- Add auth/login and auth/logout to mciasgrpcctl, calling the existing AuthService.Login/Logout RPCs; password is always prompted interactively (term.ReadPassword), never accepted as a flag, raw bytes zeroed after use - Add proto/mcias/v1/policy.proto with PolicyService (List, Create, Get, Update, Delete policy rules) - Regenerate gen/mcias/v1/ stubs to include policy - Implement internal/grpcserver/policyservice.go delegating to the same db layer as the REST policy handlers - Register PolicyService in grpcserver.go - Add policy list/create/get/update/delete to mciasgrpcctl - Update mciasgrpcctl man page with new commands Security: auth login uses the same interactive password prompt pattern as mciasctl; password never appears in process args, shell history, or logs; raw bytes zeroed after string conversion (same as REST CLI and REST server). Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
678 lines
21 KiB
Go
678 lines
21 KiB
Go
// AuthService: login, logout, token renewal, and TOTP management.
|
|
|
|
// Code generated by protoc-gen-go. DO NOT EDIT.
|
|
// versions:
|
|
// protoc-gen-go v1.36.11
|
|
// protoc v3.20.3
|
|
// source: mcias/v1/auth.proto
|
|
|
|
package mciasv1
|
|
|
|
import (
|
|
protoreflect "google.golang.org/protobuf/reflect/protoreflect"
|
|
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
|
timestamppb "google.golang.org/protobuf/types/known/timestamppb"
|
|
reflect "reflect"
|
|
sync "sync"
|
|
unsafe "unsafe"
|
|
)
|
|
|
|
const (
|
|
// Verify that this generated code is sufficiently up-to-date.
|
|
_ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion)
|
|
// Verify that runtime/protoimpl is sufficiently up-to-date.
|
|
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
|
|
)
|
|
|
|
// LoginRequest carries username/password and an optional TOTP code.
|
|
// Security: never logged; password and totp_code must not appear in audit logs.
|
|
type LoginRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
Username string `protobuf:"bytes,1,opt,name=username,proto3" json:"username,omitempty"`
|
|
Password string `protobuf:"bytes,2,opt,name=password,proto3" json:"password,omitempty"` // security: never logged or stored
|
|
TotpCode string `protobuf:"bytes,3,opt,name=totp_code,json=totpCode,proto3" json:"totp_code,omitempty"` // optional; required if TOTP enrolled
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *LoginRequest) Reset() {
|
|
*x = LoginRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[0]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *LoginRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*LoginRequest) ProtoMessage() {}
|
|
|
|
func (x *LoginRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[0]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use LoginRequest.ProtoReflect.Descriptor instead.
|
|
func (*LoginRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{0}
|
|
}
|
|
|
|
func (x *LoginRequest) GetUsername() string {
|
|
if x != nil {
|
|
return x.Username
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (x *LoginRequest) GetPassword() string {
|
|
if x != nil {
|
|
return x.Password
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (x *LoginRequest) GetTotpCode() string {
|
|
if x != nil {
|
|
return x.TotpCode
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// LoginResponse returns the signed JWT and its expiry time.
|
|
// Security: token is a bearer credential; the caller must protect it.
|
|
type LoginResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
Token string `protobuf:"bytes,1,opt,name=token,proto3" json:"token,omitempty"`
|
|
ExpiresAt *timestamppb.Timestamp `protobuf:"bytes,2,opt,name=expires_at,json=expiresAt,proto3" json:"expires_at,omitempty"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *LoginResponse) Reset() {
|
|
*x = LoginResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[1]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *LoginResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*LoginResponse) ProtoMessage() {}
|
|
|
|
func (x *LoginResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[1]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use LoginResponse.ProtoReflect.Descriptor instead.
|
|
func (*LoginResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{1}
|
|
}
|
|
|
|
func (x *LoginResponse) GetToken() string {
|
|
if x != nil {
|
|
return x.Token
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (x *LoginResponse) GetExpiresAt() *timestamppb.Timestamp {
|
|
if x != nil {
|
|
return x.ExpiresAt
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// LogoutRequest carries no body; the token is extracted from gRPC metadata.
|
|
type LogoutRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *LogoutRequest) Reset() {
|
|
*x = LogoutRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[2]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *LogoutRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*LogoutRequest) ProtoMessage() {}
|
|
|
|
func (x *LogoutRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[2]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use LogoutRequest.ProtoReflect.Descriptor instead.
|
|
func (*LogoutRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{2}
|
|
}
|
|
|
|
// LogoutResponse confirms the token has been revoked.
|
|
type LogoutResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *LogoutResponse) Reset() {
|
|
*x = LogoutResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[3]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *LogoutResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*LogoutResponse) ProtoMessage() {}
|
|
|
|
func (x *LogoutResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[3]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use LogoutResponse.ProtoReflect.Descriptor instead.
|
|
func (*LogoutResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{3}
|
|
}
|
|
|
|
// RenewTokenRequest carries no body; the existing token is in metadata.
|
|
type RenewTokenRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *RenewTokenRequest) Reset() {
|
|
*x = RenewTokenRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[4]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *RenewTokenRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*RenewTokenRequest) ProtoMessage() {}
|
|
|
|
func (x *RenewTokenRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[4]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use RenewTokenRequest.ProtoReflect.Descriptor instead.
|
|
func (*RenewTokenRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{4}
|
|
}
|
|
|
|
// RenewTokenResponse returns a new JWT with a fresh expiry.
|
|
type RenewTokenResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
Token string `protobuf:"bytes,1,opt,name=token,proto3" json:"token,omitempty"`
|
|
ExpiresAt *timestamppb.Timestamp `protobuf:"bytes,2,opt,name=expires_at,json=expiresAt,proto3" json:"expires_at,omitempty"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *RenewTokenResponse) Reset() {
|
|
*x = RenewTokenResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[5]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *RenewTokenResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*RenewTokenResponse) ProtoMessage() {}
|
|
|
|
func (x *RenewTokenResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[5]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use RenewTokenResponse.ProtoReflect.Descriptor instead.
|
|
func (*RenewTokenResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{5}
|
|
}
|
|
|
|
func (x *RenewTokenResponse) GetToken() string {
|
|
if x != nil {
|
|
return x.Token
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (x *RenewTokenResponse) GetExpiresAt() *timestamppb.Timestamp {
|
|
if x != nil {
|
|
return x.ExpiresAt
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// EnrollTOTPRequest carries no body; the acting account is from the JWT.
|
|
type EnrollTOTPRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *EnrollTOTPRequest) Reset() {
|
|
*x = EnrollTOTPRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[6]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *EnrollTOTPRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*EnrollTOTPRequest) ProtoMessage() {}
|
|
|
|
func (x *EnrollTOTPRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[6]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use EnrollTOTPRequest.ProtoReflect.Descriptor instead.
|
|
func (*EnrollTOTPRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{6}
|
|
}
|
|
|
|
// EnrollTOTPResponse returns the TOTP secret and otpauth URI for display.
|
|
// Security: the secret is shown once; it is stored only in encrypted form.
|
|
type EnrollTOTPResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
Secret string `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"` // base32-encoded; display once, then discard
|
|
OtpauthUri string `protobuf:"bytes,2,opt,name=otpauth_uri,json=otpauthUri,proto3" json:"otpauth_uri,omitempty"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *EnrollTOTPResponse) Reset() {
|
|
*x = EnrollTOTPResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[7]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *EnrollTOTPResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*EnrollTOTPResponse) ProtoMessage() {}
|
|
|
|
func (x *EnrollTOTPResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[7]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use EnrollTOTPResponse.ProtoReflect.Descriptor instead.
|
|
func (*EnrollTOTPResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{7}
|
|
}
|
|
|
|
func (x *EnrollTOTPResponse) GetSecret() string {
|
|
if x != nil {
|
|
return x.Secret
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (x *EnrollTOTPResponse) GetOtpauthUri() string {
|
|
if x != nil {
|
|
return x.OtpauthUri
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// ConfirmTOTPRequest carries the TOTP code to confirm enrollment.
|
|
type ConfirmTOTPRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
Code string `protobuf:"bytes,1,opt,name=code,proto3" json:"code,omitempty"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *ConfirmTOTPRequest) Reset() {
|
|
*x = ConfirmTOTPRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[8]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *ConfirmTOTPRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*ConfirmTOTPRequest) ProtoMessage() {}
|
|
|
|
func (x *ConfirmTOTPRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[8]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use ConfirmTOTPRequest.ProtoReflect.Descriptor instead.
|
|
func (*ConfirmTOTPRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{8}
|
|
}
|
|
|
|
func (x *ConfirmTOTPRequest) GetCode() string {
|
|
if x != nil {
|
|
return x.Code
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// ConfirmTOTPResponse confirms TOTP enrollment is complete.
|
|
type ConfirmTOTPResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *ConfirmTOTPResponse) Reset() {
|
|
*x = ConfirmTOTPResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[9]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *ConfirmTOTPResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*ConfirmTOTPResponse) ProtoMessage() {}
|
|
|
|
func (x *ConfirmTOTPResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[9]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use ConfirmTOTPResponse.ProtoReflect.Descriptor instead.
|
|
func (*ConfirmTOTPResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{9}
|
|
}
|
|
|
|
// RemoveTOTPRequest carries the target account ID (admin only).
|
|
type RemoveTOTPRequest struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
AccountId string `protobuf:"bytes,1,opt,name=account_id,json=accountId,proto3" json:"account_id,omitempty"` // UUID of the account to remove TOTP from
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *RemoveTOTPRequest) Reset() {
|
|
*x = RemoveTOTPRequest{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[10]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *RemoveTOTPRequest) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*RemoveTOTPRequest) ProtoMessage() {}
|
|
|
|
func (x *RemoveTOTPRequest) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[10]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use RemoveTOTPRequest.ProtoReflect.Descriptor instead.
|
|
func (*RemoveTOTPRequest) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{10}
|
|
}
|
|
|
|
func (x *RemoveTOTPRequest) GetAccountId() string {
|
|
if x != nil {
|
|
return x.AccountId
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// RemoveTOTPResponse confirms removal.
|
|
type RemoveTOTPResponse struct {
|
|
state protoimpl.MessageState `protogen:"open.v1"`
|
|
unknownFields protoimpl.UnknownFields
|
|
sizeCache protoimpl.SizeCache
|
|
}
|
|
|
|
func (x *RemoveTOTPResponse) Reset() {
|
|
*x = RemoveTOTPResponse{}
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[11]
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
|
|
func (x *RemoveTOTPResponse) String() string {
|
|
return protoimpl.X.MessageStringOf(x)
|
|
}
|
|
|
|
func (*RemoveTOTPResponse) ProtoMessage() {}
|
|
|
|
func (x *RemoveTOTPResponse) ProtoReflect() protoreflect.Message {
|
|
mi := &file_mcias_v1_auth_proto_msgTypes[11]
|
|
if x != nil {
|
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
|
if ms.LoadMessageInfo() == nil {
|
|
ms.StoreMessageInfo(mi)
|
|
}
|
|
return ms
|
|
}
|
|
return mi.MessageOf(x)
|
|
}
|
|
|
|
// Deprecated: Use RemoveTOTPResponse.ProtoReflect.Descriptor instead.
|
|
func (*RemoveTOTPResponse) Descriptor() ([]byte, []int) {
|
|
return file_mcias_v1_auth_proto_rawDescGZIP(), []int{11}
|
|
}
|
|
|
|
var File_mcias_v1_auth_proto protoreflect.FileDescriptor
|
|
|
|
const file_mcias_v1_auth_proto_rawDesc = "" +
|
|
"\n" +
|
|
"\x13mcias/v1/auth.proto\x12\bmcias.v1\x1a\x1fgoogle/protobuf/timestamp.proto\"c\n" +
|
|
"\fLoginRequest\x12\x1a\n" +
|
|
"\busername\x18\x01 \x01(\tR\busername\x12\x1a\n" +
|
|
"\bpassword\x18\x02 \x01(\tR\bpassword\x12\x1b\n" +
|
|
"\ttotp_code\x18\x03 \x01(\tR\btotpCode\"`\n" +
|
|
"\rLoginResponse\x12\x14\n" +
|
|
"\x05token\x18\x01 \x01(\tR\x05token\x129\n" +
|
|
"\n" +
|
|
"expires_at\x18\x02 \x01(\v2\x1a.google.protobuf.TimestampR\texpiresAt\"\x0f\n" +
|
|
"\rLogoutRequest\"\x10\n" +
|
|
"\x0eLogoutResponse\"\x13\n" +
|
|
"\x11RenewTokenRequest\"e\n" +
|
|
"\x12RenewTokenResponse\x12\x14\n" +
|
|
"\x05token\x18\x01 \x01(\tR\x05token\x129\n" +
|
|
"\n" +
|
|
"expires_at\x18\x02 \x01(\v2\x1a.google.protobuf.TimestampR\texpiresAt\"\x13\n" +
|
|
"\x11EnrollTOTPRequest\"M\n" +
|
|
"\x12EnrollTOTPResponse\x12\x16\n" +
|
|
"\x06secret\x18\x01 \x01(\tR\x06secret\x12\x1f\n" +
|
|
"\votpauth_uri\x18\x02 \x01(\tR\n" +
|
|
"otpauthUri\"(\n" +
|
|
"\x12ConfirmTOTPRequest\x12\x12\n" +
|
|
"\x04code\x18\x01 \x01(\tR\x04code\"\x15\n" +
|
|
"\x13ConfirmTOTPResponse\"2\n" +
|
|
"\x11RemoveTOTPRequest\x12\x1d\n" +
|
|
"\n" +
|
|
"account_id\x18\x01 \x01(\tR\taccountId\"\x14\n" +
|
|
"\x12RemoveTOTPResponse2\xab\x03\n" +
|
|
"\vAuthService\x128\n" +
|
|
"\x05Login\x12\x16.mcias.v1.LoginRequest\x1a\x17.mcias.v1.LoginResponse\x12;\n" +
|
|
"\x06Logout\x12\x17.mcias.v1.LogoutRequest\x1a\x18.mcias.v1.LogoutResponse\x12G\n" +
|
|
"\n" +
|
|
"RenewToken\x12\x1b.mcias.v1.RenewTokenRequest\x1a\x1c.mcias.v1.RenewTokenResponse\x12G\n" +
|
|
"\n" +
|
|
"EnrollTOTP\x12\x1b.mcias.v1.EnrollTOTPRequest\x1a\x1c.mcias.v1.EnrollTOTPResponse\x12J\n" +
|
|
"\vConfirmTOTP\x12\x1c.mcias.v1.ConfirmTOTPRequest\x1a\x1d.mcias.v1.ConfirmTOTPResponse\x12G\n" +
|
|
"\n" +
|
|
"RemoveTOTP\x12\x1b.mcias.v1.RemoveTOTPRequest\x1a\x1c.mcias.v1.RemoveTOTPResponseB2Z0git.wntrmute.dev/kyle/mcias/gen/mcias/v1;mciasv1b\x06proto3"
|
|
|
|
var (
|
|
file_mcias_v1_auth_proto_rawDescOnce sync.Once
|
|
file_mcias_v1_auth_proto_rawDescData []byte
|
|
)
|
|
|
|
func file_mcias_v1_auth_proto_rawDescGZIP() []byte {
|
|
file_mcias_v1_auth_proto_rawDescOnce.Do(func() {
|
|
file_mcias_v1_auth_proto_rawDescData = protoimpl.X.CompressGZIP(unsafe.Slice(unsafe.StringData(file_mcias_v1_auth_proto_rawDesc), len(file_mcias_v1_auth_proto_rawDesc)))
|
|
})
|
|
return file_mcias_v1_auth_proto_rawDescData
|
|
}
|
|
|
|
var file_mcias_v1_auth_proto_msgTypes = make([]protoimpl.MessageInfo, 12)
|
|
var file_mcias_v1_auth_proto_goTypes = []any{
|
|
(*LoginRequest)(nil), // 0: mcias.v1.LoginRequest
|
|
(*LoginResponse)(nil), // 1: mcias.v1.LoginResponse
|
|
(*LogoutRequest)(nil), // 2: mcias.v1.LogoutRequest
|
|
(*LogoutResponse)(nil), // 3: mcias.v1.LogoutResponse
|
|
(*RenewTokenRequest)(nil), // 4: mcias.v1.RenewTokenRequest
|
|
(*RenewTokenResponse)(nil), // 5: mcias.v1.RenewTokenResponse
|
|
(*EnrollTOTPRequest)(nil), // 6: mcias.v1.EnrollTOTPRequest
|
|
(*EnrollTOTPResponse)(nil), // 7: mcias.v1.EnrollTOTPResponse
|
|
(*ConfirmTOTPRequest)(nil), // 8: mcias.v1.ConfirmTOTPRequest
|
|
(*ConfirmTOTPResponse)(nil), // 9: mcias.v1.ConfirmTOTPResponse
|
|
(*RemoveTOTPRequest)(nil), // 10: mcias.v1.RemoveTOTPRequest
|
|
(*RemoveTOTPResponse)(nil), // 11: mcias.v1.RemoveTOTPResponse
|
|
(*timestamppb.Timestamp)(nil), // 12: google.protobuf.Timestamp
|
|
}
|
|
var file_mcias_v1_auth_proto_depIdxs = []int32{
|
|
12, // 0: mcias.v1.LoginResponse.expires_at:type_name -> google.protobuf.Timestamp
|
|
12, // 1: mcias.v1.RenewTokenResponse.expires_at:type_name -> google.protobuf.Timestamp
|
|
0, // 2: mcias.v1.AuthService.Login:input_type -> mcias.v1.LoginRequest
|
|
2, // 3: mcias.v1.AuthService.Logout:input_type -> mcias.v1.LogoutRequest
|
|
4, // 4: mcias.v1.AuthService.RenewToken:input_type -> mcias.v1.RenewTokenRequest
|
|
6, // 5: mcias.v1.AuthService.EnrollTOTP:input_type -> mcias.v1.EnrollTOTPRequest
|
|
8, // 6: mcias.v1.AuthService.ConfirmTOTP:input_type -> mcias.v1.ConfirmTOTPRequest
|
|
10, // 7: mcias.v1.AuthService.RemoveTOTP:input_type -> mcias.v1.RemoveTOTPRequest
|
|
1, // 8: mcias.v1.AuthService.Login:output_type -> mcias.v1.LoginResponse
|
|
3, // 9: mcias.v1.AuthService.Logout:output_type -> mcias.v1.LogoutResponse
|
|
5, // 10: mcias.v1.AuthService.RenewToken:output_type -> mcias.v1.RenewTokenResponse
|
|
7, // 11: mcias.v1.AuthService.EnrollTOTP:output_type -> mcias.v1.EnrollTOTPResponse
|
|
9, // 12: mcias.v1.AuthService.ConfirmTOTP:output_type -> mcias.v1.ConfirmTOTPResponse
|
|
11, // 13: mcias.v1.AuthService.RemoveTOTP:output_type -> mcias.v1.RemoveTOTPResponse
|
|
8, // [8:14] is the sub-list for method output_type
|
|
2, // [2:8] is the sub-list for method input_type
|
|
2, // [2:2] is the sub-list for extension type_name
|
|
2, // [2:2] is the sub-list for extension extendee
|
|
0, // [0:2] is the sub-list for field type_name
|
|
}
|
|
|
|
func init() { file_mcias_v1_auth_proto_init() }
|
|
func file_mcias_v1_auth_proto_init() {
|
|
if File_mcias_v1_auth_proto != nil {
|
|
return
|
|
}
|
|
type x struct{}
|
|
out := protoimpl.TypeBuilder{
|
|
File: protoimpl.DescBuilder{
|
|
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
|
RawDescriptor: unsafe.Slice(unsafe.StringData(file_mcias_v1_auth_proto_rawDesc), len(file_mcias_v1_auth_proto_rawDesc)),
|
|
NumEnums: 0,
|
|
NumMessages: 12,
|
|
NumExtensions: 0,
|
|
NumServices: 1,
|
|
},
|
|
GoTypes: file_mcias_v1_auth_proto_goTypes,
|
|
DependencyIndexes: file_mcias_v1_auth_proto_depIdxs,
|
|
MessageInfos: file_mcias_v1_auth_proto_msgTypes,
|
|
}.Build()
|
|
File_mcias_v1_auth_proto = out.File
|
|
file_mcias_v1_auth_proto_goTypes = nil
|
|
file_mcias_v1_auth_proto_depIdxs = nil
|
|
}
|