc GetOrgByID(OrgID) returns (Org) {
option (google.api.http) = {
get: "/orgs/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
rpc GetOrgByDomainGlobal(OrgDomain) returns (Org) {
option (google.api.http) = {
get: "/global/orgs/domain/{domain}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.read"
};
}
rpc DeactivateOrg(OrgID) returns (Org) {
option (google.api.http) = {
put: "/orgs/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.write"
};
}
rpc ReactivateOrg(OrgID) returns (Org) {
option (google.api.http) = {
put: "/orgs/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.write"
};
}
//ORG_MEMBERS
rpc GetOrgMemberRoles(google.protobuf.Empty) returns (OrgMemberRoles) {
option (google.api.http) = {
get: "/orgs/members/roles"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.read"
};
}
rpc AddOrgMember(AddOrgMemberRequest) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/orgs/{org_id}/members"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.write"
};
}
rpc ChangeOrgMember(ChangeOrgMemberRequest) returns (google.protobuf.Empty) {
option (google.api.http) = {
put: "/orgs/{org_id}/members/{user_id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.write"
};
}
rpc RemoveOrgMember(RemoveOrgMemberRequest) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/orgs/{org_id}/members/{user_id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.delete"
};
}
rpc SearchOrgMembers(OrgMemberSearchRequest) returns (OrgMemberSearchResponse) {
option (google.api.http) = {
post: "/orgs/{org_id}/members/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "org.member.read"
};
}
//PROJECTS
rpc SearchProjects(ProjectSearchRequest) returns (ProjectSearchResponse) {
option (google.api.http) = {
post: "/projects/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
rpc ProjectByID(ProjectID) returns (Project) {
option (google.api.http) = {
get: "/projects/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
check_field_name: "Id"
};
}
rpc CreateProject(ProjectCreateRequest) returns (Project) {
option (google.api.http) = {
post: "/projects"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
};
}
rpc UpdateProject(ProjectUpdateRequest) returns (Project) {
option (google.api.http) = {
put: "/projects/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
}
rpc DeactivateProject(ProjectID) returns (Project) {
option (google.api.http) = {
put: "/projects/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
}
rpc ReactivateProject(ProjectID) returns (Project) {
option (google.api.http) = {
put: "/projects/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.write"
check_field_name: "Id"
};
}
//GRANTED_PROJECT_GRANTS
rpc GetGrantedProjectGrantByID(GrantedGrantID) returns (ProjectGrant) {
option (google.api.http) = {
get: "/grants/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.read"
};
}
//PROJECT_MEMBERS
rpc GetProjectMemberRoles(google.protobuf.Empty) returns (ProjectMemberRoles) {
option (google.api.http) = {
get: "/projects/members/roles"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.read"
};
}
rpc SearchProjectMembers(ProjectMemberSearchRequest) returns (ProjectMemberSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/members/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.read"
check_field_name: "ProjectId"
};
}
rpc AddProjectMember(ProjectMemberAdd) returns (ProjectMember) {
option (google.api.http) = {
post: "/projects/{id}/members"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.write"
check_field_name: "Id"
};
}
rpc ChangeProjectMember(ProjectMemberChange) returns (ProjectMember) {
option (google.api.http) = {
put: "/projects/{id}/members/{user_id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.write"
check_field_name: "Id"
};
}
rpc RemoveProjectMember(ProjectMemberRemove) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/projects/{id}/members/{user_id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.member.delete"
check_field_name: "Id"
};
}
//PROJECT_ROLES
rpc SearchProjectRoles(ProjectRoleSearchRequest) returns (ProjectRoleSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/roles/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.read"
