@pidgr/proto 0.36.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +21 -0
- package/pidgr/v1/access_code_pb.ts +247 -0
- package/pidgr/v1/action_pb.ts +94 -0
- package/pidgr/v1/api_key_pb.ts +264 -0
- package/pidgr/v1/campaign_pb.ts +761 -0
- package/pidgr/v1/common_pb.ts +904 -0
- package/pidgr/v1/device_pb.ts +374 -0
- package/pidgr/v1/group_pb.ts +672 -0
- package/pidgr/v1/heatmap_pb.ts +579 -0
- package/pidgr/v1/inbox_pb.ts +254 -0
- package/pidgr/v1/member_pb.ts +495 -0
- package/pidgr/v1/organization_pb.ts +496 -0
- package/pidgr/v1/render_pb.ts +137 -0
- package/pidgr/v1/replay_pb.ts +229 -0
- package/pidgr/v1/role_pb.ts +254 -0
- package/pidgr/v1/sso_pb.ts +409 -0
- package/pidgr/v1/team_pb.ts +590 -0
- package/pidgr/v1/template_pb.ts +517 -0
- package/pidgr/v1/user_pb.ts +290 -0
|
@@ -0,0 +1,409 @@
|
|
|
1
|
+
// @generated by protoc-gen-es v2.11.0 with parameter "target=ts"
|
|
2
|
+
// @generated from file pidgr/v1/sso.proto (package pidgr.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
|
|
5
|
+
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
6
|
+
import { enumDesc, fileDesc, messageDesc, serviceDesc } from "@bufbuild/protobuf/codegenv2";
|
|
7
|
+
import type { Timestamp } from "@bufbuild/protobuf/wkt";
|
|
8
|
+
import { file_google_protobuf_timestamp } from "@bufbuild/protobuf/wkt";
|
|
9
|
+
import type { Message } from "@bufbuild/protobuf";
|
|
10
|
+
|
|
11
|
+
/**
|
|
12
|
+
* Describes the file pidgr/v1/sso.proto.
|
|
13
|
+
*/
|
|
14
|
+
export const file_pidgr_v1_sso: GenFile = /*@__PURE__*/
|
|
15
|
+
fileDesc("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", [file_google_protobuf_timestamp]);
|
|
16
|
+
|
|
17
|
+
/**
|
|
18
|
+
* Custom SAML attribute name overrides for identity providers that use
|
|
19
|
+
* non-standard attribute names. When provided, these override the
|
|
20
|
+
* auto-detected values from the metadata URL host.
|
|
21
|
+
*
|
|
22
|
+
* @generated from message pidgr.v1.SSOAttributeMapping
|
|
23
|
+
*/
|
|
24
|
+
export type SSOAttributeMapping = Message<"pidgr.v1.SSOAttributeMapping"> & {
|
|
25
|
+
/**
|
|
26
|
+
* SAML attribute name for the user's email address.
|
|
27
|
+
*
|
|
28
|
+
* @generated from field: string email = 1;
|
|
29
|
+
*/
|
|
30
|
+
email: string;
|
|
31
|
+
|
|
32
|
+
/**
|
|
33
|
+
* SAML attribute name for the user's first name.
|
|
34
|
+
*
|
|
35
|
+
* @generated from field: string given_name = 2;
|
|
36
|
+
*/
|
|
37
|
+
givenName: string;
|
|
38
|
+
|
|
39
|
+
/**
|
|
40
|
+
* SAML attribute name for the user's last name.
|
|
41
|
+
*
|
|
42
|
+
* @generated from field: string family_name = 3;
|
|
43
|
+
*/
|
|
44
|
+
familyName: string;
|
|
45
|
+
};
|
|
46
|
+
|
|
47
|
+
/**
|
|
48
|
+
* Describes the message pidgr.v1.SSOAttributeMapping.
|
|
49
|
+
* Use `create(SSOAttributeMappingSchema)` to create a new message.
|
|
50
|
+
*/
|
|
51
|
+
export const SSOAttributeMappingSchema: GenMessage<SSOAttributeMapping> = /*@__PURE__*/
|
|
52
|
+
messageDesc(file_pidgr_v1_sso, 0);
|
|
53
|
+
|
|
54
|
+
/**
|
|
55
|
+
* An SSO identity provider configured for an organization.
|
|
56
|
+
*
|
|
57
|
+
* @generated from message pidgr.v1.SSOProvider
|
|
58
|
+
*/
|
|
59
|
+
export type SSOProvider = Message<"pidgr.v1.SSOProvider"> & {
|
|
60
|
+
/**
|
|
61
|
+
* Unique identifier for the provider.
|
|
62
|
+
*
|
|
63
|
+
* @generated from field: string id = 1;
|
|
64
|
+
*/
|
|
65
|
+
id: string;
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Email domain that triggers this SSO provider (e.g. "acme.com").
|
|
69
|
+
* Constraints: Max length 253 characters (RFC 1035).
|
|
70
|
+
*
|
|
71
|
+
* @generated from field: string domain = 2;
|
|
72
|
+
*/
|
|
73
|
+
domain: string;
|
|
74
|
+
|
|
75
|
+
/**
|
|
76
|
+
* Type of identity provider.
|
|
77
|
+
*
|
|
78
|
+
* @generated from field: pidgr.v1.SSOProviderType type = 3;
|
|
79
|
+
*/
|
|
80
|
+
type: SSOProviderType;
|
|
81
|
+
|
|
82
|
+
/**
|
|
83
|
+
* SAML metadata URL or OIDC discovery URL.
|
|
84
|
+
* Constraints: Max length 2048 characters. HTTPS required.
|
|
85
|
+
*
|
|
86
|
+
* @generated from field: string metadata_url = 4;
|
|
87
|
+
*/
|
|
88
|
+
metadataUrl: string;
|
|
89
|
+
|
|
90
|
+
/**
|
|
91
|
+
* Name of the identity provider (used for signInWithRedirect).
|
|
92
|
+
* Set by the API when the IdP is created.
|
|
93
|
+
*
|
|
94
|
+
* @generated from field: string idp_provider_name = 5;
|
|
95
|
+
*/
|
|
96
|
+
idpProviderName: string;
|
|
97
|
+
|
|
98
|
+
/**
|
|
99
|
+
* Timestamp when the provider was created.
|
|
100
|
+
*
|
|
101
|
+
* @generated from field: google.protobuf.Timestamp created_at = 6;
|
|
102
|
+
*/
|
|
103
|
+
createdAt?: Timestamp;
|
|
104
|
+
|
|
105
|
+
/**
|
|
106
|
+
* Timestamp when the provider was last updated.
|
|
107
|
+
*
|
|
108
|
+
* @generated from field: google.protobuf.Timestamp updated_at = 7;
|
|
109
|
+
*/
|
|
110
|
+
updatedAt?: Timestamp;
|
|
111
|
+
|
|
112
|
+
/**
|
|
113
|
+
* Optional custom SAML attribute name overrides.
|
|
114
|
+
*
|
|
115
|
+
* @generated from field: pidgr.v1.SSOAttributeMapping attribute_mapping = 8;
|
|
116
|
+
*/
|
|
117
|
+
attributeMapping?: SSOAttributeMapping;
|
|
118
|
+
};
|
|
119
|
+
|
|
120
|
+
/**
|
|
121
|
+
* Describes the message pidgr.v1.SSOProvider.
|
|
122
|
+
* Use `create(SSOProviderSchema)` to create a new message.
|
|
123
|
+
*/
|
|
124
|
+
export const SSOProviderSchema: GenMessage<SSOProvider> = /*@__PURE__*/
|
|
125
|
+
messageDesc(file_pidgr_v1_sso, 1);
|
|
126
|
+
|
|
127
|
+
/**
|
|
128
|
+
* Request to check if an email domain has SSO configured.
|
|
129
|
+
* This RPC is pre-authentication — no JWT required.
|
|
130
|
+
*
|
|
131
|
+
* @generated from message pidgr.v1.CheckSSOByDomainRequest
|
|
132
|
+
*/
|
|
133
|
+
export type CheckSSOByDomainRequest = Message<"pidgr.v1.CheckSSOByDomainRequest"> & {
|
|
134
|
+
/**
|
|
135
|
+
* Email address to check. The domain part is extracted.
|
|
136
|
+
* Constraints: Max length 254 characters (RFC 5321).
|
|
137
|
+
*
|
|
138
|
+
* @generated from field: string email = 1;
|
|
139
|
+
*/
|
|
140
|
+
email: string;
|
|
141
|
+
};
|
|
142
|
+
|
|
143
|
+
/**
|
|
144
|
+
* Describes the message pidgr.v1.CheckSSOByDomainRequest.
|
|
145
|
+
* Use `create(CheckSSOByDomainRequestSchema)` to create a new message.
|
|
146
|
+
*/
|
|
147
|
+
export const CheckSSOByDomainRequestSchema: GenMessage<CheckSSOByDomainRequest> = /*@__PURE__*/
|
|
148
|
+
messageDesc(file_pidgr_v1_sso, 2);
|
|
149
|
+
|
|
150
|
+
/**
|
|
151
|
+
* Response for SSO domain check.
|
|
152
|
+
*
|
|
153
|
+
* @generated from message pidgr.v1.CheckSSOByDomainResponse
|
|
154
|
+
*/
|
|
155
|
+
export type CheckSSOByDomainResponse = Message<"pidgr.v1.CheckSSOByDomainResponse"> & {
|
|
156
|
+
/**
|
|
157
|
+
* Whether SSO is enabled for the email's domain.
|
|
158
|
+
*
|
|
159
|
+
* @generated from field: bool sso_enabled = 1;
|
|
160
|
+
*/
|
|
161
|
+
ssoEnabled: boolean;
|
|
162
|
+
|
|
163
|
+
/**
|
|
164
|
+
* Identity provider name for signInWithRedirect.
|
|
165
|
+
* Empty if sso_enabled is false.
|
|
166
|
+
*
|
|
167
|
+
* @generated from field: string provider_name = 2;
|
|
168
|
+
*/
|
|
169
|
+
providerName: string;
|
|
170
|
+
};
|
|
171
|
+
|
|
172
|
+
/**
|
|
173
|
+
* Describes the message pidgr.v1.CheckSSOByDomainResponse.
|
|
174
|
+
* Use `create(CheckSSOByDomainResponseSchema)` to create a new message.
|
|
175
|
+
*/
|
|
176
|
+
export const CheckSSOByDomainResponseSchema: GenMessage<CheckSSOByDomainResponse> = /*@__PURE__*/
|
|
177
|
+
messageDesc(file_pidgr_v1_sso, 3);
|
|
178
|
+
|
|
179
|
+
/**
|
|
180
|
+
* Request to create an SSO provider for the organization.
|
|
181
|
+
*
|
|
182
|
+
* @generated from message pidgr.v1.CreateSSOProviderRequest
|
|
183
|
+
*/
|
|
184
|
+
export type CreateSSOProviderRequest = Message<"pidgr.v1.CreateSSOProviderRequest"> & {
|
|
185
|
+
/**
|
|
186
|
+
* Email domain to associate (e.g. "acme.com").
|
|
187
|
+
* Constraints: Max length 253 characters (RFC 1035).
|
|
188
|
+
*
|
|
189
|
+
* @generated from field: string domain = 1;
|
|
190
|
+
*/
|
|
191
|
+
domain: string;
|
|
192
|
+
|
|
193
|
+
/**
|
|
194
|
+
* Type of identity provider.
|
|
195
|
+
*
|
|
196
|
+
* @generated from field: pidgr.v1.SSOProviderType type = 2;
|
|
197
|
+
*/
|
|
198
|
+
type: SSOProviderType;
|
|
199
|
+
|
|
200
|
+
/**
|
|
201
|
+
* SAML metadata URL or OIDC discovery URL.
|
|
202
|
+
* Constraints: Max length 2048 characters. HTTPS required.
|
|
203
|
+
*
|
|
204
|
+
* @generated from field: string metadata_url = 3;
|
|
205
|
+
*/
|
|
206
|
+
metadataUrl: string;
|
|
207
|
+
|
|
208
|
+
/**
|
|
209
|
+
* Optional custom SAML attribute name overrides.
|
|
210
|
+
* When omitted, attribute names are auto-detected from the metadata URL.
|
|
211
|
+
*
|
|
212
|
+
* @generated from field: pidgr.v1.SSOAttributeMapping attribute_mapping = 4;
|
|
213
|
+
*/
|
|
214
|
+
attributeMapping?: SSOAttributeMapping;
|
|
215
|
+
};
|
|
216
|
+
|
|
217
|
+
/**
|
|
218
|
+
* Describes the message pidgr.v1.CreateSSOProviderRequest.
|
|
219
|
+
* Use `create(CreateSSOProviderRequestSchema)` to create a new message.
|
|
220
|
+
*/
|
|
221
|
+
export const CreateSSOProviderRequestSchema: GenMessage<CreateSSOProviderRequest> = /*@__PURE__*/
|
|
222
|
+
messageDesc(file_pidgr_v1_sso, 4);
|
|
223
|
+
|
|
224
|
+
/**
|
|
225
|
+
* Response after creating an SSO provider.
|
|
226
|
+
*
|
|
227
|
+
* @generated from message pidgr.v1.CreateSSOProviderResponse
|
|
228
|
+
*/
|
|
229
|
+
export type CreateSSOProviderResponse = Message<"pidgr.v1.CreateSSOProviderResponse"> & {
|
|
230
|
+
/**
|
|
231
|
+
* The newly created SSO provider.
|
|
232
|
+
*
|
|
233
|
+
* @generated from field: pidgr.v1.SSOProvider provider = 1;
|
|
234
|
+
*/
|
|
235
|
+
provider?: SSOProvider;
|
|
236
|
+
};
|
|
237
|
+
|
|
238
|
+
/**
|
|
239
|
+
* Describes the message pidgr.v1.CreateSSOProviderResponse.
|
|
240
|
+
* Use `create(CreateSSOProviderResponseSchema)` to create a new message.
|
|
241
|
+
*/
|
|
242
|
+
export const CreateSSOProviderResponseSchema: GenMessage<CreateSSOProviderResponse> = /*@__PURE__*/
|
|
243
|
+
messageDesc(file_pidgr_v1_sso, 5);
|
|
244
|
+
|
|
245
|
+
/**
|
|
246
|
+
* Request to get the SSO provider for the organization.
|
|
247
|
+
* Returns the provider if one is configured, or empty if not.
|
|
248
|
+
*
|
|
249
|
+
* @generated from message pidgr.v1.GetSSOProviderRequest
|
|
250
|
+
*/
|
|
251
|
+
export type GetSSOProviderRequest = Message<"pidgr.v1.GetSSOProviderRequest"> & {
|
|
252
|
+
};
|
|
253
|
+
|
|
254
|
+
/**
|
|
255
|
+
* Describes the message pidgr.v1.GetSSOProviderRequest.
|
|
256
|
+
* Use `create(GetSSOProviderRequestSchema)` to create a new message.
|
|
257
|
+
*/
|
|
258
|
+
export const GetSSOProviderRequestSchema: GenMessage<GetSSOProviderRequest> = /*@__PURE__*/
|
|
259
|
+
messageDesc(file_pidgr_v1_sso, 6);
|
|
260
|
+
|
|
261
|
+
/**
|
|
262
|
+
* Response containing the organization's SSO provider.
|
|
263
|
+
*
|
|
264
|
+
* @generated from message pidgr.v1.GetSSOProviderResponse
|
|
265
|
+
*/
|
|
266
|
+
export type GetSSOProviderResponse = Message<"pidgr.v1.GetSSOProviderResponse"> & {
|
|
267
|
+
/**
|
|
268
|
+
* The organization's SSO provider, or null if not configured.
|
|
269
|
+
*
|
|
270
|
+
* @generated from field: pidgr.v1.SSOProvider provider = 1;
|
|
271
|
+
*/
|
|
272
|
+
provider?: SSOProvider;
|
|
273
|
+
};
|
|
274
|
+
|
|
275
|
+
/**
|
|
276
|
+
* Describes the message pidgr.v1.GetSSOProviderResponse.
|
|
277
|
+
* Use `create(GetSSOProviderResponseSchema)` to create a new message.
|
|
278
|
+
*/
|
|
279
|
+
export const GetSSOProviderResponseSchema: GenMessage<GetSSOProviderResponse> = /*@__PURE__*/
|
|
280
|
+
messageDesc(file_pidgr_v1_sso, 7);
|
|
281
|
+
|
|
282
|
+
/**
|
|
283
|
+
* Request to delete the organization's SSO provider.
|
|
284
|
+
*
|
|
285
|
+
* @generated from message pidgr.v1.DeleteSSOProviderRequest
|
|
286
|
+
*/
|
|
287
|
+
export type DeleteSSOProviderRequest = Message<"pidgr.v1.DeleteSSOProviderRequest"> & {
|
|
288
|
+
/**
|
|
289
|
+
* ID of the provider to delete.
|
|
290
|
+
*
|
|
291
|
+
* @generated from field: string provider_id = 1;
|
|
292
|
+
*/
|
|
293
|
+
providerId: string;
|
|
294
|
+
};
|
|
295
|
+
|
|
296
|
+
/**
|
|
297
|
+
* Describes the message pidgr.v1.DeleteSSOProviderRequest.
|
|
298
|
+
* Use `create(DeleteSSOProviderRequestSchema)` to create a new message.
|
|
299
|
+
*/
|
|
300
|
+
export const DeleteSSOProviderRequestSchema: GenMessage<DeleteSSOProviderRequest> = /*@__PURE__*/
|
|
301
|
+
messageDesc(file_pidgr_v1_sso, 8);
|
|
302
|
+
|
|
303
|
+
/**
|
|
304
|
+
* Response after deleting an SSO provider.
|
|
305
|
+
*
|
|
306
|
+
* @generated from message pidgr.v1.DeleteSSOProviderResponse
|
|
307
|
+
*/
|
|
308
|
+
export type DeleteSSOProviderResponse = Message<"pidgr.v1.DeleteSSOProviderResponse"> & {
|
|
309
|
+
};
|
|
310
|
+
|
|
311
|
+
/**
|
|
312
|
+
* Describes the message pidgr.v1.DeleteSSOProviderResponse.
|
|
313
|
+
* Use `create(DeleteSSOProviderResponseSchema)` to create a new message.
|
|
314
|
+
*/
|
|
315
|
+
export const DeleteSSOProviderResponseSchema: GenMessage<DeleteSSOProviderResponse> = /*@__PURE__*/
|
|
316
|
+
messageDesc(file_pidgr_v1_sso, 9);
|
|
317
|
+
|
|
318
|
+
/**
|
|
319
|
+
* Type of SSO identity provider.
|
|
320
|
+
*
|
|
321
|
+
* @generated from enum pidgr.v1.SSOProviderType
|
|
322
|
+
*/
|
|
323
|
+
export enum SSOProviderType {
|
|
324
|
+
/**
|
|
325
|
+
* Default value; not a valid type.
|
|
326
|
+
*
|
|
327
|
+
* @generated from enum value: SSO_PROVIDER_TYPE_UNSPECIFIED = 0;
|
|
328
|
+
*/
|
|
329
|
+
SSO_PROVIDER_TYPE_UNSPECIFIED = 0,
|
|
330
|
+
|
|
331
|
+
/**
|
|
332
|
+
* SAML 2.0 identity provider (e.g. Okta, Azure AD).
|
|
333
|
+
*
|
|
334
|
+
* @generated from enum value: SSO_PROVIDER_TYPE_SAML = 1;
|
|
335
|
+
*/
|
|
336
|
+
SSO_PROVIDER_TYPE_SAML = 1,
|
|
337
|
+
|
|
338
|
+
/**
|
|
339
|
+
* OpenID Connect identity provider (e.g. Google Workspace, Auth0).
|
|
340
|
+
*
|
|
341
|
+
* @generated from enum value: SSO_PROVIDER_TYPE_OIDC = 2;
|
|
342
|
+
*/
|
|
343
|
+
SSO_PROVIDER_TYPE_OIDC = 2,
|
|
344
|
+
}
|
|
345
|
+
|
|
346
|
+
/**
|
|
347
|
+
* Describes the enum pidgr.v1.SSOProviderType.
|
|
348
|
+
*/
|
|
349
|
+
export const SSOProviderTypeSchema: GenEnum<SSOProviderType> = /*@__PURE__*/
|
|
350
|
+
enumDesc(file_pidgr_v1_sso, 0);
|
|
351
|
+
|
|
352
|
+
/**
|
|
353
|
+
* Manages SSO identity provider configuration for organizations.
|
|
354
|
+
*
|
|
355
|
+
* @generated from service pidgr.v1.SSOService
|
|
356
|
+
*/
|
|
357
|
+
export const SSOService: GenService<{
|
|
358
|
+
/**
|
|
359
|
+
* Check if an email domain has SSO configured.
|
|
360
|
+
* This is a pre-authentication endpoint — no JWT required.
|
|
361
|
+
* Authorization: None (public).
|
|
362
|
+
*
|
|
363
|
+
* @generated from rpc pidgr.v1.SSOService.CheckSSOByDomain
|
|
364
|
+
*/
|
|
365
|
+
checkSSOByDomain: {
|
|
366
|
+
methodKind: "unary";
|
|
367
|
+
input: typeof CheckSSOByDomainRequestSchema;
|
|
368
|
+
output: typeof CheckSSOByDomainResponseSchema;
|
|
369
|
+
},
|
|
370
|
+
/**
|
|
371
|
+
* Create an SSO provider for the organization.
|
|
372
|
+
* Validates the metadata URL before saving.
|
|
373
|
+
* Creates the corresponding identity provider in the auth service.
|
|
374
|
+
* Authorization: Requires PERMISSION_ORG_WRITE.
|
|
375
|
+
*
|
|
376
|
+
* @generated from rpc pidgr.v1.SSOService.CreateSSOProvider
|
|
377
|
+
*/
|
|
378
|
+
createSSOProvider: {
|
|
379
|
+
methodKind: "unary";
|
|
380
|
+
input: typeof CreateSSOProviderRequestSchema;
|
|
381
|
+
output: typeof CreateSSOProviderResponseSchema;
|
|
382
|
+
},
|
|
383
|
+
/**
|
|
384
|
+
* Get the organization's SSO provider configuration.
|
|
385
|
+
* Authorization: Requires PERMISSION_ORG_READ.
|
|
386
|
+
*
|
|
387
|
+
* @generated from rpc pidgr.v1.SSOService.GetSSOProvider
|
|
388
|
+
*/
|
|
389
|
+
getSSOProvider: {
|
|
390
|
+
methodKind: "unary";
|
|
391
|
+
input: typeof GetSSOProviderRequestSchema;
|
|
392
|
+
output: typeof GetSSOProviderResponseSchema;
|
|
393
|
+
},
|
|
394
|
+
/**
|
|
395
|
+
* Delete the organization's SSO provider.
|
|
396
|
+
* Deletes the corresponding identity provider from the auth service.
|
|
397
|
+
* Users with that domain fall back to passkey/OTP.
|
|
398
|
+
* Authorization: Requires PERMISSION_ORG_WRITE.
|
|
399
|
+
*
|
|
400
|
+
* @generated from rpc pidgr.v1.SSOService.DeleteSSOProvider
|
|
401
|
+
*/
|
|
402
|
+
deleteSSOProvider: {
|
|
403
|
+
methodKind: "unary";
|
|
404
|
+
input: typeof DeleteSSOProviderRequestSchema;
|
|
405
|
+
output: typeof DeleteSSOProviderResponseSchema;
|
|
406
|
+
},
|
|
407
|
+
}> = /*@__PURE__*/
|
|
408
|
+
serviceDesc(file_pidgr_v1_sso, 0);
|
|
409
|
+
|