mirror of
https://github.com/zitadel/zitadel
synced 2024-11-22 00:39:36 +00:00
fix: generated files
This commit is contained in:
parent
3c819e561a
commit
43d45ab727
20
pkg/admin/api/grpc/admin.pb.authoptions.go
Normal file
20
pkg/admin/api/grpc/admin.pb.authoptions.go
Normal file
@ -0,0 +1,20 @@
|
||||
// Code generated by protoc-gen-authmethod. DO NOT EDIT.
|
||||
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"google.golang.org/grpc"
|
||||
|
||||
utils_auth "github.com/caos/citadel/utils/auth"
|
||||
utils_grpc "github.com/caos/citadel/utils/grpc"
|
||||
)
|
||||
|
||||
/**
|
||||
* AdminService
|
||||
*/
|
||||
|
||||
var AdminService_AuthMethods = utils_auth.AuthMethodMapping{}
|
||||
|
||||
func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor {
|
||||
return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods)
|
||||
}
|
141
pkg/admin/api/grpc/admin.swagger.json
Normal file
141
pkg/admin/api/grpc/admin.swagger.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"swagger": "2.0",
|
||||
"info": {
|
||||
"title": "admin service",
|
||||
"version": "0.1",
|
||||
"contact": {
|
||||
"url": "https://github.com/caos/citadel/admin"
|
||||
}
|
||||
},
|
||||
"schemes": [
|
||||
"https"
|
||||
],
|
||||
"consumes": [
|
||||
"application/json",
|
||||
"application/grpc"
|
||||
],
|
||||
"produces": [
|
||||
"application/json",
|
||||
"application/grpc"
|
||||
],
|
||||
"paths": {
|
||||
"/healthz": {
|
||||
"get": {
|
||||
"summary": "Healthz returns status OK as soon as the service started",
|
||||
"operationId": "Healthz",
|
||||
"responses": {
|
||||
"200": {
|
||||
"description": "A successful response.",
|
||||
"schema": {
|
||||
"properties": {}
|
||||
}
|
||||
}
|
||||
},
|
||||
"tags": [
|
||||
"AdminService"
|
||||
]
|
||||
}
|
||||
},
|
||||
"/ready": {
|
||||
"get": {
|
||||
"summary": "Ready returns status OK as soon as all dependent services are available",
|
||||
"operationId": "Ready",
|
||||
"responses": {
|
||||
"200": {
|
||||
"description": "A successful response.",
|
||||
"schema": {
|
||||
"properties": {}
|
||||
}
|
||||
}
|
||||
},
|
||||
"tags": [
|
||||
"AdminService"
|
||||
]
|
||||
}
|
||||
},
|
||||
"/validate": {
|
||||
"get": {
|
||||
"operationId": "Validate",
|
||||
"responses": {
|
||||
"200": {
|
||||
"description": "A successful response.",
|
||||
"schema": {
|
||||
"$ref": "#/definitions/protobufStruct"
|
||||
}
|
||||
}
|
||||
},
|
||||
"tags": [
|
||||
"AdminService"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"definitions": {
|
||||
"protobufListValue": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"values": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "#/definitions/protobufValue"
|
||||
},
|
||||
"description": "Repeated field of dynamically typed values."
|
||||
}
|
||||
},
|
||||
"description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array."
|
||||
},
|
||||
"protobufNullValue": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"NULL_VALUE"
|
||||
],
|
||||
"default": "NULL_VALUE",
|
||||
"description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value."
|
||||
},
|
||||
"protobufStruct": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"fields": {
|
||||
"type": "object",
|
||||
"additionalProperties": {
|
||||
"$ref": "#/definitions/protobufValue"
|
||||
},
|
||||
"description": "Unordered map of dynamically typed values."
|
||||
}
|
||||
},
|
||||
"description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object."
|
||||
},
|
||||
"protobufValue": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"null_value": {
|
||||
"$ref": "#/definitions/protobufNullValue",
|
||||
"description": "Represents a null value."
|
||||
},
|
||||
"number_value": {
|
||||
"type": "number",
|
||||
"format": "double",
|
||||
"description": "Represents a double value."