check_field_name: "ProjectId"
};
}
rpc AddProjectRole(ProjectRoleAdd) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/projects/{id}/roles"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.write"
check_field_name: "Id"
};
}
rpc RemoveProjectRole(ProjectRoleRemove) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/projects/{id}/roles/{name}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.role.delete"
check_field_name: "Id"
};
}
//APPLICATIONS
rpc SearchApplications(ApplicationSearchRequest) returns (ApplicationSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/applications/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
check_field_name: "ProjectId"
};
}
rpc ApplicationByID(ApplicationID) returns (Application) {
option (google.api.http) = {
get: "/projects/{project_id}/applications/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.read"
check_field_name: "ProjectId"
};
}
rpc CreateOIDCApplication(OIDCApplicationCreate) returns (Application) {
option (google.api.http) = {
post: "/projects/{project_id}/oidcapplications"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
rpc UpdateApplication(ApplicationUpdate) returns (Application) {
option (google.api.http) = {
put: "/projects/{project_id}/applications/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
rpc DeactivateApplication(ApplicationID) returns (Application) {
option (google.api.http) = {
put: "/projects/{project_id}/applications/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
rpc ReactivateApplication(ApplicationID) returns (Application) {
option (google.api.http) = {
put: "/projects/{project_id}/applications/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
rpc UpdateApplicationOIDCConfig(OIDCConfigUpdate) returns (OIDCConfig) {
option (google.api.http) = {
put: "/projects/{project_id}/applications/{application_id}/oidcconfig"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
rpc RegenerateOIDCClientSecret(ApplicationID) returns (ClientSecret) {
option (google.api.http) = {
put: "/projects/{project_id}/applications/{id}/oidcconfig/_changeclientsecret"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.app.write"
check_field_name: "ProjectId"
};
}
//PROJECT_GRANT
rpc SearchProjectGrants(ProjectGrantSearchRequest) returns (ProjectGrantSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/grants/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.read"
check_field_name: "ProjectId"
};
}
rpc ProjectGrantByID(ProjectGrantID) returns (ProjectGrant) {
option (google.api.http) = {
get: "/projects/{project_id}/grants/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.read"
};
}
rpc CreateProjectGrant(ProjectGrantCreate) returns (ProjectGrant) {
option (google.api.http) = {
post: "/projects/{project_id}/grants"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
rpc UpdateProjectGrant(ProjectGrantUpdate) returns (ProjectGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/grants/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
rpc DeactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/grants/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
rpc ReactivateProjectGrant(ProjectGrantID) returns (ProjectGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/grants/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.write"
};
}
//PROJECT_GRANT_MEMBER
rpc GetProjectGrantMemberRoles(google.protobuf.Empty) returns (ProjectGrantMemberRoles) {
option (google.api.http) = {
get: "/projects/grants/members/roles"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.read"
};
}
rpc SearchProjectGrantMembers(ProjectGrantMemberSearchRequest) returns (ProjectGrantMemberSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/grants/{grant_id}/members/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.read"
};
}
rpc AddProjectGrantMember(ProjectGrantMemberAdd) returns (google.protobuf.Empty) {
option (google.api.http) = {
post: "/projects/{project_id}/grants/{grant_id}/members"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.write"
};
}
rpc ChangeProjectGrantMember(ProjectGrantMemberChange) returns (google.protobuf.Empty) {
