#![allow(unknown_lints)]
#![allow(clippy)]
#![cfg_attr(rustfmt, rustfmt_skip)]
#![allow(box_pointers)]
#![allow(dead_code)]
#![allow(missing_docs)]
#![allow(non_camel_case_types)]
#![allow(non_snake_case)]
#![allow(non_upper_case_globals)]
#![allow(trivial_casts)]
#![allow(unsafe_code)]
#![allow(unused_imports)]
#![allow(unused_results)]
use protobuf::Message as Message_imported_for_functions;
use protobuf::ProtobufEnum as ProtobufEnum_imported_for_functions;
#[derive(PartialEq,Clone,Default)]
pub struct Authentication {
pub rules: ::protobuf::RepeatedField<AuthenticationRule>,
pub providers: ::protobuf::RepeatedField<AuthProvider>,
unknown_fields: ::protobuf::UnknownFields,
cached_size: ::protobuf::CachedSize,
}
impl Authentication {
pub fn new() -> Authentication {
::std::default::Default::default()
}
pub fn clear_rules(&mut self) {
self.rules.clear();
}
pub fn set_rules(&mut self, v: ::protobuf::RepeatedField<AuthenticationRule>) {
self.rules = v;
}
pub fn mut_rules(&mut self) -> &mut ::protobuf::RepeatedField<AuthenticationRule> {
&mut self.rules
}
pub fn take_rules(&mut self) -> ::protobuf::RepeatedField<AuthenticationRule> {
::std::mem::replace(&mut self.rules, ::protobuf::RepeatedField::new())
}
pub fn get_rules(&self) -> &[AuthenticationRule] {
&self.rules
}
pub fn clear_providers(&mut self) {
self.providers.clear();
}
pub fn set_providers(&mut self, v: ::protobuf::RepeatedField<AuthProvider>) {
self.providers = v;
}
pub fn mut_providers(&mut self) -> &mut ::protobuf::RepeatedField<AuthProvider> {
&mut self.providers
}
pub fn take_providers(&mut self) -> ::protobuf::RepeatedField<AuthProvider> {
::std::mem::replace(&mut self.providers, ::protobuf::RepeatedField::new())
}
pub fn get_providers(&self) -> &[AuthProvider] {
&self.providers
}
}
impl ::protobuf::Message for Authentication {
fn is_initialized(&self) -> bool {
for v in &self.rules {
if !v.is_initialized() {
return false;
}
};
for v in &self.providers {
if !v.is_initialized() {
return false;
}
};
true
}
fn merge_from(&mut self, is: &mut ::protobuf::CodedInputStream) -> ::protobuf::ProtobufResult<()> {
while !is.eof()? {
let (field_number, wire_type) = is.read_tag_unpack()?;
match field_number {
3 => {
::protobuf::rt::read_repeated_message_into(wire_type, is, &mut self.rules)?;
},
4 => {
::protobuf::rt::read_repeated_message_into(wire_type, is, &mut self.providers)?;
},
_ => {
::protobuf::rt::read_unknown_or_skip_group(field_number, wire_type, is, self.mut_unknown_fields())?;
},
};
}
::std::result::Result::Ok(())
}
#[allow(unused_variables)]
fn compute_size(&self) -> u32 {
let mut my_size = 0;
for value in &self.rules {
let len = value.compute_size();
my_size += 1 + ::protobuf::rt::compute_raw_varint32_size(len) + len;
};
for value in &self.providers {
let len = value.compute_size();
my_size += 1 + ::protobuf::rt::compute_raw_varint32_size(len) + len;
};
my_size += ::protobuf::rt::unknown_fields_size(self.get_unknown_fields());
self.cached_size.set(my_size);
my_size
}
fn write_to_with_cached_sizes(&self, os: &mut ::protobuf::CodedOutputStream) -> ::protobuf::ProtobufResult<()> {
for v in &self.rules {
os.write_tag(3, ::protobuf::wire_format::WireTypeLengthDelimited)?;
os.write_raw_varint32(v.get_cached_size())?;
v.write_to_with_cached_sizes(os)?;
};
for v in &self.providers {
os.write_tag(4, ::protobuf::wire_format::WireTypeLengthDelimited)?;
os.write_raw_varint32(v.get_cached_size())?;
v.write_to_with_cached_sizes(os)?;
};
os.write_unknown_fields(self.get_unknown_fields())?;
::std::result::Result::Ok(())
}
fn get_cached_size(&self) -> u32 {
self.cached_size.get()
}
fn get_unknown_fields(&self) -> &::protobuf::UnknownFields {
&self.unknown_fields
}
fn mut_unknown_fields(&mut self) -> &mut ::protobuf::UnknownFields {
&mut self.unknown_fields
}
fn as_any(&self) -> &::std::any::Any {
self as &::std::any::Any
}
fn as_any_mut(&mut self) -> &mut ::std::any::Any {
self as &mut ::std::any::Any
}
fn into_any(self: Box<Self>) -> ::std::boxed::Box<::std::any::Any> {
self
}
fn descriptor(&self) -> &'static ::protobuf::reflect::MessageDescriptor {
Self::descriptor_static()
}
fn new() -> Authentication {
Authentication::new()
}
fn descriptor_static() -> &'static ::protobuf::reflect::MessageDescriptor {
static mut descriptor: ::protobuf::lazy::Lazy<::protobuf::reflect::MessageDescriptor> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::reflect::MessageDescriptor,
};
unsafe {
descriptor.get(|| {
let mut fields = ::std::vec::Vec::new();
fields.push(::protobuf::reflect::accessor::make_repeated_field_accessor::<_, ::protobuf::types::ProtobufTypeMessage<AuthenticationRule>>(
"rules",
|m: &Authentication| { &m.rules },
|m: &mut Authentication| { &mut m.rules },
));
fields.push(::protobuf::reflect::accessor::make_repeated_field_accessor::<_, ::protobuf::types::ProtobufTypeMessage<AuthProvider>>(
"providers",
|m: &Authentication| { &m.providers },
|m: &mut Authentication| { &mut m.providers },
));
::protobuf::reflect::MessageDescriptor::new::<Authentication>(
"Authentication",
fields,
file_descriptor_proto()
)
})
}
}
fn default_instance() -> &'static Authentication {
static mut instance: ::protobuf::lazy::Lazy<Authentication> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const Authentication,
};
unsafe {
instance.get(Authentication::new)
}
}
}
impl ::protobuf::Clear for Authentication {
fn clear(&mut self) {
self.clear_rules();
self.clear_providers();
self.unknown_fields.clear();
}
}
impl ::std::fmt::Debug for Authentication {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
::protobuf::text_format::fmt(self, f)
}
}
impl ::protobuf::reflect::ProtobufValue for Authentication {
fn as_ref(&self) -> ::protobuf::reflect::ProtobufValueRef {
