Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions etc/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ services:
restart: 'no'
networks:
- storage
image: 'ghcr.io/zitadel/zitadel:v4.0.0'
image: 'ghcr.io/zitadel/zitadel:v4.2.0'
command: 'init --config /example-zitadel-config.yaml --config /example-zitadel-secrets.yaml'
depends_on:
db:
Expand All @@ -34,7 +34,7 @@ services:
restart: 'no'
networks:
- storage
image: 'ghcr.io/zitadel/zitadel:v4.0.0-debug'
image: 'ghcr.io/zitadel/zitadel:v4.2.0-debug'
user: root
entrypoint: '/bin/bash'
command: [ "-c", "/app/zitadel setup --config /example-zitadel-config.yaml --config /example-zitadel-secrets.yaml --steps /example-zitadel-init-steps.yaml --masterkey \"my_test_masterkey_0123456789ABEF\" && echo \"--- ZITADEL SETUP COMPLETE ---\" && echo \"Personal Access Token (PAT) will be in ./zitadel_output/pat.txt on your host.\" && echo \"Service Account Key will be in ./zitadel_output/sa-key.json on your host.\" && echo \"OAuth Client ID and Secret will be in 'zitadel' service logs (grep for 'Application created').\"" ]
Expand All @@ -55,7 +55,7 @@ services:
networks:
- backend
- storage
image: 'ghcr.io/zitadel/zitadel:v4.0.0'
image: 'ghcr.io/zitadel/zitadel:v4.2.0'
command: >
start --config /example-zitadel-config.yaml
--config /example-zitadel-secrets.yaml
Expand Down
112 changes: 66 additions & 46 deletions src/main/java/com/zitadel/api/ActionServiceApi.java

Large diffs are not rendered by default.

112 changes: 66 additions & 46 deletions src/main/java/com/zitadel/api/BetaActionServiceApi.java

Large diffs are not rendered by default.

136 changes: 88 additions & 48 deletions src/main/java/com/zitadel/api/BetaAppServiceApi.java

Large diffs are not rendered by default.

48 changes: 24 additions & 24 deletions src/main/java/com/zitadel/api/BetaAuthorizationServiceApi.java
Original file line number Diff line number Diff line change
Expand Up @@ -45,8 +45,8 @@ public BetaAuthorizationServiceApi(ApiClient apiClient) {


/**
* ActivateAuthorization
* Activate Authorization ActivateAuthorization activates an existing but inactive authorization. In case the authorization is already active, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was activated by the request. Required permissions: - \"user.grant.write\"
* Activate Authorization
* ActivateAuthorization activates an existing but inactive authorization. In case the authorization is already active, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was activated by the request. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceActivateAuthorizationRequest (required)
* @return BetaAuthorizationServiceActivateAuthorizationResponse
* @throws ApiException if fails to make API call
Expand All @@ -57,8 +57,8 @@ public BetaAuthorizationServiceActivateAuthorizationResponse activateAuthorizati


/**
* ActivateAuthorization
* Activate Authorization ActivateAuthorization activates an existing but inactive authorization. In case the authorization is already active, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was activated by the request. Required permissions: - \"user.grant.write\"
* Activate Authorization
* ActivateAuthorization activates an existing but inactive authorization. In case the authorization is already active, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was activated by the request. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceActivateAuthorizationRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceActivateAuthorizationResponse
Expand Down Expand Up @@ -120,8 +120,8 @@ private BetaAuthorizationServiceActivateAuthorizationResponse activateAuthorizat


/**
* CreateAuthorization
* Create Authorization CreateAuthorization creates a new authorization for a user in an owned or granted project. Required permissions: - \"user.grant.write\"
* Create Authorization
* CreateAuthorization creates a new authorization for a user in an owned or granted project. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceCreateAuthorizationRequest (required)
* @return BetaAuthorizationServiceCreateAuthorizationResponse
* @throws ApiException if fails to make API call
Expand All @@ -132,8 +132,8 @@ public BetaAuthorizationServiceCreateAuthorizationResponse createAuthorization(B


/**
* CreateAuthorization
* Create Authorization CreateAuthorization creates a new authorization for a user in an owned or granted project. Required permissions: - \"user.grant.write\"
* Create Authorization
* CreateAuthorization creates a new authorization for a user in an owned or granted project. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceCreateAuthorizationRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceCreateAuthorizationResponse
Expand Down Expand Up @@ -195,8 +195,8 @@ private BetaAuthorizationServiceCreateAuthorizationResponse createAuthorization(


/**
* DeactivateAuthorization
* Deactivate Authorization DeactivateAuthorization deactivates an existing and active authorization. In case the authorization is already inactive, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was deactivated by the request. Required permissions: - \"user.grant.write\"
* Deactivate Authorization
* DeactivateAuthorization deactivates an existing and active authorization. In case the authorization is already inactive, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was deactivated by the request. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceDeactivateAuthorizationRequest (required)
* @return BetaAuthorizationServiceDeactivateAuthorizationResponse
* @throws ApiException if fails to make API call
Expand All @@ -207,8 +207,8 @@ public BetaAuthorizationServiceDeactivateAuthorizationResponse deactivateAuthori


/**
* DeactivateAuthorization
* Deactivate Authorization DeactivateAuthorization deactivates an existing and active authorization. In case the authorization is already inactive, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was deactivated by the request. Required permissions: - \"user.grant.write\"
* Deactivate Authorization
* DeactivateAuthorization deactivates an existing and active authorization. In case the authorization is already inactive, the request will return a successful response as the desired state is already achieved. You can check the change date in the response to verify if the authorization was deactivated by the request. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceDeactivateAuthorizationRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceDeactivateAuthorizationResponse
Expand Down Expand Up @@ -270,8 +270,8 @@ private BetaAuthorizationServiceDeactivateAuthorizationResponse deactivateAuthor


/**
* DeleteAuthorization
* Delete Authorization DeleteAuthorization deletes the authorization. In case the authorization is not found, the request will return a successful response as the desired state is already achieved. You can check the deletion date in the response to verify if the authorization was deleted by the request. Required permissions: - \"user.grant.delete\"
* Delete Authorization
* DeleteAuthorization deletes the authorization. In case the authorization is not found, the request will return a successful response as the desired state is already achieved. You can check the deletion date in the response to verify if the authorization was deleted by the request. Required permissions: - \"user.grant.delete\"
* @param betaAuthorizationServiceDeleteAuthorizationRequest (required)
* @return BetaAuthorizationServiceDeleteAuthorizationResponse
* @throws ApiException if fails to make API call
Expand All @@ -282,8 +282,8 @@ public BetaAuthorizationServiceDeleteAuthorizationResponse deleteAuthorization(B


/**
* DeleteAuthorization
* Delete Authorization DeleteAuthorization deletes the authorization. In case the authorization is not found, the request will return a successful response as the desired state is already achieved. You can check the deletion date in the response to verify if the authorization was deleted by the request. Required permissions: - \"user.grant.delete\"
* Delete Authorization
* DeleteAuthorization deletes the authorization. In case the authorization is not found, the request will return a successful response as the desired state is already achieved. You can check the deletion date in the response to verify if the authorization was deleted by the request. Required permissions: - \"user.grant.delete\"
* @param betaAuthorizationServiceDeleteAuthorizationRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceDeleteAuthorizationResponse
Expand Down Expand Up @@ -345,8 +345,8 @@ private BetaAuthorizationServiceDeleteAuthorizationResponse deleteAuthorization(


/**
* ListAuthorizations
* List Authorizations ListAuthorizations returns all authorizations matching the request and necessary permissions. Required permissions: - \"user.grant.read\" - no permissions required for listing own authorizations
* List Authorizations
* ListAuthorizations returns all authorizations matching the request and necessary permissions. Required permissions: - \"user.grant.read\" - no permissions required for listing own authorizations
* @param betaAuthorizationServiceListAuthorizationsRequest (required)
* @return BetaAuthorizationServiceListAuthorizationsResponse
* @throws ApiException if fails to make API call
Expand All @@ -357,8 +357,8 @@ public BetaAuthorizationServiceListAuthorizationsResponse listAuthorizations(Bet


/**
* ListAuthorizations
* List Authorizations ListAuthorizations returns all authorizations matching the request and necessary permissions. Required permissions: - \"user.grant.read\" - no permissions required for listing own authorizations
* List Authorizations
* ListAuthorizations returns all authorizations matching the request and necessary permissions. Required permissions: - \"user.grant.read\" - no permissions required for listing own authorizations
* @param betaAuthorizationServiceListAuthorizationsRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceListAuthorizationsResponse
Expand Down Expand Up @@ -420,8 +420,8 @@ private BetaAuthorizationServiceListAuthorizationsResponse listAuthorizations(Be


/**
* UpdateAuthorization
* Update Authorization UpdateAuthorization updates the authorization. Note that any role keys previously granted to the user and not present in the request will be revoked. Required permissions: - \"user.grant.write\"
* Update Authorization
* UpdateAuthorization updates the authorization. Note that any role keys previously granted to the user and not present in the request will be revoked. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceUpdateAuthorizationRequest (required)
* @return BetaAuthorizationServiceUpdateAuthorizationResponse
* @throws ApiException if fails to make API call
Expand All @@ -432,8 +432,8 @@ public BetaAuthorizationServiceUpdateAuthorizationResponse updateAuthorization(B


/**
* UpdateAuthorization
* Update Authorization UpdateAuthorization updates the authorization. Note that any role keys previously granted to the user and not present in the request will be revoked. Required permissions: - \"user.grant.write\"
* Update Authorization
* UpdateAuthorization updates the authorization. Note that any role keys previously granted to the user and not present in the request will be revoked. Required permissions: - \"user.grant.write\"
* @param betaAuthorizationServiceUpdateAuthorizationRequest (required)
* @param additionalHeaders additionalHeaders for this call
* @return BetaAuthorizationServiceUpdateAuthorizationResponse
Expand Down
Loading
Loading