option (google.api.http) = {
put: "/projects/{project_id}/grants/{grant_id}/members/{user_id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.write"
};
}
rpc RemoveProjectGrantMember(ProjectGrantMemberRemove) returns (google.protobuf.Empty) {
option (google.api.http) = {
delete: "/projects/{project_id}/grants/{grant_id}/members/{user_id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.member.delete"
};
}
//USER_GRANT
rpc SearchUserGrants(UserGrantSearchRequest) returns (UserGrantSearchResponse) {
option (google.api.http) = {
post: "/users/grants/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.read"
};
}
rpc UserGrantByID(UserGrantID) returns (UserGrant) {
option (google.api.http) = {
get: "/users/{user_id}/grants/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.read"
};
}
rpc CreateUserGrant(UserGrantCreate) returns (UserGrant) {
option (google.api.http) = {
post: "/users/{user_id}/grants"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
rpc UpdateUserGrant(UserGrantUpdate) returns (UserGrant) {
option (google.api.http) = {
put: "/users/{user_id}/grants/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
rpc DeactivateUserGrant(UserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/users/{user_id}/grants/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
rpc ReactivateUserGrant(UserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/users/{user_id}/grants/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "user.grant.write"
};
}
//PROJECT_USER_GRANT
rpc SearchProjectUserGrants(ProjectUserGrantSearchRequest) returns (UserGrantSearchResponse) {
option (google.api.http) = {
post: "/projects/{project_id}/users/grants/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.read"
check_field_name: "ProjectId"
};
}
rpc ProjectUserGrantByID(ProjectUserGrantID) returns (UserGrant) {
option (google.api.http) = {
get: "/projects/{project_id}/users/{user_id}/grants/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.read"
check_field_name: "ProjectId"
};
}
rpc CreateProjectUserGrant(UserGrantCreate) returns (UserGrant) {
option (google.api.http) = {
post: "/projects/{project_id}/users/{user_id}/grants"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
}
rpc UpdateProjectUserGrant(ProjectUserGrantUpdate) returns (UserGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/users/{user_id}/grants/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
}
rpc DeactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/users/{user_id}/grants/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
}
rpc ReactivateProjectUserGrant(ProjectUserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/projects/{project_id}/users/{user_id}/grants/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.user.grant.write"
check_field_name: "ProjectId"
};
}
//PROJECT_GRANT_USER_GRANT
rpc SearchProjectGrantUserGrants(ProjectGrantUserGrantSearchRequest) returns (UserGrantSearchResponse) {
option (google.api.http) = {
post: "/projectgrants/{project_grant_id}/users/grants/_search"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.read"
check_field_name: "ProjectGrantId"
};
}
rpc ProjectGrantUserGrantByID(ProjectGrantUserGrantID) returns (UserGrant) {
option (google.api.http) = {
get: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.read"
check_field_name: "ProjectGrantId"
};
}
rpc CreateProjectGrantUserGrant(ProjectGrantUserGrantCreate) returns (UserGrant) {
option (google.api.http) = {
post: "/projectgrants/{project_grant_id}/users/{user_id}/grants"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
}
rpc UpdateProjectGrantUserGrant(ProjectGrantUserGrantUpdate) returns (UserGrant) {
option (google.api.http) = {
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
}
rpc DeactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_deactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
}
rpc ReactivateProjectGrantUserGrant(ProjectGrantUserGrantID) returns (UserGrant) {
option (google.api.http) = {
put: "/projectgrants/{project_grant_id}/users/{user_id}/grants/{id}/_reactivate"
body: "*"
};
option (caos.zitadel.utils.v1.auth_option) = {