::protobuf::reflect::ProtobufValueRef::Message(self)
}
}
#[derive(PartialEq,Clone,Default)]
pub struct AuthenticationRule {
pub selector: ::std::string::String,
pub oauth: ::protobuf::SingularPtrField<OAuthRequirements>,
pub allow_without_credential: bool,
pub requirements: ::protobuf::RepeatedField<AuthRequirement>,
unknown_fields: ::protobuf::UnknownFields,
cached_size: ::protobuf::CachedSize,
}
impl AuthenticationRule {
pub fn new() -> AuthenticationRule {
::std::default::Default::default()
}
pub fn clear_selector(&mut self) {
self.selector.clear();
}
pub fn set_selector(&mut self, v: ::std::string::String) {
self.selector = v;
}
pub fn mut_selector(&mut self) -> &mut ::std::string::String {
&mut self.selector
}
pub fn take_selector(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.selector, ::std::string::String::new())
}
pub fn get_selector(&self) -> &str {
&self.selector
}
pub fn clear_oauth(&mut self) {
self.oauth.clear();
}
pub fn has_oauth(&self) -> bool {
self.oauth.is_some()
}
pub fn set_oauth(&mut self, v: OAuthRequirements) {
self.oauth = ::protobuf::SingularPtrField::some(v);
}
pub fn mut_oauth(&mut self) -> &mut OAuthRequirements {
if self.oauth.is_none() {
self.oauth.set_default();
}
self.oauth.as_mut().unwrap()
}
pub fn take_oauth(&mut self) -> OAuthRequirements {
self.oauth.take().unwrap_or_else(|| OAuthRequirements::new())
}
pub fn get_oauth(&self) -> &OAuthRequirements {
self.oauth.as_ref().unwrap_or_else(|| OAuthRequirements::default_instance())
}
pub fn clear_allow_without_credential(&mut self) {
self.allow_without_credential = false;
}
pub fn set_allow_without_credential(&mut self, v: bool) {
self.allow_without_credential = v;
}
pub fn get_allow_without_credential(&self) -> bool {
self.allow_without_credential
}
pub fn clear_requirements(&mut self) {
self.requirements.clear();
}
pub fn set_requirements(&mut self, v: ::protobuf::RepeatedField<AuthRequirement>) {
self.requirements = v;
}
pub fn mut_requirements(&mut self) -> &mut ::protobuf::RepeatedField<AuthRequirement> {
&mut self.requirements
}
pub fn take_requirements(&mut self) -> ::protobuf::RepeatedField<AuthRequirement> {
::std::mem::replace(&mut self.requirements, ::protobuf::RepeatedField::new())
}
pub fn get_requirements(&self) -> &[AuthRequirement] {
&self.requirements
}
}
impl ::protobuf::Message for AuthenticationRule {
fn is_initialized(&self) -> bool {
for v in &self.oauth {
if !v.is_initialized() {
return false;
}
};
for v in &self.requirements {
if !v.is_initialized() {
return false;
}
};
true
}
fn merge_from(&mut self, is: &mut ::protobuf::CodedInputStream) -> ::protobuf::ProtobufResult<()> {
while !is.eof()? {
let (field_number, wire_type) = is.read_tag_unpack()?;
match field_number {
1 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.selector)?;
},
2 => {
::protobuf::rt::read_singular_message_into(wire_type, is, &mut self.oauth)?;
},
5 => {
if wire_type != ::protobuf::wire_format::WireTypeVarint {
return ::std::result::Result::Err(::protobuf::rt::unexpected_wire_type(wire_type));
}
let tmp = is.read_bool()?;
self.allow_without_credential = tmp;
},
7 => {
::protobuf::rt::read_repeated_message_into(wire_type, is, &mut self.requirements)?;
},
_ => {
::protobuf::rt::read_unknown_or_skip_group(field_number, wire_type, is, self.mut_unknown_fields())?;
},
};
}
::std::result::Result::Ok(())
}
#[allow(unused_variables)]
fn compute_size(&self) -> u32 {
let mut my_size = 0;
if !self.selector.is_empty() {
my_size += ::protobuf::rt::string_size(1, &self.selector);
}
if let Some(ref v) = self.oauth.as_ref() {
let len = v.compute_size();
my_size += 1 + ::protobuf::rt::compute_raw_varint32_size(len) + len;
}
if self.allow_without_credential != false {
my_size += 2;
}
for value in &self.requirements {
let len = value.compute_size();
my_size += 1 + ::protobuf::rt::compute_raw_varint32_size(len) + len;
};
my_size += ::protobuf::rt::unknown_fields_size(self.get_unknown_fields());
self.cached_size.set(my_size);
my_size
}
fn write_to_with_cached_sizes(&self, os: &mut ::protobuf::CodedOutputStream) -> ::protobuf::ProtobufResult<()> {
if !self.selector.is_empty() {
os.write_string(1, &self.selector)?;
}
if let Some(ref v) = self.oauth.as_ref() {
os.write_tag(2, ::protobuf::wire_format::WireTypeLengthDelimited)?;
os.write_raw_varint32(v.get_cached_size())?;
v.write_to_with_cached_sizes(os)?;
}
if self.allow_without_credential != false {
os.write_bool(5, self.allow_without_credential)?;
}
for v in &self.requirements {
os.write_tag(7, ::protobuf::wire_format::WireTypeLengthDelimited)?;
os.write_raw_varint32(v.get_cached_size())?;
v.write_to_with_cached_sizes(os)?;
};
os.write_unknown_fields(self.get_unknown_fields())?;
::std::result::Result::Ok(())
}
fn get_cached_size(&self) -> u32 {
self.cached_size.get()
}
fn get_unknown_fields(&self) -> &::protobuf::UnknownFields {
&self.unknown_fields
}
fn mut_unknown_fields(&mut self) -> &mut ::protobuf::UnknownFields {
&mut self.unknown_fields
}
fn as_any(&self) -> &::std::any::Any {
self as &::std::any::Any
}
fn as_any_mut(&mut self) -> &mut ::std::any::Any {
self as &mut ::std::any::Any
}
fn into_any(self: Box<Self>) -> ::std::boxed::Box<::std::any::Any> {
self
}
fn descriptor(&self) -> &'static ::protobuf::reflect::MessageDescriptor {
Self::descriptor_static()
}
fn new() -> AuthenticationRule {
AuthenticationRule::new()
}
fn descriptor_static() -> &'static ::protobuf::reflect::MessageDescriptor {
static mut descriptor: ::protobuf::lazy::Lazy<::protobuf::reflect::MessageDescriptor> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::reflect::MessageDescriptor,
};
unsafe {
descriptor.get(|| {
let mut fields = ::std::vec::Vec::new();
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"selector",
|m: &AuthenticationRule| { &m.selector },
|m: &mut AuthenticationRule| { &mut m.selector },
));
fields.push(::protobuf::reflect::accessor::make_singular_ptr_field_accessor::<_, ::protobuf::types::ProtobufTypeMessage<OAuthRequirements>>(
"oauth",
|m: &AuthenticationRule| { &m.oauth },
|m: &mut AuthenticationRule| { &mut m.oauth },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeBool>(
"allow_without_credential",
|m: &AuthenticationRule| { &m.allow_without_credential },
|m: &mut AuthenticationRule| { &mut m.allow_without_credential },
));
fields.push(::protobuf::reflect::accessor::make_repeated_field_accessor::<_, ::protobuf::types::ProtobufTypeMessage<AuthRequirement>>(
"requirements",
|m: &AuthenticationRule| { &m.requirements },
|m: &mut AuthenticationRule| { &mut m.requirements },
));
::protobuf::reflect::MessageDescriptor::new::<AuthenticationRule>(
"AuthenticationRule",
fields,
file_descriptor_proto()
)
})
}
}
fn default_instance() -> &'static AuthenticationRule {
static mut instance: ::protobuf::lazy::Lazy<AuthenticationRule> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const AuthenticationRule,
};
unsafe {
instance.get(AuthenticationRule::new)
}
}
}
impl ::protobuf::Clear for AuthenticationRule {
fn clear(&mut self) {
self.clear_selector();
self.clear_oauth();
self.clear_allow_without_credential();
self.clear_requirements();
self.unknown_fields.clear();
}
}
impl ::std::fmt::Debug for AuthenticationRule {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
::protobuf::text_format::fmt(self, f)
}
}
impl ::protobuf::reflect::ProtobufValue for AuthenticationRule {
fn as_ref(&self) -> ::protobuf::reflect::ProtobufValueRef {
::protobuf::reflect::ProtobufValueRef::Message(self)
}
}
#[derive(PartialEq,Clone,Default)]
pub struct AuthProvider {
pub id: ::std::string::String,
pub issuer: ::std::string::String,
pub jwks_uri: ::std::string::String,
pub audiences: ::std::string::String,
pub authorization_url: ::std::string::String,
unknown_fields: ::protobuf::UnknownFields,
cached_size: ::protobuf::CachedSize,
}
impl AuthProvider {
pub fn new() -> AuthProvider {
::std::default::Default::default()
}
pub fn clear_id(&mut self) {
self.id.clear();
}
pub fn set_id(&mut self, v: ::std::string::String) {
self.id = v;
}
pub fn mut_id(&mut self) -> &mut ::std::string::String {
&mut self.id
}
pub fn take_id(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.id, ::std::string::String::new())
}
pub fn get_id(&self) -> &str {
&self.id
}
pub fn clear_issuer(&mut self) {
self.issuer.clear();
}
pub fn set_issuer(&mut self, v: ::std::string::String) {
self.issuer = v;
}
pub fn mut_issuer(&mut self) -> &mut ::std::string::String {
&mut self.issuer
}
pub fn take_issuer(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.issuer, ::std::string::String::new())
}
pub fn get_issuer(&self) -> &str {
&self.issuer
}
pub fn clear_jwks_uri(&mut self) {
self.jwks_uri.clear();
}
pub fn set_jwks_uri(&mut self, v: ::std::string::String) {
self.jwks_uri = v;
}
pub fn mut_jwks_uri(&mut self) -> &mut ::std::string::String {
&mut self.jwks_uri
}
pub fn take_jwks_uri(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.jwks_uri, ::std::string::String::new())
}
pub fn get_jwks_uri(&self) -> &str {
&self.jwks_uri
}
pub fn clear_audiences(&mut self) {
self.audiences.clear();
}
pub fn set_audiences(&mut self, v: ::std::string::String) {
self.audiences = v;
}
pub fn mut_audiences(&mut self) -> &mut ::std::string::String {
&mut self.audiences
}
pub fn take_audiences(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.audiences, ::std::string::String::new())
}
pub fn get_audiences(&self) -> &str {
&self.audiences
}
pub fn clear_authorization_url(&mut self) {
self.authorization_url.clear();
}
pub fn set_authorization_url(&mut self, v: ::std::string::String) {
self.authorization_url = v;
}
pub fn mut_authorization_url(&mut self) -> &mut ::std::string::String {
&mut self.authorization_url
}
pub fn take_authorization_url(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.authorization_url, ::std::string::String::new())
}
pub fn get_authorization_url(&self) -> &str {
&self.authorization_url
}
}
impl ::protobuf::Message for AuthProvider {
fn is_initialized(&self) -> bool {
true
}
fn merge_from(&mut self, is: &mut ::protobuf::CodedInputStream) -> ::protobuf::ProtobufResult<()> {
while !is.eof()? {
let (field_number, wire_type) = is.read_tag_unpack()?;
match field_number {
1 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.id)?;
},
2 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.issuer)?;
},
3 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.jwks_uri)?;
},
4 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.audiences)?;
},
5 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.authorization_url)?;
},
_ => {
::protobuf::rt::read_unknown_or_skip_group(field_number, wire_type, is, self.mut_unknown_fields())?;
},
};
}
::std::result::Result::Ok(())
}
#[allow(unused_variables)]
fn compute_size(&self) -> u32 {
let mut my_size = 0;
if !self.id.is_empty() {
my_size += ::protobuf::rt::string_size(1, &self.id);
}
if !self.issuer.is_empty() {
my_size += ::protobuf::rt::string_size(2, &self.issuer);
}
if !self.jwks_uri.is_empty() {
my_size += ::protobuf::rt::string_size(3, &self.jwks_uri);
}
if !self.audiences.is_empty() {
my_size += ::protobuf::rt::string_size(4, &self.audiences);
}
if !self.authorization_url.is_empty() {
my_size += ::protobuf::rt::string_size(5, &self.authorization_url);
}
my_size += ::protobuf::rt::unknown_fields_size(self.get_unknown_fields());
self.cached_size.set(my_size);
my_size
}
fn write_to_with_cached_sizes(&self, os: &mut ::protobuf::CodedOutputStream) -> ::protobuf::ProtobufResult<()> {
if !self.id.is_empty() {
os.write_string(1, &self.id)?;
}
if !self.issuer.is_empty() {
os.write_string(2, &self.issuer)?;
}
if !self.jwks_uri.is_empty() {
os.write_string(3, &self.jwks_uri)?;
}
if !self.audiences.is_empty() {
os.write_string(4, &self.audiences)?;
}
if !self.authorization_url.is_empty() {
os.write_string(5, &self.authorization_url)?;
}
os.write_unknown_fields(self.get_unknown_fields())?;
::std::result::Result::Ok(())
}
fn get_cached_size(&self) -> u32 {
self.cached_size.get()
}
fn get_unknown_fields(&self) -> &::protobuf::UnknownFields {
&self.unknown_fields
}
fn mut_unknown_fields(&mut self) -> &mut ::protobuf::UnknownFields {
&mut self.unknown_fields
}
fn as_any(&self) -> &::std::any::Any {
self as &::std::any::Any
}
fn as_any_mut(&mut self) -> &mut ::std::any::Any {
self as &mut ::std::any::Any
}
fn into_any(self: Box<Self>) -> ::std::boxed::Box<::std::any::Any> {
self
}
fn descriptor(&self) -> &'static ::protobuf::reflect::MessageDescriptor {
Self::descriptor_static()
}
fn new() -> AuthProvider {
AuthProvider::new()
}
fn descriptor_static() -> &'static ::protobuf::reflect::MessageDescriptor {
static mut descriptor: ::protobuf::lazy::Lazy<::protobuf::reflect::MessageDescriptor> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::reflect::MessageDescriptor,
};
unsafe {
descriptor.get(|| {
let mut fields = ::std::vec::Vec::new();
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"id",
|m: &AuthProvider| { &m.id },
|m: &mut AuthProvider| { &mut m.id },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"issuer",
|m: &AuthProvider| { &m.issuer },
|m: &mut AuthProvider| { &mut m.issuer },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"jwks_uri",
|m: &AuthProvider| { &m.jwks_uri },
|m: &mut AuthProvider| { &mut m.jwks_uri },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"audiences",
|m: &AuthProvider| { &m.audiences },
|m: &mut AuthProvider| { &mut m.audiences },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"authorization_url",
|m: &AuthProvider| { &m.authorization_url },
|m: &mut AuthProvider| { &mut m.authorization_url },
));
::protobuf::reflect::MessageDescriptor::new::<AuthProvider>(
"AuthProvider",
fields,
file_descriptor_proto()
)
})
}
}
fn default_instance() -> &'static AuthProvider {
static mut instance: ::protobuf::lazy::Lazy<AuthProvider> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const AuthProvider,
};
unsafe {
instance.get(AuthProvider::new)
}
}
}
impl ::protobuf::Clear for AuthProvider {
fn clear(&mut self) {
self.clear_id();
self.clear_issuer();
self.clear_jwks_uri();
self.clear_audiences();
self.clear_authorization_url();
self.unknown_fields.clear();
}
}
impl ::std::fmt::Debug for AuthProvider {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
::protobuf::text_format::fmt(self, f)
}
}
impl ::protobuf::reflect::ProtobufValue for AuthProvider {
fn as_ref(&self) -> ::protobuf::reflect::ProtobufValueRef {
::protobuf::reflect::ProtobufValueRef::Message(self)
}
}
#[derive(PartialEq,Clone,Default)]
pub struct OAuthRequirements {
pub canonical_scopes: ::std::string::String,
unknown_fields: ::protobuf::UnknownFields,
cached_size: ::protobuf::CachedSize,
}
impl OAuthRequirements {
pub fn new() -> OAuthRequirements {
::std::default::Default::default()
}
pub fn clear_canonical_scopes(&mut self) {
self.canonical_scopes.clear();
}
pub fn set_canonical_scopes(&mut self, v: ::std::string::String) {
self.canonical_scopes = v;
}
pub fn mut_canonical_scopes(&mut self) -> &mut ::std::string::String {
&mut self.canonical_scopes
}
pub fn take_canonical_scopes(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.canonical_scopes, ::std::string::String::new())
}
pub fn get_canonical_scopes(&self) -> &str {
&self.canonical_scopes
}
}
impl ::protobuf::Message for OAuthRequirements {
fn is_initialized(&self) -> bool {
true
}
fn merge_from(&mut self, is: &mut ::protobuf::CodedInputStream) -> ::protobuf::ProtobufResult<()> {
while !is.eof()? {
let (field_number, wire_type) = is.read_tag_unpack()?;
match field_number {
1 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.canonical_scopes)?;
},
_ => {
::protobuf::rt::read_unknown_or_skip_group(field_number, wire_type, is, self.mut_unknown_fields())?;
},
};
}
::std::result::Result::Ok(())
}
#[allow(unused_variables)]
fn compute_size(&self) -> u32 {
let mut my_size = 0;
if !self.canonical_scopes.is_empty() {
my_size += ::protobuf::rt::string_size(1, &self.canonical_scopes);
}
my_size += ::protobuf::rt::unknown_fields_size(self.get_unknown_fields());
self.cached_size.set(my_size);
my_size
}
fn write_to_with_cached_sizes(&self, os: &mut ::protobuf::CodedOutputStream) -> ::protobuf::ProtobufResult<()> {
if !self.canonical_scopes.is_empty() {
os.write_string(1, &self.canonical_scopes)?;
}
os.write_unknown_fields(self.get_unknown_fields())?;
::std::result::Result::Ok(())
}
fn get_cached_size(&self) -> u32 {
self.cached_size.get()
}
fn get_unknown_fields(&self) -> &::protobuf::UnknownFields {
&self.unknown_fields
}
fn mut_unknown_fields(&mut self) -> &mut ::protobuf::UnknownFields {
&mut self.unknown_fields
}
fn as_any(&self) -> &::std::any::Any {
self as &::std::any::Any
}
fn as_any_mut(&mut self) -> &mut ::std::any::Any {
self as &mut ::std::any::Any
}
fn into_any(self: Box<Self>) -> ::std::boxed::Box<::std::any::Any> {
self
}
fn descriptor(&self) -> &'static ::protobuf::reflect::MessageDescriptor {
Self::descriptor_static()
}
fn new() -> OAuthRequirements {
OAuthRequirements::new()
}
fn descriptor_static() -> &'static ::protobuf::reflect::MessageDescriptor {
static mut descriptor: ::protobuf::lazy::Lazy<::protobuf::reflect::MessageDescriptor> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::reflect::MessageDescriptor,
};
unsafe {
descriptor.get(|| {
let mut fields = ::std::vec::Vec::new();
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"canonical_scopes",
|m: &OAuthRequirements| { &m.canonical_scopes },
|m: &mut OAuthRequirements| { &mut m.canonical_scopes },
));
::protobuf::reflect::MessageDescriptor::new::<OAuthRequirements>(
"OAuthRequirements",
fields,
file_descriptor_proto()
)
})
}
}
fn default_instance() -> &'static OAuthRequirements {
static mut instance: ::protobuf::lazy::Lazy<OAuthRequirements> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const OAuthRequirements,
};
unsafe {
instance.get(OAuthRequirements::new)
}
}
}
impl ::protobuf::Clear for OAuthRequirements {
fn clear(&mut self) {
self.clear_canonical_scopes();
self.unknown_fields.clear();
}
}
impl ::std::fmt::Debug for OAuthRequirements {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
::protobuf::text_format::fmt(self, f)
}
}
impl ::protobuf::reflect::ProtobufValue for OAuthRequirements {
fn as_ref(&self) -> ::protobuf::reflect::ProtobufValueRef {
::protobuf::reflect::ProtobufValueRef::Message(self)
}
}
#[derive(PartialEq,Clone,Default)]
pub struct AuthRequirement {
pub provider_id: ::std::string::String,
pub audiences: ::std::string::String,
unknown_fields: ::protobuf::UnknownFields,
cached_size: ::protobuf::CachedSize,
}
impl AuthRequirement {
pub fn new() -> AuthRequirement {
::std::default::Default::default()
}
pub fn clear_provider_id(&mut self) {
self.provider_id.clear();
}
pub fn set_provider_id(&mut self, v: ::std::string::String) {
self.provider_id = v;
}
pub fn mut_provider_id(&mut self) -> &mut ::std::string::String {
&mut self.provider_id
}
pub fn take_provider_id(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.provider_id, ::std::string::String::new())
}
pub fn get_provider_id(&self) -> &str {
&self.provider_id
}
pub fn clear_audiences(&mut self) {
self.audiences.clear();
}
pub fn set_audiences(&mut self, v: ::std::string::String) {
self.audiences = v;
}
pub fn mut_audiences(&mut self) -> &mut ::std::string::String {
&mut self.audiences
}
pub fn take_audiences(&mut self) -> ::std::string::String {
::std::mem::replace(&mut self.audiences, ::std::string::String::new())
}
pub fn get_audiences(&self) -> &str {
&self.audiences
}
}
impl ::protobuf::Message for AuthRequirement {
fn is_initialized(&self) -> bool {
true
}
fn merge_from(&mut self, is: &mut ::protobuf::CodedInputStream) -> ::protobuf::ProtobufResult<()> {
while !is.eof()? {
let (field_number, wire_type) = is.read_tag_unpack()?;
match field_number {
1 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.provider_id)?;
},
2 => {
::protobuf::rt::read_singular_proto3_string_into(wire_type, is, &mut self.audiences)?;
},
_ => {
::protobuf::rt::read_unknown_or_skip_group(field_number, wire_type, is, self.mut_unknown_fields())?;
},
};
}
::std::result::Result::Ok(())
}
#[allow(unused_variables)]
fn compute_size(&self) -> u32 {
let mut my_size = 0;
if !self.provider_id.is_empty() {
my_size += ::protobuf::rt::string_size(1, &self.provider_id);
}
if !self.audiences.is_empty() {
my_size += ::protobuf::rt::string_size(2, &self.audiences);
}
my_size += ::protobuf::rt::unknown_fields_size(self.get_unknown_fields());
self.cached_size.set(my_size);
my_size
}
fn write_to_with_cached_sizes(&self, os: &mut ::protobuf::CodedOutputStream) -> ::protobuf::ProtobufResult<()> {
if !self.provider_id.is_empty() {
os.write_string(1, &self.provider_id)?;
}
if !self.audiences.is_empty() {
os.write_string(2, &self.audiences)?;
}
os.write_unknown_fields(self.get_unknown_fields())?;
::std::result::Result::Ok(())
}
fn get_cached_size(&self) -> u32 {
self.cached_size.get()
}
fn get_unknown_fields(&self) -> &::protobuf::UnknownFields {
&self.unknown_fields
}
fn mut_unknown_fields(&mut self) -> &mut ::protobuf::UnknownFields {
&mut self.unknown_fields
}
fn as_any(&self) -> &::std::any::Any {
self as &::std::any::Any
}
fn as_any_mut(&mut self) -> &mut ::std::any::Any {
self as &mut ::std::any::Any
}
fn into_any(self: Box<Self>) -> ::std::boxed::Box<::std::any::Any> {
self
}
fn descriptor(&self) -> &'static ::protobuf::reflect::MessageDescriptor {
Self::descriptor_static()
}
fn new() -> AuthRequirement {
AuthRequirement::new()
}
fn descriptor_static() -> &'static ::protobuf::reflect::MessageDescriptor {
static mut descriptor: ::protobuf::lazy::Lazy<::protobuf::reflect::MessageDescriptor> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::reflect::MessageDescriptor,
};
unsafe {
descriptor.get(|| {
let mut fields = ::std::vec::Vec::new();
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"provider_id",
|m: &AuthRequirement| { &m.provider_id },
|m: &mut AuthRequirement| { &mut m.provider_id },
));
fields.push(::protobuf::reflect::accessor::make_simple_field_accessor::<_, ::protobuf::types::ProtobufTypeString>(
"audiences",
|m: &AuthRequirement| { &m.audiences },
|m: &mut AuthRequirement| { &mut m.audiences },
));
::protobuf::reflect::MessageDescriptor::new::<AuthRequirement>(
"AuthRequirement",
fields,
file_descriptor_proto()
)
})
}
}
fn default_instance() -> &'static AuthRequirement {
static mut instance: ::protobuf::lazy::Lazy<AuthRequirement> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const AuthRequirement,
};
unsafe {
instance.get(AuthRequirement::new)
}
}
}
impl ::protobuf::Clear for AuthRequirement {
fn clear(&mut self) {
self.clear_provider_id();
self.clear_audiences();
self.unknown_fields.clear();
}
}
impl ::std::fmt::Debug for AuthRequirement {
fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
::protobuf::text_format::fmt(self, f)
}
}
impl ::protobuf::reflect::ProtobufValue for AuthRequirement {
fn as_ref(&self) -> ::protobuf::reflect::ProtobufValueRef {
::protobuf::reflect::ProtobufValueRef::Message(self)
}
}
static file_descriptor_proto_data: &'static [u8] = b"\
\n\x15google/api/auth.proto\x12\ngoogle.api\x1a\x1cgoogle/api/annotation\
s.proto\"~\n\x0eAuthentication\x124\n\x05rules\x18\x03\x20\x03(\x0b2\x1e\
.google.api.AuthenticationRuleR\x05rules\x126\n\tproviders\x18\x04\x20\
\x03(\x0b2\x18.google.api.AuthProviderR\tproviders\"\xe0\x01\n\x12Authen\
ticationRule\x12\x1a\n\x08selector\x18\x01\x20\x01(\tR\x08selector\x123\
\n\x05oauth\x18\x02\x20\x01(\x0b2\x1d.google.api.OAuthRequirementsR\x05o\
auth\x128\n\x18allow_without_credential\x18\x05\x20\x01(\x08R\x16allowWi\
thoutCredential\x12?\n\x0crequirements\x18\x07\x20\x03(\x0b2\x1b.google.\
api.AuthRequirementR\x0crequirements\"\x9c\x01\n\x0cAuthProvider\x12\x0e\
\n\x02id\x18\x01\x20\x01(\tR\x02id\x12\x16\n\x06issuer\x18\x02\x20\x01(\
\tR\x06issuer\x12\x19\n\x08jwks_uri\x18\x03\x20\x01(\tR\x07jwksUri\x12\
\x1c\n\taudiences\x18\x04\x20\x01(\tR\taudiences\x12+\n\x11authorization\
_url\x18\x05\x20\x01(\tR\x10authorizationUrl\">\n\x11OAuthRequirements\
\x12)\n\x10canonical_scopes\x18\x01\x20\x01(\tR\x0fcanonicalScopes\"P\n\
\x0fAuthRequirement\x12\x1f\n\x0bprovider_id\x18\x01\x20\x01(\tR\nprovid\
erId\x12\x1c\n\taudiences\x18\x02\x20\x01(\tR\taudiencesBk\n\x0ecom.goog\
le.apiB\tAuthProtoP\x01ZEgoogle.golang.org/genproto/googleapis/api/servi\
ceconfig;serviceconfig\xa2\x02\x04GAPIJ\xd3>\n\x07\x12\x05\x0e\0\xba\x01\
\x01\n\xbd\x04\n\x01\x0c\x12\x03\x0e\0\x122\xb2\x04\x20Copyright\x202017\
\x20Google\x20Inc.\n\n\x20Licensed\x20under\x20the\x20Apache\x20License,\
\x20Version\x202.0\x20(the\x20\"License\");\n\x20you\x20may\x20not\x20us\
e\x20this\x20file\x20except\x20in\x20compliance\x20with\x20the\x20Licens\
e.\n\x20You\x20may\x20obtain\x20a\x20copy\x20of\x20the\x20License\x20at\
\n\n\x20\x20\x20\x20\x20http://www.apache.org/licenses/LICENSE-2.0\n\n\
\x20Unless\x20required\x20by\x20applicable\x20law\x20or\x20agreed\x20to\
\x20in\x20writing,\x20software\n\x20distributed\x20under\x20the\x20Licen\
se\x20is\x20distributed\x20on\x20an\x20\"AS\x20IS\"\x20BASIS,\n\x20WITHO\
UT\x20WARRANTIES\x20OR\x20CONDITIONS\x20OF\x20ANY\x20KIND,\x20either\x20\
express\x20or\x20implied.\n\x20See\x20the\x20License\x20for\x20the\x20sp\
ecific\x20language\x20governing\x20permissions\x20and\n\x20limitations\
\x20under\x20the\x20License.\n\n\x08\n\x01\x02\x12\x03\x10\x08\x12\n\t\n\
\x02\x03\0\x12\x03\x12\x07%\n\x08\n\x01\x08\x12\x03\x14\0\\\n\x0b\n\x04\
\x08\xe7\x07\0\x12\x03\x14\0\\\n\x0c\n\x05\x08\xe7\x07\0\x02\x12\x03\x14\
\x07\x11\n\r\n\x06\x08\xe7\x07\0\x02\0\x12\x03\x14\x07\x11\n\x0e\n\x07\
\x08\xe7\x07\0\x02\0\x01\x12\x03\x14\x07\x11\n\x0c\n\x05\x08\xe7\x07\0\
\x07\x12\x03\x14\x14[\n\x08\n\x01\x08\x12\x03\x15\0\"\n\x0b\n\x04\x08\
\xe7\x07\x01\x12\x03\x15\0\"\n\x0c\n\x05\x08\xe7\x07\x01\x02\x12\x03\x15\
\x07\x1a\n\r\n\x06\x08\xe7\x07\x01\x02\0\x12\x03\x15\x07\x1a\n\x0e\n\x07\
\x08\xe7\x07\x01\x02\0\x01\x12\x03\x15\x07\x1a\n\x0c\n\x05\x08\xe7\x07\
\x01\x03\x12\x03\x15\x1d!\n\x08\n\x01\x08\x12\x03\x16\0*\n\x0b\n\x04\x08\
\xe7\x07\x02\x12\x03\x16\0*\n\x0c\n\x05\x08\xe7\x07\x02\x02\x12\x03\x16\
\x07\x1b\n\r\n\x06\x08\xe7\x07\x02\x02\0\x12\x03\x16\x07\x1b\n\x0e\n\x07\
\x08\xe7\x07\x02\x02\0\x01\x12\x03\x16\x07\x1b\n\x0c\n\x05\x08\xe7\x07\
\x02\x07\x12\x03\x16\x1e)\n\x08\n\x01\x08\x12\x03\x17\0'\n\x0b\n\x04\x08\
\xe7\x07\x03\x12\x03\x17\0'\n\x0c\n\x05\x08\xe7\x07\x03\x02\x12\x03\x17\
\x07\x13\n\r\n\x06\x08\xe7\x07\x03\x02\0\x12\x03\x17\x07\x13\n\x0e\n\x07\
\x08\xe7\x07\x03\x02\0\x01\x12\x03\x17\x07\x13\n\x0c\n\x05\x08\xe7\x07\
\x03\x07\x12\x03\x17\x16&\n\x08\n\x01\x08\x12\x03\x18\0\"\n\x0b\n\x04\
\x08\xe7\x07\x04\x12\x03\x18\0\"\n\x0c\n\x05\x08\xe7\x07\x04\x02\x12\x03\
\x18\x07\x18\n\r\n\x06\x08\xe7\x07\x04\x02\0\x12\x03\x18\x07\x18\n\x0e\n\
\x07\x08\xe7\x07\x04\x02\0\x01\x12\x03\x18\x07\x18\n\x0c\n\x05\x08\xe7\
\x07\x04\x07\x12\x03\x18\x1b!\n\xc8\x03\n\x02\x04\0\x12\x04)\01\x01\x1a\
\xbb\x03\x20`Authentication`\x20defines\x20the\x20authentication\x20conf\
iguration\x20for\x20an\x20API.\n\n\x20Example\x20for\x20an\x20API\x20tar\
geted\x20for\x20external\x20use:\n\n\x20\x20\x20\x20\x20name:\x20calenda\
r.googleapis.com\n\x20\x20\x20\x20\x20authentication:\n\x20\x20\x20\x20\
\x20\x20\x20providers:\n\x20\x20\x20\x20\x20\x20\x20-\x20id:\x20google_c\
alendar_auth\n\x20\x20\x20\x20\x20\x20\x20\x20\x20jwks_uri:\x20https://w\
ww.googleapis.com/oauth2/v1/certs\n\x20\x20\x20\x20\x20\x20\x20\x20\x20i\
ssuer:\x20https://securetoken.google.com\n\x20\x20\x20\x20\x20\x20\x20ru\
les:\n\x20\x20\x20\x20\x20\x20\x20-\x20selector:\x20\"*\"\n\x20\x20\x20\
\x20\x20\x20\x20\x20\x20requirements:\n\x20\x20\x20\x20\x20\x20\x20\x20\
\x20\x20\x20provider_id:\x20google_calendar_auth\n\n\n\n\x03\x04\0\x01\
\x12\x03)\x08\x16\n\x9e\x01\n\x04\x04\0\x02\0\x12\x03-\x02(\x1a\x90\x01\
\x20A\x20list\x20of\x20authentication\x20rules\x20that\x20apply\x20to\
\x20individual\x20API\x20methods.\n\n\x20**NOTE:**\x20All\x20service\x20\
configuration\x20rules\x20follow\x20\"last\x20one\x20wins\"\x20order.\n\
\n\x0c\n\x05\x04\0\x02\0\x04\x12\x03-\x02\n\n\x0c\n\x05\x04\0\x02\0\x06\
\x12\x03-\x0b\x1d\n\x0c\n\x05\x04\0\x02\0\x01\x12\x03-\x1e#\n\x0c\n\x05\
\x04\0\x02\0\x03\x12\x03-&'\nQ\n\x04\x04\0\x02\x01\x12\x030\x02&\x1aD\
\x20Defines\x20a\x20set\x20of\x20authentication\x20providers\x20that\x20\
a\x20service\x20supports.\n\n\x0c\n\x05\x04\0\x02\x01\x04\x12\x030\x02\n\
\n\x0c\n\x05\x04\0\x02\x01\x06\x12\x030\x0b\x17\n\x0c\n\x05\x04\0\x02\
\x01\x01\x12\x030\x18!\n\x0c\n\x05\x04\0\x02\x01\x03\x12\x030$%\n\xed\
\x02\n\x02\x04\x01\x12\x04<\0P\x01\x1a\xe0\x02\x20Authentication\x20rule\
s\x20for\x20the\x20service.\n\n\x20By\x20default,\x20if\x20a\x20method\
\x20has\x20any\x20authentication\x20requirements,\x20every\x20request\n\
\x20must\x20include\x20a\x20valid\x20credential\x20matching\x20one\x20of\
\x20the\x20requirements.\n\x20It's\x20an\x20error\x20to\x20include\x20mo\
re\x20than\x20one\x20kind\x20of\x20credential\x20in\x20a\x20single\n\x20\
request.\n\n\x20If\x20a\x20method\x20doesn't\x20have\x20any\x20auth\x20r\
equirements,\x20request\x20credentials\x20will\x20be\n\x20ignored.\n\n\n\
\n\x03\x04\x01\x01\x12\x03<\x08\x1a\n\x90\x01\n\x04\x04\x01\x02\0\x12\
\x03@\x02\x16\x1a\x82\x01\x20Selects\x20the\x20methods\x20to\x20which\
\x20this\x20rule\x20applies.\n\n\x20Refer\x20to\x20[selector][google.api\
.DocumentationRule.selector]\x20for\x20syntax\x20details.\n\n\r\n\x05\
\x04\x01\x02\0\x04\x12\x04@\x02<\x1c\n\x0c\n\x05\x04\x01\x02\0\x05\x12\
\x03@\x02\x08\n\x0c\n\x05\x04\x01\x02\0\x01\x12\x03@\t\x11\n\x0c\n\x05\
\x04\x01\x02\0\x03\x12\x03@\x14\x15\n6\n\x04\x04\x01\x02\x01\x12\x03C\
\x02\x1e\x1a)\x20The\x20requirements\x20for\x20OAuth\x20credentials.\n\n\
\r\n\x05\x04\x01\x02\x01\x04\x12\x04C\x02@\x16\n\x0c\n\x05\x04\x01\x02\
\x01\x06\x12\x03C\x02\x13\n\x0c\n\x05\x04\x01\x02\x01\x01\x12\x03C\x14\
\x19\n\x0c\n\x05\x04\x01\x02\x01\x03\x12\x03C\x1c\x1d\n\x82\x03\n\x04\
\x04\x01\x02\x02\x12\x03L\x02$\x1a\xf4\x02\x20Whether\x20to\x20allow\x20\
requests\x20without\x20a\x20credential.\x20The\x20credential\x20can\x20b\
e\n\x20an\x20OAuth\x20token,\x20Google\x20cookies\x20(first-party\x20aut\
h)\x20or\x20EndUserCreds.\n\n\x20For\x20requests\x20without\x20credentia\
ls,\x20if\x20the\x20service\x20control\x20environment\x20is\n\x20specifi\
ed,\x20each\x20incoming\x20request\x20**must**\x20be\x20associated\x20wi\
th\x20a\x20service\n\x20consumer.\x20This\x20can\x20be\x20done\x20by\x20\
passing\x20an\x20API\x20key\x20that\x20belongs\x20to\x20a\x20consumer\n\
\x20project.\n\n\r\n\x05\x04\x01\x02\x02\x04\x12\x04L\x02C\x1e\n\x0c\n\
\x05\x04\x01\x02\x02\x05\x12\x03L\x02\x06\n\x0c\n\x05\x04\x01\x02\x02\
\x01\x12\x03L\x07\x1f\n\x0c\n\x05\x04\x01\x02\x02\x03\x12\x03L\"#\nD\n\
\x04\x04\x01\x02\x03\x12\x03O\x02,\x1a7\x20Requirements\x20for\x20additi\
onal\x20authentication\x20providers.\n\n\x0c\n\x05\x04\x01\x02\x03\x04\
\x12\x03O\x02\n\n\x0c\n\x05\x04\x01\x02\x03\x06\x12\x03O\x0b\x1a\n\x0c\n\
\x05\x04\x01\x02\x03\x01\x12\x03O\x1b'\n\x0c\n\x05\x04\x01\x02\x03\x03\
\x12\x03O*+\n\xac\x01\n\x02\x04\x02\x12\x05T\0\x80\x01\x01\x1a\x9e\x01\
\x20Configuration\x20for\x20an\x20anthentication\x20provider,\x20includi\
ng\x20support\x20for\n\x20[JSON\x20Web\x20Token\x20(JWT)](https://tools.\
ietf.org/html/draft-ietf-oauth-json-web-token-32).\n\n\n\n\x03\x04\x02\
\x01\x12\x03T\x08\x14\n\x92\x01\n\x04\x04\x02\x02\0\x12\x03Y\x02\x10\x1a\
\x84\x01\x20The\x20unique\x20identifier\x20of\x20the\x20auth\x20provider\
.\x20It\x20will\x20be\x20referred\x20to\x20by\n\x20`AuthRequirement.prov\
ider_id`.\n\n\x20Example:\x20\"bookstore_auth\".\n\n\r\n\x05\x04\x02\x02\
\0\x04\x12\x04Y\x02T\x16\n\x0c\n\x05\x04\x02\x02\0\x05\x12\x03Y\x02\x08\
\n\x0c\n\x05\x04\x02\x02\0\x01\x12\x03Y\t\x0b\n\x0c\n\x05\x04\x02\x02\0\
\x03\x12\x03Y\x0e\x0f\n\x95\x02\n\x04\x04\x02\x02\x01\x12\x03a\x02\x14\
\x1a\x87\x02\x20Identifies\x20the\x20principal\x20that\x20issued\x20the\
\x20JWT.\x20See\n\x20https://tools.ietf.org/html/draft-ietf-oauth-json-w\
eb-token-32#section-4.1.1\n\x20Usually\x20a\x20URL\x20or\x20an\x20email\
\x20address.\n\n\x20Example:\x20https://securetoken.google.com\n\x20Exam\
ple:\x201234567-compute@developer.gserviceaccount.com\n\n\r\n\x05\x04\
\x02\x02\x01\x04\x12\x04a\x02Y\x10\n\x0c\n\x05\x04\x02\x02\x01\x05\x12\
\x03a\x02\x08\n\x0c\n\x05\x04\x02\x02\x01\x01\x12\x03a\t\x0f\n\x0c\n\x05\
\x04\x02\x02\x01\x03\x12\x03a\x12\x13\n\xed\x03\n\x04\x04\x02\x02\x02\
\x12\x03l\x02\x16\x1a\xdf\x03\x20URL\x20of\x20the\x20provider's\x20publi\
c\x20key\x20set\x20to\x20validate\x20signature\x20of\x20the\x20JWT.\x20S\
ee\n\x20[OpenID\x20Discovery](https://openid.net/specs/openid-connect-di\
scovery-1_0.html#ProviderMetadata).\n\x20Optional\x20if\x20the\x20key\
\x20set\x20document:\n\x20\x20-\x20can\x20be\x20retrieved\x20from\n\x20\
\x20\x20\x20[OpenID\x20Discovery](https://openid.net/specs/openid-connec\
t-discovery-1_0.html\n\x20\x20\x20\x20of\x20the\x20issuer.\n\x20\x20-\
\x20can\x20be\x20inferred\x20from\x20the\x20email\x20domain\x20of\x20the\
\x20issuer\x20(e.g.\x20a\x20Google\x20service\x20account).\n\n\x20Exampl\
e:\x20https://www.googleapis.com/oauth2/v1/certs\n\n\r\n\x05\x04\x02\x02\
\x02\x04\x12\x04l\x02a\x14\n\x0c\n\x05\x04\x02\x02\x02\x05\x12\x03l\x02\
\x08\n\x0c\n\x05\x04\x02\x02\x02\x01\x12\x03l\t\x11\n\x0c\n\x05\x04\x02\
\x02\x02\x03\x12\x03l\x14\x15\n\xc1\x05\n\x04\x04\x02\x02\x03\x12\x03{\
\x02\x17\x1a\xb3\x05\x20The\x20list\x20of\x20JWT\n\x20[audiences](https:\
//tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).\
\n\x20that\x20are\x20allowed\x20to\x20access.\x20A\x20JWT\x20containing\
\x20any\x20of\x20these\x20audiences\x20will\n\x20be\x20accepted.\x20When\
\x20this\x20setting\x20is\x20absent,\x20only\x20JWTs\x20with\x20audience\
\n\x20\"https://[Service_name][google.api.Service.name]/[API_name][googl\
e.protobuf.Api.name]\"\n\x20will\x20be\x20accepted.\x20For\x20example,\
\x20if\x20no\x20audiences\x20are\x20in\x20the\x20setting,\n\x20LibrarySe\
rvice\x20API\x20will\x20only\x20accept\x20JWTs\x20with\x20the\x20followi\
ng\x20audience\n\x20\"https://library-example.googleapis.com/google.exam\
ple.library.v1.LibraryService\".\n\n\x20Example:\n\n\x20\x20\x20\x20\x20\
audiences:\x20bookstore_android.apps.googleusercontent.com,\n\x20\x20\
\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20bookstore_web.ap\
ps.googleusercontent.com\n\n\r\n\x05\x04\x02\x02\x03\x04\x12\x04{\x02l\
\x16\n\x0c\n\x05\x04\x02\x02\x03\x05\x12\x03{\x02\x08\n\x0c\n\x05\x04\
\x02\x02\x03\x01\x12\x03{\t\x12\n\x0c\n\x05\x04\x02\x02\x03\x03\x12\x03{\
\x15\x16\n\x97\x01\n\x04\x04\x02\x02\x04\x12\x03\x7f\x02\x1f\x1a\x89\x01\
\x20Redirect\x20URL\x20if\x20JWT\x20token\x20is\x20required\x20but\x20no\
\x20present\x20or\x20is\x20expired.\n\x20Implement\x20authorizationUrl\
\x20of\x20securityDefinitions\x20in\x20OpenAPI\x20spec.\n\n\r\n\x05\x04\
\x02\x02\x04\x04\x12\x04\x7f\x02{\x17\n\x0c\n\x05\x04\x02\x02\x04\x05\
\x12\x03\x7f\x02\x08\n\x0c\n\x05\x04\x02\x02\x04\x01\x12\x03\x7f\t\x1a\n\
\x0c\n\x05\x04\x02\x02\x04\x03\x12\x03\x7f\x1d\x1e\n\xe7\x07\n\x02\x04\
\x03\x12\x06\x94\x01\0\x9d\x01\x01\x1a\xd8\x07\x20OAuth\x20scopes\x20are\
\x20a\x20way\x20to\x20define\x20data\x20and\x20permissions\x20on\x20data\
.\x20For\x20example,\n\x20there\x20are\x20scopes\x20defined\x20for\x20\"\
Read-only\x20access\x20to\x20Google\x20Calendar\"\x20and\n\x20\"Access\
\x20to\x20Cloud\x20Platform\".\x20Users\x20can\x20consent\x20to\x20a\x20\
scope\x20for\x20an\x20application,\n\x20giving\x20it\x20permission\x20to\
\x20access\x20that\x20data\x20on\x20their\x20behalf.\n\n\x20OAuth\x20sco\
pe\x20specifications\x20should\x20be\x20fairly\x20coarse\x20grained;\x20\
a\x20user\x20will\x20need\n\x20to\x20see\x20and\x20understand\x20the\x20\
text\x20description\x20of\x20what\x20your\x20scope\x20means.\n\n\x20In\
\x20most\x20cases:\x20use\x20one\x20or\x20at\x20most\x20two\x20OAuth\x20\
scopes\x20for\x20an\x20entire\x20family\x20of\n\x20products.\x20If\x20yo\
ur\x20product\x20has\x20multiple\x20APIs,\x20you\x20should\x20probably\
\x20be\x20sharing\n\x20the\x20OAuth\x20scope\x20across\x20all\x20of\x20t\
hose\x20APIs.\n\n\x20When\x20you\x20need\x20finer\x20grained\x20OAuth\
\x20consent\x20screens:\x20talk\x20with\x20your\x20product\n\x20manageme\
nt\x20about\x20how\x20developers\x20will\x20use\x20them\x20in\x20practic\
e.\n\n\x20Please\x20note\x20that\x20even\x20though\x20each\x20of\x20the\
\x20canonical\x20scopes\x20is\x20enough\x20for\x20a\n\x20request\x20to\
\x20be\x20accepted\x20and\x20passed\x20to\x20the\x20backend,\x20a\x20req\
uest\x20can\x20still\x20fail\n\x20due\x20to\x20the\x20backend\x20requiri\
ng\x20additional\x20scopes\x20or\x20permissions.\n\n\x0b\n\x03\x04\x03\
\x01\x12\x04\x94\x01\x08\x19\n\xab\x02\n\x04\x04\x03\x02\0\x12\x04\x9c\
\x01\x02\x1e\x1a\x9c\x02\x20The\x20list\x20of\x20publicly\x20documented\
\x20OAuth\x20scopes\x20that\x20are\x20allowed\x20access.\x20An\n\x20OAut\
h\x20token\x20containing\x20any\x20of\x20these\x20scopes\x20will\x20be\
\x20accepted.\n\n\x20Example:\n\n\x20\x20\x20\x20\x20\x20canonical_scope\
s:\x20https://www.googleapis.com/auth/calendar,\n\x20\x20\x20\x20\x20\
\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
\x20https://www.googleapis.com/auth/calendar.read\n\n\x0f\n\x05\x04\x03\
\x02\0\x04\x12\x06\x9c\x01\x02\x94\x01\x1b\n\r\n\x05\x04\x03\x02\0\x05\
\x12\x04\x9c\x01\x02\x08\n\r\n\x05\x04\x03\x02\0\x01\x12\x04\x9c\x01\t\
\x19\n\r\n\x05\x04\x03\x02\0\x03\x12\x04\x9c\x01\x1c\x1d\n\xa9\x01\n\x02\
\x04\x04\x12\x06\xa1\x01\0\xba\x01\x01\x1a\x9a\x01\x20User-defined\x20au\
thentication\x20requirements,\x20including\x20support\x20for\n\x20[JSON\
\x20Web\x20Token\x20(JWT)](https://tools.ietf.org/html/draft-ietf-oauth-\
json-web-token-32).\n\n\x0b\n\x03\x04\x04\x01\x12\x04\xa1\x01\x08\x17\n{\
\n\x04\x04\x04\x02\0\x12\x04\xa7\x01\x02\x19\x1am\x20[id][google.api.Aut\
hProvider.id]\x20from\x20authentication\x20provider.\n\n\x20Example:\n\n\
\x20\x20\x20\x20\x20provider_id:\x20bookstore_auth\n\n\x0f\n\x05\x04\x04\
\x02\0\x04\x12\x06\xa7\x01\x02\xa1\x01\x19\n\r\n\x05\x04\x04\x02\0\x05\
\x12\x04\xa7\x01\x02\x08\n\r\n\x05\x04\x04\x02\0\x01\x12\x04\xa7\x01\t\
\x14\n\r\n\x05\x04\x04\x02\0\x03\x12\x04\xa7\x01\x17\x18\n\xc0\x06\n\x04\
\x04\x04\x02\x01\x12\x04\xb9\x01\x02\x17\x1a\xb1\x06\x20NOTE:\x20This\
\x20will\x20be\x20deprecated\x20soon,\x20once\x20AuthProvider.audiences\
\x20is\n\x20implemented\x20and\x20accepted\x20in\x20all\x20the\x20runtim\
e\x20components.\n\n\x20The\x20list\x20of\x20JWT\n\x20[audiences](https:\
//tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).\
\n\x20that\x20are\x20allowed\x20to\x20access.\x20A\x20JWT\x20containing\
\x20any\x20of\x20these\x20audiences\x20will\n\x20be\x20accepted.\x20When\
\x20this\x20setting\x20is\x20absent,\x20only\x20JWTs\x20with\x20audience\
\n\x20\"https://[Service_name][google.api.Service.name]/[API_name][googl\
e.protobuf.Api.name]\"\n\x20will\x20be\x20accepted.\x20For\x20example,\
\x20if\x20no\x20audiences\x20are\x20in\x20the\x20setting,\n\x20LibrarySe\
rvice\x20API\x20will\x20only\x20accept\x20JWTs\x20with\x20the\x20followi\
ng\x20audience\n\x20\"https://library-example.googleapis.com/google.exam\
ple.library.v1.LibraryService\".\n\n\x20Example:\n\n\x20\x20\x20\x20\x20\
audiences:\x20bookstore_android.apps.googleusercontent.com,\n\x20\x20\
\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20bookstore_web.ap\
ps.googleusercontent.com\n\n\x0f\n\x05\x04\x04\x02\x01\x04\x12\x06\xb9\
\x01\x02\xa7\x01\x19\n\r\n\x05\x04\x04\x02\x01\x05\x12\x04\xb9\x01\x02\
\x08\n\r\n\x05\x04\x04\x02\x01\x01\x12\x04\xb9\x01\t\x12\n\r\n\x05\x04\
\x04\x02\x01\x03\x12\x04\xb9\x01\x15\x16b\x06proto3\
";
static mut file_descriptor_proto_lazy: ::protobuf::lazy::Lazy<::protobuf::descriptor::FileDescriptorProto> = ::protobuf::lazy::Lazy {
lock: ::protobuf::lazy::ONCE_INIT,
ptr: 0 as *const ::protobuf::descriptor::FileDescriptorProto,
};
fn parse_descriptor_proto() -> ::protobuf::descriptor::FileDescriptorProto {
::protobuf::parse_from_bytes(file_descriptor_proto_data).unwrap()
}
pub fn file_descriptor_proto() -> &'static ::protobuf::descriptor::FileDescriptorProto {
unsafe {
file_descriptor_proto_lazy.get(|| {
parse_descriptor_proto()
})
}
}