fix: generated files

This commit is contained in:
Fabiennne 2020-03-23 10:52:06 +01:00
parent 3c819e561a
commit 43d45ab727
6 changed files with 8635 additions and 0 deletions

View File

@ -0,0 +1,20 @@
// Code generated by protoc-gen-authmethod. DO NOT EDIT.
package grpc
import (
"google.golang.org/grpc"
utils_auth "github.com/caos/citadel/utils/auth"
utils_grpc "github.com/caos/citadel/utils/grpc"
)
/**
* AdminService
*/
var AdminService_AuthMethods = utils_auth.AuthMethodMapping{}
func AdminService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor {
return utils_grpc.AuthorizationInterceptor(verifier, authConf, AdminService_AuthMethods)
}

View File

@ -0,0 +1,141 @@
{
"swagger": "2.0",
"info": {
"title": "admin service",
"version": "0.1",
"contact": {
"url": "https://github.com/caos/citadel/admin"
}
},
"schemes": [
"https"
],
"consumes": [
"application/json",
"application/grpc"
],
"produces": [
"application/json",
"application/grpc"
],
"paths": {
"/healthz": {
"get": {
"summary": "Healthz returns status OK as soon as the service started",
"operationId": "Healthz",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"properties": {}
}
}
},
"tags": [
"AdminService"
]
}
},
"/ready": {
"get": {
"summary": "Ready returns status OK as soon as all dependent services are available",
"operationId": "Ready",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"properties": {}
}
}
},
"tags": [
"AdminService"
]
}
},
"/validate": {
"get": {
"operationId": "Validate",
"responses": {
"200": {
"description": "A successful response.",
"schema": {
"$ref": "#/definitions/protobufStruct"
}
}
},
"tags": [
"AdminService"
]
}
}
},
"definitions": {
"protobufListValue": {
"type": "object",
"properties": {
"values": {
"type": "array",
"items": {
"$ref": "#/definitions/protobufValue"
},
"description": "Repeated field of dynamically typed values."
}
},
"description": "`ListValue` is a wrapper around a repeated field of values.\n\nThe JSON representation for `ListValue` is JSON array."
},
"protobufNullValue": {
"type": "string",
"enum": [
"NULL_VALUE"
],
"default": "NULL_VALUE",
"description": "`NullValue` is a singleton enumeration to represent the null value for the\n`Value` type union.\n\n The JSON representation for `NullValue` is JSON `null`.\n\n - NULL_VALUE: Null value."
},
"protobufStruct": {
"type": "object",
"properties": {
"fields": {
"type": "object",
"additionalProperties": {
"$ref": "#/definitions/protobufValue"
},
"description": "Unordered map of dynamically typed values."
}
},
"description": "`Struct` represents a structured data value, consisting of fields\nwhich map to dynamically typed values. In some languages, `Struct`\nmight be supported by a native representation. For example, in\nscripting languages like JS a struct is represented as an\nobject. The details of that representation are described together\nwith the proto support for the language.\n\nThe JSON representation for `Struct` is JSON object."
},
"protobufValue": {
"type": "object",
"properties": {
"null_value": {
"$ref": "#/definitions/protobufNullValue",
"description": "Represents a null value."
},
"number_value": {
"type": "number",
"format": "double",
"description": "Represents a double value."
},
"string_value": {
"type": "string",
"description": "Represents a string value."
},
"bool_value": {
"type": "boolean",
"format": "boolean",
"description": "Represents a boolean value."
},
"struct_value": {
"$ref": "#/definitions/protobufStruct",
"description": "Represents a structured value."
},
"list_value": {
"$ref": "#/definitions/protobufListValue",
"description": "Represents a repeated `Value`."
}
},
"description": "`Value` represents a dynamically typed value which can be either\nnull, a number, a string, a boolean, a recursive struct value, or a\nlist of values. A producer of value is expected to set one of that\nvariants, absence of any variant indicates an error.\n\nThe JSON representation for `Value` is JSON value."
}
}
}