permission: "project.grant.user.grant.write"
check_field_name: "ProjectGrantId"
};
}
//Grant
rpc SearchAuthGrant(AuthGrantSearchRequest) returns (AuthGrantSearchResponse) {
option (google.api.http) = {
post: "/authgrants/_search"
body: "*"
};
}
}
message ChangeRequest {
string id = 1;
uint64 limit= 2;
uint64 sequence_offset = 3;
}
message Changes {
repeated Change changes = 1;
uint64 offset = 2;
uint64 limit = 3;
}
message Change {
google.protobuf.Timestamp change_date = 1;
string event_type = 2;
uint64 sequence = 3;
string editor = 4;
google.protobuf.Struct data = 5;
}
message ApplicationID {
string id = 1;
string project_id = 2;
}
message ProjectID {
string id = 1;
}
message UserID {
string id = 1;
}
message UserEmailID {
string email = 1;
}
message UniqueUserRequest {
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
}
message UniqueUserResponse {
bool is_unique = 1;
}
message CreateUserRequest {
string user_name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
string display_name = 5[(validate.rules).string = {max_len: 200}];
string preferred_language = 6[(validate.rules).string = {max_len: 200}];
Gender gender = 7;
string email = 8 [(validate.rules).string = {min_len: 1, max_len: 200, email: true}];
bool is_email_verified = 9;
string phone = 11 [(validate.rules).string = {max_len: 20}];
bool is_phone_verified = 12;
string country = 13 [(validate.rules).string = {max_len: 200}];
string locality = 14 [(validate.rules).string = {max_len: 200}];
string postal_code = 15 [(validate.rules).string = {max_len: 200}];
string region = 16 [(validate.rules).string = {max_len: 200}];
string street_address = 17 [(validate.rules).string = {max_len: 200}];
string password = 18 [(validate.rules).string = {max_len: 72}];
}
message User {
string id = 1;
UserState state = 2;
google.protobuf.Timestamp creation_date = 3;
google.protobuf.Timestamp change_date = 4;
google.protobuf.Timestamp last_login = 5;
google.protobuf.Timestamp password_changed = 6;
string user_name = 7;
string first_name = 8;
string last_name = 9;
string display_name = 10;
string nick_name = 11;
string preferred_language = 12;
Gender gender = 13;
string email = 14;
bool is_email_verified = 15;
string phone = 16;
bool is_phone_verified = 17;
string country = 18;
string locality = 19;
string postal_code = 20;
string region = 21;
string street_address = 22;
uint64 sequence = 23;
}
enum UserState {
USERSTATE_UNSPECIFIED = 0;
USERSTATE_ACTIVE = 1;
USERSTATE_INACTIVE = 2;
USERSTATE_DELETED = 3;
USERSTATE_LOCKED = 4;
USERSTATE_SUSPEND = 5;
USERSTATE_INITIAL= 6;
}
enum Gender {
GENDER_UNSPECIFIED = 0;
GENDER_FEMALE = 1;
GENDER_MALE = 2;
GENDER_DIVERSE = 3;
}
message UserSearchRequest {
uint64 offset = 1;
uint64 limit = 2;
UserSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];;
bool asc = 4;
repeated UserSearchQuery queries = 5;
}
message UserSearchQuery {
UserSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];;
SearchMethod method = 2;
string value = 3;
}
enum UserSearchKey {
USERSEARCHKEY_UNSPECIFIED = 0;
USERSEARCHKEY_USER_NAME = 1;
USERSEARCHKEY_FIRST_NAME = 2;
USERSEARCHKEY_LAST_NAME = 3;
USERSEARCHKEY_NICK_NAME = 4;
USERSEARCHKEY_DISPLAY_NAME = 5;
USERSEARCHKEY_EMAIL = 6;
USERSEARCHKEY_STATE = 7;
}
message UserSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated User result = 4;
}
enum SearchMethod {
SEARCHMETHOD_EQUALS = 0;
SEARCHMETHOD_STARTS_WITH = 1;
SEARCHMETHOD_CONTAINS = 2;
}
message UserProfile {
string id = 1;
UserState state = 2;
string first_name = 3;
string last_name = 4;
string nick_name = 5;
string display_name = 6;
string preferred_language = 7;
Gender gender = 8;
string user_name = 9;
uint64 sequence = 10;
}
message UpdateUserProfileRequest {
string id = 1;
string first_name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
string last_name = 3 [(validate.rules).string = {min_len: 1, max_len: 200}];
string nick_name = 4 [(validate.rules).string = {max_len: 200}];
string display_name = 5 [(validate.rules).string = {max_len: 200}];
string preferred_language = 6 [(validate.rules).string = {max_len: 200}];
Gender gender = 7;
}
message UserEmail {
string id = 1;
string email = 2;
bool is_email_verified = 3;
uint64 sequence = 4;
}
message UpdateUserEmailRequest {
string id = 1;
string email = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
bool is_email_verified = 3;
}
message UserPhone {
string id = 1;
string phone = 2;
bool is_phone_verified = 3;
uint64 sequence = 5;
}
message UpdateUserPhoneRequest {
string id = 1;
string phone = 2 [(validate.rules).string = {min_len: 1, max_len: 20}];
bool is_phone_verified = 3;
}
message UserAddress {
string id = 1;
string country = 2;
string locality = 3;
string postal_code = 4;
string region = 5;
string street_address = 6;
uint64 sequence = 7;
}
message UpdateUserAddressRequest {
string id = 1;
string country = 2 [(validate.rules).string = {max_len: 200}];
string locality = 3 [(validate.rules).string = {max_len: 200}];
string postal_code = 4 [(validate.rules).string = {max_len: 200}];
string region = 5 [(validate.rules).string = {max_len: 200}];
string street_address = 6 [(validate.rules).string = {max_len: 200}];
}
message MultiFactors {
repeated MultiFactor mfas = 1;
}
message MultiFactor {
MfaType type = 1;
MFAState state = 2;
}
enum MfaType {
MFATYPE_UNSPECIFIED = 0;
MFATYPE_SMS = 1;
MFATYPE_OTP = 2;
}
enum MFAState {
MFASTATE_UNSPECIFIED = 0;
MFASTATE_NOT_READY = 1;
MFASTATE_READY = 2;
MFASTATE_REMOVED = 3;
}
message PasswordID{
string id = 1;
}
message PasswordRequest {
string id = 1;
string password = 2 [(validate.rules).string = {min_len: 1, max_len: 72}];
}
message ResetPasswordRequest {
string id = 1;
}
message SetPasswordNotificationRequest {
string id = 1;
NotificationType type = 2;
}
enum NotificationType {
NOTIFICATIONTYPE_EMAIL = 0;
NOTIFICATIONTYPE_SMS = 1;
}
message PasswordComplexityPolicyID {
string id = 1;
}
message PasswordComplexityPolicy {
string id = 1;
string description = 2;
PolicyState state = 3;
google.protobuf.Timestamp creation_date = 4;
google.protobuf.Timestamp change_date = 5;
uint64 min_length = 6;
bool has_lowercase = 7;
bool has_uppercase = 8;
bool has_number = 9;
bool has_symbol = 10;
uint64 sequence = 11;
}
message PasswordComplexityPolicyCreate {
string description = 1 [(validate.rules).string = {max_len: 500}];
uint64 min_length = 2;
bool has_lowercase = 3;
bool has_uppercase = 4;
bool has_number = 5;
bool has_symbol = 6;
}
message PasswordComplexityPolicyUpdate {
string id = 1;
string description = 2 [(validate.rules).string = {max_len: 500}];
uint64 min_length = 3;
bool has_lowercase = 4;
bool has_uppercase = 5;
bool has_number = 6;
bool has_symbol = 7;
}
message PasswordAgePolicyID {
string id = 1;
}
message PasswordAgePolicy {
string id = 1;
string description = 2;
PolicyState state = 3;
google.protobuf.Timestamp creation_date = 4;
google.protobuf.Timestamp change_date = 5;
uint64 max_age_days = 6;
uint64 expire_warn_days = 7;
uint64 sequence = 8;
}
message PasswordAgePolicyCreate {
string description = 1 [(validate.rules).string = {max_len: 500}];
uint64 max_age_days = 2;
uint64 expire_warn_days = 3;
}
message PasswordAgePolicyUpdate {
string id = 1;
string description = 2 [(validate.rules).string = {max_len: 500}];
uint64 max_age_days = 3;
uint64 expire_warn_days = 4;
}
message PasswordLockoutPolicyID {
string id = 1;
}
message PasswordLockoutPolicy {
string id = 1;
string description = 2;
PolicyState state = 3;
google.protobuf.Timestamp creation_date = 4;
google.protobuf.Timestamp change_date = 5;
uint64 max_attempts = 6;
bool show_lock_out_failures = 7;
uint64 sequence = 8;
}
message PasswordLockoutPolicyCreate {
string description = 1 [(validate.rules).string = {max_len: 500}];
uint64 max_attempts = 2;
bool show_lock_out_failures = 3;
}
message PasswordLockoutPolicyUpdate {
string id = 1;
string description = 2 [(validate.rules).string = {max_len: 500}];
uint64 max_attempts = 3;
bool show_lock_out_failures = 4;
}
enum PolicyState {
POLICYSTATE_UNSPECIFIED = 0;
POLICYSTATE_ACTIVE = 1;
POLICYSTATE_INACTIVE = 2;
POLICYSTATE_DELETED = 3;
}
message OrgID {
string id = 1;
}
message OrgDomain {
string domain = 1;
}
message Org {
string id = 1;
OrgState state = 2;
google.protobuf.Timestamp creation_date = 3;
google.protobuf.Timestamp change_date = 4;
string name = 5;
string domain = 6;
uint64 sequence = 7;
}
enum OrgState {
ORGSTATE_UNSPECIFIED = 0;
ORGSTATE_ACTIVE = 1;
ORGSTATE_INACTIVE = 2;
}
message OrgMemberRoles {
repeated string roles = 1;
}
message OrgMember {
string user_id = 1;
string user_name = 2;
string email = 3;
string first_name = 4;
string last_name = 5;
repeated string roles = 6;
google.protobuf.Timestamp change_date = 7;
google.protobuf.Timestamp creation_date = 8;
uint64 sequence = 9;
}
message AddOrgMemberRequest {
string org_id = 1;
string user_id = 2;
repeated string roles = 3;
}
message ChangeOrgMemberRequest {
string org_id = 1;
string user_id = 2;
repeated string roles = 3;
}
message RemoveOrgMemberRequest {
string org_id = 1;
string user_id = 2;
}
message OrgMemberSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated OrgMember result = 4;
}
message OrgMemberSearchRequest {
string org_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated OrgMemberSearchQuery queries = 4;
}
message OrgMemberSearchQuery {
OrgMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum OrgMemberSearchKey {
ORGMEMBERSEARCHKEY_UNSPECIFIED = 0;
ORGMEMBERSEARCHKEY_FIRST_NAME = 1;
ORGMEMBERSEARCHKEY_LAST_NAME = 2;
ORGMEMBERSEARCHKEY_EMAIL = 3;
ORGMEMBERSEARCHKEY_USER_ID = 4;
}
message ProjectCreateRequest {
string name = 1 [(validate.rules).string = {min_len: 1, max_len: 200}];
}
message ProjectUpdateRequest {
string id = 1;
string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
}
message Projects {
repeated Project projects = 1;
}
message Project {
string id = 1;
string name = 2;
ProjectState state = 3;
google.protobuf.Timestamp change_date = 4;
google.protobuf.Timestamp creation_date = 5;
ProjectType type = 6;
string resource_owner = 7;
string org_id = 8;
string org_name = 9;
string org_domain = 10;
string grant_id = 11;
uint64 sequence = 12;
}
enum ProjectState {
PROJECTSTATE_UNSPECIFIED = 0;
PROJECTSTATE_ACTIVE = 1;
PROJECTSTATE_INACTIVE = 2;
}
enum ProjectType {
PROJECTTYPE_UNKNOWN = 0;
PROJECTTYPE_SELF = 1;
PROJECTTYPE_GRANTED = 2;
}
message ProjectSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated Project result = 4;
}
message ProjectSearchRequest {
uint64 offset = 1;
uint64 limit = 2;
repeated ProjectSearchQuery queries = 3;
}
message ProjectSearchQuery {
ProjectSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum ProjectSearchKey {
PROJECTSEARCHKEY_UNSPECIFIED = 0;
PROJECTSEARCHKEY_PROJECT_NAME = 1;
}
message ProjectMemberRoles {
repeated string roles = 1;
}
message ProjectMember {
string user_id = 1;
string user_name = 2;
string email = 3;
string first_name = 4;
string last_name = 5;
repeated string roles = 6;
google.protobuf.Timestamp change_date = 7;
google.protobuf.Timestamp creation_date = 8;
uint64 sequence = 10;
}
message ProjectMemberAdd {
string id = 1;
string user_id = 2;
repeated string roles = 3;
}
message ProjectMemberChange {
string id = 1;
string user_id = 2;
repeated string roles = 3;
}
message ProjectMemberRemove {
string id = 1;
string user_id = 2;
}
message ProjectRoleAdd {
string id = 1;
string name = 2;
string display_name = 3;
string group = 4;
}
message ProjectRole {
string project_id = 1;
string name = 2;
string display_name = 3;
google.protobuf.Timestamp creation_date = 4;
string group = 5;
uint64 sequence = 6;
}
message ProjectRoleRemove {
string id = 1;
string name = 2;
}
message ProjectRoleSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated ProjectRole result = 4;
}
message ProjectRoleSearchRequest {
string project_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated ProjectRoleSearchQuery queries = 4;
}
message ProjectRoleSearchQuery {
ProjectRoleSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum ProjectRoleSearchKey {
PROJECTROLESEARCHKEY_UNSPECIFIED = 0;
PROJECTROLESEARCHKEY_NAME = 1;
PROJECTROLESEARCHKEY_DISPLAY_NAME = 2;
}
message ProjectMemberSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated ProjectMember result = 4;
}
message ProjectMemberSearchRequest {
string project_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated ProjectMemberSearchQuery queries = 4;
}
message ProjectMemberSearchQuery {
ProjectMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum ProjectMemberSearchKey {
PROJECTMEMBERSEARCHKEY_UNSPECIFIED = 0;
PROJECTMEMBERSEARCHKEY_FIRST_NAME = 1;
PROJECTMEMBERSEARCHKEY_LAST_NAME = 2;
PROJECTMEMBERSEARCHKEY_EMAIL = 3;
PROJECTMEMBERSEARCHKEY_USER_ID = 4;
}
enum AppState {
APPSTATE_UNSPECIFIED = 0;
APPSTATE_ACTIVE = 1;
APPSTATE_INACTIVE = 2;
}
message Application {
string id = 1;
AppState state = 2;
google.protobuf.Timestamp creation_date = 3;
google.protobuf.Timestamp change_date = 4;
string name = 5;
oneof app_config {
OIDCConfig oidc_config = 8;
}
uint64 sequence = 9;
}
message ApplicationUpdate {
string project_id = 1;
string id = 2;
string name = 5 [(validate.rules).string = {min_len: 1, max_len: 200}];
}
message OIDCConfig {
repeated string redirect_uris = 1;
repeated OIDCResponseType response_types = 2;
repeated OIDCGrantType grant_types = 3;
OIDCApplicationType application_type = 4;
string client_id = 5;
string client_secret = 6;
OIDCAuthMethodType auth_method_type = 7;
repeated string post_logout_redirect_uris = 8;
}
message OIDCApplicationCreate {
string project_id = 1;
string name = 2 [(validate.rules).string = {min_len: 1, max_len: 200}];
repeated string redirect_uris = 3;
repeated OIDCResponseType response_types = 4;
repeated OIDCGrantType grant_types = 5;
OIDCApplicationType application_type = 6;
OIDCAuthMethodType auth_method_type = 7;
repeated string post_logout_redirect_uris = 8;
}
message OIDCConfigUpdate {
string project_id = 1;
string application_id = 2;
repeated string redirect_uris = 3;
repeated OIDCResponseType response_types = 4;
repeated OIDCGrantType grant_types = 5;
OIDCApplicationType application_type = 6;
OIDCAuthMethodType auth_method_type = 7;
repeated string post_logout_redirect_uris = 8;
}
enum OIDCResponseType {
OIDCRESPONSETYPE_CODE = 0;
OIDCRESPONSETYPE_ID_TOKEN = 1;
OIDCRESPONSETYPE_TOKEN_ID_TOKEN = 2;
}
enum OIDCGrantType {
OIDCGRANTTYPE_AUTHORIZATION_CODE = 0;
OIDCGRANTTYPE_IMPLICIT = 1;
OIDCGRANTTYPE_REFRESH_TOKEN = 2;
}
enum OIDCApplicationType {
OIDCAPPLICATIONTYPE_WEB = 0;
OIDCAPPLICATIONTYPE_USER_AGENT = 1;
OIDCAPPLICATIONTYPE_NATIVE = 2;
}
enum OIDCAuthMethodType {
OIDCAUTHMETHODTYPE_BASIC = 0;
OIDCAUTHMETHODTYPE_POST = 1;
OIDCAUTHMETHODTYPE_NONE = 2;
}
message ClientSecret {
string client_secret = 1;
}
message ApplicationSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated Application result = 4;
}
message ApplicationSearchRequest {
string project_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated ApplicationSearchQuery queries = 4;
}
message ApplicationSearchQuery {
ApplicationSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum ApplicationSearchKey {
APPLICATIONSERACHKEY_UNSPECIFIED = 0;
APPLICATIONSEARCHKEY_APP_NAME = 1;
}
message ProjectGrant {
string id = 1;
string project_id = 2;
string granted_org_id = 3;
string granted_org_name = 4;
string granted_org_domain = 5;
repeated string role_names = 6;
ProjectGrantState state = 7;
google.protobuf.Timestamp creation_date = 8;
google.protobuf.Timestamp change_date = 9;
string project_name = 10;
uint64 sequence = 11;
}
message ProjectGrantCreate {
string project_id = 1;
string granted_org_id = 2;
repeated string role_names = 3;
}
message ProjectGrantUpdate {
string project_id = 1;
string id = 2;
repeated string role_names = 3;
}
message ProjectGrantID {
string project_id = 1;
string id = 2;
}
message GrantedGrantID {
string id = 1;
}
enum ProjectGrantState {
PROJECTGRANTSTATE_UNSPECIFIED = 0;
PROJECTGRANTSTATE_ACTIVE = 1;
PROJECTGRANTSTATE_INACTIVE = 2;
}
message ProjectGrantSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated ProjectGrant result = 4;
}
message ProjectGrantSearchRequest {
string project_id = 1;
uint64 offset = 2;
uint64 limit = 3;
}
message ProjectGrantMemberRoles {
repeated string roles = 1;
}
message ProjectGrantMember {
string user_id = 1;
string user_name = 2;
string email = 3;
string first_name = 4;
string last_name = 5;
repeated string roles = 6;
google.protobuf.Timestamp change_date = 7;
google.protobuf.Timestamp creation_date = 8;
uint64 sequence = 9;
}
message ProjectGrantMemberAdd {
string project_id = 1;
string grant_id = 2;
string user_id = 3;
repeated string roles = 4;
}
message ProjectGrantMemberChange {
string project_id = 1;
string grant_id = 2;
string user_id = 3;
repeated string roles = 4;
}
message ProjectGrantMemberRemove {
string project_id = 1;
string grant_id = 2;
string user_id = 3;
}
message ProjectGrantMemberSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated ProjectGrantMember result = 4;
}
message ProjectGrantMemberSearchRequest {
string project_id = 1;
string grant_id = 2;
uint64 offset = 3;
uint64 limit = 4;
repeated ProjectGrantMemberSearchQuery queries = 5;
}
message ProjectGrantMemberSearchQuery {
ProjectGrantMemberSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2;
string value = 3;
}
enum ProjectGrantMemberSearchKey {
PROJECTGRANTMEMBERSEARCHKEY_UNSPECIFIED = 0;
PROJECTGRANTMEMBERSEARCHKEY_FIRST_NAME = 1;
PROJECTGRANTMEMBERSEARCHKEY_LAST_NAME = 2;
PROJECTGRANTMEMBERSEARCHKEY_EMAIL = 3;
PROJECTGRANTMEMBERSEARCHKEY_USER_ID = 4;
}
message UserGrant {
string id = 1;
string user_id = 2;
string org_id = 3;
string project_id = 4;
repeated string role_names = 5;
UserGrantState state = 6;
google.protobuf.Timestamp creation_date = 7;
google.protobuf.Timestamp change_date = 8;
string user_name = 9;
string first_name = 10;
string last_name = 11;
string email = 12;
string org_name = 13;
string org_domain = 14;
string project_name = 15;
uint64 sequence = 16;
}
message UserGrantCreate {
string user_id = 1;
string org_id = 2;
string project_id = 3;
repeated string role_names = 4;
}
message UserGrantUpdate {
string user_id = 1;
string id = 2;
repeated string role_names = 3;
}
message UserGrantID {
string user_id = 1;
string id = 2;
}
message ProjectUserGrantID {
string project_id = 1;
string user_id = 2;
string id = 3;
}
message ProjectUserGrantUpdate {
string project_id = 1;
string user_id = 2;
string id = 3;
repeated string role_names = 4;
}
message ProjectGrantUserGrantID {
string project_grant_id = 1;
string user_id = 2;
string id = 3;
}
message ProjectGrantUserGrantCreate {
string user_id = 1;
string org_id = 2;
string project_grant_id = 3;
string project_id = 4 [(validate.rules).string.min_len = 1];
repeated string role_names = 5;
}
message ProjectGrantUserGrantUpdate {
string project_grant_id = 1;
string user_id = 2;
string id = 3;
repeated string role_names = 4;
}
enum UserGrantState {
USERGRANTSTATE_UNSPECIFIED = 0;
USERGRANTSTATE_ACTIVE = 1;
USERGRANTSTATE_INACTIVE = 2;
}
message UserGrantSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated UserGrant result = 4;
}
message UserGrantSearchRequest {
uint64 offset = 1;
uint64 limit = 2;
repeated UserGrantSearchQuery queries = 3;
}
message UserGrantSearchQuery {
UserGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2 [(validate.rules).enum = {in: [0]}];
string value = 3;
}
enum UserGrantSearchKey {
USERGRANTSEARCHKEY_UNSPECIFIED = 0;
USERGRANTSEARCHKEY_PROJECT_ID = 1;
USERGRANTSEARCHKEY_USER_ID = 2;
USERGRANTSEARCHKEY_ORG_ID = 3;
}
message ProjectUserGrantSearchRequest {
string project_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated UserGrantSearchQuery queries = 4;
}
message ProjectGrantUserGrantSearchRequest {
string project_grant_id = 1;
uint64 offset = 2;
uint64 limit = 3;
repeated UserGrantSearchQuery queries = 4;
}
message AuthGrantSearchRequest {
uint64 offset = 1;
uint64 limit = 2;
AuthGrantSearchKey sorting_column = 3 [(validate.rules).enum = {not_in: [0]}];
bool asc = 4;
repeated AuthGrantSearchQuery queries = 5;
}
message AuthGrantSearchQuery {
AuthGrantSearchKey key = 1 [(validate.rules).enum = {not_in: [0]}];
SearchMethod method = 2 [(validate.rules).enum = {in: [0]}];
string value = 3;
}
enum AuthGrantSearchKey {
AUTHGRANTSEARCHKEY_UNSPECIFIED = 0;
AUTHGRANTSEARCHKEY_ORG_ID = 1;
AUTHGRANTSEARCHKEY_PROJECT_ID = 2;
AUTHGRANTSEARCHKEY_USER_ID = 3;
}
message AuthGrantSearchResponse {
uint64 offset = 1;
uint64 limit = 2;
uint64 total_result = 3;
repeated AuthGrant result = 4;
}
message AuthGrant {
string orgId = 1;
string projectId = 2;
string userId = 3;
repeated string roles = 4;
}