|
||||
},
|
||||
"string_value": {
|
||||
"type": "string",
|
||||
"description": "Represents a string value."
|
||||
},
|
||||
"bool_value": {
|
||||
"type": "boolean",
|
||||
"format": "boolean",
|
||||
"description": "Represents a boolean value."
|
||||
},
|
||||
"struct_value": {
|
||||
"$ref": "#/definitions/protobufStruct",
|
||||
"description": "Represents a structured value."
|
||||
},
|
||||
"list_value": {
|
||||
"$ref": "#/definitions/protobufListValue",
|
||||
"description": "Represents a repeated `Value`."
|
||||
}
|
||||
},
|
||||
"description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value."
|
||||
}
|
||||
}
|
||||
}
|
178
pkg/admin/api/grpc/mock/admin.proto.mock.go
Normal file
178
pkg/admin/api/grpc/mock/admin.proto.mock.go
Normal file
@ -0,0 +1,178 @@
|
||||
// Code generated by MockGen. DO NOT EDIT.
|
||||
// Source: github.com/caos/citadel/admin/api/grpc (interfaces: AdminServiceClient)
|
||||
|
||||
// Package api is a generated GoMock package.
|
||||
package api
|
||||
|
||||
import (
|
||||
context "context"
|
||||
grpc "github.com/caos/citadel/admin/api/grpc"
|
||||
gomock "github.com/golang/mock/gomock"
|
||||
empty "github.com/golang/protobuf/ptypes/empty"
|
||||
struct0 "github.com/golang/protobuf/ptypes/struct"
|
||||
grpc0 "google.golang.org/grpc"
|
||||
reflect "reflect"
|
||||
)
|
||||
|
||||
// MockAdminServiceClient is a mock of AdminServiceClient interface
|
||||
type MockAdminServiceClient struct {
|
||||
ctrl *gomock.Controller
|
||||
recorder *MockAdminServiceClientMockRecorder
|
||||
}
|
||||
|
||||
// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient
|
||||
type MockAdminServiceClientMockRecorder struct {
|
||||
mock *MockAdminServiceClient
|
||||
}
|
||||
|
||||
// NewMockAdminServiceClient creates a new mock instance
|
||||
func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient {
|
||||
mock := &MockAdminServiceClient{ctrl: ctrl}
|
||||
mock.recorder = &MockAdminServiceClientMockRecorder{mock}
|
||||
return mock
|
||||
}
|
||||
|
||||
// EXPECT returns an object that allows the caller to indicate expected use
|
||||
func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder {
|
||||
return m.recorder
|
||||
}
|
||||
|
||||
// GetOrgByID mocks base method
|
||||
func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "GetOrgByID", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.Org)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// GetOrgByID indicates an expected call of GetOrgByID
|
||||
func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...)
|
||||
}
|
||||
|
||||
// Healthz mocks base method
|
||||
func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Healthz", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// Healthz indicates an expected call of Healthz
|
||||
func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...)
|
||||
}
|
||||
|
||||
// IsOrgUnique mocks base method
|
||||
func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "IsOrgUnique", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.UniqueOrgResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// IsOrgUnique indicates an expected call of IsOrgUnique
|
||||
func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...)
|
||||
}
|
||||
|
||||
// Ready mocks base method
|
||||
func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Ready", varargs...)
|
||||
ret0, _ := ret[0].(*empty.Empty)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// Ready indicates an expected call of Ready
|
||||
func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...)
|
||||
}
|
||||
|
||||
// SearchOrgs mocks base method
|
||||
func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SearchOrgs", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.OrgSearchResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SearchOrgs indicates an expected call of SearchOrgs
|
||||
func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...)
|
||||
}
|
||||
|
||||
// SetUpOrg mocks base method
|
||||
func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "SetUpOrg", varargs...)
|
||||
ret0, _ := ret[0].(*grpc.OrgSetUpResponse)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// SetUpOrg indicates an expected call of SetUpOrg
|
||||
func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...)
|
||||
}
|
||||
|
||||
// Validate mocks base method
|
||||
func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) {
|
||||
m.ctrl.T.Helper()
|
||||
varargs := []interface{}{arg0, arg1}
|
||||
for _, a := range arg2 {
|
||||
varargs = append(varargs, a)
|
||||
}
|
||||
ret := m.ctrl.Call(m, "Validate", varargs...)
|
||||
ret0, _ := ret[0].(*struct0.Struct)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// Validate indicates an expected call of Validate
|
||||
func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
|
||||
mr.mock.ctrl.T.Helper()
|
||||
varargs := append([]interface{}{arg0, arg1}, arg2...)
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...)
|
||||
}
|
521
pkg/management/api/grpc/management.pb.authoptions.go
Normal file
521
pkg/management/api/grpc/management.pb.authoptions.go
Normal file
@ -0,0 +1,521 @@
|
||||
// Code generated by protoc-gen-authmethod. DO NOT EDIT.
|
||||
|
||||
package grpc
|
||||
|
||||
import (
|
||||
"google.golang.org/grpc"
|
||||
|
||||
utils_auth "github.com/caos/citadel/utils/auth"
|
||||
utils_grpc "github.com/caos/citadel/utils/grpc"
|
||||
)
|
||||
|
||||
/**
|
||||
* ManagementService
|
||||
*/
|
||||
|
||||
var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{
|
||||
Permission: "user.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{
|
||||
Permission: "project.app.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{
|
||||
Permission: "org.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{
|
||||
Permission: "project.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{
|
||||
Permission: "user.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{
|
||||
Permission: "user.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{
|
||||
Permission: "policy.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{
|
||||
Permission: "org.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{
|
||||
Permission: "org.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{
|
||||
Permission: "org.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{
|
||||
Permission: "org.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{
|
||||
Permission: "org.member.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{
|
||||
Permission: "org.member.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{
|
||||
Permission: "org.member.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{
|
||||
Permission: "org.member.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{
|
||||
Permission: "org.member.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{
|
||||
Permission: "project.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{
|
||||
Permission: "project.read",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{
|
||||
Permission: "project.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{
|
||||
Permission: "project.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{
|
||||
Permission: "project.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{
|
||||
Permission: "project.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{
|
||||
Permission: "project.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{
|
||||
Permission: "project.member.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{
|
||||
Permission: "project.member.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{
|
||||
Permission: "project.member.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{
|
||||
Permission: "project.member.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{
|
||||
Permission: "project.member.delete",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{
|
||||
Permission: "project.role.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{
|
||||
Permission: "project.role.write",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{
|
||||
Permission: "project.role.delete",
|
||||
CheckParam: "Id",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{
|
||||
Permission: "project.app.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{
|
||||
Permission: "project.app.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{
|
||||
Permission: "project.app.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{
|
||||
Permission: "project.grant.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{
|
||||
Permission: "project.grant.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{
|
||||
Permission: "project.grant.member.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{
|
||||
Permission: "project.grant.member.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{
|
||||
Permission: "project.grant.member.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{
|
||||
Permission: "project.grant.member.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{
|
||||
Permission: "project.grant.member.delete",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{
|
||||
Permission: "user.grant.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{
|
||||
Permission: "user.grant.read",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{
|
||||
Permission: "user.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{
|
||||
Permission: "user.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{
|
||||
Permission: "user.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{
|
||||
Permission: "user.grant.write",
|
||||
CheckParam: "",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.read",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.user.grant.write",
|
||||
CheckParam: "ProjectId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.read",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.read",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.write",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.write",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.write",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
|
||||
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{
|
||||
Permission: "project.grant.user.grant.write",
|
||||
CheckParam: "ProjectGrantId",
|
||||
},
|
||||
}
|
||||
|
||||
func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor {
|
||||
return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods)
|
||||
}
|
5657
pkg/management/api/grpc/management.swagger.json
Normal file
5657
pkg/management/api/grpc/management.swagger.json
Normal file
File diff suppressed because it is too large
Load Diff
2118
pkg/management/api/grpc/mock/management.proto.mock.go
Normal file
2118
pkg/management/api/grpc/mock/management.proto.mock.go
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user