View File

@ -0,0 +1,178 @@
// Code generated by MockGen. DO NOT EDIT.
// Source: github.com/caos/citadel/admin/api/grpc (interfaces: AdminServiceClient)
// Package api is a generated GoMock package.
package api
import (
context "context"
grpc "github.com/caos/citadel/admin/api/grpc"
gomock "github.com/golang/mock/gomock"
empty "github.com/golang/protobuf/ptypes/empty"
struct0 "github.com/golang/protobuf/ptypes/struct"
grpc0 "google.golang.org/grpc"
reflect "reflect"
)
// MockAdminServiceClient is a mock of AdminServiceClient interface
type MockAdminServiceClient struct {
ctrl *gomock.Controller
recorder *MockAdminServiceClientMockRecorder
}
// MockAdminServiceClientMockRecorder is the mock recorder for MockAdminServiceClient
type MockAdminServiceClientMockRecorder struct {
mock *MockAdminServiceClient
}
// NewMockAdminServiceClient creates a new mock instance
func NewMockAdminServiceClient(ctrl *gomock.Controller) *MockAdminServiceClient {
mock := &MockAdminServiceClient{ctrl: ctrl}
mock.recorder = &MockAdminServiceClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use
func (m *MockAdminServiceClient) EXPECT() *MockAdminServiceClientMockRecorder {
return m.recorder
}
// GetOrgByID mocks base method
func (m *MockAdminServiceClient) GetOrgByID(arg0 context.Context, arg1 *grpc.OrgID, arg2 ...grpc0.CallOption) (*grpc.Org, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "GetOrgByID", varargs...)
ret0, _ := ret[0].(*grpc.Org)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetOrgByID indicates an expected call of GetOrgByID
func (mr *MockAdminServiceClientMockRecorder) GetOrgByID(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetOrgByID", reflect.TypeOf((*MockAdminServiceClient)(nil).GetOrgByID), varargs...)
}
// Healthz mocks base method
func (m *MockAdminServiceClient) Healthz(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Healthz", varargs...)
ret0, _ := ret[0].(*empty.Empty)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Healthz indicates an expected call of Healthz
func (mr *MockAdminServiceClientMockRecorder) Healthz(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Healthz", reflect.TypeOf((*MockAdminServiceClient)(nil).Healthz), varargs...)
}
// IsOrgUnique mocks base method
func (m *MockAdminServiceClient) IsOrgUnique(arg0 context.Context, arg1 *grpc.UniqueOrgRequest, arg2 ...grpc0.CallOption) (*grpc.UniqueOrgResponse, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "IsOrgUnique", varargs...)
ret0, _ := ret[0].(*grpc.UniqueOrgResponse)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// IsOrgUnique indicates an expected call of IsOrgUnique
func (mr *MockAdminServiceClientMockRecorder) IsOrgUnique(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsOrgUnique", reflect.TypeOf((*MockAdminServiceClient)(nil).IsOrgUnique), varargs...)
}
// Ready mocks base method
func (m *MockAdminServiceClient) Ready(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*empty.Empty, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Ready", varargs...)
ret0, _ := ret[0].(*empty.Empty)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Ready indicates an expected call of Ready
func (mr *MockAdminServiceClientMockRecorder) Ready(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ready", reflect.TypeOf((*MockAdminServiceClient)(nil).Ready), varargs...)
}
// SearchOrgs mocks base method
func (m *MockAdminServiceClient) SearchOrgs(arg0 context.Context, arg1 *grpc.OrgSearchRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSearchResponse, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "SearchOrgs", varargs...)
ret0, _ := ret[0].(*grpc.OrgSearchResponse)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// SearchOrgs indicates an expected call of SearchOrgs
func (mr *MockAdminServiceClientMockRecorder) SearchOrgs(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchOrgs", reflect.TypeOf((*MockAdminServiceClient)(nil).SearchOrgs), varargs...)
}
// SetUpOrg mocks base method
func (m *MockAdminServiceClient) SetUpOrg(arg0 context.Context, arg1 *grpc.OrgSetUpRequest, arg2 ...grpc0.CallOption) (*grpc.OrgSetUpResponse, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "SetUpOrg", varargs...)
ret0, _ := ret[0].(*grpc.OrgSetUpResponse)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// SetUpOrg indicates an expected call of SetUpOrg
func (mr *MockAdminServiceClientMockRecorder) SetUpOrg(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetUpOrg", reflect.TypeOf((*MockAdminServiceClient)(nil).SetUpOrg), varargs...)
}
// Validate mocks base method
func (m *MockAdminServiceClient) Validate(arg0 context.Context, arg1 *empty.Empty, arg2 ...grpc0.CallOption) (*struct0.Struct, error) {
m.ctrl.T.Helper()
varargs := []interface{}{arg0, arg1}
for _, a := range arg2 {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Validate", varargs...)
ret0, _ := ret[0].(*struct0.Struct)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Validate indicates an expected call of Validate
func (mr *MockAdminServiceClientMockRecorder) Validate(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{arg0, arg1}, arg2...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockAdminServiceClient)(nil).Validate), varargs...)
}

View File

@ -0,0 +1,521 @@
// Code generated by protoc-gen-authmethod. DO NOT EDIT.
package grpc
import (
"google.golang.org/grpc"
utils_auth "github.com/caos/citadel/utils/auth"
utils_grpc "github.com/caos/citadel/utils/grpc"
)
/**
* ManagementService
*/
var ManagementService_AuthMethods = utils_auth.AuthMethodMapping{
"/caos.citadel.management.api.v1.ManagementService/GetUserByID": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserByEmailGlobal": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchUsers": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/IsUserUnique": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/LockUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UnlockUser": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeleteUser": utils_auth.AuthOption{
Permission: "user.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UserChanges": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ApplicationChanges": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/OrgChanges": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectChanges": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserProfile": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserProfile": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserEmail": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeUserEmail": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ResendEmailVerificationMail": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserPhone": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeUserPhone": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ResendPhoneVerificationCode": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserAddress": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserAddress": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetUserMfas": utils_auth.AuthOption{
Permission: "user.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SendSetPasswordNotification": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SetInitialPassword": utils_auth.AuthOption{
Permission: "user.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordComplexityPolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordAgePolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetPasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreatePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdatePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeletePasswordLockoutPolicy": utils_auth.AuthOption{
Permission: "policy.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgByID": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgByDomainGlobal": utils_auth.AuthOption{
Permission: "org.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateOrg": utils_auth.AuthOption{
Permission: "org.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateOrg": utils_auth.AuthOption{
Permission: "org.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetOrgMemberRoles": utils_auth.AuthOption{
Permission: "org.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/AddOrgMember": utils_auth.AuthOption{
Permission: "org.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeOrgMember": utils_auth.AuthOption{
Permission: "org.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveOrgMember": utils_auth.AuthOption{
Permission: "org.member.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchOrgMembers": utils_auth.AuthOption{
Permission: "org.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjects": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectByID": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProject": utils_auth.AuthOption{
Permission: "project.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/GetGrantedProjectGrantByID": utils_auth.AuthOption{
Permission: "project.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetProjectMemberRoles": utils_auth.AuthOption{
Permission: "project.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectMembers": utils_auth.AuthOption{
Permission: "project.member.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectMember": utils_auth.AuthOption{
Permission: "project.member.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectMember": utils_auth.AuthOption{
Permission: "project.member.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectMember": utils_auth.AuthOption{
Permission: "project.member.delete",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectRoles": utils_auth.AuthOption{
Permission: "project.role.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectRole": utils_auth.AuthOption{
Permission: "project.role.write",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectRole": utils_auth.AuthOption{
Permission: "project.role.delete",
CheckParam: "Id",
},
"/caos.citadel.management.api.v1.ManagementService/SearchApplications": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ApplicationByID": utils_auth.AuthOption{
Permission: "project.app.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateOIDCApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateApplication": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateApplicationOIDCConfig": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/RegenerateOIDCClientSecret": utils_auth.AuthOption{
Permission: "project.app.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrants": utils_auth.AuthOption{
Permission: "project.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantByID": utils_auth.AuthOption{
Permission: "project.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrant": utils_auth.AuthOption{
Permission: "project.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/GetProjectGrantMemberRoles": utils_auth.AuthOption{
Permission: "project.grant.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantMembers": utils_auth.AuthOption{
Permission: "project.grant.member.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/AddProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ChangeProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/RemoveProjectGrantMember": utils_auth.AuthOption{
Permission: "project.grant.member.delete",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchUserGrants": utils_auth.AuthOption{
Permission: "user.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UserGrantByID": utils_auth.AuthOption{
Permission: "user.grant.read",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/CreateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateUserGrant": utils_auth.AuthOption{
Permission: "user.grant.write",
CheckParam: "",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectUserGrants": utils_auth.AuthOption{
Permission: "project.user.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectUserGrantByID": utils_auth.AuthOption{
Permission: "project.user.grant.read",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectUserGrant": utils_auth.AuthOption{
Permission: "project.user.grant.write",
CheckParam: "ProjectId",
},
"/caos.citadel.management.api.v1.ManagementService/SearchProjectGrantUserGrants": utils_auth.AuthOption{
Permission: "project.grant.user.grant.read",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/ProjectGrantUserGrantByID": utils_auth.AuthOption{
Permission: "project.grant.user.grant.read",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/CreateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/UpdateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/DeactivateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
"/caos.citadel.management.api.v1.ManagementService/ReactivateProjectGrantUserGrant": utils_auth.AuthOption{
Permission: "project.grant.user.grant.write",
CheckParam: "ProjectGrantId",
},
}
func ManagementService_Authorization_Interceptor(verifier utils_auth.TokenVerifier, authConf *utils_auth.AuthConfig) grpc.UnaryServerInterceptor {
return utils_grpc.AuthorizationInterceptor(verifier, authConf, ManagementService_AuthMethods)
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff