diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 0602bac96..3d47191f2 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -30,7 +30,7 @@ jobs: with: push: true file: "./Dockerfile.dev" - tags: raystack/shield:dev + tags: raystack/frontier:dev releaser: runs-on: ubuntu-latest steps: diff --git a/.gitignore b/.gitignore index afc1f9a12..21e8af30d 100644 --- a/.gitignore +++ b/.gitignore @@ -7,7 +7,7 @@ proxies/*.yaml proxies/*.yml .temp temp -shield +frontier config.yaml config.yml coverage.txt diff --git a/.goreleaser.yml b/.goreleaser.yml index 1220973cc..24b18e0fb 100644 --- a/.goreleaser.yml +++ b/.goreleaser.yml @@ -1,4 +1,4 @@ -project_name: shield +project_name: frontier release: prerelease: auto @@ -8,20 +8,20 @@ before: - make test builds: - - id: "shield" + - id: "frontier" goos: [linux, darwin, windows] goarch: [amd64, arm64] - binary: shield + binary: frontier main: ./main.go ldflags: - - -s -w -X github.com/raystack/shield/config.Version={{.Tag}} - - -X github.com/raystack/shield/config.BuildCommit={{.FullCommit}} - - -X github.com/raystack/shield/config.BuildDate={{.Date}} + - -s -w -X github.com/raystack/frontier/config.Version={{.Tag}} + - -X github.com/raystack/frontier/config.BuildCommit={{.FullCommit}} + - -X github.com/raystack/frontier/config.BuildDate={{.Date}} env: - CGO_ENABLED=0 archives: - - id: "shield-archive" + - id: "frontier-archive" format: tar.gz name_template: >- {{ .ProjectName }}_ @@ -52,7 +52,7 @@ dockers: - goos: linux goarch: amd64 ids: - - shield + - frontier dockerfile: Dockerfile image_templates: - "docker.io/raystack/{{.ProjectName}}:latest" @@ -61,7 +61,7 @@ dockers: - goos: linux goarch: arm64 ids: - - shield + - frontier dockerfile: Dockerfile image_templates: - "docker.io/raystack/{{.ProjectName}}:{{ .Tag }}-arm64" @@ -69,14 +69,14 @@ dockers: nfpms: - maintainer: Raystack description: Identity and authorization system - homepage: https://github.com/raystack/shield + homepage: https://github.com/raystack/frontier license: Apache 2.0 formats: - deb - rpm scoops: - - homepage: "https://github.com/raystack/shield" + - homepage: "https://github.com/raystack/frontier" description: "Identity and authorization system" license: Apache 2.0 bucket: @@ -84,8 +84,8 @@ scoops: name: scoop-bucket brews: - - name: shield - homepage: "https://github.com/raystack/shield" + - name: frontier + homepage: "https://github.com/raystack/frontier" description: "Identity and authorization system" tap: owner: raystack @@ -95,7 +95,7 @@ brews: dependencies: - name: git install: |- - bin.install "shield" + bin.install "frontier" commit_author: name: Ravi Suhag email: suhag.ravi@gmail.com diff --git a/Dockerfile b/Dockerfile index 8fca5560f..eed84fe18 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,7 +1,7 @@ FROM alpine:3.17 -COPY shield /usr/bin/shield +COPY frontier /usr/bin/frontier EXPOSE 8080 EXPOSE 5556 -ENTRYPOINT ["shield"] \ No newline at end of file +ENTRYPOINT ["frontier"] \ No newline at end of file diff --git a/Dockerfile.dev b/Dockerfile.dev index fcd7de10d..7ddca0cc9 100644 --- a/Dockerfile.dev +++ b/Dockerfile.dev @@ -12,7 +12,7 @@ COPY . . RUN make build FROM alpine:3.17 -COPY --from=builder /go/src/app/shield /usr/bin/ +COPY --from=builder /go/src/app/frontier /usr/bin/ RUN apk update RUN apk add ca-certificates @@ -20,4 +20,4 @@ RUN apk add ca-certificates # don't work well with musl libc that alpine uses RUN apk add libc6-compat -ENTRYPOINT ["shield", "server"] \ No newline at end of file +ENTRYPOINT ["frontier", "server"] \ No newline at end of file diff --git a/Makefile b/Makefile index fec2b2eb1..cb34f6be0 100644 --- a/Makefile +++ b/Makefile @@ -1,10 +1,10 @@ GOVERSION := $(shell go version | cut -d ' ' -f 3 | cut -d '.' -f 2) -NAME=github.com/raystack/shield +NAME=github.com/raystack/frontier TAG := $(shell git rev-list --tags --max-count=1) VERSION := $(shell git describe --tags ${TAG}) .PHONY: build check fmt lint test test-race vet test-cover-html help install proto ui .DEFAULT_GOAL := build -PROTON_COMMIT := "7a4fd9e7a6e557aec52f9dafe0c26fa099e54b0b" +PROTON_COMMIT := "6b20a5b1ce9ef3934c816bf9aee38484d8fcc592" ui: @echo " > generating ui build" @@ -16,7 +16,7 @@ install: @go get -d github.com/vektra/mockery/v2@v2.13.1 build: - CGO_ENABLED=0 go build -ldflags "-X ${NAME}/config.Version=${VERSION}" -o shield . + CGO_ENABLED=0 go build -ldflags "-X ${NAME}/config.Version=${VERSION}" -o frontier . generate: ## run all go generate in the code base (including generating mock files) go generate ./... @@ -47,7 +47,7 @@ integration-test: go test -v -race ./test/integration benchmark: ## Run benchmarks - go test -run=XX -bench=Benchmark. -count 3 -benchtime=1s github.com/raystack/shield/test/integration + go test -run=XX -bench=Benchmark. -count 3 -benchtime=1s github.com/raystack/frontier/test/integration coverage: ## print code coverage go test -race -coverprofile coverage.out -covermode=atomic ./... -tags=unit_test && go tool cover -html=coverage.txt @@ -58,8 +58,8 @@ clean : proto: ## Generate the protobuf files @echo " > generating protobuf from raystack/proton" @echo " > [info] make sure correct version of dependencies are installed using 'make install'" - @buf generate https://github.com/raystack/proton/archive/${PROTON_COMMIT}.zip#strip_components=1 --template buf.gen.yaml --path raystack/shield - @cp -R proto/raystack/shield/* proto/ && rm -Rf proto/raystack + @buf generate https://github.com/raystack/proton/archive/${PROTON_COMMIT}.zip#strip_components=1 --template buf.gen.yaml --path raystack/frontier + @cp -R proto/raystack/frontier/* proto/ && rm -Rf proto/raystack @echo " > protobuf compilation finished" clean-doc: diff --git a/README.md b/README.md index 348b28999..ec062e450 100644 --- a/README.md +++ b/README.md @@ -1,18 +1,18 @@ -# Shield +# Frontier -![build workflow](https://github.com/raystack/shield/actions/workflows/test.yml/badge.svg) -![package workflow](https://github.com/raystack/shield/actions/workflows/release.yml/badge.svg) -[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg?logo=apache)](LICENSE) -[![Version](https://img.shields.io/github/v/release/raystack/shield?logo=semantic-release)](Version) -[![Coverage Status](https://coveralls.io/repos/github/raystack/shield/badge.svg?branch=main)](https://coveralls.io/github/raystack/shield?branch=main) +![build workflow](https://github.com/raystack/frontier/actions/workflows/test.yml/badge.svg) +![package workflow](https://github.com/raystack/frontier/actions/workflows/release.yml/badge.svg) +[![License](https://img.frontiers.io/badge/License-Apache%202.0-blue.svg?logo=apache)](LICENSE) +[![Version](https://img.frontiers.io/github/v/release/raystack/frontier?logo=semantic-release)](Version) +[![Coverage Status](https://coveralls.io/repos/github/raystack/frontier/badge.svg?branch=main)](https://coveralls.io/github/raystack/frontier?branch=main) -Shield is an identity and access management tool designed to help organizations secure their systems and data. With Shield, you can manage user authentication and authorization across all your applications and services, ensuring that only authorized users have access to your valuable resources. +Frontier is an identity and access management tool designed to help organizations secure their systems and data. With Frontier, you can manage user authentication and authorization across all your applications and services, ensuring that only authorized users have access to your valuable resources.

## Key Features -Discover why users choose Shield as their authorization server +Discover why users choose Frontier as their authorization server - **User management** Create and manage user accounts for all your applications and services. - **Organization management** Manage multiple tenants, each with their own set of users, applications, and services. @@ -26,51 +26,51 @@ Discover why users choose Shield as their authorization server ## How can I get started? -- [Introduction](docs/docs/introduction.md) provide guidance on how to use Shield and configure it to your needs -- [Concepts](docs/docs/concepts/architecture.md) descibe the primary concepts and architecture behind Shield -- [Reference](docs/docs/reference/api-definitions.md) contains the list of all the APIs that Shield exposes -- [Contributing](docs/docs/contribution/contribute.md) contains resources for anyone who wants to contribute to Shield +- [Introduction](docs/docs/introduction.md) provide guidance on how to use Frontier and configure it to your needs +- [Concepts](docs/docs/concepts/architecture.md) descibe the primary concepts and architecture behind Frontier +- [Reference](docs/docs/reference/api-definitions.md) contains the list of all the APIs that Frontier exposes +- [Contributing](docs/docs/contribution/contribute.md) contains resources for anyone who wants to contribute to Frontier ## Installation -Install Shield on macOS, Windows, Linux, OpenBSD, FreeBSD, and on any machine. Refer this for [installations](https://raystack.github.io/shield/docs/installation). +Install Frontier on macOS, Windows, Linux, OpenBSD, FreeBSD, and on any machine. Refer this for [installations](https://raystack.github.io/frontier/docs/installation). #### Binary (Cross-platform) -Download the appropriate version for your platform from [releases](https://github.com/raystack/shield/releases) page. Once downloaded, the binary can be run from anywhere. +Download the appropriate version for your platform from [releases](https://github.com/raystack/frontier/releases) page. Once downloaded, the binary can be run from anywhere. You don’t need to install it into a global location. This works well for shared hosts and other systems where you don’t have a privileged account. Ideally, you should install it somewhere in your PATH for easy use. `/usr/local/bin` is the most probable location. #### macOS -`shield` is available via a Homebrew Tap, and as downloadable binary from the [releases](https://github.com/raystack/shield/releases/latest) page: +`frontier` is available via a Homebrew Tap, and as downloadable binary from the [releases](https://github.com/raystack/frontier/releases/latest) page: ```sh -brew install raystack/tap/shield +brew install raystack/tap/frontier ``` To upgrade to the latest version: ``` -brew upgrade shield +brew upgrade frontier ``` #### Linux -`shield` is available as downloadable binaries from the [releases](https://github.com/raystack/shield/releases/latest) page. Download the `.deb` or `.rpm` from the releases page and install with `sudo dpkg -i` and `sudo rpm -i` respectively. +`frontier` is available as downloadable binaries from the [releases](https://github.com/raystack/frontier/releases/latest) page. Download the `.deb` or `.rpm` from the releases page and install with `sudo dpkg -i` and `sudo rpm -i` respectively. #### Windows -`shield` is available via [scoop](https://scoop.sh/), and as a downloadable binary from the [releases](https://github.com/raystack/shield/releases/latest) page: +`frontier` is available via [scoop](https://scoop.sh/), and as a downloadable binary from the [releases](https://github.com/raystack/frontier/releases/latest) page: ``` -scoop bucket add shield https://github.com/raystack/scoop-bucket.git +scoop bucket add frontier https://github.com/raystack/scoop-bucket.git ``` To upgrade to the latest version: ``` -scoop update shield +scoop update frontier ``` #### Docker @@ -78,53 +78,53 @@ scoop update shield We provide ready to use Docker container images. To pull the latest image: ``` -docker pull raystack/shield:latest +docker pull raystack/frontier:latest ``` To pull a specific version: ``` -docker pull raystack/shield:0.6.2 +docker pull raystack/frontier:0.6.2 ``` ## Usage -Shield is purely API-driven. It is very easy to get started with Shield. It provides CLI, HTTP and GRPC APIs for simpler developer experience. +Frontier is purely API-driven. It is very easy to get started with Frontier. It provides CLI, HTTP and GRPC APIs for simpler developer experience. #### CLI -Shield CLI is fully featured and simple to use, even for those who have very limited experience working from the command line. Run `shield --help` to see list of all available commands and instructions to use. +Frontier CLI is fully featured and simple to use, even for those who have very limited experience working from the command line. Run `frontier --help` to see list of all available commands and instructions to use. List of commands ``` -shield --help +frontier --help ``` Print command reference ```sh -shield reference +frontier reference ``` #### API -Shield provides a fully-featured GRPC and HTTP API to interact with Shield server. Both APIs adheres to a set of standards that are rigidly followed. Please refer to [proton](https://github.com/raystack/proton/tree/main/raystack/shield/v1beta1) for GRPC API definitions. +Frontier provides a fully-featured GRPC and HTTP API to interact with Frontier server. Both APIs adheres to a set of standards that are rigidly followed. Please refer to [proton](https://github.com/raystack/proton/tree/main/raystack/frontier/v1beta1) for GRPC API definitions. ## Contribute -Development of Shield happens on GitHub, and we are grateful to the community for contributing bugfixes and +Development of Frontier happens on GitHub, and we are grateful to the community for contributing bugfixes and improvements. -Read our [contribution guide](https://raystack.github.io/shield/docs/contribute/contribution) to learn about our development process, how to propose -bugfixes and improvements, and how to build and test your changes to Shield. +Read our [contribution guide](https://raystack.github.io/frontier/docs/contribute/contribution) to learn about our development process, how to propose +bugfixes and improvements, and how to build and test your changes to Frontier. To help you get your feet wet and get you familiar with our contribution process, we have a list of -[good first issues](https://github.com/raystack/shield/labels/good%20first%20issue) that contain bugs which have a relatively +[good first issues](https://github.com/raystack/frontier/labels/good%20first%20issue) that contain bugs which have a relatively limited scope. This is a great place to get started. -This project exists thanks to all the [contributors](https://github.com/raystack/shield/graphs/contributors). +This project exists thanks to all the [contributors](https://github.com/raystack/frontier/graphs/contributors). ## License -Shield is [Apache 2.0](LICENSE) licensed. +Frontier is [Apache 2.0](LICENSE) licensed. diff --git a/cmd/client.go b/cmd/client.go index 30d2c1797..2a19dbd9b 100644 --- a/cmd/client.go +++ b/cmd/client.go @@ -7,7 +7,7 @@ import ( "google.golang.org/grpc/credentials" "google.golang.org/grpc/credentials/insecure" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/spf13/cobra" "google.golang.org/grpc" ) @@ -28,7 +28,7 @@ func createConnection(ctx context.Context, host string, caCertFile string) (*grp return grpc.DialContext(ctx, host, opts...) } -func createClient(ctx context.Context, host string) (shieldv1beta1.ShieldServiceClient, func(), error) { +func createClient(ctx context.Context, host string) (frontierv1beta1.FrontierServiceClient, func(), error) { dialTimeoutCtx, dialCancel := context.WithTimeout(ctx, time.Second*2) conn, err := createConnection(dialTimeoutCtx, host, "") if err != nil { @@ -40,11 +40,11 @@ func createClient(ctx context.Context, host string) (shieldv1beta1.ShieldService conn.Close() } - client := shieldv1beta1.NewShieldServiceClient(conn) + client := frontierv1beta1.NewFrontierServiceClient(conn) return client, cancel, nil } -func createAdminClient(ctx context.Context, host string) (shieldv1beta1.AdminServiceClient, func(), error) { +func createAdminClient(ctx context.Context, host string) (frontierv1beta1.AdminServiceClient, func(), error) { dialTimeoutCtx, dialCancel := context.WithTimeout(ctx, time.Second*2) conn, err := createConnection(dialTimeoutCtx, host, "") if err != nil { @@ -56,7 +56,7 @@ func createAdminClient(ctx context.Context, host string) (shieldv1beta1.AdminSer conn.Close() } - client := shieldv1beta1.NewAdminServiceClient(conn) + client := frontierv1beta1.NewAdminServiceClient(conn) return client, cancel, nil } @@ -88,5 +88,5 @@ func overrideClientConfigHost(cmd *cobra.Command, cliConfig *Config) error { } func bindFlagsFromClientConfig(cmd *cobra.Command) { - cmd.PersistentFlags().StringP("host", "h", "", "Shield API service to connect to") + cmd.PersistentFlags().StringP("host", "h", "", "Frontier API service to connect to") } diff --git a/cmd/config.go b/cmd/config.go index a8eb59fad..09edf338b 100644 --- a/cmd/config.go +++ b/cmd/config.go @@ -15,7 +15,7 @@ type Config struct { func LoadConfig() (*Config, error) { var config Config - cfg := cmdx.SetConfig("shield") + cfg := cmdx.SetConfig("frontier") err := cfg.Load(&config) return &config, err @@ -26,8 +26,8 @@ func configCommand() *cobra.Command { Use: "config ", Short: "Manage client configurations", Example: heredoc.Doc(` - $ shield config init - $ shield config list`), + $ frontier config init + $ frontier config list`), } cmd.AddCommand(configInitCommand()) @@ -41,13 +41,13 @@ func configInitCommand() *cobra.Command { Use: "init", Short: "Initialize a new client configuration", Example: heredoc.Doc(` - $ shield config init + $ frontier config init `), Annotations: map[string]string{ "group": "core", }, RunE: func(cmd *cobra.Command, args []string) error { - cfg := cmdx.SetConfig("shield") + cfg := cmdx.SetConfig("frontier") if err := cfg.Init(&Config{}); err != nil { return err @@ -64,13 +64,13 @@ func configListCommand() *cobra.Command { Use: "list", Short: "List client configuration settings", Example: heredoc.Doc(` - $ shield config list + $ frontier config list `), Annotations: map[string]string{ "group": "core", }, RunE: func(cmd *cobra.Command, args []string) error { - cfg := cmdx.SetConfig("shield") + cfg := cmdx.SetConfig("frontier") data, err := cfg.Read() if err != nil { diff --git a/cmd/errors.go b/cmd/errors.go index 68fe6a993..566cce399 100644 --- a/cmd/errors.go +++ b/cmd/errors.go @@ -8,23 +8,23 @@ import ( var ( ErrClientConfigNotFound = errors.New(heredoc.Doc(` - Shield client config not found. + Frontier client config not found. - Run "shield config init" to initialize a new client config or - Run "shield help environment" for more information. + Run "frontier config init" to initialize a new client config or + Run "frontier help environment" for more information. `)) ErrClientConfigHostNotFound = errors.New(heredoc.Doc(` - Shield client config "host" not found. + Frontier client config "host" not found. - Pass shield server host with "--host" flag or - set host in shield config. + Pass frontier server host with "--host" flag or + set host in frontier config. - Run "shield config " or - "shield help environment" for more information. + Run "frontier config " or + "frontier help environment" for more information. `)) ErrClientNotAuthorized = errors.New(heredoc.Doc(` - Shield auth error. Shield requires an auth header. + Frontier auth error. Frontier requires an auth header. - Run "shield help auth" for more information. + Run "frontier help auth" for more information. `)) ) diff --git a/cmd/group.go b/cmd/group.go index 17e689bb8..019ce28a4 100644 --- a/cmd/group.go +++ b/cmd/group.go @@ -5,9 +5,9 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -20,10 +20,10 @@ func GroupCommand(cliConfig *Config) *cli.Command { Work with groups. `), Example: heredoc.Doc(` - $ shield group create - $ shield group edit - $ shield group view - $ shield group list + $ frontier group create + $ frontier group edit + $ frontier group view + $ frontier group list `), Annotations: map[string]string{ "group": "core", @@ -49,7 +49,7 @@ func createGroupCommand(cliConfig *Config) *cli.Command { Short: "Upsert a group", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield group create --file= --header=: + $ frontier group create --file= --header=: `), Annotations: map[string]string{ "group": "core", @@ -58,7 +58,7 @@ func createGroupCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.GroupRequestBody + var reqBody frontierv1beta1.GroupRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -74,7 +74,7 @@ func createGroupCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.CreateGroup(setCtxHeader(cmd.Context(), header), &shieldv1beta1.CreateGroupRequest{ + res, err := client.CreateGroup(setCtxHeader(cmd.Context(), header), &frontierv1beta1.CreateGroupRequest{ Body: &reqBody, }) if err != nil { @@ -103,7 +103,7 @@ func editGroupCommand(cliConfig *Config) *cli.Command { Short: "Edit a group", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield group edit --file= + $ frontier group edit --file= `), Annotations: map[string]string{ "group": "core", @@ -112,7 +112,7 @@ func editGroupCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.GroupRequestBody + var reqBody frontierv1beta1.GroupRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -129,7 +129,7 @@ func editGroupCommand(cliConfig *Config) *cli.Command { defer cancel() groupID := args[0] - _, err = client.UpdateGroup(cmd.Context(), &shieldv1beta1.UpdateGroupRequest{ + _, err = client.UpdateGroup(cmd.Context(), &frontierv1beta1.UpdateGroupRequest{ Id: groupID, Body: &reqBody, }) @@ -157,7 +157,7 @@ func viewGroupCommand(cliConfig *Config) *cli.Command { Short: "View a group", Args: cli.ExactArgs(2), Example: heredoc.Doc(` - $ shield group view + $ frontier group view `), Annotations: map[string]string{ "group": "core", @@ -174,7 +174,7 @@ func viewGroupCommand(cliConfig *Config) *cli.Command { orgID := args[0] groupID := args[1] - res, err := client.GetGroup(cmd.Context(), &shieldv1beta1.GetGroupRequest{ + res, err := client.GetGroup(cmd.Context(), &frontierv1beta1.GetGroupRequest{ Id: groupID, OrgId: orgID, }) @@ -228,7 +228,7 @@ func listGroupCommand(cliConfig *Config) *cli.Command { Short: "List all groups", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield group list + $ frontier group list `), Annotations: map[string]string{ "group": "core", @@ -243,7 +243,7 @@ func listGroupCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListOrganizationGroups(cmd.Context(), &shieldv1beta1.ListOrganizationGroupsRequest{ + res, err := client.ListOrganizationGroups(cmd.Context(), &frontierv1beta1.ListOrganizationGroupsRequest{ OrgId: args[0], }) if err != nil { diff --git a/cmd/group_test.go b/cmd/group_test.go index cddb057b1..eed3df8a8 100644 --- a/cmd/group_test.go +++ b/cmd/group_test.go @@ -8,7 +8,7 @@ import ( "github.com/google/uuid" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/help.go b/cmd/help.go index 3c43b313b..7c29bfd62 100644 --- a/cmd/help.go +++ b/cmd/help.go @@ -5,7 +5,7 @@ import "github.com/MakeNowJust/heredoc" var envHelp = map[string]string{ "short": "List of supported environment variables", "long": heredoc.Doc(` - RAYSTACK_CONFIG_DIR: the directory where shield will store configuration files. Default: + RAYSTACK_CONFIG_DIR: the directory where frontier will store configuration files. Default: "$XDG_CONFIG_HOME/raystack" or "$HOME/.config/raystack". NO_COLOR: set to any value to avoid printing ANSI escape sequences for color output. CLICOLOR: set to "0" to disable printing ANSI colors in output. @@ -13,10 +13,10 @@ var envHelp = map[string]string{ } var authHelp = map[string]string{ - "short": "Auth configs that need to be used with shield", + "short": "Auth configs that need to be used with frontier", "long": heredoc.Doc(` Send an additional flag header with "key:value" format. Example: - shield create user -f user.yaml -H X-Shield-Email:user@raystack.org + frontier create user -f user.yaml -H X-Frontier-Email:user@raystack.org `), } diff --git a/cmd/migrate.go b/cmd/migrate.go index 0d7b9789f..19b4d72bf 100644 --- a/cmd/migrate.go +++ b/cmd/migrate.go @@ -11,11 +11,11 @@ import ( _ "github.com/golang-migrate/migrate/v4/source/file" "github.com/golang-migrate/migrate/v4/source/iofs" "github.com/pkg/errors" + "github.com/raystack/frontier/core/metaschema" + "github.com/raystack/frontier/internal/store/postgres" + "github.com/raystack/frontier/internal/store/postgres/migrations" + "github.com/raystack/frontier/pkg/db" "github.com/raystack/salt/log" - "github.com/raystack/shield/core/metaschema" - "github.com/raystack/shield/internal/store/postgres" - "github.com/raystack/shield/internal/store/postgres/migrations" - "github.com/raystack/shield/pkg/db" ) func RunMigrations(logger log.Logger, config db.Config) error { diff --git a/cmd/namespace.go b/cmd/namespace.go index b38488cae..b49ce525c 100644 --- a/cmd/namespace.go +++ b/cmd/namespace.go @@ -5,8 +5,8 @@ import ( "os" "github.com/MakeNowJust/heredoc" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -19,8 +19,8 @@ func NamespaceCommand(cliConfig *Config) *cli.Command { Work with namespaces. `), Example: heredoc.Doc(` - $ shield namespace list - $ shield namespace view + $ frontier namespace list + $ frontier namespace view `), Annotations: map[string]string{ "group": "core", @@ -42,7 +42,7 @@ func viewNamespaceCommand(cliConfig *Config) *cli.Command { Short: "View a namespace", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield namespace view + $ frontier namespace view `), Annotations: map[string]string{ "group": "core", @@ -58,7 +58,7 @@ func viewNamespaceCommand(cliConfig *Config) *cli.Command { defer cancel() namespaceID := args[0] - res, err := client.GetNamespace(cmd.Context(), &shieldv1beta1.GetNamespaceRequest{ + res, err := client.GetNamespace(cmd.Context(), &frontierv1beta1.GetNamespaceRequest{ Id: namespaceID, }) if err != nil { @@ -95,7 +95,7 @@ func listNamespaceCommand(cliConfig *Config) *cli.Command { Short: "List all namespaces", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield namespace list + $ frontier namespace list `), Annotations: map[string]string{ "group": "core", @@ -110,7 +110,7 @@ func listNamespaceCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListNamespaces(cmd.Context(), &shieldv1beta1.ListNamespacesRequest{}) + res, err := client.ListNamespaces(cmd.Context(), &frontierv1beta1.ListNamespacesRequest{}) if err != nil { return err } diff --git a/cmd/namespace_test.go b/cmd/namespace_test.go index 98aa3b6c2..781780318 100644 --- a/cmd/namespace_test.go +++ b/cmd/namespace_test.go @@ -5,7 +5,7 @@ import ( "context" "testing" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/organization.go b/cmd/organization.go index 0734a5f90..0fe4c736a 100644 --- a/cmd/organization.go +++ b/cmd/organization.go @@ -5,9 +5,9 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -20,10 +20,10 @@ func OrganizationCommand(cliConfig *Config) *cli.Command { Work with organizations. `), Example: heredoc.Doc(` - $ shield organization create - $ shield organization edit - $ shield organization view - $ shield organization list + $ frontier organization create + $ frontier organization edit + $ frontier organization view + $ frontier organization list `), Annotations: map[string]string{ "group": "core", @@ -50,7 +50,7 @@ func createOrganizationCommand(cliConfig *Config) *cli.Command { Short: "Upsert an organization", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield organization create --file= --header=: + $ frontier organization create --file= --header=: `), Annotations: map[string]string{ "group": "core", @@ -59,7 +59,7 @@ func createOrganizationCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.OrganizationRequestBody + var reqBody frontierv1beta1.OrganizationRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -76,7 +76,7 @@ func createOrganizationCommand(cliConfig *Config) *cli.Command { defer cancel() ctx := setCtxHeader(cmd.Context(), header) - res, err := client.CreateOrganization(ctx, &shieldv1beta1.CreateOrganizationRequest{ + res, err := client.CreateOrganization(ctx, &frontierv1beta1.CreateOrganizationRequest{ Body: &reqBody, }) if err != nil { @@ -105,7 +105,7 @@ func editOrganizationCommand(cliConfig *Config) *cli.Command { Short: "Edit an organization", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield organization edit --file= + $ frontier organization edit --file= `), Annotations: map[string]string{ "group": "core", @@ -114,7 +114,7 @@ func editOrganizationCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.OrganizationRequestBody + var reqBody frontierv1beta1.OrganizationRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -131,7 +131,7 @@ func editOrganizationCommand(cliConfig *Config) *cli.Command { defer cancel() organizationID := args[0] - _, err = client.UpdateOrganization(cmd.Context(), &shieldv1beta1.UpdateOrganizationRequest{ + _, err = client.UpdateOrganization(cmd.Context(), &frontierv1beta1.UpdateOrganizationRequest{ Id: organizationID, Body: &reqBody, }) @@ -159,7 +159,7 @@ func viewOrganizationCommand(cliConfig *Config) *cli.Command { Short: "View an organization", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield organization view + $ frontier organization view `), Annotations: map[string]string{ "group": "core", @@ -175,7 +175,7 @@ func viewOrganizationCommand(cliConfig *Config) *cli.Command { defer cancel() organizationID := args[0] - res, err := client.GetOrganization(cmd.Context(), &shieldv1beta1.GetOrganizationRequest{ + res, err := client.GetOrganization(cmd.Context(), &frontierv1beta1.GetOrganizationRequest{ Id: organizationID, }) if err != nil { @@ -227,7 +227,7 @@ func listOrganizationCommand(cliConfig *Config) *cli.Command { Short: "List all organizations", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield organization list + $ frontier organization list `), Annotations: map[string]string{ "group": "core", @@ -242,7 +242,7 @@ func listOrganizationCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListOrganizations(cmd.Context(), &shieldv1beta1.ListOrganizationsRequest{}) + res, err := client.ListOrganizations(cmd.Context(), &frontierv1beta1.ListOrganizationsRequest{}) if err != nil { return err } @@ -281,7 +281,7 @@ func admlistOrganizationCommand(cliConfig *Config) *cli.Command { Short: "list admins of an organization", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield organization admlist + $ frontier organization admlist `), Annotations: map[string]string{ "group": "core", @@ -297,7 +297,7 @@ func admlistOrganizationCommand(cliConfig *Config) *cli.Command { defer cancel() organizationID := args[0] - res, err := client.ListOrganizationAdmins(cmd.Context(), &shieldv1beta1.ListOrganizationAdminsRequest{ + res, err := client.ListOrganizationAdmins(cmd.Context(), &frontierv1beta1.ListOrganizationAdminsRequest{ Id: organizationID, }) if err != nil { diff --git a/cmd/organization_test.go b/cmd/organization_test.go index 0ff682577..7a5b116eb 100644 --- a/cmd/organization_test.go +++ b/cmd/organization_test.go @@ -6,7 +6,7 @@ import ( "errors" "testing" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/permission.go b/cmd/permission.go index f0850df6a..6e41f1fde 100644 --- a/cmd/permission.go +++ b/cmd/permission.go @@ -5,9 +5,9 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -20,10 +20,10 @@ func PermissionCommand(cliConfig *Config) *cli.Command { Work with permissions. `), Example: heredoc.Doc(` - $ shield permission create - $ shield permission edit - $ shield permission view - $ shield permission list + $ frontier permission create + $ frontier permission edit + $ frontier permission view + $ frontier permission list `), Annotations: map[string]string{ "group": "core", @@ -49,7 +49,7 @@ func createPermissionCommand(cliConfig *Config) *cli.Command { Short: "Upsert a permission", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield permission create --file= --header=: + $ frontier permission create --file= --header=: `), Annotations: map[string]string{ "action:core": "true", @@ -58,7 +58,7 @@ func createPermissionCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.PermissionRequestBody + var reqBody frontierv1beta1.PermissionRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -75,8 +75,8 @@ func createPermissionCommand(cliConfig *Config) *cli.Command { defer cancel() ctx := setCtxHeader(cmd.Context(), header) - res, err := client.CreatePermission(ctx, &shieldv1beta1.CreatePermissionRequest{ - Bodies: []*shieldv1beta1.PermissionRequestBody{&reqBody}, + res, err := client.CreatePermission(ctx, &frontierv1beta1.CreatePermissionRequest{ + Bodies: []*frontierv1beta1.PermissionRequestBody{&reqBody}, }) if err != nil { return err @@ -104,7 +104,7 @@ func editPermissionCommand(cliConfig *Config) *cli.Command { Short: "Edit a permission", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield permission edit --file= + $ frontier permission edit --file= `), Annotations: map[string]string{ "action:core": "true", @@ -113,7 +113,7 @@ func editPermissionCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.PermissionRequestBody + var reqBody frontierv1beta1.PermissionRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -130,7 +130,7 @@ func editPermissionCommand(cliConfig *Config) *cli.Command { defer cancel() permissionID := args[0] - _, err = client.UpdatePermission(cmd.Context(), &shieldv1beta1.UpdatePermissionRequest{ + _, err = client.UpdatePermission(cmd.Context(), &frontierv1beta1.UpdatePermissionRequest{ Id: permissionID, Body: &reqBody, }) @@ -156,7 +156,7 @@ func viewPermissionCommand(cliConfig *Config) *cli.Command { Short: "View a permission", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield permission view + $ frontier permission view `), Annotations: map[string]string{ "action:core": "true", @@ -172,7 +172,7 @@ func viewPermissionCommand(cliConfig *Config) *cli.Command { defer cancel() permissionID := args[0] - res, err := client.GetPermission(cmd.Context(), &shieldv1beta1.GetPermissionRequest{ + res, err := client.GetPermission(cmd.Context(), &frontierv1beta1.GetPermissionRequest{ Id: permissionID, }) if err != nil { @@ -206,7 +206,7 @@ func listPermissionCommand(cliConfig *Config) *cli.Command { Short: "List all permissions", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield permission list + $ frontier permission list `), Annotations: map[string]string{ "action:core": "true", @@ -221,7 +221,7 @@ func listPermissionCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListPermissions(cmd.Context(), &shieldv1beta1.ListPermissionsRequest{}) + res, err := client.ListPermissions(cmd.Context(), &frontierv1beta1.ListPermissionsRequest{}) if err != nil { return err } diff --git a/cmd/permission_test.go b/cmd/permission_test.go index 0c0675579..4b5080619 100644 --- a/cmd/permission_test.go +++ b/cmd/permission_test.go @@ -6,7 +6,7 @@ import ( "errors" "testing" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/policy.go b/cmd/policy.go index ffa3a1d28..c2885600d 100644 --- a/cmd/policy.go +++ b/cmd/policy.go @@ -5,9 +5,9 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -20,9 +20,9 @@ func PolicyCommand(cliConfig *Config) *cli.Command { Work with policies. `), Example: heredoc.Doc(` - $ shield policy create - $ shield policy edit - $ shield policy view + $ frontier policy create + $ frontier policy edit + $ frontier policy view `), Annotations: map[string]string{ "group": "core", @@ -47,7 +47,7 @@ func createPolicyCommand(cliConfig *Config) *cli.Command { Short: "Upsert a policy", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield policy create --file= --header=: + $ frontier policy create --file= --header=: `), Annotations: map[string]string{ "policy:core": "true", @@ -56,7 +56,7 @@ func createPolicyCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.PolicyRequestBody + var reqBody frontierv1beta1.PolicyRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -73,7 +73,7 @@ func createPolicyCommand(cliConfig *Config) *cli.Command { defer cancel() ctx := setCtxHeader(cmd.Context(), header) - _, err = client.CreatePolicy(ctx, &shieldv1beta1.CreatePolicyRequest{ + _, err = client.CreatePolicy(ctx, &frontierv1beta1.CreatePolicyRequest{ Body: &reqBody, }) if err != nil { @@ -102,7 +102,7 @@ func editPolicyCommand(cliConfig *Config) *cli.Command { Short: "Edit a policy", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield policy edit --file= + $ frontier policy edit --file= `), Annotations: map[string]string{ "policy:core": "true", @@ -111,7 +111,7 @@ func editPolicyCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.PolicyRequestBody + var reqBody frontierv1beta1.PolicyRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -128,7 +128,7 @@ func editPolicyCommand(cliConfig *Config) *cli.Command { defer cancel() policyID := args[0] - _, err = client.UpdatePolicy(cmd.Context(), &shieldv1beta1.UpdatePolicyRequest{ + _, err = client.UpdatePolicy(cmd.Context(), &frontierv1beta1.UpdatePolicyRequest{ Id: policyID, Body: &reqBody, }) @@ -154,7 +154,7 @@ func viewPolicyCommand(cliConfig *Config) *cli.Command { Short: "View a policy", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield policy view + $ frontier policy view `), Annotations: map[string]string{ "policy:core": "true", @@ -170,7 +170,7 @@ func viewPolicyCommand(cliConfig *Config) *cli.Command { defer cancel() policyID := args[0] - res, err := client.GetPolicy(cmd.Context(), &shieldv1beta1.GetPolicyRequest{ + res, err := client.GetPolicy(cmd.Context(), &frontierv1beta1.GetPolicyRequest{ Id: policyID, }) if err != nil { diff --git a/cmd/policy_test.go b/cmd/policy_test.go index 9b57a5dc8..7dc86e87c 100644 --- a/cmd/policy_test.go +++ b/cmd/policy_test.go @@ -6,7 +6,7 @@ import ( "errors" "testing" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/project.go b/cmd/project.go index 585a4975f..095d54bfe 100644 --- a/cmd/project.go +++ b/cmd/project.go @@ -5,9 +5,9 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -20,10 +20,10 @@ func ProjectCommand(cliConfig *Config) *cli.Command { Work with projects. `), Example: heredoc.Doc(` - $ shield project create - $ shield project edit - $ shield project view - $ shield project list + $ frontier project create + $ frontier project edit + $ frontier project view + $ frontier project list `), Annotations: map[string]string{ "group": "core", @@ -49,7 +49,7 @@ func createProjectCommand(cliConfig *Config) *cli.Command { Short: "Upsert a project", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield project create --file= --header=: + $ frontier project create --file= --header=: `), Annotations: map[string]string{ "project:core": "true", @@ -58,7 +58,7 @@ func createProjectCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.ProjectRequestBody + var reqBody frontierv1beta1.ProjectRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -75,7 +75,7 @@ func createProjectCommand(cliConfig *Config) *cli.Command { defer cancel() ctx := setCtxHeader(cmd.Context(), header) - res, err := client.CreateProject(ctx, &shieldv1beta1.CreateProjectRequest{ + res, err := client.CreateProject(ctx, &frontierv1beta1.CreateProjectRequest{ Body: &reqBody, }) if err != nil { @@ -104,7 +104,7 @@ func editProjectCommand(cliConfig *Config) *cli.Command { Short: "Edit a project", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield project edit --file= + $ frontier project edit --file= `), Annotations: map[string]string{ "project:core": "true", @@ -113,7 +113,7 @@ func editProjectCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.ProjectRequestBody + var reqBody frontierv1beta1.ProjectRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -130,7 +130,7 @@ func editProjectCommand(cliConfig *Config) *cli.Command { defer cancel() projectID := args[0] - _, err = client.UpdateProject(cmd.Context(), &shieldv1beta1.UpdateProjectRequest{ + _, err = client.UpdateProject(cmd.Context(), &frontierv1beta1.UpdateProjectRequest{ Id: projectID, Body: &reqBody, }) @@ -158,7 +158,7 @@ func viewProjectCommand(cliConfig *Config) *cli.Command { Short: "View a project", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield project view + $ frontier project view `), Annotations: map[string]string{ "project:core": "true", @@ -174,7 +174,7 @@ func viewProjectCommand(cliConfig *Config) *cli.Command { defer cancel() projectID := args[0] - res, err := client.GetProject(cmd.Context(), &shieldv1beta1.GetProjectRequest{ + res, err := client.GetProject(cmd.Context(), &frontierv1beta1.GetProjectRequest{ Id: projectID, }) if err != nil { @@ -227,7 +227,7 @@ func listProjectCommand(cliConfig *Config) *cli.Command { Short: "List all projects", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield project list + $ frontier project list `), Annotations: map[string]string{ "project:core": "true", @@ -242,7 +242,7 @@ func listProjectCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListOrganizationProjects(cmd.Context(), &shieldv1beta1.ListOrganizationProjectsRequest{ + res, err := client.ListOrganizationProjects(cmd.Context(), &frontierv1beta1.ListOrganizationProjectsRequest{ Id: args[0], }) if err != nil { diff --git a/cmd/project_test.go b/cmd/project_test.go index 3215bd99d..13ed7781d 100644 --- a/cmd/project_test.go +++ b/cmd/project_test.go @@ -8,7 +8,7 @@ import ( "github.com/google/uuid" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/role.go b/cmd/role.go index a37831c2b..eb50f3370 100644 --- a/cmd/role.go +++ b/cmd/role.go @@ -6,9 +6,9 @@ import ( "strings" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -21,10 +21,10 @@ func RoleCommand(cliConfig *Config) *cli.Command { Work with roles. `), Example: heredoc.Doc(` - $ shield role create - $ shield role edit - $ shield role view - $ shield role list + $ frontier role create + $ frontier role edit + $ frontier role view + $ frontier role list `), Annotations: map[string]string{ "group": "core", @@ -50,7 +50,7 @@ func createRoleCommand(cliConfig *Config) *cli.Command { Short: "Upsert a role", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield role create --file= --header=: + $ frontier role create --file= --header=: `), Annotations: map[string]string{ "role:core": "true", @@ -59,7 +59,7 @@ func createRoleCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.RoleRequestBody + var reqBody frontierv1beta1.RoleRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -77,7 +77,7 @@ func createRoleCommand(cliConfig *Config) *cli.Command { ctx := setCtxHeader(cmd.Context(), header) - res, err := client.CreateOrganizationRole(ctx, &shieldv1beta1.CreateOrganizationRoleRequest{ + res, err := client.CreateOrganizationRole(ctx, &frontierv1beta1.CreateOrganizationRoleRequest{ Body: &reqBody, }) if err != nil { @@ -106,7 +106,7 @@ func editRoleCommand(cliConfig *Config) *cli.Command { Short: "Edit a role", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield role edit --file= + $ frontier role edit --file= `), Annotations: map[string]string{ "role:core": "true", @@ -115,7 +115,7 @@ func editRoleCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.RoleRequestBody + var reqBody frontierv1beta1.RoleRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -132,7 +132,7 @@ func editRoleCommand(cliConfig *Config) *cli.Command { defer cancel() roleID := args[0] - _, err = client.UpdateOrganizationRole(cmd.Context(), &shieldv1beta1.UpdateOrganizationRoleRequest{ + _, err = client.UpdateOrganizationRole(cmd.Context(), &frontierv1beta1.UpdateOrganizationRoleRequest{ Id: roleID, Body: &reqBody, }) @@ -160,7 +160,7 @@ func viewRoleCommand(cliConfig *Config) *cli.Command { Short: "View a role", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield role view + $ frontier role view `), Annotations: map[string]string{ "role:core": "true", @@ -176,7 +176,7 @@ func viewRoleCommand(cliConfig *Config) *cli.Command { defer cancel() roleID := args[0] - res, err := client.GetOrganizationRole(cmd.Context(), &shieldv1beta1.GetOrganizationRoleRequest{ + res, err := client.GetOrganizationRole(cmd.Context(), &frontierv1beta1.GetOrganizationRoleRequest{ Id: roleID, }) if err != nil { @@ -230,7 +230,7 @@ func listRoleCommand(cliConfig *Config) *cli.Command { Short: "List all roles", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield role list + $ frontier role list `), Annotations: map[string]string{ "role:core": "true", @@ -245,7 +245,7 @@ func listRoleCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListRoles(cmd.Context(), &shieldv1beta1.ListRolesRequest{}) + res, err := client.ListRoles(cmd.Context(), &frontierv1beta1.ListRolesRequest{}) if err != nil { return err } diff --git a/cmd/role_test.go b/cmd/role_test.go index 00ac88b3c..ed1983411 100644 --- a/cmd/role_test.go +++ b/cmd/role_test.go @@ -6,7 +6,7 @@ import ( "errors" "testing" - "github.com/raystack/shield/cmd" + "github.com/raystack/frontier/cmd" "github.com/stretchr/testify/assert" ) diff --git a/cmd/root.go b/cmd/root.go index d07c647a5..3a0bb2d3f 100644 --- a/cmd/root.go +++ b/cmd/root.go @@ -9,7 +9,7 @@ import ( func New(cliConfig *Config) *cli.Command { var cmd = &cli.Command{ - Use: "shield [flags]", + Use: "frontier [flags]", Short: "A cloud native role-based authorization server", Long: heredoc.Doc(` A cloud native role-based authorization server.`), @@ -18,14 +18,14 @@ func New(cliConfig *Config) *cli.Command { Annotations: map[string]string{ "group": "core", "help:learn": heredoc.Doc(` - Use 'shield --help' for info about a command. - Read the manual at https://raystack.github.io/shield/ + Use 'frontier --help' for info about a command. + Read the manual at https://raystack.github.io/frontier/ `), "help:feedback": heredoc.Doc(` - Open an issue here https://github.com/raystack/shield/issues + Open an issue here https://github.com/raystack/frontier/issues `), "help:environment": heredoc.Doc(` - See 'shield help environment' for the list of supported environment variables. + See 'frontier help environment' for the list of supported environment variables. `), }, } @@ -54,7 +54,7 @@ func New(cliConfig *Config) *cli.Command { // Help topics cmdx.SetHelp(cmd) - cmd.AddCommand(cmdx.SetCompletionCmd("shield")) + cmd.AddCommand(cmdx.SetCompletionCmd("frontier")) cmd.AddCommand(cmdx.SetHelpTopicCmd("environment", envHelp)) cmd.AddCommand(cmdx.SetHelpTopicCmd("auth", authHelp)) cmd.AddCommand(cmdx.SetRefCmd(cmd)) diff --git a/cmd/seed.go b/cmd/seed.go index 90fbe39f7..0e556abce 100644 --- a/cmd/seed.go +++ b/cmd/seed.go @@ -8,8 +8,8 @@ import ( "fmt" "github.com/MakeNowJust/heredoc" - "github.com/raystack/shield/config" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + "github.com/raystack/frontier/config" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -38,10 +38,10 @@ func SeedCommand(cliConfig *Config) *cli.Command { Use: "seed", Short: "Seed the database with initial data", Args: cli.NoArgs, - Long: "This command can be used to create an organization structure with predefined groups, projects, and resources. It bootstarps these data in the Shield db, making it easier to get started.", + Long: "This command can be used to create an organization structure with predefined groups, projects, and resources. It bootstarps these data in the Frontier db, making it easier to get started.", Example: heredoc.Doc(` - $ shield seed - $ shield seed --header=X-Shield-Email + $ frontier seed + $ frontier seed --header=X-Frontier-Email `), Annotations: map[string]string{ "group": "core", @@ -54,7 +54,7 @@ func SeedCommand(cliConfig *Config) *cli.Command { panic(err) } if appConfig.App.IdentityProxyHeader == "" { - return errors.New("identity proxy header missing in server config, pass key in the header flag \nexample: shield seed -H X-Shield-Email") + return errors.New("identity proxy header missing in server config, pass key in the header flag \nexample: frontier seed -H X-Frontier-Email") } header = appConfig.App.IdentityProxyHeader } @@ -80,7 +80,7 @@ func SeedCommand(cliConfig *Config) *cli.Command { if err := bootstrapData(ctx, client); err != nil { return fmt.Errorf("failed to bootstrap data: %w", err) } - fmt.Println("initialized sample data in shield successfully") + fmt.Println("initialized sample data in frontier successfully") return nil }, } @@ -92,13 +92,13 @@ func SeedCommand(cliConfig *Config) *cli.Command { } // create sample platform wide custom permissions and roles -func createCustomRolesAndPermissions(ctx context.Context, client shieldv1beta1.AdminServiceClient) error { - var permissionBodies []*shieldv1beta1.PermissionRequestBody +func createCustomRolesAndPermissions(ctx context.Context, client frontierv1beta1.AdminServiceClient) error { + var permissionBodies []*frontierv1beta1.PermissionRequestBody if err := json.Unmarshal(mockCustomPermissions, &permissionBodies); err != nil { return fmt.Errorf("failed to unmarshal custom permissions: %w", err) } - if _, err := client.CreatePermission(ctx, &shieldv1beta1.CreatePermissionRequest{ + if _, err := client.CreatePermission(ctx, &frontierv1beta1.CreatePermissionRequest{ Bodies: permissionBodies, }); err != nil { return fmt.Errorf("failed to create custom permission: %w", err) @@ -111,16 +111,16 @@ func createCustomRolesAndPermissions(ctx context.Context, client shieldv1beta1.A } fmt.Println(str) - var roles []*shieldv1beta1.RoleRequestBody + var roles []*frontierv1beta1.RoleRequestBody if err := json.Unmarshal(mockCustomRoles, &roles); err != nil { return fmt.Errorf("failed to unmarshal custom roles: %w", err) } str = "created custom roles :" - var roleResp *shieldv1beta1.CreateRoleResponse + var roleResp *frontierv1beta1.CreateRoleResponse var err error for _, role := range roles { - if roleResp, err = client.CreateRole(ctx, &shieldv1beta1.CreateRoleRequest{ + if roleResp, err = client.CreateRole(ctx, &frontierv1beta1.CreateRoleRequest{ Body: role, }); err != nil { return fmt.Errorf("failed to create custom role: %w", err) @@ -133,23 +133,23 @@ func createCustomRolesAndPermissions(ctx context.Context, client shieldv1beta1.A return nil } -func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient) error { - var userBodies []*shieldv1beta1.UserRequestBody +func bootstrapData(ctx context.Context, client frontierv1beta1.FrontierServiceClient) error { + var userBodies []*frontierv1beta1.UserRequestBody if err := json.Unmarshal(mockHumanUser, &userBodies); err != nil { return fmt.Errorf("failed to unmarshal user body: %w", err) } - var orgBodies []*shieldv1beta1.OrganizationRequestBody + var orgBodies []*frontierv1beta1.OrganizationRequestBody if err := json.Unmarshal(mockOrganizations, &orgBodies); err != nil { return fmt.Errorf("error unmarshaling JSON: %w", err) } - var projBodies []*shieldv1beta1.ProjectRequestBody + var projBodies []*frontierv1beta1.ProjectRequestBody if err := json.Unmarshal(mockProjects, &projBodies); err != nil { return fmt.Errorf("failed to unmarshal project body: %w", err) } - var resourceBodies []*shieldv1beta1.ResourceRequestBody + var resourceBodies []*frontierv1beta1.ResourceRequestBody if err := json.Unmarshal(mockResource, &resourceBodies); err != nil { return fmt.Errorf("failed to unmarshal resource body: %w", err) } @@ -158,16 +158,16 @@ func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient var i = 0 for _, orgBody := range orgBodies { - userResp, err := client.CreateUser(ctx, &shieldv1beta1.CreateUserRequest{ + userResp, err := client.CreateUser(ctx, &frontierv1beta1.CreateUserRequest{ Body: userBodies[i], }) if err != nil { return fmt.Errorf("failed to create sample user: %w", err) } - fmt.Printf("created user with email %s in shield\n", userResp.User.Email) + fmt.Printf("created user with email %s in frontier\n", userResp.User.Email) - orgResp, err := client.CreateOrganization(ctx, &shieldv1beta1.CreateOrganizationRequest{ + orgResp, err := client.CreateOrganization(ctx, &frontierv1beta1.CreateOrganizationRequest{ Body: orgBody, }) if err != nil { @@ -176,8 +176,8 @@ func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient fmt.Printf("created organization name %s with user %s as the org admin \n", orgResp.Organization.Name, sampleSeedEmail) // create service user for an org - serviceUserResp, err := client.CreateServiceUser(ctx, &shieldv1beta1.CreateServiceUserRequest{ - Body: &shieldv1beta1.ServiceUserRequestBody{Title: "sample service user"}, + serviceUserResp, err := client.CreateServiceUser(ctx, &frontierv1beta1.CreateServiceUserRequest{ + Body: &frontierv1beta1.ServiceUserRequestBody{Title: "sample service user"}, OrgId: orgResp.Organization.Id, }) if err != nil { @@ -189,7 +189,7 @@ func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient // create project inside org projBodies[i].OrgId = orgResp.Organization.Id - projResp, err := client.CreateProject(ctx, &shieldv1beta1.CreateProjectRequest{ + projResp, err := client.CreateProject(ctx, &frontierv1beta1.CreateProjectRequest{ Body: projBodies[i], }) if err != nil { @@ -201,7 +201,7 @@ func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient // create resource inside project resourceBodies[i].Principal = userResp.User.Id - resrcResp, err := client.CreateProjectResource(ctx, &shieldv1beta1.CreateProjectResourceRequest{ + resrcResp, err := client.CreateProjectResource(ctx, &frontierv1beta1.CreateProjectResourceRequest{ ProjectId: projResp.Project.Id, Body: resourceBodies[i], }) @@ -214,8 +214,8 @@ func bootstrapData(ctx context.Context, client shieldv1beta1.ShieldServiceClient //create sample policy resource := fmt.Sprintf("%s:%s", samplePolicyNamespace[i], resrcResp.Resource.Id) user := fmt.Sprintf("%s:%s", "app/user", userResp.User.Id) - policyResp, err := client.CreatePolicy(ctx, &shieldv1beta1.CreatePolicyRequest{ - Body: &shieldv1beta1.PolicyRequestBody{ + policyResp, err := client.CreatePolicy(ctx, &frontierv1beta1.CreatePolicyRequest{ + Body: &frontierv1beta1.PolicyRequestBody{ RoleId: samplePolicyRole[i], Resource: resource, Principal: user, diff --git a/cmd/seed/organizations.json b/cmd/seed/organizations.json index 1d80b9ccb..67f4d13fa 100644 --- a/cmd/seed/organizations.json +++ b/cmd/seed/organizations.json @@ -3,7 +3,7 @@ "name": "sample-org1", "title": "Sample Org 1", "metadata": { - "description": "Sample Shield Organization" + "description": "Sample Frontier Organization" } }, { diff --git a/cmd/serve.go b/cmd/serve.go index 6c640d207..a6a36244b 100644 --- a/cmd/serve.go +++ b/cmd/serve.go @@ -11,48 +11,48 @@ import ( "syscall" "time" - "github.com/raystack/shield/core/audit" + "github.com/raystack/frontier/core/audit" - "github.com/raystack/shield/core/serviceuser" + "github.com/raystack/frontier/core/serviceuser" "github.com/lestrrat-go/jwx/v2/jwk" - "github.com/raystack/shield/core/authenticate/token" + "github.com/raystack/frontier/core/authenticate/token" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" - "github.com/raystack/shield/pkg/server/consts" + "github.com/raystack/frontier/pkg/server/consts" - "github.com/raystack/shield/core/invitation" + "github.com/raystack/frontier/core/invitation" - "github.com/raystack/shield/pkg/mailer" + "github.com/raystack/frontier/pkg/mailer" - "github.com/raystack/shield/core/permission" - "github.com/raystack/shield/internal/bootstrap" + "github.com/raystack/frontier/core/permission" + "github.com/raystack/frontier/internal/bootstrap" - "github.com/raystack/shield/core/deleter" + "github.com/raystack/frontier/core/deleter" _ "github.com/authzed/authzed-go/proto/authzed/api/v0" _ "github.com/jackc/pgx/v4/stdlib" newrelic "github.com/newrelic/go-agent" - "github.com/raystack/shield/core/authenticate" - "github.com/raystack/shield/core/authenticate/session" - "github.com/raystack/shield/core/metaschema" - - "github.com/raystack/shield/config" - "github.com/raystack/shield/core/group" - "github.com/raystack/shield/core/namespace" - "github.com/raystack/shield/core/organization" - "github.com/raystack/shield/core/policy" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/resource" - "github.com/raystack/shield/core/role" - "github.com/raystack/shield/core/user" - "github.com/raystack/shield/internal/api" - "github.com/raystack/shield/internal/store/blob" - "github.com/raystack/shield/internal/store/postgres" - "github.com/raystack/shield/internal/store/spicedb" - "github.com/raystack/shield/pkg/db" + "github.com/raystack/frontier/core/authenticate" + "github.com/raystack/frontier/core/authenticate/session" + "github.com/raystack/frontier/core/metaschema" + + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/core/group" + "github.com/raystack/frontier/core/namespace" + "github.com/raystack/frontier/core/organization" + "github.com/raystack/frontier/core/policy" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/resource" + "github.com/raystack/frontier/core/role" + "github.com/raystack/frontier/core/user" + "github.com/raystack/frontier/internal/api" + "github.com/raystack/frontier/internal/store/blob" + "github.com/raystack/frontier/internal/store/postgres" + "github.com/raystack/frontier/internal/store/spicedb" + "github.com/raystack/frontier/pkg/db" "github.com/pkg/profile" "github.com/raystack/salt/log" @@ -63,8 +63,8 @@ var ( ruleCacheRefreshDelay = time.Minute * 2 ) -func StartServer(logger *log.Zap, cfg *config.Shield) error { - logger.Info("shield starting", "version", config.Version) +func StartServer(logger *log.Zap, cfg *config.Frontier) error { + logger.Info("frontier starting", "version", config.Version) if profiling := os.Getenv("SHIELD_PROFILE"); profiling == "true" || profiling == "1" { defer profile.Start(profile.CPUProfile, profile.ProfilePath("."), profile.NoShutdownHook).Stop() } @@ -181,7 +181,7 @@ func StartServer(logger *log.Zap, cfg *config.Shield) error { func buildAPIDependencies( logger log.Logger, - cfg *config.Shield, + cfg *config.Frontier, resourceBlobRepository *blob.ResourcesRepository, dbc *db.Client, sdb *spicedb.SpiceDB, @@ -284,7 +284,7 @@ func buildAPIDependencies( default: auditRepository = audit.NewWriteOnlyRepository(io.Discard) } - auditService := audit.NewService("shield", auditRepository) + auditService := audit.NewService("frontier", auditRepository) dependencies := api.Deps{ DisableOrgsListing: cfg.App.DisableOrgsListing, diff --git a/cmd/serve_proxy.go b/cmd/serve_proxy.go index b5335c21c..78815100f 100644 --- a/cmd/serve_proxy.go +++ b/cmd/serve_proxy.go @@ -5,24 +5,24 @@ import ( "errors" "net/http" - "github.com/raystack/shield/core/authenticate" + "github.com/raystack/frontier/core/authenticate" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/resource" + "github.com/raystack/frontier/core/rule" + "github.com/raystack/frontier/internal/api/v1beta1" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/internal/proxy/hook" + authz_hook "github.com/raystack/frontier/internal/proxy/hook/authz" + "github.com/raystack/frontier/internal/proxy/middleware/attributes" + "github.com/raystack/frontier/internal/proxy/middleware/authz" + "github.com/raystack/frontier/internal/proxy/middleware/basic_auth" + "github.com/raystack/frontier/internal/proxy/middleware/observability" + "github.com/raystack/frontier/internal/proxy/middleware/prefix" + "github.com/raystack/frontier/internal/proxy/middleware/rulematch" + "github.com/raystack/frontier/internal/store/blob" "github.com/raystack/salt/log" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/resource" - "github.com/raystack/shield/core/rule" - "github.com/raystack/shield/internal/api/v1beta1" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/internal/proxy/hook" - authz_hook "github.com/raystack/shield/internal/proxy/hook/authz" - "github.com/raystack/shield/internal/proxy/middleware/attributes" - "github.com/raystack/shield/internal/proxy/middleware/authz" - "github.com/raystack/shield/internal/proxy/middleware/basic_auth" - "github.com/raystack/shield/internal/proxy/middleware/observability" - "github.com/raystack/shield/internal/proxy/middleware/prefix" - "github.com/raystack/shield/internal/proxy/middleware/rulematch" - "github.com/raystack/shield/internal/store/blob" ) func serveProxies( @@ -70,7 +70,7 @@ func serveProxies( cps := proxy.Serve(ctx, logger, svcConfig, middlewarePipeline) cleanUpProxies = append(cleanUpProxies, cps) - logger.Info("[shield] proxy is up") + logger.Info("[frontier] proxy is up") } return cleanUpBlobs, cleanUpProxies, nil } diff --git a/cmd/server.go b/cmd/server.go index ba6719a3c..4fbd8c33e 100644 --- a/cmd/server.go +++ b/cmd/server.go @@ -6,11 +6,11 @@ import ( "os" "path" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" "github.com/MakeNowJust/heredoc" - "github.com/raystack/shield/config" - shieldlogger "github.com/raystack/shield/pkg/logger" + "github.com/raystack/frontier/config" + frontierlogger "github.com/raystack/frontier/pkg/logger" "github.com/spf13/cobra" cli "github.com/spf13/cobra" ) @@ -22,14 +22,14 @@ func ServerCommand() *cobra.Command { Short: "Server management", Long: "Server management commands.", Example: heredoc.Doc(` - $ shield server init - $ shield server start - $ shield server start -c ./config.yaml - $ shield server migrate - $ shield server migrate -c ./config.yaml - $ shield server migrate-rollback - $ shield server migrate-rollback -c ./config.yaml - $ shield server keygen + $ frontier server init + $ frontier server start + $ frontier server start -c ./config.yaml + $ frontier server migrate + $ frontier server migrate -c ./config.yaml + $ frontier server migrate-rollback + $ frontier server migrate-rollback -c ./config.yaml + $ frontier server keygen `), } @@ -51,10 +51,10 @@ func serverInitCommand() *cobra.Command { Use: "init", Short: "Initialize server", Long: heredoc.Doc(` - Initializing server. Creating a sample of shield server config. + Initializing server. Creating a sample of frontier server config. Default: ./config.yaml `), - Example: "shield server init", + Example: "frontier server init", RunE: func(cmd *cli.Command, args []string) error { cwd, err := os.Getwd() if err != nil { @@ -84,14 +84,14 @@ func serverInitCommand() *cobra.Command { URL path of resources. Full path prefixed with scheme where resources config yaml files are kept e.g.: local storage file "file:///tmp/resources_config" - GCS Bucket "gs://shield-bucket-example" + GCS Bucket "gs://frontier-bucket-example" (default: file://{pwd}/resources_config) `)) c.Flags().StringVarP(&rulesURL, "rule", "u", "", heredoc.Doc(` URL path of rules. Full path prefixed with scheme where ruleset yaml files are kept e.g.: local storage file "file:///tmp/rules" - GCS Bucket "gs://shield-bucket-example" + GCS Bucket "gs://frontier-bucket-example" (default: file://{pwd}/rules) `)) @@ -104,13 +104,13 @@ func serverStartCommand() *cobra.Command { c := &cli.Command{ Use: "start", Short: "Start server and proxy default on port 8080", - Example: "shield server start", + Example: "frontier server start", RunE: func(cmd *cli.Command, args []string) error { appConfig, err := config.Load(configFile) if err != nil { panic(err) } - logger := shieldlogger.InitLogger(appConfig.Log) + logger := frontierlogger.InitLogger(appConfig.Log) if err = StartServer(logger, appConfig); err != nil { logger.Error("error starting server", "error", err) @@ -130,22 +130,22 @@ func serverMigrateCommand() *cobra.Command { c := &cli.Command{ Use: "migrate", Short: "Run DB Schema Migrations", - Example: "shield server migrate", + Example: "frontier server migrate", RunE: func(c *cli.Command, args []string) error { appConfig, err := config.Load(configFile) if err != nil { panic(err) } - logger := shieldlogger.InitLogger(appConfig.Log) - logger.Info("shield is migrating", "version", config.Version) + logger := frontierlogger.InitLogger(appConfig.Log) + logger.Info("frontier is migrating", "version", config.Version) if err = RunMigrations(logger, appConfig.DB); err != nil { logger.Error("error running migrations", "error", err) return err } - logger.Info("shield migration complete") + logger.Info("frontier migration complete") return nil }, } @@ -160,21 +160,21 @@ func serverMigrateRollbackCommand() *cobra.Command { c := &cli.Command{ Use: "migrate-rollback", Short: "Run DB Schema Migrations Rollback to last state", - Example: "shield migrate-rollback", + Example: "frontier migrate-rollback", RunE: func(c *cli.Command, args []string) error { appConfig, err := config.Load(configFile) if err != nil { panic(err) } - logger := shieldlogger.InitLogger(appConfig.Log) - logger.Info("shield is migrating", "version", config.Version) + logger := frontierlogger.InitLogger(appConfig.Log) + logger.Info("frontier is migrating", "version", config.Version) if err = RunRollback(logger, appConfig.DB); err != nil { logger.Error("error running migrations rollback", "error", err) return err } - logger.Info("shield migration rollback complete") + logger.Info("frontier migration rollback complete") return nil }, } @@ -188,7 +188,7 @@ func serverGenRSACommand() *cobra.Command { c := &cli.Command{ Use: "keygen", Short: "Generate 2 rsa keys as jwks for auth token generation", - Example: "shield server keygen", + Example: "frontier server keygen", RunE: func(c *cli.Command, args []string) error { keySet, err := utils.CreateJWKs(numOfKeys) if err != nil { diff --git a/cmd/user.go b/cmd/user.go index 0528b7eef..a252a2f18 100644 --- a/cmd/user.go +++ b/cmd/user.go @@ -6,10 +6,10 @@ import ( "os" "github.com/MakeNowJust/heredoc" + "github.com/raystack/frontier/pkg/file" + "github.com/raystack/frontier/pkg/str" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/raystack/salt/printer" - "github.com/raystack/shield/pkg/file" - "github.com/raystack/shield/pkg/str" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" cli "github.com/spf13/cobra" ) @@ -22,10 +22,10 @@ func UserCommand(cliConfig *Config) *cli.Command { Work with users. `), Example: heredoc.Doc(` - $ shield user create - $ shield user edit - $ shield user view - $ shield user list + $ frontier user create + $ frontier user edit + $ frontier user view + $ frontier user list `), Annotations: map[string]string{ "group": "core", @@ -51,7 +51,7 @@ func createUserCommand(cliConfig *Config) *cli.Command { Short: "Upsert an user", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield user create --file= + $ frontier user create --file= `), Annotations: map[string]string{ "group": "core", @@ -60,7 +60,7 @@ func createUserCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.UserRequestBody + var reqBody frontierv1beta1.UserRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -81,7 +81,7 @@ func createUserCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.CreateUser(setCtxHeader(ctx, header), &shieldv1beta1.CreateUserRequest{ + res, err := client.CreateUser(setCtxHeader(ctx, header), &frontierv1beta1.CreateUserRequest{ Body: &reqBody, }) if err != nil { @@ -110,8 +110,8 @@ func editUserCommand(cliConfig *Config) *cli.Command { Short: "Edit an user", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield user edit --file= - $ shield user edit --file= + $ frontier user edit --file= + $ frontier user edit --file= `), Annotations: map[string]string{ "group": "core", @@ -120,7 +120,7 @@ func editUserCommand(cliConfig *Config) *cli.Command { spinner := printer.Spin("") defer spinner.Stop() - var reqBody shieldv1beta1.UserRequestBody + var reqBody frontierv1beta1.UserRequestBody if err := file.Parse(filePath, &reqBody); err != nil { return err } @@ -138,7 +138,7 @@ func editUserCommand(cliConfig *Config) *cli.Command { defer cancel() userID := args[0] - _, err = client.UpdateUser(ctx, &shieldv1beta1.UpdateUserRequest{ + _, err = client.UpdateUser(ctx, &frontierv1beta1.UpdateUserRequest{ Id: userID, Body: &reqBody, }) @@ -166,8 +166,8 @@ func viewUserCommand(cliConfig *Config) *cli.Command { Short: "View an user", Args: cli.ExactArgs(1), Example: heredoc.Doc(` - $ shield user view - $ shield user view + $ frontier user view + $ frontier user view `), Annotations: map[string]string{ "group": "core", @@ -184,7 +184,7 @@ func viewUserCommand(cliConfig *Config) *cli.Command { defer cancel() userID := args[0] - res, err := client.GetUser(ctx, &shieldv1beta1.GetUserRequest{ + res, err := client.GetUser(ctx, &frontierv1beta1.GetUserRequest{ Id: userID, }) if err != nil { @@ -233,7 +233,7 @@ func listUserCommand(cliConfig *Config) *cli.Command { Short: "List all users", Args: cli.NoArgs, Example: heredoc.Doc(` - $ shield user list + $ frontier user list `), Annotations: map[string]string{ "group": "core", @@ -249,7 +249,7 @@ func listUserCommand(cliConfig *Config) *cli.Command { } defer cancel() - res, err := client.ListUsers(ctx, &shieldv1beta1.ListUsersRequest{}) + res, err := client.ListUsers(ctx, &frontierv1beta1.ListUsersRequest{}) if err != nil { return err } diff --git a/cmd/version.go b/cmd/version.go index 4420e0265..d2485579a 100644 --- a/cmd/version.go +++ b/cmd/version.go @@ -3,7 +3,7 @@ package cmd import ( "fmt" - "github.com/raystack/shield/config" + "github.com/raystack/frontier/config" "github.com/raystack/salt/version" "github.com/spf13/cobra" @@ -20,9 +20,9 @@ func versionCommand() *cobra.Command { fmt.Println("Version information not available") return nil } - fmt.Println("Shield: A secure and easy-to-use Authentication & Authorization Server") + fmt.Println("Frontier: A secure and easy-to-use Authentication & Authorization Server") fmt.Printf("Version: %s\nBuild date: %s\nCommit: %s", config.Version, config.BuildDate, config.BuildCommit) - fmt.Println(version.UpdateNotice(config.Version, "raystack/shield")) + fmt.Println(version.UpdateNotice(config.Version, "raystack/frontier")) return nil }, } diff --git a/config/config.go b/config/config.go index 8a21f087b..b38096206 100644 --- a/config/config.go +++ b/config/config.go @@ -5,16 +5,16 @@ import ( "os" "path/filepath" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/internal/store/spicedb" + "github.com/raystack/frontier/pkg/db" + "github.com/raystack/frontier/pkg/logger" "github.com/raystack/salt/config" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/internal/store/spicedb" - "github.com/raystack/shield/pkg/db" - "github.com/raystack/shield/pkg/logger" ) -type Shield struct { +type Frontier struct { // configuration version Version int `yaml:"version"` Proxy proxy.ServicesConfig `yaml:"proxy"` @@ -31,8 +31,8 @@ type NewRelic struct { Enabled bool `yaml:"enabled" mapstructure:"enabled"` } -func Load(serverConfigFileFromFlag string) (*Shield, error) { - conf := &Shield{} +func Load(serverConfigFileFromFlag string) (*Frontier, error) { + conf := &Frontier{} var options []config.LoaderOption options = append(options, config.WithName("config")) diff --git a/config/config_test.go b/config/config_test.go index 2c497d92c..e7ca72c5d 100644 --- a/config/config_test.go +++ b/config/config_test.go @@ -5,8 +5,8 @@ import ( "testing" "time" - "github.com/raystack/shield/internal/store/spicedb" - "github.com/raystack/shield/pkg/db" + "github.com/raystack/frontier/internal/store/spicedb" + "github.com/raystack/frontier/pkg/db" ) func TestLoad(t *testing.T) { @@ -16,7 +16,7 @@ func TestLoad(t *testing.T) { tests := []struct { name string args args - want *Shield + want *Frontier wantErr bool }{ { @@ -24,10 +24,10 @@ func TestLoad(t *testing.T) { args: args{ serverConfigFileFromFlag: "testdata/use_duration.yaml", }, - want: &Shield{ + want: &Frontier{ Version: 1, DB: db.Config{ - URL: "postgres://shield:@localhost:5432/shield?sslmode=disable", + URL: "postgres://frontier:@localhost:5432/frontier?sslmode=disable", MaxIdleConns: 10, MaxOpenConns: 10, ConnMaxLifeTime: time.Duration(10) * time.Millisecond, diff --git a/config/init.go b/config/init.go index b481bae81..bbe688ae5 100644 --- a/config/init.go +++ b/config/init.go @@ -13,8 +13,8 @@ import ( _ "embed" "github.com/mcuadros/go-defaults" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/pkg/file" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/pkg/file" "gopkg.in/yaml.v2" ) @@ -29,7 +29,7 @@ func Init(resourcesURL, rulesURL, configFile string) error { return errors.New("config file already exists") } - cfg := &Shield{} + cfg := &Frontier{} defaults.SetDefaults(cfg) diff --git a/config/testdata/use_duration.yaml b/config/testdata/use_duration.yaml index 331675d81..cfc0dc478 100644 --- a/config/testdata/use_duration.yaml +++ b/config/testdata/use_duration.yaml @@ -1,7 +1,7 @@ version: 1 db: - url: postgres://shield:@localhost:5432/shield?sslmode=disable + url: postgres://frontier:@localhost:5432/frontier?sslmode=disable max_query_timeout: 500ms conn_max_life_time: 10ms max_idle_conns: 10 @@ -9,4 +9,4 @@ db: spicedb: host: spicedb.localhost pre_shared_key: randomkey - port: 50051 \ No newline at end of file + port: 50051 diff --git a/core/audit/audit.go b/core/audit/audit.go index cd1d9ff8b..12661fbe2 100644 --- a/core/audit/audit.go +++ b/core/audit/audit.go @@ -4,7 +4,7 @@ import ( "fmt" "time" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" ) var ( diff --git a/core/audit/context.go b/core/audit/context.go index 4577683d4..4d7b99c01 100644 --- a/core/audit/context.go +++ b/core/audit/context.go @@ -4,7 +4,7 @@ import ( "context" "io" - "github.com/raystack/shield/pkg/server/consts" + "github.com/raystack/frontier/pkg/server/consts" ) // GetService returns the audit service from the context if set diff --git a/core/authenticate/authenticate.go b/core/authenticate/authenticate.go index 04757cad7..f97856f0e 100644 --- a/core/authenticate/authenticate.go +++ b/core/authenticate/authenticate.go @@ -3,10 +3,10 @@ package authenticate import ( "time" - "github.com/raystack/shield/core/serviceuser" - "github.com/raystack/shield/core/user" + "github.com/raystack/frontier/core/serviceuser" + "github.com/raystack/frontier/core/user" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" "github.com/google/uuid" ) diff --git a/core/authenticate/config.go b/core/authenticate/config.go index fff6a839d..5dd1bc28b 100644 --- a/core/authenticate/config.go +++ b/core/authenticate/config.go @@ -20,7 +20,7 @@ type TokenConfig struct { // Issuer uniquely identifies the service that issued the token // a good example could be fully qualified domain name - Issuer string `yaml:"iss" mapstructure:"iss" default:"shield"` + Issuer string `yaml:"iss" mapstructure:"iss" default:"frontier"` // Validity is the duration for which the token is valid Validity time.Duration `yaml:"validity" mapstructure:"validity" default:"1h"` @@ -39,7 +39,7 @@ type OIDCConfig struct { } type MailOTPConfig struct { - Subject string `yaml:"subject" mapstructure:"subject" default:"Shield Login OTP"` + Subject string `yaml:"subject" mapstructure:"subject" default:"Frontier Login OTP"` Body string `yaml:"body" mapstructure:"body" default:"Please copy/paste the OneTimePassword in login form.

{{.Otp}}

This code will expire in 10 minutes."` Validity time.Duration `yaml:"validity" mapstructure:"validity" default:"10m"` } diff --git a/core/authenticate/context.go b/core/authenticate/context.go index 5e26d910f..04cc193ef 100644 --- a/core/authenticate/context.go +++ b/core/authenticate/context.go @@ -3,10 +3,10 @@ package authenticate import ( "context" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" "google.golang.org/grpc/metadata" - "github.com/raystack/shield/pkg/server/consts" + "github.com/raystack/frontier/pkg/server/consts" ) // contextEmailKey should not be used in production diff --git a/core/authenticate/service.go b/core/authenticate/service.go index 0617a9d74..9e5c57ca3 100644 --- a/core/authenticate/service.go +++ b/core/authenticate/service.go @@ -7,31 +7,31 @@ import ( "strings" "time" - "github.com/raystack/shield/core/audit" + "github.com/raystack/frontier/core/audit" "golang.org/x/exp/slices" "github.com/lestrrat-go/jwx/v2/jwt" - shieldsession "github.com/raystack/shield/core/authenticate/session" - "github.com/raystack/shield/core/serviceuser" - "github.com/raystack/shield/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/errors" + frontiersession "github.com/raystack/frontier/core/authenticate/session" + "github.com/raystack/frontier/core/serviceuser" + "github.com/raystack/frontier/internal/bootstrap/schema" + "github.com/raystack/frontier/pkg/errors" "github.com/lestrrat-go/jwx/v2/jwk" - "github.com/raystack/shield/core/authenticate/token" + "github.com/raystack/frontier/core/authenticate/token" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/pkg/mailer" + "github.com/raystack/frontier/pkg/mailer" "github.com/raystack/salt/log" "github.com/google/uuid" - "github.com/raystack/shield/core/authenticate/strategy" - "github.com/raystack/shield/core/user" - "github.com/raystack/shield/pkg/str" + "github.com/raystack/frontier/core/authenticate/strategy" + "github.com/raystack/frontier/core/user" + "github.com/raystack/frontier/pkg/str" "github.com/robfig/cron/v3" ) @@ -68,7 +68,7 @@ type FlowRepository interface { } type SessionService interface { - ExtractFromContext(ctx context.Context) (*shieldsession.Session, error) + ExtractFromContext(ctx context.Context) (*frontiersession.Session, error) } type Service struct { @@ -395,7 +395,7 @@ func (s Service) GetPrincipal(ctx context.Context, assertions ...ClientAssertion User: ¤tUser, }, nil } - if err != nil && !errors.Is(err, shieldsession.ErrNoSession) { + if err != nil && !errors.Is(err, frontiersession.ErrNoSession) { return Principal{}, err } } @@ -412,7 +412,7 @@ func (s Service) GetPrincipal(ctx context.Context, assertions ...ClientAssertion //check type of jwt if val, ok := insecureJWT.Get(token.GeneratedClaimKey); ok { if claimVal, ok := val.(string); ok && claimVal == token.GeneratedClaimValue { - // extract user from token if present as its created by shield + // extract user from token if present as its created by frontier userID, _, err := s.internalTokenService.Parse(ctx, []byte(userToken)) if err == nil && utils.IsValidUUID(userID) { // userID is a valid uuid diff --git a/core/authenticate/session/service.go b/core/authenticate/session/service.go index 1d3dafbd2..d572619c4 100644 --- a/core/authenticate/session/service.go +++ b/core/authenticate/session/service.go @@ -5,7 +5,7 @@ import ( "errors" "time" - "github.com/raystack/shield/pkg/server/consts" + "github.com/raystack/frontier/pkg/server/consts" "github.com/google/uuid" "github.com/raystack/salt/log" diff --git a/core/authenticate/session/session.go b/core/authenticate/session/session.go index dee0241e0..c1dbd2d14 100644 --- a/core/authenticate/session/session.go +++ b/core/authenticate/session/session.go @@ -3,7 +3,7 @@ package session import ( "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" "github.com/google/uuid" ) diff --git a/core/authenticate/strategy/mail_otp.go b/core/authenticate/strategy/mail_otp.go index 1027d9d9e..987f47e03 100644 --- a/core/authenticate/strategy/mail_otp.go +++ b/core/authenticate/strategy/mail_otp.go @@ -7,7 +7,7 @@ import ( "math/rand" "time" - "github.com/raystack/shield/pkg/mailer" + "github.com/raystack/frontier/pkg/mailer" "gopkg.in/mail.v2" ) diff --git a/core/authenticate/strategy/mail_otp_test.go b/core/authenticate/strategy/mail_otp_test.go index 81e5289aa..a916c093c 100644 --- a/core/authenticate/strategy/mail_otp_test.go +++ b/core/authenticate/strategy/mail_otp_test.go @@ -7,8 +7,8 @@ import ( "testing" "time" - "github.com/raystack/shield/pkg/mailer" - "github.com/raystack/shield/pkg/mailer/mocks" + "github.com/raystack/frontier/pkg/mailer" + "github.com/raystack/frontier/pkg/mailer/mocks" "github.com/stretchr/testify/mock" "gopkg.in/mail.v2" ) @@ -19,7 +19,7 @@ func mock1(t *testing.T) *mocks.Dialer { t.Helper() wantMsg := "MIME-Version: 1.0\r\n" + - "From: shield@acme.org\r\n" + + "From: frontier@acme.org\r\n" + "To: test@acme.org\r\n" + "Subject: auth otp\r\n" + "Date: " + mockDate.Format(time.RFC1123Z) + "\r\n" + @@ -29,7 +29,7 @@ func mock1(t *testing.T) *mocks.Dialer { `here is the otp, use it: 7GAPMQ` mockDialer1 := &mocks.Dialer{} - mockDialer1.EXPECT().FromHeader().Return("shield@acme.org") + mockDialer1.EXPECT().FromHeader().Return("frontier@acme.org") mockDialer1.On("DialAndSend", mock.MatchedBy(func(m *mail.Message) bool { buf := new(bytes.Buffer) _, err := m.WriteTo(buf) diff --git a/core/authenticate/token/service.go b/core/authenticate/token/service.go index 3e2b65335..2d9f00d96 100644 --- a/core/authenticate/token/service.go +++ b/core/authenticate/token/service.go @@ -6,7 +6,7 @@ import ( "fmt" "time" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" "github.com/lestrrat-go/jwx/v2/jwk" "github.com/lestrrat-go/jwx/v2/jwt" @@ -30,7 +30,7 @@ type Service struct { } // NewService creates a new token service -// generate keys used for rsa via shield cli "shield server keygen" +// generate keys used for rsa via frontier cli "frontier server keygen" func NewService(keySet jwk.Set, issuer string, validity time.Duration) Service { publicKeySet := jwk.NewSet() if keySet != nil { @@ -65,7 +65,7 @@ func (s Service) Build(subjectID string, metadata map[string]string) ([]byte, er return nil, errors.New("missing rsa key to generate token") } - // shield generated token has an extra custom claim + // frontier generated token has an extra custom claim // used to identify which public key to use to verify the token metadata[GeneratedClaimKey] = GeneratedClaimValue return utils.BuildToken(rsaKey, s.issuer, subjectID, s.validity, metadata) diff --git a/core/deleter/service.go b/core/deleter/service.go index 67a8b5325..c8e45363b 100644 --- a/core/deleter/service.go +++ b/core/deleter/service.go @@ -5,16 +5,16 @@ import ( "fmt" "github.com/google/uuid" - "github.com/raystack/shield/core/invitation" + "github.com/raystack/frontier/core/invitation" - "github.com/raystack/shield/core/policy" - "github.com/raystack/shield/core/role" + "github.com/raystack/frontier/core/policy" + "github.com/raystack/frontier/core/role" - "github.com/raystack/shield/core/group" + "github.com/raystack/frontier/core/group" - "github.com/raystack/shield/core/organization" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/core/resource" + "github.com/raystack/frontier/core/organization" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/core/resource" ) type ProjectService interface { diff --git a/core/group/group.go b/core/group/group.go index d5dd8aa1d..1725a8ba5 100644 --- a/core/group/group.go +++ b/core/group/group.go @@ -4,10 +4,10 @@ import ( "context" "time" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/pkg/metadata" ) type State string diff --git a/core/group/service.go b/core/group/service.go index 6850205c6..2d8cc53ca 100644 --- a/core/group/service.go +++ b/core/group/service.go @@ -6,12 +6,12 @@ import ( "fmt" "strings" - "github.com/raystack/shield/core/authenticate" + "github.com/raystack/frontier/core/authenticate" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/user" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/user" ) type RelationService interface { diff --git a/core/invitation/invite.go b/core/invitation/invite.go index 648d94d87..70d6f8b8b 100644 --- a/core/invitation/invite.go +++ b/core/invitation/invite.go @@ -5,7 +5,7 @@ import ( "time" "github.com/google/uuid" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) var ( @@ -20,7 +20,7 @@ const (
Thanks,
-Team Shield +Team Frontier
` ) diff --git a/core/invitation/service.go b/core/invitation/service.go index 291e639c9..d06f62942 100644 --- a/core/invitation/service.go +++ b/core/invitation/service.go @@ -6,17 +6,17 @@ import ( "fmt" "html/template" - "github.com/raystack/shield/core/authenticate" + "github.com/raystack/frontier/core/authenticate" - "github.com/raystack/shield/pkg/str" + "github.com/raystack/frontier/pkg/str" "github.com/google/uuid" - "github.com/raystack/shield/core/group" - "github.com/raystack/shield/core/organization" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/user" - "github.com/raystack/shield/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/mailer" + "github.com/raystack/frontier/core/group" + "github.com/raystack/frontier/core/organization" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/user" + "github.com/raystack/frontier/internal/bootstrap/schema" + "github.com/raystack/frontier/pkg/mailer" "gopkg.in/mail.v2" ) diff --git a/core/metaschema/service.go b/core/metaschema/service.go index d85850430..d677917f8 100644 --- a/core/metaschema/service.go +++ b/core/metaschema/service.go @@ -3,10 +3,10 @@ package metaschema import ( "context" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" "github.com/pkg/errors" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" "github.com/xeipuuv/gojsonschema" ) diff --git a/core/namespace/namespace.go b/core/namespace/namespace.go index 8c9de63fa..9b90806b7 100644 --- a/core/namespace/namespace.go +++ b/core/namespace/namespace.go @@ -5,7 +5,7 @@ import ( "fmt" "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type Repository interface { diff --git a/core/organization/organization.go b/core/organization/organization.go index e1a92ba87..425f84236 100644 --- a/core/organization/organization.go +++ b/core/organization/organization.go @@ -4,9 +4,9 @@ import ( "context" "time" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type State string diff --git a/core/organization/service.go b/core/organization/service.go index dfb4f2711..8301adbdb 100644 --- a/core/organization/service.go +++ b/core/organization/service.go @@ -5,13 +5,13 @@ import ( "errors" "fmt" - "github.com/raystack/shield/core/authenticate" + "github.com/raystack/frontier/core/authenticate" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/user" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/user" + "github.com/raystack/frontier/internal/bootstrap/schema" ) type RelationService interface { diff --git a/core/permission/permission.go b/core/permission/permission.go index 7516bd4dd..f1efa74d8 100644 --- a/core/permission/permission.go +++ b/core/permission/permission.go @@ -6,9 +6,9 @@ import ( "strings" "time" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type Repository interface { diff --git a/core/permission/service.go b/core/permission/service.go index f54ce62a6..3c636f08c 100644 --- a/core/permission/service.go +++ b/core/permission/service.go @@ -3,7 +3,7 @@ package permission import ( "context" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" ) type Service struct { diff --git a/core/policy/policy.go b/core/policy/policy.go index 5c94ba481..dbd0b2877 100644 --- a/core/policy/policy.go +++ b/core/policy/policy.go @@ -4,7 +4,7 @@ import ( "context" "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type Repository interface { diff --git a/core/policy/service.go b/core/policy/service.go index 773b1248c..1539dd62e 100644 --- a/core/policy/service.go +++ b/core/policy/service.go @@ -3,10 +3,10 @@ package policy import ( "context" - "github.com/raystack/shield/core/role" + "github.com/raystack/frontier/core/role" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/internal/bootstrap/schema" ) type RelationService interface { diff --git a/core/project/project.go b/core/project/project.go index 97db76785..e113bf30e 100644 --- a/core/project/project.go +++ b/core/project/project.go @@ -4,10 +4,10 @@ import ( "context" "time" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/core/organization" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/core/organization" + "github.com/raystack/frontier/pkg/metadata" ) type State string diff --git a/core/project/service.go b/core/project/service.go index 3f3006378..5b2d0aafa 100644 --- a/core/project/service.go +++ b/core/project/service.go @@ -4,12 +4,12 @@ import ( "context" "errors" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/user" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/user" ) type RelationService interface { diff --git a/core/resource/resource.go b/core/resource/resource.go index 9171e16fd..d21e681bf 100644 --- a/core/resource/resource.go +++ b/core/resource/resource.go @@ -5,7 +5,7 @@ import ( "fmt" "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type Repository interface { diff --git a/core/resource/service.go b/core/resource/service.go index ba7556ada..f0d9087b0 100644 --- a/core/resource/service.go +++ b/core/resource/service.go @@ -6,14 +6,14 @@ import ( "fmt" "strings" - "github.com/raystack/shield/core/authenticate" + "github.com/raystack/frontier/core/authenticate" - "github.com/raystack/shield/core/organization" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/core/organization" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/internal/bootstrap/schema" ) type RelationService interface { diff --git a/core/role/role.go b/core/role/role.go index c551a01c1..0b71d0c66 100644 --- a/core/role/role.go +++ b/core/role/role.go @@ -4,7 +4,7 @@ import ( "context" "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type State string diff --git a/core/role/service.go b/core/role/service.go index 2f53d185d..1c59321ac 100644 --- a/core/role/service.go +++ b/core/role/service.go @@ -4,11 +4,11 @@ import ( "context" "fmt" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/core/permission" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/core/permission" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/internal/bootstrap/schema" ) type RelationService interface { diff --git a/core/serviceuser/service.go b/core/serviceuser/service.go index 2fe84ed2e..509cc0b39 100644 --- a/core/serviceuser/service.go +++ b/core/serviceuser/service.go @@ -12,9 +12,9 @@ import ( "github.com/google/uuid" "github.com/lestrrat-go/jwx/v2/jwk" "github.com/lestrrat-go/jwx/v2/jwt" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/internal/bootstrap/schema" + "github.com/raystack/frontier/pkg/utils" ) type Repository interface { diff --git a/core/serviceuser/serviceuser.go b/core/serviceuser/serviceuser.go index f32b39036..561e45611 100644 --- a/core/serviceuser/serviceuser.go +++ b/core/serviceuser/serviceuser.go @@ -4,7 +4,7 @@ import ( "time" "github.com/lestrrat-go/jwx/v2/jwk" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) const ( @@ -36,7 +36,7 @@ type Credential struct { // ID is the unique identifier of the credential. // This is also used as kid in JWT, the spec doesn't // state how the kid should be generated as anyway this token - // is owned by shield, and we are in control of key generation + // is owned by frontier, and we are in control of key generation // any arbitrary string can be used as kid as long as its unique ID string ServiceUserID string diff --git a/core/user/service.go b/core/user/service.go index 6fef5f26a..8114ced9f 100644 --- a/core/user/service.go +++ b/core/user/service.go @@ -6,12 +6,12 @@ import ( "strings" "time" - "github.com/raystack/shield/pkg/utils" + "github.com/raystack/frontier/pkg/utils" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/errors" - "github.com/raystack/shield/pkg/str" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/internal/bootstrap/schema" + "github.com/raystack/frontier/pkg/errors" + "github.com/raystack/frontier/pkg/str" ) type RelationService interface { diff --git a/core/user/user.go b/core/user/user.go index 3b085fcf9..aee9bc7a7 100644 --- a/core/user/user.go +++ b/core/user/user.go @@ -4,7 +4,7 @@ import ( "context" "time" - "github.com/raystack/shield/pkg/metadata" + "github.com/raystack/frontier/pkg/metadata" ) type State string diff --git a/docker-compose.yml b/docker-compose.yml index 91dac6e5f..f0703f7d3 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -4,15 +4,15 @@ services: pg: image: postgres:13 environment: - - POSTGRES_DB=shield - - POSTGRES_USER=shield + - POSTGRES_DB=frontier + - POSTGRES_USER=frontier - POSTGRES_HOST_AUTH_METHOD=trust volumes: - ./temp/pgdata:/var/lib/postgresql/data ports: - "5432:5432" healthcheck: - test: [ "CMD-SHELL", "pg_isready -U shield" ] + test: [ "CMD-SHELL", "pg_isready -U frontier" ] interval: 30s timeout: 30s retries: 3 @@ -33,7 +33,7 @@ services: timeout: 30s retries: 3 -# shield-migrate: +# frontier-migrate: # build: # context: . # dockerfile: Dockerfile.dev @@ -44,12 +44,12 @@ services: # condition: service_healthy # environment: # - SHIELD_DB_DRIVER=postgres -# - SHIELD_DB_URL=postgres://shield:@pg:5432/shield?sslmode=disable +# - SHIELD_DB_URL=postgres://frontier:@pg:5432/frontier?sslmode=disable # - SHIELD_SPICEDB_PORT=50051 # - SHIELD_SPICEDB_HOST=spicedb -# - SHIELD_SPICEDB_PRE_SHARED_KEY=shield +# - SHIELD_SPICEDB_PRE_SHARED_KEY=frontier # -# shield: +# frontier: # build: # context: . # dockerfile: Dockerfile.dev @@ -60,14 +60,14 @@ services: # depends_on: # pg: # condition: service_healthy -# shield-migrate: +# frontier-migrate: # condition: service_completed_successfully # environment: # - SHIELD_DB_DRIVER=postgres -# - SHIELD_DB_URL=postgres://shield:@pg:5432/shield?sslmode=disable +# - SHIELD_DB_URL=postgres://frontier:@pg:5432/frontier?sslmode=disable # - SHIELD_SPICEDB_PORT=50051 # - SHIELD_SPICEDB_HOST=spicedb -# - SHIELD_SPICEDB_PRE_SHARED_KEY=shield +# - SHIELD_SPICEDB_PRE_SHARED_KEY=frontier # - SHIELD_APP_RESOURCES_CONFIG_PATH=file:///opt spicedb-migration: @@ -84,7 +84,7 @@ services: - "8082:8080" - "50051:50051" command: - serve --grpc-preshared-key "shield" --datastore-engine postgres + serve --grpc-preshared-key "frontier" --datastore-engine postgres --datastore-conn-uri postgres://spicedb:@pg2:5432/spicedb?sslmode=disable restart: on-failure depends_on: diff --git a/docs/docs/admin-portal.md b/docs/docs/admin-portal.md index 05285aa21..cb4d787b9 100644 --- a/docs/docs/admin-portal.md +++ b/docs/docs/admin-portal.md @@ -1,6 +1,6 @@ # Admin Portal -The Admin Portal provides the Shield administrators with a centralized interface for managing the Raystack/Shield platform. This README will guide you through the installation, setup, and usage of the Admin Portal. +The Admin Portal provides the Frontier administrators with a centralized interface for managing the Raystack/Frontier platform. This README will guide you through the installation, setup, and usage of the Admin Portal. ### Features @@ -10,25 +10,25 @@ _Many of these features are still in development and represents an exhautive lis - Tenant (organization) management for multi-tenancy support - User authentication and access control - User management with role-based access control -- Roles and permission management for fine-tuning Shield's behavior +- Roles and permission management for fine-tuning Frontier's behavior - Integration with external authentication identity providers/ configure Magic Links/ OTP based sign-ups - Domain Verification for Organizations - Audit Logs for monitoring and much more... ### Starting the Admin Portal -> Make sure you have the Shield server up and running. For details refer [installations](./installation.md) and [configurations](./configurations.md) +> Make sure you have the Frontier server up and running. For details refer [installations](./installation.md) and [configurations](./configurations.md) -Change the current working directory to ui in Shield +Change the current working directory to ui in Frontier ```bash $ cd ui ``` -Create a **.env** file or export **`SHILD_API_URL`** environment variable for communication with the Shield server. +Create a **.env** file or export **`SHILD_API_URL`** environment variable for communication with the Frontier server. ```bash title=.env -# provide the shield server url +# provide the frontier server url SHILD_API_URL=http://localhost:8000 ``` diff --git a/docs/docs/apis/admin-service-create-permission.api.mdx b/docs/docs/apis/admin-service-create-permission.api.mdx index 1f7d6b4a9..beeeaf263 100644 --- a/docs/docs/apis/admin-service-create-permission.api.mdx +++ b/docs/docs/apis/admin-service-create-permission.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-create-permission title: "Create platform permission" -description: "Creates a permission. It can be used to grant permissions to all the resources in a Shield instance." +description: "Creates a permission. It can be used to grant permissions to all the resources in a Frontier instance." sidebar_label: "Create platform permission" hide_title: true hide_table_of_contents: true api: { - "description": "Creates a permission. It can be used to grant permissions to all the resources in a Shield instance.", + "description": "Creates a permission. It can be used to grant permissions to all the resources in a Frontier instance.", "operationId": "AdminService_CreatePermission", "responses": { @@ -186,7 +186,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -267,7 +267,7 @@ api: "name": { "type": "string", - "description": "The name of the permission. It should be unique across a Shield instance and can contain only alphanumeric characters.", + "description": "The name of the permission. It should be unique across a Frontier instance and can contain only alphanumeric characters.", }, "namespace": { @@ -338,8 +338,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -350,7 +350,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -358,7 +358,7 @@ api: "name": "Create platform permission", "description": { - "content": "Creates a permission. It can be used to grant permissions to all the resources in a Shield instance.", + "content": "Creates a permission. It can be used to grant permissions to all the resources in a Frontier instance.", "type": "text/plain", }, "url": @@ -383,7 +383,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -398,9 +398,9 @@ import TabItem from "@theme/TabItem"; ## Create platform permission -Creates a permission. It can be used to grant permissions to all the resources in a Shield instance. +Creates a permission. It can be used to grant permissions to all the resources in a Frontier instance. -
Request Body required
    bodies object[]
  • Array [
  • *Example:*`app/guardian`","title":"namespace should be in service/resource format"}}>
  • ]
+
Request Body required
    bodies object[]
  • Array [
  • *Example:*`app/guardian`","title":"namespace should be in service/resource format"}}>
  • ]
A successful response. @@ -422,7 +422,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-create-role.api.mdx b/docs/docs/apis/admin-service-create-role.api.mdx index 91896d469..c4b2dd86b 100644 --- a/docs/docs/apis/admin-service-create-role.api.mdx +++ b/docs/docs/apis/admin-service-create-role.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-create-role title: "Create platform role" -description: "Creates a platform wide role. It can be used to grant permissions to all the resources in a Shield instance." +description: "Creates a platform wide role. It can be used to grant permissions to all the resources in a Frontier instance." sidebar_label: "Create platform role" hide_title: true hide_table_of_contents: true api: { - "description": "Creates a platform wide role. It can be used to grant permissions to all the resources in a Shield instance.", + "description": "Creates a platform wide role. It can be used to grant permissions to all the resources in a Frontier instance.", "operationId": "AdminService_CreateRole", "responses": { @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -295,8 +295,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -307,7 +307,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -315,7 +315,7 @@ api: "name": "Create platform role", "description": { - "content": "Creates a platform wide role. It can be used to grant permissions to all the resources in a Shield instance.", + "content": "Creates a platform wide role. It can be used to grant permissions to all the resources in a Frontier instance.", "type": "text/plain", }, "url": @@ -340,7 +340,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -355,7 +355,7 @@ import TabItem from "@theme/TabItem"; ## Create platform role -Creates a platform wide role. It can be used to grant permissions to all the resources in a Shield instance. +Creates a platform wide role. It can be used to grant permissions to all the resources in a Frontier instance.
Request Body required
@@ -379,7 +379,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-delete-permission.api.mdx b/docs/docs/apis/admin-service-delete-permission.api.mdx index d4109af89..ae975031e 100644 --- a/docs/docs/apis/admin-service-delete-permission.api.mdx +++ b/docs/docs/apis/admin-service-delete-permission.api.mdx @@ -138,7 +138,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -273,7 +273,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -316,7 +316,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-delete-role.api.mdx b/docs/docs/apis/admin-service-delete-role.api.mdx index 4a91329b8..ad4702853 100644 --- a/docs/docs/apis/admin-service-delete-role.api.mdx +++ b/docs/docs/apis/admin-service-delete-role.api.mdx @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -233,8 +233,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -245,7 +245,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -281,7 +281,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -324,7 +324,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-all-organizations.api.mdx b/docs/docs/apis/admin-service-list-all-organizations.api.mdx index 27f25175e..5730a18b4 100644 --- a/docs/docs/apis/admin-service-list-all-organizations.api.mdx +++ b/docs/docs/apis/admin-service-list-all-organizations.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-all-organizations title: "List all organizations" -description: "Lists all the organizations in a Shield instance. It can be filtered by user and state." +description: "Lists all the organizations in a Frontier instance. It can be filtered by user and state." sidebar_label: "List all organizations" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the organizations in a Shield instance. It can be filtered by user and state.", + "description": "Lists all the organizations in a Frontier instance. It can be filtered by user and state.", "operationId": "AdminService_ListAllOrganizations", "responses": { @@ -179,7 +179,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -280,8 +280,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -292,7 +292,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -300,7 +300,7 @@ api: "name": "List all organizations", "description": { - "content": "Lists all the organizations in a Shield instance. It can be filtered by user and state.", + "content": "Lists all the organizations in a Frontier instance. It can be filtered by user and state.", "type": "text/plain", }, "url": @@ -337,7 +337,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -352,7 +352,7 @@ import TabItem from "@theme/TabItem"; ## List all organizations -Lists all the organizations in a Shield instance. It can be filtered by user and state. +Lists all the organizations in a Frontier instance. It can be filtered by user and state.
Query Parameters
@@ -376,7 +376,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-all-users.api.mdx b/docs/docs/apis/admin-service-list-all-users.api.mdx index ce6b83c8c..408ef4065 100644 --- a/docs/docs/apis/admin-service-list-all-users.api.mdx +++ b/docs/docs/apis/admin-service-list-all-users.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-all-users title: "List all users" -description: "Lists all the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state." +description: "Lists all the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state." sidebar_label: "List all users" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state.", + "description": "Lists all the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state.", "operationId": "AdminService_ListAllUsers", "responses": { @@ -193,7 +193,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -322,8 +322,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -334,7 +334,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -342,7 +342,7 @@ api: "name": "List all users", "description": { - "content": "Lists all the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state.", + "content": "Lists all the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state.", "type": "text/plain", }, "url": @@ -419,7 +419,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -434,7 +434,7 @@ import TabItem from "@theme/TabItem"; ## List all users -Lists all the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. +Lists all the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state.
Query Parameters
@@ -458,7 +458,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-groups.api.mdx b/docs/docs/apis/admin-service-list-groups.api.mdx index d216b8299..fb1e1a9d4 100644 --- a/docs/docs/apis/admin-service-list-groups.api.mdx +++ b/docs/docs/apis/admin-service-list-groups.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-groups title: "List all groups" -description: "Lists all the groups from all the organizations in a Shield instance. It can be filtered by organization and state." +description: "Lists all the groups from all the organizations in a Frontier instance. It can be filtered by organization and state." sidebar_label: "List all groups" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the groups from all the organizations in a Shield instance. It can be filtered by organization and state.", + "description": "Lists all the groups from all the organizations in a Frontier instance. It can be filtered by organization and state.", "operationId": "AdminService_ListGroups", "responses": { @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -301,7 +301,7 @@ api: "name": "List all groups", "description": { - "content": "Lists all the groups from all the organizations in a Shield instance. It can be filtered by organization and state.", + "content": "Lists all the groups from all the organizations in a Frontier instance. It can be filtered by organization and state.", "type": "text/plain", }, "url": @@ -338,7 +338,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -353,7 +353,7 @@ import TabItem from "@theme/TabItem"; ## List all groups -Lists all the groups from all the organizations in a Shield instance. It can be filtered by organization and state. +Lists all the groups from all the organizations in a Frontier instance. It can be filtered by organization and state.
Query Parameters
@@ -377,7 +377,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-policies.api.mdx b/docs/docs/apis/admin-service-list-policies.api.mdx index 3dc94fa77..a16c034c6 100644 --- a/docs/docs/apis/admin-service-list-policies.api.mdx +++ b/docs/docs/apis/admin-service-list-policies.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-policies title: "List all policies" -description: "Lists all the policies from all the organizations in a Shield instance. It can be filtered by organization, project, user, role and group." +description: "Lists all the policies from all the organizations in a Frontier instance. It can be filtered by organization, project, user, role and group." sidebar_label: "List all policies" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the policies from all the organizations in a Shield instance. It can be filtered by organization, project, user, role and group.", + "description": "Lists all the policies from all the organizations in a Frontier instance. It can be filtered by organization, project, user, role and group.", "operationId": "AdminService_ListPolicies", "responses": { @@ -189,7 +189,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -311,8 +311,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -323,7 +323,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -331,7 +331,7 @@ api: "name": "List all policies", "description": { - "content": "Lists all the policies from all the organizations in a Shield instance. It can be filtered by organization, project, user, role and group.", + "content": "Lists all the policies from all the organizations in a Frontier instance. It can be filtered by organization, project, user, role and group.", "type": "text/plain", }, "url": @@ -398,7 +398,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -413,7 +413,7 @@ import TabItem from "@theme/TabItem"; ## List all policies -Lists all the policies from all the organizations in a Shield instance. It can be filtered by organization, project, user, role and group. +Lists all the policies from all the organizations in a Frontier instance. It can be filtered by organization, project, user, role and group.
Query Parameters
@@ -437,7 +437,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-projects.api.mdx b/docs/docs/apis/admin-service-list-projects.api.mdx index b6393bc15..e86459dbb 100644 --- a/docs/docs/apis/admin-service-list-projects.api.mdx +++ b/docs/docs/apis/admin-service-list-projects.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-projects title: "List all projects" -description: "Lists all the projects from all the organizations in a Shield instance. It can be filtered by organization and state." +description: "Lists all the projects from all the organizations in a Frontier instance. It can be filtered by organization and state." sidebar_label: "List all projects" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the projects from all the organizations in a Shield instance. It can be filtered by organization and state.", + "description": "Lists all the projects from all the organizations in a Frontier instance. It can be filtered by organization and state.", "operationId": "AdminService_ListProjects", "responses": { @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -301,7 +301,7 @@ api: "name": "List all projects", "description": { - "content": "Lists all the projects from all the organizations in a Shield instance. It can be filtered by organization and state.", + "content": "Lists all the projects from all the organizations in a Frontier instance. It can be filtered by organization and state.", "type": "text/plain", }, "url": @@ -338,7 +338,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -353,7 +353,7 @@ import TabItem from "@theme/TabItem"; ## List all projects -Lists all the projects from all the organizations in a Shield instance. It can be filtered by organization and state. +Lists all the projects from all the organizations in a Frontier instance. It can be filtered by organization and state.
Query Parameters
@@ -377,7 +377,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-relations.api.mdx b/docs/docs/apis/admin-service-list-relations.api.mdx index b8c1c43bb..fbe642132 100644 --- a/docs/docs/apis/admin-service-list-relations.api.mdx +++ b/docs/docs/apis/admin-service-list-relations.api.mdx @@ -188,7 +188,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -273,8 +273,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -285,7 +285,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -304,7 +304,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -343,7 +343,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-list-resources.api.mdx b/docs/docs/apis/admin-service-list-resources.api.mdx index 961f87949..8e184be62 100644 --- a/docs/docs/apis/admin-service-list-resources.api.mdx +++ b/docs/docs/apis/admin-service-list-resources.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-list-resources title: "List all resources" -description: "Lists all the resources from all the organizations in a Shield instance. It can be filtered by user, project, organization and namespace." +description: "Lists all the resources from all the organizations in a Frontier instance. It can be filtered by user, project, organization and namespace." sidebar_label: "List all resources" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the resources from all the organizations in a Shield instance. It can be filtered by user, project, organization and namespace.", + "description": "Lists all the resources from all the organizations in a Frontier instance. It can be filtered by user, project, organization and namespace.", "operationId": "AdminService_ListResources", "responses": { @@ -186,7 +186,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -301,8 +301,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -313,7 +313,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -321,7 +321,7 @@ api: "name": "List all resources", "description": { - "content": "Lists all the resources from all the organizations in a Shield instance. It can be filtered by user, project, organization and namespace.", + "content": "Lists all the resources from all the organizations in a Frontier instance. It can be filtered by user, project, organization and namespace.", "type": "text/plain", }, "url": @@ -378,7 +378,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -393,7 +393,7 @@ import TabItem from "@theme/TabItem"; ## List all resources -Lists all the resources from all the organizations in a Shield instance. It can be filtered by user, project, organization and namespace. +Lists all the resources from all the organizations in a Frontier instance. It can be filtered by user, project, organization and namespace.
Query Parameters
@@ -417,7 +417,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/admin-service-update-permission.api.mdx b/docs/docs/apis/admin-service-update-permission.api.mdx index c06441baf..466c845f8 100644 --- a/docs/docs/apis/admin-service-update-permission.api.mdx +++ b/docs/docs/apis/admin-service-update-permission.api.mdx @@ -1,13 +1,13 @@ --- id: admin-service-update-permission title: "Update platform permission" -description: "Updates a permission by ID. It can be used to grant permissions to all the resources in a Shield instance." +description: "Updates a permission by ID. It can be used to grant permissions to all the resources in a Frontier instance." sidebar_label: "Update platform permission" hide_title: true hide_table_of_contents: true api: { - "description": "Updates a permission by ID. It can be used to grant permissions to all the resources in a Shield instance.", + "description": "Updates a permission by ID. It can be used to grant permissions to all the resources in a Frontier instance.", "operationId": "AdminService_UpdatePermission", "responses": { @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -264,7 +264,7 @@ api: "name": { "type": "string", - "description": "The name of the permission. It should be unique across a Shield instance and can contain only alphanumeric characters.", + "description": "The name of the permission. It should be unique across a Frontier instance and can contain only alphanumeric characters.", }, "namespace": { @@ -327,8 +327,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -339,7 +339,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -347,7 +347,7 @@ api: "name": "Update platform permission", "description": { - "content": "Updates a permission by ID. It can be used to grant permissions to all the resources in a Shield instance.", + "content": "Updates a permission by ID. It can be used to grant permissions to all the resources in a Frontier instance.", "type": "text/plain", }, "url": @@ -382,7 +382,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -397,9 +397,9 @@ import TabItem from "@theme/TabItem"; ## Update platform permission -Updates a permission by ID. It can be used to grant permissions to all the resources in a Shield instance. +Updates a permission by ID. It can be used to grant permissions to all the resources in a Frontier instance. -
Path Parameters
Request Body required
    *Example:*`app/guardian`","title":"namespace should be in service/resource format"}}>
+
Path Parameters
Request Body required
    *Example:*`app/guardian`","title":"namespace should be in service/resource format"}}>
A successful response. @@ -421,7 +421,7 @@ Not Found - The requested resource was not found
Schema
    details object[]
  • Array [
  • ]
-Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
Schema
    details object[]
  • Array [
  • ]
diff --git a/docs/docs/apis/shield-administration-api.info.mdx b/docs/docs/apis/shield-administration-api.info.mdx index f088dd49d..a08cea516 100644 --- a/docs/docs/apis/shield-administration-api.info.mdx +++ b/docs/docs/apis/shield-administration-api.info.mdx @@ -1,7 +1,7 @@ --- -id: shield-administration-api -title: "Shield Administration API" -description: "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows." +id: frontier-administration-api +title: "Frontier Administration API" +description: "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows." sidebar_label: Introduction sidebar_position: 0 hide_title: true @@ -17,9 +17,9 @@ import Export from "@theme/ApiDemoPanel/Export"; Version: 0.2.0 -# Shield Administration API +# Frontier Administration API -The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows. +The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.

Authentication

@@ -29,5 +29,5 @@ use Client ID as username and Client Secret as password Access token or JWT token, prefixed by Bearer: Bearer -
Security Scheme Type:oauth2
OAuth Flow (undefined):Scopes:

    Contact

    Raystack Foundation: hello@raystack.orgURL: https://raystack.org/

    License

    Apache 2.0
    +
    Security Scheme Type:oauth2
    OAuth Flow (undefined):Scopes:

      Contact

      Raystack Foundation: hello@raystack.orgURL: https://raystack.org/

      License

      Apache 2.0
      diff --git a/docs/docs/apis/shield-service-accept-organization-invitation.api.mdx b/docs/docs/apis/shield-service-accept-organization-invitation.api.mdx index 1f3b089e0..4aa88f9de 100644 --- a/docs/docs/apis/shield-service-accept-organization-invitation.api.mdx +++ b/docs/docs/apis/shield-service-accept-organization-invitation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-accept-organization-invitation +id: frontier-service-accept-organization-invitation title: "Accept pending invitation" description: "Accept pending invitation queued for an organization. The user will be added to the organization and groups defined in the invitation" sidebar_label: "Accept pending invitation" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Accept pending invitation queued for an organization. The user will be added to the organization and groups defined in the invitation", - "operationId": "ShieldService_AcceptOrganizationInvitation", + "operationId": "FrontierService_AcceptOrganizationInvitation", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -299,7 +299,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -342,7 +342,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-add-group-users.api.mdx b/docs/docs/apis/shield-service-add-group-users.api.mdx index b6d549d6a..dea2b7bab 100644 --- a/docs/docs/apis/shield-service-add-group-users.api.mdx +++ b/docs/docs/apis/shield-service-add-group-users.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-add-group-users +id: frontier-service-add-group-users title: "Add group user" description: "Adds a principle(user and service-users) to a group, existing users in the group will be ignored. A group can't have nested groups as members." sidebar_label: "Add group user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Adds a principle(user and service-users) to a group, existing users in the group will be ignored. A group can't have nested groups as members.", - "operationId": "ShieldService_AddGroupUsers", + "operationId": "FrontierService_AddGroupUsers", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -258,8 +258,8 @@ api: "jsonRequestBodyExample": { "userIds": ["string"] }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -270,7 +270,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -322,7 +322,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -365,7 +365,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-add-organization-users.api.mdx b/docs/docs/apis/shield-service-add-organization-users.api.mdx index 0022b5be8..6bb17b959 100644 --- a/docs/docs/apis/shield-service-add-organization-users.api.mdx +++ b/docs/docs/apis/shield-service-add-organization-users.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-add-organization-users +id: frontier-service-add-organization-users title: "Add organization user" -description: "Add a user to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists" +description: "Add a user to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists" sidebar_label: "Add organization user" hide_title: true hide_table_of_contents: true api: { - "description": "Add a user to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists", - "operationId": "ShieldService_AddOrganizationUsers", + "description": "Add a user to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists", + "operationId": "FrontierService_AddOrganizationUsers", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -256,8 +256,8 @@ api: "jsonRequestBodyExample": { "userIds": ["string"] }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -268,7 +268,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -276,7 +276,7 @@ api: "name": "Add organization user", "description": { - "content": "Add a user to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists", + "content": "Add a user to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists", "type": "text/plain", }, "url": @@ -311,7 +311,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -326,7 +326,7 @@ import TabItem from "@theme/TabItem"; ## Add organization user -Add a user to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists +Add a user to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists
      Path Parameters
      Request Body required
      @@ -354,7 +354,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-auth-callback-2.api.mdx b/docs/docs/apis/shield-service-auth-callback-2.api.mdx index 599610220..fb78dbab6 100644 --- a/docs/docs/apis/shield-service-auth-callback-2.api.mdx +++ b/docs/docs/apis/shield-service-auth-callback-2.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-auth-callback-2 +id: frontier-service-auth-callback-2 title: "Callback from a strategy" description: "Callback from a strategy. This is the endpoint where the strategy will redirect the user after successful authentication. This endpoint will be called with the code and state query parameters. The code will be used to get the access token from the strategy and the state will be used to get the return_to url from the session and redirect the user to that url." sidebar_label: "Callback from a strategy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Callback from a strategy. This is the endpoint where the strategy will redirect the user after successful authentication. This endpoint will be called with the code and state query parameters. The code will be used to get the access token from the strategy and the state will be used to get the return_to url from the session and redirect the user to that url.", - "operationId": "ShieldService_AuthCallback2", + "operationId": "FrontierService_AuthCallback2", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -253,8 +253,8 @@ api: { "strategyName": "string", "state": "string", "code": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -265,7 +265,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -298,7 +298,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -341,7 +341,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-auth-callback.api.mdx b/docs/docs/apis/shield-service-auth-callback.api.mdx index b37863f99..6d9204cd9 100644 --- a/docs/docs/apis/shield-service-auth-callback.api.mdx +++ b/docs/docs/apis/shield-service-auth-callback.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-auth-callback +id: frontier-service-auth-callback title: "Callback from a strategy" description: "Callback from a strategy. This is the endpoint where the strategy will redirect the user after successful authentication. This endpoint will be called with the code and state query parameters. The code will be used to get the access token from the strategy and the state will be used to get the return_to url from the session and redirect the user to that url." sidebar_label: "Callback from a strategy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Callback from a strategy. This is the endpoint where the strategy will redirect the user after successful authentication. This endpoint will be called with the code and state query parameters. The code will be used to get the access token from the strategy and the state will be used to get the return_to url from the session and redirect the user to that url.", - "operationId": "ShieldService_AuthCallback", + "operationId": "FrontierService_AuthCallback", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -246,8 +246,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -258,7 +258,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -304,7 +304,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -347,7 +347,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-auth-logout-2.api.mdx b/docs/docs/apis/shield-service-auth-logout-2.api.mdx index d97b02930..a7439440a 100644 --- a/docs/docs/apis/shield-service-auth-logout-2.api.mdx +++ b/docs/docs/apis/shield-service-auth-logout-2.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-auth-logout-2 +id: frontier-service-auth-logout-2 title: "Logout from a strategy" description: "Logout from a strategy" sidebar_label: "Logout from a strategy" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_AuthLogout2", + "operationId": "FrontierService_AuthLogout2", "responses": { "200": @@ -138,7 +138,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -223,8 +223,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -235,7 +235,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -254,7 +254,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -297,7 +297,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-auth-logout.api.mdx b/docs/docs/apis/shield-service-auth-logout.api.mdx index cfa44e2d3..cb2fd4e9f 100644 --- a/docs/docs/apis/shield-service-auth-logout.api.mdx +++ b/docs/docs/apis/shield-service-auth-logout.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-auth-logout +id: frontier-service-auth-logout title: "Logout from a strategy" description: "Logout from a strategy" sidebar_label: "Logout from a strategy" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_AuthLogout", + "operationId": "FrontierService_AuthLogout", "responses": { "200": @@ -138,7 +138,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -223,8 +223,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -235,7 +235,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -254,7 +254,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -297,7 +297,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-auth-token.api.mdx b/docs/docs/apis/shield-service-auth-token.api.mdx index f49f4ecf3..2e0ece722 100644 --- a/docs/docs/apis/shield-service-auth-token.api.mdx +++ b/docs/docs/apis/shield-service-auth-token.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-auth-token +id: frontier-service-auth-token title: "Generate access token by given credentials" -description: "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the shield resources." +description: "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the frontier resources." sidebar_label: "Generate access token by given credentials" hide_title: true hide_table_of_contents: true api: { - "description": "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the shield resources.", - "operationId": "ShieldService_AuthToken", + "description": "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the frontier resources.", + "operationId": "FrontierService_AuthToken", "responses": { "200": @@ -152,7 +152,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -276,8 +276,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -288,7 +288,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -296,7 +296,7 @@ api: "name": "Generate access token by given credentials", "description": { - "content": "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the shield resources.", + "content": "Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the frontier resources.", "type": "text/plain", }, "url": @@ -321,7 +321,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -336,7 +336,7 @@ import TabItem from "@theme/TabItem"; ## Generate access token by given credentials -Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the shield resources. +Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the frontier resources.
      Request Body required
      @@ -360,7 +360,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-authenticate-2.api.mdx b/docs/docs/apis/shield-service-authenticate-2.api.mdx index 42bcde640..208227beb 100644 --- a/docs/docs/apis/shield-service-authenticate-2.api.mdx +++ b/docs/docs/apis/shield-service-authenticate-2.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-authenticate-2 +id: frontier-service-authenticate-2 title: "Authenticate with a strategy" description: "Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication." sidebar_label: "Authenticate with a strategy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication.", - "operationId": "ShieldService_Authenticate2", + "operationId": "FrontierService_Authenticate2", "responses": { "200": @@ -152,7 +152,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -241,7 +241,7 @@ api: "returnTo": { "type": "string", - "description": 'URL to redirect after successful authentication.
      *Example:*`"https://shield.example.com"`', + "description": 'URL to redirect after successful authentication.
      *Example:*`"https://frontier.example.com"`', "title": "by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication", }, "email": @@ -283,8 +283,8 @@ api: { "redirect": true, "returnTo": "string", "email": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -295,7 +295,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -341,7 +341,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ import TabItem from "@theme/TabItem"; Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication. -
      Path Parameters
        *Example:* `google`","in":"path","required":true,"schema":{"type":"string"}}}>
      Request Body required
        *Example:*`\"https://shield.example.com\"`","title":"by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication"}}> *Example:*`example@acme.org`","title":"email of the user for magic links"}}>
      +
      Path Parameters
        *Example:* `google`","in":"path","required":true,"schema":{"type":"string"}}}>
      Request Body required
        *Example:*`\"https://frontier.example.com\"`","title":"by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication"}}> *Example:*`example@acme.org`","title":"email of the user for magic links"}}>
      A successful response. @@ -380,7 +380,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-authenticate.api.mdx b/docs/docs/apis/shield-service-authenticate.api.mdx index 7f5013bc2..c770945ed 100644 --- a/docs/docs/apis/shield-service-authenticate.api.mdx +++ b/docs/docs/apis/shield-service-authenticate.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-authenticate +id: frontier-service-authenticate title: "Authenticate with a strategy" description: "Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication." sidebar_label: "Authenticate with a strategy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication.", - "operationId": "ShieldService_Authenticate", + "operationId": "FrontierService_Authenticate", "responses": { "200": @@ -152,7 +152,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -229,7 +229,7 @@ api: }, { "name": "returnTo", - "description": "by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication\n\nURL to redirect after successful authentication.
      *Example:*`\"https://shield.example.com\"`", + "description": "by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication\n\nURL to redirect after successful authentication.
      *Example:*`\"https://frontier.example.com\"`", "in": "query", "required": false, "schema": { "type": "string" }, @@ -267,8 +267,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -279,7 +279,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -310,7 +310,7 @@ api: "disabled": false, "description": { - "content": "by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication\n\nURL to redirect after successful authentication.
      *Example:*`\"https://shield.example.com\"`", + "content": "by default, after successful authentication no operation will be performed\nto apply redirection in case of browsers, provide a url that will be used\nfor redirection after authentication\n\nURL to redirect after successful authentication.
      *Example:*`\"https://frontier.example.com\"`", "type": "text/plain", }, "key": "returnTo", @@ -347,7 +347,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -364,7 +364,7 @@ import TabItem from "@theme/TabItem"; Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication. -
      Path Parameters
        *Example:* `google`","in":"path","required":true,"schema":{"type":"string"}}}>
      Query Parameters
        *Example:*`\"https://shield.example.com\"`","in":"query","required":false,"schema":{"type":"string"}}}> *Example:*`example@acme.org`","in":"query","required":false,"schema":{"type":"string"}}}>
      +
      Path Parameters
        *Example:* `google`","in":"path","required":true,"schema":{"type":"string"}}}>
      Query Parameters
        *Example:*`\"https://frontier.example.com\"`","in":"query","required":false,"schema":{"type":"string"}}}> *Example:*`example@acme.org`","in":"query","required":false,"schema":{"type":"string"}}}>
      A successful response. @@ -386,7 +386,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-check-resource-permission.api.mdx b/docs/docs/apis/shield-service-check-resource-permission.api.mdx index 835c95cb5..6c27c2d47 100644 --- a/docs/docs/apis/shield-service-check-resource-permission.api.mdx +++ b/docs/docs/apis/shield-service-check-resource-permission.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-check-resource-permission +id: frontier-service-check-resource-permission title: "Check" -description: "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Shield will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts)." +description: "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Frontier will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts)." sidebar_label: "Check" hide_title: true hide_table_of_contents: true api: { - "description": "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Shield will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts).", - "operationId": "ShieldService_CheckResourcePermission", + "description": "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Frontier will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts).", + "operationId": "FrontierService_CheckResourcePermission", "responses": { "200": @@ -148,7 +148,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -236,7 +236,7 @@ api: "resource": { "type": "string", - "description": "`namespace:uuid` or `namespace:name` of the org or project, and `namespace:urn` of a resource under a project. In case of an org/project either provide the complete namespace (app/organization) or Shield can also parse aliases for the same as `org` or `project`.
      *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`", + "description": "`namespace:uuid` or `namespace:name` of the org or project, and `namespace:urn` of a resource under a project. In case of an org/project either provide the complete namespace (app/organization) or Frontier can also parse aliases for the same as `org` or `project`.
      *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`", }, }, "required": ["permission"], @@ -277,8 +277,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -289,7 +289,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -297,7 +297,7 @@ api: "name": "Check", "description": { - "content": "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Shield will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts).", + "content": "Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Frontier will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts).", "type": "text/plain", }, "url": @@ -322,7 +322,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -337,9 +337,9 @@ import TabItem from "@theme/TabItem"; ## Check -Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Shield will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts). +Returns true if a principal has required permissions to access a resource and false otherwise.
      Note the principal can be a user or a service account, and Frontier will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts). -
      Request Body required
        *Example:* `get` or `list`"}}> *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`"}}>
      +
      Request Body required
        *Example:* `get` or `list`"}}> *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`"}}>
      A successful response. @@ -361,7 +361,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-group.api.mdx b/docs/docs/apis/shield-service-create-group.api.mdx index 786f1b77f..ec2449773 100644 --- a/docs/docs/apis/shield-service-create-group.api.mdx +++ b/docs/docs/apis/shield-service-create-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-group +id: frontier-service-create-group title: "Create group" description: "Create a new group in an organization which serves as a container for users. The group can be assigned roles and permissions and can be used to manage access to resources. Also a group can also be assigned to other groups." sidebar_label: "Create group" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Create a new group in an organization which serves as a container for users. The group can be assigned roles and permissions and can be used to manage access to resources. Also a group can also be assigned to other groups.", - "operationId": "ShieldService_CreateGroup", + "operationId": "FrontierService_CreateGroup", "responses": { "200": @@ -176,7 +176,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -259,7 +259,7 @@ api: "name": { "type": "string", - "description": "The name of the group. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.", + "description": "The name of the group. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.", }, "title": { @@ -305,8 +305,8 @@ api: { "name": "string", "title": "string", "metadata": {} }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -317,7 +317,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -363,7 +363,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -380,7 +380,7 @@ import TabItem from "@theme/TabItem"; Create a new group in an organization which serves as a container for users. The group can be assigned roles and permissions and can be used to manage access to resources. Also a group can also be assigned to other groups. -
      Path Parameters
      Request Body required
        *Example:*`{\"labels\": {\"key\": \"value\"}, \"description\": \"Group description\"}`"}}>
      +
      Path Parameters
      Request Body required
        *Example:*`{\"labels\": {\"key\": \"value\"}, \"description\": \"Group description\"}`"}}>
      A successful response. @@ -402,7 +402,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-meta-schema.api.mdx b/docs/docs/apis/shield-service-create-meta-schema.api.mdx index 53059a704..556591001 100644 --- a/docs/docs/apis/shield-service-create-meta-schema.api.mdx +++ b/docs/docs/apis/shield-service-create-meta-schema.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-create-meta-schema +id: frontier-service-create-meta-schema title: "Create metaschema" -description: "Create a new metadata schema. The metaschema **name** must be unique within the entire Shield instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:'user',schema:{'type':'object','properties':{'label':{'type':'object','additionalProperties':{'type':'string'}},'description':{'type':'string'}}}}`" +description: "Create a new metadata schema. The metaschema **name** must be unique within the entire Frontier instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:'user',schema:{'type':'object','properties':{'label':{'type':'object','additionalProperties':{'type':'string'}},'description':{'type':'string'}}}}`" sidebar_label: "Create metaschema" hide_title: true hide_table_of_contents: true api: { - "description": 'Create a new metadata schema. The metaschema **name** must be unique within the entire Shield instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}`', - "operationId": "ShieldService_CreateMetaSchema", + "description": 'Create a new metadata schema. The metaschema **name** must be unique within the entire Frontier instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}`', + "operationId": "FrontierService_CreateMetaSchema", "responses": { "200": @@ -184,7 +184,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -257,7 +257,7 @@ api: "name": { "type": "string", - "description": "The name of the metaschema. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.", + "description": "The name of the metaschema. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.", }, "schema": { @@ -297,8 +297,8 @@ api: "jsonRequestBodyExample": { "name": "string", "schema": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -309,7 +309,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -317,7 +317,7 @@ api: "name": "Create metaschema", "description": { - "content": 'Create a new metadata schema. The metaschema **name** must be unique within the entire Shield instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}`', + "content": 'Create a new metadata schema. The metaschema **name** must be unique within the entire Frontier instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}`', "type": "text/plain", }, "url": @@ -342,7 +342,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -357,9 +357,9 @@ import TabItem from "@theme/TabItem"; ## Create metaschema -Create a new metadata schema. The metaschema **name** must be unique within the entire Shield instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      _Example:_ `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` +Create a new metadata schema. The metaschema **name** must be unique within the entire Frontier instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
      _Example:_ `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` -
      Request Body required
      +
      Request Body required
      A successful response. @@ -381,7 +381,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-organization-audit-logs.api.mdx b/docs/docs/apis/shield-service-create-organization-audit-logs.api.mdx index 2d33bb756..c307abffa 100644 --- a/docs/docs/apis/shield-service-create-organization-audit-logs.api.mdx +++ b/docs/docs/apis/shield-service-create-organization-audit-logs.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-organization-audit-logs +id: frontier-service-create-organization-audit-logs title: "Create audit log" description: "Create new audit logs in a batch." sidebar_label: "Create audit log" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Create new audit logs in a batch.", - "operationId": "ShieldService_CreateOrganizationAuditLogs", + "operationId": "FrontierService_CreateOrganizationAuditLogs", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -329,8 +329,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -341,7 +341,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -384,7 +384,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -427,7 +427,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-organization-invitation.api.mdx b/docs/docs/apis/shield-service-create-organization-invitation.api.mdx index 9d43fab50..218d3e4a6 100644 --- a/docs/docs/apis/shield-service-create-organization-invitation.api.mdx +++ b/docs/docs/apis/shield-service-create-organization-invitation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-organization-invitation +id: frontier-service-create-organization-invitation title: "Invite user" description: "Invite users to an organization, if the user doesn't exists, it will be created and notified. Invitations expire in 7 days" sidebar_label: "Invite user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Invite users to an organization, if the user doesn't exists, it will be created and notified. Invitations expire in 7 days", - "operationId": "ShieldService_CreateOrganizationInvitation", + "operationId": "FrontierService_CreateOrganizationInvitation", "responses": { "200": @@ -202,7 +202,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -326,8 +326,8 @@ api: "jsonRequestBodyExample": { "userId": "string", "groupIds": ["string"] }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -338,7 +338,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -384,7 +384,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -423,7 +423,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-organization-role.api.mdx b/docs/docs/apis/shield-service-create-organization-role.api.mdx index c839dbd76..0273a0737 100644 --- a/docs/docs/apis/shield-service-create-organization-role.api.mdx +++ b/docs/docs/apis/shield-service-create-organization-role.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-organization-role +id: frontier-service-create-organization-role title: "Create organization role" description: "Create a custom role under an organization. This custom role will only be available for assignment to the principles within the organization." sidebar_label: "Create organization role" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Create a custom role under an organization. This custom role will only be available for assignment to the principles within the organization.", - "operationId": "ShieldService_CreateOrganizationRole", + "operationId": "FrontierService_CreateOrganizationRole", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -305,8 +305,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -317,7 +317,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -363,7 +363,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -402,7 +402,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-organization.api.mdx b/docs/docs/apis/shield-service-create-organization.api.mdx index cef3982b3..e0fc959b3 100644 --- a/docs/docs/apis/shield-service-create-organization.api.mdx +++ b/docs/docs/apis/shield-service-create-organization.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-organization +id: frontier-service-create-organization title: "Create organization" description: "Create organization" sidebar_label: "Create organization" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_CreateOrganization", + "operationId": "FrontierService_CreateOrganization", "responses": { "200": @@ -174,7 +174,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -247,7 +247,7 @@ api: "name": { "type": "string", - "description": 'The name of the organization. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
      *Example:*`"shield-org1-acme"`', + "description": 'The name of the organization. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
      *Example:*`"frontier-org1-acme"`', }, "title": { @@ -294,8 +294,8 @@ api: { "name": "string", "title": "string", "metadata": {} }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -306,7 +306,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -335,7 +335,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -352,7 +352,7 @@ import TabItem from "@theme/TabItem"; Create organization -
      Request Body required
        *Example:*`\"shield-org1-acme\"`"}}> *Example*: `\"Acme Inc\"`"}}>*Example*:`{\"labels\": {\"key\": \"value\"}, \"description\": \"Organization description\"}`"}}>
      +
      Request Body required
        *Example:*`\"frontier-org1-acme\"`"}}> *Example*: `\"Acme Inc\"`"}}>*Example*:`{\"labels\": {\"key\": \"value\"}, \"description\": \"Organization description\"}`"}}>
      A successful response. @@ -374,7 +374,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-policy.api.mdx b/docs/docs/apis/shield-service-create-policy.api.mdx index 07265afec..506871c4e 100644 --- a/docs/docs/apis/shield-service-create-policy.api.mdx +++ b/docs/docs/apis/shield-service-create-policy.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-policy +id: frontier-service-create-policy title: "Create policy" description: "Creates a policy" sidebar_label: "Create policy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Creates a policy ", - "operationId": "ShieldService_CreatePolicy", + "operationId": "FrontierService_CreatePolicy", "responses": { "200": @@ -185,7 +185,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -320,8 +320,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -332,7 +332,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -361,7 +361,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -400,7 +400,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-project-resource.api.mdx b/docs/docs/apis/shield-service-create-project-resource.api.mdx index f2c62e69e..c92a85a0e 100644 --- a/docs/docs/apis/shield-service-create-project-resource.api.mdx +++ b/docs/docs/apis/shield-service-create-project-resource.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-project-resource +id: frontier-service-create-project-resource title: "Create resource" description: "Creates a resource in a project" sidebar_label: "Create resource" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Creates a resource in a project", - "operationId": "ShieldService_CreateProjectResource", + "operationId": "FrontierService_CreateProjectResource", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -282,7 +282,7 @@ api: "namespace": { "type": "string", - "description": "The namespace of the resource. The resource namespace are created when permissions for that resource is created in Shield. If namespace doesn't exists the request will fail.
      *Example:* `compute/instance`", + "description": "The namespace of the resource. The resource namespace are created when permissions for that resource is created in Frontier. If namespace doesn't exists the request will fail.
      *Example:* `compute/instance`", }, "principal": { @@ -331,8 +331,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -343,7 +343,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -401,7 +401,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -418,7 +418,7 @@ import TabItem from "@theme/TabItem"; Creates a resource in a project -
      Path Parameters
      Query Parameters
      Request Body required
        *Example:* `my-resource`"}}> *Example:* `compute/instance`"}}> *Example:* `user:92f69c3a-334b-4f25-90b8-4d4f3be6b825`","title":"format namespace:uuid or just uuid for user"}}>
      +
      Path Parameters
      Query Parameters
      Request Body required
        *Example:* `my-resource`"}}> *Example:* `compute/instance`"}}> *Example:* `user:92f69c3a-334b-4f25-90b8-4d4f3be6b825`","title":"format namespace:uuid or just uuid for user"}}>
      A successful response. @@ -440,7 +440,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-project.api.mdx b/docs/docs/apis/shield-service-create-project.api.mdx index 1475f94c5..10b116ff5 100644 --- a/docs/docs/apis/shield-service-create-project.api.mdx +++ b/docs/docs/apis/shield-service-create-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-project +id: frontier-service-create-project title: "Create project" description: "Create project" sidebar_label: "Create project" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_CreateProject", + "operationId": "FrontierService_CreateProject", "responses": { "200": @@ -175,7 +175,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -248,12 +248,12 @@ api: "name": { "type": "string", - "description": "The name of the project. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
      *Example:* `shield-playground`", + "description": "The name of the project. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
      *Example:* `frontier-playground`", }, "title": { "type": "string", - "description": "The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
      *Example:* `Shield Playground`", + "description": "The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
      *Example:* `Frontier Playground`", }, "metadata": { @@ -305,8 +305,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -317,7 +317,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -346,7 +346,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -363,7 +363,7 @@ import TabItem from "@theme/TabItem"; Create project -
      Request Body required
        *Example:* `shield-playground`"}}> *Example:* `Shield Playground`"}}>
      +
      Request Body required
        *Example:* `frontier-playground`"}}> *Example:* `Frontier Playground`"}}>
      A successful response. @@ -385,7 +385,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-relation.api.mdx b/docs/docs/apis/shield-service-create-relation.api.mdx index e13b95e35..0290286fc 100644 --- a/docs/docs/apis/shield-service-create-relation.api.mdx +++ b/docs/docs/apis/shield-service-create-relation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-relation +id: frontier-service-create-relation title: "Create relation" description: "Create relation" sidebar_label: "Create relation" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_CreateRelation", + "operationId": "FrontierService_CreateRelation", "responses": { "200": @@ -183,7 +183,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -301,8 +301,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -313,7 +313,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -342,7 +342,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -381,7 +381,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-service-user-key.api.mdx b/docs/docs/apis/shield-service-create-service-user-key.api.mdx index b54603333..ae3c47914 100644 --- a/docs/docs/apis/shield-service-create-service-user-key.api.mdx +++ b/docs/docs/apis/shield-service-create-service-user-key.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-service-user-key +id: frontier-service-create-service-user-key title: "Create service user key" description: "Generate a service user key and return it, the private key part of the response will not be persisted and should be kept securely by client." sidebar_label: "Create service user key" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Generate a service user key and return it, the private key part of the response will not be persisted and should be kept securely by client.", - "operationId": "ShieldService_CreateServiceUserKey", + "operationId": "FrontierService_CreateServiceUserKey", "responses": { "200": @@ -166,7 +166,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -276,8 +276,8 @@ api: "jsonRequestBodyExample": { "title": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -288,7 +288,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -334,7 +334,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -373,7 +373,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-service-user-secret.api.mdx b/docs/docs/apis/shield-service-create-service-user-secret.api.mdx index d2b47cae5..fcfb36ed6 100644 --- a/docs/docs/apis/shield-service-create-service-user-secret.api.mdx +++ b/docs/docs/apis/shield-service-create-service-user-secret.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-service-user-secret +id: frontier-service-create-service-user-secret title: "Create service user secret" description: "Generate a service user secret and return it. The secret value will not be persisted and should be securely stored by client." sidebar_label: "Create service user secret" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Generate a service user secret and return it. The secret value will not be persisted and should be securely stored by client.", - "operationId": "ShieldService_CreateServiceUserSecret", + "operationId": "FrontierService_CreateServiceUserSecret", "responses": { "200": @@ -172,7 +172,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -282,8 +282,8 @@ api: "jsonRequestBodyExample": { "title": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -294,7 +294,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -340,7 +340,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -379,7 +379,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-service-user.api.mdx b/docs/docs/apis/shield-service-create-service-user.api.mdx index 4a953369b..8da4b9f7a 100644 --- a/docs/docs/apis/shield-service-create-service-user.api.mdx +++ b/docs/docs/apis/shield-service-create-service-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-create-service-user +id: frontier-service-create-service-user title: "Create service user" description: "Create a service user." sidebar_label: "Create service user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Create a service user.", - "operationId": "ShieldService_CreateServiceUser", + "operationId": "FrontierService_CreateServiceUser", "responses": { "200": @@ -181,7 +181,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -307,8 +307,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -319,7 +319,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -349,7 +349,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -388,7 +388,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-create-user.api.mdx b/docs/docs/apis/shield-service-create-user.api.mdx index 50fa17d75..735bc8b9d 100644 --- a/docs/docs/apis/shield-service-create-user.api.mdx +++ b/docs/docs/apis/shield-service-create-user.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-create-user +id: frontier-service-create-user title: "Create user" -description: "Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{'email':'john.doe@raystack.org','title':'John Doe',metadata:{'label': {'key1': 'value1'}, 'description': 'User Description'}}`" +description: "Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{'email':'john.doe@raystack.org','title':'John Doe',metadata:{'label': {'key1': 'value1'}, 'description': 'User Description'}}`" sidebar_label: "Create user" hide_title: true hide_table_of_contents: true api: { - "description": 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`', - "operationId": "ShieldService_CreateUser", + "description": 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`', + "operationId": "FrontierService_CreateUser", "responses": { "200": @@ -188,7 +188,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -261,12 +261,12 @@ api: "name": { "type": "string", - "description": "The name of the user. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Shield automatically generates a name from the user email. ", + "description": "The name of the user. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Frontier automatically generates a name from the user email. ", }, "email": { "type": "string", - "description": 'The email of the user. The email must be unique within the entire Shield instance.
      *Example:*`"john.doe@raystack.org"`', + "description": 'The email of the user. The email must be unique within the entire Frontier instance.
      *Example:*`"john.doe@raystack.org"`', }, "metadata": { @@ -317,8 +317,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -329,7 +329,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -337,7 +337,7 @@ api: "name": "Create user", "description": { - "content": 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`', + "content": 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`', "type": "text/plain", }, "url": @@ -362,7 +362,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -377,9 +377,9 @@ import TabItem from "@theme/TabItem"; ## Create user -Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      _Example:_`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}` +Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

      _Example:_`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}` -
      Request Body required
        *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
      +
      Request Body required
        *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
      A successful response. @@ -401,7 +401,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-group.api.mdx b/docs/docs/apis/shield-service-delete-group.api.mdx index d9d761b15..4472fc6de 100644 --- a/docs/docs/apis/shield-service-delete-group.api.mdx +++ b/docs/docs/apis/shield-service-delete-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-group +id: frontier-service-delete-group title: "Delete group" description: "Delete an organization group permanently and all of its relations" sidebar_label: "Delete group" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete an organization group permanently and all of its relations", - "operationId": "ShieldService_DeleteGroup", + "operationId": "FrontierService_DeleteGroup", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -291,7 +291,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -334,7 +334,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-meta-schema.api.mdx b/docs/docs/apis/shield-service-delete-meta-schema.api.mdx index 0e126e2ff..f8d2f0fd3 100644 --- a/docs/docs/apis/shield-service-delete-meta-schema.api.mdx +++ b/docs/docs/apis/shield-service-delete-meta-schema.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-meta-schema +id: frontier-service-delete-meta-schema title: "Delete metaschema" description: "Delete a metadata schema permanently. Once deleted the metaschema won't be used to validate the metadata. For example, if a metaschema(with `label` and `description` fields) is used to validate the metadata of a user, then deleting the metaschema will not validate the metadata of the user and metadata field can contain any key-value pair(and say another field called `foo` can be inserted in a user's metadata)." sidebar_label: "Delete metaschema" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a metadata schema permanently. Once deleted the metaschema won't be used to validate the metadata. For example, if a metaschema(with `label` and `description` fields) is used to validate the metadata of a user, then deleting the metaschema will not validate the metadata of the user and metadata field can contain any key-value pair(and say another field called `foo` can be inserted in a user's metadata).", - "operationId": "ShieldService_DeleteMetaSchema", + "operationId": "FrontierService_DeleteMetaSchema", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -277,7 +277,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -320,7 +320,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-organization-invitation.api.mdx b/docs/docs/apis/shield-service-delete-organization-invitation.api.mdx index 36b3b1d2b..86fde8143 100644 --- a/docs/docs/apis/shield-service-delete-organization-invitation.api.mdx +++ b/docs/docs/apis/shield-service-delete-organization-invitation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-organization-invitation +id: frontier-service-delete-organization-invitation title: "Delete pending invitation" description: "Delete a pending invitation queued for an organization" sidebar_label: "Delete pending invitation" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a pending invitation queued for an organization", - "operationId": "ShieldService_DeleteOrganizationInvitation", + "operationId": "FrontierService_DeleteOrganizationInvitation", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -292,7 +292,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -335,7 +335,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-organization-role.api.mdx b/docs/docs/apis/shield-service-delete-organization-role.api.mdx index 106c2ff43..8b540882c 100644 --- a/docs/docs/apis/shield-service-delete-organization-role.api.mdx +++ b/docs/docs/apis/shield-service-delete-organization-role.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-organization-role +id: frontier-service-delete-organization-role title: "Delete organization role" description: "Delete a custom role and all of its relations under an organization permanently." sidebar_label: "Delete organization role" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a custom role and all of its relations under an organization permanently.", - "operationId": "ShieldService_DeleteOrganizationRole", + "operationId": "FrontierService_DeleteOrganizationRole", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -291,7 +291,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -334,7 +334,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-organization.api.mdx b/docs/docs/apis/shield-service-delete-organization.api.mdx index d12e7d7c9..ddb6fcf3c 100644 --- a/docs/docs/apis/shield-service-delete-organization.api.mdx +++ b/docs/docs/apis/shield-service-delete-organization.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-delete-organization +id: frontier-service-delete-organization title: "Delete organization" -description: "Delete an organization and all of its relations permanently. The organization users will not be deleted from Shield." +description: "Delete an organization and all of its relations permanently. The organization users will not be deleted from Frontier." sidebar_label: "Delete organization" hide_title: true hide_table_of_contents: true api: { - "description": "Delete an organization and all of its relations permanently. The organization users will not be deleted from Shield.", - "operationId": "ShieldService_DeleteOrganization", + "description": "Delete an organization and all of its relations permanently. The organization users will not be deleted from Frontier.", + "operationId": "FrontierService_DeleteOrganization", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -252,7 +252,7 @@ api: "name": "Delete organization", "description": { - "content": "Delete an organization and all of its relations permanently. The organization users will not be deleted from Shield.", + "content": "Delete an organization and all of its relations permanently. The organization users will not be deleted from Frontier.", "type": "text/plain", }, "url": @@ -277,7 +277,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -292,7 +292,7 @@ import TabItem from "@theme/TabItem"; ## Delete organization -Delete an organization and all of its relations permanently. The organization users will not be deleted from Shield. +Delete an organization and all of its relations permanently. The organization users will not be deleted from Frontier.
      Path Parameters
      @@ -320,7 +320,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-policy.api.mdx b/docs/docs/apis/shield-service-delete-policy.api.mdx index 59f6d3621..4dea76270 100644 --- a/docs/docs/apis/shield-service-delete-policy.api.mdx +++ b/docs/docs/apis/shield-service-delete-policy.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-policy +id: frontier-service-delete-policy title: "Delete Policy" description: "Delete a policy all of its relations permanently." sidebar_label: "Delete Policy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a policy all of its relations permanently.", - "operationId": "ShieldService_DeletePolicy", + "operationId": "FrontierService_DeletePolicy", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -277,7 +277,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -320,7 +320,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-project-resource.api.mdx b/docs/docs/apis/shield-service-delete-project-resource.api.mdx index 4c5602e95..bb4174040 100644 --- a/docs/docs/apis/shield-service-delete-project-resource.api.mdx +++ b/docs/docs/apis/shield-service-delete-project-resource.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-project-resource +id: frontier-service-delete-project-resource title: "Delete resource" description: "Deletes a resource from a project permanently" sidebar_label: "Delete resource" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Deletes a resource from a project permanently", - "operationId": "ShieldService_DeleteProjectResource", + "operationId": "FrontierService_DeleteProjectResource", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -291,7 +291,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -334,7 +334,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-project.api.mdx b/docs/docs/apis/shield-service-delete-project.api.mdx index bcea87ad3..4b89723ca 100644 --- a/docs/docs/apis/shield-service-delete-project.api.mdx +++ b/docs/docs/apis/shield-service-delete-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-project +id: frontier-service-delete-project title: "Delete Project" description: "Delete a project all of its relations permanently." sidebar_label: "Delete Project" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a project all of its relations permanently.", - "operationId": "ShieldService_DeleteProject", + "operationId": "FrontierService_DeleteProject", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -277,7 +277,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -320,7 +320,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-relation.api.mdx b/docs/docs/apis/shield-service-delete-relation.api.mdx index 41592e4e2..ffe34b684 100644 --- a/docs/docs/apis/shield-service-delete-relation.api.mdx +++ b/docs/docs/apis/shield-service-delete-relation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-relation +id: frontier-service-delete-relation title: "Delete relation" description: "Remove a subject having a relation from an object" sidebar_label: "Delete relation" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Remove a subject having a relation from an object", - "operationId": "ShieldService_DeleteRelation", + "operationId": "FrontierService_DeleteRelation", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -246,8 +246,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -258,7 +258,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -322,7 +322,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -365,7 +365,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-service-user-key.api.mdx b/docs/docs/apis/shield-service-delete-service-user-key.api.mdx index 7aafd6657..0ae470cda 100644 --- a/docs/docs/apis/shield-service-delete-service-user-key.api.mdx +++ b/docs/docs/apis/shield-service-delete-service-user-key.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-service-user-key +id: frontier-service-delete-service-user-key title: "Delete service user key" description: "Delete a service user key permanently." sidebar_label: "Delete service user key" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a service user key permanently.", - "operationId": "ShieldService_DeleteServiceUserKey", + "operationId": "FrontierService_DeleteServiceUserKey", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -240,8 +240,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -252,7 +252,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -299,7 +299,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -342,7 +342,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-service-user-secret.api.mdx b/docs/docs/apis/shield-service-delete-service-user-secret.api.mdx index 7b02633ad..d8abc8739 100644 --- a/docs/docs/apis/shield-service-delete-service-user-secret.api.mdx +++ b/docs/docs/apis/shield-service-delete-service-user-secret.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-service-user-secret +id: frontier-service-delete-service-user-secret title: "Delete service user secret" description: "Delete a service user secret credential." sidebar_label: "Delete service user secret" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a service user secret credential.", - "operationId": "ShieldService_DeleteServiceUserSecret", + "operationId": "FrontierService_DeleteServiceUserSecret", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -240,8 +240,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -252,7 +252,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -299,7 +299,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -342,7 +342,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-service-user.api.mdx b/docs/docs/apis/shield-service-delete-service-user.api.mdx index 0ab63cf02..66bba3a9e 100644 --- a/docs/docs/apis/shield-service-delete-service-user.api.mdx +++ b/docs/docs/apis/shield-service-delete-service-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-service-user +id: frontier-service-delete-service-user title: "Delete service user" description: "Delete a service user permanently and all of its relations (keys, organizations, roles, etc)" sidebar_label: "Delete service user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete a service user permanently and all of its relations (keys, organizations, roles, etc)", - "operationId": "ShieldService_DeleteServiceUser", + "operationId": "FrontierService_DeleteServiceUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -239,8 +239,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -251,7 +251,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -287,7 +287,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -330,7 +330,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-delete-user.api.mdx b/docs/docs/apis/shield-service-delete-user.api.mdx index 5873c4d44..28533f58d 100644 --- a/docs/docs/apis/shield-service-delete-user.api.mdx +++ b/docs/docs/apis/shield-service-delete-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-delete-user +id: frontier-service-delete-user title: "Delete user" description: "Delete an user permanently forever and all of its relations (organizations, groups, etc)" sidebar_label: "Delete user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Delete an user permanently forever and all of its relations (organizations, groups, etc)", - "operationId": "ShieldService_DeleteUser", + "operationId": "FrontierService_DeleteUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -232,8 +232,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -244,7 +244,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -277,7 +277,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -320,7 +320,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-disable-group.api.mdx b/docs/docs/apis/shield-service-disable-group.api.mdx index dcd85f03d..4308879ea 100644 --- a/docs/docs/apis/shield-service-disable-group.api.mdx +++ b/docs/docs/apis/shield-service-disable-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-disable-group +id: frontier-service-disable-group title: "Disable group" description: "Sets the state of the group as disabled. The group will not be available for access control and the existing users in the group will not be able to access any resources that are assigned to the group. No other users can be added to the group while it is disabled." sidebar_label: "Disable group" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Sets the state of the group as disabled. The group will not be available for access control and the existing users in the group will not be able to access any resources that are assigned to the group. No other users can be added to the group while it is disabled.", - "operationId": "ShieldService_DisableGroup", + "operationId": "FrontierService_DisableGroup", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -244,8 +244,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -256,7 +256,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -315,7 +315,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -362,7 +362,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-disable-organization.api.mdx b/docs/docs/apis/shield-service-disable-organization.api.mdx index b6a1cb103..d6e323b96 100644 --- a/docs/docs/apis/shield-service-disable-organization.api.mdx +++ b/docs/docs/apis/shield-service-disable-organization.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-disable-organization +id: frontier-service-disable-organization title: "Disable organization" description: "Sets the state of the organization as disabled. The existing users in the org will not be able to access any organization resources." sidebar_label: "Disable organization" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Sets the state of the organization as disabled. The existing users in the org will not be able to access any organization resources.", - "operationId": "ShieldService_DisableOrganization", + "operationId": "FrontierService_DisableOrganization", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -293,7 +293,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-disable-project.api.mdx b/docs/docs/apis/shield-service-disable-project.api.mdx index b13030118..e9c5f9bdf 100644 --- a/docs/docs/apis/shield-service-disable-project.api.mdx +++ b/docs/docs/apis/shield-service-disable-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-disable-project +id: frontier-service-disable-project title: "Disable project" description: "Disable project" sidebar_label: "Disable project" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_DisableProject", + "operationId": "FrontierService_DisableProject", "responses": { "200": @@ -138,7 +138,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -289,7 +289,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -336,7 +336,7 @@ Not Found - The requested resource was not found
      Schema
        details object[]
      • Array [
      • ]
      -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
      Schema
        details object[]
      • Array [
      • ]
      diff --git a/docs/docs/apis/shield-service-disable-user.api.mdx b/docs/docs/apis/shield-service-disable-user.api.mdx index c9b0e3450..e344f24c9 100644 --- a/docs/docs/apis/shield-service-disable-user.api.mdx +++ b/docs/docs/apis/shield-service-disable-user.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-disable-user +id: frontier-service-disable-user title: "Disable user" -description: "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Shield instance." +description: "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Frontier instance." sidebar_label: "Disable user" hide_title: true hide_table_of_contents: true api: { - "description": "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Shield instance.", - "operationId": "ShieldService_DisableUser", + "description": "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Frontier instance.", + "operationId": "FrontierService_DisableUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -258,7 +258,7 @@ api: "name": "Disable user", "description": { - "content": "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Shield instance.", + "content": "Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Frontier instance.", "type": "text/plain", }, "url": @@ -293,7 +293,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -308,7 +308,7 @@ import TabItem from "@theme/TabItem"; ## Disable user -Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Shield instance. +Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Frontier instance.
      Path Parameters
      Request Body required
        @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
        Schema
          details object[]
        • Array [
        • ]
        -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
        Schema
          details object[]
        • Array [
        • ]
        diff --git a/docs/docs/apis/shield-service-enable-group.api.mdx b/docs/docs/apis/shield-service-enable-group.api.mdx index 17e79b3c6..3b12601df 100644 --- a/docs/docs/apis/shield-service-enable-group.api.mdx +++ b/docs/docs/apis/shield-service-enable-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-enable-group +id: frontier-service-enable-group title: "Enable group" description: "Sets the state of the group as enabled. The `enabled` flag is used to determine if the group can be used for access control." sidebar_label: "Enable group" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Sets the state of the group as enabled. The `enabled` flag is used to determine if the group can be used for access control.", - "operationId": "ShieldService_EnableGroup", + "operationId": "FrontierService_EnableGroup", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -244,8 +244,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -256,7 +256,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -308,7 +308,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -355,7 +355,7 @@ Not Found - The requested resource was not found
        Schema
          details object[]
        • Array [
        • ]
        -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
        Schema
          details object[]
        • Array [
        • ]
        diff --git a/docs/docs/apis/shield-service-enable-organization.api.mdx b/docs/docs/apis/shield-service-enable-organization.api.mdx index a508adb74..1c24b3a39 100644 --- a/docs/docs/apis/shield-service-enable-organization.api.mdx +++ b/docs/docs/apis/shield-service-enable-organization.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-enable-organization +id: frontier-service-enable-organization title: "Enable organization" description: "Sets the state of the organization as enabled. The existing users in the org will be able to access any organization resources." sidebar_label: "Enable organization" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Sets the state of the organization as enabled. The existing users in the org will be able to access any organization resources.", - "operationId": "ShieldService_EnableOrganization", + "operationId": "FrontierService_EnableOrganization", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -293,7 +293,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
        Schema
          details object[]
        • Array [
        • ]
        -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
        Schema
          details object[]
        • Array [
        • ]
        diff --git a/docs/docs/apis/shield-service-enable-project.api.mdx b/docs/docs/apis/shield-service-enable-project.api.mdx index b583d7dfd..b840840cd 100644 --- a/docs/docs/apis/shield-service-enable-project.api.mdx +++ b/docs/docs/apis/shield-service-enable-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-enable-project +id: frontier-service-enable-project title: "Enable project" description: "Enable project" sidebar_label: "Enable project" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_EnableProject", + "operationId": "FrontierService_EnableProject", "responses": { "200": @@ -138,7 +138,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -289,7 +289,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -336,7 +336,7 @@ Not Found - The requested resource was not found
        Schema
          details object[]
        • Array [
        • ]
        -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
        Schema
          details object[]
        • Array [
        • ]
        diff --git a/docs/docs/apis/shield-service-enable-user.api.mdx b/docs/docs/apis/shield-service-enable-user.api.mdx index 149ef92d9..32fb151e7 100644 --- a/docs/docs/apis/shield-service-enable-user.api.mdx +++ b/docs/docs/apis/shield-service-enable-user.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-enable-user +id: frontier-service-enable-user title: "Enable user" -description: "Sets the state of the user as enabled. The user will be able to log in and access the Shield instance." +description: "Sets the state of the user as enabled. The user will be able to log in and access the Frontier instance." sidebar_label: "Enable user" hide_title: true hide_table_of_contents: true api: { - "description": "Sets the state of the user as enabled. The user will be able to log in and access the Shield instance.", - "operationId": "ShieldService_EnableUser", + "description": "Sets the state of the user as enabled. The user will be able to log in and access the Frontier instance.", + "operationId": "FrontierService_EnableUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: "jsonRequestBodyExample": {}, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -258,7 +258,7 @@ api: "name": "Enable user", "description": { - "content": "Sets the state of the user as enabled. The user will be able to log in and access the Shield instance.", + "content": "Sets the state of the user as enabled. The user will be able to log in and access the Frontier instance.", "type": "text/plain", }, "url": @@ -293,7 +293,7 @@ api: }, } sidebar_class_name: "post api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -308,7 +308,7 @@ import TabItem from "@theme/TabItem"; ## Enable user -Sets the state of the user as enabled. The user will be able to log in and access the Shield instance. +Sets the state of the user as enabled. The user will be able to log in and access the Frontier instance.
        Path Parameters
        Request Body required
          @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-current-user.api.mdx b/docs/docs/apis/shield-service-get-current-user.api.mdx index 211c6e6cf..ccd886060 100644 --- a/docs/docs/apis/shield-service-get-current-user.api.mdx +++ b/docs/docs/apis/shield-service-get-current-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-current-user +id: frontier-service-get-current-user title: "Get current user" description: "Get current user" sidebar_label: "Get current user" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_GetCurrentUser", + "operationId": "FrontierService_GetCurrentUser", "responses": { "200": @@ -218,7 +218,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -303,8 +303,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -315,7 +315,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -334,7 +334,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -373,7 +373,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-group.api.mdx b/docs/docs/apis/shield-service-get-group.api.mdx index 3feb6b23f..4325ccee4 100644 --- a/docs/docs/apis/shield-service-get-group.api.mdx +++ b/docs/docs/apis/shield-service-get-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-group +id: frontier-service-get-group title: "Get group" description: "Get group" sidebar_label: "Get group" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_GetGroup", + "operationId": "FrontierService_GetGroup", "responses": { "200": @@ -175,7 +175,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -275,8 +275,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -287,7 +287,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -324,7 +324,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -363,7 +363,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-jw-ks-2.api.mdx b/docs/docs/apis/shield-service-get-jw-ks-2.api.mdx index 899b97fcc..0cf48ab9c 100644 --- a/docs/docs/apis/shield-service-get-jw-ks-2.api.mdx +++ b/docs/docs/apis/shield-service-get-jw-ks-2.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-jw-ks-2 +id: frontier-service-get-jw-ks-2 title: "Get well known JWKs" description: "Get well known JWKs" sidebar_label: "Get well known JWKs" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_GetJWKs2", + "operationId": "FrontierService_GetJWKs2", "responses": { "200": @@ -207,7 +207,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -292,8 +292,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -304,7 +304,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -323,7 +323,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -362,7 +362,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-jw-ks.api.mdx b/docs/docs/apis/shield-service-get-jw-ks.api.mdx index 31ce83033..47eaf4d96 100644 --- a/docs/docs/apis/shield-service-get-jw-ks.api.mdx +++ b/docs/docs/apis/shield-service-get-jw-ks.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-jw-ks +id: frontier-service-get-jw-ks title: "Get well known JWKs" description: "Get well known JWKs" sidebar_label: "Get well known JWKs" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_GetJWKs", + "operationId": "FrontierService_GetJWKs", "responses": { "200": @@ -207,7 +207,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -292,8 +292,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -304,7 +304,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -323,7 +323,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -362,7 +362,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-meta-schema.api.mdx b/docs/docs/apis/shield-service-get-meta-schema.api.mdx index fcdaca6e2..3a628d87c 100644 --- a/docs/docs/apis/shield-service-get-meta-schema.api.mdx +++ b/docs/docs/apis/shield-service-get-meta-schema.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-meta-schema +id: frontier-service-get-meta-schema title: "Get metaschema" description: "Get a metadata schema by ID." sidebar_label: "Get metaschema" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get a metadata schema by ID.", - "operationId": "ShieldService_GetMetaSchema", + "operationId": "FrontierService_GetMetaSchema", "responses": { "200": @@ -184,7 +184,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -277,8 +277,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -289,7 +289,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -319,7 +319,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-namespace.api.mdx b/docs/docs/apis/shield-service-get-namespace.api.mdx index 7e14e52a5..f135caf4c 100644 --- a/docs/docs/apis/shield-service-get-namespace.api.mdx +++ b/docs/docs/apis/shield-service-get-namespace.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-namespace +id: frontier-service-get-namespace title: "Get namespace" description: "Returns a namespace by ID" sidebar_label: "Get namespace" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a namespace by ID", - "operationId": "ShieldService_GetNamespace", + "operationId": "FrontierService_GetNamespace", "responses": { "200": @@ -178,7 +178,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -271,8 +271,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -283,7 +283,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -313,7 +313,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -352,7 +352,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organization-audit-log.api.mdx b/docs/docs/apis/shield-service-get-organization-audit-log.api.mdx index b1e25f949..19a4e1232 100644 --- a/docs/docs/apis/shield-service-get-organization-audit-log.api.mdx +++ b/docs/docs/apis/shield-service-get-organization-audit-log.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organization-audit-log +id: frontier-service-get-organization-audit-log title: "Get audit log" description: "Get an audit log by ID." sidebar_label: "Get audit log" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get an audit log by ID.", - "operationId": "ShieldService_GetOrganizationAuditLog", + "operationId": "FrontierService_GetOrganizationAuditLog", "responses": { "200": @@ -211,7 +211,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -310,8 +310,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -322,7 +322,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -360,7 +360,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -399,7 +399,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organization-invitation.api.mdx b/docs/docs/apis/shield-service-get-organization-invitation.api.mdx index e33d822b9..6e2cc1dfd 100644 --- a/docs/docs/apis/shield-service-get-organization-invitation.api.mdx +++ b/docs/docs/apis/shield-service-get-organization-invitation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organization-invitation +id: frontier-service-get-organization-invitation title: "Get pending invitation" description: "Returns a pending invitation queued for an organization" sidebar_label: "Get pending invitation" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a pending invitation queued for an organization", - "operationId": "ShieldService_GetOrganizationInvitation", + "operationId": "FrontierService_GetOrganizationInvitation", "responses": { "200": @@ -202,7 +202,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -301,8 +301,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -313,7 +313,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -355,7 +355,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -394,7 +394,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organization-role.api.mdx b/docs/docs/apis/shield-service-get-organization-role.api.mdx index b67e03337..a68d0e963 100644 --- a/docs/docs/apis/shield-service-get-organization-role.api.mdx +++ b/docs/docs/apis/shield-service-get-organization-role.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organization-role +id: frontier-service-get-organization-role title: "Get organization role" description: "Returns a custom role under an organization along with its associated permissions" sidebar_label: "Get organization role" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a custom role under an organization along with its associated permissions", - "operationId": "ShieldService_GetOrganizationRole", + "operationId": "FrontierService_GetOrganizationRole", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -334,7 +334,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -373,7 +373,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organization.api.mdx b/docs/docs/apis/shield-service-get-organization.api.mdx index acc376374..602a84482 100644 --- a/docs/docs/apis/shield-service-get-organization.api.mdx +++ b/docs/docs/apis/shield-service-get-organization.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organization +id: frontier-service-get-organization title: "Get organization" description: "Get organization by ID or name" sidebar_label: "Get organization" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get organization by ID or name", - "operationId": "ShieldService_GetOrganization", + "operationId": "FrontierService_GetOrganization", "responses": { "200": @@ -175,7 +175,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -268,8 +268,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -280,7 +280,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -310,7 +310,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -349,7 +349,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organizations-by-current-user.api.mdx b/docs/docs/apis/shield-service-get-organizations-by-current-user.api.mdx index 746600102..53c06efe1 100644 --- a/docs/docs/apis/shield-service-get-organizations-by-current-user.api.mdx +++ b/docs/docs/apis/shield-service-get-organizations-by-current-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organizations-by-current-user +id: frontier-service-get-organizations-by-current-user title: "Get my organizations" description: "Get all organizations the current user belongs to" sidebar_label: "Get my organizations" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all organizations the current user belongs to", - "operationId": "ShieldService_GetOrganizationsByCurrentUser", + "operationId": "FrontierService_GetOrganizationsByCurrentUser", "responses": { "200": @@ -179,7 +179,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -263,8 +263,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -275,7 +275,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -298,7 +298,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -337,7 +337,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-organizations-by-user.api.mdx b/docs/docs/apis/shield-service-get-organizations-by-user.api.mdx index b655d4430..6d8f12dbf 100644 --- a/docs/docs/apis/shield-service-get-organizations-by-user.api.mdx +++ b/docs/docs/apis/shield-service-get-organizations-by-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-organizations-by-user +id: frontier-service-get-organizations-by-user title: "Get user organizations" description: "Get all the organizations a user belongs to." sidebar_label: "Get user organizations" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all the organizations a user belongs to.", - "operationId": "ShieldService_GetOrganizationsByUser", + "operationId": "FrontierService_GetOrganizationsByUser", "responses": { "200": @@ -179,7 +179,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -272,8 +272,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -284,7 +284,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -317,7 +317,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -356,7 +356,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-permission.api.mdx b/docs/docs/apis/shield-service-get-permission.api.mdx index 4caf43a88..eb925bb17 100644 --- a/docs/docs/apis/shield-service-get-permission.api.mdx +++ b/docs/docs/apis/shield-service-get-permission.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-permission +id: frontier-service-get-permission title: "Get permission" description: "Returns a permission by ID" sidebar_label: "Get permission" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a permission by ID", - "operationId": "ShieldService_GetPermission", + "operationId": "FrontierService_GetPermission", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -275,8 +275,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -287,7 +287,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -317,7 +317,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -356,7 +356,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-policy.api.mdx b/docs/docs/apis/shield-service-get-policy.api.mdx index 3f8efc208..21900b34b 100644 --- a/docs/docs/apis/shield-service-get-policy.api.mdx +++ b/docs/docs/apis/shield-service-get-policy.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-policy +id: frontier-service-get-policy title: "Get policy" description: "Returns a policy by ID" sidebar_label: "Get policy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a policy by ID", - "operationId": "ShieldService_GetPolicy", + "operationId": "FrontierService_GetPolicy", "responses": { "200": @@ -185,7 +185,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -278,8 +278,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -290,7 +290,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -320,7 +320,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -359,7 +359,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-project-resource.api.mdx b/docs/docs/apis/shield-service-get-project-resource.api.mdx index c38d75cef..f9973f10d 100644 --- a/docs/docs/apis/shield-service-get-project-resource.api.mdx +++ b/docs/docs/apis/shield-service-get-project-resource.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-project-resource +id: frontier-service-get-project-resource title: "Get resource" description: "Returns a project resource by ID" sidebar_label: "Get resource" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a project resource by ID", - "operationId": "ShieldService_GetProjectResource", + "operationId": "FrontierService_GetProjectResource", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -334,7 +334,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -373,7 +373,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-project.api.mdx b/docs/docs/apis/shield-service-get-project.api.mdx index 833613032..63282125e 100644 --- a/docs/docs/apis/shield-service-get-project.api.mdx +++ b/docs/docs/apis/shield-service-get-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-project +id: frontier-service-get-project title: "Get project" description: "Returns a project by ID" sidebar_label: "Get project" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a project by ID", - "operationId": "ShieldService_GetProject", + "operationId": "FrontierService_GetProject", "responses": { "200": @@ -176,7 +176,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -269,8 +269,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -281,7 +281,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -311,7 +311,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -350,7 +350,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-projects-by-current-user.api.mdx b/docs/docs/apis/shield-service-get-projects-by-current-user.api.mdx index 3f3b0b177..a4c910352 100644 --- a/docs/docs/apis/shield-service-get-projects-by-current-user.api.mdx +++ b/docs/docs/apis/shield-service-get-projects-by-current-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-projects-by-current-user +id: frontier-service-get-projects-by-current-user title: "Get my projects" description: "Get all projects the current user belongs to" sidebar_label: "Get my projects" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all projects the current user belongs to", - "operationId": "ShieldService_GetProjectsByCurrentUser", + "operationId": "FrontierService_GetProjectsByCurrentUser", "responses": { "200": @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -264,8 +264,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -276,7 +276,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -299,7 +299,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -338,7 +338,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-projects-by-user.api.mdx b/docs/docs/apis/shield-service-get-projects-by-user.api.mdx index 6c3ab8b59..db7203a41 100644 --- a/docs/docs/apis/shield-service-get-projects-by-user.api.mdx +++ b/docs/docs/apis/shield-service-get-projects-by-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-projects-by-user +id: frontier-service-get-projects-by-user title: "Get user projects" description: "Get all the projects a user belongs to." sidebar_label: "Get user projects" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all the projects a user belongs to.", - "operationId": "ShieldService_GetProjectsByUser", + "operationId": "FrontierService_GetProjectsByUser", "responses": { "200": @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -273,8 +273,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -285,7 +285,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -318,7 +318,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -357,7 +357,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-relation.api.mdx b/docs/docs/apis/shield-service-get-relation.api.mdx index 1dad5bd75..a4b22ddd4 100644 --- a/docs/docs/apis/shield-service-get-relation.api.mdx +++ b/docs/docs/apis/shield-service-get-relation.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-relation +id: frontier-service-get-relation title: "Get relation" description: "Returns a relation by ID" sidebar_label: "Get relation" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a relation by ID", - "operationId": "ShieldService_GetRelation", + "operationId": "FrontierService_GetRelation", "responses": { "200": @@ -184,7 +184,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -277,8 +277,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -289,7 +289,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -319,7 +319,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-service-user-key.api.mdx b/docs/docs/apis/shield-service-get-service-user-key.api.mdx index 811c9a9ed..cf16a16b2 100644 --- a/docs/docs/apis/shield-service-get-service-user-key.api.mdx +++ b/docs/docs/apis/shield-service-get-service-user-key.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-service-user-key +id: frontier-service-get-service-user-key title: "Get service user key" description: "Get a service user public RSA JWK set." sidebar_label: "Get service user key" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get a service user public RSA JWK set.", - "operationId": "ShieldService_GetServiceUserKey", + "operationId": "FrontierService_GetServiceUserKey", "responses": { "200": @@ -207,7 +207,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -308,8 +308,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -320,7 +320,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -367,7 +367,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -406,7 +406,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-service-user.api.mdx b/docs/docs/apis/shield-service-get-service-user.api.mdx index 90de364ed..b2f80dbfc 100644 --- a/docs/docs/apis/shield-service-get-service-user.api.mdx +++ b/docs/docs/apis/shield-service-get-service-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-get-service-user +id: frontier-service-get-service-user title: "Get service user" description: "Get service user details by its id." sidebar_label: "Get service user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get service user details by its id.", - "operationId": "ShieldService_GetServiceUser", + "operationId": "FrontierService_GetServiceUser", "responses": { "200": @@ -181,7 +181,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -275,8 +275,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -287,7 +287,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -323,7 +323,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -362,7 +362,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-get-user.api.mdx b/docs/docs/apis/shield-service-get-user.api.mdx index 208f29f46..dc0584145 100644 --- a/docs/docs/apis/shield-service-get-user.api.mdx +++ b/docs/docs/apis/shield-service-get-user.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-get-user +id: frontier-service-get-user title: "Get user" -description: "Get a user by id searched over all organizations in Shield." +description: "Get a user by id searched over all organizations in Frontier." sidebar_label: "Get user" hide_title: true hide_table_of_contents: true api: { - "description": "Get a user by id searched over all organizations in Shield.", - "operationId": "ShieldService_GetUser", + "description": "Get a user by id searched over all organizations in Frontier.", + "operationId": "FrontierService_GetUser", "responses": { "200": @@ -188,7 +188,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -301,7 +301,7 @@ api: "name": "Get user", "description": { - "content": "Get a user by id searched over all organizations in Shield.", + "content": "Get a user by id searched over all organizations in Frontier.", "type": "text/plain", }, "url": @@ -326,7 +326,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -341,7 +341,7 @@ import TabItem from "@theme/TabItem"; ## Get user -Get a user by id searched over all organizations in Shield. +Get a user by id searched over all organizations in Frontier.
          Path Parameters
          @@ -365,7 +365,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-auth-strategies.api.mdx b/docs/docs/apis/shield-service-list-auth-strategies.api.mdx index f5a703e94..a2b6b112b 100644 --- a/docs/docs/apis/shield-service-list-auth-strategies.api.mdx +++ b/docs/docs/apis/shield-service-list-auth-strategies.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-auth-strategies +id: frontier-service-list-auth-strategies title: "List authentication strategies" -description: "Returns a list of identity providers configured on an instance level in Shield. e.g Google, AzureAD, Github etc" +description: "Returns a list of identity providers configured on an instance level in Frontier. e.g Google, AzureAD, Github etc" sidebar_label: "List authentication strategies" hide_title: true hide_table_of_contents: true api: { - "description": "Returns a list of identity providers configured on an instance level in Shield. e.g Google, AzureAD, Github etc", - "operationId": "ShieldService_ListAuthStrategies", + "description": "Returns a list of identity providers configured on an instance level in Frontier. e.g Google, AzureAD, Github etc", + "operationId": "FrontierService_ListAuthStrategies", "responses": { "200": @@ -163,7 +163,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -247,8 +247,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -259,7 +259,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -267,7 +267,7 @@ api: "name": "List authentication strategies", "description": { - "content": "Returns a list of identity providers configured on an instance level in Shield. e.g Google, AzureAD, Github etc", + "content": "Returns a list of identity providers configured on an instance level in Frontier. e.g Google, AzureAD, Github etc", "type": "text/plain", }, "url": @@ -282,7 +282,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -297,7 +297,7 @@ import TabItem from "@theme/TabItem"; ## List authentication strategies -Returns a list of identity providers configured on an instance level in Shield. e.g Google, AzureAD, Github etc +Returns a list of identity providers configured on an instance level in Frontier. e.g Google, AzureAD, Github etc
          @@ -321,7 +321,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-current-user-groups.api.mdx b/docs/docs/apis/shield-service-list-current-user-groups.api.mdx index 2f64397d3..2b2068bd8 100644 --- a/docs/docs/apis/shield-service-list-current-user-groups.api.mdx +++ b/docs/docs/apis/shield-service-list-current-user-groups.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-current-user-groups +id: frontier-service-list-current-user-groups title: "List my groups" description: "List my groups" sidebar_label: "List my groups" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_ListCurrentUserGroups", + "operationId": "FrontierService_ListCurrentUserGroups", "responses": { "200": @@ -179,7 +179,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -264,8 +264,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -276,7 +276,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -295,7 +295,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -334,7 +334,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-group-users.api.mdx b/docs/docs/apis/shield-service-list-group-users.api.mdx index dcd91a861..1453c1a73 100644 --- a/docs/docs/apis/shield-service-list-group-users.api.mdx +++ b/docs/docs/apis/shield-service-list-group-users.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-group-users +id: frontier-service-list-group-users title: "List group users" description: "Returns a list of users that belong to a group." sidebar_label: "List group users" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a list of users that belong to a group.", - "operationId": "ShieldService_ListGroupUsers", + "operationId": "FrontierService_ListGroupUsers", "responses": { "200": @@ -192,7 +192,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -291,8 +291,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -303,7 +303,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -345,7 +345,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -384,7 +384,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-meta-schemas.api.mdx b/docs/docs/apis/shield-service-list-meta-schemas.api.mdx index 431ea32db..41a03690d 100644 --- a/docs/docs/apis/shield-service-list-meta-schemas.api.mdx +++ b/docs/docs/apis/shield-service-list-meta-schemas.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-meta-schemas +id: frontier-service-list-meta-schemas title: "List metaschemas" -description: "Returns a list of all metaschemas configured on an instance level in Shield. e.g user, project, organization etc" +description: "Returns a list of all metaschemas configured on an instance level in Frontier. e.g user, project, organization etc" sidebar_label: "List metaschemas" hide_title: true hide_table_of_contents: true api: { - "description": "Returns a list of all metaschemas configured on an instance level in Shield. e.g user, project, organization etc", - "operationId": "ShieldService_ListMetaSchemas", + "description": "Returns a list of all metaschemas configured on an instance level in Frontier. e.g user, project, organization etc", + "operationId": "FrontierService_ListMetaSchemas", "responses": { "200": @@ -188,7 +188,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -272,8 +272,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -284,7 +284,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -292,7 +292,7 @@ api: "name": "List metaschemas", "description": { - "content": "Returns a list of all metaschemas configured on an instance level in Shield. e.g user, project, organization etc", + "content": "Returns a list of all metaschemas configured on an instance level in Frontier. e.g user, project, organization etc", "type": "text/plain", }, "url": @@ -307,7 +307,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -322,7 +322,7 @@ import TabItem from "@theme/TabItem"; ## List metaschemas -Returns a list of all metaschemas configured on an instance level in Shield. e.g user, project, organization etc +Returns a list of all metaschemas configured on an instance level in Frontier. e.g user, project, organization etc
          @@ -346,7 +346,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-namespaces.api.mdx b/docs/docs/apis/shield-service-list-namespaces.api.mdx index a8172812f..15dba4fdf 100644 --- a/docs/docs/apis/shield-service-list-namespaces.api.mdx +++ b/docs/docs/apis/shield-service-list-namespaces.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-namespaces +id: frontier-service-list-namespaces title: "Get all namespaces" -description: "Returns the list of all namespaces in a Shield instance" +description: "Returns the list of all namespaces in a Frontier instance" sidebar_label: "Get all namespaces" hide_title: true hide_table_of_contents: true api: { - "description": "Returns the list of all namespaces in a Shield instance", - "operationId": "ShieldService_ListNamespaces", + "description": "Returns the list of all namespaces in a Frontier instance", + "operationId": "FrontierService_ListNamespaces", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -266,8 +266,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -278,7 +278,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -286,7 +286,7 @@ api: "name": "Get all namespaces", "description": { - "content": "Returns the list of all namespaces in a Shield instance", + "content": "Returns the list of all namespaces in a Frontier instance", "type": "text/plain", }, "url": @@ -301,7 +301,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -316,7 +316,7 @@ import TabItem from "@theme/TabItem"; ## Get all namespaces -Returns the list of all namespaces in a Shield instance +Returns the list of all namespaces in a Frontier instance
          @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-admins.api.mdx b/docs/docs/apis/shield-service-list-organization-admins.api.mdx index d292fccc6..995b2186c 100644 --- a/docs/docs/apis/shield-service-list-organization-admins.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-admins.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-admins +id: frontier-service-list-organization-admins title: "List organization admins" description: "Returns a list admins of an organization" sidebar_label: "List organization admins" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a list admins of an organization", - "operationId": "ShieldService_ListOrganizationAdmins", + "operationId": "FrontierService_ListOrganizationAdmins", "responses": { "200": @@ -192,7 +192,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -285,8 +285,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -297,7 +297,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -330,7 +330,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -369,7 +369,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-audit-logs.api.mdx b/docs/docs/apis/shield-service-list-organization-audit-logs.api.mdx index f9c353b9e..0e74791cc 100644 --- a/docs/docs/apis/shield-service-list-organization-audit-logs.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-audit-logs.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-organization-audit-logs +id: frontier-service-list-organization-audit-logs title: "List audit logs" -description: "Returns a list of audit logs of an organization in Shield." +description: "Returns a list of audit logs of an organization in Frontier." sidebar_label: "List audit logs" hide_title: true hide_table_of_contents: true api: { - "description": "Returns a list of audit logs of an organization in Shield.", - "operationId": "ShieldService_ListOrganizationAuditLogs", + "description": "Returns a list of audit logs of an organization in Frontier.", + "operationId": "FrontierService_ListOrganizationAuditLogs", "responses": { "200": @@ -215,7 +215,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -333,8 +333,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -345,7 +345,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -353,7 +353,7 @@ api: "name": "List audit logs", "description": { - "content": "Returns a list of audit logs of an organization in Shield.", + "content": "Returns a list of audit logs of an organization in Frontier.", "type": "text/plain", }, "url": @@ -393,7 +393,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -408,7 +408,7 @@ import TabItem from "@theme/TabItem"; ## List audit logs -Returns a list of audit logs of an organization in Shield. +Returns a list of audit logs of an organization in Frontier.
          Path Parameters
          Query Parameters
          @@ -432,7 +432,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-groups.api.mdx b/docs/docs/apis/shield-service-list-organization-groups.api.mdx index dfafaee93..881363415 100644 --- a/docs/docs/apis/shield-service-list-organization-groups.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-groups.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-groups +id: frontier-service-list-organization-groups title: "List organization groups" description: "Get all groups that belong to an organization. The results can be filtered by state which can be either be enabled or disabled." sidebar_label: "List organization groups" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all groups that belong to an organization. The results can be filtered by state which can be either be enabled or disabled.", - "operationId": "ShieldService_ListOrganizationGroups", + "operationId": "FrontierService_ListOrganizationGroups", "responses": { "200": @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -280,8 +280,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -292,7 +292,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -337,7 +337,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -376,7 +376,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-invitations.api.mdx b/docs/docs/apis/shield-service-list-organization-invitations.api.mdx index 43adbaa54..df6ed8e54 100644 --- a/docs/docs/apis/shield-service-list-organization-invitations.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-invitations.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-invitations +id: frontier-service-list-organization-invitations title: "List pending invitations" description: "Returns all pending invitations queued for an organization" sidebar_label: "List pending invitations" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns all pending invitations queued for an organization", - "operationId": "ShieldService_ListOrganizationInvitations", + "operationId": "FrontierService_ListOrganizationInvitations", "responses": { "200": @@ -206,7 +206,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -307,8 +307,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -319,7 +319,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -367,7 +367,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -406,7 +406,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-projects.api.mdx b/docs/docs/apis/shield-service-list-organization-projects.api.mdx index d0b115dda..e08e9c4d6 100644 --- a/docs/docs/apis/shield-service-list-organization-projects.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-projects.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-projects +id: frontier-service-list-organization-projects title: "Get organization projects" description: "Get all projects that belong to an organization" sidebar_label: "Get organization projects" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Get all projects that belong to an organization", - "operationId": "ShieldService_ListOrganizationProjects", + "operationId": "FrontierService_ListOrganizationProjects", "responses": { "200": @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -280,8 +280,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -292,7 +292,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -337,7 +337,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -376,7 +376,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-roles.api.mdx b/docs/docs/apis/shield-service-list-organization-roles.api.mdx index f209b5779..c14ec48c3 100644 --- a/docs/docs/apis/shield-service-list-organization-roles.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-roles.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-roles +id: frontier-service-list-organization-roles title: "List organization roles" description: "Returns a list of custom roles created under an organization with their associated permissions" sidebar_label: "List organization roles" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a list of custom roles created under an organization with their associated permissions", - "operationId": "ShieldService_ListOrganizationRoles", + "operationId": "FrontierService_ListOrganizationRoles", "responses": { "200": @@ -186,7 +186,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -285,8 +285,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -297,7 +297,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -330,7 +330,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -369,7 +369,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-service-users.api.mdx b/docs/docs/apis/shield-service-list-organization-service-users.api.mdx index 7b4bd66a4..cc8eed9e5 100644 --- a/docs/docs/apis/shield-service-list-organization-service-users.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-service-users.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-service-users +id: frontier-service-list-organization-service-users title: "List organization service users" description: "List organization service users" sidebar_label: "List organization service users" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_ListOrganizationServiceUsers", + "operationId": "FrontierService_ListOrganizationServiceUsers", "responses": { "200": @@ -184,7 +184,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -278,8 +278,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -290,7 +290,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -319,7 +319,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organization-users.api.mdx b/docs/docs/apis/shield-service-list-organization-users.api.mdx index 5f6ac1830..9770e9c71 100644 --- a/docs/docs/apis/shield-service-list-organization-users.api.mdx +++ b/docs/docs/apis/shield-service-list-organization-users.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organization-users +id: frontier-service-list-organization-users title: "List organization users" description: "List organization users" sidebar_label: "List organization users" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_ListOrganizationUsers", + "operationId": "FrontierService_ListOrganizationUsers", "responses": { "200": @@ -191,7 +191,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -291,8 +291,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -303,7 +303,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -333,7 +333,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -372,7 +372,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-organizations.api.mdx b/docs/docs/apis/shield-service-list-organizations.api.mdx index 6db562218..5fdc88487 100644 --- a/docs/docs/apis/shield-service-list-organizations.api.mdx +++ b/docs/docs/apis/shield-service-list-organizations.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-organizations +id: frontier-service-list-organizations title: "List organizations" description: "Returns a list of organizations. It can be filtered by userID or organization state." sidebar_label: "List organizations" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a list of organizations. It can be filtered by userID or organization state.", - "operationId": "ShieldService_ListOrganizations", + "operationId": "FrontierService_ListOrganizations", "responses": { "200": @@ -179,7 +179,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -242,7 +242,7 @@ api: [ { "name": "userId", - "description": "The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Shield instance will be listed.", + "description": "The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Frontier instance will be listed.", "in": "query", "required": false, "schema": { "type": "string" }, @@ -280,8 +280,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -292,7 +292,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -313,7 +313,7 @@ api: "disabled": false, "description": { - "content": "The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Shield instance will be listed.", + "content": "The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Frontier instance will be listed.", "type": "text/plain", }, "key": "userId", @@ -337,7 +337,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -354,7 +354,7 @@ import TabItem from "@theme/TabItem"; Returns a list of organizations. It can be filtered by userID or organization state. -
          Query Parameters
          +
          Query Parameters
          A successful response. @@ -376,7 +376,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-permissions.api.mdx b/docs/docs/apis/shield-service-list-permissions.api.mdx index e6d646443..1e381f269 100644 --- a/docs/docs/apis/shield-service-list-permissions.api.mdx +++ b/docs/docs/apis/shield-service-list-permissions.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-permissions +id: frontier-service-list-permissions title: "Get all permissions" description: "Get all permissions" sidebar_label: "Get all permissions" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_ListPermissions", + "operationId": "FrontierService_ListPermissions", "responses": { "200": @@ -185,7 +185,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -270,8 +270,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -282,7 +282,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -301,7 +301,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -340,7 +340,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-project-admins.api.mdx b/docs/docs/apis/shield-service-list-project-admins.api.mdx index ffda29e6b..013340354 100644 --- a/docs/docs/apis/shield-service-list-project-admins.api.mdx +++ b/docs/docs/apis/shield-service-list-project-admins.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-project-admins +id: frontier-service-list-project-admins title: "List project admins" description: "Returns a collection of admins of a project" sidebar_label: "List project admins" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a collection of admins of a project", - "operationId": "ShieldService_ListProjectAdmins", + "operationId": "FrontierService_ListProjectAdmins", "responses": { "200": @@ -192,7 +192,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -285,8 +285,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -297,7 +297,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -330,7 +330,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -369,7 +369,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-project-resources.api.mdx b/docs/docs/apis/shield-service-list-project-resources.api.mdx index 02681553a..28a4787ed 100644 --- a/docs/docs/apis/shield-service-list-project-resources.api.mdx +++ b/docs/docs/apis/shield-service-list-project-resources.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-project-resources +id: frontier-service-list-project-resources title: "Get all resources" description: "Get all resources" sidebar_label: "Get all resources" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_ListProjectResources", + "operationId": "FrontierService_ListProjectResources", "responses": { "200": @@ -185,7 +185,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -285,8 +285,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -297,7 +297,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -326,7 +326,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -365,7 +365,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-project-users.api.mdx b/docs/docs/apis/shield-service-list-project-users.api.mdx index 97ded6f79..b202b1b18 100644 --- a/docs/docs/apis/shield-service-list-project-users.api.mdx +++ b/docs/docs/apis/shield-service-list-project-users.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-project-users +id: frontier-service-list-project-users title: "List project users" description: "Returns a collection of users of a project. Filter by user permissions is supported." sidebar_label: "List project users" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Returns a collection of users of a project. Filter by user permissions is supported.", - "operationId": "ShieldService_ListProjectUsers", + "operationId": "FrontierService_ListProjectUsers", "responses": { "200": @@ -192,7 +192,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -291,8 +291,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -303,7 +303,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -337,7 +337,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -376,7 +376,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-roles.api.mdx b/docs/docs/apis/shield-service-list-roles.api.mdx index 289c47be3..364d1cd03 100644 --- a/docs/docs/apis/shield-service-list-roles.api.mdx +++ b/docs/docs/apis/shield-service-list-roles.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-roles +id: frontier-service-list-roles title: "List platform roles" -description: "Returns a list of platform wide roles available in enitre Shield instance along with their associated permissions" +description: "Returns a list of platform wide roles available in enitre Frontier instance along with their associated permissions" sidebar_label: "List platform roles" hide_title: true hide_table_of_contents: true api: { - "description": "Returns a list of platform wide roles available in enitre Shield instance along with their associated permissions", - "operationId": "ShieldService_ListRoles", + "description": "Returns a list of platform wide roles available in enitre Frontier instance along with their associated permissions", + "operationId": "FrontierService_ListRoles", "responses": { "200": @@ -186,7 +186,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -279,8 +279,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -291,7 +291,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -299,7 +299,7 @@ api: "name": "List platform roles", "description": { - "content": "Returns a list of platform wide roles available in enitre Shield instance along with their associated permissions", + "content": "Returns a list of platform wide roles available in enitre Frontier instance along with their associated permissions", "type": "text/plain", }, "url": @@ -314,7 +314,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -329,7 +329,7 @@ import TabItem from "@theme/TabItem"; ## List platform roles -Returns a list of platform wide roles available in enitre Shield instance along with their associated permissions +Returns a list of platform wide roles available in enitre Frontier instance along with their associated permissions
          Query Parameters
          @@ -353,7 +353,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-service-user-keys.api.mdx b/docs/docs/apis/shield-service-list-service-user-keys.api.mdx index 41ec24939..0fbc034d8 100644 --- a/docs/docs/apis/shield-service-list-service-user-keys.api.mdx +++ b/docs/docs/apis/shield-service-list-service-user-keys.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-service-user-keys +id: frontier-service-list-service-user-keys title: "List service user keys" description: "List all the keys of a service user with its details except jwk." sidebar_label: "List service user keys" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "List all the keys of a service user with its details except jwk.", - "operationId": "ShieldService_ListServiceUserKeys", + "operationId": "FrontierService_ListServiceUserKeys", "responses": { "200": @@ -176,7 +176,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -270,8 +270,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -282,7 +282,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -318,7 +318,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -357,7 +357,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-service-user-secrets.api.mdx b/docs/docs/apis/shield-service-list-service-user-secrets.api.mdx index 6afbf7940..d2298ad38 100644 --- a/docs/docs/apis/shield-service-list-service-user-secrets.api.mdx +++ b/docs/docs/apis/shield-service-list-service-user-secrets.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-service-user-secrets +id: frontier-service-list-service-user-secrets title: "List service user secrets" description: "List all the secrets of a service user." sidebar_label: "List service user secrets" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "List all the secrets of a service user.", - "operationId": "ShieldService_ListServiceUserSecrets", + "operationId": "FrontierService_ListServiceUserSecrets", "responses": { "200": @@ -177,7 +177,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -271,8 +271,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -283,7 +283,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -319,7 +319,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-service-users.api.mdx b/docs/docs/apis/shield-service-list-service-users.api.mdx index 7041401fd..dc8fb1c4e 100644 --- a/docs/docs/apis/shield-service-list-service-users.api.mdx +++ b/docs/docs/apis/shield-service-list-service-users.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-service-users +id: frontier-service-list-service-users title: "List org service users" -description: "Returns the service user of an organization in a Shield instance. It can be filter by it's state" +description: "Returns the service user of an organization in a Frontier instance. It can be filter by it's state" sidebar_label: "List org service users" hide_title: true hide_table_of_contents: true api: { - "description": "Returns the service user of an organization in a Shield instance. It can be filter by it's state", - "operationId": "ShieldService_ListServiceUsers", + "description": "Returns the service user of an organization in a Frontier instance. It can be filter by it's state", + "operationId": "FrontierService_ListServiceUsers", "responses": { "200": @@ -185,7 +185,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -286,8 +286,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -298,7 +298,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -306,7 +306,7 @@ api: "name": "List org service users", "description": { - "content": "Returns the service user of an organization in a Shield instance. It can be filter by it's state", + "content": "Returns the service user of an organization in a Frontier instance. It can be filter by it's state", "type": "text/plain", }, "url": @@ -343,7 +343,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -358,7 +358,7 @@ import TabItem from "@theme/TabItem"; ## List org service users -Returns the service user of an organization in a Shield instance. It can be filter by it's state +Returns the service user of an organization in a Frontier instance. It can be filter by it's state
          Query Parameters
          @@ -382,7 +382,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-user-groups.api.mdx b/docs/docs/apis/shield-service-list-user-groups.api.mdx index 7658a245f..247c500c1 100644 --- a/docs/docs/apis/shield-service-list-user-groups.api.mdx +++ b/docs/docs/apis/shield-service-list-user-groups.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-user-groups +id: frontier-service-list-user-groups title: "List user groups" -description: "Lists all the groups a user belongs to across all organization in Shield. To get the groups of a user in a specific organization, use the org_id filter in the query parameter." +description: "Lists all the groups a user belongs to across all organization in Frontier. To get the groups of a user in a specific organization, use the org_id filter in the query parameter." sidebar_label: "List user groups" hide_title: true hide_table_of_contents: true api: { - "description": "Lists all the groups a user belongs to across all organization in Shield. To get the groups of a user in a specific organization, use the org_id filter in the query parameter.", - "operationId": "ShieldService_ListUserGroups", + "description": "Lists all the groups a user belongs to across all organization in Frontier. To get the groups of a user in a specific organization, use the org_id filter in the query parameter.", + "operationId": "FrontierService_ListUserGroups", "responses": { "200": @@ -180,7 +180,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -281,8 +281,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -293,7 +293,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -301,7 +301,7 @@ api: "name": "List user groups", "description": { - "content": "Lists all the groups a user belongs to across all organization in Shield. To get the groups of a user in a specific organization, use the org_id filter in the query parameter.", + "content": "Lists all the groups a user belongs to across all organization in Frontier. To get the groups of a user in a specific organization, use the org_id filter in the query parameter.", "type": "text/plain", }, "url": @@ -341,7 +341,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -356,7 +356,7 @@ import TabItem from "@theme/TabItem"; ## List user groups -Lists all the groups a user belongs to across all organization in Shield. To get the groups of a user in a specific organization, use the org_id filter in the query parameter. +Lists all the groups a user belongs to across all organization in Frontier. To get the groups of a user in a specific organization, use the org_id filter in the query parameter.
          Path Parameters
          Query Parameters
          @@ -380,7 +380,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-user-invitations.api.mdx b/docs/docs/apis/shield-service-list-user-invitations.api.mdx index e4f0ab533..fe6ed7455 100644 --- a/docs/docs/apis/shield-service-list-user-invitations.api.mdx +++ b/docs/docs/apis/shield-service-list-user-invitations.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-list-user-invitations +id: frontier-service-list-user-invitations title: "List user invitations" description: "List all the invitations sent to a user." sidebar_label: "List user invitations" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "List all the invitations sent to a user.", - "operationId": "ShieldService_ListUserInvitations", + "operationId": "FrontierService_ListUserInvitations", "responses": { "200": @@ -206,7 +206,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -300,8 +300,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -312,7 +312,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -348,7 +348,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -387,7 +387,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-list-users.api.mdx b/docs/docs/apis/shield-service-list-users.api.mdx index 52208a31b..41537d784 100644 --- a/docs/docs/apis/shield-service-list-users.api.mdx +++ b/docs/docs/apis/shield-service-list-users.api.mdx @@ -1,14 +1,14 @@ --- -id: shield-service-list-users +id: frontier-service-list-users title: "List public users" -description: "Returns the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination." +description: "Returns the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination." sidebar_label: "List public users" hide_title: true hide_table_of_contents: true api: { - "description": "Returns the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination.", - "operationId": "ShieldService_ListUsers", + "description": "Returns the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination.", + "operationId": "FrontierService_ListUsers", "responses": { "200": @@ -193,7 +193,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -322,8 +322,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -334,7 +334,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -342,7 +342,7 @@ api: "name": "List public users", "description": { - "content": "Returns the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination.", + "content": "Returns the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination.", "type": "text/plain", }, "url": @@ -419,7 +419,7 @@ api: }, } sidebar_class_name: "get api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -434,7 +434,7 @@ import TabItem from "@theme/TabItem"; ## List public users -Returns the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination. +Returns the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination.
          Query Parameters
          @@ -458,7 +458,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-remove-group-user.api.mdx b/docs/docs/apis/shield-service-remove-group-user.api.mdx index f491a0018..8c623e4fe 100644 --- a/docs/docs/apis/shield-service-remove-group-user.api.mdx +++ b/docs/docs/apis/shield-service-remove-group-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-remove-group-user +id: frontier-service-remove-group-user title: "Remove group user" description: "Removes a principle(user and service-users) from a group. If the user is not in the group, the request will succeed but no changes will be made." sidebar_label: "Remove group user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Removes a principle(user and service-users) from a group. If the user is not in the group, the request will succeed but no changes will be made.", - "operationId": "ShieldService_RemoveGroupUser", + "operationId": "FrontierService_RemoveGroupUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -244,8 +244,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -256,7 +256,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -314,7 +314,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -357,7 +357,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-remove-organization-user.api.mdx b/docs/docs/apis/shield-service-remove-organization-user.api.mdx index 37cf5e3cd..0d1d7955d 100644 --- a/docs/docs/apis/shield-service-remove-organization-user.api.mdx +++ b/docs/docs/apis/shield-service-remove-organization-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-remove-organization-user +id: frontier-service-remove-organization-user title: "Remove organization user" description: "Remove a user from an organization" sidebar_label: "Remove organization user" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Remove a user from an organization", - "operationId": "ShieldService_RemoveOrganizationUser", + "operationId": "FrontierService_RemoveOrganizationUser", "responses": { "200": @@ -139,7 +139,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -238,8 +238,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -250,7 +250,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -291,7 +291,7 @@ api: }, } sidebar_class_name: "delete api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -334,7 +334,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-current-user.api.mdx b/docs/docs/apis/shield-service-update-current-user.api.mdx index efa775de9..8567671d1 100644 --- a/docs/docs/apis/shield-service-update-current-user.api.mdx +++ b/docs/docs/apis/shield-service-update-current-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-current-user +id: frontier-service-update-current-user title: "Update current user" description: "Update current user" sidebar_label: "Update current user" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_UpdateCurrentUser", + "operationId": "FrontierService_UpdateCurrentUser", "responses": { "200": @@ -187,7 +187,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -260,12 +260,12 @@ api: "name": { "type": "string", - "description": "The name of the user. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Shield automatically generates a name from the user email. ", + "description": "The name of the user. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Frontier automatically generates a name from the user email. ", }, "email": { "type": "string", - "description": 'The email of the user. The email must be unique within the entire Shield instance.
          *Example:*`"john.doe@raystack.org"`', + "description": 'The email of the user. The email must be unique within the entire Frontier instance.
          *Example:*`"john.doe@raystack.org"`', }, "metadata": { @@ -317,8 +317,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -329,7 +329,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -358,7 +358,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -375,7 +375,7 @@ import TabItem from "@theme/TabItem"; Update current user -
          Request Body required
            *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
          +
          Request Body required
            *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
          A successful response. @@ -397,7 +397,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-group.api.mdx b/docs/docs/apis/shield-service-update-group.api.mdx index 3d13c48ae..c238434f4 100644 --- a/docs/docs/apis/shield-service-update-group.api.mdx +++ b/docs/docs/apis/shield-service-update-group.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-group +id: frontier-service-update-group title: "Update group" description: "Update group" sidebar_label: "Update group" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_UpdateGroup", + "operationId": "FrontierService_UpdateGroup", "responses": { "200": @@ -175,7 +175,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -264,7 +264,7 @@ api: "name": { "type": "string", - "description": "The name of the group. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.", + "description": "The name of the group. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.", }, "title": { @@ -311,8 +311,8 @@ api: { "name": "string", "title": "string", "metadata": {} }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -323,7 +323,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -373,7 +373,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -390,7 +390,7 @@ import TabItem from "@theme/TabItem"; Update group -
          Path Parameters
          Request Body required
            *Example:*`{\"labels\": {\"key\": \"value\"}, \"description\": \"Group description\"}`"}}>
          +
          Path Parameters
          Request Body required
            *Example:*`{\"labels\": {\"key\": \"value\"}, \"description\": \"Group description\"}`"}}>
          A successful response. @@ -412,7 +412,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-meta-schema.api.mdx b/docs/docs/apis/shield-service-update-meta-schema.api.mdx index 325598e06..70bcdbfeb 100644 --- a/docs/docs/apis/shield-service-update-meta-schema.api.mdx +++ b/docs/docs/apis/shield-service-update-meta-schema.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-meta-schema +id: frontier-service-update-meta-schema title: "Update metaschema" description: "Update a metadata schema. Only `schema` field of a metaschema can be updated. The metaschema `schema` must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
          *Example:* `{name:'user',schema:{'type':'object','properties':{'label':{'type':'object','additionalProperties':{'type':'string'}},'description':{'type':'string'}}}}`" sidebar_label: "Update metaschema" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": 'Update a metadata schema. Only `schema` field of a metaschema can be updated. The metaschema `schema` must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
          *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}`', - "operationId": "ShieldService_UpdateMetaSchema", + "operationId": "FrontierService_UpdateMetaSchema", "responses": { "200": @@ -184,7 +184,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -266,7 +266,7 @@ api: "name": { "type": "string", - "description": "The name of the metaschema. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.", + "description": "The name of the metaschema. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.", }, "schema": { @@ -306,8 +306,8 @@ api: "jsonRequestBodyExample": { "name": "string", "schema": "string" }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -318,7 +318,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -361,7 +361,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -378,7 +378,7 @@ import TabItem from "@theme/TabItem"; Update a metadata schema. Only `schema` field of a metaschema can be updated. The metaschema `schema` must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
          _Example:_ `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` -
          Path Parameters
          Request Body required
          +
          Path Parameters
          Request Body required
          A successful response. @@ -400,7 +400,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-organization-role.api.mdx b/docs/docs/apis/shield-service-update-organization-role.api.mdx index 3590cc6a5..a76115e79 100644 --- a/docs/docs/apis/shield-service-update-organization-role.api.mdx +++ b/docs/docs/apis/shield-service-update-organization-role.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-organization-role +id: frontier-service-update-organization-role title: "Update organization role" description: "Update a custom role under an organization. This custom role will only be available for assignment to the principles within the organization." sidebar_label: "Update organization role" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Update a custom role under an organization. This custom role will only be available for assignment to the principles within the organization.", - "operationId": "ShieldService_UpdateOrganizationRole", + "operationId": "FrontierService_UpdateOrganizationRole", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -310,8 +310,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -322,7 +322,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -373,7 +373,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -412,7 +412,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-organization.api.mdx b/docs/docs/apis/shield-service-update-organization.api.mdx index b8761c245..f675ee3d5 100644 --- a/docs/docs/apis/shield-service-update-organization.api.mdx +++ b/docs/docs/apis/shield-service-update-organization.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-organization +id: frontier-service-update-organization title: "Update organization" description: "Update organization by ID" sidebar_label: "Update organization" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Update organization by ID", - "operationId": "ShieldService_UpdateOrganization", + "operationId": "FrontierService_UpdateOrganization", "responses": { "200": @@ -175,7 +175,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -257,7 +257,7 @@ api: "name": { "type": "string", - "description": 'The name of the organization. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
          *Example:*`"shield-org1-acme"`', + "description": 'The name of the organization. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
          *Example:*`"frontier-org1-acme"`', }, "title": { @@ -303,8 +303,8 @@ api: { "name": "string", "title": "string", "metadata": {} }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -315,7 +315,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -355,7 +355,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -372,7 +372,7 @@ import TabItem from "@theme/TabItem"; Update organization by ID -
          Path Parameters
          Request Body required
            *Example:*`\"shield-org1-acme\"`"}}> *Example*: `\"Acme Inc\"`"}}>*Example*:`{\"labels\": {\"key\": \"value\"}, \"description\": \"Organization description\"}`"}}>
          +
          Path Parameters
          Request Body required
            *Example:*`\"frontier-org1-acme\"`"}}> *Example*: `\"Acme Inc\"`"}}>*Example*:`{\"labels\": {\"key\": \"value\"}, \"description\": \"Organization description\"}`"}}>
          A successful response. @@ -394,7 +394,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-policy.api.mdx b/docs/docs/apis/shield-service-update-policy.api.mdx index 855003f2f..48c59c99b 100644 --- a/docs/docs/apis/shield-service-update-policy.api.mdx +++ b/docs/docs/apis/shield-service-update-policy.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-policy +id: frontier-service-update-policy title: "Update policy" description: "Updates a policy by ID" sidebar_label: "Update policy" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Updates a policy by ID", - "operationId": "ShieldService_UpdatePolicy", + "operationId": "FrontierService_UpdatePolicy", "responses": { "200": @@ -189,7 +189,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -333,8 +333,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -345,7 +345,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -385,7 +385,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -424,7 +424,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-project-resource.api.mdx b/docs/docs/apis/shield-service-update-project-resource.api.mdx index 573998312..9c5259893 100644 --- a/docs/docs/apis/shield-service-update-project-resource.api.mdx +++ b/docs/docs/apis/shield-service-update-project-resource.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-project-resource +id: frontier-service-update-project-resource title: "Update resource" description: "Updates a resource in a project" sidebar_label: "Update resource" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Updates a resource in a project", - "operationId": "ShieldService_UpdateProjectResource", + "operationId": "FrontierService_UpdateProjectResource", "responses": { "200": @@ -182,7 +182,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -280,7 +280,7 @@ api: "namespace": { "type": "string", - "description": "The namespace of the resource. The resource namespace are created when permissions for that resource is created in Shield. If namespace doesn't exists the request will fail.
          *Example:* `compute/instance`", + "description": "The namespace of the resource. The resource namespace are created when permissions for that resource is created in Frontier. If namespace doesn't exists the request will fail.
          *Example:* `compute/instance`", }, "principal": { @@ -329,8 +329,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -341,7 +341,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -392,7 +392,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -409,7 +409,7 @@ import TabItem from "@theme/TabItem"; Updates a resource in a project -
          Path Parameters
          Request Body required
            *Example:* `my-resource`"}}> *Example:* `compute/instance`"}}> *Example:* `user:92f69c3a-334b-4f25-90b8-4d4f3be6b825`","title":"format namespace:uuid or just uuid for user"}}>
          +
          Path Parameters
          Request Body required
            *Example:* `my-resource`"}}> *Example:* `compute/instance`"}}> *Example:* `user:92f69c3a-334b-4f25-90b8-4d4f3be6b825`","title":"format namespace:uuid or just uuid for user"}}>
          A successful response. @@ -431,7 +431,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-project.api.mdx b/docs/docs/apis/shield-service-update-project.api.mdx index 6c29befc3..0d414fde1 100644 --- a/docs/docs/apis/shield-service-update-project.api.mdx +++ b/docs/docs/apis/shield-service-update-project.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-project +id: frontier-service-update-project title: "Update project" description: "Updates a project by ID" sidebar_label: "Update project" @@ -8,7 +8,7 @@ hide_table_of_contents: true api: { "description": "Updates a project by ID", - "operationId": "ShieldService_UpdateProject", + "operationId": "FrontierService_UpdateProject", "responses": { "200": @@ -176,7 +176,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -258,12 +258,12 @@ api: "name": { "type": "string", - "description": "The name of the project. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
          *Example:* `shield-playground`", + "description": "The name of the project. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
          *Example:* `frontier-playground`", }, "title": { "type": "string", - "description": "The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
          *Example:* `Shield Playground`", + "description": "The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
          *Example:* `Frontier Playground`", }, "metadata": { @@ -314,8 +314,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -326,7 +326,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -366,7 +366,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -383,7 +383,7 @@ import TabItem from "@theme/TabItem"; Updates a project by ID -
          Path Parameters
          Request Body required
            *Example:* `shield-playground`"}}> *Example:* `Shield Playground`"}}>
          +
          Path Parameters
          Request Body required
            *Example:* `frontier-playground`"}}> *Example:* `Frontier Playground`"}}>
          A successful response. @@ -405,7 +405,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/shield-service-update-user.api.mdx b/docs/docs/apis/shield-service-update-user.api.mdx index b5174c956..38700cea9 100644 --- a/docs/docs/apis/shield-service-update-user.api.mdx +++ b/docs/docs/apis/shield-service-update-user.api.mdx @@ -1,5 +1,5 @@ --- -id: shield-service-update-user +id: frontier-service-update-user title: "Update user" description: "Update user" sidebar_label: "Update user" @@ -7,7 +7,7 @@ hide_title: true hide_table_of_contents: true api: { - "operationId": "ShieldService_UpdateUser", + "operationId": "FrontierService_UpdateUser", "responses": { "200": @@ -187,7 +187,7 @@ api: }, "500": { - "description": "Internal Server Error. Returned when theres is something wrong with Shield server.", + "description": "Internal Server Error. Returned when theres is something wrong with Frontier server.", "content": { "application/json": @@ -269,12 +269,12 @@ api: "name": { "type": "string", - "description": "The name of the user. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Shield automatically generates a name from the user email. ", + "description": "The name of the user. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Frontier automatically generates a name from the user email. ", }, "email": { "type": "string", - "description": 'The email of the user. The email must be unique within the entire Shield instance.
          *Example:*`"john.doe@raystack.org"`', + "description": 'The email of the user. The email must be unique within the entire Frontier instance.
          *Example:*`"john.doe@raystack.org"`', }, "metadata": { @@ -326,8 +326,8 @@ api: }, "info": { - "title": "Shield Administration API", - "description": "The Shield APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Shield APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Shield APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Shield into your existing applications and workflows.", + "title": "Frontier Administration API", + "description": "The Frontier APIs adhere to the OpenAPI specification, also known as Swagger, which provides a standardized approach for designing, documenting, and consuming RESTful APIs. With OpenAPI, you gain a clear understanding of the API endpoints, request/response structures, and authentication mechanisms supported by the Frontier APIs. By leveraging the OpenAPI specification, developers can easily explore and interact with the Frontier APIs using a variety of tools and libraries. The OpenAPI specification enables automatic code generation, interactive API documentation, and seamless integration with API testing frameworks, making it easier than ever to integrate Frontier into your existing applications and workflows.", "version": "0.2.0", "contact": { @@ -338,7 +338,7 @@ api: "license": { "name": "Apache 2.0", - "url": "https://github.com/raystack/shield/blob/main/LICENSE", + "url": "https://github.com/raystack/frontier/blob/main/LICENSE", }, }, "postman": @@ -377,7 +377,7 @@ api: }, } sidebar_class_name: "put api-method" -info_path: apis/shield-administration-api +info_path: apis/frontier-administration-api custom_edit_url: null --- @@ -394,7 +394,7 @@ import TabItem from "@theme/TabItem"; Update user -
          Path Parameters
          Request Body required
            *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
          +
          Path Parameters
          Request Body required
            *Example:*`\"john.doe@raystack.org\"`"}}>*Example:*`{\"label\": {\"key1\": \"value1\"}, \"description\": \"User Description\"}`"}}>*Example:*`\"John Doe\"`"}}>
          A successful response. @@ -416,7 +416,7 @@ Not Found - The requested resource was not found
          Schema
            details object[]
          • Array [
          • ]
          -Internal Server Error. Returned when theres is something wrong with Shield server. +Internal Server Error. Returned when theres is something wrong with Frontier server.
          Schema
            details object[]
          • Array [
          • ]
          diff --git a/docs/docs/apis/sidebar.js b/docs/docs/apis/sidebar.js index 712e13dea..f0158f790 100644 --- a/docs/docs/apis/sidebar.js +++ b/docs/docs/apis/sidebar.js @@ -1 +1 @@ -module.exports = [{"type":"doc","id":"apis/shield-administration-api"},{"type":"category","label":"User","link":{"type":"generated-index","title":"User","slug":"/category/apis/user"},"items":[{"type":"doc","id":"apis/admin-service-list-all-users","label":"List all users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-users","label":"List public users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-user","label":"Create user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-user","label":"Get user","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-user","label":"Delete user","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-user","label":"Update user","className":"api-method put"},{"type":"doc","id":"apis/shield-service-disable-user","label":"Disable user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-enable-user","label":"Enable user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-list-user-groups","label":"List user groups","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-user-invitations","label":"List user invitations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-organizations-by-user","label":"Get user organizations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-projects-by-user","label":"Get user projects","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-current-user","label":"Get current user","className":"api-method get"},{"type":"doc","id":"apis/shield-service-update-current-user","label":"Update current user","className":"api-method put"},{"type":"doc","id":"apis/shield-service-list-current-user-groups","label":"List my groups","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-organizations-by-current-user","label":"Get my organizations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-projects-by-current-user","label":"Get my projects","className":"api-method get"}]},{"type":"category","label":"Group","link":{"type":"generated-index","title":"Group","slug":"/category/apis/group"},"items":[{"type":"doc","id":"apis/admin-service-list-groups","label":"List all groups","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-organization-groups","label":"List organization groups","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-group","label":"Create group","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-group","label":"Get group","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-group","label":"Delete group","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-group","label":"Update group","className":"api-method put"},{"type":"doc","id":"apis/shield-service-disable-group","label":"Disable group","className":"api-method post"},{"type":"doc","id":"apis/shield-service-enable-group","label":"Enable group","className":"api-method post"},{"type":"doc","id":"apis/shield-service-list-group-users","label":"List group users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-add-group-users","label":"Add group user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-remove-group-user","label":"Remove group user","className":"api-method delete"}]},{"type":"category","label":"Organization","link":{"type":"generated-index","title":"Organization","slug":"/category/apis/organization"},"items":[{"type":"doc","id":"apis/admin-service-list-all-organizations","label":"List all organizations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-organizations","label":"List organizations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-organization","label":"Create organization","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-organization","label":"Get organization","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-organization","label":"Delete organization","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-organization","label":"Update organization","className":"api-method put"},{"type":"doc","id":"apis/shield-service-list-organization-admins","label":"List organization admins","className":"api-method get"},{"type":"doc","id":"apis/shield-service-disable-organization","label":"Disable organization","className":"api-method post"},{"type":"doc","id":"apis/shield-service-enable-organization","label":"Enable organization","className":"api-method post"},{"type":"doc","id":"apis/shield-service-list-organization-projects","label":"Get organization projects","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-organization-service-users","label":"List organization service users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-organization-users","label":"List organization users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-add-organization-users","label":"Add organization user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-remove-organization-user","label":"Remove organization user","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-list-organization-invitations","label":"List pending invitations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-organization-invitation","label":"Invite user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-organization-invitation","label":"Get pending invitation","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-organization-invitation","label":"Delete pending invitation","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-accept-organization-invitation","label":"Accept pending invitation","className":"api-method post"}]},{"type":"category","label":"Project","link":{"type":"generated-index","title":"Project","slug":"/category/apis/project"},"items":[{"type":"doc","id":"apis/admin-service-list-projects","label":"List all projects","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-project","label":"Create project","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-project","label":"Get project","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-project","label":"Delete Project","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-project","label":"Update project","className":"api-method put"},{"type":"doc","id":"apis/shield-service-list-project-admins","label":"List project admins","className":"api-method get"},{"type":"doc","id":"apis/shield-service-disable-project","label":"Disable project","className":"api-method post"},{"type":"doc","id":"apis/shield-service-enable-project","label":"Enable project","className":"api-method post"},{"type":"doc","id":"apis/shield-service-list-project-users","label":"List project users","className":"api-method get"}]},{"type":"category","label":"Relation","link":{"type":"generated-index","title":"Relation","slug":"/category/apis/relation"},"items":[{"type":"doc","id":"apis/admin-service-list-relations","label":"List all relations","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-relation","label":"Create relation","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-relation","label":"Get relation","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-relation","label":"Delete relation","className":"api-method delete"}]},{"type":"category","label":"Resource","link":{"type":"generated-index","title":"Resource","slug":"/category/apis/resource"},"items":[{"type":"doc","id":"apis/admin-service-list-resources","label":"List all resources","className":"api-method get"},{"type":"doc","id":"apis/shield-service-list-project-resources","label":"Get all resources","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-project-resource","label":"Create resource","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-project-resource","label":"Get resource","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-project-resource","label":"Delete resource","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-project-resource","label":"Update resource","className":"api-method put"}]},{"type":"category","label":"Policy","link":{"type":"generated-index","title":"Policy","slug":"/category/apis/policy"},"items":[{"type":"doc","id":"apis/admin-service-list-policies","label":"List all policies","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-policy","label":"Create policy","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-policy","label":"Get policy","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-policy","label":"Delete Policy","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-policy","label":"Update policy","className":"api-method put"}]},{"type":"category","label":"Role","link":{"type":"generated-index","title":"Role","slug":"/category/apis/role"},"items":[{"type":"doc","id":"apis/shield-service-list-organization-roles","label":"List organization roles","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-organization-role","label":"Create organization role","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-organization-role","label":"Get organization role","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-organization-role","label":"Delete organization role","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-organization-role","label":"Update organization role","className":"api-method put"},{"type":"doc","id":"apis/shield-service-list-roles","label":"List platform roles","className":"api-method get"},{"type":"doc","id":"apis/admin-service-create-role","label":"Create platform role","className":"api-method post"},{"type":"doc","id":"apis/admin-service-delete-role","label":"Delete platform role","className":"api-method delete"}]},{"type":"category","label":"Permission","link":{"type":"generated-index","title":"Permission","slug":"/category/apis/permission"},"items":[{"type":"doc","id":"apis/shield-service-list-permissions","label":"Get all permissions","className":"api-method get"},{"type":"doc","id":"apis/admin-service-create-permission","label":"Create platform permission","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-permission","label":"Get permission","className":"api-method get"},{"type":"doc","id":"apis/admin-service-delete-permission","label":"Delete platform permission","className":"api-method delete"},{"type":"doc","id":"apis/admin-service-update-permission","label":"Update platform permission","className":"api-method put"}]},{"type":"category","label":"Authz","link":{"type":"generated-index","title":"Authz","slug":"/category/apis/authz"},"items":[{"type":"doc","id":"apis/shield-service-get-jw-ks-2","label":"Get well known JWKs","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-jw-ks","label":"Get well known JWKs","className":"api-method get"},{"type":"doc","id":"apis/shield-service-check-resource-permission","label":"Check","className":"api-method post"}]},{"type":"category","label":"Authn","link":{"type":"generated-index","title":"Authn","slug":"/category/apis/authn"},"items":[{"type":"doc","id":"apis/shield-service-list-auth-strategies","label":"List authentication strategies","className":"api-method get"},{"type":"doc","id":"apis/shield-service-auth-callback","label":"Callback from a strategy","className":"api-method get"},{"type":"doc","id":"apis/shield-service-auth-callback-2","label":"Callback from a strategy","className":"api-method post"},{"type":"doc","id":"apis/shield-service-auth-logout","label":"Logout from a strategy","className":"api-method get"},{"type":"doc","id":"apis/shield-service-auth-logout-2","label":"Logout from a strategy","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-authenticate","label":"Authenticate with a strategy","className":"api-method get"},{"type":"doc","id":"apis/shield-service-authenticate-2","label":"Authenticate with a strategy","className":"api-method post"},{"type":"doc","id":"apis/shield-service-auth-token","label":"Generate access token by given credentials","className":"api-method post"}]},{"type":"category","label":"MetaSchema","link":{"type":"generated-index","title":"MetaSchema","slug":"/category/apis/meta-schema"},"items":[{"type":"doc","id":"apis/shield-service-list-meta-schemas","label":"List metaschemas","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-meta-schema","label":"Create metaschema","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-meta-schema","label":"Get metaschema","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-meta-schema","label":"Delete metaschema","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-update-meta-schema","label":"Update metaschema","className":"api-method put"}]},{"type":"category","label":"Namespace","link":{"type":"generated-index","title":"Namespace","slug":"/category/apis/namespace"},"items":[{"type":"doc","id":"apis/shield-service-list-namespaces","label":"Get all namespaces","className":"api-method get"},{"type":"doc","id":"apis/shield-service-get-namespace","label":"Get namespace","className":"api-method get"}]},{"type":"category","label":"AuditLog","link":{"type":"generated-index","title":"AuditLog","slug":"/category/apis/audit-log"},"items":[{"type":"doc","id":"apis/shield-service-list-organization-audit-logs","label":"List audit logs","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-organization-audit-logs","label":"Create audit log","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-organization-audit-log","label":"Get audit log","className":"api-method get"}]},{"type":"category","label":"ServiceUser","link":{"type":"generated-index","title":"ServiceUser","slug":"/category/apis/service-user"},"items":[{"type":"doc","id":"apis/shield-service-list-service-users","label":"List org service users","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-service-user","label":"Create service user","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-service-user","label":"Get service user","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-service-user","label":"Delete service user","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-list-service-user-keys","label":"List service user keys","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-service-user-key","label":"Create service user key","className":"api-method post"},{"type":"doc","id":"apis/shield-service-get-service-user-key","label":"Get service user key","className":"api-method get"},{"type":"doc","id":"apis/shield-service-delete-service-user-key","label":"Delete service user key","className":"api-method delete"},{"type":"doc","id":"apis/shield-service-list-service-user-secrets","label":"List service user secrets","className":"api-method get"},{"type":"doc","id":"apis/shield-service-create-service-user-secret","label":"Create service user secret","className":"api-method post"},{"type":"doc","id":"apis/shield-service-delete-service-user-secret","label":"Delete service user secret","className":"api-method delete"}]}]; \ No newline at end of file +module.exports = [{"type":"doc","id":"apis/frontier-administration-api"},{"type":"category","label":"User","link":{"type":"generated-index","title":"User","slug":"/category/apis/user"},"items":[{"type":"doc","id":"apis/admin-service-list-all-users","label":"List all users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-users","label":"List public users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-user","label":"Create user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-user","label":"Get user","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-user","label":"Delete user","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-user","label":"Update user","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-disable-user","label":"Disable user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-enable-user","label":"Enable user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-list-user-groups","label":"List user groups","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-user-invitations","label":"List user invitations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-organizations-by-user","label":"Get user organizations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-projects-by-user","label":"Get user projects","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-current-user","label":"Get current user","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-update-current-user","label":"Update current user","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-list-current-user-groups","label":"List my groups","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-organizations-by-current-user","label":"Get my organizations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-projects-by-current-user","label":"Get my projects","className":"api-method get"}]},{"type":"category","label":"Group","link":{"type":"generated-index","title":"Group","slug":"/category/apis/group"},"items":[{"type":"doc","id":"apis/admin-service-list-groups","label":"List all groups","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-organization-groups","label":"List organization groups","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-group","label":"Create group","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-group","label":"Get group","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-group","label":"Delete group","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-group","label":"Update group","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-disable-group","label":"Disable group","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-enable-group","label":"Enable group","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-list-group-users","label":"List group users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-add-group-users","label":"Add group user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-remove-group-user","label":"Remove group user","className":"api-method delete"}]},{"type":"category","label":"Organization","link":{"type":"generated-index","title":"Organization","slug":"/category/apis/organization"},"items":[{"type":"doc","id":"apis/admin-service-list-all-organizations","label":"List all organizations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-organizations","label":"List organizations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-organization","label":"Create organization","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-organization","label":"Get organization","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-organization","label":"Delete organization","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-organization","label":"Update organization","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-list-organization-admins","label":"List organization admins","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-disable-organization","label":"Disable organization","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-enable-organization","label":"Enable organization","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-list-organization-projects","label":"Get organization projects","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-organization-service-users","label":"List organization service users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-organization-users","label":"List organization users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-add-organization-users","label":"Add organization user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-remove-organization-user","label":"Remove organization user","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-list-organization-invitations","label":"List pending invitations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-organization-invitation","label":"Invite user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-organization-invitation","label":"Get pending invitation","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-organization-invitation","label":"Delete pending invitation","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-accept-organization-invitation","label":"Accept pending invitation","className":"api-method post"}]},{"type":"category","label":"Project","link":{"type":"generated-index","title":"Project","slug":"/category/apis/project"},"items":[{"type":"doc","id":"apis/admin-service-list-projects","label":"List all projects","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-project","label":"Create project","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-project","label":"Get project","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-project","label":"Delete Project","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-project","label":"Update project","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-list-project-admins","label":"List project admins","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-disable-project","label":"Disable project","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-enable-project","label":"Enable project","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-list-project-users","label":"List project users","className":"api-method get"}]},{"type":"category","label":"Relation","link":{"type":"generated-index","title":"Relation","slug":"/category/apis/relation"},"items":[{"type":"doc","id":"apis/admin-service-list-relations","label":"List all relations","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-relation","label":"Create relation","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-relation","label":"Get relation","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-relation","label":"Delete relation","className":"api-method delete"}]},{"type":"category","label":"Resource","link":{"type":"generated-index","title":"Resource","slug":"/category/apis/resource"},"items":[{"type":"doc","id":"apis/admin-service-list-resources","label":"List all resources","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-list-project-resources","label":"Get all resources","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-project-resource","label":"Create resource","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-project-resource","label":"Get resource","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-project-resource","label":"Delete resource","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-project-resource","label":"Update resource","className":"api-method put"}]},{"type":"category","label":"Policy","link":{"type":"generated-index","title":"Policy","slug":"/category/apis/policy"},"items":[{"type":"doc","id":"apis/admin-service-list-policies","label":"List all policies","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-policy","label":"Create policy","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-policy","label":"Get policy","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-policy","label":"Delete Policy","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-policy","label":"Update policy","className":"api-method put"}]},{"type":"category","label":"Role","link":{"type":"generated-index","title":"Role","slug":"/category/apis/role"},"items":[{"type":"doc","id":"apis/frontier-service-list-organization-roles","label":"List organization roles","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-organization-role","label":"Create organization role","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-organization-role","label":"Get organization role","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-organization-role","label":"Delete organization role","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-organization-role","label":"Update organization role","className":"api-method put"},{"type":"doc","id":"apis/frontier-service-list-roles","label":"List platform roles","className":"api-method get"},{"type":"doc","id":"apis/admin-service-create-role","label":"Create platform role","className":"api-method post"},{"type":"doc","id":"apis/admin-service-delete-role","label":"Delete platform role","className":"api-method delete"}]},{"type":"category","label":"Permission","link":{"type":"generated-index","title":"Permission","slug":"/category/apis/permission"},"items":[{"type":"doc","id":"apis/frontier-service-list-permissions","label":"Get all permissions","className":"api-method get"},{"type":"doc","id":"apis/admin-service-create-permission","label":"Create platform permission","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-permission","label":"Get permission","className":"api-method get"},{"type":"doc","id":"apis/admin-service-delete-permission","label":"Delete platform permission","className":"api-method delete"},{"type":"doc","id":"apis/admin-service-update-permission","label":"Update platform permission","className":"api-method put"}]},{"type":"category","label":"Authz","link":{"type":"generated-index","title":"Authz","slug":"/category/apis/authz"},"items":[{"type":"doc","id":"apis/frontier-service-get-jw-ks-2","label":"Get well known JWKs","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-jw-ks","label":"Get well known JWKs","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-check-resource-permission","label":"Check","className":"api-method post"}]},{"type":"category","label":"Authn","link":{"type":"generated-index","title":"Authn","slug":"/category/apis/authn"},"items":[{"type":"doc","id":"apis/frontier-service-list-auth-strategies","label":"List authentication strategies","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-auth-callback","label":"Callback from a strategy","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-auth-callback-2","label":"Callback from a strategy","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-auth-logout","label":"Logout from a strategy","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-auth-logout-2","label":"Logout from a strategy","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-authenticate","label":"Authenticate with a strategy","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-authenticate-2","label":"Authenticate with a strategy","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-auth-token","label":"Generate access token by given credentials","className":"api-method post"}]},{"type":"category","label":"MetaSchema","link":{"type":"generated-index","title":"MetaSchema","slug":"/category/apis/meta-schema"},"items":[{"type":"doc","id":"apis/frontier-service-list-meta-schemas","label":"List metaschemas","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-meta-schema","label":"Create metaschema","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-meta-schema","label":"Get metaschema","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-meta-schema","label":"Delete metaschema","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-update-meta-schema","label":"Update metaschema","className":"api-method put"}]},{"type":"category","label":"Namespace","link":{"type":"generated-index","title":"Namespace","slug":"/category/apis/namespace"},"items":[{"type":"doc","id":"apis/frontier-service-list-namespaces","label":"Get all namespaces","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-get-namespace","label":"Get namespace","className":"api-method get"}]},{"type":"category","label":"AuditLog","link":{"type":"generated-index","title":"AuditLog","slug":"/category/apis/audit-log"},"items":[{"type":"doc","id":"apis/frontier-service-list-organization-audit-logs","label":"List audit logs","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-organization-audit-logs","label":"Create audit log","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-organization-audit-log","label":"Get audit log","className":"api-method get"}]},{"type":"category","label":"ServiceUser","link":{"type":"generated-index","title":"ServiceUser","slug":"/category/apis/service-user"},"items":[{"type":"doc","id":"apis/frontier-service-list-service-users","label":"List org service users","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-service-user","label":"Create service user","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-service-user","label":"Get service user","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-service-user","label":"Delete service user","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-list-service-user-keys","label":"List service user keys","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-service-user-key","label":"Create service user key","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-get-service-user-key","label":"Get service user key","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-delete-service-user-key","label":"Delete service user key","className":"api-method delete"},{"type":"doc","id":"apis/frontier-service-list-service-user-secrets","label":"List service user secrets","className":"api-method get"},{"type":"doc","id":"apis/frontier-service-create-service-user-secret","label":"Create service user secret","className":"api-method post"},{"type":"doc","id":"apis/frontier-service-delete-service-user-secret","label":"Delete service user secret","className":"api-method delete"}]}]; \ No newline at end of file diff --git a/docs/docs/authn/introduction.md b/docs/docs/authn/introduction.md index b8e57b5f4..a9dc27ae1 100644 --- a/docs/docs/authn/introduction.md +++ b/docs/docs/authn/introduction.md @@ -1,39 +1,40 @@ --- title: Overview --- + import Mermaid from '@theme/Mermaid'; # Overview -Authentication is the process of verifying the identity of a user. This is done by checking the user's credentials +Authentication is the process of verifying the identity of a user. This is done by checking the user's credentials against a database of verified users. The database is populated with user credentials during the registration process. -If the credentials are valid, the user is granted access to the system. In some cases, the user's credentials are -stored directly in the database like passwords, api keys. In other cases, the user's identity is verified by a third -party like Google, Facebook. In this case, the user's credentials are stored in the third party's database and the +If the credentials are valid, the user is granted access to the system. In some cases, the user's credentials are +stored directly in the database like passwords, api keys. In other cases, the user's identity is verified by a third +party like Google, Facebook. In this case, the user's credentials are stored in the third party's database and the user is redirected to the third party's login page to verify their identity. -Shield is an opinionated authentication server that provides a set of tools to help you implement authentication in +Frontier is an opinionated authentication server that provides a set of tools to help you implement authentication in your application. It provides a couple of authentication strategies out of the box that you need to configure to start using. What strategy you choose depends on your application's interface and the type of credentials you want to use. :::note A user is always authenticated to prove its identity before it can be authorized to access a -resource. This is why authentication is always the first step in the process of accessing a resource. +resource. This is why authentication is always the first step in the process of accessing a resource. ::: Authentication can be done by a human user or machine service user. ## User Authentication -For human users, Shield provides a couple of authentication strategies: +For human users, Frontier provides a couple of authentication strategies: 1. **Social login** - user's identity is verified by a third party like Google. 2. **Email one time password(OTP)** - user's identity is verified by sending a one time password to the user's email address. -Identity verification is the first step, but after it is verified, the system needs to remember that the human user is -authenticated to avoid having to authenticate again for every request. HTTP is a stateless protocol, one way to do this -over HTTP is to use cookies. Cookies are stored in the user's browser and sent with every request to the server. -The server can then use the cookie to identify the user and verify if the session created using the cookie is -still valid. If it is, the user no longer needs to authenticate again. This is how most web applications work. +Identity verification is the first step, but after it is verified, the system needs to remember that the human user is +authenticated to avoid having to authenticate again for every request. HTTP is a stateless protocol, one way to do this +over HTTP is to use cookies. Cookies are stored in the user's browser and sent with every request to the server. +The server can then use the cookie to identify the user and verify if the session created using the cookie is +still valid. If it is, the user no longer needs to authenticate again. This is how most web applications work. On high level here are some of the steps involved in the authentication process when working with a web application: @@ -72,35 +73,35 @@ On high level here are some of the steps involved in the authentication process
          -Detailed Authentication Flow: +Detailed Authentication Flow: 1. A user sends a request to access a resource. The resource can be a web page, an API endpoint, a file, etc. 2. The request can either be intercepted by the authentication server or the frontend application can proxy the request - to the authentication server. + to the authentication server. 3. The authentication server checks if the user is authenticated by checking if the request contains a valid cookie. 4. If the user is not authenticated, the authentication server or the frontend redirects the user to the login page. -5. Login page can either contain a form to enter the user's credentials or a button to redirect the user to a third +5. Login page can either contain a form to enter the user's credentials or a button to redirect the user to a third party login page. 6. One the authentication flow is finished, the authentication server verifies the user's credentials. 7. After verification, if the user is accessing the authentication server for the first time a new user is created else - the existing user is retrieved from the database. + the existing user is retrieved from the database. 8. Finally, the authentication server redirects the user to the resource. (or the next step for validating authorization -can start) + can start) ## Service User Authentication For machine service users, the authentication process is little different as the http requests won't be coming from a web browser. Instead, the requests will be coming from a service like a external backup service or an SDK. In this case, the -service needs to send the service user's credentials with every request. This is done by sending the credentials in +service needs to send the service user's credentials with every request. This is done by sending the credentials in the request headers. The authentication server then verifies the credentials to check if the service user is authenticated. If the credentials are valid, the resource grants access to the service user. -Shield provides a couple of authentication strategies for service users: +Frontier provides a couple of authentication strategies for service users: 1. **Client ID/Secret** - service user's identity is verified by checking if the client id and secret are valid. Also known as client credentials grant or API grant. 2. **Private/Public Key JWT** - identity is verified by checking if the token sent in the headers is created and signed by a -private key that matches the public key stored in the database. Also known as JWT grant. + private key that matches the public key stored in the database. Also known as JWT grant. -Shield can also return a token that the service can use to access the resource instead of using their credentials on +Frontier can also return a token that the service can use to access the resource instead of using their credentials on every request. This token is called a bearer access token. The service then sends the access token with every request to the resource. Use of access token is optional, and it is short-lived. diff --git a/docs/docs/authn/serviceuser.md b/docs/docs/authn/serviceuser.md index 030d2da5e..b7fd949cf 100644 --- a/docs/docs/authn/serviceuser.md +++ b/docs/docs/authn/serviceuser.md @@ -1,13 +1,14 @@ --- title: Service User --- + import Tabs from '@theme/Tabs'; import TabItem from '@theme/TabItem'; import CodeBlock from '@theme/CodeBlock'; # Service User Authentication -Service User authentication is used to authenticate a service to another service where a human is not actively +Service User authentication is used to authenticate a service to another service where a human is not actively involved in the authentication process. For example, an external service is authenticating to a backend service. Before the authentication is started for a service user, a service user should exist in an organization. A service user can have multiple credentials. For example, a service user can have a client id/secret and a public/private key @@ -28,7 +29,7 @@ Once a service user is created, a client id and secret can be generated for the The response of this request will contain an `id` and `secret` field. The secret field is never persisted in the database and is only returned once. If you lose the secret, you will have to generate a new one. -To authenticate a service user, you need to pass the client id and secret in the **Authorization ** header first to +To authenticate a service user, you need to pass the client id and secret in the **Authorization ** header first to request an access token as follows: @@ -71,6 +72,7 @@ Once a service user is created, a public/private key pair can be generated for t The response of this request will be as follows: + ```protobuf message KeyCredential { string type = 1; @@ -82,35 +84,35 @@ message KeyCredential { } ``` -The private key is never persisted in the database and is only returned once. If you lose the private key, +The private key is never persisted in the database and is only returned once. If you lose the private key, you will have to generate a new one. The public key can be retrieved using the following API: - - - {`$ curl --location --request GET 'http://localhost:7400/v1beta1/serviceusers/{id}/keys/{kid}' + + +{`$ curl --location --request GET 'http://localhost:7400/v1beta1/serviceusers/{id}/keys/{kid}' --header 'Accept: application/json'`} - - + + To authenticate a request, you need to generate a JWT using the private key. There are various libraries that can use a PEM file and generate a JWT. The `private_key` is in PEM format of the KeyCredential message. One example -of generating a JWT using the private key can be found in the -[shield-go](https://github.com/raystack/shield-go/blob/01b6fc925b355e69d79fcde66e1f6bb5bfd475ab/pkg/serviceuser.go) SDK. +of generating a JWT using the private key can be found in the +[frontier-go](https://github.com/raystack/frontier-go/blob/01b6fc925b355e69d79fcde66e1f6bb5bfd475ab/pkg/serviceuser.go) SDK. ```go package pkg import ( "github.com/lestrrat-go/jwx/v2/jwk" - "github.com/raystack/shield/pkg/utils" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + "github.com/raystack/frontier/pkg/utils" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "time" ) type ServiceUserTokenGenerator func() ([]byte, error) -func GetServiceUserTokenGenerator(credential *shieldv1beta1.KeyCredential) (ServiceUserTokenGenerator, error) { +func GetServiceUserTokenGenerator(credential *frontierv1beta1.KeyCredential) (ServiceUserTokenGenerator, error) { // generate a token out of key rsaKey, err := jwk.ParseKey([]byte(credential.GetPrivateKey()), jwk.WithPEM(true)) if err != nil { @@ -120,17 +122,18 @@ func GetServiceUserTokenGenerator(credential *shieldv1beta1.KeyCredential) (Serv return nil, err } return func() ([]byte, error) { - return utils.BuildToken(rsaKey, "//shield-go-sdk", credential.GetPrincipalId(), time.Hour*12, nil) + return utils.BuildToken(rsaKey, "//frontier-go-sdk", credential.GetPrincipalId(), time.Hour*12, nil) }, nil } ``` To identify your key, it is necessary that you provide a JWT with a kid header claim representing your key id from the `KeyCredential`: + ```json { -"alg": "RS256", -"kid": "c029a17d-0bad-472c-b335-ed58ba370d84" + "alg": "RS256", + "kid": "c029a17d-0bad-472c-b335-ed58ba370d84" } ``` @@ -147,11 +150,12 @@ The generated JWT needs to be exchanged to get an access token. It can be reques -Response of this request will contain a `access_token` that can be used to authenticate the service user. +Response of this request will contain a `access_token` that can be used to authenticate the service user. + ```json { - "access_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6IjE2ODAyMzgyNDQyOTQiLCJ0eXAiOiJKV1QifQ.eyJleHAiOjE2OTA4NzI0NjcsImdlbiI6InN5c3RlbSIsImlhdCI6MTY4ODI4MDQ2NywiaXNzIjoiaHR0cDovL2xvY2FsaG9zdC5zaGllbGQiLCJqdGkiOiI0ZjJiNWNlMS00MGFjLTQ4ZWMtOTM0OC0xN2RhODM1NjZmNTYiLCJraWQiOiIxNjgwMjM4MjQ0Mjk0IiwibmJmIjoxNjg4MjgwNDY3LCJvcmdzIjoiIiwic3ViIjoiMTEyODc5NmUtNmM2ZS00ZTM5LTljMjgtOWM5ZWI0NjEwMjc2In0.rDkU6WjrqlLuyQv4Vvyk-iP55C-CodnGIhk2rvR8MasV2byffdu6tRs0koTOv_SCn78bXfDxiW9vilqXeSNWBULFKixUO6095ON2ZNuQrZSVFWD9xqDrNj6wxTNRiR8g6nKJOOqFogQV7qI92-JfBguIZGPhrZbgKHYbseN2FL3ZHs1Zyi_NYh5FaMS9bIEuwGil4B_yMas10dstCVw4aSzFqsXWjPBFMSqRvRcQpOlGXo0TZWtkndiakQ3Ox2PLDRnrdlAzpTlB8kkZ5uwEjNSFgjk_fccSosNtUeuSLJ-uiT52SoujAq-yft2iOL-_tJudpS3Dsm-SODmBg1HSBw", - "token_type": "Bearer" + "access_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6IjE2ODAyMzgyNDQyOTQiLCJ0eXAiOiJKV1QifQ.eyJleHAiOjE2OTA4NzI0NjcsImdlbiI6InN5c3RlbSIsImlhdCI6MTY4ODI4MDQ2NywiaXNzIjoiaHR0cDovL2xvY2FsaG9zdC5zaGllbGQiLCJqdGkiOiI0ZjJiNWNlMS00MGFjLTQ4ZWMtOTM0OC0xN2RhODM1NjZmNTYiLCJraWQiOiIxNjgwMjM4MjQ0Mjk0IiwibmJmIjoxNjg4MjgwNDY3LCJvcmdzIjoiIiwic3ViIjoiMTEyODc5NmUtNmM2ZS00ZTM5LTljMjgtOWM5ZWI0NjEwMjc2In0.rDkU6WjrqlLuyQv4Vvyk-iP55C-CodnGIhk2rvR8MasV2byffdu6tRs0koTOv_SCn78bXfDxiW9vilqXeSNWBULFKixUO6095ON2ZNuQrZSVFWD9xqDrNj6wxTNRiR8g6nKJOOqFogQV7qI92-JfBguIZGPhrZbgKHYbseN2FL3ZHs1Zyi_NYh5FaMS9bIEuwGil4B_yMas10dstCVw4aSzFqsXWjPBFMSqRvRcQpOlGXo0TZWtkndiakQ3Ox2PLDRnrdlAzpTlB8kkZ5uwEjNSFgjk_fccSosNtUeuSLJ-uiT52SoujAq-yft2iOL-_tJudpS3Dsm-SODmBg1HSBw", + "token_type": "Bearer" } ``` @@ -169,8 +173,8 @@ The token can be used in the **Authorization** header same as the client id/secr ## Access token -As we already mentioned, the access token is a JWT that is generated by the shield server. Whoever has the access token -can access the resources of the service user. Access token is used to avoid supporting multiple authentication mechanisms -in various part of the infrastructure to verify the request. It can be passed along the request in services behind the shield server -and all of them only need to validate it using shield server's public key. Access token endpoint is available -at `/v1beta1/auth/token`. \ No newline at end of file +As we already mentioned, the access token is a JWT that is generated by the frontier server. Whoever has the access token +can access the resources of the service user. Access token is used to avoid supporting multiple authentication mechanisms +in various part of the infrastructure to verify the request. It can be passed along the request in services behind the frontier server +and all of them only need to validate it using frontier server's public key. Access token endpoint is available +at `/v1beta1/auth/token`. diff --git a/docs/docs/authn/user.md b/docs/docs/authn/user.md index 4f91791fb..160553953 100644 --- a/docs/docs/authn/user.md +++ b/docs/docs/authn/user.md @@ -1,6 +1,7 @@ --- title: User --- + import Tabs from '@theme/Tabs'; import TabItem from '@theme/TabItem'; import CodeBlock from '@theme/CodeBlock'; @@ -8,9 +9,9 @@ import CodeBlock from '@theme/CodeBlock'; # User Authentication To integration User authentication with a frontend application, you need to configure either of the supported strategies -in Shield. Shield is a multi-tenant authentication server, so you can configure multiple strategies and use them in +in Frontier. Frontier is a multi-tenant authentication server, so you can configure multiple strategies and use them in different applications. Each tenant has its own organization and each organization can have its own set of allowed -authentication strategies. For now, if a strategy is enabled in Shield configuration, it is available to all the +authentication strategies. For now, if a strategy is enabled in Frontier configuration, it is available to all the organizations. ![user_auth_supported_strategy.png](user_auth_supported_strategy.png) @@ -38,33 +39,33 @@ Get the client id and client secret from the third party provider and configure ![user_auth_google_oidc.png](user_auth_google_oidc.png) -To get OIDC configuration for Google, you can visit the following URL https://console.developers.google.com/ and -create a new project. You’ll also need to create OAuth 2.0 credentials for the project since Google does not do that -by default. From the sidebar, click the **Credentials** tab, then click **Create credentials** and choose -**OAuth client ID** from the dropdown. +To get OIDC configuration for Google, you can visit the following URL https://console.developers.google.com/ and +create a new project. You’ll also need to create OAuth 2.0 credentials for the project since Google does not do that +by default. From the sidebar, click the **Credentials** tab, then click **Create credentials** and choose +**OAuth client ID** from the dropdown. Make sure you select the application type as **Web application**. Along with basic information about the application it will also ask you for the **Authorized redirect URIs**. You need to specify -the external URL of your Shield server with the path `/v1beta1/auth/callback`. For example, if your Shield server is -running at `https://shield.example.com`, then the redirect URI will be `https://shield.example.com/v1beta1/auth/callback`. -Or if shield server is running behind a proxy server, you need to specify the external URL of the proxy server which will -then forward the request to Shield server at `/v1beta1/auth/callback`. +the external URL of your Frontier server with the path `/v1beta1/auth/callback`. For example, if your Frontier server is +running at `https://frontier.example.com`, then the redirect URI will be `https://frontier.example.com/v1beta1/auth/callback`. +Or if frontier server is running behind a proxy server, you need to specify the external URL of the proxy server which will +then forward the request to Frontier server at `/v1beta1/auth/callback`. -This callback url is used by the third party provider to redirect the user back to the Shield server after successful -authentication. Same config needs to be specified in the `oidc_callback_host` field of the `config.yaml` file. +This callback url is used by the third party provider to redirect the user back to the Frontier server after successful +authentication. Same config needs to be specified in the `oidc_callback_host` field of the `config.yaml` file. `oidc_callback_host` is required to generate the login URL for the third party provider that initiates the authentication flow. ```yaml app: port: 8000 - grpc: + grpc: port: 8001 # cors_origin is origin value from where we want to allow cors cors_origin: http://localhost:3000 - # configuration to allow authentication in shield + # configuration to allow authentication in frontier authentication: - # to use shield as session store + # to use frontier as session store session: # both of them should be 32 chars long # hash helps identify if the value is tempered with @@ -74,12 +75,12 @@ app: # once authenticated, server responds with a jwt with user context # this jwt works as a bearer access token for all APIs token: - # generate key file via "./shield server keygen" + # generate key file via "./frontier server keygen" # if not specified, access tokens will be disabled # example: /opt/rsa rsa_path: "" # issuer claim to be added to the jwt - iss: "http://localhost.shield" + iss: "http://localhost.frontier" # validity of the token validity: "1h" # external host used for oidc redirect uri, e.g. http://localhost:8000/v1beta1/auth/callback @@ -97,25 +98,25 @@ A sample demonstrating the flow can be found in `examples` directory. ::: Sample flow for Google OIDC is as follows: -1. User goes to login page in the frontend application. Frontend application queries Shield server to fetch supported -authentication strategies and then renders the login page with the supported strategies. -2. User clicks on the Google button in the frontend application. Frontend application requests Shield server to generate -a login URL for Google. - +1. User goes to login page in the frontend application. Frontend application queries Frontier server to fetch supported + authentication strategies and then renders the login page with the supported strategies. +2. User clicks on the Google button in the frontend application. Frontend application requests Frontier server to generate + a login URL for Google. + {`$ curl --location 'http://localhost:7400/v1beta1/auth/register/google' - --header 'Accept: application/json'`} +--header 'Accept: application/json'`} - -3. Response from Shield contain the endpoint URL using which frontend application redirects the user to Google's -login page. -4. Once user is logged in to google, Google redirects the user back to the frontend application -with an authorization code. -5. Frontend application sends the authorization code to Shield server. Shield server verifies the code with Google and -register's a new user if this is the first time user is logging in. -6. Shield server then creates a session and return the session details in cookies of the response headers. + +3. Response from Frontier contain the endpoint URL using which frontend application redirects the user to Google's + login page. +4. Once user is logged in to google, Google redirects the user back to the frontend application + with an authorization code. +5. Frontend application sends the authorization code to Frontier server. Frontier server verifies the code with Google and + register's a new user if this is the first time user is logging in. +6. Frontier server then creates a session and return the session details in cookies of the response headers. 7. Frontend application then redirects the user to the home page and browser saves the cookies. 8. Now all subsequent requests from the frontend application will have the cookies in the request headers. @@ -126,13 +127,13 @@ To use email OTP, you need to configure the SMTP server details in the `config.y ```yaml app: port: 8000 - grpc: + grpc: port: 8001 # cors_origin is origin value from where we want to allow cors cors_origin: http://localhost:3000 - # configuration to allow authentication in shield + # configuration to allow authentication in frontier authentication: - # to use shield as session store + # to use frontier as session store session: # both of them should be 32 chars long # hash helps identify if the value is tempered with @@ -142,16 +143,16 @@ app: # once authenticated, server responds with a jwt with user context # this jwt works as a bearer access token for all APIs token: - # generate key file via "./shield server keygen" + # generate key file via "./frontier server keygen" # if not specified, access tokens will be disabled # example: /opt/rsa rsa_path: "" # issuer claim to be added to the jwt - iss: "http://localhost.shield" + iss: "http://localhost.frontier" # validity of the token validity: "1h" mail_otp: - subject: "Shield - Login Link" + subject: "Frontier - Login Link" # body is a go template with `Otp` as a variable body: "Please copy/paste the OneTimePassword in login form.

          {{.Otp}}

          This code will expire in 10 minutes." validity: "10m" @@ -165,35 +166,36 @@ app: headers: from: "username@acme.org" ``` + :::note -A sample demonstrating the flow can be found in `examples` directory. +A sample demonstrating the flow can be found in `examples` directory. ::: Sample flow for email OTP is as follows: -1. User goes to login page in the frontend application. Frontend application queries Shield server to fetch supported -authentication strategies and then renders the login page with the supported strategies. +1. User goes to login page in the frontend application. Frontend application queries Frontier server to fetch supported + authentication strategies and then renders the login page with the supported strategies. 2. User enters the email address and clicks on the Email OTP button in the frontend application. Frontend application -sends the email address to Shield server to start the login flow. - + sends the email address to Frontier server to start the login flow. + {`$ curl --location 'http://localhost:7400/v1beta1/auth/register/mailotp?email=example%40example.com' - --header 'Accept: application/json'`} +--header 'Accept: application/json'`} - -3. Shield server sends an email to the user with an OTP and returns a state in the response. + +3. Frontier server sends an email to the user with an OTP and returns a state in the response. 4. User enters the OTP in the frontend application and clicks on the Verify button. Frontend application sends the OTP -to Shield server to verify the OTP along with the state returned when the flow was created. - + to Frontier server to verify the OTP along with the state returned when the flow was created. + {`$ curl --location 'http://localhost:7400/v1beta1/auth/callback/?code=XXXXXX&state=XXXXXX' - --header 'Accept: application/json'`} +--header 'Accept: application/json'`} - -5. Shield server verifies the OTP and creates a new session. + +5. Frontier server verifies the OTP and creates a new session. ## Request Verification @@ -203,24 +205,24 @@ looks like: ![user_auth_session.png](./user_auth_session_accesstoken.png) 1. User logs in using the frontend application. -2. The frontend application sends a request to the Shield server with the cookies containing session details. -3. Shield server verifies the session and returns a JWT access token. +2. The frontend application sends a request to the Frontier server with the cookies containing session details. +3. Frontier server verifies the session and returns a JWT access token. 4. The frontend application forwards the request to backend microservices with access token. -5. The backend microservices verify the access token using Shield's public keys, if the token is valid, the request is +5. The backend microservices verify the access token using Frontier's public keys, if the token is valid, the request is processed. :::note Access token by default is returned as part of the response header **"x-user-token"** after successful login. This can be -requested again by sending a post request to the Shield server with the cookies containing session details on endpoint +requested again by sending a post request to the Frontier server with the cookies containing session details on endpoint `/v1beta1/auth/token`. ::: -Shield only generates the access token if the RSA keys are configured in the `config.yaml` file. If the RSA keys are not -configured, we can still use Shield as a session store and verify the session in the backend microservices. RSA keys are +Frontier only generates the access token if the RSA keys are configured in the `config.yaml` file. If the RSA keys are not +configured, we can still use Frontier as a session store and verify the session in the backend microservices. RSA keys are configured under `app.authentication.token` section in the `config.yaml` file. :::note -To configure token `rsa_path` you can use shield cli and run `./shield server keygen` command which will generate +To configure token `rsa_path` you can use frontier cli and run `./frontier server keygen` command which will generate 2 RSA keys. ::: @@ -232,11 +234,11 @@ Frontend Manager can also be replaced by a reverse proxy like **Kong**, which wi ![user_auth_session_proxy.png](user_auth_session_proxy.png) -The JSON Web Key Set (JWKS) is a set of keys containing the Shield's public keys used to verify any JSON Web Token (JWT) -using the RS256 signing algorithm. Shield generated access token can be validated using the public key of the RSA key -pair. The public key can be fetched from the Shield server from the endpoint `/.well-known/jwks.json`. +The JSON Web Key Set (JWKS) is a set of keys containing the Frontier's public keys used to verify any JSON Web Token (JWT) +using the RS256 signing algorithm. Frontier generated access token can be validated using the public key of the RSA key +pair. The public key can be fetched from the Frontier server from the endpoint `/.well-known/jwks.json`. :::note The key set can contain more than one key and is uniquely identified by the `kid` field. The JWT contains the `kid` field in the header which is used to identify the key used to sign the JWT. -::: \ No newline at end of file +::: diff --git a/docs/docs/authz/example.md b/docs/docs/authz/example.md index 303c47a1f..a8b53a656 100644 --- a/docs/docs/authz/example.md +++ b/docs/docs/authz/example.md @@ -1,24 +1,25 @@ --- sidebar_label: Example -title: Example of Authorization via Shield +title: Example of Authorization via Frontier --- ## Raystack Store -Let's assume Shield contains a user name **John Doe** who creates an organization called **Raystack Store** with a project called **Financials** inside it. +Let's assume Frontier contains a user name **John Doe** who creates an organization called **Raystack Store** with a project called **Financials** inside it. + +Using the [Create Permissions API](../apis/admin-service-create-permission) a Frontier Admin can create the permissions with the following keys: -Using the [Create Permissions API](../apis/admin-service-create-permission) a Shield Admin can create the permissions with the following keys: 1. **storage.file.get :** Allows retrieving files from storage. 2. **storage.file.delete :** Allows deleting files from storage. 3. **storage.file.post :** Allows posting or uploading files to storage. -And roles for storage service can be created using [Create Roles API](../apis/admin-service-create-role.api.mdx) or [Create Org Roles](../apis/shield-service-create-organization-role). For example, the following roles can be defined: +And roles for storage service can be created using [Create Roles API](../apis/admin-service-create-role.api.mdx) or [Create Org Roles](../apis/frontier-service-create-organization-role). For example, the following roles can be defined: 1. **storage file owner**: Grants full ownership and control over the files. 2. **storage file reader**: Allows reading or accessing files. -Using the [Create Resource API](../apis/shield-service-create-project-resource) John Doe can create a file in the **Financials** project with resource name as **sensitive-info.txt** which contains Raystack Store's previous quarter financial details. +Using the [Create Resource API](../apis/frontier-service-create-project-resource) John Doe can create a file in the **Financials** project with resource name as **sensitive-info.txt** which contains Raystack Store's previous quarter financial details. -Assuming in Shield, there also exists a user named **Jane Doe** who is a member of Raystack Store. In case **John** wants his accountant, **Jane** to get access to this file for verification, he can create a Policy in Shield using [Create Policy API](../apis/shield-service-create-policy.api.mdx) with role of a **`storage file reader`** and providing the resource details **`storage/file:92f69c3a-334b-4f25-90b8-4d4f3be6b825`** in format resource's namespace:uuid. +Assuming in Frontier, there also exists a user named **Jane Doe** who is a member of Raystack Store. In case **John** wants his accountant, **Jane** to get access to this file for verification, he can create a Policy in Frontier using [Create Policy API](../apis/frontier-service-create-policy.api.mdx) with role of a **`storage file reader`** and providing the resource details **`storage/file:92f69c3a-334b-4f25-90b8-4d4f3be6b825`** in format resource's namespace:uuid. To check if Jane has access to the **sensitive-info.txt** file, you can utilize the Check API and verify if the user has read access to the file or not. This check will confirm whether Jane has the necessary permissions to view the contents of the file. diff --git a/docs/docs/authz/overview.md b/docs/docs/authz/overview.md index b5b8e6ec2..96fa6d650 100644 --- a/docs/docs/authz/overview.md +++ b/docs/docs/authz/overview.md @@ -2,31 +2,31 @@ import Mermaid from '@theme/Mermaid'; # Overview -Authorization is the process of determining whether a user is allowed to perform an action. In the context of Shield, authorization is the process of determining whether a user is allowed to perform an action on a resource. This is done after the system has already confirmed that user has proven their identity (authentication). +Authorization is the process of determining whether a user is allowed to perform an action. In the context of Frontier, authorization is the process of determining whether a user is allowed to perform an action on a resource. This is done after the system has already confirmed that user has proven their identity (authentication). -Shield authorization is based on the Role Based Access Control (RBAC) model. In RBAC, access is granted to users based on their roles. A role is a collection of permissions that can be assigned to a user. Permissions determine what actions are allowed on a resource. When a role is assigned to a user, the user is granted all the permissions that the role contains. +Frontier authorization is based on the Role Based Access Control (RBAC) model. In RBAC, access is granted to users based on their roles. A role is a collection of permissions that can be assigned to a user. Permissions determine what actions are allowed on a resource. When a role is assigned to a user, the user is granted all the permissions that the role contains. -In the Shield, several key components and concepts come into play for authorization of user request to access resources. Let's first look into how a normal user request flow with Shield will look like. +In the Frontier, several key components and concepts come into play for authorization of user request to access resources. Let's first look into how a normal user request flow with Frontier will look like. >App: Request Resource - App->>Shield : Authenticate User - Shield->>App: User Authenticated + App->>Frontier : Authenticate User + Frontier->>App: User Authenticated % - Note over Shield,User: Assuming user is authenticated
          Now check if user is authorized to access the resource + Note over Frontier,User: Assuming user is authenticated
          Now check if user is authorized to access the resource alt Case A: User Unauthorized - App->>Shield : Check User is Authorized - Shield ->>SpiceDB: Check API + App->>Frontier : Check User is Authorized + Frontier ->>SpiceDB: Check API SpiceDB->>App: Invalid Permission App-->>User: Return Permission Denied else Case B: User Authorized - App->>Shield : Check User is Authorized - Shield->>SpiceDB: Check API + App->>Frontier : Check User is Authorized + Frontier->>SpiceDB: Check API SpiceDB->>App: Valid Permission App-->>User: Return Resource end`} @@ -44,5 +44,4 @@ Permissions are defined as relationships between Users and resources. A User can The SpiceDB permissions system works by first creating a permissions schema that defines the relationships between Users and resources. The relationships between **resources** and **Users** used for permissions checks are stored within SpiceDB's data store. The schema is then used to create a graph of permissions, where each node in the graph represents a User or resource, and each edge in the graph represents a permission. -When a permission check is performed, SpiceDB traverses the permissions graph to determine whether the User has the required permission to access the resource. - +When a permission check is performed, SpiceDB traverses the permissions graph to determine whether the User has the required permission to access the resource. diff --git a/docs/docs/authz/permission.md b/docs/docs/authz/permission.md index 70754de99..5787ca489 100644 --- a/docs/docs/authz/permission.md +++ b/docs/docs/authz/permission.md @@ -3,28 +3,28 @@ import TabItem from '@theme/TabItem'; # Permissions -Permissions determine what operations are allowed on a resource. In Shield, permissions are represented in the form of `service.resource.verb`, for example, `potato.cart.list`. +Permissions determine what operations are allowed on a resource. In Frontier, permissions are represented in the form of `service.resource.verb`, for example, `potato.cart.list`. Permissions often correspond one-to-one with API methods. That is, each service has an associated set of permissions for each API method that it exposes. The caller of that method needs those permissions to call that method. For example, if you want to create a new project you must have the projecr create permission. You don't grant permissions to users directly. Instead, you identify roles that contain the appropriate permissions, and then grant those roles to the user. -Shield comes with predefined permissions which allow users to perform common operations on IAM resources itself. For example managing organisation, assigning roles to users. +Frontier comes with predefined permissions which allow users to perform common operations on IAM resources itself. For example managing organisation, assigning roles to users. -Permissions in Shield are attached to a logical partition called Namespace. +Permissions in Frontier are attached to a logical partition called Namespace. #### Namespace -A Namespace in Shield is a logical container or partitioning mechanism that helps organize and manage resources and access control policies. It is used to group related entities and define the scope of authorization within a system. With the namespaces we compartmentalize and control access to different parts of the application or system, allowing more granular authorization and improved security. +A Namespace in Frontier is a logical container or partitioning mechanism that helps organize and manage resources and access control policies. It is used to group related entities and define the scope of authorization within a system. With the namespaces we compartmentalize and control access to different parts of the application or system, allowing more granular authorization and improved security. -Each namespace can have its own set of permissions, roles, and access control policies, enabling fine-grained control over who can access what resources within the defined scope. For example, the namespace `app/organization` in Shield contains permissions related to managing organizations. These permissions could include `create` `update` `delete` `get` and so on. +Each namespace can have its own set of permissions, roles, and access control policies, enabling fine-grained control over who can access what resources within the defined scope. For example, the namespace `app/organization` in Frontier contains permissions related to managing organizations. These permissions could include `create` `update` `delete` `get` and so on. ### Predefined Org Permissions -Includes a list of Shield's predefined permissions at the organization level. +Includes a list of Frontier's predefined permissions at the organization level. :::info -Shield allows inheritance of permissions for a hierarchical structure, where higher-level permissions grant access to lower-level entities. In this case, granting permissions at the organization level automatically extends those permissions to the projects, resources, and groups within that org. +Frontier allows inheritance of permissions for a hierarchical structure, where higher-level permissions grant access to lower-level entities. In this case, granting permissions at the organization level automatically extends those permissions to the projects, resources, and groups within that org. ::: | **Permission Name** | **Permission Title** | **Description** | @@ -44,7 +44,7 @@ Shield allows inheritance of permissions for a hierarchical structure, where hig ### Predefined Project Permissions -Includes a list of Shield's predefined permissions at the project level. +Includes a list of Frontier's predefined permissions at the project level. | **Permission Name** | **Permission Title** | **Description** | | -------------------------------- | --------------------------- | --------------------------------------------------------------------------- | @@ -57,7 +57,7 @@ Includes a list of Shield's predefined permissions at the project level. ### Predefined Group Permissions -Contains a list of Shield's predefined permissions at the group level. +Contains a list of Frontier's predefined permissions at the group level. | **Permission Name** | **Permission Title** | **Description** | | ---------------------------- | ---------------------- | -------------------------------------------------------- | @@ -67,19 +67,19 @@ Contains a list of Shield's predefined permissions at the group level. | **_`app.group.get`_** | **`Group Get`** | Allows retrieving or accessing a specific group. | :::note -Permissions in Shield follow a hierarchical structure, where higher-level permissions include the capabilities of lower-level permissions. For example, a higher-level permission like **adminiter** includes all the capabilities of a lower-level permission like **get**. +Permissions in Frontier follow a hierarchical structure, where higher-level permissions include the capabilities of lower-level permissions. For example, a higher-level permission like **adminiter** includes all the capabilities of a lower-level permission like **get**. ::: --- ### Custom Permissions -Shield allow the its platform administrators (Superusers) to create permissions to meet specific authorization requirements beyond the predefined set of permissions. Custom permissions allow for more granular control over access to resources and actions within an application or system. They enable organizations to define and enforce fine-grained access policies tailored to their unique needs. +Frontier allow the its platform administrators (Superusers) to create permissions to meet specific authorization requirements beyond the predefined set of permissions. Custom permissions allow for more granular control over access to resources and actions within an application or system. They enable organizations to define and enforce fine-grained access policies tailored to their unique needs. -When creating custom permissions, administrators typically define the name and scope (namespace) of the permission. The name should be descriptive and indicative of the action or resource it governs. The scope determines where the permission applies, such as the platform(making it available across all the organizations in Shield), organization, project or group. +When creating custom permissions, administrators typically define the name and scope (namespace) of the permission. The name should be descriptive and indicative of the action or resource it governs. The scope determines where the permission applies, such as the platform(making it available across all the organizations in Frontier), organization, project or group. :::note -The permissions can either be created dynamically when the Shield is running, or can either be provided in the server configurations. +The permissions can either be created dynamically when the Frontier is running, or can either be provided in the server configurations. ::: For example, let's say you have an e-commerce application where users can manage their shopping carts. To control access to cart-related actions, you can create custom permissions in the **potato/cart** namespace. @@ -92,10 +92,10 @@ Sample custom permission requirements: | **update** | Cart Update | potato/cart | Allows updating the contents of the shopping cart. | | **get** | Cart Get | potato/cart | Enables retrieving the details of the shopping cart. | -This is how the [resource config file](https://github.com/raystack/shield/blob/7cae6bf86e99fe96650c6dcd4e8207cb916b8184/test/e2e/smoke/testdata/resource/potato.yaml#L4) will look like +This is how the [resource config file](https://github.com/raystack/frontier/blob/7cae6bf86e99fe96650c6dcd4e8207cb916b8184/test/e2e/smoke/testdata/resource/potato.yaml#L4) will look like :::info -While creating permissions, it is important to note that the namespace is appended to the permission name to generate a permission slug. For instance, the **delete** permission name will be appended with namespace **potato/cart**, to generate the final permission slug as **potato_cart_delete** in Shield. This naming convention is used to ensure uniqueness and organization of permissions within Shield. While creating a role, we pass the list of these permission slugs being binded to that role. +While creating permissions, it is important to note that the namespace is appended to the permission name to generate a permission slug. For instance, the **delete** permission name will be appended with namespace **potato/cart**, to generate the final permission slug as **potato_cart_delete** in Frontier. This naming convention is used to ensure uniqueness and organization of permissions within Frontier. While creating a role, we pass the list of these permission slugs being binded to that role. ::: ## Managing Permission diff --git a/docs/docs/authz/policy.md b/docs/docs/authz/policy.md index 9f242a931..9afadc62c 100644 --- a/docs/docs/authz/policy.md +++ b/docs/docs/authz/policy.md @@ -1,16 +1,16 @@ # Policy -Policies define the permissions and access control rules that govern user access to resources within the Shield platform. By configuring policies, you can control and manage the level of access granted to users, groups, or service accounts. +Policies define the permissions and access control rules that govern user access to resources within the Frontier platform. By configuring policies, you can control and manage the level of access granted to users, groups, or service accounts. -A policy in Shield consists of a set of permissions associated with a role. The role determines the actions that a user can perform on specific resources. +A policy in Frontier consists of a set of permissions associated with a role. The role determines the actions that a user can perform on specific resources. ## Policy Usage -Shield internally creates a SpiceDB relation between the Subject(Principal) and Object(Resource, Org, Project, Group) whenever a policy is created in Shield. And when a user tries to access the resource, the Shield looks up SpiceDB to check if a given relation has a specified permission. Thus, whenever a request is made for accessing a resource in Shield, SpiceDB evaluates the defined policies and permissions to determine if the request is authorized. It checks the relationships, roles, and permissions associated with the requested resource and the user making the request. If the conditions specified in the policies are satisfied, access is granted; otherwise, access is denied. +Frontier internally creates a SpiceDB relation between the Subject(Principal) and Object(Resource, Org, Project, Group) whenever a policy is created in Frontier. And when a user tries to access the resource, the Frontier looks up SpiceDB to check if a given relation has a specified permission. Thus, whenever a request is made for accessing a resource in Frontier, SpiceDB evaluates the defined policies and permissions to determine if the request is authorized. It checks the relationships, roles, and permissions associated with the requested resource and the user making the request. If the conditions specified in the policies are satisfied, access is granted; otherwise, access is denied. ### Check API -To check if the current logged in user has the permission to access a particular resource, Shield provides the [Check](../apis/shield-service-check-resource-permission.api.mdx) API. The check API in Shield works with policy for authorization by using the following steps: +To check if the current logged in user has the permission to access a particular resource, Frontier provides the [Check](../apis/frontier-service-check-resource-permission.api.mdx) API. The check API in Frontier works with policy for authorization by using the following steps: 1. The user sends a request to the check API with the following information:
          i. The resource they want to check
          ii. The action they want to perform on the resource @@ -20,7 +20,7 @@ To check if the current logged in user has the permission to access a particular **Getting current user's credentials:** The principal crendentials required to authorize the user is obtained from the current logged in user's **session** (if available). Otherwise, the **client ID and secret** or **access token** from the request headers can also be used to validate the user request to access the resource. -#### Sample Query +#### Sample Query @@ -34,15 +34,15 @@ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/check' \ "permission": "get", "resource": "compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825" }' -``` +``` :::info -The resource field should contain the resource namespace and resource id/name in this format **namespace:uuid** or **namespace:name**.

          Instead of passing complete namespaces for organization and projects, one can also use the aliases of **org**, **organization** or **project** instead of **app/organization** and **app/project**. +The resource field should contain the resource namespace and resource id/name in this format **namespace:uuid** or **namespace:name**.

          Instead of passing complete namespaces for organization and projects, one can also use the aliases of **org**, **organization** or **project** instead of **app/organization** and **app/project**. -Similarly, instead of passing the unique UUID for the organization or project, one can pass the unique organization or project **name** used while creating these resources. +Similarly, instead of passing the unique UUID for the organization or project, one can pass the unique organization or project **name** used while creating these resources. In case the object is not an organization or project, it can be a project resource and one can use format of **namespace:uuid** or **namespace:urn** in the resource field above. -::: \ No newline at end of file +::: diff --git a/docs/docs/authz/role.md b/docs/docs/authz/role.md index 6e4dd3e04..6a8a7bdbe 100644 --- a/docs/docs/authz/role.md +++ b/docs/docs/authz/role.md @@ -3,9 +3,9 @@ import TabItem from '@theme/TabItem'; # Roles -A Role is a collection of permissions in Shield. Roles are typically associated with one or more policies, which specify the permissions granted to the users. When a user is assigned a role, they inherit the permissions defined within that role. This simplifies access management by allowing administrators to assign roles to users rather than individually assigning permissions. +A Role is a collection of permissions in Frontier. Roles are typically associated with one or more policies, which specify the permissions granted to the users. When a user is assigned a role, they inherit the permissions defined within that role. This simplifies access management by allowing administrators to assign roles to users rather than individually assigning permissions. -Roles in Shield is used to implement the [Role based acces control (RBAC)](../concepts/glossary.md#rbac) +Roles in Frontier is used to implement the [Role based acces control (RBAC)](../concepts/glossary.md#rbac) ### Predefined Roles @@ -19,11 +19,11 @@ Roles in Shield is used to implement the [Role based acces control (RBAC)](../co | **app_project_viewer** | app_project_get | Allows retrieving or accessing a specific project. | | **app_group_owner** | app_group_administer | Grants administrative privileges for managing the group. | -Besides this a Shield Superuser can add custom roles at a particular namespace if required. +Besides this a Frontier Superuser can add custom roles at a particular namespace if required. ### Deactivate and Reactivate a role -In Shield, a role can be disabled when it needs to be temporarily or permanently deactivated. Disabling a role restricts users assigned to that role from exercising the permissions associated with it. A role can be disabled due to policy or regulatory compliance violations, temporary suspensions during investigations or disciplinary actions, or security concerns regarding potential compromise or misuse. If there are security concerns surrounding a role, such as suspected compromise or misuse, disabling the role immediately revokes the associated permissions, mitigating potential risks and safeguarding the system and its resources. +In Frontier, a role can be disabled when it needs to be temporarily or permanently deactivated. Disabling a role restricts users assigned to that role from exercising the permissions associated with it. A role can be disabled due to policy or regulatory compliance violations, temporary suspensions during investigations or disciplinary actions, or security concerns regarding potential compromise or misuse. If there are security concerns surrounding a role, such as suspected compromise or misuse, disabling the role immediately revokes the associated permissions, mitigating potential risks and safeguarding the system and its resources. ### Deleting a role @@ -33,21 +33,21 @@ Caution should be exercised when deleting a role, as it cannot be undone. Deleti ### Custom Roles and How to use the roles for access control -In continuation of example from custom permissions in the previous page, let's see how the bird's eye view of how we will create custom roles and attach it to a principal in Shield. +In continuation of example from custom permissions in the previous page, let's see how the bird's eye view of how we will create custom roles and attach it to a principal in Frontier. -To start using Shield Roles, follow these steps: +To start using Frontier Roles, follow these steps: 1. **Define Roles**: Identify the different roles you need in your system. Think about the specific sets of permissions each role should have.

          For example, you might have roles like **CartAdmin**, **CartManager** and **CartUser** each with different levels of access to our e-commerce shopping carts. -2. **Create Custom Permissions**: If the predefined permissions in Shield do not meet your requirements, you can create [custom permissions](permission.md#custom-permissions). Custom permissions allow you to define granular access control tailored to your application's needs. +2. **Create Custom Permissions**: If the predefined permissions in Frontier do not meet your requirements, you can create [custom permissions](permission.md#custom-permissions). Custom permissions allow you to define granular access control tailored to your application's needs. 3. **Assign Permissions to Roles**: Once you have defined the roles and permissions, assign the appropriate permissions to each role. Consider the specific actions and resources each role should have access to.

          For example, **CartManager** will have **potato_cart_update** and **potato_cart_get** permissions from the previous example for managing our e-commerce shopping cart. 4. **Assign Roles to Users or Groups via Policy**: Finally, assign roles to individual users or groups. This determines the access rights and privileges for each user or group in your org. Users inherit the permissions associated with the roles they are assigned. We will read more on this in the next pages. :::note -Shield superusers can create a custom role platform wide which mean this role will be visible in all the organizations in the Shield instance. -Shield also provides flexibility to Org Admins to create a custom role specific to the organization. +Frontier superusers can create a custom role platform wide which mean this role will be visible in all the organizations in the Frontier instance. +Frontier also provides flexibility to Org Admins to create a custom role specific to the organization. ::: --- @@ -60,7 +60,7 @@ Shield also provides flexibility to Org Admins to create a custom role specific | Field | Type | Description | | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **id** | uuid | Unique Role identifier | -| **name** | string | The name of the role. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
          _Example:"app_organization_owner"_ | +| **name** | string | The name of the role. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
          _Example:"app_organization_owner"_ | | **title** | string | The title can contain any UTF-8 character, used to provide a human-readable name for the organization. Can also be left empty.
          _Example: "Organization Owner"_ | | **permissions** | string[] | List of permission slugs to be assigned to the role
          _Example: ["app_organization_administer"]_ | | **metadata** | object | Metadata object for organizations that can hold key value pairs defined in Role Metaschema. The default Role Metaschema contains labels and descripton fields. Update the Organization Metaschema to add more fields.
          _Example:{"labels": {"key": "value"}, "description": "Role description"}_ | @@ -97,7 +97,7 @@ Some of these APIs require special privileges to access these endpoints and to a ### List Organization Roles -To get a list of custom roles created under an organization with their associated permissions. Note the default roles avaliable across the Shield platform and inherited in every organizations wont be displayed with this +To get a list of custom roles created under an organization with their associated permissions. Note the default roles avaliable across the Frontier platform and inherited in every organizations wont be displayed with this 1. Using **`GET /v1beta1/organizations/:orgId/roles`** API. One can also filter with an optional parameter for role status @@ -110,8 +110,8 @@ $ curl -L -X GET 'http://127.0.0.1:7400/v1beta1/organizations/4d726cf5-52f6-46f1 ### List Default Roles (Across Platform) -To get the list of all the predefined roles in Shield use the **`GET /v1beta1/roles`** API. You can additionally filter the results with an optional parameter for role status. -Note: these default roles are avaliable across all the organizations in Shield (platform wide). +To get the list of all the predefined roles in Frontier use the **`GET /v1beta1/roles`** API. You can additionally filter the results with an optional parameter for role status. +Note: these default roles are avaliable across all the organizations in Frontier (platform wide). ```bash $ curl -L -X GET 'http://127.0.0.1:7400/v1beta1/roles?state=enabled' \ diff --git a/docs/docs/concepts/architecture.md b/docs/docs/concepts/architecture.md index 0562ca256..ca08e110e 100644 --- a/docs/docs/concepts/architecture.md +++ b/docs/docs/concepts/architecture.md @@ -1,18 +1,19 @@ # Architecture -Shield is a cloud-native role-based authorization-aware reverse-proxy service that helps you manage the authorization of given resources. In uses [SpiceDB](https://github.com/authzed/spicedb) authorization engine, which is an open source fine-grained permissions database inspired by [Google Zanzibar](https://authzed.com/blog/what-is-zanzibar/). -Shield can be used as a reverse-proxy, intercepting the request between a client and the backend. It offers configurable authorization on each url path. This is handled by **authz middleware**. This is a non-mandatory step, and can be left unprotected as well. +Frontier is a cloud-native role-based authorization-aware reverse-proxy service that helps you manage the authorization of given resources. In uses [SpiceDB](https://github.com/authzed/spicedb) authorization engine, which is an open source fine-grained permissions database inspired by [Google Zanzibar](https://authzed.com/blog/what-is-zanzibar/). -A Resource Creation Hook comes handy when a resource needs to be created or updated in the backed. Shield keeps a record or the resource within it's database in order to check authorization later. The resource creation/updation request goes to the backend and when a successful response is received, the hook creates an instance of it in the database. +Frontier can be used as a reverse-proxy, intercepting the request between a client and the backend. It offers configurable authorization on each url path. This is handled by **authz middleware**. This is a non-mandatory step, and can be left unprotected as well. + +A Resource Creation Hook comes handy when a resource needs to be created or updated in the backed. Frontier keeps a record or the resource within it's database in order to check authorization later. The resource creation/updation request goes to the backend and when a successful response is received, the hook creates an instance of it in the database. We can also configure role assignments to certian user or group on this resource as well during the resource creation. We will talk more with example about the rule configuration in detail, in the guides. -Shield exposes both HTTP and gRPC APIs to manage data. It also proxy APIs to other services. Shield talks to SpiceDB instance to check for authorization. +Frontier exposes both HTTP and gRPC APIs to manage data. It also proxy APIs to other services. Frontier talks to SpiceDB instance to check for authorization. ## Tools and Technologies -Shield is developed with +Frontier is developed with - Golang - Programming language - Docker - container engine to start postgres and cortex to aid development @@ -23,52 +24,52 @@ Shield is developed with ### API Server -Shield server exposes both HTTP and gRPC APIs (via GRPC gateway) to manage users, groups, policies, etc. It also runs a proxy server on different port. +Frontier server exposes both HTTP and gRPC APIs (via GRPC gateway) to manage users, groups, policies, etc. It also runs a proxy server on different port. ### PostgresDB -There are 2 PostgresDB instances. One instance is required for Shield to store all the business logic like user detail, team detail, User's role in the team, etc. +There are 2 PostgresDB instances. One instance is required for Frontier to store all the business logic like user detail, team detail, User's role in the team, etc. Another DB instance is for SpiceDB to store all the data needed for authorization. ### SpiceDB -Shield push all the policies and relationships data to SpiceDB. All this data is needed to make the authorization decision. Shield connects to SpiceDB instance via gRPC. +Frontier push all the policies and relationships data to SpiceDB. All this data is needed to make the authorization decision. Frontier connects to SpiceDB instance via gRPC. -## Overall System Architecture - Shield as an Authorization Service +## Overall System Architecture - Frontier as an Authorization Service -Shield can be used as an authorization service using the `check` API. Currently, we just allow to check permisison over a single resource, i.e. +Frontier can be used as an authorization service using the `check` API. Currently, we just allow to check permisison over a single resource, i.e. `can a USER do an ACTION on this RESOURCE`. -![Overall System Architecture Authorization](./shield-authorization-architecture.png) +![Overall System Architecture Authorization](./frontier-authorization-architecture.png) The API gives a boolean response. You can refer this [guide](../authz/permission.md#managing-permission) for usage information. -## Overall System Architecture - Shield as a Proxy +## Overall System Architecture - Frontier as a Proxy ![Overall System Architecture Proxy](./overall-proxy-architecture.png) -The above diagram shows the system architecture which uses shield as a proxy. +The above diagram shows the system architecture which uses frontier as a proxy. Let's have a look at the major events: - Middleware: Middlewares as their names suggest are engaged befor the request is proxied. -There are a few different middlewares which are `rule-matching`, `prefix`, `basic_auth`, `attribute` and `authz`. -We'll discuss each one in details in the upcoming sections. + There are a few different middlewares which are `rule-matching`, `prefix`, `basic_auth`, `attribute` and `authz`. + We'll discuss each one in details in the upcoming sections. -- Hook: Hooks are engaged after a response is received form the backend service. Currently we just have a single resource creation hook named `authz`. +- Hook: Hooks are engaged after a response is received form the backend service. Currently we just have a single resource creation hook named `authz`. -Let's have a look at the Shield's Architecture where we will also be discussing about the different middlewares and hoooks. +Let's have a look at the Frontier's Architecture where we will also be discussing about the different middlewares and hoooks. -## Shield Proxy Architecture +## Frontier Proxy Architecture -![Shield Proxy Architecture](./shield-proxy-architecture.png) +![Frontier Proxy Architecture](./frontier-proxy-architecture.png) Sheild's proxy is build from two major components which are middlewares and hooks. Let's dive deeper into each of these components. ### Middleware -Middlewares in shield have the following interface. +Middlewares in frontier have the following interface. ```go type Middleware interface { @@ -82,8 +83,9 @@ type MiddlewareInfo struct { } ``` -Shield is designed to execute the middlewares in a fixed order maintained by a stack. +Frontier is designed to execute the middlewares in a fixed order maintained by a stack. The order followed is + - Rule match - Attributes - Basic auth @@ -91,22 +93,28 @@ The order followed is - Prefix #### Rule match + The rule match middleware finds the rule configured for a path and enriches the `ctx` with it. It also enriched the `ctx` with the request body. #### Attributes + The attributes middleware builds a map of the attributes passed and enriches the `ctx` with it. #### Basic auth -This middleware can be configured to support basic authentication with shield. + +This middleware can be configured to support basic authentication with frontier. #### Authz + This middleware checks in the SpiceDB if the user is authorized with atleast one (OR operation) the permissions. #### Prefix + This middleware strips a configured prefix from the request's URL path. ## Hook -Hooks in shield have the following interface. + +Hooks in frontier have the following interface. ```go type Service interface { @@ -115,10 +123,10 @@ type Service interface { } ``` -Shield only have a single hook +Frontier only have a single hook - Authz #### Authz -Authz hook persists the resource been created in the configfured backencd in Shield's DB. It does not create any relation by default but relations can be configured too. The relashions are created and stored both in Shield's DB and SpiceDB. +Authz hook persists the resource been created in the configfured backencd in Frontier's DB. It does not create any relation by default but relations can be configured too. The relashions are created and stored both in Frontier's DB and SpiceDB. diff --git a/docs/docs/concepts/glossary.md b/docs/docs/concepts/glossary.md index 3868bffef..7bfee8df4 100644 --- a/docs/docs/concepts/glossary.md +++ b/docs/docs/concepts/glossary.md @@ -1,26 +1,30 @@ # Glossary -Terminology and concepts used in Shield documentation. +Terminology and concepts used in Frontier documentation. ### Access Token -An access token is a credential which serves as proof of authentication and authorisation to access protected resources in a system or an API. After successful authorisation, an access token is included in the headers or parameters of API requests to validate the user's identity and permissions. The access token contains information such as the client's identity and the permissions granted to it. The server validates the access token to determine if the client is authorised to access the requested resource. + +An access token is a credential which serves as proof of authentication and authorisation to access protected resources in a system or an API. After successful authorisation, an access token is included in the headers or parameters of API requests to validate the user's identity and permissions. The access token contains information such as the client's identity and the permissions granted to it. The server validates the access token to determine if the client is authorised to access the requested resource. ### Backend -External Service which wants to use Shield for authz. It can verify access via Shield Proxy & API. +External Service which wants to use Frontier for authz. It can verify access via Frontier Proxy & API. ### Client ID + The Client ID is a public identifier assigned to a client application by the authorization server. It is typically known to the server and can be shared openly. It helps identify the client application when making requests to the authorization server. ### Client Secret + The Client Secret is a confidential string or password associated with the client application. It is meant to be kept confidential and only known to the client application and the OAuth identity provider. The Client Secret adds an extra layer of security by ensuring that only authorized client applications can access protected resources. ### Identity Providers (IdPs) -Shield supports integration with external identity providers through OpenID Connect (OIDC). This enables users to authenticate using their existing credentials from external systems, such as Google accounts, Microsoft Azure AD, or Github. The authentication process is handled by the respective IdP, while Shield handles the subsequent authorization based on the authenticated identity. +Frontier supports integration with external identity providers through OpenID Connect (OIDC). This enables users to authenticate using their existing credentials from external systems, such as Google accounts, Microsoft Azure AD, or Github. The authentication process is handled by the respective IdP, while Frontier handles the subsequent authorization based on the authenticated identity. + ### Issuer URL -The Issuer URL in OIDC (OpenID Connect) is the URL that uniquely identifies the identity provider (IdP) or an authorization server. It serves as a reference point for the OIDC client to discover and retrieve necessary information about the IdP's configuration and supported endpoints. To find the Issuer URL for an OIDC provider, you typically need to refer to the provider's documentation or specifications. +The Issuer URL in OIDC (OpenID Connect) is the URL that uniquely identifies the identity provider (IdP) or an authorization server. It serves as a reference point for the OIDC client to discover and retrieve necessary information about the IdP's configuration and supported endpoints. To find the Issuer URL for an OIDC provider, you typically need to refer to the provider's documentation or specifications. ### JWT Token @@ -34,16 +38,17 @@ Type of objects over which we want authorization. They are of two types: 2. Resource Namespace: Resources Types over which we need authorization. For example, we need edit & view permissions over GCE Instances. -### OIDC +### OIDC + OpenID Connect (or OIDC) is an identity layer built on top of the OAuth 2.0 protocol that enables clients (applications) to verify the identity of end-users based on authentication performed by an authorization server. ### Organization -An Organization is a top-level resource in Shield. Each Project, Role, Group, Policy and Principal belongs to an organization. Each organization will represent a single tenant in your SaaS application. +An Organization is a top-level resource in Frontier. Each Project, Role, Group, Policy and Principal belongs to an organization. Each organization will represent a single tenant in your SaaS application. ### Permission -Ability to carry out any action, in Shield or configured Backends. +Ability to carry out any action, in Frontier or configured Backends. ### Policy @@ -52,18 +57,19 @@ It defines the specific actions that are allowed or denied on resources. Aliter, ### Principal Principal refers to an entity that can be authenticated and authorized to access resources. It can represent a user, an application, or even another system. Principals are typically identified by unique identifiers, such as usernames, email addresses, or service account IDs. -In Shield Principals are of following type: +In Frontier Principals are of following type: 1. User: A person or service account who can be a Principal. It is identified by an Email ID. 2. Group: Collection of Users. -3. All Registered Users: Collection of users who have registered in Shield. Any user who registers in Shield becomes part of this Principal. +3. All Registered Users: Collection of users who have registered in Frontier. Any user who registers in Frontier becomes part of this Principal. ### Project By which we can group Resources, of various different Resource Types, who have common environment. ### Redirect URI -The Redirect URI is registered with the OIDC provider and serves as a callback URL, indicating the location which the OIDC provider redirects an authorized user with an authorization code or an ID token after authentication is complete. + +The Redirect URI is registered with the OIDC provider and serves as a callback URL, indicating the location which the OIDC provider redirects an authorized user with an authorization code or an ID token after authentication is complete. ### Resource @@ -73,12 +79,13 @@ Entity which needs authorization to be accessed. For example, a GCE instance is Classification that contains Resource instances. For example, GCE can be a resource type for GCE instances. -### RBAC +### RBAC + Role-based access control (or RBAC) is a methodology for restricting app resources to only authorized users. RBAC defines primitives such as roles, resources, users, and policies to configure access control within an app ### Role -A Role is a collection of permissions or privileges that can be assigned to principals. Permissions determine what actions are allowed on a resource. Whenver we attach a role, a principal is granted all the permissions that the role contains. +A Role is a collection of permissions or privileges that can be assigned to principals. Permissions determine what actions are allowed on a resource. Whenver we attach a role, a principal is granted all the permissions that the role contains. ### SpiceDB @@ -86,4 +93,4 @@ A Role is a collection of permissions or privileges that can be assigned to prin ### SSO -A Single Sign-On (SSO) mechanism allows users to authenticate once with the authorization server and then access multiple applications or services without needing to reauthenticate for each one. OIDC supports SSO by providing a standardized way to authenticate and share user identity across applications. \ No newline at end of file +A Single Sign-On (SSO) mechanism allows users to authenticate once with the authorization server and then access multiple applications or services without needing to reauthenticate for each one. OIDC supports SSO by providing a standardized way to authenticate and share user identity across applications. diff --git a/docs/docs/configurations.md b/docs/docs/configurations.md index 97e966e10..5d4db7819 100644 --- a/docs/docs/configurations.md +++ b/docs/docs/configurations.md @@ -1,10 +1,10 @@ # Configuration -Shield binary contains both the CLI client and the server. Each has it's own configuration in order to run. Server configuration contains information such as database credentials, spicedb connection, proxy, log severity, etc. while CLI client configuration only has configuration about which server to connect. +Frontier binary contains both the CLI client and the server. Each has it's own configuration in order to run. Server configuration contains information such as database credentials, spicedb connection, proxy, log severity, etc. while CLI client configuration only has configuration about which server to connect. ## Server Setup -There are several approaches to setup Shield Server +There are several approaches to setup Frontier Server 1. [Using the CLI](#using-the-cli) 2. [Using the Docker](#using-the-docker) @@ -22,7 +22,7 @@ There are several approaches to setup Shield Server Create a config file with the following command ```bash -$ shield server init +$ frontier server init ``` Alternatively you can [use `--config` flag](#using---config-flag) to customize to config file location.You can also [use environment variables](#using-environment-variable) to provide the server configuration. @@ -51,7 +51,7 @@ app: # full path prefixed with scheme where resources config yaml files are kept # e.g.: # local storage file "file:///tmp/resources_config" - # GCS Bucket "gs://shield/resources_config" + # GCS Bucket "gs://frontier/resources_config" resources_config_path: file:///tmp/resources_config # disable_orgs_listing if set to true will disallow non-admin APIs to list all organizations disable_orgs_listing: false @@ -59,9 +59,9 @@ app: disable_users_listing: false # cors_origin is origin value from where we want to allow cors cors_origin: http://localhost:3000 - # configuration to allow authentication in shield + # configuration to allow authentication in frontier authentication: - # to use shield as session store + # to use frontier as session store session: # both of them should be 32 chars long # hash helps identify if the value is tempered with @@ -71,16 +71,16 @@ app: # once authenticated, server responds with a jwt with user context # this jwt works as a bearer access token for all APIs token: - # generate key file via "./shield server keygen" + # generate key file via "./frontier server keygen" # if not specified, access tokens will be disabled # example: /opt/rsa rsa_path: "" # issuer claim to be added to the jwt - iss: "http://localhost.shield" + iss: "http://localhost.frontier" # validity of the token validity: "1h" mail_otp: - subject: "Shield - Login Link" + subject: "Frontier - Login Link" # body is a go template with `Otp` as a variable body: "Please copy/paste the OneTimePassword in login form.

          {{.Otp}}

          This code will expire in 10 minutes." validity: "1h" @@ -103,7 +103,7 @@ app: from: "username@acme.org" db: driver: postgres - url: postgres://shield:@localhost:5432/shield?sslmode=disable + url: postgres://frontier:@localhost:5432/frontier?sslmode=disable max_query_timeout: 500ms spicedb: @@ -127,9 +127,9 @@ All the server configurations can be passed as environment variables using under LOG_LEVEL=debug APP_PORT=8000 APP_GRPC_PORT=8001 -APP_IDENTITY_PROXY_HEADER=X-Shield-Email +APP_IDENTITY_PROXY_HEADER=X-Frontier-Email DB_DRIVER=postgres -DB_URL=postgres://shield:@localhost:5432/shield?sslmode=disable +DB_URL=postgres://frontier:@localhost:5432/frontier?sslmode=disable DB_MAX_QUERY_TIMEOUT=500ms SPICEDB_HOST=spicedb.localhost SPICEDB_PRE_SHARED_KEY=randomkey @@ -157,32 +157,32 @@ Database migration is required during the first server initialization. In additi To initialize the database schema, Run Migrations with the following command: ```bash -$ shield server migrate +$ frontier server migrate ``` -To run the Shield server use command: +To run the Frontier server use command: ```bash -$ shield server start +$ frontier server start ``` #### Using `--config` flag ```bash -$ shield server migrate --config= +$ frontier server migrate --config= ``` ```bash -$ shield server start --config= +$ frontier server start --config= ``` ## Using the Docker -To run the Shield server using Docker, you need to have Docker installed on your system. You can find the installation instructions [here](https://docs.docker.com/get-docker/). +To run the Frontier server using Docker, you need to have Docker installed on your system. You can find the installation instructions [here](https://docs.docker.com/get-docker/). You can choose to set the configuration using environment variables or a config file. The environment variables will override the config file. -If you use Docker to build shield, then configuring networking requires extra steps. Following is one of doing it by running postgres and spicedb inside with `docker-compose` first. +If you use Docker to build frontier, then configuring networking requires extra steps. Following is one of doing it by running postgres and spicedb inside with `docker-compose` first. Go to the root of this project and run `docker-compose`. @@ -190,19 +190,19 @@ Go to the root of this project and run `docker-compose`. $ docker-compose up ``` -Once postgres and spicedb has been ready, we can run Shield by passing in the config of postgres and elasticsearch defined in `docker-compose.yaml` file. +Once postgres and spicedb has been ready, we can run Frontier by passing in the config of postgres and elasticsearch defined in `docker-compose.yaml` file. ### Using config file -Alternatively you can use the `shield.yaml` config file defined [above](#using-config-file) and run the following command. +Alternatively you can use the `frontier.yaml` config file defined [above](#using-config-file) and run the following command. ```bash $ docker run -d \ --restart=always \ -p 7400:7400 \ - -v $(pwd)/shield.yaml:/shield.yaml \ - --name shield-server \ - raystack/shield: \ + -v $(pwd)/frontier.yaml:/frontier.yaml \ + --name frontier-server \ + raystack/frontier: \ server start -c /config.yaml ``` @@ -217,8 +217,8 @@ $ docker run -d \ --restart=always \ -p 7400:7400 \ --env-file .env \ - --name shield-server \ - raystack/shield: \ + --name frontier-server \ + raystack/frontier: \ server start ``` @@ -226,7 +226,7 @@ $ docker run -d \ ### Pre-requisites for Helm chart -Shield can be installed in Kubernetes using the Helm chart from https://github.com/raystack/charts. +Frontier can be installed in Kubernetes using the Helm chart from https://github.com/raystack/charts. Ensure that the following requirements are met: @@ -249,14 +249,14 @@ helm repo update ### Setup helm values -The following table lists the configurable parameters of the Shield chart and their default values. +The following table lists the configurable parameters of the Frontier chart and their default values. -See full helm values guide [here](https://github.com/raystack/charts/tree/main/stable/shield#values) and [values.yaml](https://github.com/raystack/charts/blob/main/stable/shield/values.yaml) file +See full helm values guide [here](https://github.com/raystack/charts/tree/main/stable/frontier#values) and [values.yaml](https://github.com/raystack/charts/blob/main/stable/frontier/values.yaml) file Install it with the helm command line: ```bash -helm install my-release -f values.yaml raystack/shield +helm install my-release -f values.yaml raystack/frontier ``` ## Client Initialisation @@ -264,12 +264,12 @@ helm install my-release -f values.yaml raystack/shield Add a client configurations file with the following command: ```bash -shield config init +frontier config init ``` -Open the config file and edit the gRPC host for Shield CLI +Open the config file and edit the gRPC host for Frontier CLI -```yml title="shield.yaml" +```yml title="frontier.yaml" client: host: localhost:8081 ``` @@ -277,17 +277,17 @@ client: List the client configurations with the following command: ```bash -shield config list +frontier config list ``` #### Required Header/Metadata in API -In the current version, all HTTP & gRPC APIs in Shield requires an identity header/metadata in the request. The header key is configurable but the default name is `X-Shield-Email`. +In the current version, all HTTP & gRPC APIs in Frontier requires an identity header/metadata in the request. The header key is configurable but the default name is `X-Frontier-Email`. If everything goes well, you should see something like this: ```bash -2023-05-17T00:02:54.324+0530 info shield starting {"version": "v0.5.1"} +2023-05-17T00:02:54.324+0530 info frontier starting {"version": "v0.5.1"} 2023-05-17T00:02:54.331+0530 debug resource config cache refreshed {"resource_config_count": 0} 2023-05-17T00:02:54.333+0530 info Connected to spiceDB: localhost:50051 2023-05-17T00:02:54.339+0530 info metaschemas loaded {"count": 4} diff --git a/docs/docs/contribution/contribute.md b/docs/docs/contribution/contribute.md index 5a7b28368..6203aa5fe 100644 --- a/docs/docs/contribution/contribute.md +++ b/docs/docs/contribution/contribute.md @@ -1,10 +1,10 @@ # Contribution Process -The following is a set of guidelines for contributing to Shield. These are mostly guidelines, not rules. Use your best judgment, and feel free to propose changes to this document in a pull request. Here are some important resources: +The following is a set of guidelines for contributing to Frontier. These are mostly guidelines, not rules. Use your best judgment, and feel free to propose changes to this document in a pull request. Here are some important resources: -- [Concepts](https://raystack.github.io/shield/concepts/architecture) section will explain you about Shield architecture, -- Our [roadmap](https://github.com/raystack/shield#readme) is the 10k foot view of where we're going, and -- Github [issues](https://github.com/raystack/shield/issues) track the ongoing and reported issues. +- [Concepts](https://raystack.github.io/frontier/concepts/architecture) section will explain you about Frontier architecture, +- Our [roadmap](https://github.com/raystack/frontier#readme) is the 10k foot view of where we're going, and +- Github [issues](https://github.com/raystack/frontier/issues) track the ongoing and reported issues. ## How can I contribute? @@ -15,16 +15,16 @@ We use RFCS and GitHub issues to communicate ideas. - You can help with documenting new features or improve existing documentation. - You can also review and accept other contributions if you are a maintainer. -Please submit a PR to the main branch of the Shield repository once you are ready to submit your contribution. Code submission to Shield \(including submission from project maintainers\) require review and approval from maintainers or code owners. PRs that are submitted need to pass the build. Once build is passed community members will help to review the pull request. +Please submit a PR to the main branch of the Frontier repository once you are ready to submit your contribution. Code submission to Frontier \(including submission from project maintainers\) require review and approval from maintainers or code owners. PRs that are submitted need to pass the build. Once build is passed community members will help to review the pull request. ## Becoming a maintainer We are always interested in adding new maintainers. What we look for is a series of contributions, good taste, and an ongoing interest in the project. -- Maintainers will have write access to the Shield repository. +- Maintainers will have write access to the Frontier repository. - There is no strict protocol for becoming a maintainer. Candidates for new maintainers are typically people that are active contributors and community members. - Candidates for new maintainers can also be suggested by current maintainers. -- If you would like to become a maintainer, you should start contributing to Shield in any of the ways mentioned. You might also want to talk to other maintainers and ask for their advice and guidance. +- If you would like to become a maintainer, you should start contributing to Frontier in any of the ways mentioned. You might also want to talk to other maintainers and ask for their advice and guidance. ## Guidelines @@ -34,4 +34,4 @@ Please follow these practices for you change to get merged fast and smoothly: - If you are introducing a completely new feature or making any major changes in an existing one, we recommend to start with an RFC and get consensus on the basic design first. - Make sure your local build is running with all the tests and checkstyle passing. - If your change is related to user-facing protocols / configurations, you need to make the corresponding change in the documentation as well. -- Docs live in the code repo under [`docs`](https://github.com/raystack/shield/tree/main/docs) so that changes to that can be done in the same PR as changes to the code. +- Docs live in the code repo under [`docs`](https://github.com/raystack/frontier/tree/main/docs) so that changes to that can be done in the same PR as changes to the code. diff --git a/docs/docs/contribution/development.md b/docs/docs/contribution/development.md index 1ca8c9f1e..90ef5fb2e 100644 --- a/docs/docs/contribution/development.md +++ b/docs/docs/contribution/development.md @@ -12,7 +12,7 @@ Clone the repo ``` -git clone git@github.com:raystack/shield.git +git clone git@github.com:raystack/frontier.git ``` Install all the golang dependencies @@ -21,13 +21,13 @@ Install all the golang dependencies make install ``` -Optional: build shield admin ui +Optional: build frontier admin ui ``` make ui ``` -Build shield binary file +Build frontier binary file ``` make build @@ -37,19 +37,19 @@ Init config ``` cp internal/server/config.yaml config.yaml -./shield config init +./frontier config init ``` Run database migrations ``` -./shield server migrate -c config.yaml +./frontier server migrate -c config.yaml ``` -Start shield server +Start frontier server ``` -./shield server start -c config.yaml +./frontier server start -c config.yaml ``` ## Running tests diff --git a/docs/docs/installation.md b/docs/docs/installation.md index d5bb06b4c..0614e9b3f 100644 --- a/docs/docs/installation.md +++ b/docs/docs/installation.md @@ -1,48 +1,48 @@ # Installation -There are several approaches to install Shield. +There are several approaches to install Frontier. 1. [Using a pre-compiled binary](#binary-cross-platform) 2. [Using the Docker image](#docker) 3. [Installing from source](#building-from-source) -4. [Helm Charts](https://github.com/raystack/charts/tree/main/stable/shield) +4. [Helm Charts](https://github.com/raystack/charts/tree/main/stable/frontier) ### Binary (Cross-platform) -Download the appropriate version for your platform from [releases](https://github.com/raystack/shield/releases) page. Once downloaded, the binary can be run from anywhere. +Download the appropriate version for your platform from [releases](https://github.com/raystack/frontier/releases) page. Once downloaded, the binary can be run from anywhere. You don’t need to install it into a global location. This works well for shared hosts and other systems where you don’t have a privileged account. Ideally, you should install it somewhere in your PATH for easy use. `/usr/local/bin` is the most probable location. #### macOS -`Shield` is available via a Homebrew Tap, and as downloadable binary from the [releases](https://github.com/raystack/shield/releases) page: +`Frontier` is available via a Homebrew Tap, and as downloadable binary from the [releases](https://github.com/raystack/frontier/releases) page: ```sh -$ brew install raystack/taps/shield +$ brew install raystack/taps/frontier ``` To upgrade to the latest version: ```sh -$ brew upgrade shield +$ brew upgrade frontier ``` #### Linux -`Shield` is available as downloadable binaries from the [releases](https://github.com/raystack/shield/releases/latest) page. Download the `.deb` or `.rpm` from the releases page and install with `sudo dpkg -i` and `sudo rpm -i` respectively. +`Frontier` is available as downloadable binaries from the [releases](https://github.com/raystack/frontier/releases/latest) page. Download the `.deb` or `.rpm` from the releases page and install with `sudo dpkg -i` and `sudo rpm -i` respectively. #### Windows -`Shield` is available via [scoop](https://scoop.sh/), and as a downloadable binary from the [releases](https://github.com/raystack/shield/releases/latest) page: +`Frontier` is available via [scoop](https://scoop.sh/), and as a downloadable binary from the [releases](https://github.com/raystack/frontier/releases/latest) page: ```sh -scoop bucket add shield https://github.com/raystack/scoop-bucket.git +scoop bucket add frontier https://github.com/raystack/scoop-bucket.git ``` To upgrade to the latest version: ```sh -scoop update shield +scoop update frontier ``` ### Docker @@ -50,13 +50,13 @@ scoop update shield We provide ready to use Docker container images. To pull the latest image: Make sure you have Spicedb and postgres running on your local and run the following. ```sh -$ docker pull raystack/shield +$ docker pull raystack/frontier ``` To pull a specific version: ```sh -$ docker pull raystack/shield:v0.6.2-arm64 +$ docker pull raystack/frontier:v0.6.2-arm64 ``` To run the docker image with minimum configurations: @@ -64,70 +64,70 @@ To run the docker image with minimum configurations: ```sh $ docker run -p 8080:8080 \ -e SHIELD_DB_DRIVER=postgres \ - -e SHIELD_DB_URL=postgres://shield:@localhost:5432/shield?sslmode=disable \ + -e SHIELD_DB_URL=postgres://frontier:@localhost:5432/frontier?sslmode=disable \ -e SHIELD_SPICEDB_HOST=spicedb.localhost:50051 \ -e SHIELD_SPICEDB_PRE_SHARED_KEY=randomkey -v .config:.config - raystack/shield server start + raystack/frontier server start ``` ### Building from source -Begin by cloning this repository then you have two ways in which you can build Shield: +Begin by cloning this repository then you have two ways in which you can build Frontier: - As a native executable - As a docker image -Run either of the following commands to clone and compile Shield from source +Run either of the following commands to clone and compile Frontier from source ```bash -$ git clone git@github.com:raystack/shield.git # (Using SSH Protocol) -$ git clone https://github.com/raystack/shield.git # (Using HTTPS Protocol) +$ git clone git@github.com:raystack/frontier.git # (Using SSH Protocol) +$ git clone https://github.com/raystack/frontier.git # (Using HTTPS Protocol) ``` #### As a native executable -To build shield as a native executable, run `make` inside the cloned repository. +To build frontier as a native executable, run `make` inside the cloned repository. ```bash $ make ``` -This will create the **`shield`** binary in the root directory. Initialise server and client config file. Customise the `config.yaml` file with your local configurations. +This will create the **`frontier`** binary in the root directory. Initialise server and client config file. Customise the `config.yaml` file with your local configurations. ```bash -$ ./shield config init +$ ./frontier config init ``` Run database migrations ```bash -$ ./shield server migrate +$ ./frontier server migrate ``` -Start Shield server +Start Frontier server ```bash -$ ./shield server start +$ ./frontier server start ``` #### As a Docker image -Building Shield's Docker image is just a simple, just run docker build command and optionally name the image +Building Frontier's Docker image is just a simple, just run docker build command and optionally name the image ```bash -$ docker build . -t shield +$ docker build . -t frontier ``` ### Verifying the installation​ -To verify if Shield is properly installed, run `shield --help` on your system. You should see help output. If you are executing it from the command line, make sure it is on your PATH or you may get an error about Shield not being found. +To verify if Frontier is properly installed, run `frontier --help` on your system. You should see help output. If you are executing it from the command line, make sure it is on your PATH or you may get an error about Frontier not being found. ```bash -$ ./shield --help +$ ./frontier --help ``` ### What's next -- See the [Configurations](./configurations.md) page on how to setup Shield server and client +- See the [Configurations](./configurations.md) page on how to setup Frontier server and client - See the [CLI Reference](./reference/cli.md) for a complete list of commands and options. diff --git a/docs/docs/introduction.md b/docs/docs/introduction.md index 6c38d6f5f..8a8afed62 100644 --- a/docs/docs/introduction.md +++ b/docs/docs/introduction.md @@ -5,57 +5,57 @@ slug: / # Introduction -Welcome to the introductory guide to Shield! We cover what Shield is, what problems it can solve, how it works, and how you can get started using it. If you are familiar with the basics of Shield, the guides provides a more detailed reference of available features. +Welcome to the introductory guide to Frontier! We cover what Frontier is, what problems it can solve, how it works, and how you can get started using it. If you are familiar with the basics of Frontier, the guides provides a more detailed reference of available features. -## What is Shield? +## What is Frontier? -Shield by Raystack is a role-based cloud-native user management system and authorization server for your applications and API endpoints. It is API-driven and provides CLI, HTTP/GRPC APIs and an Admin Portal. Shield is designed to be easy to use Identity and Access Management tool which handles user authentication by providing a Single-Sign-On(SSO) with any provider which adheres to the OIDC Protocol. It checks the client's credentials and permissions against the defined access policies before allowing or denying access to the backend services. +Frontier by Raystack is a role-based cloud-native user management system and authorization server for your applications and API endpoints. It is API-driven and provides CLI, HTTP/GRPC APIs and an Admin Portal. Frontier is designed to be easy to use Identity and Access Management tool which handles user authentication by providing a Single-Sign-On(SSO) with any provider which adheres to the OIDC Protocol. It checks the client's credentials and permissions against the defined access policies before allowing or denying access to the backend services. -![Shield flow diagram](./shield-flow-diagram.png) +![Frontier flow diagram](./frontier-flow-diagram.png) -## How does shield work? +## How does frontier work? -Here are the steps to work with Shield. +Here are the steps to work with Frontier. -1. Configure shield: Shield has various tuning parameters that can be configured to suit the needs of the organization. -This includes the configuration of the database, OIDC provider, email provider, etc. -2. Configure policies: This step involves definition of resource types that will exist in the connected backend. -A resource is a protected backend service for example an order management service or user picture library. User can -also configure the roles and permissions to be assigned to the users. -3. Connecting frontend: Shield provides a set of APIs that can be used by the frontend to authenticate, authorize and -manage users. The frontend can be a web application, mobile application or any other application that can make HTTP -requests. +1. Configure frontier: Frontier has various tuning parameters that can be configured to suit the needs of the organization. + This includes the configuration of the database, OIDC provider, email provider, etc. +2. Configure policies: This step involves definition of resource types that will exist in the connected backend. + A resource is a protected backend service for example an order management service or user picture library. User can + also configure the roles and permissions to be assigned to the users. +3. Connecting frontend: Frontier provides a set of APIs that can be used by the frontend to authenticate, authorize and + manage users. The frontend can be a web application, mobile application or any other application that can make HTTP + requests. ## Key Features -- **Single-Sign-On(SSO)**: Shield implements the OpenID Connect(OIDC) Protocol that extends the OAuth 2.0 framework to provide authentication and identity information, allowing users to authenticate once and access multiple applications seamlessly. It also enables applications to obtain user identity information for authorization purposes. A Single login and logout for all the underlying application and resources ensure a seamless user experience. +- **Single-Sign-On(SSO)**: Frontier implements the OpenID Connect(OIDC) Protocol that extends the OAuth 2.0 framework to provide authentication and identity information, allowing users to authenticate once and access multiple applications seamlessly. It also enables applications to obtain user identity information for authorization purposes. A Single login and logout for all the underlying application and resources ensure a seamless user experience. -- **Multiple sources of user identities**: Shield allows seamless integration with any identity provider that supports OIDC, enabling a wide range of options for user authentication. This flexibility empowers organizations to leverage their preferred identity providers, such as Google, Microsoft Azure AD, Github, LinkedIn or others, to authenticate and manage user identities within their organisation's ecosystem. +- **Multiple sources of user identities**: Frontier allows seamless integration with any identity provider that supports OIDC, enabling a wide range of options for user authentication. This flexibility empowers organizations to leverage their preferred identity providers, such as Google, Microsoft Azure AD, Github, LinkedIn or others, to authenticate and manage user identities within their organisation's ecosystem. -- **Role-Based-Access-Control(RBAC)**: Shield follows the RBAC model, which means you can assign roles to users, groups, or service accounts. This simplifies access management by providing predefined roles with specific permissions, reducing the need for manual permission assignments. +- **Role-Based-Access-Control(RBAC)**: Frontier follows the RBAC model, which means you can assign roles to users, groups, or service accounts. This simplifies access management by providing predefined roles with specific permissions, reducing the need for manual permission assignments. -- **Resource Management**: Shield provides API to create and manage organizations/projects. Admins can create projects and groups within organizations. In addition, group admins can manage groups, add-remove members to the groups, and assign roles to these principals. Using Shield, admins can define policies which bind roles to the underlying resources. +- **Resource Management**: Frontier provides API to create and manage organizations/projects. Admins can create projects and groups within organizations. In addition, group admins can manage groups, add-remove members to the groups, and assign roles to these principals. Using Frontier, admins can define policies which bind roles to the underlying resources. -## Using Shield +## Using Frontier You can manage organizations, projects, group, users and resources in any of the following ways: -### Shield Command Line Interface +### Frontier Command Line Interface -You can use the Shield command line interface to issue commands and to perform the entire Shield features. Using the command line can be faster and more convenient than using API. For more information on using the Shield CLI, see the CLI Reference page. +You can use the Frontier command line interface to issue commands and to perform the entire Frontier features. Using the command line can be faster and more convenient than using API. For more information on using the Frontier CLI, see the CLI Reference page. ### HTTPS API -You can manage relation creation, checking authorization on a resource and much more by using the Shield HTTPS API, which lets you issue HTTPS requests directly to the service. For more information, see the API Reference page. +You can manage relation creation, checking authorization on a resource and much more by using the Frontier HTTPS API, which lets you issue HTTPS requests directly to the service. For more information, see the API Reference page. ### Admin Portal -Besides HTTP APIs and CLI tool, Shield provides an out-of-the-box UI for admins to configure SSO for the clients and manage roles, users, groups and organisations in one place. +Besides HTTP APIs and CLI tool, Frontier provides an out-of-the-box UI for admins to configure SSO for the clients and manage roles, users, groups and organisations in one place. ## Where to go from here -See the [installation](./installation) page to install the Shield CLI. Next, we recommend completing the guides. The tour provides an overview of most of the existing functionality of Shield and takes approximately 30 minutes to complete. +See the [installation](./installation) page to install the Frontier CLI. Next, we recommend completing the guides. The tour provides an overview of most of the existing functionality of Frontier and takes approximately 30 minutes to complete. -After completing the tour, check out the remainder of the documentation in the reference and concepts sections for your specific areas of interest. We've aimed to provide as much documentation as we can for the various components of Shield to give you a full understanding of Shield's surface area. +After completing the tour, check out the remainder of the documentation in the reference and concepts sections for your specific areas of interest. We've aimed to provide as much documentation as we can for the various components of Frontier to give you a full understanding of Frontier's surface area. -Finally, follow the project on [GitHub](https://github.com/raystack/shield), and contact us if you'd like to get involved. +Finally, follow the project on [GitHub](https://github.com/raystack/frontier), and contact us if you'd like to get involved. diff --git a/docs/docs/reference/api-auth.md b/docs/docs/reference/api-auth.md index 23d41bc76..0eca453f9 100644 --- a/docs/docs/reference/api-auth.md +++ b/docs/docs/reference/api-auth.md @@ -4,7 +4,7 @@ import CodeBlock from '@theme/CodeBlock'; # Authorization for APIs -Client ID and Secret or Access Tokens are used to authorize privileged actions one can take on Shield APIs. It ensures that the action being performed in a Shield instance is by a user is already authenticated for it's identity in Shield and these actions are executed only when the user holds valid permissions to do so. +Client ID and Secret or Access Tokens are used to authorize privileged actions one can take on Frontier APIs. It ensures that the action being performed in a Frontier instance is by a user is already authenticated for it's identity in Frontier and these actions are executed only when the user holds valid permissions to do so. ## Client ID and Secret @@ -16,8 +16,8 @@ Authorization: "Basic " + base64( client_id + ":" + client_secret ) #### Creating a client id and secret -1. Create a service account inside an organization using [Create Service User](../apis/shield-service-create-service-user.api.mdx) API -2. Create the secret using [Create Service User Secret](../apis/shield-service-create-service-user-secret) API +1. Create a service account inside an organization using [Create Service User](../apis/frontier-service-create-service-user.api.mdx) API +2. Create the secret using [Create Service User Secret](../apis/frontier-service-create-service-user-secret) API :::caution The client secret you have created is never persisted in the database and will only be displayed once. If you happen to lose the secret, you will need to generate a new one. It is crucial to save the client secret before closing the response. @@ -33,29 +33,29 @@ Alternatively, a Bearer token can also be used to verify user's identity. Authorization: "Bearer " + ``` -#### Getting the Access token issued by Shield after user login +#### Getting the Access token issued by Frontier after user login -Access token by default is returned as part of the response header "x-user-token" after successful login with either an Email OTP or Social login. This can be requested again by sending a request to the Shield server with the cookies containing session details on endpoint /v1beta1/users/self. +Access token by default is returned as part of the response header "x-user-token" after successful login with either an Email OTP or Social login. This can be requested again by sending a request to the Frontier server with the cookies containing session details on endpoint /v1beta1/users/self. One can use this token as the Bearer token in Authorization headers. #### Creating JWT token from Private Keys for a service user -1. Create a service account inside an organization using [Create Service User](../apis/shield-service-create-service-user.api.mdx) API -2. Create using [Create Service User Keys](../apis/shield-service-create-service-user-key) API +1. Create a service account inside an organization using [Create Service User](../apis/frontier-service-create-service-user.api.mdx) API +2. Create using [Create Service User Keys](../apis/frontier-service-create-service-user-key) API :::caution -The private key you created never persists in Shield and is only returned once. If you lose the private key, you will have to generate a new one. Public keys for a service user can be retrieved using [**this**](../apis/shield-service-get-service-user-key) API +The private key you created never persists in Frontier and is only returned once. If you lose the private key, you will have to generate a new one. Public keys for a service user can be retrieved using [**this**](../apis/frontier-service-get-service-user-key) API ::: -3. Refer [shield-go](https://github.com/raystack/shield-go/blob/01b6fc925b355e69d79fcde66e1f6bb5bfd475ab/pkg/serviceuser.go) to see a Golang implementation to get a JWT token from private key using various libraries. This JWT token can be used in headers for user verification. +3. Refer [frontier-go](https://github.com/raystack/frontier-go/blob/01b6fc925b355e69d79fcde66e1f6bb5bfd475ab/pkg/serviceuser.go) to see a Golang implementation to get a JWT token from private key using various libraries. This JWT token can be used in headers for user verification. -4. Alternatively, Shield also exposes a [Create Access Token](../apis/shield-service-auth-token) API from Client ID and Secret. Use the access token returned from the API response in the headers for authentication as discussed above. +4. Alternatively, Frontier also exposes a [Create Access Token](../apis/frontier-service-auth-token) API from Client ID and Secret. Use the access token returned from the API response in the headers for authentication as discussed above. --- -## X-Shield-Email +## X-Frontier-Email :::danger Warning -Currently Shield CLI and APIs also allow an identity header like `X-Shield-Email` which can be configured via the server configurations file. This will be deprecated in the upcoming versions and should not be used in deployment. -::: \ No newline at end of file +Currently Frontier CLI and APIs also allow an identity header like `X-Frontier-Email` which can be configured via the server configurations file. This will be deprecated in the upcoming versions and should not be used in deployment. +::: diff --git a/docs/docs/reference/api-definitions.md b/docs/docs/reference/api-definitions.md index 98394c7c5..0a84d653a 100644 --- a/docs/docs/reference/api-definitions.md +++ b/docs/docs/reference/api-definitions.md @@ -4,16 +4,16 @@ In Raystack/Proton, the [Protobuf (protocol buffers)](https://protobuf.dev/) definitions are used to describe the structure and behavior of APIs. Protobuf is a language-agnostic binary serialization format developed by Google. It allows you to define the data models and API endpoints using a simple and concise syntax. -In the context of Shield, the protobuf definitions are used to define the API endpoints and associated access control policies. These definitions specify the request and response message structures, allowed methods, and any additional metadata required for authorization checks. +In the context of Frontier, the protobuf definitions are used to define the API endpoints and associated access control policies. These definitions specify the request and response message structures, allowed methods, and any additional metadata required for authorization checks. -By leveraging the protobuf definitions with Protobuf compilers like protoc and buf, Shield automatically generates code for validating and enforcing the defined policies. It integrates with various frameworks and libraries to seamlessly enforce access control rules, ensuring that only authorized requests are allowed to access protected APIs and resources. +By leveraging the protobuf definitions with Protobuf compilers like protoc and buf, Frontier automatically generates code for validating and enforcing the defined policies. It integrates with various frameworks and libraries to seamlessly enforce access control rules, ensuring that only authorized requests are allowed to access protected APIs and resources. -The current deployment uses the [v1beta1](https://github.com/raystack/proton/tree/main/raystack/shield/v1beta1) Shield API version. +The current deployment uses the [v1beta1](https://github.com/raystack/proton/tree/main/raystack/frontier/v1beta1) Frontier API version. :::info -While making any changes in Shield APIs, the makefile in Shield contains the Proton commit hash, which is utilized in Shield for generating protobuf files and documentation with `make proto` and `make doc` rules. +While making any changes in Frontier APIs, the makefile in Frontier contains the Proton commit hash, which is utilized in Frontier for generating protobuf files and documentation with `make proto` and `make doc` rules. ::: -The **`make proto`** command creates [apidocs.swagger.yaml](https://github.com/raystack/shield/blob/main/proto/apidocs.swagger.yaml) specification which can be used to create a Postman collection to test these APIs. +The **`make proto`** command creates [apidocs.swagger.yaml](https://github.com/raystack/frontier/blob/main/proto/apidocs.swagger.yaml) specification which can be used to create a Postman collection to test these APIs. -Besides this, one can import these files it in the [Swagger Editor](https://editor.swagger.io/) to visualize the Shield API documentation using the Swagger OpenAPI specification format. +Besides this, one can import these files it in the [Swagger Editor](https://editor.swagger.io/) to visualize the Frontier API documentation using the Swagger OpenAPI specification format. diff --git a/docs/docs/reference/cli.md b/docs/docs/reference/cli.md index 5f4016073..cf7db6303 100644 --- a/docs/docs/reference/cli.md +++ b/docs/docs/reference/cli.md @@ -1,244 +1,244 @@ # CLI -## `shield auth` +## `frontier auth` -Auth configs that need to be used with shield +Auth configs that need to be used with frontier -## `shield completion [bash|zsh|fish|powershell]` +## `frontier completion [bash|zsh|fish|powershell]` Generate shell completion scripts -## `shield config ` +## `frontier config ` Manage client configurations -### `shield config init` +### `frontier config init` Initialize a new client configuration -### `shield config list` +### `frontier config list` List client configuration settings -## `shield environment` +## `frontier environment` List of supported environment variables -## `shield group` +## `frontier group` Manage groups -### `shield group create [flags]` +### `frontier group create [flags]` Upsert a group ``` -f, --file string Path to the group body file -H, --header string Header : -```` +``` -### `shield group edit [flags]` +### `frontier group edit [flags]` Edit a group ``` -f, --file string Path to the group body file -```` +``` -### `shield group list` +### `frontier group list` List all groups -### `shield group view [flags]` +### `frontier group view [flags]` View a group ``` -m, --metadata Set this flag to see metadata -```` +``` -## `shield namespace` +## `frontier namespace` Manage namespaces -### `shield namespace list` +### `frontier namespace list` List all namespaces -### `shield namespace view` +### `frontier namespace view` View a namespace -## `shield organization` +## `frontier organization` Manage organizations -### `shield organization admlist` +### `frontier organization admlist` list admins of an organization -### `shield organization create [flags]` +### `frontier organization create [flags]` Upsert an organization ``` -f, --file string Path to the organization body file -H, --header string Header : -```` +``` -### `shield organization edit [flags]` +### `frontier organization edit [flags]` Edit an organization ``` -f, --file string Path to the organization body file -```` +``` -### `shield organization list` +### `frontier organization list` List all organizations -### `shield organization view [flags]` +### `frontier organization view [flags]` View an organization ``` -m, --metadata Set this flag to see metadata -```` +``` -## `shield permission` +## `frontier permission` Manage permissions -### `shield permission create [flags]` +### `frontier permission create [flags]` Upsert a permission ``` -f, --file string Path to the permission body file -H, --header string Header : -```` +``` -### `shield permission edit [flags]` +### `frontier permission edit [flags]` Edit a permission ``` -f, --file string Path to the permission body file -```` +``` -### `shield permission list` +### `frontier permission list` List all permissions -### `shield permission view` +### `frontier permission view` View a permission -## `shield policy` +## `frontier policy` Manage policies -### `shield policy create [flags]` +### `frontier policy create [flags]` Upsert a policy ``` -f, --file string Path to the policy body file -H, --header string Header : -```` +``` -### `shield policy edit [flags]` +### `frontier policy edit [flags]` Edit a policy ``` -f, --file string Path to the policy body file -```` +``` -### `shield policy view` +### `frontier policy view` View a policy -## `shield project` +## `frontier project` Manage projects -### `shield project create [flags]` +### `frontier project create [flags]` Upsert a project ``` -f, --file string Path to the project body file -H, --header string Header : -```` +``` -### `shield project edit [flags]` +### `frontier project edit [flags]` Edit a project ``` -f, --file string Path to the project body file -```` +``` -### `shield project list` +### `frontier project list` List all projects -### `shield project view [flags]` +### `frontier project view [flags]` View a project ``` -m, --metadata Set this flag to see metadata -```` +``` -## `shield role` +## `frontier role` Manage roles -### `shield role create [flags]` +### `frontier role create [flags]` Upsert a role ``` -f, --file string Path to the role body file -H, --header string Header : -```` +``` -### `shield role edit [flags]` +### `frontier role edit [flags]` Edit a role ``` -f, --file string Path to the role body file -```` +``` -### `shield role list` +### `frontier role list` List all roles -### `shield role view [flags]` +### `frontier role view [flags]` View a role ``` -m, --metadata Set this flag to see metadata -```` +``` -## `shield seed [flags]` +## `frontier seed [flags]` Seed the database with initial data ``` -H, --header string Header -```` +``` -## `shield server` +## `frontier server` Server management -### `shield server init [flags]` +### `frontier server init [flags]` Initialize server @@ -247,83 +247,82 @@ Initialize server -r, --resources string URL path of resources. Full path prefixed with scheme where resources config yaml files are kept e.g.: local storage file "file:///tmp/resources_config" - GCS Bucket "gs://shield-bucket-example" + GCS Bucket "gs://frontier-bucket-example" (default: file://{pwd}/resources_config) - + -u, --rule string URL path of rules. Full path prefixed with scheme where ruleset yaml files are kept e.g.: local storage file "file:///tmp/rules" - GCS Bucket "gs://shield-bucket-example" + GCS Bucket "gs://frontier-bucket-example" (default: file://{pwd}/rules) - -```` -### `shield server keygen [flags]` +``` + +### `frontier server keygen [flags]` Generate 2 rsa keys as jwks for auth token generation ``` -k, --keys int num of keys to generate (default 2) -```` +``` -### `shield server migrate [flags]` +### `frontier server migrate [flags]` Run DB Schema Migrations ``` -c, --config string config file path -```` +``` -### `shield server migrate-rollback [flags]` +### `frontier server migrate-rollback [flags]` Run DB Schema Migrations Rollback to last state ``` -c, --config string config file path -```` +``` -### `shield server start [flags]` +### `frontier server start [flags]` Start server and proxy default on port 8080 ``` -c, --config string config file path -```` +``` -## `shield user` +## `frontier user` Manage users -### `shield user create [flags]` +### `frontier user create [flags]` Upsert an user ``` -f, --file string Path to the user body file -H, --header string Header : -```` +``` -### `shield user edit [flags]` +### `frontier user edit [flags]` Edit an user ``` -f, --file string Path to the user body file -```` +``` -### `shield user list` +### `frontier user list` List all users -### `shield user view [flags]` +### `frontier user view [flags]` View an user ``` -m, --metadata Set this flag to see metadata -```` +``` -## `shield version` +## `frontier version` Print version information - diff --git a/docs/docs/reference/configurations.md b/docs/docs/reference/configurations.md index bb972cde1..9dd8958f0 100644 --- a/docs/docs/reference/configurations.md +++ b/docs/docs/reference/configurations.md @@ -22,11 +22,11 @@ app: tls_key_file: "temp/server-key.pem" tls_client_ca_file: "temp/ca-cert.pem" metrics_port: 9000 - identity_proxy_header: X-Shield-Email + identity_proxy_header: X-Frontier-Email # full path prefixed with scheme where resources config yaml files are kept # e.g.: # local storage file "file:///tmp/resources_config" - # GCS Bucket "gs://shield/resources_config" + # GCS Bucket "gs://frontier/resources_config" resources_config_path: file:///tmp/resources_config\ # secret required to access resources config # e.g.: @@ -41,9 +41,9 @@ app: disable_users_listing: false # cors_origin is origin value from where we want to allow cors cors_origin: http://localhost:3000 - # configuration to allow authentication in shield + # configuration to allow authentication in frontier authentication: - # to use shield as session store + # to use frontier as session store session: # both of them should be 32 chars long # hash helps identify if the value is tempered with @@ -53,12 +53,12 @@ app: # once authenticated, server responds with a jwt with user context # this jwt works as a bearer access token for all APIs token: - # generate key file via "./shield server keygen" + # generate key file via "./frontier server keygen" # if not specified, access tokens will be disabled # example: /opt/rsa rsa_path: "" # issuer claim to be added to the jwt - iss: "http://localhost.shield" + iss: "http://localhost.frontier" # validity of the token validity: "1h" # external host used for oidc redirect uri, e.g. http://localhost:8000/v1beta1/auth/callback @@ -72,7 +72,7 @@ app: # validity of the verification duration validity: "10m" mail_otp: - subject: "Shield - Login Link" + subject: "Frontier - Login Link" # body is a go template with `Otp` as a variable body: "Please copy/paste the OneTimePassword in login form.

          {{.Otp}}

          This code will expire in 10 minutes." validity: "1h" @@ -95,7 +95,7 @@ app: from: "username@acme.org" db: driver: postgres - url: postgres://shield:@localhost:5432/shield?sslmode=disable + url: postgres://frontier:@localhost:5432/frontier?sslmode=disable max_query_timeout: 500ms spicedb: @@ -109,46 +109,46 @@ spicedb:
        -This page contains reference for all the application configurations for Shield. +This page contains reference for all the application configurations for Frontier. ### Version -| **Field** | **Type** | **Description** | **Required** | -| ----------- | -------- | ------------------------------------------------ | ------------ | -| **version** | `int` | Version number of the Shield configuration file. | No | +| **Field** | **Type** | **Description** | **Required** | +| ----------- | -------- | -------------------------------------------------- | ------------ | +| **version** | `int` | Version number of the Frontier configuration file. | No | ### Logging Configuration -| **Field** | **Type** | **Description** | **Required** | -|----------------------| -------- |--------------------------------------------------------------------------------------------| ------------ | -| **log.level** | `string` | Logging level for Shield. Possible values **`debug`, `info`, `warning`, `error`, `fatal`** | No | -| **log.audit_events** | `string` | Audit level for Shield. Possible values **`none`, `stdout`, `db`** | No | +| **Field** | **Type** | **Description** | **Required** | +| -------------------- | -------- | -------------------------------------------------------------------------------------------- | ------------ | +| **log.level** | `string` | Logging level for Frontier. Possible values **`debug`, `info`, `warning`, `error`, `fatal`** | No | +| **log.audit_events** | `string` | Audit level for Frontier. Possible values **`none`, `stdout`, `db`** | No | ### App Configuration -| **Field** | **Description** | **Example** | **Required** | -| ------------------------------------ | -------------------------------------------------------------------------------- | ----------- | ------------ | -| **app.port** | Port number for HTTP communication. | 8000 | Yes | -| **app.grpc_port** | Port number for gRPC communication. | 8001 | Yes | -| **app.metrics_port** | Port number for metrics reporting. | 9000 | Yes | -| **app.host** | Host address for the Shield application. | 127.0.0.1 | Yes | -| **app.identity_proxy_header** | Header key used for identity proxy. | | | -| **app.resources_config_path** | Full path prefixed with the scheme where resources config YAML files are stored.
        Either new resources can be added dynamically via the apis, or can be passed in this YAML file | | No | -| **app.resources_config_path_secret** | Secret required to access resources config. | | No | -| **app.disable_orgs_listing** | If set to true, disallows non-admin APIs to list all organizations. | | No | -| **app.disable_users_listing** | If set to true, disallows non-admin APIs to list all users. | | No | -| **app.cors_origin** | Origin value from where CORS is allowed. | | Yes(for Admin UI)| +| **Field** | **Description** | **Example** | **Required** | +| ------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------- | ----------------- | +| **app.port** | Port number for HTTP communication. | 8000 | Yes | +| **app.grpc_port** | Port number for gRPC communication. | 8001 | Yes | +| **app.metrics_port** | Port number for metrics reporting. | 9000 | Yes | +| **app.host** | Host address for the Frontier application. | 127.0.0.1 | Yes | +| **app.identity_proxy_header** | Header key used for identity proxy. | | | +| **app.resources_config_path** | Full path prefixed with the scheme where resources config YAML files are stored.
        Either new resources can be added dynamically via the apis, or can be passed in this YAML file | | No | +| **app.resources_config_path_secret** | Secret required to access resources config. | | No | +| **app.disable_orgs_listing** | If set to true, disallows non-admin APIs to list all organizations. | | No | +| **app.disable_users_listing** | If set to true, disallows non-admin APIs to list all users. | | No | +| **app.cors_origin** | Origin value from where CORS is allowed. | | Yes(for Admin UI) | ### Authentication Configurations -Configuration to allow authentication in Shield. +Configuration to allow authentication in Frontier. | **Field** | **Description** | **Required** | **Example** | | ------------------------------------------------------- | -------------------------------------------------- | ------------ | --------------------------------------------- | | **app.authentication.session.hash_secret_key** | Secret key for session hashing. | Yes | "hash-secret-should-be-32-chars--" | | **app.authentication.session.block_secret_key** | Secret key for session encryption. | Yes | "block-secret-should-be-32-chars-" | | **app.authentication.token.rsa_path** | Path to the RSA key file for token authentication. | Yes | "./temp/rsa" | -| **app.authentication.token.iss** | Issuer URL for token authentication. | Yes | "http://localhost.shield" | +| **app.authentication.token.iss** | Issuer URL for token authentication. | Yes | "http://localhost.frontier" | | **app.authentication.oidc_callback_host** | External host used for OIDC redirect URI. | Yes | "http://localhost:8000/v1beta1/auth/callback" | | **app.authentication.oidc_config.google.client_id** | Google client ID for OIDC authentication. | No | "xxxxx.apps.googleusercontent.com" | | **app.authentication.oidc_config.google.client_secret** | Google client secret for OIDC authentication. | No | "xxxxx" | diff --git a/docs/docs/reference/metaschemas.md b/docs/docs/reference/metaschemas.md index e9c2a9e05..56745aea1 100644 --- a/docs/docs/reference/metaschemas.md +++ b/docs/docs/reference/metaschemas.md @@ -3,21 +3,21 @@ import TabItem from "@theme/TabItem"; # MetaSchemas -MetaSchemas in Shield are default JSON-schemas designed to validate metadata that is included in the body of a resource. These schemas provide a standard way of describing the expected structure and content of metadata, which can be used to ensure consistency and accuracy of metadata across different resources. +MetaSchemas in Frontier are default JSON-schemas designed to validate metadata that is included in the body of a resource. These schemas provide a standard way of describing the expected structure and content of metadata, which can be used to ensure consistency and accuracy of metadata across different resources. ## Why MetaSchemas? -Metadata is an essential component of many resources, including user profiles, organization descriptions, group memberships, and project details in Shield. However, the structure and content of metadata can vary widely between different resources, making it challenging to validate and compare metadata across resources. +Metadata is an essential component of many resources, including user profiles, organization descriptions, group memberships, and project details in Frontier. However, the structure and content of metadata can vary widely between different resources, making it challenging to validate and compare metadata across resources. -Metaschemas address this challenge by providing a standardized way of describing the expected structure and content of metadata. With the help of this, Shield users can ensure that metadata is consistently structured and accurately represents the information it is intended to convey. +Metaschemas address this challenge by providing a standardized way of describing the expected structure and content of metadata. With the help of this, Frontier users can ensure that metadata is consistently structured and accurately represents the information it is intended to convey. ## How Metaschemas Work!! Metaschemas are based on the JSON schema format, typically including properties that describe the expected structure and content of metadata, such as data types, formats, required fields, and allowed values. Additionally it include properties that provide context about the metadata, such as a description of the metadata, a version number, and authorship information. -For the ease of users of Shield, we populate the Shield database with default MetaSchemas for Users, Group, Organisation and Roles in Shield during the database migrations. +For the ease of users of Frontier, we populate the Frontier database with default MetaSchemas for Users, Group, Organisation and Roles in Frontier during the database migrations. -One can easily updated these Schemas using the Shield MetaSchema APIs. +One can easily updated these Schemas using the Frontier MetaSchema APIs. ## Example MetaSchema @@ -73,8 +73,8 @@ A sample user MetaSchema is given below, and the second tab shows an example use
        -**Note:** The default user, organization, group and project MetaSchemas are in this [repository](https://github.com/raystack/shield/tree/feat/json-schema-validation/internal/store/postgres/metaschemas) +**Note:** The default user, organization, group and project MetaSchemas are in this [repository](https://github.com/raystack/frontier/tree/feat/json-schema-validation/internal/store/postgres/metaschemas) ## Disabling MetaSchemas -In a Shield instance if one wants to diable the MetaSchema validation in either of users, group, organization or roles metadata. It is recommended to updated the MetaSchema's **`additionalProperties`** field value to **`true`**. Shield provides APIs to manipulate these schemas at the endpoint **`/v1beta1/meta/schemas`**. See the [API Reference](../apis/shield-service-create-meta-schema.api.mdx) for more details. +In a Frontier instance if one wants to diable the MetaSchema validation in either of users, group, organization or roles metadata. It is recommended to updated the MetaSchema's **`additionalProperties`** field value to **`true`**. Frontier provides APIs to manipulate these schemas at the endpoint **`/v1beta1/meta/schemas`**. See the [API Reference](../apis/frontier-service-create-meta-schema.api.mdx) for more details. diff --git a/docs/docs/reference/shell-autocomplete.md b/docs/docs/reference/shell-autocomplete.md index 7b4bc3fd8..5660d3ca3 100644 --- a/docs/docs/reference/shell-autocomplete.md +++ b/docs/docs/reference/shell-autocomplete.md @@ -2,21 +2,21 @@ ### Bash auto-completion -The Shield completion script for Bash can be generated with `shield completion bash`. Sourcing this script in your shell enables the Shield completion. +The Frontier completion script for Bash can be generated with `frontier completion bash`. Sourcing this script in your shell enables the Frontier completion. However, the completion script depends on bash-completion, which means that you have to install this software first (you can test if you have bash-completion already installed by running `type _init_completion`). :::note -There are two versions of bash-completion, v1 and v2. V1 is for Bash 3.2 (which is the default on macOS), and v2 is for Bash 4.1+. The Shield completion script doesn't work correctly with bash-completion v1 and Bash 3.2. It requires bash-completion v2 and Bash 4.1+. **Thus, to be able to correctly use Shield completion on macOS, you have to install and use Bash 4.1+** (instructions). The following instructions assume that you use Bash 4.1+ (that is, any Bash version of 4.1 or newer). +There are two versions of bash-completion, v1 and v2. V1 is for Bash 3.2 (which is the default on macOS), and v2 is for Bash 4.1+. The Frontier completion script doesn't work correctly with bash-completion v1 and Bash 3.2. It requires bash-completion v2 and Bash 4.1+. **Thus, to be able to correctly use Frontier completion on macOS, you have to install and use Bash 4.1+** (instructions). The following instructions assume that you use Bash 4.1+ (that is, any Bash version of 4.1 or newer). ::: -You now have to ensure that the Shield completion script gets sourced in all your shell sessions. There are multiple ways to achieve this: +You now have to ensure that the Frontier completion script gets sourced in all your shell sessions. There are multiple ways to achieve this: - Source the completion script in your ~/.bash_profile file: ``` -echo 'source <(./shield completion bash)' >> ~/.bash_profile +echo 'source <(./frontier completion bash)' >> ~/.bash_profile ``` - Add the completion script to the /usr/local/etc/bash_completion.d directory: @@ -24,21 +24,21 @@ echo 'source <(./shield completion bash)' >> ~/.bash_profile ``` # To load completions for each session, execute once: # Linux: -$ ./shield completion bash > /etc/bash_completion.d/_shield +$ ./frontier completion bash > /etc/bash_completion.d/_frontier # macOS: -$ ./shield completion bash > /usr/local/etc/bash_completion.d/_shield +$ ./frontier completion bash > /usr/local/etc/bash_completion.d/_frontier ``` -- If you installed Shield with Homebrew (as explained in [getting started](../installation.md#macos)), then the shield completion script should already be in /usr/local/etc/bash_completion.d/\_shield. In that case, you don't need to do anything. +- If you installed Frontier with Homebrew (as explained in [getting started](../installation.md#macos)), then the frontier completion script should already be in /usr/local/etc/bash_completion.d/\_frontier. In that case, you don't need to do anything. > Note: The Homebrew installation of bash-completion v2 sources all the files in the BASH_COMPLETION_COMPAT_DIR directory, that's why the latter two methods work. -In any case, after reloading your shell, Shield completion should be working. +In any case, after reloading your shell, Frontier completion should be working. ### Zsh Auto-completion -The Shield completion script for Zsh can be generated with the command `shield completion zsh`. Sourcing the completion script in your shell enables shield autocompletion. +The Frontier completion script for Zsh can be generated with the command `frontier completion zsh`. Sourcing the completion script in your shell enables frontier autocompletion. - If shell completion is not already enabled in your environment, you will need to enable it. You can execute the following once: @@ -51,7 +51,7 @@ The Shield completion script for Zsh can be generated with the command `shield c - To load completions for each session, execute once: ``` - $ shield completion zsh > "${fpath[1]}/_shield" + $ frontier completion zsh > "${fpath[1]}/_frontier" ``` - Now start a new shell for this setup to take effect and execute the below command to do sourcing in all your shell session: @@ -64,7 +64,7 @@ After setup is completed ``` # Run the following command in shell (bash/zsh) - $ shield [tab][tab] + $ frontier [tab][tab] ``` Output contains the list of all the core-commands which can be auto-completed now: @@ -73,7 +73,7 @@ Output contains the list of all the core-commands which can be auto-completed no A cloud native role-based authorization aware reverse-proxy service. Usage - shield [flags] + frontier [flags] Core commands group Manage groups @@ -93,7 +93,7 @@ Other commands version Print version information Help topics - auth Auth configs that need to be used with shield + auth Auth configs that need to be used with frontier environment List of supported environment variables reference Comprehensive reference of all commands @@ -101,9 +101,9 @@ Flags --help Show help for command Learn more - Use 'shield --help' for info about a command. - Read the manual at https://raystack.github.io/shield/ + Use 'frontier --help' for info about a command. + Read the manual at https://raystack.github.io/frontier/ Feedback - Open an issue here https://github.com/raystack/shield/issues + Open an issue here https://github.com/raystack/frontier/issues ``` diff --git a/docs/docs/reference/smtp.md b/docs/docs/reference/smtp.md index 860dcc37c..cb71a56fe 100644 --- a/docs/docs/reference/smtp.md +++ b/docs/docs/reference/smtp.md @@ -1,10 +1,11 @@ # SMTP Server Configurations -Shield can be used to send invites to users to join an organization currently or send OTPs (One Time Password) for verification. For this it implements a mailer service which provides the functionality to send emails using the configured [SMTP(Simple Mail Transfer Protocol)](https://datatracker.ietf.org/doc/html/rfc2821) server. This involves establishing a connection with the SMTP server, authenticating with the provided credentials, and delivering the email to the specified recipients. +Frontier can be used to send invites to users to join an organization currently or send OTPs (One Time Password) for verification. For this it implements a mailer service which provides the functionality to send emails using the configured [SMTP(Simple Mail Transfer Protocol)](https://datatracker.ietf.org/doc/html/rfc2821) server. This involves establishing a connection with the SMTP server, authenticating with the provided credentials, and delivering the email to the specified recipients. -This document provides instructions on how to configure the SMTP settings for sending emails using the mailer configuration in Shield. +This document provides instructions on how to configure the SMTP settings for sending emails using the mailer configuration in Frontier. ### Prerequisites + - SMTP server credentials (username and password) - SMTP server hostname and port information - Sender's Email address for the "from" header @@ -13,20 +14,20 @@ This document provides instructions on how to configure the SMTP settings for se To configure the SMTP settings for sending emails, follow the steps below: -1. Open the shield server configuration file. Locate the mailer section. +1. Open the frontier server configuration file. Locate the mailer section. 2. Update the following parameters within the mailer section: - - **smtp_host**: Set this value to the hostname of your SMTP server. For example: smtp.example.com - - **smtp_port**: Set this value to the port number used by your SMTP server. Typically, this is **587** for secure connections or **25** for insecure connections. - - **smtp_username**: Enter the username or email address associated with your SMTP server account. - - **smtp_password**: Enter the password for your SMTP server account. - - **smtp_insecure**: If your SMTP server does not use a secure connection, set this value to true. If a secure connection (TLS/SSL) is required, set it to false. - - **headers.from**: Set this value to the email address you want to appear in the "from" header when sending emails. For example, username@acme.org. + - **smtp_host**: Set this value to the hostname of your SMTP server. For example: smtp.example.com + - **smtp_port**: Set this value to the port number used by your SMTP server. Typically, this is **587** for secure connections or **25** for insecure connections. + - **smtp_username**: Enter the username or email address associated with your SMTP server account. + - **smtp_password**: Enter the password for your SMTP server account. + - **smtp_insecure**: If your SMTP server does not use a secure connection, set this value to true. If a secure connection (TLS/SSL) is required, set it to false. + - **headers.from**: Set this value to the email address you want to appear in the "from" header when sending emails. For example, username@acme.org. -Save the configuration file with the updated SMTP settings. And restart the Shield server. +Save the configuration file with the updated SMTP settings. And restart the Frontier server. -### SMTP Providers +### SMTP Providers - **Google Workspace SMTP:** to use Google Workspace SMTP for sending mails, read this [guide](https://support.google.com/a/answer/176600?hl=en) -- **Amazon SES service:** to use Amazon SES for sending mails, follow this [guide](https://docs.aws.amazon.com/ses/latest/dg/send-email-smtp.html) +- **Amazon SES service:** to use Amazon SES for sending mails, follow this [guide](https://docs.aws.amazon.com/ses/latest/dg/send-email-smtp.html) - **MailGun:** to use Mailgun, follow this [guide](https://www.miniorange.com/iam/content-library/smtp-gateways/setup-mailgun-as-smtp) -- **PostMark:** to use PostMark SMTP service for sending mails from Shield, read this [guide](https://postmarkapp.com/developer/user-guide/send-email-with-smtp) \ No newline at end of file +- **PostMark:** to use PostMark SMTP service for sending mails from Frontier, read this [guide](https://postmarkapp.com/developer/user-guide/send-email-with-smtp) diff --git a/docs/docs/tenants/managing-resource.md b/docs/docs/tenants/managing-resource.md index cc3ddc379..a7150850d 100644 --- a/docs/docs/tenants/managing-resource.md +++ b/docs/docs/tenants/managing-resource.md @@ -4,7 +4,7 @@ import CodeBlock from '@theme/CodeBlock'; # Manage Resources -A resource in Shield looks like +A resource in Frontier looks like @@ -66,7 +66,7 @@ A resource in Shield looks like ### Create resources -There are two ways to create a resource in the shield, +There are two ways to create a resource in the frontier, #### API Interface @@ -76,7 +76,7 @@ There are two ways to create a resource in the shield, {`$ curl --location --request POST 'http://localhost:8000/v1beta1/projects/1b89026b-6713-4327-9d7e-ed03345da288/resources' --header 'Content-Type: application/json' --header 'Accept: application/json' ---header 'X-Shield-Email: admin@raystack.org' +--header 'X-Frontier-Email: admin@raystack.org' --data-raw '{ "name": "test-resource-beta", "projectId": "1b89026b-6713-4327-9d7e-ed03345da288", diff --git a/docs/docs/tenants/org.md b/docs/docs/tenants/org.md index 884916135..41b060b9b 100644 --- a/docs/docs/tenants/org.md +++ b/docs/docs/tenants/org.md @@ -3,17 +3,18 @@ import TabItem from '@theme/TabItem'; # Organization -## Overview +## Overview -An Organization in Shield is a top-level resource. Each Project, Group, User, and Audit logs (coming soon) belongs to an Organization. There can be multiple tenants in each Shield deployement and an Organization will usually represent one of your tenant. +An Organization in Frontier is a top-level resource. Each Project, Group, User, and Audit logs (coming soon) belongs to an Organization. There can be multiple tenants in each Frontier deployement and an Organization will usually represent one of your tenant. An Organization serves as a container for users, groups, projects and resources. Each organization can have its own set of admins and access control policies. Users from one organization are seperated from others. -An Organization slug is must be unique in the entire Shield deployment. No two organization can have same the slug. Whenever a user creates an Organization, one is assigned the role of the Organization Admin by default. +An Organization slug is must be unique in the entire Frontier deployment. No two organization can have same the slug. Whenever a user creates an Organization, one is assigned the role of the Organization Admin by default. Users are shared between organizations: Any user may belong to multiple organizations and will be able to use the same identity to navigate between organizations. --- + ### Permissions and Roles at Organization level | **Role** | **Permissions** | **Description** | @@ -25,6 +26,7 @@ Users are shared between organizations: Any user may belong to multiple organiza Besides this an Organization Owner can add custom permissions and roles at the organization level. --- + ### Deactivating an Organization Disabling an organization suspends its access to IAM services and restricts its ability to perform IAM-related actions. This can be done for various reasons, such as temporary suspension of services, organizational restructuring, or security considerations. @@ -32,6 +34,7 @@ Disabling an organization suspends its access to IAM services and restricts its Enabling or disabling an organization helps administrators manage the access and privileges of the organization's members and controls their interaction with IAM services and resources. --- + ### Deleting an Organization :::danger @@ -42,7 +45,7 @@ Caution should be exercised when deleting an organization, as it cannot be undon ## Managing Organization -An Organization in Shield is a top-level resource. Each Project, Group, User, and Audit logs (coming soon) belongs to an Organization. There can be multiple tenants in each Shield deployement and an Organization will usually represent one of your tenant. +An Organization in Frontier is a top-level resource. Each Project, Group, User, and Audit logs (coming soon) belongs to an Organization. There can be multiple tenants in each Frontier deployement and an Organization will usually represent one of your tenant. @@ -50,7 +53,7 @@ An Organization in Shield is a top-level resource. Each Project, Group, User, an | Field | Type | Description | | ------------ | ------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --- | | **id** | uuid | Unique Organization identifier | -| **name** | string | The name of the organization. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
        _Example:"shield-org1-acme"_ | +| **name** | string | The name of the organization. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
        _Example:"frontier-org1-acme"_ | | **title** | string | The title can contain any UTF-8 character, used to provide a human-readable name for the organization. Can also be left empty.
        _Example: "Acme Inc"_ | | | **metadata** | object | Metadata object for organizations that can hold key value pairs defined in Organization Metaschema. The metadata object can be used to store arbitrary information about the organization such as labels, descriptions etc. The default Organization Metaschema contains labels and descripton fields. Update the Organization Metaschema to add more fields.
        _Example:{"labels": {"key": "value"}, "description": "Organization description"}_ | @@ -75,7 +78,7 @@ An Organization in Shield is a top-level resource. Each Project, Group, User, an
        -**Note:** Organization metadata values are validated using MetaSchemas in Shield [Read More](../reference/metaschemas.md) +**Note:** Organization metadata values are validated using MetaSchemas in Frontier [Read More](../reference/metaschemas.md) :::tip Some of these APIs require special privileges to access these endpoints and to authorize these requests, users may need a Client ID/Secret or an Access token to proceed. Read [**Authorization for APIs**](../reference/api-auth.md) to learn more. @@ -83,13 +86,13 @@ Some of these APIs require special privileges to access these endpoints and to a ### Create an Organization -Any (human) user can create an Organization in Shield. The user must exist in Shield before procceding to create an Organization. This user will be assigned the role of **Organization Admin** once the action is completed successful and will contain all the necessary permissions to manage the org. +Any (human) user can create an Organization in Frontier. The user must exist in Frontier before procceding to create an Organization. This user will be assigned the role of **Organization Admin** once the action is completed successful and will contain all the necessary permissions to manage the org. **Required Authorization:** User request just needs to be authenticated and no particular roles/permission are required to proceed. -You can create organizations using either the Admin Portal, Shield Command Line Interface or via the HTTP APIs. +You can create organizations using either the Admin Portal, Frontier Command Line Interface or via the HTTP APIs. -1. Using `shield organization create` CLI command +1. Using `frontier organization create` CLI command 2. Calling to `POST /v1beta1/organizations` API @@ -111,7 +114,7 @@ $ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/organizations' \ ```bash -$ shield organization create --file= +$ frontier organization create --file= ``` @@ -123,11 +126,12 @@ $ shield organization create --file= 3. Enter basic information for your organization, and select **Add Organization**. --- + ### Add Users to an Organization -Add users to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists. This API accepts a list of comma seperated (human) user IDs to be added to the organization. In case a user is already a member of the organization, no action will be taken for that particular user. +Add users to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists. This API accepts a list of comma seperated (human) user IDs to be added to the organization. In case a user is already a member of the organization, no action will be taken for that particular user. -**Required Authorization** : A user/service account with the role `Organization Admin` or `Organization Manager` is authorized to take this action. Also any user being assigned with custom role with `update` permission at `app/organization` namespace can also perform this action. +**Required Authorization** : A user/service account with the role `Organization Admin` or `Organization Manager` is authorized to take this action. Also any user being assigned with custom role with `update` permission at `app/organization` namespace can also perform this action. 1. Using the **`POST /v1beta1/organizations/:id/users`** API @@ -142,12 +146,14 @@ $ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/organizations/:id/users' \ ] }' ``` + --- + ### Invite user to an Organization -Invite user with email to an organization and optionally to the groups within that Org. A user must exists in Shield before sending the invitation otherwise the request will fail. Invitations expire in 7 days. +Invite user with email to an organization and optionally to the groups within that Org. A user must exists in Frontier before sending the invitation otherwise the request will fail. Invitations expire in 7 days. -**Required Authorization** : A user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `invitationcreate` permission at `app/organization` namespace can also perform this action. +**Required Authorization** : A user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `invitationcreate` permission at `app/organization` namespace can also perform this action. 1. Using **`POST /v1beta1/organizations/:orgId/invitations`** API @@ -164,38 +170,44 @@ $ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/organizations/:orgId/invitation ] }' ``` + --- + ### List pending invitations -This API can be used to list all the pending invitations queued for an organization which the user haven't take any action on. Once the user accepts an invitation or rejects it, the invitation is deleted from the Shield database. +This API can be used to list all the pending invitations queued for an organization which the user haven't take any action on. Once the user accepts an invitation or rejects it, the invitation is deleted from the Frontier database. -**Required Authorization** : A user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `invitationlist` or `invitationcreate` permission at the `app/organization` namespace can also perform this action. +**Required Authorization** : A user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `invitationlist` or `invitationcreate` permission at the `app/organization` namespace can also perform this action. 1. Using **`GET /v1beta1/organizations/:orgId/invitations`** API ```bash $ curl -L -X GET 'http://127.0.0.1:7400/v1beta1/organizations/:orgId/invitations' \ -H 'Accept: application/json' \ --H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' +-H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' ``` + --- + ### Delete pending invitations Delete a pending invitation queued for an organization. -**Required Authorization** : Any user/service account with the role `Organization Admin` is authorized to take this action. Also the user for whom the invite was created can delete the invite. Any user being assigned with custom role with `invitationcreate` permission at the `app/organization` namespace for that particular organization can also perform this action. +**Required Authorization** : Any user/service account with the role `Organization Admin` is authorized to take this action. Also the user for whom the invite was created can delete the invite. Any user being assigned with custom role with `invitationcreate` permission at the `app/organization` namespace for that particular organization can also perform this action. 1. Using **`DELETE /v1beta1/organizations/:orgId/invitations/:id`** API ```bash $ curl -L -X DELETE 'http://127.0.0.1:7400/v1beta1/organizations/:orgId/invitations/:id' \ -H 'Accept: application/json' \ --H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' +-H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' ``` + --- + ### View an organization users -This API only returns a list of human users in an Organization. For listing service users of the Org refer this [API](../apis/shield-service-list-service-users.api.mdx) +This API only returns a list of human users in an Organization. For listing service users of the Org refer this [API](../apis/frontier-service-list-service-users.api.mdx) **Required Authorization** : Any user/service user with `get` permission at Organization level can perform this action. Meaning all the Organization users/service users with role `Organization Admin` , `Organization Manager` or an `Organization Viewer` can list the org users. @@ -204,12 +216,14 @@ This API only returns a list of human users in an Organization. For listing serv ```bash curl -L -X GET 'http://127.0.0.1:7400/v1beta1/organizations/:id/users' \ -H 'Accept: application/json' \ --H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' +-H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' ``` + --- + ### Create custom role for an Organization -**Required Authorization** : Any user/service user with the role `Organization Admin` is authorized to take this action. Also any user being assigned a custom role with `rolemanage` permission at the `app/organization` namespace can also perform this action. +**Required Authorization** : Any user/service user with the role `Organization Admin` is authorized to take this action. Also any user being assigned a custom role with `rolemanage` permission at the `app/organization` namespace can also perform this action. 1. Using the **`POST /v1beta1/permissions`** API.
        **Note:** Specify the namespace **`app/organization`** to create a org level custom permission @@ -229,12 +243,14 @@ $ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/organizations/92f69c3a-334b-4f2 "title": "Organization Member" }' ``` + --- + ### Enable or disable an Organization Sets the state of the organization as disabled. The existing users in the org will not be able to access any organization resources when the org is disabled. -**Required Authorization** : Any user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `delete` permission at the `app/organization` namespace can also perform this action. +**Required Authorization** : Any user/service account with the role `Organization Admin` is authorized to take this action. Also any user being assigned with custom role with `delete` permission at the `app/organization` namespace can also perform this action. 1. Using **`POST /v1beta1/organizations/:id/disable`** API @@ -249,16 +265,17 @@ $ curl --location 'http://localhost:7400/v1beta1/organizations/adf997e8-59d1-446 To Enable the Org again send the request on **`POST /v1beta1/organizations/:id/enable`** API in same way as described above --- + ### Remove Organization User -Removes a user from the organization. The user will be removed from all the groups inside the Organization ans will lose all the access to underlying projects and resources, the user will not be deleted from the Shield instance. +Removes a user from the organization. The user will be removed from all the groups inside the Organization ans will lose all the access to underlying projects and resources, the user will not be deleted from the Frontier instance. -**Required Authorization** : A user/service account with the role `Organization Admin` or `Organization Manager` is authorized to take this action. Also any user being assigned with custom role with `update` permission at `app/organization` namespace can also perform this action. +**Required Authorization** : A user/service account with the role `Organization Admin` or `Organization Manager` is authorized to take this action. Also any user being assigned with custom role with `update` permission at `app/organization` namespace can also perform this action. 1. Calling to **`DELETE {HOST}/v1beta1/organizations/:id/users/:userId`** API ```bash $ curl -L -X DELETE 'http://127.0.0.1:7400/v1beta1/organizations/:id/users/:userId' \ -H 'Accept: application/json' \ --H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' +-H 'Authorization: Basic dGVzdC1jbGllbnQtaWQ6dGVzdC1zZWNyZXQ=' ``` diff --git a/docs/docs/tenants/project.md b/docs/docs/tenants/project.md index 183f0b5cb..52d7af8cd 100644 --- a/docs/docs/tenants/project.md +++ b/docs/docs/tenants/project.md @@ -3,11 +3,11 @@ import TabItem from '@theme/TabItem'; # Project -Projects in Shield are sub-resources within an organization. They allow for logical grouping of resources and users (including groups and service users). Each project can have its own set of permissions and access controls, enabling fine-grained control over resource allocation and user management.A single organization can contain multiple projects. +Projects in Frontier are sub-resources within an organization. They allow for logical grouping of resources and users (including groups and service users). Each project can have its own set of permissions and access controls, enabling fine-grained control over resource allocation and user management.A single organization can contain multiple projects. -Principals(user, groups, service users) can be assigned a pre-defined or a custom role at the project level if multiple resources in a project are to share the same role for a user. A Shield policy can be created for that Project namespace for enabling user to have same role for all the underlying resources. Say a user A has `app_project_viewer` role for both the applications say X and Y in a project. +Principals(user, groups, service users) can be assigned a pre-defined or a custom role at the project level if multiple resources in a project are to share the same role for a user. A Frontier policy can be created for that Project namespace for enabling user to have same role for all the underlying resources. Say a user A has `app_project_viewer` role for both the applications say X and Y in a project. -If fine-grained access is required, a Shield policy can be created to attach a principal to a particular resource along with the user role. This giving flexibility to manage user authorization to organization resources at minute levels. Using two different policies, the same user A can have `app_project_viewer` role for resource X and a `app_project_manager` role for application Y. +If fine-grained access is required, a Frontier policy can be created to attach a principal to a particular resource along with the user role. This giving flexibility to manage user authorization to organization resources at minute levels. Using two different policies, the same user A can have `app_project_viewer` role for resource X and a `app_project_manager` role for application Y. ### Predefined Permissions and Roles at Project level @@ -41,7 +41,7 @@ Caution should be exercised when deleting a project, as it cannot be undone. Del - List a project admins - Enable or disable a project -A project in Shield looks like +A project in Frontier looks like @@ -49,7 +49,7 @@ A project in Shield looks like | Field | Type | Description | | ------------ | ------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **id** | uuid | Unique project identifier | -| **name** | string | The name of the project. This name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter.
        _Example:"project-alpha"_ | +| **name** | string | The name of the project. This name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter.
        _Example:"project-alpha"_ | | **title** | string | The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
        _Example:"Project Alpha"_ | | **orgId** | uuid | Unique Organization identifier to which the project belongs | | **metadata** | object | Metadata object for project that can hold key value pairs pre-defined in Project Metaschema. The metadata object can be used to store arbitrary information about the user such as label, description etc. By default the user metaschema contains labels and descriptions for the project. Update the same to add more fields to the user metadata object.
        _Example:{"label": {"key1": "value1"}, "description": "Project Description"}_ | @@ -105,7 +105,7 @@ $ curl --location --request POST 'http://localhost:8000/v1beta1/projects' ```bash -$ shield project create --file project.yaml --header key:value +$ frontier project create --file project.yaml --header key:value ``` @@ -125,7 +125,7 @@ $ curl --location --request GET 'http://localhost:8000/v1beta1/admin/projects' ```bash -$ shield project list +$ frontier project list ``` @@ -145,7 +145,7 @@ $ curl --location --request GET 'http://localhost:8000/v1beta1/projects/457944c2 ```bash -$ shield project view 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --metadata +$ frontier project view 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --metadata ``` @@ -174,7 +174,7 @@ $ curl --location --request PUT 'http://localhost:8000/v1beta1/projects/457944c2 ```bash -$ shield project edit 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --file=project.yaml```` +$ frontier project edit 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --file=project.yaml```` ```
        diff --git a/docs/docs/tour/add-to-group.md b/docs/docs/tour/add-to-group.md index df3867d71..d8e5c37f7 100644 --- a/docs/docs/tour/add-to-group.md +++ b/docs/docs/tour/add-to-group.md @@ -1,6 +1,6 @@ # Adding to a group -In this part we'll learn to add `members` and `managers` to a group. For this, we'll be using relations API. Also, we have added two new users to shield `john.doe@raystack.org` and `doe.john@raystack.org`. +In this part we'll learn to add `members` and `managers` to a group. For this, we'll be using relations API. Also, we have added two new users to frontier `john.doe@raystack.org` and `doe.john@raystack.org`. ## Add a Member to a Group diff --git a/docs/docs/tour/check-permissions.md b/docs/docs/tour/check-permissions.md index f998a5124..8addc55c3 100644 --- a/docs/docs/tour/check-permissions.md +++ b/docs/docs/tour/check-permissions.md @@ -1,8 +1,8 @@ # Checking permissions in SpiceDB -In this part of the tour, we'll learn how can we use Shield's permission checking system. Through this we are going to verify all the relations we have created till now. +In this part of the tour, we'll learn how can we use Frontier's permission checking system. Through this we are going to verify all the relations we have created till now. -We can either use the check API or `zed` tool. In this tour we will be using the `zed` tool. +We can either use the check API or `zed` tool. In this tour we will be using the `zed` tool. ## 1 Check the owner of the organization @@ -17,7 +17,7 @@ true ## 2 Check the organization of the project ```sh -shield % zed permission check project:1b89026b-6713-4327-9d7e-ed03345da288 organization organization:4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 +frontier % zed permission check project:1b89026b-6713-4327-9d7e-ed03345da288 organization organization:4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 ``` ```sh @@ -76,4 +76,3 @@ zed permission check entropy/firehose:28105b9a-1717-47cf-a5d9-49249b6638df owner ```sh true ``` - diff --git a/docs/docs/tour/creating-group.md b/docs/docs/tour/creating-group.md index 6a3f9f417..707355695 100644 --- a/docs/docs/tour/creating-group.md +++ b/docs/docs/tour/creating-group.md @@ -1,6 +1,6 @@ # Creating a group in organization -In this, we will be using the organization id of the organization we created. Groups in shield belong to one organization. +In this, we will be using the organization id of the organization we created. Groups in frontier belong to one organization. ```sh curl --location --request POST 'http://localhost:8000/v1beta1/organizations/4eb3c3b4-962b-4b45-b55b-4c07d3810ca8/groups' @@ -37,10 +37,10 @@ curl --location --request POST 'http://localhost:8000/v1beta1/organizations/4eb3 It got an entry for the role `group:organization` for the organization `4eb3c3b4-962b-4b45-b55b-4c07d3810ca8`. ```sh - id | subject_namespace_id | subject_id | object_namespace_id | object_id | role_id | created_at | updated_at | deleted_at + id | subject_namespace_id | subject_id | object_namespace_id | object_id | role_id | created_at | updated_at | deleted_at --------------------------------------+----------------------+--------------------------------------+---------------------+--------------------------------------+------------------------+-------------------------------+-------------------------------+------------ - 460c44a6-f074-4abe-8f8e-949e7a3f5ec2 | user | 2fd7f306-61db-4198-9623-6f5f1809df11 | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | organization:owner | 2022-12-07 14:10:42.881572+00 | 2022-12-07 14:10:42.881572+00 | - 10797ec9-6744-4064-8408-c0919e71fbca | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | project | 1b89026b-6713-4327-9d7e-ed03345da288 | project:organization | 2022-12-07 14:31:46.517828+00 | 2022-12-07 14:31:46.517828+00 | + 460c44a6-f074-4abe-8f8e-949e7a3f5ec2 | user | 2fd7f306-61db-4198-9623-6f5f1809df11 | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | organization:owner | 2022-12-07 14:10:42.881572+00 | 2022-12-07 14:10:42.881572+00 | + 10797ec9-6744-4064-8408-c0919e71fbca | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | project | 1b89026b-6713-4327-9d7e-ed03345da288 | project:organization | 2022-12-07 14:31:46.517828+00 | 2022-12-07 14:31:46.517828+00 | 29b82d6e-b6fd-4009-9727-1e619c802e23 | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | group | 86e2f95d-92c7-4c59-8fed-b7686cccbf4f | group:organization | 2022-12-07 17:03:59.537254+00 | 2022-12-07 17:03:59.537254+00 | (3 rows) ``` diff --git a/docs/docs/tour/creating-organization.md b/docs/docs/tour/creating-organization.md index 8753096ab..085037e9d 100644 --- a/docs/docs/tour/creating-organization.md +++ b/docs/docs/tour/creating-organization.md @@ -1,15 +1,15 @@ # Creating an organization -Before creating a new organization, let's create an organization admin user. Note, the metadata in the user body is validated using the default MetaSchemas defined in Shield. These metadata schema validations can always be changed or disabled. For more details read MetaSchema Guides. +Before creating a new organization, let's create an organization admin user. Note, the metadata in the user body is validated using the default MetaSchemas defined in Frontier. These metadata schema validations can always be changed or disabled. For more details read MetaSchema Guides. -## User creation in Shield +## User creation in Frontier ```sh curl --location --request POST 'http://localhost:8000/v1beta1/users' --header 'Content-Type: application/json' ---header 'X-Shield-Email: admin@raystack.org' +--header 'X-Frontier-Email: admin@raystack.org' --data-raw '{ - "name": "Shield Org Admin", + "name": "Frontier Org Admin", "email": "admin@raystack.org", "metadata": { "label": { @@ -27,7 +27,7 @@ Expected response for the user created is of type. { "user": { "id": "2fd7f306-61db-4198-9623-6f5f1809df11", - "name": "Shield Org Admin", + "name": "Frontier Org Admin", "slug": "admin_raystack_io", "email": "admin@raystack.org", "metadata": { @@ -44,12 +44,12 @@ Expected response for the user created is of type. From now onwards, we can use the above user to perform all the admin operations. Let's begin with organization creation. -## Organization creation in Shield +## Organization creation in Frontier ```sh curl --location --request POST 'http://localhost:8000/v1beta1/organizations' --header 'Content-Type: application/json' ---header 'X-Shield-Email: admin@raystack.org' +--header 'X-Frontier-Email: admin@raystack.org' --data-raw '{ "name": "Raystack", "slug": "raystack", diff --git a/docs/docs/tour/creating-project.md b/docs/docs/tour/creating-project.md index 64881c64a..f448aad52 100644 --- a/docs/docs/tour/creating-project.md +++ b/docs/docs/tour/creating-project.md @@ -1,6 +1,6 @@ # Creating a project in organization -In this, we will be using the organization id of the organization we just created. Projects in shield belong to one organization. +In this, we will be using the organization id of the organization we just created. Projects in frontier belong to one organization. ```sh curl --location --request POST 'http://localhost:8000/v1beta1/projects' @@ -37,9 +37,9 @@ curl --location --request POST 'http://localhost:8000/v1beta1/projects' It got an entry for the role `project:organization` for the organization `4eb3c3b4-962b-4b45-b55b-4c07d3810ca8`. ```sh - id | subject_namespace_id | subject_id | object_namespace_id | object_id | role_id | created_at | updated_at | deleted_at + id | subject_namespace_id | subject_id | object_namespace_id | object_id | role_id | created_at | updated_at | deleted_at --------------------------------------+----------------------+--------------------------------------+---------------------+--------------------------------------+------------------------+-------------------------------+-------------------------------+------------ - 460c44a6-f074-4abe-8f8e-949e7a3f5ec2 | user | 2fd7f306-61db-4198-9623-6f5f1809df11 | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | organization:owner | 2022-12-07 14:10:42.881572+00 | 2022-12-07 14:10:42.881572+00 | - 10797ec9-6744-4064-8408-c0919e71fbca | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | project | 1b89026b-6713-4327-9d7e-ed03345da288 | project:organization | 2022-12-07 14:31:46.517828+00 | 2022-12-07 14:31:46.517828+00 | + 460c44a6-f074-4abe-8f8e-949e7a3f5ec2 | user | 2fd7f306-61db-4198-9623-6f5f1809df11 | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | organization:owner | 2022-12-07 14:10:42.881572+00 | 2022-12-07 14:10:42.881572+00 | + 10797ec9-6744-4064-8408-c0919e71fbca | organization | 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8 | project | 1b89026b-6713-4327-9d7e-ed03345da288 | project:organization | 2022-12-07 14:31:46.517828+00 | 2022-12-07 14:31:46.517828+00 | (2 rows) ``` diff --git a/docs/docs/tour/creating-user.md b/docs/docs/tour/creating-user.md index 4b8b35055..1f9d3863a 100644 --- a/docs/docs/tour/creating-user.md +++ b/docs/docs/tour/creating-user.md @@ -3,15 +3,15 @@ ## Pre-requisites - [Set-up an external identity provider for authentication](./setup-idp-oidc.md) -- [Run Migrations and Start the Shield server](../configurations.md#starting-the-server) +- [Run Migrations and Start the Frontier server](../configurations.md#starting-the-server) -When a user initiates the authentication process, Shield redirects them to the OIDC authorization endpoint provided by your external IDP (Google in this example). +When a user initiates the authentication process, Frontier redirects them to the OIDC authorization endpoint provided by your external IDP (Google in this example). Upon successful verification, you will receive a [JWT (JSON Web Token)](../concepts/glossary.md#jwt-token) from the IDP. This JWT can be used for subsequent authentication and authorization requests to your application's protected resources. -Let's test how the entire flow for the end user look like using Shield. Make sure you have the Shield server up and running by now. +Let's test how the entire flow for the end user look like using Frontier. Make sure you have the Frontier server up and running by now. -From the current Shield directory which contains the example application, open the `example/authn` folder and run the `main.go` file. +From the current Frontier directory which contains the example application, open the `example/authn` folder and run the `main.go` file. ```bash $ cd ./example/authn @@ -26,12 +26,12 @@ $ go run main.go ![Authn-2 flow diagram](./authn-2.png) -3. Select an account to login with Google and proceed. If the user fills in valid credentials, the external IDP returns an authorization code to Shield. +3. Select an account to login with Google and proceed. If the user fills in valid credentials, the external IDP returns an authorization code to Frontier. -4. Upon receiving these authorization codes from external IDPs (Google here), Shield issues JSON Web Token that contains claims about the authenticated user. It typically includes information such as the user's unique identifier (sub), email address (email), name (name), profile picture URL (picture), and other user-related information. -The ID token is digitally signed by the issuer(Shield), allowing the application to verify its authenticity.

        The access token can be used to make authorized API requests to services/application on behalf of the user, if needed. In this example demo, the frontend receives the JWT token from Shield server and will store it in the client session and pass the session id in cookies. +4. Upon receiving these authorization codes from external IDPs (Google here), Frontier issues JSON Web Token that contains claims about the authenticated user. It typically includes information such as the user's unique identifier (sub), email address (email), name (name), profile picture URL (picture), and other user-related information. + The ID token is digitally signed by the issuer(Frontier), allowing the application to verify its authenticity.

        The access token can be used to make authorized API requests to services/application on behalf of the user, if needed. In this example demo, the frontend receives the JWT token from Frontier server and will store it in the client session and pass the session id in cookies. -Upon successful login, this demo app displays the payload of the JSON Web Token generated by Shield: +Upon successful login, this demo app displays the payload of the JSON Web Token generated by Frontier: ![Authn-3 flow diagram](./authn-3.png) @@ -41,12 +41,12 @@ Let's break down the parts of this JWT token and see what it reveals about the u | --------- | --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **exp** | Expiration Time | This claim indicates the timestamp when the token will expire.
        In this case, the token is set to expire on June 17, 2023, at 16:22:15 UTC. | | **iat** | Issued At | This claim represents the timestamp when the token was issued. It specifies the exact moment the token was created.
        In this case, the token was issued on May 18, 2023, at 16:22:15 UTC. | -| **iss** | Issuer | This claim identifies the issuer of the token. It specifies the URL of the entity that issued the token.
        In this case, the token was issued by "http://localhost.shield". | +| **iss** | Issuer | This claim identifies the issuer of the token. It specifies the URL of the entity that issued the token.
        In this case, the token was issued by "http://localhost.frontier". | | **jti** | JWT ID | This claim provides a unique identifier for the JWT. It distinguishes the token from other tokens and can be useful for tracking and revoking tokens if necessary.
        The JWT ID of this token is "176c9c51-281e-440a-b70a-106efa3c80b2". | | **nbf** | Not Before | This claim indicates the timestamp before which the token must not be accepted. It ensures that the token is not considered valid until a certain time has passed.
        In this case, the token is not valid before May 18, 2023, at 16:22:15 UTC. | | **org** | Organization | This claim indicates the organization to which the user belongs to. Since we haven't yet created an org, this field's value isn't provided in the JWT token | | **sub** | Subject | This claim identifies the subject of the token, which typically refers to the user or entity the token represents (unique user uuid) which in this case "6829c011-4cc4-49d7-8756-14c811558d9c". | -The profile section verifies that the user is logged in and a user is created in Shield!! +The profile section verifies that the user is logged in and a user is created in Frontier!! -![Authn-4 flow diagram](./authn-4.png) \ No newline at end of file +![Authn-4 flow diagram](./authn-4.png) diff --git a/docs/docs/tour/intro.md b/docs/docs/tour/intro.md index 660f13eba..ad1ea03dc 100644 --- a/docs/docs/tour/intro.md +++ b/docs/docs/tour/intro.md @@ -1,12 +1,13 @@ # Introduction -Welcome to this tour of Shield. In this tour, we will take you through setting up the Shield's server and configuring it to a backend service demonstrating Shield as a proxy. +Welcome to this tour of Frontier. In this tour, we will take you through setting up the Frontier's server and configuring it to a backend service demonstrating Frontier as a proxy. We are going to cover this tour in the following steps, and recommend you to do the same. + - Server Setup and configuring a backend service -- Registering an organization in Shield +- Registering an organization in Frontier - Registering a project under that organization - Registering a group under this organization - Adding users to the group - Checking permissions using `Zed` tool -- Making a call to the backend service via Shield(proxy) +- Making a call to the backend service via Frontier(proxy) diff --git a/docs/docs/tour/setup-idp-oidc.md b/docs/docs/tour/setup-idp-oidc.md index 0d43cc056..0dc50945d 100644 --- a/docs/docs/tour/setup-idp-oidc.md +++ b/docs/docs/tour/setup-idp-oidc.md @@ -13,7 +13,7 @@ Before proceeding with the configuration, make sure you have the following: Follow the steps below to configure OIDC authentication via an external IDP: -1. **Set up an OIDC callback URL**: Determine the URL where the external IDP will redirect users after authentication. For example: **`http://localhost:8000/v1beta1/auth/callback`** . Replace localhost:8000 with the appropriate domain and port for your application. Ensure that this URL is accessible by your application and can receive requests.

        **Note:** For the purpose of this tutorial, we have setup [`examples/authn`](https://github.com/raystack/shield/tree/main/examples/authn) folder to test the enitre flow. The [redirect URL](../concepts/glossary.md#redirect-uri) will remain the same as the above example **`http://localhost:8000/v1beta1/auth/callback`** +1. **Set up an OIDC callback URL**: Determine the URL where the external IDP will redirect users after authentication. For example: **`http://localhost:8000/v1beta1/auth/callback`** . Replace localhost:8000 with the appropriate domain and port for your application. Ensure that this URL is accessible by your application and can receive requests.

        **Note:** For the purpose of this tutorial, we have setup [`examples/authn`](https://github.com/raystack/frontier/tree/main/examples/authn) folder to test the enitre flow. The [redirect URL](../concepts/glossary.md#redirect-uri) will remain the same as the above example **`http://localhost:8000/v1beta1/auth/callback`** 2. **Configure the OIDC authentication server:** Obtain the necessary configuration details from your external IDP. For Google, follow these steps: @@ -23,9 +23,9 @@ Follow the steps below to configure OIDC authentication via an external IDP: - Set the Authorized Redirect URI to the OIDC callback URL you determined in step 1. - Note the [issuer URL](../concepts/glossary.md#issuer-url), which for Google is "https://accounts.google.com". -3. **Update the shield configuration file:** +3. **Update the frontier configuration file:** - - Open the Shield server configuration file that handles authentication. + - Open the Frontier server configuration file that handles authentication. - Add the following OIDC-related configurations under **`app.authentication`** section: ```yaml @@ -43,7 +43,7 @@ Follow the steps below to configure OIDC authentication via an external IDP: - Update **issuer_url** if you're using a different IDP. :::tip Tip - Each external IDP may have its own specific configuration requirements. Consult the documentation of your chosen IDP for detailed instructions on how to configure OIDC authentication with Shield. + Each external IDP may have its own specific configuration requirements. Consult the documentation of your chosen IDP for detailed instructions on how to configure OIDC authentication with Frontier. ::: ## Generate the RSA keys @@ -51,20 +51,20 @@ Follow the steps below to configure OIDC authentication via an external IDP: Generate 2 RSA keys for Auth token generation using the following command and add the file **path** and **iss(issuer)** in the server config in the app_authentication section like this. ```bash -$ ./shield server keygen > ./temp/rsa +$ ./frontier server keygen > ./temp/rsa ``` ```yaml token: rsa_path: ./temp/rsa - iss: "http://localhost.shield" + iss: "http://localhost.frontier" ``` :::info Additional Info
        RSA key pairs and issuer -Once authenticated, the Shield server responds with a JWT token having user context.

        +Once authenticated, the Frontier server responds with a JWT token having user context.

        **RSA Key Pair:** OIDC relies on cryptographic mechanisms to sign and verify tokens, such as JWTs (JSON Web Tokens). @@ -75,7 +75,7 @@ In this configuration, the rsa_path parameter specifies the location of the RSA The **issuer URL** uniquely identifies the IDP or authorization server that issues the tokens. -By configuring the RSA key path and issuer URL, Shield can generate tokens with appropriate signatures and metadata, allowing services/applications to securely verify and authenticate the tokens received from the Shield server after user authentication. +By configuring the RSA key path and issuer URL, Frontier can generate tokens with appropriate signatures and metadata, allowing services/applications to securely verify and authenticate the tokens received from the Frontier server after user authentication.
        ::: diff --git a/docs/docs/tour/shield-as-proxy.md b/docs/docs/tour/shield-as-proxy.md index c6c0b348c..4d65d52f6 100644 --- a/docs/docs/tour/shield-as-proxy.md +++ b/docs/docs/tour/shield-as-proxy.md @@ -1,8 +1,8 @@ -# Shield as a proxy +# Frontier as a proxy -Untill now, we were using Shield's admin APIs. Those were responsible for managing Shield's entities. Next, we are use Shield as a proxy. +Untill now, we were using Frontier's admin APIs. Those were responsible for managing Frontier's entities. Next, we are use Frontier as a proxy. -We had attached the backend service `entropy` to Shield earlier, and now we are going to create a `firehose` resource in it. +We had attached the backend service `entropy` to Frontier earlier, and now we are going to create a `firehose` resource in it. Before, going ahead have a look at the configuration file below. Detailed explaining on this configuration file would be in resources/concepts. ```sh @@ -30,18 +30,18 @@ rules: key: firehose.name type: json_payload project: - key: X-Shield-Project + key: X-Frontier-Project type: header source: request organization: - key: X-Shield-Org + key: X-Frontier-Org type: header source: request resource_type: value: "firehose" type: constant group_attribute: - key: X-Shield-Group + key: X-Frontier-Group type: header source: request relations: @@ -55,12 +55,12 @@ Let's make the following request. ```sh curl --location --request POST 'http://localhost:5556/api/firehoses' --header 'Content-Type: application/json' ---header 'X-Shield-Email: admin@raystack.org' ---header 'X-Shield-Org: 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8' ---header 'X-Shield-Project: 1b89026b-6713-4327-9d7e-ed03345da288' ---header 'X-Shield-Group: 86e2f95d-92c7-4c59-8fed-b7686cccbf4f' +--header 'X-Frontier-Email: admin@raystack.org' +--header 'X-Frontier-Org: 4eb3c3b4-962b-4b45-b55b-4c07d3810ca8' +--header 'X-Frontier-Project: 1b89026b-6713-4327-9d7e-ed03345da288' +--header 'X-Frontier-Group: 86e2f95d-92c7-4c59-8fed-b7686cccbf4f' --data-raw '{ - "created_by": "Shield Org Admin", + "created_by": "Frontier Org Admin", "configuration": { "SOURCE_KAFKA_CONSUMER_CONFIG_AUTO_COMMIT_ENABLE": false, "SOURCE_KAFKA_CONSUMER_CONFIG_FETCH_MIN_BYTES": "1", @@ -90,9 +90,9 @@ curl --location --request POST 'http://localhost:5556/api/firehoses' Now this request will produce a series of events. -- It will hit Shield(proxy) at `/api/firehoses` path, since there are no middleware the request shall be forwarded to the backend. +- It will hit Frontier(proxy) at `/api/firehoses` path, since there are no middleware the request shall be forwarded to the backend. We expect that a resource will be created in `entropy` and we'll get a response. -- Now, hooks will be engaged. We only have a single `authz` hook, which creates a resource inside Shield. It will use resource name, org, project and type from either of request, response or as a constant, to create a resource. +- Now, hooks will be engaged. We only have a single `authz` hook, which creates a resource inside Frontier. It will use resource name, org, project and type from either of request, response or as a constant, to create a resource. - By deafult, no relation is created for this resource, but we can confire this. Here, we have configured to add the group with `owner` role. We'll get a firehose object sent by `entropy` as a response, though we don't have interest in that. @@ -102,7 +102,7 @@ We'll get a firehose object sent by `entropy` as a response, though we don't hav { "firehose": { "replicas": 2, - "created_by": "Shield Org Admin", + "created_by": "Frontier Org Admin", "title": "test-firehose-creation-xxxxx", "group_id": "5ea18244-8e7a-xxxx-xxxx-ddf4b3fe3698", "team": "data_engineering", diff --git a/docs/docs/users/group.md b/docs/docs/users/group.md index fd2409431..b8b3de46a 100644 --- a/docs/docs/users/group.md +++ b/docs/docs/users/group.md @@ -12,7 +12,7 @@ import CodeBlock from '@theme/CodeBlock'; - Remove a user from a group - Enable or disable a group -A group in Shield looks like +A group in Frontier looks like @@ -20,7 +20,7 @@ A group in Shield looks like | Field | Type | Description | | ------------ | ------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **id** | uuid | Unique group identifier | -| **name** | string | The name of the group. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores. | +| **name** | string | The name of the group. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores. | | **title** | string | The title can contain any UTF-8 character, used to provide a human-readable name for the group. Can also be left empty. | | **metadata** | object | Metadata object for groups that can hold key value pairs defined in Group Metaschema. The metadata object can be used to store arbitrary information about the group such as labels, descriptions etc. The default Group Metaschema contains labels and descripton fields. Update the Group Metaschema to add more fields.
        _Example:{"labels": {"key": "value"}, "description": "Group description"}_ | | **orgId** | uuid | The organization ID to which the group belongs to. | @@ -47,11 +47,11 @@ A group in Shield looks like
        -**Note:** group metadata values are validated using MetaSchemas in Shield [Read More](../reference/metaschemas.md) +**Note:** group metadata values are validated using MetaSchemas in Frontier [Read More](../reference/metaschemas.md) ### Create an organization group -1. Using `shield group create` CLI command +1. Using `frontier group create` CLI command 2. Calling to `POST /v1beta1/organizations/orgId/groups` API @@ -84,7 +84,7 @@ iii. Enter basic information for the group, and select **Add Group** ### List an organization groups -1. Using `shield group list` CLI command +1. Using `frontier group list` CLI command 2. Calling to `GET /v1beta1/organizations/orgId/groups` API ### View an organization projects @@ -124,7 +124,7 @@ Todo -`$ shield group create --file group.yaml --header key:value` +`$ frontier group create --file group.yaml --header key:value` @@ -142,7 +142,7 @@ Todo -`$ shield group list` +`$ frontier group list` @@ -160,7 +160,7 @@ Todo -`$ shield group view 2105beab-5d04-4fc5-b0ec-8d6f60b67ab2 --metadata` +`$ frontier group view 2105beab-5d04-4fc5-b0ec-8d6f60b67ab2 --metadata` @@ -188,7 +188,7 @@ Todo -`$ shield group edit 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --file=group.yaml` +`$ frontier group edit 457944c2-2a4c-4e6f-b1f7-3e1e109fe94c --file=group.yaml` diff --git a/docs/docs/users/principal.md b/docs/docs/users/principal.md index 3009fafaf..cecea5e78 100644 --- a/docs/docs/users/principal.md +++ b/docs/docs/users/principal.md @@ -3,35 +3,35 @@ import TabItem from '@theme/TabItem'; # Principal -Principal in Shield are entities that can be authenticated and authorized to access resources and perform actions. A principal will be used in controlling access to resources, as they can be associated with policies in Shield that define what actions the principal can perform and which resources they can access. +Principal in Frontier are entities that can be authenticated and authorized to access resources and perform actions. A principal will be used in controlling access to resources, as they can be associated with policies in Frontier that define what actions the principal can perform and which resources they can access. -### Types of Principals in Shield +### Types of Principals in Frontier -- **User**: A User Principal in Shield refers to an individual user who is granted certain privileges and access rights within the system. This type of principal is associated with a specific user account and is used to authenticate and authorize actions performed by the user. User principals are commonly used to manage and control access to resources, enforce security policies, and track user activities within the Shield system. +- **User**: A User Principal in Frontier refers to an individual user who is granted certain privileges and access rights within the system. This type of principal is associated with a specific user account and is used to authenticate and authorize actions performed by the user. User principals are commonly used to manage and control access to resources, enforce security policies, and track user activities within the Frontier system. -- **Service User**: A Service User Principal is a type of principal in Shield that represents a non-human entity, such as a software application or a service, that interacts with the system. This principal is specifically designed to authenticate and authorize actions performed by automated processes or scripts, allowing machines to securely access and manipulate resources within the Shield environment. Machine User Principals are commonly used in scenarios where programmatic access is required without human intervention. +- **Service User**: A Service User Principal is a type of principal in Frontier that represents a non-human entity, such as a software application or a service, that interacts with the system. This principal is specifically designed to authenticate and authorize actions performed by automated processes or scripts, allowing machines to securely access and manipulate resources within the Frontier environment. Machine User Principals are commonly used in scenarios where programmatic access is required without human intervention. -- **Group**: A Group in Shield refers to a logical grouping of users or machine users who share common access rights and permissions. This type of principal simplifies the management of access control by assigning privileges and permissions to a group instead of individual users. Group principals enable administrators to efficiently define and enforce security policies across multiple users or machine users, making it easier to grant or revoke access to resources based on membership in a particular group. +- **Group**: A Group in Frontier refers to a logical grouping of users or machine users who share common access rights and permissions. This type of principal simplifies the management of access control by assigning privileges and permissions to a group instead of individual users. Group principals enable administrators to efficiently define and enforce security policies across multiple users or machine users, making it easier to grant or revoke access to resources based on membership in a particular group. -- **Super User**: Superusers are platform level admins used to manage a Shield instance. A Shield Super User have the highest level of access and control, allowing them to perform administrative tasks, configure settings, and manage other organization accounts. A superuser email can be added in configurations yaml while setting up the Shield server. +- **Super User**: Superusers are platform level admins used to manage a Frontier instance. A Frontier Super User have the highest level of access and control, allowing them to perform administrative tasks, configure settings, and manage other organization accounts. A superuser email can be added in configurations yaml while setting up the Frontier server. :::info -**Constraints**: In Shield, a (human) user can belong to more than one organization, but a Group will belong to only one organization that created it. +**Constraints**: In Frontier, a (human) user can belong to more than one organization, but a Group will belong to only one organization that created it. ::: ### Authenticating Principals -Shield authenticates a principal using OIDC (OpenID Connect) and the Magic Link approach. [OIDC](../concepts/glossary.md#oidc) is an authentication protocol that allows applications to verify the identity of users and obtain their basic profile information. The Magic Link approach combines the simplicity of email-based authentication with the security of OIDC to create a seamless and secure authentication experience. +Frontier authenticates a principal using OIDC (OpenID Connect) and the Magic Link approach. [OIDC](../concepts/glossary.md#oidc) is an authentication protocol that allows applications to verify the identity of users and obtain their basic profile information. The Magic Link approach combines the simplicity of email-based authentication with the security of OIDC to create a seamless and secure authentication experience. Currently, users authenticate with the help of an external IdP, which issues security tokens that are then exchanged with the system. ### Authorizing Principals -Once a Shield principal is authenticated, the next step is authorization. Policies are used to define the permissions and access levels for each principal. These policies are attached to principals (users, or groups) and determine what actions they can perform on which resources. +Once a Frontier principal is authenticated, the next step is authorization. Policies are used to define the permissions and access levels for each principal. These policies are attached to principals (users, or groups) and determine what actions they can perform on which resources. ### Deactivate and Reactivate a User -Disabling a user suspends its access to organization resources and restricts its ability to perform IAM-related actions. This can be done for various reasons, such as employee termination, account compromise, temporary suspension of services, or security considerations. When a user account is diabled it cannot be used to login to Shield. The user account is not deleted, it will lose access to all the organization resources. The user account can be re-enabled at any time. +Disabling a user suspends its access to organization resources and restricts its ability to perform IAM-related actions. This can be done for various reasons, such as employee termination, account compromise, temporary suspension of services, or security considerations. When a user account is diabled it cannot be used to login to Frontier. The user account is not deleted, it will lose access to all the organization resources. The user account can be re-enabled at any time. Enabling or disabling a user helps administrators manage the access and privileges of the users and controls their interaction with IAM services and resources. @@ -48,7 +48,7 @@ Caution should be exercised when deleting a user, as it cannot be undone. If the ## Managing Users -A project in Shield looks like +A project in Frontier looks like @@ -56,8 +56,8 @@ A project in Shield looks like | Field | Type | Description | | ------------ | ------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | **id** | uuid | Unique user identifier | -| **name** | string | The name of the user. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Shield automatically generates a name from the user email.
        _Example:"john_doe_raystack_io"_ | -| **email** | string | The email of the user. The email must be unique within the entire Shield instance.
        _Example:"john.doe@raystack.org"_ | +| **name** | string | The name of the user. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Frontier automatically generates a name from the user email.
        _Example:"john_doe_raystack_io"_ | +| **email** | string | The email of the user. The email must be unique within the entire Frontier instance.
        _Example:"john.doe@raystack.org"_ | | **metadata** | object | Metadata object for users that can hold key value pairs pre-defined in User Metaschema. The metadata object can be used to store arbitrary information about the user such as label, description etc. By default the user metaschema contains labels and descriptions for the user. Update the same to add more fields to the user metadata object.
        _Example:{"label": {"key1": "value1"}, "description": "User Description"}_ | | **title** | string | The title can contain any UTF-8 character, used to provide a human-readable name for the user. Can also be left empty.
        _Example:"John Doe"_ | @@ -72,7 +72,7 @@ A project in Shield looks like "title": "John Doe", "email": "john.doe@raystack.org", "metadata": { - "description": "\"Shield human user\"" + "description": "\"Frontier human user\"" }, "createdAt": "2022-12-09T10:45:19.134019Z", "updatedAt": "2022-12-09T10:45:19.134019Z" @@ -83,7 +83,7 @@ A project in Shield looks like
        -**Note:** The metadata values are validated while creating and updating User using MetaSchemas in Shield [Read More](../reference/metaschemas.md) +**Note:** The metadata values are validated while creating and updating User using MetaSchemas in Frontier [Read More](../reference/metaschemas.md) --- @@ -93,15 +93,15 @@ Some of these APIs require special privileges to access these endpoints and to a ### Create users -Create a user in Shield with the given details. A user is not attached to an organization or a group by default, and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. +Create a user in Frontier with the given details. A user is not attached to an organization or a group by default, and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. 1. Using **`POST /v1beta1/users`** API -2. Using **`shield user create`** CLI command +2. Using **`frontier user create`** CLI command -```bash +```bash curl -L -X POST 'http://127.0.0.1:7400/v1beta1/users' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ @@ -114,12 +114,14 @@ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/users' \ "title": "John Doe" }' ``` + ```bash -$ shield user create --file=user.yaml +$ frontier user create --file=user.yaml ``` + @@ -127,10 +129,10 @@ $ shield user create --file=user.yaml ### List all users -Lists all the users from all the organizations in a Shield instance. The results can be filtered by keyword, organization, group and state. +Lists all the users from all the organizations in a Frontier instance. The results can be filtered by keyword, organization, group and state. 1. Using **`GET /v1beta1/users`** API -2. Using **`shield user list`** CLI command (will list all users, no flags for filtering currently) +2. Using **`frontier user list`** CLI command (will list all users, no flags for filtering currently) @@ -139,12 +141,14 @@ Lists all the users from all the organizations in a Shield instance. The results $ curl -L -X GET 'http://127.0.0.1:7400/v1beta1/admin/users?pageSize=10&pageNum=2&keyword=John&orgId=4d726cf5-52f6-46f1-9c87-1a79f29e3abf&groupId=c2d85306-96f4-4895-98b4-c3e5c2f3084d&state=enabled' \ -H 'Accept: application/json' ``` + ```bash -$ shield user list +$ frontier user list ``` + @@ -152,7 +156,7 @@ $ shield user list ### Get User -Query a user in Shield by its unique id. In Shield a user can belong to more than one organizations, and result will get us a user in the entire Shield instance and not specific to an organization. +Query a user in Frontier by its unique id. In Frontier a user can belong to more than one organizations, and result will get us a user in the entire Frontier instance and not specific to an organization. @@ -161,12 +165,14 @@ Query a user in Shield by its unique id. In Shield a user can belong to more tha curl -L -X GET 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597b1c8e6608%20' \ -H 'Accept: application/json' ``` + ```bash -$ shield user view e9fba4af-ab23-4631-abba-597b1c8e6608 +$ frontier user view e9fba4af-ab23-4631-abba-597b1c8e6608 ``` + @@ -185,7 +191,7 @@ $ curl -L -X GET 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-59 ### Accept and Decline an Organization Invitation -In Shield a user can be invited to an Organization and it's underlying Groups. A User can Accept or Descline the invitation with the following APIs. +In Frontier a user can be invited to an Organization and it's underlying Groups. A User can Accept or Descline the invitation with the following APIs. To Accept the invitation use **`POST /v1beta1/organizations/:orgId/invitations/:id/accept`** API @@ -200,18 +206,20 @@ To Decline the invitation use **`DELETE /v1beta1/organizations/:orgId/invitation curl -L -X DELETE 'http://127.0.0.1:7400/v1beta1/organizations/4d726cf5-52f6-46f1-9c87-1a79f29e3abf/invitations/8e73f4a2-3763-4dc6-a00e-7a9aebeaa971' \ -H 'Accept: application/json' ``` + --- ### List User Invitations -- [GET /v1beta1/users/:id/invitations API](../apis/shield-service-list-user-invitations.api.mdx) +- [GET /v1beta1/users/:id/invitations API](../apis/frontier-service-list-user-invitations.api.mdx) --- + ### Update User -To Update a user title, metadata, name use **`PUT /v1beta1/users/:id`** API.
        **Note:** it is not allowed to update a user email in Shield. +To Update a user title, metadata, name use **`PUT /v1beta1/users/:id`** API.
        **Note:** it is not allowed to update a user email in Frontier. -Shield also provides **`shield user edit`** CLI command for this operation. +Frontier also provides **`frontier user edit`** CLI command for this operation. @@ -229,12 +237,14 @@ curl -L -X PUT 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597b "title": "Johnny Doe" }' ``` + ```bash -$ shield user edit e9fba4af-ab23-4631-abba-597b1c8e6608 --file=user.yaml +$ frontier user edit e9fba4af-ab23-4631-abba-597b1c8e6608 --file=user.yaml ``` + @@ -242,7 +252,7 @@ $ shield user edit e9fba4af-ab23-4631-abba-597b1c8e6608 --file=user.yaml ### Disable and Enable a User -This operation temporarily remove the user from being invited to Organizations(and Groups), also disabling it's access to the Organization resources. The user won't be authenticated in the first place viaShield. But its organization/group memberships, policies remain intact. Once the user is enabled again, all it's relations are restored back. +This operation temporarily remove the user from being invited to Organizations(and Groups), also disabling it's access to the Organization resources. The user won't be authenticated in the first place viaFrontier. But its organization/group memberships, policies remain intact. Once the user is enabled again, all it's relations are restored back. To disable a user use **`POST /v1beta1/users/:id/disable`** API @@ -253,7 +263,7 @@ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597 --data-raw '{}' ``` -To enable it back use **`POST /v1beta1/users/:id/enable`** API +To enable it back use **`POST /v1beta1/users/:id/enable`** API ```bash curl -L -X POST 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597b1c8e6608/enable' \ @@ -266,11 +276,11 @@ curl -L -X POST 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597 ### Delete User -Deleting a Shield user deletes it from the Shield instance and all it's relations to an Organization or Group. All the policies created for that user for access control and invitations for that user too is deleted. +Deleting a Frontier user deletes it from the Frontier instance and all it's relations to an Organization or Group. All the policies created for that user for access control and invitations for that user too is deleted. Use **`DELETE /v1beta1/users/:id`** API for this operation. ```bash curl -L -X DELETE 'http://127.0.0.1:7400/v1beta1/users/e9fba4af-ab23-4631-abba-597b1c8e6608' \ -H 'Accept: application/json' -``` \ No newline at end of file +``` diff --git a/docs/docusaurus.config.js b/docs/docusaurus.config.js index 6b6189220..1f036433b 100644 --- a/docs/docusaurus.config.js +++ b/docs/docusaurus.config.js @@ -4,7 +4,7 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); // With JSDoc @type annotations, IDEs can provide config autocompletion /** @type {import('@docusaurus/types').DocusaurusConfig} */ (module.exports = { - title: 'Shield', + title: 'Frontier', tagline: 'Identity and authorization for your APIs', url: 'https://raystack.github.io/', baseUrl: '/', @@ -12,7 +12,7 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); onBrokenMarkdownLinks: 'warn', favicon: 'img/favicon.ico', organizationName: 'Raystack', - projectName: 'shield', + projectName: 'frontier', presets: [ [ @@ -24,7 +24,7 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); docs: { routeBasePath: '/', sidebarPath: require.resolve('./sidebars.js'), - editUrl: 'https://github.com/raystack/shield/edit/master/docs/', + editUrl: 'https://github.com/raystack/frontier/edit/master/docs/', sidebarCollapsed: true, breadcrumbs: false, docLayoutComponent: "@theme/DocPage", @@ -74,8 +74,8 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); }, }, navbar: { - title: 'Shield', - logo: { src: 'img/shield.svg', }, + title: 'Frontier', + logo: { src: 'img/frontier.svg', }, hideOnScroll: true, items: [ { @@ -91,7 +91,7 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); className: 'header-slack-link', }, { - href: 'https://github.com/raystack/shield', + href: 'https://github.com/raystack/frontier', className: 'navbar-item-github', position: 'right', }, @@ -107,7 +107,7 @@ const darkCodeTheme = require('prism-react-renderer/themes/dracula'); }, announcementBar: { id: 'star-repo', - content: '⭐️ If you like Shield, give it a star on GitHub! ⭐', + content: '⭐️ If you like Frontier, give it a star on GitHub! ⭐', backgroundColor: '#222', textColor: '#eee', isCloseable: true, diff --git a/docs/package.json b/docs/package.json index 72e93190b..548375c15 100644 --- a/docs/package.json +++ b/docs/package.json @@ -1,5 +1,5 @@ { - "name": "shield", + "name": "frontier", "version": "0.0.0", "private": true, "scripts": { diff --git a/docs/sidebars.js b/docs/sidebars.js index 5f1f2b140..751cb161c 100644 --- a/docs/sidebars.js +++ b/docs/sidebars.js @@ -101,7 +101,7 @@ module.exports = { label: "APIs", link: { type: "doc", - id: "apis/shield-administration-api", + id: "apis/frontier-administration-api", }, items: [ require("./docs/apis/sidebar.js") diff --git a/docs/static/img/architecture.svg b/docs/static/img/architecture.svg index c7ed1ea78..6fcad17c0 100644 --- a/docs/static/img/architecture.svg +++ b/docs/static/img/architecture.svg @@ -13,4 +13,4 @@ } - SpiceDBShieldPostgresDBPostgresDBService AService BClientsUI/CLI \ No newline at end of file + SpiceDBFrontierPostgresDBPostgresDBService AService BClientsUI/CLI \ No newline at end of file diff --git a/docs/static/img/overview.svg b/docs/static/img/overview.svg index 91fdd9882..6d209d832 100644 --- a/docs/static/img/overview.svg +++ b/docs/static/img/overview.svg @@ -1,6 +1,6 @@ - Shield + Frontier @@ -14,7 +14,7 @@ - + @@ -30,9 +30,9 @@
        *Example:* `google` @@ -654,7 +654,7 @@ paths: to apply redirection in case of browsers, provide a url that will be used for redirection after authentication - URL to redirect after successful authentication.
        *Example:*`"https://shield.example.com"` + URL to redirect after successful authentication.
        *Example:*`"https://frontier.example.com"` in: query required: false type: string @@ -671,36 +671,36 @@ paths: post: summary: Authenticate with a strategy description: Authenticate a user with a strategy. By default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url in the authenticate request body that will be used for redirection after authentication. Also set redirect as true for redirecting the user request to the redirect_url after successful authentication. - operationId: ShieldService_Authenticate2 + operationId: FrontierService_Authenticate2 responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1AuthenticateResponse' + $ref: "#/definitions/v1beta1AuthenticateResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: strategyName description: Name of the strategy to use for authentication.
        *Example:* `google` @@ -721,7 +721,7 @@ paths: will be skipped unless this is set to true, useful in browser returnTo: type: string - description: URL to redirect after successful authentication.
        *Example:*`"https://shield.example.com"` + description: URL to redirect after successful authentication.
        *Example:*`"https://frontier.example.com"` title: |- by default, after successful authentication no operation will be performed to apply redirection in case of browsers, provide a url that will be used @@ -735,198 +735,198 @@ paths: /v1beta1/auth/token: post: summary: Generate access token by given credentials - description: Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the shield resources. - operationId: ShieldService_AuthToken + description: Access token can be generated by providing the credentials in the request body/header. The credentials can be client id and secret or service account generated key jwt. Use the generated access token in Authorization header to access the frontier resources. + operationId: FrontierService_AuthToken responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1AuthTokenResponse' + $ref: "#/definitions/v1beta1AuthTokenResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1AuthTokenRequest' + $ref: "#/definitions/v1beta1AuthTokenRequest" tags: - Authn /v1beta1/check: post: summary: Check - description: Returns true if a principal has required permissions to access a resource and false otherwise.
        Note the principal can be a user or a service account, and Shield will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts). - operationId: ShieldService_CheckResourcePermission + description: Returns true if a principal has required permissions to access a resource and false otherwise.
        Note the principal can be a user or a service account, and Frontier will the credentials from the current logged in principal from the session cookie (if any), or the client id and secret (in case of service users) or the access token (in case of human user accounts). + operationId: FrontierService_CheckResourcePermission responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CheckResourcePermissionResponse' + $ref: "#/definitions/v1beta1CheckResourcePermissionResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1CheckResourcePermissionRequest' + $ref: "#/definitions/v1beta1CheckResourcePermissionRequest" tags: - Authz /v1beta1/meta/schemas: get: summary: List metaschemas - description: Returns a list of all metaschemas configured on an instance level in Shield. e.g user, project, organization etc - operationId: ShieldService_ListMetaSchemas + description: Returns a list of all metaschemas configured on an instance level in Frontier. e.g user, project, organization etc + operationId: FrontierService_ListMetaSchemas responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListMetaSchemasResponse' + $ref: "#/definitions/v1beta1ListMetaSchemasResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - MetaSchema post: summary: Create metaschema - description: Create a new metadata schema. The metaschema **name** must be unique within the entire Shield instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
        *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` - operationId: ShieldService_CreateMetaSchema + description: Create a new metadata schema. The metaschema **name** must be unique within the entire Frontier instance and can contain only alphanumeric characters, dashes and underscores. The metaschema **schema** must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
        *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` + operationId: FrontierService_CreateMetaSchema responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateMetaSchemaResponse' + $ref: "#/definitions/v1beta1CreateMetaSchemaResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1MetaSchemaRequestBody' + $ref: "#/definitions/v1beta1MetaSchemaRequestBody" tags: - MetaSchema /v1beta1/meta/schemas/{id}: get: summary: Get metaschema description: Get a metadata schema by ID. - operationId: ShieldService_GetMetaSchema + operationId: FrontierService_GetMetaSchema responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetMetaSchemaResponse' + $ref: "#/definitions/v1beta1GetMetaSchemaResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -937,36 +937,36 @@ paths: delete: summary: Delete metaschema description: Delete a metadata schema permanently. Once deleted the metaschema won't be used to validate the metadata. For example, if a metaschema(with `label` and `description` fields) is used to validate the metadata of a user, then deleting the metaschema will not validate the metadata of the user and metadata field can contain any key-value pair(and say another field called `foo` can be inserted in a user's metadata). - operationId: ShieldService_DeleteMetaSchema + operationId: FrontierService_DeleteMetaSchema responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteMetaSchemaResponse' + $ref: "#/definitions/v1beta1DeleteMetaSchemaResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -977,36 +977,36 @@ paths: put: summary: Update metaschema description: Update a metadata schema. Only `schema` field of a metaschema can be updated. The metaschema `schema` must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema.
        *Example:* `{name:"user",schema:{"type":"object","properties":{"label":{"type":"object","additionalProperties":{"type":"string"}},"description":{"type":"string"}}}}` - operationId: ShieldService_UpdateMetaSchema + operationId: FrontierService_UpdateMetaSchema responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateMetaSchemaResponse' + $ref: "#/definitions/v1beta1UpdateMetaSchemaResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1016,79 +1016,79 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1MetaSchemaRequestBody' + $ref: "#/definitions/v1beta1MetaSchemaRequestBody" tags: - MetaSchema /v1beta1/namespaces: get: summary: Get all namespaces - description: Returns the list of all namespaces in a Shield instance - operationId: ShieldService_ListNamespaces + description: Returns the list of all namespaces in a Frontier instance + operationId: FrontierService_ListNamespaces responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListNamespacesResponse' + $ref: "#/definitions/v1beta1ListNamespacesResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - Namespace /v1beta1/namespaces/{id}: get: summary: Get namespace description: Returns a namespace by ID - operationId: ShieldService_GetNamespace + operationId: FrontierService_GetNamespace responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetNamespaceResponse' + $ref: "#/definitions/v1beta1GetNamespaceResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1099,37 +1099,37 @@ paths: /v1beta1/organization/{orgId}/auditlogs: get: summary: List audit logs - description: Returns a list of audit logs of an organization in Shield. - operationId: ShieldService_ListOrganizationAuditLogs + description: Returns a list of audit logs of an organization in Frontier. + operationId: FrontierService_ListOrganizationAuditLogs responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationAuditLogsResponse' + $ref: "#/definitions/v1beta1ListOrganizationAuditLogsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -1159,36 +1159,36 @@ paths: post: summary: Create audit log description: Create new audit logs in a batch. - operationId: ShieldService_CreateOrganizationAuditLogs + operationId: FrontierService_CreateOrganizationAuditLogs responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateOrganizationAuditLogsResponse' + $ref: "#/definitions/v1beta1CreateOrganizationAuditLogsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -1204,43 +1204,43 @@ paths: type: array items: type: object - $ref: '#/definitions/v1beta1AuditLog' + $ref: "#/definitions/v1beta1AuditLog" tags: - AuditLog /v1beta1/organization/{orgId}/auditlogs/{id}: get: summary: Get audit log description: Get an audit log by ID. - operationId: ShieldService_GetOrganizationAuditLog + operationId: FrontierService_GetOrganizationAuditLog responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationAuditLogResponse' + $ref: "#/definitions/v1beta1GetOrganizationAuditLogResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -1256,39 +1256,39 @@ paths: get: summary: List organizations description: Returns a list of organizations. It can be filtered by userID or organization state. - operationId: ShieldService_ListOrganizations + operationId: FrontierService_ListOrganizations responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationsResponse' + $ref: "#/definitions/v1beta1ListOrganizationsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: userId - description: The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Shield instance will be listed. + description: The user ID to filter by. It can be used to list all the organizations that the user is a member of. Otherwise, all the organizations in the Frontier instance will be listed. in: query required: false type: string @@ -1301,78 +1301,78 @@ paths: - Organization post: summary: Create organization - operationId: ShieldService_CreateOrganization + operationId: FrontierService_CreateOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateOrganizationResponse' + $ref: "#/definitions/v1beta1CreateOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1OrganizationRequestBody' + $ref: "#/definitions/v1beta1OrganizationRequestBody" tags: - Organization /v1beta1/organizations/{id}: get: summary: Get organization description: Get organization by ID or name - operationId: ShieldService_GetOrganization + operationId: FrontierService_GetOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationResponse' + $ref: "#/definitions/v1beta1GetOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1382,37 +1382,37 @@ paths: - Organization delete: summary: Delete organization - description: Delete an organization and all of its relations permanently. The organization users will not be deleted from Shield. - operationId: ShieldService_DeleteOrganization + description: Delete an organization and all of its relations permanently. The organization users will not be deleted from Frontier. + operationId: FrontierService_DeleteOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteOrganizationResponse' + $ref: "#/definitions/v1beta1DeleteOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1423,36 +1423,36 @@ paths: put: summary: Update organization description: Update organization by ID - operationId: ShieldService_UpdateOrganization + operationId: FrontierService_UpdateOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateOrganizationResponse' + $ref: "#/definitions/v1beta1UpdateOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1462,43 +1462,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1OrganizationRequestBody' + $ref: "#/definitions/v1beta1OrganizationRequestBody" tags: - Organization /v1beta1/organizations/{id}/admins: get: summary: List organization admins description: Returns a list admins of an organization - operationId: ShieldService_ListOrganizationAdmins + operationId: FrontierService_ListOrganizationAdmins responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationAdminsResponse' + $ref: "#/definitions/v1beta1ListOrganizationAdminsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1510,36 +1510,36 @@ paths: post: summary: Disable organization description: Sets the state of the organization as disabled. The existing users in the org will not be able to access any organization resources. - operationId: ShieldService_DisableOrganization + operationId: FrontierService_DisableOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DisableOrganizationResponse' + $ref: "#/definitions/v1beta1DisableOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1556,36 +1556,36 @@ paths: post: summary: Enable organization description: Sets the state of the organization as enabled. The existing users in the org will be able to access any organization resources. - operationId: ShieldService_EnableOrganization + operationId: FrontierService_EnableOrganization responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1EnableOrganizationResponse' + $ref: "#/definitions/v1beta1EnableOrganizationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1602,36 +1602,36 @@ paths: get: summary: Get organization projects description: Get all projects that belong to an organization - operationId: ShieldService_ListOrganizationProjects + operationId: FrontierService_ListOrganizationProjects responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationProjectsResponse' + $ref: "#/definitions/v1beta1ListOrganizationProjectsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1647,36 +1647,36 @@ paths: /v1beta1/organizations/{id}/serviceusers: get: summary: List organization service users - operationId: ShieldService_ListOrganizationServiceUsers + operationId: FrontierService_ListOrganizationServiceUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationServiceUsersResponse' + $ref: "#/definitions/v1beta1ListOrganizationServiceUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1687,36 +1687,36 @@ paths: /v1beta1/organizations/{id}/users: get: summary: List organization users - operationId: ShieldService_ListOrganizationUsers + operationId: FrontierService_ListOrganizationUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationUsersResponse' + $ref: "#/definitions/v1beta1ListOrganizationUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1730,37 +1730,37 @@ paths: - Organization post: summary: Add organization user - description: Add a user to an organization. A user must exists in Shield before adding it to an org. This request will fail if the user doesn't exists - operationId: ShieldService_AddOrganizationUsers + description: Add a user to an organization. A user must exists in Frontier before adding it to an org. This request will fail if the user doesn't exists + operationId: FrontierService_AddOrganizationUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1AddOrganizationUsersResponse' + $ref: "#/definitions/v1beta1AddOrganizationUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1783,36 +1783,36 @@ paths: delete: summary: Remove organization user description: Remove a user from an organization - operationId: ShieldService_RemoveOrganizationUser + operationId: FrontierService_RemoveOrganizationUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1RemoveOrganizationUserResponse' + $ref: "#/definitions/v1beta1RemoveOrganizationUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -1828,36 +1828,36 @@ paths: get: summary: List organization groups description: Get all groups that belong to an organization. The results can be filtered by state which can be either be enabled or disabled. - operationId: ShieldService_ListOrganizationGroups + operationId: FrontierService_ListOrganizationGroups responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationGroupsResponse' + $ref: "#/definitions/v1beta1ListOrganizationGroupsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -1873,36 +1873,36 @@ paths: post: summary: Create group description: Create a new group in an organization which serves as a container for users. The group can be assigned roles and permissions and can be used to manage access to resources. Also a group can also be assigned to other groups. - operationId: ShieldService_CreateGroup + operationId: FrontierService_CreateGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateGroupResponse' + $ref: "#/definitions/v1beta1CreateGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: The organization ID to which the group belongs to. @@ -1913,42 +1913,42 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1GroupRequestBody' + $ref: "#/definitions/v1beta1GroupRequestBody" tags: - Group /v1beta1/organizations/{orgId}/groups/{id}: get: summary: Get group - operationId: ShieldService_GetGroup + operationId: FrontierService_GetGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetGroupResponse' + $ref: "#/definitions/v1beta1GetGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -1963,36 +1963,36 @@ paths: delete: summary: Delete group description: Delete an organization group permanently and all of its relations - operationId: ShieldService_DeleteGroup + operationId: FrontierService_DeleteGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteGroupResponse' + $ref: "#/definitions/v1beta1DeleteGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2006,36 +2006,36 @@ paths: - Group put: summary: Update group - operationId: ShieldService_UpdateGroup + operationId: FrontierService_UpdateGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateGroupResponse' + $ref: "#/definitions/v1beta1UpdateGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: The organization ID to which the group belongs to. @@ -2050,43 +2050,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1GroupRequestBody' + $ref: "#/definitions/v1beta1GroupRequestBody" tags: - Group /v1beta1/organizations/{orgId}/groups/{id}/disable: post: summary: Disable group description: Sets the state of the group as disabled. The group will not be available for access control and the existing users in the group will not be able to access any resources that are assigned to the group. No other users can be added to the group while it is disabled. - operationId: ShieldService_DisableGroup + operationId: FrontierService_DisableGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DisableGroupResponse' + $ref: "#/definitions/v1beta1DisableGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2107,36 +2107,36 @@ paths: post: summary: Enable group description: Sets the state of the group as enabled. The `enabled` flag is used to determine if the group can be used for access control. - operationId: ShieldService_EnableGroup + operationId: FrontierService_EnableGroup responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1EnableGroupResponse' + $ref: "#/definitions/v1beta1EnableGroupResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2157,36 +2157,36 @@ paths: get: summary: List group users description: Returns a list of users that belong to a group. - operationId: ShieldService_ListGroupUsers + operationId: FrontierService_ListGroupUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListGroupUsersResponse' + $ref: "#/definitions/v1beta1ListGroupUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2201,36 +2201,36 @@ paths: post: summary: Add group user description: Adds a principle(user and service-users) to a group, existing users in the group will be ignored. A group can't have nested groups as members. - operationId: ShieldService_AddGroupUsers + operationId: FrontierService_AddGroupUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1AddGroupUsersResponse' + $ref: "#/definitions/v1beta1AddGroupUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2256,36 +2256,36 @@ paths: delete: summary: Remove group user description: Removes a principle(user and service-users) from a group. If the user is not in the group, the request will succeed but no changes will be made. - operationId: ShieldService_RemoveGroupUser + operationId: FrontierService_RemoveGroupUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1RemoveGroupUserResponse' + $ref: "#/definitions/v1beta1RemoveGroupUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2305,36 +2305,36 @@ paths: get: summary: List pending invitations description: Returns all pending invitations queued for an organization - operationId: ShieldService_ListOrganizationInvitations + operationId: FrontierService_ListOrganizationInvitations responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationInvitationsResponse' + $ref: "#/definitions/v1beta1ListOrganizationInvitationsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: unique id of the organization to which user is invited @@ -2351,36 +2351,36 @@ paths: post: summary: Invite user description: Invite users to an organization, if the user doesn't exists, it will be created and notified. Invitations expire in 7 days - operationId: ShieldService_CreateOrganizationInvitation + operationId: FrontierService_CreateOrganizationInvitation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateOrganizationInvitationResponse' + $ref: "#/definitions/v1beta1CreateOrganizationInvitationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: unique id of the organization to which user is invited @@ -2409,36 +2409,36 @@ paths: get: summary: Get pending invitation description: Returns a pending invitation queued for an organization - operationId: ShieldService_GetOrganizationInvitation + operationId: FrontierService_GetOrganizationInvitation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationInvitationResponse' + $ref: "#/definitions/v1beta1GetOrganizationInvitationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2453,36 +2453,36 @@ paths: delete: summary: Delete pending invitation description: Delete a pending invitation queued for an organization - operationId: ShieldService_DeleteOrganizationInvitation + operationId: FrontierService_DeleteOrganizationInvitation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteOrganizationInvitationResponse' + $ref: "#/definitions/v1beta1DeleteOrganizationInvitationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2498,36 +2498,36 @@ paths: post: summary: Accept pending invitation description: Accept pending invitation queued for an organization. The user will be added to the organization and groups defined in the invitation - operationId: ShieldService_AcceptOrganizationInvitation + operationId: FrontierService_AcceptOrganizationInvitation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1AcceptOrganizationInvitationResponse' + $ref: "#/definitions/v1beta1AcceptOrganizationInvitationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2543,36 +2543,36 @@ paths: get: summary: List organization roles description: Returns a list of custom roles created under an organization with their associated permissions - operationId: ShieldService_ListOrganizationRoles + operationId: FrontierService_ListOrganizationRoles responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListOrganizationRolesResponse' + $ref: "#/definitions/v1beta1ListOrganizationRolesResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2587,36 +2587,36 @@ paths: post: summary: Create organization role description: Create a custom role under an organization. This custom role will only be available for assignment to the principles within the organization. - operationId: ShieldService_CreateOrganizationRole + operationId: FrontierService_CreateOrganizationRole responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateOrganizationRoleResponse' + $ref: "#/definitions/v1beta1CreateOrganizationRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: The organization ID to which the role belongs to. @@ -2627,43 +2627,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1RoleRequestBody' + $ref: "#/definitions/v1beta1RoleRequestBody" tags: - Role /v1beta1/organizations/{orgId}/roles/{id}: get: summary: Get organization role description: Returns a custom role under an organization along with its associated permissions - operationId: ShieldService_GetOrganizationRole + operationId: FrontierService_GetOrganizationRole responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationRoleResponse' + $ref: "#/definitions/v1beta1GetOrganizationRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2678,36 +2678,36 @@ paths: delete: summary: Delete organization role description: Delete a custom role and all of its relations under an organization permanently. - operationId: ShieldService_DeleteOrganizationRole + operationId: FrontierService_DeleteOrganizationRole responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteOrganizationRoleResponse' + $ref: "#/definitions/v1beta1DeleteOrganizationRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2722,36 +2722,36 @@ paths: put: summary: Update organization role description: Update a custom role under an organization. This custom role will only be available for assignment to the principles within the organization. - operationId: ShieldService_UpdateOrganizationRole + operationId: FrontierService_UpdateOrganizationRole responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateOrganizationRoleResponse' + $ref: "#/definitions/v1beta1UpdateOrganizationRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId in: path @@ -2765,119 +2765,119 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1RoleRequestBody' + $ref: "#/definitions/v1beta1RoleRequestBody" tags: - Role /v1beta1/permissions: get: summary: Get all permissions - operationId: ShieldService_ListPermissions + operationId: FrontierService_ListPermissions responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListPermissionsResponse' + $ref: "#/definitions/v1beta1ListPermissionsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - Permission post: summary: Create platform permission - description: Creates a permission. It can be used to grant permissions to all the resources in a Shield instance. + description: Creates a permission. It can be used to grant permissions to all the resources in a Frontier instance. operationId: AdminService_CreatePermission responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreatePermissionResponse' + $ref: "#/definitions/v1beta1CreatePermissionResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1CreatePermissionRequest' + $ref: "#/definitions/v1beta1CreatePermissionRequest" tags: - Permission /v1beta1/permissions/{id}: get: summary: Get permission description: Returns a permission by ID - operationId: ShieldService_GetPermission + operationId: FrontierService_GetPermission responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetPermissionResponse' + $ref: "#/definitions/v1beta1GetPermissionResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -2892,31 +2892,31 @@ paths: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeletePermissionResponse' + $ref: "#/definitions/v1beta1DeletePermissionResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -2926,37 +2926,37 @@ paths: - Permission put: summary: Update platform permission - description: Updates a permission by ID. It can be used to grant permissions to all the resources in a Shield instance. + description: Updates a permission by ID. It can be used to grant permissions to all the resources in a Frontier instance. operationId: AdminService_UpdatePermission responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdatePermissionResponse' + $ref: "#/definitions/v1beta1UpdatePermissionResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -2966,43 +2966,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1PermissionRequestBody' + $ref: "#/definitions/v1beta1PermissionRequestBody" tags: - Permission /v1beta1/policies: get: summary: List all policies - description: Lists all the policies from all the organizations in a Shield instance. It can be filtered by organization, project, user, role and group. + description: Lists all the policies from all the organizations in a Frontier instance. It can be filtered by organization, project, user, role and group. operationId: AdminService_ListPolicies responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListPoliciesResponse' + $ref: "#/definitions/v1beta1ListPoliciesResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: The organization id to filter by. @@ -3033,79 +3033,79 @@ paths: - Policy post: summary: Create policy - description: 'Creates a policy ' - operationId: ShieldService_CreatePolicy + description: "Creates a policy " + operationId: FrontierService_CreatePolicy responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreatePolicyResponse' + $ref: "#/definitions/v1beta1CreatePolicyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1PolicyRequestBody' + $ref: "#/definitions/v1beta1PolicyRequestBody" tags: - Policy /v1beta1/policies/{id}: get: summary: Get policy description: Returns a policy by ID - operationId: ShieldService_GetPolicy + operationId: FrontierService_GetPolicy responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetPolicyResponse' + $ref: "#/definitions/v1beta1GetPolicyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3116,36 +3116,36 @@ paths: delete: summary: Delete Policy description: Delete a policy all of its relations permanently. - operationId: ShieldService_DeletePolicy + operationId: FrontierService_DeletePolicy responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeletePolicyResponse' + $ref: "#/definitions/v1beta1DeletePolicyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3156,36 +3156,36 @@ paths: put: summary: Update policy description: Updates a policy by ID - operationId: ShieldService_UpdatePolicy + operationId: FrontierService_UpdatePolicy responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdatePolicyResponse' + $ref: "#/definitions/v1beta1UpdatePolicyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3195,84 +3195,84 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1PolicyRequestBody' + $ref: "#/definitions/v1beta1PolicyRequestBody" tags: - Policy /v1beta1/projects: post: summary: Create project - operationId: ShieldService_CreateProject + operationId: FrontierService_CreateProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateProjectResponse' + $ref: "#/definitions/v1beta1CreateProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1ProjectRequestBody' + $ref: "#/definitions/v1beta1ProjectRequestBody" tags: - Project /v1beta1/projects/{id}: get: summary: Get project description: Returns a project by ID - operationId: ShieldService_GetProject + operationId: FrontierService_GetProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetProjectResponse' + $ref: "#/definitions/v1beta1GetProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3283,36 +3283,36 @@ paths: delete: summary: Delete Project description: Delete a project all of its relations permanently. - operationId: ShieldService_DeleteProject + operationId: FrontierService_DeleteProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteProjectResponse' + $ref: "#/definitions/v1beta1DeleteProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3323,36 +3323,36 @@ paths: put: summary: Update project description: Updates a project by ID - operationId: ShieldService_UpdateProject + operationId: FrontierService_UpdateProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateProjectResponse' + $ref: "#/definitions/v1beta1UpdateProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3362,43 +3362,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1ProjectRequestBody' + $ref: "#/definitions/v1beta1ProjectRequestBody" tags: - Project /v1beta1/projects/{id}/admins: get: summary: List project admins description: Returns a collection of admins of a project - operationId: ShieldService_ListProjectAdmins + operationId: FrontierService_ListProjectAdmins responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListProjectAdminsResponse' + $ref: "#/definitions/v1beta1ListProjectAdminsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3409,36 +3409,36 @@ paths: /v1beta1/projects/{id}/disable: post: summary: Disable project - operationId: ShieldService_DisableProject + operationId: FrontierService_DisableProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DisableProjectResponse' + $ref: "#/definitions/v1beta1DisableProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3454,36 +3454,36 @@ paths: /v1beta1/projects/{id}/enable: post: summary: Enable project - operationId: ShieldService_EnableProject + operationId: FrontierService_EnableProject responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1EnableProjectResponse' + $ref: "#/definitions/v1beta1EnableProjectResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3500,36 +3500,36 @@ paths: get: summary: List project users description: Returns a collection of users of a project. Filter by user permissions is supported. - operationId: ShieldService_ListProjectUsers + operationId: FrontierService_ListProjectUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListProjectUsersResponse' + $ref: "#/definitions/v1beta1ListProjectUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3544,36 +3544,36 @@ paths: /v1beta1/projects/{projectId}/resources: get: summary: Get all resources - operationId: ShieldService_ListProjectResources + operationId: FrontierService_ListProjectResources responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListProjectResourcesResponse' + $ref: "#/definitions/v1beta1ListProjectResourcesResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: projectId in: path @@ -3588,36 +3588,36 @@ paths: post: summary: Create resource description: Creates a resource in a project - operationId: ShieldService_CreateProjectResource + operationId: FrontierService_CreateProjectResource responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateProjectResourceResponse' + $ref: "#/definitions/v1beta1CreateProjectResourceResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: projectId description: project uuid or name @@ -3628,7 +3628,7 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1ResourceRequestBody' + $ref: "#/definitions/v1beta1ResourceRequestBody" - name: id description: Autogenerated if skipped. in: query @@ -3640,36 +3640,36 @@ paths: get: summary: Get resource description: Returns a project resource by ID - operationId: ShieldService_GetProjectResource + operationId: FrontierService_GetProjectResource responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetProjectResourceResponse' + $ref: "#/definitions/v1beta1GetProjectResourceResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: projectId in: path @@ -3684,36 +3684,36 @@ paths: delete: summary: Delete resource description: Deletes a resource from a project permanently - operationId: ShieldService_DeleteProjectResource + operationId: FrontierService_DeleteProjectResource responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteProjectResourceResponse' + $ref: "#/definitions/v1beta1DeleteProjectResourceResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: projectId in: path @@ -3728,36 +3728,36 @@ paths: put: summary: Update resource description: Updates a resource in a project - operationId: ShieldService_UpdateProjectResource + operationId: FrontierService_UpdateProjectResource responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateProjectResourceResponse' + $ref: "#/definitions/v1beta1UpdateProjectResourceResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: projectId in: path @@ -3771,84 +3771,84 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1ResourceRequestBody' + $ref: "#/definitions/v1beta1ResourceRequestBody" tags: - Resource /v1beta1/relations: post: summary: Create relation - operationId: ShieldService_CreateRelation + operationId: FrontierService_CreateRelation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateRelationResponse' + $ref: "#/definitions/v1beta1CreateRelationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1RelationRequestBody' + $ref: "#/definitions/v1beta1RelationRequestBody" tags: - Relation /v1beta1/relations/{id}: get: summary: Get relation description: Returns a relation by ID - operationId: ShieldService_GetRelation + operationId: FrontierService_GetRelation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetRelationResponse' + $ref: "#/definitions/v1beta1GetRelationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -3860,36 +3860,36 @@ paths: delete: summary: Delete relation description: Remove a subject having a relation from an object - operationId: ShieldService_DeleteRelation + operationId: FrontierService_DeleteRelation responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteRelationResponse' + $ref: "#/definitions/v1beta1DeleteRelationResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: relation in: path @@ -3910,37 +3910,37 @@ paths: /v1beta1/roles: get: summary: List platform roles - description: Returns a list of platform wide roles available in enitre Shield instance along with their associated permissions - operationId: ShieldService_ListRoles + description: Returns a list of platform wide roles available in enitre Frontier instance along with their associated permissions + operationId: FrontierService_ListRoles responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListRolesResponse' + $ref: "#/definitions/v1beta1ListRolesResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: state in: query @@ -3950,43 +3950,43 @@ paths: - Role post: summary: Create platform role - description: Creates a platform wide role. It can be used to grant permissions to all the resources in a Shield instance. + description: Creates a platform wide role. It can be used to grant permissions to all the resources in a Frontier instance. operationId: AdminService_CreateRole responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateRoleResponse' + $ref: "#/definitions/v1beta1CreateRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1RoleRequestBody' + $ref: "#/definitions/v1beta1RoleRequestBody" tags: - Role /v1beta1/roles/{id}: @@ -3998,31 +3998,31 @@ paths: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteRoleResponse' + $ref: "#/definitions/v1beta1DeleteRoleResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The role id to delete. @@ -4034,37 +4034,37 @@ paths: /v1beta1/serviceusers: get: summary: List org service users - description: Returns the service user of an organization in a Shield instance. It can be filter by it's state - operationId: ShieldService_ListServiceUsers + description: Returns the service user of an organization in a Frontier instance. It can be filter by it's state + operationId: FrontierService_ListServiceUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListServiceUsersResponse' + $ref: "#/definitions/v1beta1ListServiceUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: orgId description: The organization ID to filter service users by. @@ -4081,78 +4081,78 @@ paths: post: summary: Create service user description: Create a service user. - operationId: ShieldService_CreateServiceUser + operationId: FrontierService_CreateServiceUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateServiceUserResponse' + $ref: "#/definitions/v1beta1CreateServiceUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1CreateServiceUserRequest' + $ref: "#/definitions/v1beta1CreateServiceUserRequest" tags: - ServiceUser /v1beta1/serviceusers/{id}: get: summary: Get service user description: Get service user details by its id. - operationId: ShieldService_GetServiceUser + operationId: FrontierService_GetServiceUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetServiceUserResponse' + $ref: "#/definitions/v1beta1GetServiceUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to get. @@ -4164,36 +4164,36 @@ paths: delete: summary: Delete service user description: Delete a service user permanently and all of its relations (keys, organizations, roles, etc) - operationId: ShieldService_DeleteServiceUser + operationId: FrontierService_DeleteServiceUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteServiceUserResponse' + $ref: "#/definitions/v1beta1DeleteServiceUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to delete. @@ -4210,36 +4210,36 @@ paths: get: summary: List service user keys description: List all the keys of a service user with its details except jwk. - operationId: ShieldService_ListServiceUserKeys + operationId: FrontierService_ListServiceUserKeys responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListServiceUserKeysResponse' + $ref: "#/definitions/v1beta1ListServiceUserKeysResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to list keys for. @@ -4251,36 +4251,36 @@ paths: post: summary: Create service user key description: Generate a service user key and return it, the private key part of the response will not be persisted and should be kept securely by client. - operationId: ShieldService_CreateServiceUserKey + operationId: FrontierService_CreateServiceUserKey responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateServiceUserKeyResponse' + $ref: "#/definitions/v1beta1CreateServiceUserKeyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to create a key for. @@ -4301,36 +4301,36 @@ paths: get: summary: Get service user key description: Get a service user public RSA JWK set. - operationId: ShieldService_GetServiceUserKey + operationId: FrontierService_GetServiceUserKey responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetServiceUserKeyResponse' + $ref: "#/definitions/v1beta1GetServiceUserKeyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to get a key for. @@ -4347,36 +4347,36 @@ paths: delete: summary: Delete service user key description: Delete a service user key permanently. - operationId: ShieldService_DeleteServiceUserKey + operationId: FrontierService_DeleteServiceUserKey responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteServiceUserKeyResponse' + $ref: "#/definitions/v1beta1DeleteServiceUserKeyResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to delete a key for. @@ -4394,36 +4394,36 @@ paths: get: summary: List service user secrets description: List all the secrets of a service user. - operationId: ShieldService_ListServiceUserSecrets + operationId: FrontierService_ListServiceUserSecrets responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListServiceUserSecretsResponse' + $ref: "#/definitions/v1beta1ListServiceUserSecretsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to list secrets for. @@ -4435,36 +4435,36 @@ paths: post: summary: Create service user secret description: Generate a service user secret and return it. The secret value will not be persisted and should be securely stored by client. - operationId: ShieldService_CreateServiceUserSecret + operationId: FrontierService_CreateServiceUserSecret responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateServiceUserSecretResponse' + $ref: "#/definitions/v1beta1CreateServiceUserSecretResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to create a key for. @@ -4485,36 +4485,36 @@ paths: delete: summary: Delete service user secret description: Delete a service user secret credential. - operationId: ShieldService_DeleteServiceUserSecret + operationId: FrontierService_DeleteServiceUserSecret responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteServiceUserSecretResponse' + $ref: "#/definitions/v1beta1DeleteServiceUserSecretResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the service user to delete a secret for. @@ -4531,37 +4531,37 @@ paths: /v1beta1/users: get: summary: List public users - description: Returns the users from all the organizations in a Shield instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination. - operationId: ShieldService_ListUsers + description: Returns the users from all the organizations in a Frontier instance. It can be filtered by keyword, organization, group and state. Additionally you can include page number and page size for pagination. + operationId: FrontierService_ListUsers responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListUsersResponse' + $ref: "#/definitions/v1beta1ListUsersResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: pageSize description: The maximum number of users to return per page. The default is 50. @@ -4599,80 +4599,80 @@ paths: - User post: summary: Create user - description: 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Shield instance. If a user name is not provided, Shield automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

        *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`' - operationId: ShieldService_CreateUser + description: 'Create a user with the given details. A user is not attached to an organization or a group by default,and can be invited to the org/group. The name of the user must be unique within the entire Frontier instance. If a user name is not provided, Frontier automatically generates a name from the user email. The user metadata is validated against the user metaschema. By default the user metaschema contains `labels` and `descriptions` for the user. The `title` field can be optionally added for a user-friendly name.

        *Example:*`{"email":"john.doe@raystack.org","title":"John Doe",metadata:{"label": {"key1": "value1"}, "description": "User Description"}}`' + operationId: FrontierService_CreateUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1CreateUserResponse' + $ref: "#/definitions/v1beta1CreateUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1UserRequestBody' + $ref: "#/definitions/v1beta1UserRequestBody" tags: - User security: [] /v1beta1/users/{id}: get: summary: Get user - description: Get a user by id searched over all organizations in Shield. - operationId: ShieldService_GetUser + description: Get a user by id searched over all organizations in Frontier. + operationId: FrontierService_GetUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetUserResponse' + $ref: "#/definitions/v1beta1GetUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4683,36 +4683,36 @@ paths: delete: summary: Delete user description: Delete an user permanently forever and all of its relations (organizations, groups, etc) - operationId: ShieldService_DeleteUser + operationId: FrontierService_DeleteUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DeleteUserResponse' + $ref: "#/definitions/v1beta1DeleteUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4722,36 +4722,36 @@ paths: - User put: summary: Update user - operationId: ShieldService_UpdateUser + operationId: FrontierService_UpdateUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateUserResponse' + $ref: "#/definitions/v1beta1UpdateUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4761,43 +4761,43 @@ paths: in: body required: true schema: - $ref: '#/definitions/v1beta1UserRequestBody' + $ref: "#/definitions/v1beta1UserRequestBody" tags: - User /v1beta1/users/{id}/disable: post: summary: Disable user - description: Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Shield instance. - operationId: ShieldService_DisableUser + description: Sets the state of the user as diabled.The user's membership to groups and organizations will still exist along with all it's roles for access control, but the user will not be able to log in and access the Frontier instance. + operationId: FrontierService_DisableUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1DisableUserResponse' + $ref: "#/definitions/v1beta1DisableUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4813,37 +4813,37 @@ paths: /v1beta1/users/{id}/enable: post: summary: Enable user - description: Sets the state of the user as enabled. The user will be able to log in and access the Shield instance. - operationId: ShieldService_EnableUser + description: Sets the state of the user as enabled. The user will be able to log in and access the Frontier instance. + operationId: FrontierService_EnableUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1EnableUserResponse' + $ref: "#/definitions/v1beta1EnableUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4859,37 +4859,37 @@ paths: /v1beta1/users/{id}/groups: get: summary: List user groups - description: Lists all the groups a user belongs to across all organization in Shield. To get the groups of a user in a specific organization, use the org_id filter in the query parameter. - operationId: ShieldService_ListUserGroups + description: Lists all the groups a user belongs to across all organization in Frontier. To get the groups of a user in a specific organization, use the org_id filter in the query parameter. + operationId: FrontierService_ListUserGroups responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListUserGroupsResponse' + $ref: "#/definitions/v1beta1ListUserGroupsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The unique ID of the user to get groups for. @@ -4907,36 +4907,36 @@ paths: get: summary: List user invitations description: List all the invitations sent to a user. - operationId: ShieldService_ListUserInvitations + operationId: FrontierService_ListUserInvitations responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListUserInvitationsResponse' + $ref: "#/definitions/v1beta1ListUserInvitationsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id description: The user email to list the invitations for. @@ -4949,36 +4949,36 @@ paths: get: summary: Get user organizations description: Get all the organizations a user belongs to. - operationId: ShieldService_GetOrganizationsByUser + operationId: FrontierService_GetOrganizationsByUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationsByUserResponse' + $ref: "#/definitions/v1beta1GetOrganizationsByUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -4990,36 +4990,36 @@ paths: get: summary: Get user projects description: Get all the projects a user belongs to. - operationId: ShieldService_GetProjectsByUser + operationId: FrontierService_GetProjectsByUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetProjectsByUserResponse' + $ref: "#/definitions/v1beta1GetProjectsByUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: id in: path @@ -5030,190 +5030,190 @@ paths: /v1beta1/users/self: get: summary: Get current user - operationId: ShieldService_GetCurrentUser + operationId: FrontierService_GetCurrentUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetCurrentUserResponse' + $ref: "#/definitions/v1beta1GetCurrentUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - User put: summary: Update current user - operationId: ShieldService_UpdateCurrentUser + operationId: FrontierService_UpdateCurrentUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1UpdateCurrentUserResponse' + $ref: "#/definitions/v1beta1UpdateCurrentUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" parameters: - name: body in: body required: true schema: - $ref: '#/definitions/v1beta1UserRequestBody' + $ref: "#/definitions/v1beta1UserRequestBody" tags: - User /v1beta1/users/self/groups: get: summary: List my groups - operationId: ShieldService_ListCurrentUserGroups + operationId: FrontierService_ListCurrentUserGroups responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1ListCurrentUserGroupsResponse' + $ref: "#/definitions/v1beta1ListCurrentUserGroupsResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - User /v1beta1/users/self/organizations: get: summary: Get my organizations description: Get all organizations the current user belongs to - operationId: ShieldService_GetOrganizationsByCurrentUser + operationId: FrontierService_GetOrganizationsByCurrentUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetOrganizationsByCurrentUserResponse' + $ref: "#/definitions/v1beta1GetOrganizationsByCurrentUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - User /v1beta1/users/self/projects: get: summary: Get my projects description: Get all projects the current user belongs to - operationId: ShieldService_GetProjectsByCurrentUser + operationId: FrontierService_GetProjectsByCurrentUser responses: "200": description: A successful response. schema: - $ref: '#/definitions/v1beta1GetProjectsByCurrentUserResponse' + $ref: "#/definitions/v1beta1GetProjectsByCurrentUserResponse" "400": description: Bad Request - The request was malformed or contained invalid parameters. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "401": description: Unauthorized - Authentication is required schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "403": description: Forbidden - User does not have permission to access the resource schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "404": description: Not Found - The requested resource was not found schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" "500": - description: Internal Server Error. Returned when theres is something wrong with Shield server. + description: Internal Server Error. Returned when theres is something wrong with Frontier server. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" default: description: An unexpected error response. schema: - $ref: '#/definitions/rpcStatus' + $ref: "#/definitions/rpcStatus" tags: - User definitions: protobufAny: type: object properties: - '@type': + "@type": type: string additionalProperties: {} protobufNullValue: @@ -5240,7 +5240,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/protobufAny' + $ref: "#/definitions/protobufAny" v1beta1AcceptOrganizationInvitationResponse: type: object v1beta1AddGroupUsersResponse: @@ -5262,10 +5262,10 @@ definitions: type: string title: Action performed, e.g. project.create, user.update, serviceuser.delete actor: - $ref: '#/definitions/v1beta1AuditLogActor' + $ref: "#/definitions/v1beta1AuditLogActor" title: Actor performing the action target: - $ref: '#/definitions/v1beta1AuditLogTarget' + $ref: "#/definitions/v1beta1AuditLogTarget" title: Target of the action context: type: object @@ -5365,7 +5365,7 @@ definitions: description: the permission name to check.
        *Example:* `get` or `list` resource: type: string - description: '`namespace:uuid` or `namespace:name` of the org or project, and `namespace:urn` of a resource under a project. In case of an org/project either provide the complete namespace (app/organization) or Shield can also parse aliases for the same as `org` or `project`.
        *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`' + description: "`namespace:uuid` or `namespace:name` of the org or project, and `namespace:urn` of a resource under a project. In case of an org/project either provide the complete namespace (app/organization) or Frontier can also parse aliases for the same as `org` or `project`.
        *Example:* `organization:92f69c3a-334b-4f25-90b8-4d4f3be6b825` or `app/project:project-name` or `compute/instance:92f69c3a-334b-4f25-90b8-4d4f3be6b825`" required: - permission v1beta1CheckResourcePermissionResponse: @@ -5377,29 +5377,29 @@ definitions: type: object properties: group: - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1CreateMetaSchemaResponse: type: object properties: metaschema: - $ref: '#/definitions/v1beta1MetaSchema' + $ref: "#/definitions/v1beta1MetaSchema" v1beta1CreateOrganizationAuditLogsResponse: type: object v1beta1CreateOrganizationInvitationResponse: type: object properties: invitation: - $ref: '#/definitions/v1beta1Invitation' + $ref: "#/definitions/v1beta1Invitation" v1beta1CreateOrganizationResponse: type: object properties: organization: - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1CreateOrganizationRoleResponse: type: object properties: role: - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1CreatePermissionRequest: type: object properties: @@ -5407,7 +5407,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1PermissionRequestBody' + $ref: "#/definitions/v1beta1PermissionRequestBody" v1beta1CreatePermissionResponse: type: object properties: @@ -5415,42 +5415,42 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Permission' + $ref: "#/definitions/v1beta1Permission" v1beta1CreatePolicyResponse: type: object properties: policy: - $ref: '#/definitions/v1beta1Policy' + $ref: "#/definitions/v1beta1Policy" v1beta1CreateProjectResourceResponse: type: object properties: resource: - $ref: '#/definitions/v1beta1Resource' + $ref: "#/definitions/v1beta1Resource" v1beta1CreateProjectResponse: type: object properties: project: - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1CreateRelationResponse: type: object properties: relation: - $ref: '#/definitions/v1beta1Relation' + $ref: "#/definitions/v1beta1Relation" v1beta1CreateRoleResponse: type: object properties: role: - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1CreateServiceUserKeyResponse: type: object properties: key: - $ref: '#/definitions/v1beta1KeyCredential' + $ref: "#/definitions/v1beta1KeyCredential" v1beta1CreateServiceUserRequest: type: object properties: body: - $ref: '#/definitions/v1beta1ServiceUserRequestBody' + $ref: "#/definitions/v1beta1ServiceUserRequestBody" orgId: type: string description: The organization ID to which the service user belongs to. @@ -5460,17 +5460,17 @@ definitions: type: object properties: serviceuser: - $ref: '#/definitions/v1beta1ServiceUser' + $ref: "#/definitions/v1beta1ServiceUser" v1beta1CreateServiceUserSecretResponse: type: object properties: secret: - $ref: '#/definitions/v1beta1SecretCredential' + $ref: "#/definitions/v1beta1SecretCredential" v1beta1CreateUserResponse: type: object properties: user: - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1DeleteGroupResponse: type: object v1beta1DeleteMetaSchemaResponse: @@ -5521,14 +5521,14 @@ definitions: type: object properties: user: - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" serviceuser: - $ref: '#/definitions/v1beta1ServiceUser' + $ref: "#/definitions/v1beta1ServiceUser" v1beta1GetGroupResponse: type: object properties: group: - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1GetJWKsResponse: type: object properties: @@ -5536,38 +5536,38 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1JSONWebKey' + $ref: "#/definitions/v1beta1JSONWebKey" title: GetJWKsResponse is a valid JSON Web Key Set as specififed in rfc 7517 v1beta1GetMetaSchemaResponse: type: object properties: metaschema: - $ref: '#/definitions/v1beta1MetaSchema' + $ref: "#/definitions/v1beta1MetaSchema" v1beta1GetNamespaceResponse: type: object properties: namespace: - $ref: '#/definitions/v1beta1Namespace' + $ref: "#/definitions/v1beta1Namespace" v1beta1GetOrganizationAuditLogResponse: type: object properties: log: - $ref: '#/definitions/v1beta1AuditLog' + $ref: "#/definitions/v1beta1AuditLog" v1beta1GetOrganizationInvitationResponse: type: object properties: invitation: - $ref: '#/definitions/v1beta1Invitation' + $ref: "#/definitions/v1beta1Invitation" v1beta1GetOrganizationResponse: type: object properties: organization: - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1GetOrganizationRoleResponse: type: object properties: role: - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1GetOrganizationsByCurrentUserResponse: type: object properties: @@ -5575,7 +5575,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1GetOrganizationsByUserResponse: type: object properties: @@ -5583,27 +5583,27 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1GetPermissionResponse: type: object properties: permission: - $ref: '#/definitions/v1beta1Permission' + $ref: "#/definitions/v1beta1Permission" v1beta1GetPolicyResponse: type: object properties: policy: - $ref: '#/definitions/v1beta1Policy' + $ref: "#/definitions/v1beta1Policy" v1beta1GetProjectResourceResponse: type: object properties: resource: - $ref: '#/definitions/v1beta1Resource' + $ref: "#/definitions/v1beta1Resource" v1beta1GetProjectResponse: type: object properties: project: - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1GetProjectsByCurrentUserResponse: type: object properties: @@ -5611,7 +5611,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1GetProjectsByUserResponse: type: object properties: @@ -5619,12 +5619,12 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1GetRelationResponse: type: object properties: relation: - $ref: '#/definitions/v1beta1Relation' + $ref: "#/definitions/v1beta1Relation" v1beta1GetServiceUserKeyResponse: type: object properties: @@ -5632,17 +5632,17 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1JSONWebKey' + $ref: "#/definitions/v1beta1JSONWebKey" v1beta1GetServiceUserResponse: type: object properties: serviceuser: - $ref: '#/definitions/v1beta1ServiceUser' + $ref: "#/definitions/v1beta1ServiceUser" v1beta1GetUserResponse: type: object properties: user: - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1Group: type: object properties: @@ -5671,7 +5671,7 @@ definitions: properties: name: type: string - description: The name of the group. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores. + description: The name of the group. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores. title: type: string description: The title can contain any UTF-8 character, used to provide a human-readable name for the group. Can also be left empty. @@ -5767,7 +5767,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1ListAllUsersResponse: type: object properties: @@ -5778,7 +5778,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListAuthStrategiesResponse: type: object properties: @@ -5786,7 +5786,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1AuthStrategy' + $ref: "#/definitions/v1beta1AuthStrategy" v1beta1ListCurrentUserGroupsResponse: type: object properties: @@ -5794,7 +5794,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1ListGroupUsersResponse: type: object properties: @@ -5802,7 +5802,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListGroupsResponse: type: object properties: @@ -5810,7 +5810,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1ListMetaSchemasResponse: type: object properties: @@ -5818,7 +5818,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1MetaSchema' + $ref: "#/definitions/v1beta1MetaSchema" v1beta1ListNamespacesResponse: type: object properties: @@ -5826,7 +5826,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Namespace' + $ref: "#/definitions/v1beta1Namespace" v1beta1ListOrganizationAdminsResponse: type: object properties: @@ -5834,7 +5834,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListOrganizationAuditLogsResponse: type: object properties: @@ -5842,7 +5842,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1AuditLog' + $ref: "#/definitions/v1beta1AuditLog" v1beta1ListOrganizationGroupsResponse: type: object properties: @@ -5850,7 +5850,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1ListOrganizationInvitationsResponse: type: object properties: @@ -5858,7 +5858,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Invitation' + $ref: "#/definitions/v1beta1Invitation" v1beta1ListOrganizationProjectsResponse: type: object properties: @@ -5866,7 +5866,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1ListOrganizationRolesResponse: type: object properties: @@ -5874,7 +5874,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1ListOrganizationServiceUsersResponse: type: object properties: @@ -5882,7 +5882,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1ServiceUser' + $ref: "#/definitions/v1beta1ServiceUser" v1beta1ListOrganizationUsersResponse: type: object properties: @@ -5890,7 +5890,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListOrganizationsResponse: type: object properties: @@ -5898,7 +5898,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1ListPermissionsResponse: type: object properties: @@ -5906,7 +5906,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Permission' + $ref: "#/definitions/v1beta1Permission" v1beta1ListPoliciesResponse: type: object properties: @@ -5914,7 +5914,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Policy' + $ref: "#/definitions/v1beta1Policy" v1beta1ListProjectAdminsResponse: type: object properties: @@ -5922,7 +5922,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListProjectResourcesResponse: type: object properties: @@ -5930,7 +5930,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Resource' + $ref: "#/definitions/v1beta1Resource" v1beta1ListProjectUsersResponse: type: object properties: @@ -5938,7 +5938,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1ListProjectsResponse: type: object properties: @@ -5946,7 +5946,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1ListRelationsResponse: type: object properties: @@ -5954,7 +5954,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Relation' + $ref: "#/definitions/v1beta1Relation" v1beta1ListResourcesResponse: type: object properties: @@ -5962,7 +5962,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Resource' + $ref: "#/definitions/v1beta1Resource" v1beta1ListRolesResponse: type: object properties: @@ -5970,7 +5970,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1ListServiceUserKeysResponse: type: object properties: @@ -5978,7 +5978,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1ServiceUserKey' + $ref: "#/definitions/v1beta1ServiceUserKey" v1beta1ListServiceUserSecretsResponse: type: object properties: @@ -5986,7 +5986,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1SecretCredential' + $ref: "#/definitions/v1beta1SecretCredential" title: secrets will be listed without the secret value v1beta1ListServiceUsersResponse: type: object @@ -5995,7 +5995,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1ServiceUser' + $ref: "#/definitions/v1beta1ServiceUser" v1beta1ListUserGroupsResponse: type: object properties: @@ -6003,7 +6003,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1ListUserInvitationsResponse: type: object properties: @@ -6011,7 +6011,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Invitation' + $ref: "#/definitions/v1beta1Invitation" v1beta1ListUsersResponse: type: object properties: @@ -6022,7 +6022,7 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1MetaSchema: type: object properties: @@ -6052,7 +6052,7 @@ definitions: properties: name: type: string - description: The name of the metaschema. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores. + description: The name of the metaschema. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores. schema: type: string description: The schema of the metaschema. The schema must be a valid JSON schema.Please refer to https://json-schema.org/ to know more about json schema. @@ -6066,7 +6066,7 @@ definitions: type: string name: type: string - title: 'name could be in a format like: app/organization' + title: "name could be in a format like: app/organization" metadata: type: object createdAt: @@ -6105,7 +6105,7 @@ definitions: properties: name: type: string - description: The name of the organization. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
        *Example:*`"shield-org1-acme"` + description: The name of the organization. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
        *Example:*`"frontier-org1-acme"` title: type: string description: 'The title can contain any UTF-8 character, used to provide a human-readable name for the organization. Can also be left empty.
        *Example*: `"Acme Inc"`' @@ -6146,7 +6146,7 @@ definitions: properties: name: type: string - description: The name of the permission. It should be unique across a Shield instance and can contain only alphanumeric characters. + description: The name of the permission. It should be unique across a Frontier instance and can contain only alphanumeric characters. namespace: type: string description: The namespace of the permission.The namespace should be in service/resource format.
        *Example:*`app/guardian` @@ -6238,10 +6238,10 @@ definitions: properties: name: type: string - description: The name of the project. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores.
        *Example:* `shield-playground` + description: The name of the project. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores.
        *Example:* `frontier-playground` title: type: string - description: The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
        *Example:* `Shield Playground` + description: The title can contain any UTF-8 character, used to provide a human-readable name for the project. Can also be left empty.
        *Example:* `Frontier Playground` metadata: type: object description: Metadata object for projects that can hold key value pairs defined in Project Metaschema. @@ -6332,7 +6332,7 @@ definitions: description: The title can contain any UTF-8 character, used to provide a human-readable name for the resource. Can also be left empty. namespace: type: string - description: The namespace of the resource. The resource namespace are created when permissions for that resource is created in Shield. If namespace doesn't exists the request will fail.
        *Example:* `compute/instance` + description: The namespace of the resource. The resource namespace are created when permissions for that resource is created in Frontier. If namespace doesn't exists the request will fail.
        *Example:* `compute/instance` principal: type: string description: UserID or ServiceUserID that should be marked as owner of the resource. If not provided, the current logged in user will be made the resource owner.
        *Example:* `user:92f69c3a-334b-4f25-90b8-4d4f3be6b825` @@ -6457,32 +6457,32 @@ definitions: type: object properties: user: - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1UpdateGroupResponse: type: object properties: group: - $ref: '#/definitions/v1beta1Group' + $ref: "#/definitions/v1beta1Group" v1beta1UpdateMetaSchemaResponse: type: object properties: metaschema: - $ref: '#/definitions/v1beta1MetaSchema' + $ref: "#/definitions/v1beta1MetaSchema" v1beta1UpdateOrganizationResponse: type: object properties: organization: - $ref: '#/definitions/v1beta1Organization' + $ref: "#/definitions/v1beta1Organization" v1beta1UpdateOrganizationRoleResponse: type: object properties: role: - $ref: '#/definitions/v1beta1Role' + $ref: "#/definitions/v1beta1Role" v1beta1UpdatePermissionResponse: type: object properties: permission: - $ref: '#/definitions/v1beta1Permission' + $ref: "#/definitions/v1beta1Permission" v1beta1UpdatePolicyResponse: type: object properties: @@ -6490,22 +6490,22 @@ definitions: type: array items: type: object - $ref: '#/definitions/v1beta1Policy' + $ref: "#/definitions/v1beta1Policy" v1beta1UpdateProjectResourceResponse: type: object properties: resource: - $ref: '#/definitions/v1beta1Resource' + $ref: "#/definitions/v1beta1Resource" v1beta1UpdateProjectResponse: type: object properties: project: - $ref: '#/definitions/v1beta1Project' + $ref: "#/definitions/v1beta1Project" v1beta1UpdateUserResponse: type: object properties: user: - $ref: '#/definitions/v1beta1User' + $ref: "#/definitions/v1beta1User" v1beta1User: type: object properties: @@ -6541,10 +6541,10 @@ definitions: properties: name: type: string - description: 'The name of the user. The name must be unique within the entire Shield instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Shield automatically generates a name from the user email. ' + description: "The name of the user. The name must be unique within the entire Frontier instance. The name can contain only alphanumeric characters, dashes and underscores and must start with a letter. If not provided, Frontier automatically generates a name from the user email. " email: type: string - description: The email of the user. The email must be unique within the entire Shield instance.
        *Example:*`"john.doe@raystack.org"` + description: The email of the user. The email must be unique within the entire Frontier instance.
        *Example:*`"john.doe@raystack.org"` metadata: type: object description: 'Metadata object for users that can hold key value pairs pre-defined in User Metaschema. The metadata object can be used to store arbitrary information about the user such as label, description etc. By default the user metaschema contains labels and descriptions for the user. Update the same to add more fields to the user metadata object.
        *Example:*`{"label": {"key1": "value1"}, "description": "User Description"}`' @@ -6557,12 +6557,12 @@ securityDefinitions: Basic: type: basic description: use Client ID as username and Client Secret as password - name: 'Basic ' + name: "Basic " in: header Bearer: type: oauth2 - description: 'Access token or JWT token, prefixed by Bearer: Bearer ' - name: 'Bearer ' + description: "Access token or JWT token, prefixed by Bearer: Bearer " + name: "Bearer " in: header security: - Basic: [] diff --git a/proto/v1beta1/admin.pb.go b/proto/v1beta1/admin.pb.go index 1febe13a3..fd1121018 100644 --- a/proto/v1beta1/admin.pb.go +++ b/proto/v1beta1/admin.pb.go @@ -2,9 +2,9 @@ // versions: // protoc-gen-go v1.30.0 // protoc (unknown) -// source: raystack/shield/v1beta1/admin.proto +// source: raystack/frontier/v1beta1/admin.proto -package shieldv1beta1 +package frontierv1beta1 import ( _ "github.com/envoyproxy/protoc-gen-validate/validate" @@ -40,7 +40,7 @@ type ListAllUsersRequest struct { func (x *ListAllUsersRequest) Reset() { *x = ListAllUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[0] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -53,7 +53,7 @@ func (x *ListAllUsersRequest) String() string { func (*ListAllUsersRequest) ProtoMessage() {} func (x *ListAllUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[0] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -66,7 +66,7 @@ func (x *ListAllUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAllUsersRequest.ProtoReflect.Descriptor instead. func (*ListAllUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{0} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{0} } func (x *ListAllUsersRequest) GetPageSize() int32 { @@ -123,7 +123,7 @@ type ListAllUsersResponse struct { func (x *ListAllUsersResponse) Reset() { *x = ListAllUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[1] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -136,7 +136,7 @@ func (x *ListAllUsersResponse) String() string { func (*ListAllUsersResponse) ProtoMessage() {} func (x *ListAllUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[1] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -149,7 +149,7 @@ func (x *ListAllUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAllUsersResponse.ProtoReflect.Descriptor instead. func (*ListAllUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{1} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{1} } func (x *ListAllUsersResponse) GetCount() int32 { @@ -178,7 +178,7 @@ type ListGroupsRequest struct { func (x *ListGroupsRequest) Reset() { *x = ListGroupsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[2] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -191,7 +191,7 @@ func (x *ListGroupsRequest) String() string { func (*ListGroupsRequest) ProtoMessage() {} func (x *ListGroupsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[2] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -204,7 +204,7 @@ func (x *ListGroupsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListGroupsRequest.ProtoReflect.Descriptor instead. func (*ListGroupsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{2} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{2} } func (x *ListGroupsRequest) GetOrgId() string { @@ -232,7 +232,7 @@ type ListGroupsResponse struct { func (x *ListGroupsResponse) Reset() { *x = ListGroupsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[3] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -245,7 +245,7 @@ func (x *ListGroupsResponse) String() string { func (*ListGroupsResponse) ProtoMessage() {} func (x *ListGroupsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[3] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -258,7 +258,7 @@ func (x *ListGroupsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListGroupsResponse.ProtoReflect.Descriptor instead. func (*ListGroupsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{3} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{3} } func (x *ListGroupsResponse) GetGroups() []*Group { @@ -280,7 +280,7 @@ type ListAllOrganizationsRequest struct { func (x *ListAllOrganizationsRequest) Reset() { *x = ListAllOrganizationsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[4] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -293,7 +293,7 @@ func (x *ListAllOrganizationsRequest) String() string { func (*ListAllOrganizationsRequest) ProtoMessage() {} func (x *ListAllOrganizationsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[4] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -306,7 +306,7 @@ func (x *ListAllOrganizationsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAllOrganizationsRequest.ProtoReflect.Descriptor instead. func (*ListAllOrganizationsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{4} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{4} } func (x *ListAllOrganizationsRequest) GetUserId() string { @@ -334,7 +334,7 @@ type ListAllOrganizationsResponse struct { func (x *ListAllOrganizationsResponse) Reset() { *x = ListAllOrganizationsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[5] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -347,7 +347,7 @@ func (x *ListAllOrganizationsResponse) String() string { func (*ListAllOrganizationsResponse) ProtoMessage() {} func (x *ListAllOrganizationsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[5] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -360,7 +360,7 @@ func (x *ListAllOrganizationsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAllOrganizationsResponse.ProtoReflect.Descriptor instead. func (*ListAllOrganizationsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{5} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{5} } func (x *ListAllOrganizationsResponse) GetOrganizations() []*Organization { @@ -382,7 +382,7 @@ type ListProjectsRequest struct { func (x *ListProjectsRequest) Reset() { *x = ListProjectsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[6] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -395,7 +395,7 @@ func (x *ListProjectsRequest) String() string { func (*ListProjectsRequest) ProtoMessage() {} func (x *ListProjectsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[6] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -408,7 +408,7 @@ func (x *ListProjectsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectsRequest.ProtoReflect.Descriptor instead. func (*ListProjectsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{6} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{6} } func (x *ListProjectsRequest) GetOrgId() string { @@ -436,7 +436,7 @@ type ListProjectsResponse struct { func (x *ListProjectsResponse) Reset() { *x = ListProjectsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[7] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -449,7 +449,7 @@ func (x *ListProjectsResponse) String() string { func (*ListProjectsResponse) ProtoMessage() {} func (x *ListProjectsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[7] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -462,7 +462,7 @@ func (x *ListProjectsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectsResponse.ProtoReflect.Descriptor instead. func (*ListProjectsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{7} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{7} } func (x *ListProjectsResponse) GetProjects() []*Project { @@ -481,7 +481,7 @@ type ListRelationsRequest struct { func (x *ListRelationsRequest) Reset() { *x = ListRelationsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[8] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -494,7 +494,7 @@ func (x *ListRelationsRequest) String() string { func (*ListRelationsRequest) ProtoMessage() {} func (x *ListRelationsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[8] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -507,7 +507,7 @@ func (x *ListRelationsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListRelationsRequest.ProtoReflect.Descriptor instead. func (*ListRelationsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{8} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{8} } type ListRelationsResponse struct { @@ -521,7 +521,7 @@ type ListRelationsResponse struct { func (x *ListRelationsResponse) Reset() { *x = ListRelationsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[9] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -534,7 +534,7 @@ func (x *ListRelationsResponse) String() string { func (*ListRelationsResponse) ProtoMessage() {} func (x *ListRelationsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[9] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -547,7 +547,7 @@ func (x *ListRelationsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListRelationsResponse.ProtoReflect.Descriptor instead. func (*ListRelationsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{9} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{9} } func (x *ListRelationsResponse) GetRelations() []*Relation { @@ -571,7 +571,7 @@ type ListResourcesRequest struct { func (x *ListResourcesRequest) Reset() { *x = ListResourcesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[10] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -584,7 +584,7 @@ func (x *ListResourcesRequest) String() string { func (*ListResourcesRequest) ProtoMessage() {} func (x *ListResourcesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[10] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -597,7 +597,7 @@ func (x *ListResourcesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListResourcesRequest.ProtoReflect.Descriptor instead. func (*ListResourcesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{10} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{10} } func (x *ListResourcesRequest) GetUserId() string { @@ -639,7 +639,7 @@ type ListResourcesResponse struct { func (x *ListResourcesResponse) Reset() { *x = ListResourcesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[11] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -652,7 +652,7 @@ func (x *ListResourcesResponse) String() string { func (*ListResourcesResponse) ProtoMessage() {} func (x *ListResourcesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[11] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -665,7 +665,7 @@ func (x *ListResourcesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListResourcesResponse.ProtoReflect.Descriptor instead. func (*ListResourcesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{11} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{11} } func (x *ListResourcesResponse) GetResources() []*Resource { @@ -690,7 +690,7 @@ type ListPoliciesRequest struct { func (x *ListPoliciesRequest) Reset() { *x = ListPoliciesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[12] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -703,7 +703,7 @@ func (x *ListPoliciesRequest) String() string { func (*ListPoliciesRequest) ProtoMessage() {} func (x *ListPoliciesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[12] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -716,7 +716,7 @@ func (x *ListPoliciesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListPoliciesRequest.ProtoReflect.Descriptor instead. func (*ListPoliciesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{12} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{12} } func (x *ListPoliciesRequest) GetOrgId() string { @@ -765,7 +765,7 @@ type ListPoliciesResponse struct { func (x *ListPoliciesResponse) Reset() { *x = ListPoliciesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[13] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -778,7 +778,7 @@ func (x *ListPoliciesResponse) String() string { func (*ListPoliciesResponse) ProtoMessage() {} func (x *ListPoliciesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[13] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -791,7 +791,7 @@ func (x *ListPoliciesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListPoliciesResponse.ProtoReflect.Descriptor instead. func (*ListPoliciesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{13} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{13} } func (x *ListPoliciesResponse) GetPolicies() []*Policy { @@ -812,7 +812,7 @@ type CreateRoleRequest struct { func (x *CreateRoleRequest) Reset() { *x = CreateRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[14] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -825,7 +825,7 @@ func (x *CreateRoleRequest) String() string { func (*CreateRoleRequest) ProtoMessage() {} func (x *CreateRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[14] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -838,7 +838,7 @@ func (x *CreateRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateRoleRequest.ProtoReflect.Descriptor instead. func (*CreateRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{14} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{14} } func (x *CreateRoleRequest) GetBody() *RoleRequestBody { @@ -859,7 +859,7 @@ type CreateRoleResponse struct { func (x *CreateRoleResponse) Reset() { *x = CreateRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[15] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -872,7 +872,7 @@ func (x *CreateRoleResponse) String() string { func (*CreateRoleResponse) ProtoMessage() {} func (x *CreateRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[15] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -885,7 +885,7 @@ func (x *CreateRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateRoleResponse.ProtoReflect.Descriptor instead. func (*CreateRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{15} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{15} } func (x *CreateRoleResponse) GetRole() *Role { @@ -906,7 +906,7 @@ type DeleteRoleRequest struct { func (x *DeleteRoleRequest) Reset() { *x = DeleteRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[16] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -919,7 +919,7 @@ func (x *DeleteRoleRequest) String() string { func (*DeleteRoleRequest) ProtoMessage() {} func (x *DeleteRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[16] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -932,7 +932,7 @@ func (x *DeleteRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteRoleRequest.ProtoReflect.Descriptor instead. func (*DeleteRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{16} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{16} } func (x *DeleteRoleRequest) GetId() string { @@ -951,7 +951,7 @@ type DeleteRoleResponse struct { func (x *DeleteRoleResponse) Reset() { *x = DeleteRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[17] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -964,7 +964,7 @@ func (x *DeleteRoleResponse) String() string { func (*DeleteRoleResponse) ProtoMessage() {} func (x *DeleteRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[17] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -977,7 +977,7 @@ func (x *DeleteRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteRoleResponse.ProtoReflect.Descriptor instead. func (*DeleteRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{17} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{17} } type PermissionRequestBody struct { @@ -985,11 +985,11 @@ type PermissionRequestBody struct { sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/admin.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/admin.proto. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` // namespace should be in service/resource format // - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/admin.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/admin.proto. Namespace string `protobuf:"bytes,2,opt,name=namespace,proto3" json:"namespace,omitempty"` Metadata *structpb.Struct `protobuf:"bytes,3,opt,name=metadata,proto3" json:"metadata,omitempty"` Title string `protobuf:"bytes,4,opt,name=title,proto3" json:"title,omitempty"` @@ -999,7 +999,7 @@ type PermissionRequestBody struct { func (x *PermissionRequestBody) Reset() { *x = PermissionRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[18] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1012,7 +1012,7 @@ func (x *PermissionRequestBody) String() string { func (*PermissionRequestBody) ProtoMessage() {} func (x *PermissionRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[18] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1025,10 +1025,10 @@ func (x *PermissionRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use PermissionRequestBody.ProtoReflect.Descriptor instead. func (*PermissionRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{18} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{18} } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/admin.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/admin.proto. func (x *PermissionRequestBody) GetName() string { if x != nil { return x.Name @@ -1036,7 +1036,7 @@ func (x *PermissionRequestBody) GetName() string { return "" } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/admin.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/admin.proto. func (x *PermissionRequestBody) GetNamespace() string { if x != nil { return x.Namespace @@ -1076,7 +1076,7 @@ type CreatePermissionRequest struct { func (x *CreatePermissionRequest) Reset() { *x = CreatePermissionRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[19] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1089,7 +1089,7 @@ func (x *CreatePermissionRequest) String() string { func (*CreatePermissionRequest) ProtoMessage() {} func (x *CreatePermissionRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[19] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1102,7 +1102,7 @@ func (x *CreatePermissionRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreatePermissionRequest.ProtoReflect.Descriptor instead. func (*CreatePermissionRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{19} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{19} } func (x *CreatePermissionRequest) GetBodies() []*PermissionRequestBody { @@ -1123,7 +1123,7 @@ type CreatePermissionResponse struct { func (x *CreatePermissionResponse) Reset() { *x = CreatePermissionResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[20] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1136,7 +1136,7 @@ func (x *CreatePermissionResponse) String() string { func (*CreatePermissionResponse) ProtoMessage() {} func (x *CreatePermissionResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[20] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1149,7 +1149,7 @@ func (x *CreatePermissionResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreatePermissionResponse.ProtoReflect.Descriptor instead. func (*CreatePermissionResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{20} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{20} } func (x *CreatePermissionResponse) GetPermissions() []*Permission { @@ -1171,7 +1171,7 @@ type UpdatePermissionRequest struct { func (x *UpdatePermissionRequest) Reset() { *x = UpdatePermissionRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[21] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[21] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1184,7 +1184,7 @@ func (x *UpdatePermissionRequest) String() string { func (*UpdatePermissionRequest) ProtoMessage() {} func (x *UpdatePermissionRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[21] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[21] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1197,7 +1197,7 @@ func (x *UpdatePermissionRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdatePermissionRequest.ProtoReflect.Descriptor instead. func (*UpdatePermissionRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{21} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{21} } func (x *UpdatePermissionRequest) GetId() string { @@ -1225,7 +1225,7 @@ type UpdatePermissionResponse struct { func (x *UpdatePermissionResponse) Reset() { *x = UpdatePermissionResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[22] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[22] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1238,7 +1238,7 @@ func (x *UpdatePermissionResponse) String() string { func (*UpdatePermissionResponse) ProtoMessage() {} func (x *UpdatePermissionResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[22] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[22] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1251,7 +1251,7 @@ func (x *UpdatePermissionResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdatePermissionResponse.ProtoReflect.Descriptor instead. func (*UpdatePermissionResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{22} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{22} } func (x *UpdatePermissionResponse) GetPermission() *Permission { @@ -1272,7 +1272,7 @@ type DeletePermissionRequest struct { func (x *DeletePermissionRequest) Reset() { *x = DeletePermissionRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[23] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[23] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1285,7 +1285,7 @@ func (x *DeletePermissionRequest) String() string { func (*DeletePermissionRequest) ProtoMessage() {} func (x *DeletePermissionRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[23] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[23] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1298,7 +1298,7 @@ func (x *DeletePermissionRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeletePermissionRequest.ProtoReflect.Descriptor instead. func (*DeletePermissionRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{23} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{23} } func (x *DeletePermissionRequest) GetId() string { @@ -1317,7 +1317,7 @@ type DeletePermissionResponse struct { func (x *DeletePermissionResponse) Reset() { *x = DeletePermissionResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[24] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[24] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1330,7 +1330,7 @@ func (x *DeletePermissionResponse) String() string { func (*DeletePermissionResponse) ProtoMessage() {} func (x *DeletePermissionResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_admin_proto_msgTypes[24] + mi := &file_raystack_frontier_v1beta1_admin_proto_msgTypes[24] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1343,12 +1343,12 @@ func (x *DeletePermissionResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeletePermissionResponse.ProtoReflect.Descriptor instead. func (*DeletePermissionResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_admin_proto_rawDescGZIP(), []int{24} + return file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP(), []int{24} } -var File_raystack_shield_v1beta1_admin_proto protoreflect.FileDescriptor +var File_raystack_frontier_v1beta1_admin_proto protoreflect.FileDescriptor -var file_raystack_shield_v1beta1_admin_proto_rawDesc = []byte{ +var file_raystack_frontier_v1beta1_admin_proto_rawDesc = []byte{ 0x0a, 0x23, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, 0x2f, 0x73, 0x68, 0x69, 0x65, 0x6c, 0x64, 0x2f, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x31, 0x2f, 0x61, 0x64, 0x6d, 0x69, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x17, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, 0x2e, @@ -1939,95 +1939,95 @@ var file_raystack_shield_v1beta1_admin_proto_rawDesc = []byte{ } var ( - file_raystack_shield_v1beta1_admin_proto_rawDescOnce sync.Once - file_raystack_shield_v1beta1_admin_proto_rawDescData = file_raystack_shield_v1beta1_admin_proto_rawDesc + file_raystack_frontier_v1beta1_admin_proto_rawDescOnce sync.Once + file_raystack_frontier_v1beta1_admin_proto_rawDescData = file_raystack_frontier_v1beta1_admin_proto_rawDesc ) -func file_raystack_shield_v1beta1_admin_proto_rawDescGZIP() []byte { - file_raystack_shield_v1beta1_admin_proto_rawDescOnce.Do(func() { - file_raystack_shield_v1beta1_admin_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_shield_v1beta1_admin_proto_rawDescData) +func file_raystack_frontier_v1beta1_admin_proto_rawDescGZIP() []byte { + file_raystack_frontier_v1beta1_admin_proto_rawDescOnce.Do(func() { + file_raystack_frontier_v1beta1_admin_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_frontier_v1beta1_admin_proto_rawDescData) }) - return file_raystack_shield_v1beta1_admin_proto_rawDescData -} - -var file_raystack_shield_v1beta1_admin_proto_msgTypes = make([]protoimpl.MessageInfo, 25) -var file_raystack_shield_v1beta1_admin_proto_goTypes = []interface{}{ - (*ListAllUsersRequest)(nil), // 0: raystack.shield.v1beta1.ListAllUsersRequest - (*ListAllUsersResponse)(nil), // 1: raystack.shield.v1beta1.ListAllUsersResponse - (*ListGroupsRequest)(nil), // 2: raystack.shield.v1beta1.ListGroupsRequest - (*ListGroupsResponse)(nil), // 3: raystack.shield.v1beta1.ListGroupsResponse - (*ListAllOrganizationsRequest)(nil), // 4: raystack.shield.v1beta1.ListAllOrganizationsRequest - (*ListAllOrganizationsResponse)(nil), // 5: raystack.shield.v1beta1.ListAllOrganizationsResponse - (*ListProjectsRequest)(nil), // 6: raystack.shield.v1beta1.ListProjectsRequest - (*ListProjectsResponse)(nil), // 7: raystack.shield.v1beta1.ListProjectsResponse - (*ListRelationsRequest)(nil), // 8: raystack.shield.v1beta1.ListRelationsRequest - (*ListRelationsResponse)(nil), // 9: raystack.shield.v1beta1.ListRelationsResponse - (*ListResourcesRequest)(nil), // 10: raystack.shield.v1beta1.ListResourcesRequest - (*ListResourcesResponse)(nil), // 11: raystack.shield.v1beta1.ListResourcesResponse - (*ListPoliciesRequest)(nil), // 12: raystack.shield.v1beta1.ListPoliciesRequest - (*ListPoliciesResponse)(nil), // 13: raystack.shield.v1beta1.ListPoliciesResponse - (*CreateRoleRequest)(nil), // 14: raystack.shield.v1beta1.CreateRoleRequest - (*CreateRoleResponse)(nil), // 15: raystack.shield.v1beta1.CreateRoleResponse - (*DeleteRoleRequest)(nil), // 16: raystack.shield.v1beta1.DeleteRoleRequest - (*DeleteRoleResponse)(nil), // 17: raystack.shield.v1beta1.DeleteRoleResponse - (*PermissionRequestBody)(nil), // 18: raystack.shield.v1beta1.PermissionRequestBody - (*CreatePermissionRequest)(nil), // 19: raystack.shield.v1beta1.CreatePermissionRequest - (*CreatePermissionResponse)(nil), // 20: raystack.shield.v1beta1.CreatePermissionResponse - (*UpdatePermissionRequest)(nil), // 21: raystack.shield.v1beta1.UpdatePermissionRequest - (*UpdatePermissionResponse)(nil), // 22: raystack.shield.v1beta1.UpdatePermissionResponse - (*DeletePermissionRequest)(nil), // 23: raystack.shield.v1beta1.DeletePermissionRequest - (*DeletePermissionResponse)(nil), // 24: raystack.shield.v1beta1.DeletePermissionResponse - (*User)(nil), // 25: raystack.shield.v1beta1.User - (*Group)(nil), // 26: raystack.shield.v1beta1.Group - (*Organization)(nil), // 27: raystack.shield.v1beta1.Organization - (*Project)(nil), // 28: raystack.shield.v1beta1.Project - (*Relation)(nil), // 29: raystack.shield.v1beta1.Relation - (*Resource)(nil), // 30: raystack.shield.v1beta1.Resource - (*Policy)(nil), // 31: raystack.shield.v1beta1.Policy - (*RoleRequestBody)(nil), // 32: raystack.shield.v1beta1.RoleRequestBody - (*Role)(nil), // 33: raystack.shield.v1beta1.Role + return file_raystack_frontier_v1beta1_admin_proto_rawDescData +} + +var file_raystack_frontier_v1beta1_admin_proto_msgTypes = make([]protoimpl.MessageInfo, 25) +var file_raystack_frontier_v1beta1_admin_proto_goTypes = []interface{}{ + (*ListAllUsersRequest)(nil), // 0: raystack.frontier.v1beta1.ListAllUsersRequest + (*ListAllUsersResponse)(nil), // 1: raystack.frontier.v1beta1.ListAllUsersResponse + (*ListGroupsRequest)(nil), // 2: raystack.frontier.v1beta1.ListGroupsRequest + (*ListGroupsResponse)(nil), // 3: raystack.frontier.v1beta1.ListGroupsResponse + (*ListAllOrganizationsRequest)(nil), // 4: raystack.frontier.v1beta1.ListAllOrganizationsRequest + (*ListAllOrganizationsResponse)(nil), // 5: raystack.frontier.v1beta1.ListAllOrganizationsResponse + (*ListProjectsRequest)(nil), // 6: raystack.frontier.v1beta1.ListProjectsRequest + (*ListProjectsResponse)(nil), // 7: raystack.frontier.v1beta1.ListProjectsResponse + (*ListRelationsRequest)(nil), // 8: raystack.frontier.v1beta1.ListRelationsRequest + (*ListRelationsResponse)(nil), // 9: raystack.frontier.v1beta1.ListRelationsResponse + (*ListResourcesRequest)(nil), // 10: raystack.frontier.v1beta1.ListResourcesRequest + (*ListResourcesResponse)(nil), // 11: raystack.frontier.v1beta1.ListResourcesResponse + (*ListPoliciesRequest)(nil), // 12: raystack.frontier.v1beta1.ListPoliciesRequest + (*ListPoliciesResponse)(nil), // 13: raystack.frontier.v1beta1.ListPoliciesResponse + (*CreateRoleRequest)(nil), // 14: raystack.frontier.v1beta1.CreateRoleRequest + (*CreateRoleResponse)(nil), // 15: raystack.frontier.v1beta1.CreateRoleResponse + (*DeleteRoleRequest)(nil), // 16: raystack.frontier.v1beta1.DeleteRoleRequest + (*DeleteRoleResponse)(nil), // 17: raystack.frontier.v1beta1.DeleteRoleResponse + (*PermissionRequestBody)(nil), // 18: raystack.frontier.v1beta1.PermissionRequestBody + (*CreatePermissionRequest)(nil), // 19: raystack.frontier.v1beta1.CreatePermissionRequest + (*CreatePermissionResponse)(nil), // 20: raystack.frontier.v1beta1.CreatePermissionResponse + (*UpdatePermissionRequest)(nil), // 21: raystack.frontier.v1beta1.UpdatePermissionRequest + (*UpdatePermissionResponse)(nil), // 22: raystack.frontier.v1beta1.UpdatePermissionResponse + (*DeletePermissionRequest)(nil), // 23: raystack.frontier.v1beta1.DeletePermissionRequest + (*DeletePermissionResponse)(nil), // 24: raystack.frontier.v1beta1.DeletePermissionResponse + (*User)(nil), // 25: raystack.frontier.v1beta1.User + (*Group)(nil), // 26: raystack.frontier.v1beta1.Group + (*Organization)(nil), // 27: raystack.frontier.v1beta1.Organization + (*Project)(nil), // 28: raystack.frontier.v1beta1.Project + (*Relation)(nil), // 29: raystack.frontier.v1beta1.Relation + (*Resource)(nil), // 30: raystack.frontier.v1beta1.Resource + (*Policy)(nil), // 31: raystack.frontier.v1beta1.Policy + (*RoleRequestBody)(nil), // 32: raystack.frontier.v1beta1.RoleRequestBody + (*Role)(nil), // 33: raystack.frontier.v1beta1.Role (*structpb.Struct)(nil), // 34: google.protobuf.Struct - (*Permission)(nil), // 35: raystack.shield.v1beta1.Permission -} -var file_raystack_shield_v1beta1_admin_proto_depIdxs = []int32{ - 25, // 0: raystack.shield.v1beta1.ListAllUsersResponse.users:type_name -> raystack.shield.v1beta1.User - 26, // 1: raystack.shield.v1beta1.ListGroupsResponse.groups:type_name -> raystack.shield.v1beta1.Group - 27, // 2: raystack.shield.v1beta1.ListAllOrganizationsResponse.organizations:type_name -> raystack.shield.v1beta1.Organization - 28, // 3: raystack.shield.v1beta1.ListProjectsResponse.projects:type_name -> raystack.shield.v1beta1.Project - 29, // 4: raystack.shield.v1beta1.ListRelationsResponse.relations:type_name -> raystack.shield.v1beta1.Relation - 30, // 5: raystack.shield.v1beta1.ListResourcesResponse.resources:type_name -> raystack.shield.v1beta1.Resource - 31, // 6: raystack.shield.v1beta1.ListPoliciesResponse.policies:type_name -> raystack.shield.v1beta1.Policy - 32, // 7: raystack.shield.v1beta1.CreateRoleRequest.body:type_name -> raystack.shield.v1beta1.RoleRequestBody - 33, // 8: raystack.shield.v1beta1.CreateRoleResponse.role:type_name -> raystack.shield.v1beta1.Role - 34, // 9: raystack.shield.v1beta1.PermissionRequestBody.metadata:type_name -> google.protobuf.Struct - 18, // 10: raystack.shield.v1beta1.CreatePermissionRequest.bodies:type_name -> raystack.shield.v1beta1.PermissionRequestBody - 35, // 11: raystack.shield.v1beta1.CreatePermissionResponse.permissions:type_name -> raystack.shield.v1beta1.Permission - 18, // 12: raystack.shield.v1beta1.UpdatePermissionRequest.body:type_name -> raystack.shield.v1beta1.PermissionRequestBody - 35, // 13: raystack.shield.v1beta1.UpdatePermissionResponse.permission:type_name -> raystack.shield.v1beta1.Permission - 0, // 14: raystack.shield.v1beta1.AdminService.ListAllUsers:input_type -> raystack.shield.v1beta1.ListAllUsersRequest - 2, // 15: raystack.shield.v1beta1.AdminService.ListGroups:input_type -> raystack.shield.v1beta1.ListGroupsRequest - 4, // 16: raystack.shield.v1beta1.AdminService.ListAllOrganizations:input_type -> raystack.shield.v1beta1.ListAllOrganizationsRequest - 6, // 17: raystack.shield.v1beta1.AdminService.ListProjects:input_type -> raystack.shield.v1beta1.ListProjectsRequest - 8, // 18: raystack.shield.v1beta1.AdminService.ListRelations:input_type -> raystack.shield.v1beta1.ListRelationsRequest - 10, // 19: raystack.shield.v1beta1.AdminService.ListResources:input_type -> raystack.shield.v1beta1.ListResourcesRequest - 12, // 20: raystack.shield.v1beta1.AdminService.ListPolicies:input_type -> raystack.shield.v1beta1.ListPoliciesRequest - 14, // 21: raystack.shield.v1beta1.AdminService.CreateRole:input_type -> raystack.shield.v1beta1.CreateRoleRequest - 16, // 22: raystack.shield.v1beta1.AdminService.DeleteRole:input_type -> raystack.shield.v1beta1.DeleteRoleRequest - 19, // 23: raystack.shield.v1beta1.AdminService.CreatePermission:input_type -> raystack.shield.v1beta1.CreatePermissionRequest - 21, // 24: raystack.shield.v1beta1.AdminService.UpdatePermission:input_type -> raystack.shield.v1beta1.UpdatePermissionRequest - 23, // 25: raystack.shield.v1beta1.AdminService.DeletePermission:input_type -> raystack.shield.v1beta1.DeletePermissionRequest - 1, // 26: raystack.shield.v1beta1.AdminService.ListAllUsers:output_type -> raystack.shield.v1beta1.ListAllUsersResponse - 3, // 27: raystack.shield.v1beta1.AdminService.ListGroups:output_type -> raystack.shield.v1beta1.ListGroupsResponse - 5, // 28: raystack.shield.v1beta1.AdminService.ListAllOrganizations:output_type -> raystack.shield.v1beta1.ListAllOrganizationsResponse - 7, // 29: raystack.shield.v1beta1.AdminService.ListProjects:output_type -> raystack.shield.v1beta1.ListProjectsResponse - 9, // 30: raystack.shield.v1beta1.AdminService.ListRelations:output_type -> raystack.shield.v1beta1.ListRelationsResponse - 11, // 31: raystack.shield.v1beta1.AdminService.ListResources:output_type -> raystack.shield.v1beta1.ListResourcesResponse - 13, // 32: raystack.shield.v1beta1.AdminService.ListPolicies:output_type -> raystack.shield.v1beta1.ListPoliciesResponse - 15, // 33: raystack.shield.v1beta1.AdminService.CreateRole:output_type -> raystack.shield.v1beta1.CreateRoleResponse - 17, // 34: raystack.shield.v1beta1.AdminService.DeleteRole:output_type -> raystack.shield.v1beta1.DeleteRoleResponse - 20, // 35: raystack.shield.v1beta1.AdminService.CreatePermission:output_type -> raystack.shield.v1beta1.CreatePermissionResponse - 22, // 36: raystack.shield.v1beta1.AdminService.UpdatePermission:output_type -> raystack.shield.v1beta1.UpdatePermissionResponse - 24, // 37: raystack.shield.v1beta1.AdminService.DeletePermission:output_type -> raystack.shield.v1beta1.DeletePermissionResponse + (*Permission)(nil), // 35: raystack.frontier.v1beta1.Permission +} +var file_raystack_frontier_v1beta1_admin_proto_depIdxs = []int32{ + 25, // 0: raystack.frontier.v1beta1.ListAllUsersResponse.users:type_name -> raystack.frontier.v1beta1.User + 26, // 1: raystack.frontier.v1beta1.ListGroupsResponse.groups:type_name -> raystack.frontier.v1beta1.Group + 27, // 2: raystack.frontier.v1beta1.ListAllOrganizationsResponse.organizations:type_name -> raystack.frontier.v1beta1.Organization + 28, // 3: raystack.frontier.v1beta1.ListProjectsResponse.projects:type_name -> raystack.frontier.v1beta1.Project + 29, // 4: raystack.frontier.v1beta1.ListRelationsResponse.relations:type_name -> raystack.frontier.v1beta1.Relation + 30, // 5: raystack.frontier.v1beta1.ListResourcesResponse.resources:type_name -> raystack.frontier.v1beta1.Resource + 31, // 6: raystack.frontier.v1beta1.ListPoliciesResponse.policies:type_name -> raystack.frontier.v1beta1.Policy + 32, // 7: raystack.frontier.v1beta1.CreateRoleRequest.body:type_name -> raystack.frontier.v1beta1.RoleRequestBody + 33, // 8: raystack.frontier.v1beta1.CreateRoleResponse.role:type_name -> raystack.frontier.v1beta1.Role + 34, // 9: raystack.frontier.v1beta1.PermissionRequestBody.metadata:type_name -> google.protobuf.Struct + 18, // 10: raystack.frontier.v1beta1.CreatePermissionRequest.bodies:type_name -> raystack.frontier.v1beta1.PermissionRequestBody + 35, // 11: raystack.frontier.v1beta1.CreatePermissionResponse.permissions:type_name -> raystack.frontier.v1beta1.Permission + 18, // 12: raystack.frontier.v1beta1.UpdatePermissionRequest.body:type_name -> raystack.frontier.v1beta1.PermissionRequestBody + 35, // 13: raystack.frontier.v1beta1.UpdatePermissionResponse.permission:type_name -> raystack.frontier.v1beta1.Permission + 0, // 14: raystack.frontier.v1beta1.AdminService.ListAllUsers:input_type -> raystack.frontier.v1beta1.ListAllUsersRequest + 2, // 15: raystack.frontier.v1beta1.AdminService.ListGroups:input_type -> raystack.frontier.v1beta1.ListGroupsRequest + 4, // 16: raystack.frontier.v1beta1.AdminService.ListAllOrganizations:input_type -> raystack.frontier.v1beta1.ListAllOrganizationsRequest + 6, // 17: raystack.frontier.v1beta1.AdminService.ListProjects:input_type -> raystack.frontier.v1beta1.ListProjectsRequest + 8, // 18: raystack.frontier.v1beta1.AdminService.ListRelations:input_type -> raystack.frontier.v1beta1.ListRelationsRequest + 10, // 19: raystack.frontier.v1beta1.AdminService.ListResources:input_type -> raystack.frontier.v1beta1.ListResourcesRequest + 12, // 20: raystack.frontier.v1beta1.AdminService.ListPolicies:input_type -> raystack.frontier.v1beta1.ListPoliciesRequest + 14, // 21: raystack.frontier.v1beta1.AdminService.CreateRole:input_type -> raystack.frontier.v1beta1.CreateRoleRequest + 16, // 22: raystack.frontier.v1beta1.AdminService.DeleteRole:input_type -> raystack.frontier.v1beta1.DeleteRoleRequest + 19, // 23: raystack.frontier.v1beta1.AdminService.CreatePermission:input_type -> raystack.frontier.v1beta1.CreatePermissionRequest + 21, // 24: raystack.frontier.v1beta1.AdminService.UpdatePermission:input_type -> raystack.frontier.v1beta1.UpdatePermissionRequest + 23, // 25: raystack.frontier.v1beta1.AdminService.DeletePermission:input_type -> raystack.frontier.v1beta1.DeletePermissionRequest + 1, // 26: raystack.frontier.v1beta1.AdminService.ListAllUsers:output_type -> raystack.frontier.v1beta1.ListAllUsersResponse + 3, // 27: raystack.frontier.v1beta1.AdminService.ListGroups:output_type -> raystack.frontier.v1beta1.ListGroupsResponse + 5, // 28: raystack.frontier.v1beta1.AdminService.ListAllOrganizations:output_type -> raystack.frontier.v1beta1.ListAllOrganizationsResponse + 7, // 29: raystack.frontier.v1beta1.AdminService.ListProjects:output_type -> raystack.frontier.v1beta1.ListProjectsResponse + 9, // 30: raystack.frontier.v1beta1.AdminService.ListRelations:output_type -> raystack.frontier.v1beta1.ListRelationsResponse + 11, // 31: raystack.frontier.v1beta1.AdminService.ListResources:output_type -> raystack.frontier.v1beta1.ListResourcesResponse + 13, // 32: raystack.frontier.v1beta1.AdminService.ListPolicies:output_type -> raystack.frontier.v1beta1.ListPoliciesResponse + 15, // 33: raystack.frontier.v1beta1.AdminService.CreateRole:output_type -> raystack.frontier.v1beta1.CreateRoleResponse + 17, // 34: raystack.frontier.v1beta1.AdminService.DeleteRole:output_type -> raystack.frontier.v1beta1.DeleteRoleResponse + 20, // 35: raystack.frontier.v1beta1.AdminService.CreatePermission:output_type -> raystack.frontier.v1beta1.CreatePermissionResponse + 22, // 36: raystack.frontier.v1beta1.AdminService.UpdatePermission:output_type -> raystack.frontier.v1beta1.UpdatePermissionResponse + 24, // 37: raystack.frontier.v1beta1.AdminService.DeletePermission:output_type -> raystack.frontier.v1beta1.DeletePermissionResponse 26, // [26:38] is the sub-list for method output_type 14, // [14:26] is the sub-list for method input_type 14, // [14:14] is the sub-list for extension type_name @@ -2035,14 +2035,14 @@ var file_raystack_shield_v1beta1_admin_proto_depIdxs = []int32{ 0, // [0:14] is the sub-list for field type_name } -func init() { file_raystack_shield_v1beta1_admin_proto_init() } -func file_raystack_shield_v1beta1_admin_proto_init() { - if File_raystack_shield_v1beta1_admin_proto != nil { +func init() { file_raystack_frontier_v1beta1_admin_proto_init() } +func file_raystack_frontier_v1beta1_admin_proto_init() { + if File_raystack_frontier_v1beta1_admin_proto != nil { return } - file_raystack_shield_v1beta1_models_proto_init() + file_raystack_frontier_v1beta1_models_proto_init() if !protoimpl.UnsafeEnabled { - file_raystack_shield_v1beta1_admin_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAllUsersRequest); i { case 0: return &v.state @@ -2054,7 +2054,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAllUsersResponse); i { case 0: return &v.state @@ -2066,7 +2066,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListGroupsRequest); i { case 0: return &v.state @@ -2078,7 +2078,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListGroupsResponse); i { case 0: return &v.state @@ -2090,7 +2090,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAllOrganizationsRequest); i { case 0: return &v.state @@ -2102,7 +2102,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAllOrganizationsResponse); i { case 0: return &v.state @@ -2114,7 +2114,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectsRequest); i { case 0: return &v.state @@ -2126,7 +2126,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectsResponse); i { case 0: return &v.state @@ -2138,7 +2138,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListRelationsRequest); i { case 0: return &v.state @@ -2150,7 +2150,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListRelationsResponse); i { case 0: return &v.state @@ -2162,7 +2162,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListResourcesRequest); i { case 0: return &v.state @@ -2174,7 +2174,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListResourcesResponse); i { case 0: return &v.state @@ -2186,7 +2186,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListPoliciesRequest); i { case 0: return &v.state @@ -2198,7 +2198,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListPoliciesResponse); i { case 0: return &v.state @@ -2210,7 +2210,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateRoleRequest); i { case 0: return &v.state @@ -2222,7 +2222,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateRoleResponse); i { case 0: return &v.state @@ -2234,7 +2234,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteRoleRequest); i { case 0: return &v.state @@ -2246,7 +2246,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteRoleResponse); i { case 0: return &v.state @@ -2258,7 +2258,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*PermissionRequestBody); i { case 0: return &v.state @@ -2270,7 +2270,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreatePermissionRequest); i { case 0: return &v.state @@ -2282,7 +2282,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreatePermissionResponse); i { case 0: return &v.state @@ -2294,7 +2294,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdatePermissionRequest); i { case 0: return &v.state @@ -2306,7 +2306,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdatePermissionResponse); i { case 0: return &v.state @@ -2318,7 +2318,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeletePermissionRequest); i { case 0: return &v.state @@ -2330,7 +2330,7 @@ func file_raystack_shield_v1beta1_admin_proto_init() { return nil } } - file_raystack_shield_v1beta1_admin_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_admin_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeletePermissionResponse); i { case 0: return &v.state @@ -2347,18 +2347,18 @@ func file_raystack_shield_v1beta1_admin_proto_init() { out := protoimpl.TypeBuilder{ File: protoimpl.DescBuilder{ GoPackagePath: reflect.TypeOf(x{}).PkgPath(), - RawDescriptor: file_raystack_shield_v1beta1_admin_proto_rawDesc, + RawDescriptor: file_raystack_frontier_v1beta1_admin_proto_rawDesc, NumEnums: 0, NumMessages: 25, NumExtensions: 0, NumServices: 1, }, - GoTypes: file_raystack_shield_v1beta1_admin_proto_goTypes, - DependencyIndexes: file_raystack_shield_v1beta1_admin_proto_depIdxs, - MessageInfos: file_raystack_shield_v1beta1_admin_proto_msgTypes, + GoTypes: file_raystack_frontier_v1beta1_admin_proto_goTypes, + DependencyIndexes: file_raystack_frontier_v1beta1_admin_proto_depIdxs, + MessageInfos: file_raystack_frontier_v1beta1_admin_proto_msgTypes, }.Build() - File_raystack_shield_v1beta1_admin_proto = out.File - file_raystack_shield_v1beta1_admin_proto_rawDesc = nil - file_raystack_shield_v1beta1_admin_proto_goTypes = nil - file_raystack_shield_v1beta1_admin_proto_depIdxs = nil + File_raystack_frontier_v1beta1_admin_proto = out.File + file_raystack_frontier_v1beta1_admin_proto_rawDesc = nil + file_raystack_frontier_v1beta1_admin_proto_goTypes = nil + file_raystack_frontier_v1beta1_admin_proto_depIdxs = nil } diff --git a/proto/v1beta1/admin.pb.gw.go b/proto/v1beta1/admin.pb.gw.go index 5edeb986a..1700925e7 100644 --- a/proto/v1beta1/admin.pb.gw.go +++ b/proto/v1beta1/admin.pb.gw.go @@ -1,12 +1,12 @@ // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. -// source: raystack/shield/v1beta1/admin.proto +// source: raystack/frontier/v1beta1/admin.proto /* -Package shieldv1beta1 is a reverse proxy. +Package frontierv1beta1 is a reverse proxy. It translates gRPC into RESTful JSON APIs. */ -package shieldv1beta1 +package frontierv1beta1 import ( "context" @@ -519,7 +519,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListAllUsers", runtime.WithHTTPPathPattern("/v1beta1/admin/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListAllUsers", runtime.WithHTTPPathPattern("/v1beta1/admin/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -544,7 +544,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListGroups", runtime.WithHTTPPathPattern("/v1beta1/admin/groups")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListGroups", runtime.WithHTTPPathPattern("/v1beta1/admin/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -569,7 +569,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListAllOrganizations", runtime.WithHTTPPathPattern("/v1beta1/admin/organizations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListAllOrganizations", runtime.WithHTTPPathPattern("/v1beta1/admin/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -594,7 +594,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListProjects", runtime.WithHTTPPathPattern("/v1beta1/admin/projects")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListProjects", runtime.WithHTTPPathPattern("/v1beta1/admin/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -619,7 +619,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListRelations", runtime.WithHTTPPathPattern("/v1beta1/admin/relations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListRelations", runtime.WithHTTPPathPattern("/v1beta1/admin/relations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -644,7 +644,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListResources", runtime.WithHTTPPathPattern("/v1beta1/admin/resources")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListResources", runtime.WithHTTPPathPattern("/v1beta1/admin/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -669,7 +669,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListPolicies", runtime.WithHTTPPathPattern("/v1beta1/policies")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListPolicies", runtime.WithHTTPPathPattern("/v1beta1/policies")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -694,7 +694,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/CreateRole", runtime.WithHTTPPathPattern("/v1beta1/roles")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/CreateRole", runtime.WithHTTPPathPattern("/v1beta1/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -719,7 +719,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/DeleteRole", runtime.WithHTTPPathPattern("/v1beta1/roles/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/DeleteRole", runtime.WithHTTPPathPattern("/v1beta1/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -744,7 +744,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/CreatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/CreatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -769,7 +769,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/UpdatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/UpdatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -794,7 +794,7 @@ func RegisterAdminServiceHandlerServer(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/DeletePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/DeletePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -858,7 +858,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListAllUsers", runtime.WithHTTPPathPattern("/v1beta1/admin/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListAllUsers", runtime.WithHTTPPathPattern("/v1beta1/admin/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -880,7 +880,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListGroups", runtime.WithHTTPPathPattern("/v1beta1/admin/groups")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListGroups", runtime.WithHTTPPathPattern("/v1beta1/admin/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -902,7 +902,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListAllOrganizations", runtime.WithHTTPPathPattern("/v1beta1/admin/organizations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListAllOrganizations", runtime.WithHTTPPathPattern("/v1beta1/admin/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -924,7 +924,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListProjects", runtime.WithHTTPPathPattern("/v1beta1/admin/projects")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListProjects", runtime.WithHTTPPathPattern("/v1beta1/admin/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -946,7 +946,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListRelations", runtime.WithHTTPPathPattern("/v1beta1/admin/relations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListRelations", runtime.WithHTTPPathPattern("/v1beta1/admin/relations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -968,7 +968,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListResources", runtime.WithHTTPPathPattern("/v1beta1/admin/resources")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListResources", runtime.WithHTTPPathPattern("/v1beta1/admin/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -990,7 +990,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/ListPolicies", runtime.WithHTTPPathPattern("/v1beta1/policies")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/ListPolicies", runtime.WithHTTPPathPattern("/v1beta1/policies")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -1012,7 +1012,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/CreateRole", runtime.WithHTTPPathPattern("/v1beta1/roles")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/CreateRole", runtime.WithHTTPPathPattern("/v1beta1/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -1034,7 +1034,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/DeleteRole", runtime.WithHTTPPathPattern("/v1beta1/roles/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/DeleteRole", runtime.WithHTTPPathPattern("/v1beta1/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -1056,7 +1056,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/CreatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/CreatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -1078,7 +1078,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/UpdatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/UpdatePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return @@ -1100,7 +1100,7 @@ func RegisterAdminServiceHandlerClient(ctx context.Context, mux *runtime.ServeMu inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.AdminService/DeletePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.AdminService/DeletePermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return diff --git a/proto/v1beta1/admin.pb.validate.go b/proto/v1beta1/admin.pb.validate.go index 477f76f11..a82eadfb5 100644 --- a/proto/v1beta1/admin.pb.validate.go +++ b/proto/v1beta1/admin.pb.validate.go @@ -1,7 +1,7 @@ // Code generated by protoc-gen-validate. DO NOT EDIT. -// source: raystack/shield/v1beta1/admin.proto +// source: raystack/frontier/v1beta1/admin.proto -package shieldv1beta1 +package frontierv1beta1 import ( "bytes" diff --git a/proto/v1beta1/admin_grpc.pb.go b/proto/v1beta1/admin_grpc.pb.go index f0936e8cf..243934b4f 100644 --- a/proto/v1beta1/admin_grpc.pb.go +++ b/proto/v1beta1/admin_grpc.pb.go @@ -2,9 +2,9 @@ // versions: // - protoc-gen-go-grpc v1.3.0 // - protoc (unknown) -// source: raystack/shield/v1beta1/admin.proto +// source: raystack/frontier/v1beta1/admin.proto -package shieldv1beta1 +package frontierv1beta1 import ( context "context" @@ -19,18 +19,18 @@ import ( const _ = grpc.SupportPackageIsVersion7 const ( - AdminService_ListAllUsers_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListAllUsers" - AdminService_ListGroups_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListGroups" - AdminService_ListAllOrganizations_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListAllOrganizations" - AdminService_ListProjects_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListProjects" - AdminService_ListRelations_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListRelations" - AdminService_ListResources_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListResources" - AdminService_ListPolicies_FullMethodName = "/raystack.shield.v1beta1.AdminService/ListPolicies" - AdminService_CreateRole_FullMethodName = "/raystack.shield.v1beta1.AdminService/CreateRole" - AdminService_DeleteRole_FullMethodName = "/raystack.shield.v1beta1.AdminService/DeleteRole" - AdminService_CreatePermission_FullMethodName = "/raystack.shield.v1beta1.AdminService/CreatePermission" - AdminService_UpdatePermission_FullMethodName = "/raystack.shield.v1beta1.AdminService/UpdatePermission" - AdminService_DeletePermission_FullMethodName = "/raystack.shield.v1beta1.AdminService/DeletePermission" + AdminService_ListAllUsers_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListAllUsers" + AdminService_ListGroups_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListGroups" + AdminService_ListAllOrganizations_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListAllOrganizations" + AdminService_ListProjects_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListProjects" + AdminService_ListRelations_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListRelations" + AdminService_ListResources_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListResources" + AdminService_ListPolicies_FullMethodName = "/raystack.frontier.v1beta1.AdminService/ListPolicies" + AdminService_CreateRole_FullMethodName = "/raystack.frontier.v1beta1.AdminService/CreateRole" + AdminService_DeleteRole_FullMethodName = "/raystack.frontier.v1beta1.AdminService/DeleteRole" + AdminService_CreatePermission_FullMethodName = "/raystack.frontier.v1beta1.AdminService/CreatePermission" + AdminService_UpdatePermission_FullMethodName = "/raystack.frontier.v1beta1.AdminService/UpdatePermission" + AdminService_DeletePermission_FullMethodName = "/raystack.frontier.v1beta1.AdminService/DeletePermission" ) // AdminServiceClient is the client API for AdminService service. @@ -477,7 +477,7 @@ func _AdminService_DeletePermission_Handler(srv interface{}, ctx context.Context // It's only intended for direct use with grpc.RegisterService, // and not to be introspected or modified (even as a copy) var AdminService_ServiceDesc = grpc.ServiceDesc{ - ServiceName: "raystack.shield.v1beta1.AdminService", + ServiceName: "raystack.frontier.v1beta1.AdminService", HandlerType: (*AdminServiceServer)(nil), Methods: []grpc.MethodDesc{ { @@ -530,5 +530,5 @@ var AdminService_ServiceDesc = grpc.ServiceDesc{ }, }, Streams: []grpc.StreamDesc{}, - Metadata: "raystack/shield/v1beta1/admin.proto", + Metadata: "raystack/frontier/v1beta1/admin.proto", } diff --git a/proto/v1beta1/models.pb.go b/proto/v1beta1/models.pb.go index 442590716..1c11ab26c 100644 --- a/proto/v1beta1/models.pb.go +++ b/proto/v1beta1/models.pb.go @@ -2,9 +2,9 @@ // versions: // protoc-gen-go v1.30.0 // protoc (unknown) -// source: raystack/shield/v1beta1/models.proto +// source: raystack/frontier/v1beta1/models.proto -package shieldv1beta1 +package frontierv1beta1 import ( _ "github.com/envoyproxy/protoc-gen-validate/validate" @@ -44,7 +44,7 @@ type User struct { func (x *User) Reset() { *x = User{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[0] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -57,7 +57,7 @@ func (x *User) String() string { func (*User) ProtoMessage() {} func (x *User) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[0] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -70,7 +70,7 @@ func (x *User) ProtoReflect() protoreflect.Message { // Deprecated: Use User.ProtoReflect.Descriptor instead. func (*User) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{0} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{0} } func (x *User) GetId() string { @@ -146,7 +146,7 @@ type ServiceUser struct { func (x *ServiceUser) Reset() { *x = ServiceUser{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[1] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -159,7 +159,7 @@ func (x *ServiceUser) String() string { func (*ServiceUser) ProtoMessage() {} func (x *ServiceUser) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[1] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -172,7 +172,7 @@ func (x *ServiceUser) ProtoReflect() protoreflect.Message { // Deprecated: Use ServiceUser.ProtoReflect.Descriptor instead. func (*ServiceUser) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{1} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{1} } func (x *ServiceUser) GetId() string { @@ -241,7 +241,7 @@ type Group struct { func (x *Group) Reset() { *x = Group{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[2] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -254,7 +254,7 @@ func (x *Group) String() string { func (*Group) ProtoMessage() {} func (x *Group) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[2] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -267,7 +267,7 @@ func (x *Group) ProtoReflect() protoreflect.Message { // Deprecated: Use Group.ProtoReflect.Descriptor instead. func (*Group) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{2} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{2} } func (x *Group) GetId() string { @@ -338,7 +338,7 @@ type Role struct { func (x *Role) Reset() { *x = Role{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[3] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -351,7 +351,7 @@ func (x *Role) String() string { func (*Role) ProtoMessage() {} func (x *Role) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[3] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -364,7 +364,7 @@ func (x *Role) ProtoReflect() protoreflect.Message { // Deprecated: Use Role.ProtoReflect.Descriptor instead. func (*Role) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{3} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{3} } func (x *Role) GetId() string { @@ -446,7 +446,7 @@ type Organization struct { func (x *Organization) Reset() { *x = Organization{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[4] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -459,7 +459,7 @@ func (x *Organization) String() string { func (*Organization) ProtoMessage() {} func (x *Organization) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[4] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -472,7 +472,7 @@ func (x *Organization) ProtoReflect() protoreflect.Message { // Deprecated: Use Organization.ProtoReflect.Descriptor instead. func (*Organization) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{4} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{4} } func (x *Organization) GetId() string { @@ -534,7 +534,7 @@ type Project struct { func (x *Project) Reset() { *x = Project{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[5] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -547,7 +547,7 @@ func (x *Project) String() string { func (*Project) ProtoMessage() {} func (x *Project) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[5] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -560,7 +560,7 @@ func (x *Project) ProtoReflect() protoreflect.Message { // Deprecated: Use Project.ProtoReflect.Descriptor instead. func (*Project) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{5} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{5} } func (x *Project) GetId() string { @@ -632,7 +632,7 @@ type Policy struct { func (x *Policy) Reset() { *x = Policy{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[6] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -645,7 +645,7 @@ func (x *Policy) String() string { func (*Policy) ProtoMessage() {} func (x *Policy) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[6] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -658,7 +658,7 @@ func (x *Policy) ProtoReflect() protoreflect.Message { // Deprecated: Use Policy.ProtoReflect.Descriptor instead. func (*Policy) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{6} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{6} } func (x *Policy) GetId() string { @@ -736,7 +736,7 @@ type Relation struct { func (x *Relation) Reset() { *x = Relation{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[7] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -749,7 +749,7 @@ func (x *Relation) String() string { func (*Relation) ProtoMessage() {} func (x *Relation) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[7] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -762,7 +762,7 @@ func (x *Relation) ProtoReflect() protoreflect.Message { // Deprecated: Use Relation.ProtoReflect.Descriptor instead. func (*Relation) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{7} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{7} } func (x *Relation) GetId() string { @@ -820,12 +820,12 @@ type Permission struct { unknownFields protoimpl.UnknownFields Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/models.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/models.proto. Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"` Title string `protobuf:"bytes,3,opt,name=title,proto3" json:"title,omitempty"` CreatedAt *timestamppb.Timestamp `protobuf:"bytes,4,opt,name=created_at,json=createdAt,proto3" json:"created_at,omitempty"` UpdatedAt *timestamppb.Timestamp `protobuf:"bytes,5,opt,name=updated_at,json=updatedAt,proto3" json:"updated_at,omitempty"` - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/models.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/models.proto. Namespace string `protobuf:"bytes,6,opt,name=namespace,proto3" json:"namespace,omitempty"` Metadata *structpb.Struct `protobuf:"bytes,7,opt,name=metadata,proto3" json:"metadata,omitempty"` Key string `protobuf:"bytes,8,opt,name=key,proto3" json:"key,omitempty"` @@ -834,7 +834,7 @@ type Permission struct { func (x *Permission) Reset() { *x = Permission{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[8] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -847,7 +847,7 @@ func (x *Permission) String() string { func (*Permission) ProtoMessage() {} func (x *Permission) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[8] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -860,7 +860,7 @@ func (x *Permission) ProtoReflect() protoreflect.Message { // Deprecated: Use Permission.ProtoReflect.Descriptor instead. func (*Permission) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{8} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{8} } func (x *Permission) GetId() string { @@ -870,7 +870,7 @@ func (x *Permission) GetId() string { return "" } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/models.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/models.proto. func (x *Permission) GetName() string { if x != nil { return x.Name @@ -899,7 +899,7 @@ func (x *Permission) GetUpdatedAt() *timestamppb.Timestamp { return nil } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/models.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/models.proto. func (x *Permission) GetNamespace() string { if x != nil { return x.Namespace @@ -937,7 +937,7 @@ type Namespace struct { func (x *Namespace) Reset() { *x = Namespace{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[9] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -950,7 +950,7 @@ func (x *Namespace) String() string { func (*Namespace) ProtoMessage() {} func (x *Namespace) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[9] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -963,7 +963,7 @@ func (x *Namespace) ProtoReflect() protoreflect.Message { // Deprecated: Use Namespace.ProtoReflect.Descriptor instead. func (*Namespace) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{9} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{9} } func (x *Namespace) GetId() string { @@ -1020,7 +1020,7 @@ type Resource struct { func (x *Resource) Reset() { *x = Resource{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[10] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1033,7 +1033,7 @@ func (x *Resource) String() string { func (*Resource) ProtoMessage() {} func (x *Resource) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[10] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1046,7 +1046,7 @@ func (x *Resource) ProtoReflect() protoreflect.Message { // Deprecated: Use Resource.ProtoReflect.Descriptor instead. func (*Resource) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{10} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{10} } func (x *Resource) GetId() string { @@ -1127,7 +1127,7 @@ type MetaSchema struct { func (x *MetaSchema) Reset() { *x = MetaSchema{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[11] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1140,7 +1140,7 @@ func (x *MetaSchema) String() string { func (*MetaSchema) ProtoMessage() {} func (x *MetaSchema) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[11] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1153,7 +1153,7 @@ func (x *MetaSchema) ProtoReflect() protoreflect.Message { // Deprecated: Use MetaSchema.ProtoReflect.Descriptor instead. func (*MetaSchema) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{11} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{11} } func (x *MetaSchema) GetId() string { @@ -1208,7 +1208,7 @@ type Invitation struct { func (x *Invitation) Reset() { *x = Invitation{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[12] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1221,7 +1221,7 @@ func (x *Invitation) String() string { func (*Invitation) ProtoMessage() {} func (x *Invitation) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[12] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1234,7 +1234,7 @@ func (x *Invitation) ProtoReflect() protoreflect.Message { // Deprecated: Use Invitation.ProtoReflect.Descriptor instead. func (*Invitation) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{12} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{12} } func (x *Invitation) GetId() string { @@ -1301,7 +1301,7 @@ type ServiceUserKey struct { func (x *ServiceUserKey) Reset() { *x = ServiceUserKey{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[13] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1314,7 +1314,7 @@ func (x *ServiceUserKey) String() string { func (*ServiceUserKey) ProtoMessage() {} func (x *ServiceUserKey) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[13] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1327,7 +1327,7 @@ func (x *ServiceUserKey) ProtoReflect() protoreflect.Message { // Deprecated: Use ServiceUserKey.ProtoReflect.Descriptor instead. func (*ServiceUserKey) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{13} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{13} } func (x *ServiceUserKey) GetId() string { @@ -1380,7 +1380,7 @@ type KeyCredential struct { func (x *KeyCredential) Reset() { *x = KeyCredential{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[14] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1393,7 +1393,7 @@ func (x *KeyCredential) String() string { func (*KeyCredential) ProtoMessage() {} func (x *KeyCredential) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[14] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1406,7 +1406,7 @@ func (x *KeyCredential) ProtoReflect() protoreflect.Message { // Deprecated: Use KeyCredential.ProtoReflect.Descriptor instead. func (*KeyCredential) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{14} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{14} } func (x *KeyCredential) GetType() string { @@ -1453,7 +1453,7 @@ type SecretCredential struct { func (x *SecretCredential) Reset() { *x = SecretCredential{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[15] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1466,7 +1466,7 @@ func (x *SecretCredential) String() string { func (*SecretCredential) ProtoMessage() {} func (x *SecretCredential) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[15] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1479,7 +1479,7 @@ func (x *SecretCredential) ProtoReflect() protoreflect.Message { // Deprecated: Use SecretCredential.ProtoReflect.Descriptor instead. func (*SecretCredential) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{15} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{15} } func (x *SecretCredential) GetId() string { @@ -1539,7 +1539,7 @@ type JSONWebKey struct { func (x *JSONWebKey) Reset() { *x = JSONWebKey{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[16] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1552,7 +1552,7 @@ func (x *JSONWebKey) String() string { func (*JSONWebKey) ProtoMessage() {} func (x *JSONWebKey) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[16] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1565,7 +1565,7 @@ func (x *JSONWebKey) ProtoReflect() protoreflect.Message { // Deprecated: Use JSONWebKey.ProtoReflect.Descriptor instead. func (*JSONWebKey) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{16} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{16} } func (x *JSONWebKey) GetKty() string { @@ -1644,7 +1644,7 @@ type AuditLogActor struct { func (x *AuditLogActor) Reset() { *x = AuditLogActor{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[17] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1657,7 +1657,7 @@ func (x *AuditLogActor) String() string { func (*AuditLogActor) ProtoMessage() {} func (x *AuditLogActor) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[17] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1670,7 +1670,7 @@ func (x *AuditLogActor) ProtoReflect() protoreflect.Message { // Deprecated: Use AuditLogActor.ProtoReflect.Descriptor instead. func (*AuditLogActor) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{17} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{17} } func (x *AuditLogActor) GetId() string { @@ -1707,7 +1707,7 @@ type AuditLogTarget struct { func (x *AuditLogTarget) Reset() { *x = AuditLogTarget{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[18] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1720,7 +1720,7 @@ func (x *AuditLogTarget) String() string { func (*AuditLogTarget) ProtoMessage() {} func (x *AuditLogTarget) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[18] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1733,7 +1733,7 @@ func (x *AuditLogTarget) ProtoReflect() protoreflect.Message { // Deprecated: Use AuditLogTarget.ProtoReflect.Descriptor instead. func (*AuditLogTarget) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{18} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{18} } func (x *AuditLogTarget) GetId() string { @@ -1780,7 +1780,7 @@ type AuditLog struct { func (x *AuditLog) Reset() { *x = AuditLog{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[19] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1793,7 +1793,7 @@ func (x *AuditLog) String() string { func (*AuditLog) ProtoMessage() {} func (x *AuditLog) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[19] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1806,7 +1806,7 @@ func (x *AuditLog) ProtoReflect() protoreflect.Message { // Deprecated: Use AuditLog.ProtoReflect.Descriptor instead. func (*AuditLog) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{19} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{19} } func (x *AuditLog) GetId() string { @@ -1872,7 +1872,7 @@ type RoleRequestBody struct { func (x *RoleRequestBody) Reset() { *x = RoleRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[20] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1885,7 +1885,7 @@ func (x *RoleRequestBody) String() string { func (*RoleRequestBody) ProtoMessage() {} func (x *RoleRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_models_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_models_proto_msgTypes[20] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1898,7 +1898,7 @@ func (x *RoleRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use RoleRequestBody.ProtoReflect.Descriptor instead. func (*RoleRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_models_proto_rawDescGZIP(), []int{20} + return file_raystack_frontier_v1beta1_models_proto_rawDescGZIP(), []int{20} } func (x *RoleRequestBody) GetName() string { @@ -1929,9 +1929,9 @@ func (x *RoleRequestBody) GetTitle() string { return "" } -var File_raystack_shield_v1beta1_models_proto protoreflect.FileDescriptor +var File_raystack_frontier_v1beta1_models_proto protoreflect.FileDescriptor -var file_raystack_shield_v1beta1_models_proto_rawDesc = []byte{ +var file_raystack_frontier_v1beta1_models_proto_rawDesc = []byte{ 0x0a, 0x24, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, 0x2f, 0x73, 0x68, 0x69, 0x65, 0x6c, 0x64, 0x2f, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x31, 0x2f, 0x6d, 0x6f, 0x64, 0x65, 0x6c, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x17, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, @@ -2475,89 +2475,89 @@ var file_raystack_shield_v1beta1_models_proto_rawDesc = []byte{ } var ( - file_raystack_shield_v1beta1_models_proto_rawDescOnce sync.Once - file_raystack_shield_v1beta1_models_proto_rawDescData = file_raystack_shield_v1beta1_models_proto_rawDesc + file_raystack_frontier_v1beta1_models_proto_rawDescOnce sync.Once + file_raystack_frontier_v1beta1_models_proto_rawDescData = file_raystack_frontier_v1beta1_models_proto_rawDesc ) -func file_raystack_shield_v1beta1_models_proto_rawDescGZIP() []byte { - file_raystack_shield_v1beta1_models_proto_rawDescOnce.Do(func() { - file_raystack_shield_v1beta1_models_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_shield_v1beta1_models_proto_rawDescData) +func file_raystack_frontier_v1beta1_models_proto_rawDescGZIP() []byte { + file_raystack_frontier_v1beta1_models_proto_rawDescOnce.Do(func() { + file_raystack_frontier_v1beta1_models_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_frontier_v1beta1_models_proto_rawDescData) }) - return file_raystack_shield_v1beta1_models_proto_rawDescData -} - -var file_raystack_shield_v1beta1_models_proto_msgTypes = make([]protoimpl.MessageInfo, 22) -var file_raystack_shield_v1beta1_models_proto_goTypes = []interface{}{ - (*User)(nil), // 0: raystack.shield.v1beta1.User - (*ServiceUser)(nil), // 1: raystack.shield.v1beta1.ServiceUser - (*Group)(nil), // 2: raystack.shield.v1beta1.Group - (*Role)(nil), // 3: raystack.shield.v1beta1.Role - (*Organization)(nil), // 4: raystack.shield.v1beta1.Organization - (*Project)(nil), // 5: raystack.shield.v1beta1.Project - (*Policy)(nil), // 6: raystack.shield.v1beta1.Policy - (*Relation)(nil), // 7: raystack.shield.v1beta1.Relation - (*Permission)(nil), // 8: raystack.shield.v1beta1.Permission - (*Namespace)(nil), // 9: raystack.shield.v1beta1.Namespace - (*Resource)(nil), // 10: raystack.shield.v1beta1.Resource - (*MetaSchema)(nil), // 11: raystack.shield.v1beta1.MetaSchema - (*Invitation)(nil), // 12: raystack.shield.v1beta1.Invitation - (*ServiceUserKey)(nil), // 13: raystack.shield.v1beta1.ServiceUserKey - (*KeyCredential)(nil), // 14: raystack.shield.v1beta1.KeyCredential - (*SecretCredential)(nil), // 15: raystack.shield.v1beta1.SecretCredential - (*JSONWebKey)(nil), // 16: raystack.shield.v1beta1.JSONWebKey - (*AuditLogActor)(nil), // 17: raystack.shield.v1beta1.AuditLogActor - (*AuditLogTarget)(nil), // 18: raystack.shield.v1beta1.AuditLogTarget - (*AuditLog)(nil), // 19: raystack.shield.v1beta1.AuditLog - (*RoleRequestBody)(nil), // 20: raystack.shield.v1beta1.RoleRequestBody - nil, // 21: raystack.shield.v1beta1.AuditLog.ContextEntry + return file_raystack_frontier_v1beta1_models_proto_rawDescData +} + +var file_raystack_frontier_v1beta1_models_proto_msgTypes = make([]protoimpl.MessageInfo, 22) +var file_raystack_frontier_v1beta1_models_proto_goTypes = []interface{}{ + (*User)(nil), // 0: raystack.frontier.v1beta1.User + (*ServiceUser)(nil), // 1: raystack.frontier.v1beta1.ServiceUser + (*Group)(nil), // 2: raystack.frontier.v1beta1.Group + (*Role)(nil), // 3: raystack.frontier.v1beta1.Role + (*Organization)(nil), // 4: raystack.frontier.v1beta1.Organization + (*Project)(nil), // 5: raystack.frontier.v1beta1.Project + (*Policy)(nil), // 6: raystack.frontier.v1beta1.Policy + (*Relation)(nil), // 7: raystack.frontier.v1beta1.Relation + (*Permission)(nil), // 8: raystack.frontier.v1beta1.Permission + (*Namespace)(nil), // 9: raystack.frontier.v1beta1.Namespace + (*Resource)(nil), // 10: raystack.frontier.v1beta1.Resource + (*MetaSchema)(nil), // 11: raystack.frontier.v1beta1.MetaSchema + (*Invitation)(nil), // 12: raystack.frontier.v1beta1.Invitation + (*ServiceUserKey)(nil), // 13: raystack.frontier.v1beta1.ServiceUserKey + (*KeyCredential)(nil), // 14: raystack.frontier.v1beta1.KeyCredential + (*SecretCredential)(nil), // 15: raystack.frontier.v1beta1.SecretCredential + (*JSONWebKey)(nil), // 16: raystack.frontier.v1beta1.JSONWebKey + (*AuditLogActor)(nil), // 17: raystack.frontier.v1beta1.AuditLogActor + (*AuditLogTarget)(nil), // 18: raystack.frontier.v1beta1.AuditLogTarget + (*AuditLog)(nil), // 19: raystack.frontier.v1beta1.AuditLog + (*RoleRequestBody)(nil), // 20: raystack.frontier.v1beta1.RoleRequestBody + nil, // 21: raystack.frontier.v1beta1.AuditLog.ContextEntry (*structpb.Struct)(nil), // 22: google.protobuf.Struct (*timestamppb.Timestamp)(nil), // 23: google.protobuf.Timestamp } -var file_raystack_shield_v1beta1_models_proto_depIdxs = []int32{ - 22, // 0: raystack.shield.v1beta1.User.metadata:type_name -> google.protobuf.Struct - 23, // 1: raystack.shield.v1beta1.User.created_at:type_name -> google.protobuf.Timestamp - 23, // 2: raystack.shield.v1beta1.User.updated_at:type_name -> google.protobuf.Timestamp - 22, // 3: raystack.shield.v1beta1.ServiceUser.metadata:type_name -> google.protobuf.Struct - 23, // 4: raystack.shield.v1beta1.ServiceUser.created_at:type_name -> google.protobuf.Timestamp - 23, // 5: raystack.shield.v1beta1.ServiceUser.updated_at:type_name -> google.protobuf.Timestamp - 22, // 6: raystack.shield.v1beta1.Group.metadata:type_name -> google.protobuf.Struct - 23, // 7: raystack.shield.v1beta1.Group.created_at:type_name -> google.protobuf.Timestamp - 23, // 8: raystack.shield.v1beta1.Group.updated_at:type_name -> google.protobuf.Timestamp - 22, // 9: raystack.shield.v1beta1.Role.metadata:type_name -> google.protobuf.Struct - 23, // 10: raystack.shield.v1beta1.Role.created_at:type_name -> google.protobuf.Timestamp - 23, // 11: raystack.shield.v1beta1.Role.updated_at:type_name -> google.protobuf.Timestamp - 22, // 12: raystack.shield.v1beta1.Organization.metadata:type_name -> google.protobuf.Struct - 23, // 13: raystack.shield.v1beta1.Organization.created_at:type_name -> google.protobuf.Timestamp - 23, // 14: raystack.shield.v1beta1.Organization.updated_at:type_name -> google.protobuf.Timestamp - 22, // 15: raystack.shield.v1beta1.Project.metadata:type_name -> google.protobuf.Struct - 23, // 16: raystack.shield.v1beta1.Project.created_at:type_name -> google.protobuf.Timestamp - 23, // 17: raystack.shield.v1beta1.Project.updated_at:type_name -> google.protobuf.Timestamp - 23, // 18: raystack.shield.v1beta1.Policy.created_at:type_name -> google.protobuf.Timestamp - 23, // 19: raystack.shield.v1beta1.Policy.updated_at:type_name -> google.protobuf.Timestamp - 22, // 20: raystack.shield.v1beta1.Policy.metadata:type_name -> google.protobuf.Struct - 23, // 21: raystack.shield.v1beta1.Relation.created_at:type_name -> google.protobuf.Timestamp - 23, // 22: raystack.shield.v1beta1.Relation.updated_at:type_name -> google.protobuf.Timestamp - 23, // 23: raystack.shield.v1beta1.Permission.created_at:type_name -> google.protobuf.Timestamp - 23, // 24: raystack.shield.v1beta1.Permission.updated_at:type_name -> google.protobuf.Timestamp - 22, // 25: raystack.shield.v1beta1.Permission.metadata:type_name -> google.protobuf.Struct - 22, // 26: raystack.shield.v1beta1.Namespace.metadata:type_name -> google.protobuf.Struct - 23, // 27: raystack.shield.v1beta1.Namespace.created_at:type_name -> google.protobuf.Timestamp - 23, // 28: raystack.shield.v1beta1.Namespace.updated_at:type_name -> google.protobuf.Timestamp - 23, // 29: raystack.shield.v1beta1.Resource.created_at:type_name -> google.protobuf.Timestamp - 23, // 30: raystack.shield.v1beta1.Resource.updated_at:type_name -> google.protobuf.Timestamp - 22, // 31: raystack.shield.v1beta1.Resource.metadata:type_name -> google.protobuf.Struct - 23, // 32: raystack.shield.v1beta1.MetaSchema.created_at:type_name -> google.protobuf.Timestamp - 23, // 33: raystack.shield.v1beta1.MetaSchema.updated_at:type_name -> google.protobuf.Timestamp - 22, // 34: raystack.shield.v1beta1.Invitation.metadata:type_name -> google.protobuf.Struct - 23, // 35: raystack.shield.v1beta1.Invitation.created_at:type_name -> google.protobuf.Timestamp - 23, // 36: raystack.shield.v1beta1.Invitation.expires_at:type_name -> google.protobuf.Timestamp - 23, // 37: raystack.shield.v1beta1.ServiceUserKey.created_at:type_name -> google.protobuf.Timestamp - 23, // 38: raystack.shield.v1beta1.SecretCredential.created_at:type_name -> google.protobuf.Timestamp - 17, // 39: raystack.shield.v1beta1.AuditLog.actor:type_name -> raystack.shield.v1beta1.AuditLogActor - 18, // 40: raystack.shield.v1beta1.AuditLog.target:type_name -> raystack.shield.v1beta1.AuditLogTarget - 21, // 41: raystack.shield.v1beta1.AuditLog.context:type_name -> raystack.shield.v1beta1.AuditLog.ContextEntry - 23, // 42: raystack.shield.v1beta1.AuditLog.created_at:type_name -> google.protobuf.Timestamp - 22, // 43: raystack.shield.v1beta1.RoleRequestBody.metadata:type_name -> google.protobuf.Struct +var file_raystack_frontier_v1beta1_models_proto_depIdxs = []int32{ + 22, // 0: raystack.frontier.v1beta1.User.metadata:type_name -> google.protobuf.Struct + 23, // 1: raystack.frontier.v1beta1.User.created_at:type_name -> google.protobuf.Timestamp + 23, // 2: raystack.frontier.v1beta1.User.updated_at:type_name -> google.protobuf.Timestamp + 22, // 3: raystack.frontier.v1beta1.ServiceUser.metadata:type_name -> google.protobuf.Struct + 23, // 4: raystack.frontier.v1beta1.ServiceUser.created_at:type_name -> google.protobuf.Timestamp + 23, // 5: raystack.frontier.v1beta1.ServiceUser.updated_at:type_name -> google.protobuf.Timestamp + 22, // 6: raystack.frontier.v1beta1.Group.metadata:type_name -> google.protobuf.Struct + 23, // 7: raystack.frontier.v1beta1.Group.created_at:type_name -> google.protobuf.Timestamp + 23, // 8: raystack.frontier.v1beta1.Group.updated_at:type_name -> google.protobuf.Timestamp + 22, // 9: raystack.frontier.v1beta1.Role.metadata:type_name -> google.protobuf.Struct + 23, // 10: raystack.frontier.v1beta1.Role.created_at:type_name -> google.protobuf.Timestamp + 23, // 11: raystack.frontier.v1beta1.Role.updated_at:type_name -> google.protobuf.Timestamp + 22, // 12: raystack.frontier.v1beta1.Organization.metadata:type_name -> google.protobuf.Struct + 23, // 13: raystack.frontier.v1beta1.Organization.created_at:type_name -> google.protobuf.Timestamp + 23, // 14: raystack.frontier.v1beta1.Organization.updated_at:type_name -> google.protobuf.Timestamp + 22, // 15: raystack.frontier.v1beta1.Project.metadata:type_name -> google.protobuf.Struct + 23, // 16: raystack.frontier.v1beta1.Project.created_at:type_name -> google.protobuf.Timestamp + 23, // 17: raystack.frontier.v1beta1.Project.updated_at:type_name -> google.protobuf.Timestamp + 23, // 18: raystack.frontier.v1beta1.Policy.created_at:type_name -> google.protobuf.Timestamp + 23, // 19: raystack.frontier.v1beta1.Policy.updated_at:type_name -> google.protobuf.Timestamp + 22, // 20: raystack.frontier.v1beta1.Policy.metadata:type_name -> google.protobuf.Struct + 23, // 21: raystack.frontier.v1beta1.Relation.created_at:type_name -> google.protobuf.Timestamp + 23, // 22: raystack.frontier.v1beta1.Relation.updated_at:type_name -> google.protobuf.Timestamp + 23, // 23: raystack.frontier.v1beta1.Permission.created_at:type_name -> google.protobuf.Timestamp + 23, // 24: raystack.frontier.v1beta1.Permission.updated_at:type_name -> google.protobuf.Timestamp + 22, // 25: raystack.frontier.v1beta1.Permission.metadata:type_name -> google.protobuf.Struct + 22, // 26: raystack.frontier.v1beta1.Namespace.metadata:type_name -> google.protobuf.Struct + 23, // 27: raystack.frontier.v1beta1.Namespace.created_at:type_name -> google.protobuf.Timestamp + 23, // 28: raystack.frontier.v1beta1.Namespace.updated_at:type_name -> google.protobuf.Timestamp + 23, // 29: raystack.frontier.v1beta1.Resource.created_at:type_name -> google.protobuf.Timestamp + 23, // 30: raystack.frontier.v1beta1.Resource.updated_at:type_name -> google.protobuf.Timestamp + 22, // 31: raystack.frontier.v1beta1.Resource.metadata:type_name -> google.protobuf.Struct + 23, // 32: raystack.frontier.v1beta1.MetaSchema.created_at:type_name -> google.protobuf.Timestamp + 23, // 33: raystack.frontier.v1beta1.MetaSchema.updated_at:type_name -> google.protobuf.Timestamp + 22, // 34: raystack.frontier.v1beta1.Invitation.metadata:type_name -> google.protobuf.Struct + 23, // 35: raystack.frontier.v1beta1.Invitation.created_at:type_name -> google.protobuf.Timestamp + 23, // 36: raystack.frontier.v1beta1.Invitation.expires_at:type_name -> google.protobuf.Timestamp + 23, // 37: raystack.frontier.v1beta1.ServiceUserKey.created_at:type_name -> google.protobuf.Timestamp + 23, // 38: raystack.frontier.v1beta1.SecretCredential.created_at:type_name -> google.protobuf.Timestamp + 17, // 39: raystack.frontier.v1beta1.AuditLog.actor:type_name -> raystack.frontier.v1beta1.AuditLogActor + 18, // 40: raystack.frontier.v1beta1.AuditLog.target:type_name -> raystack.frontier.v1beta1.AuditLogTarget + 21, // 41: raystack.frontier.v1beta1.AuditLog.context:type_name -> raystack.frontier.v1beta1.AuditLog.ContextEntry + 23, // 42: raystack.frontier.v1beta1.AuditLog.created_at:type_name -> google.protobuf.Timestamp + 22, // 43: raystack.frontier.v1beta1.RoleRequestBody.metadata:type_name -> google.protobuf.Struct 44, // [44:44] is the sub-list for method output_type 44, // [44:44] is the sub-list for method input_type 44, // [44:44] is the sub-list for extension type_name @@ -2565,13 +2565,13 @@ var file_raystack_shield_v1beta1_models_proto_depIdxs = []int32{ 0, // [0:44] is the sub-list for field type_name } -func init() { file_raystack_shield_v1beta1_models_proto_init() } -func file_raystack_shield_v1beta1_models_proto_init() { - if File_raystack_shield_v1beta1_models_proto != nil { +func init() { file_raystack_frontier_v1beta1_models_proto_init() } +func file_raystack_frontier_v1beta1_models_proto_init() { + if File_raystack_frontier_v1beta1_models_proto != nil { return } if !protoimpl.UnsafeEnabled { - file_raystack_shield_v1beta1_models_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*User); i { case 0: return &v.state @@ -2583,7 +2583,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ServiceUser); i { case 0: return &v.state @@ -2595,7 +2595,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Group); i { case 0: return &v.state @@ -2607,7 +2607,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Role); i { case 0: return &v.state @@ -2619,7 +2619,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Organization); i { case 0: return &v.state @@ -2631,7 +2631,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Project); i { case 0: return &v.state @@ -2643,7 +2643,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Policy); i { case 0: return &v.state @@ -2655,7 +2655,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Relation); i { case 0: return &v.state @@ -2667,7 +2667,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Permission); i { case 0: return &v.state @@ -2679,7 +2679,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Namespace); i { case 0: return &v.state @@ -2691,7 +2691,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Resource); i { case 0: return &v.state @@ -2703,7 +2703,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*MetaSchema); i { case 0: return &v.state @@ -2715,7 +2715,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Invitation); i { case 0: return &v.state @@ -2727,7 +2727,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ServiceUserKey); i { case 0: return &v.state @@ -2739,7 +2739,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*KeyCredential); i { case 0: return &v.state @@ -2751,7 +2751,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*SecretCredential); i { case 0: return &v.state @@ -2763,7 +2763,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*JSONWebKey); i { case 0: return &v.state @@ -2775,7 +2775,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuditLogActor); i { case 0: return &v.state @@ -2787,7 +2787,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuditLogTarget); i { case 0: return &v.state @@ -2799,7 +2799,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuditLog); i { case 0: return &v.state @@ -2811,7 +2811,7 @@ func file_raystack_shield_v1beta1_models_proto_init() { return nil } } - file_raystack_shield_v1beta1_models_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_models_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RoleRequestBody); i { case 0: return &v.state @@ -2828,18 +2828,18 @@ func file_raystack_shield_v1beta1_models_proto_init() { out := protoimpl.TypeBuilder{ File: protoimpl.DescBuilder{ GoPackagePath: reflect.TypeOf(x{}).PkgPath(), - RawDescriptor: file_raystack_shield_v1beta1_models_proto_rawDesc, + RawDescriptor: file_raystack_frontier_v1beta1_models_proto_rawDesc, NumEnums: 0, NumMessages: 22, NumExtensions: 0, NumServices: 0, }, - GoTypes: file_raystack_shield_v1beta1_models_proto_goTypes, - DependencyIndexes: file_raystack_shield_v1beta1_models_proto_depIdxs, - MessageInfos: file_raystack_shield_v1beta1_models_proto_msgTypes, + GoTypes: file_raystack_frontier_v1beta1_models_proto_goTypes, + DependencyIndexes: file_raystack_frontier_v1beta1_models_proto_depIdxs, + MessageInfos: file_raystack_frontier_v1beta1_models_proto_msgTypes, }.Build() - File_raystack_shield_v1beta1_models_proto = out.File - file_raystack_shield_v1beta1_models_proto_rawDesc = nil - file_raystack_shield_v1beta1_models_proto_goTypes = nil - file_raystack_shield_v1beta1_models_proto_depIdxs = nil + File_raystack_frontier_v1beta1_models_proto = out.File + file_raystack_frontier_v1beta1_models_proto_rawDesc = nil + file_raystack_frontier_v1beta1_models_proto_goTypes = nil + file_raystack_frontier_v1beta1_models_proto_depIdxs = nil } diff --git a/proto/v1beta1/models.pb.validate.go b/proto/v1beta1/models.pb.validate.go index 1d64f6415..7db509284 100644 --- a/proto/v1beta1/models.pb.validate.go +++ b/proto/v1beta1/models.pb.validate.go @@ -1,7 +1,7 @@ // Code generated by protoc-gen-validate. DO NOT EDIT. -// source: raystack/shield/v1beta1/models.proto +// source: raystack/frontier/v1beta1/models.proto -package shieldv1beta1 +package frontierv1beta1 import ( "bytes" diff --git a/proto/v1beta1/shield.pb.go b/proto/v1beta1/shield.pb.go index 4b9d92e2d..69903eb02 100644 --- a/proto/v1beta1/shield.pb.go +++ b/proto/v1beta1/shield.pb.go @@ -2,9 +2,9 @@ // versions: // protoc-gen-go v1.30.0 // protoc (unknown) -// source: raystack/shield/v1beta1/shield.proto +// source: raystack/frontier/v1beta1/frontier.proto -package shieldv1beta1 +package frontierv1beta1 import ( _ "github.com/envoyproxy/protoc-gen-validate/validate" @@ -34,7 +34,7 @@ type GetJWKsRequest struct { func (x *GetJWKsRequest) Reset() { *x = GetJWKsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[0] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -47,7 +47,7 @@ func (x *GetJWKsRequest) String() string { func (*GetJWKsRequest) ProtoMessage() {} func (x *GetJWKsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[0] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[0] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -60,7 +60,7 @@ func (x *GetJWKsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetJWKsRequest.ProtoReflect.Descriptor instead. func (*GetJWKsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{0} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{0} } // GetJWKsResponse is a valid JSON Web Key Set as specififed in rfc 7517 @@ -75,7 +75,7 @@ type GetJWKsResponse struct { func (x *GetJWKsResponse) Reset() { *x = GetJWKsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[1] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -88,7 +88,7 @@ func (x *GetJWKsResponse) String() string { func (*GetJWKsResponse) ProtoMessage() {} func (x *GetJWKsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[1] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[1] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -101,7 +101,7 @@ func (x *GetJWKsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetJWKsResponse.ProtoReflect.Descriptor instead. func (*GetJWKsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{1} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{1} } func (x *GetJWKsResponse) GetKeys() []*JSONWebKey { @@ -120,7 +120,7 @@ type AuthLogoutRequest struct { func (x *AuthLogoutRequest) Reset() { *x = AuthLogoutRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[2] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -133,7 +133,7 @@ func (x *AuthLogoutRequest) String() string { func (*AuthLogoutRequest) ProtoMessage() {} func (x *AuthLogoutRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[2] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[2] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -146,7 +146,7 @@ func (x *AuthLogoutRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthLogoutRequest.ProtoReflect.Descriptor instead. func (*AuthLogoutRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{2} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{2} } type AuthLogoutResponse struct { @@ -158,7 +158,7 @@ type AuthLogoutResponse struct { func (x *AuthLogoutResponse) Reset() { *x = AuthLogoutResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[3] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -171,7 +171,7 @@ func (x *AuthLogoutResponse) String() string { func (*AuthLogoutResponse) ProtoMessage() {} func (x *AuthLogoutResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[3] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[3] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -184,7 +184,7 @@ func (x *AuthLogoutResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthLogoutResponse.ProtoReflect.Descriptor instead. func (*AuthLogoutResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{3} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{3} } type AuthCallbackRequest struct { @@ -202,7 +202,7 @@ type AuthCallbackRequest struct { func (x *AuthCallbackRequest) Reset() { *x = AuthCallbackRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[4] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -215,7 +215,7 @@ func (x *AuthCallbackRequest) String() string { func (*AuthCallbackRequest) ProtoMessage() {} func (x *AuthCallbackRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[4] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[4] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -228,7 +228,7 @@ func (x *AuthCallbackRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthCallbackRequest.ProtoReflect.Descriptor instead. func (*AuthCallbackRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{4} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{4} } func (x *AuthCallbackRequest) GetStrategyName() string { @@ -261,7 +261,7 @@ type AuthCallbackResponse struct { func (x *AuthCallbackResponse) Reset() { *x = AuthCallbackResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[5] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -274,7 +274,7 @@ func (x *AuthCallbackResponse) String() string { func (*AuthCallbackResponse) ProtoMessage() {} func (x *AuthCallbackResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[5] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[5] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -287,7 +287,7 @@ func (x *AuthCallbackResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthCallbackResponse.ProtoReflect.Descriptor instead. func (*AuthCallbackResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{5} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{5} } type AuthenticateRequest struct { @@ -310,7 +310,7 @@ type AuthenticateRequest struct { func (x *AuthenticateRequest) Reset() { *x = AuthenticateRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[6] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -323,7 +323,7 @@ func (x *AuthenticateRequest) String() string { func (*AuthenticateRequest) ProtoMessage() {} func (x *AuthenticateRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[6] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[6] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -336,7 +336,7 @@ func (x *AuthenticateRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthenticateRequest.ProtoReflect.Descriptor instead. func (*AuthenticateRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{6} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{6} } func (x *AuthenticateRequest) GetStrategyName() string { @@ -379,7 +379,7 @@ type AuthenticateResponse struct { func (x *AuthenticateResponse) Reset() { *x = AuthenticateResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[7] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -392,7 +392,7 @@ func (x *AuthenticateResponse) String() string { func (*AuthenticateResponse) ProtoMessage() {} func (x *AuthenticateResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[7] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[7] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -405,7 +405,7 @@ func (x *AuthenticateResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthenticateResponse.ProtoReflect.Descriptor instead. func (*AuthenticateResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{7} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{7} } func (x *AuthenticateResponse) GetEndpoint() string { @@ -434,7 +434,7 @@ type AuthStrategy struct { func (x *AuthStrategy) Reset() { *x = AuthStrategy{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[8] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -447,7 +447,7 @@ func (x *AuthStrategy) String() string { func (*AuthStrategy) ProtoMessage() {} func (x *AuthStrategy) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[8] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[8] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -460,7 +460,7 @@ func (x *AuthStrategy) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthStrategy.ProtoReflect.Descriptor instead. func (*AuthStrategy) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{8} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{8} } func (x *AuthStrategy) GetName() string { @@ -486,7 +486,7 @@ type ListAuthStrategiesRequest struct { func (x *ListAuthStrategiesRequest) Reset() { *x = ListAuthStrategiesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[9] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -499,7 +499,7 @@ func (x *ListAuthStrategiesRequest) String() string { func (*ListAuthStrategiesRequest) ProtoMessage() {} func (x *ListAuthStrategiesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[9] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[9] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -512,7 +512,7 @@ func (x *ListAuthStrategiesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAuthStrategiesRequest.ProtoReflect.Descriptor instead. func (*ListAuthStrategiesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{9} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{9} } type ListAuthStrategiesResponse struct { @@ -526,7 +526,7 @@ type ListAuthStrategiesResponse struct { func (x *ListAuthStrategiesResponse) Reset() { *x = ListAuthStrategiesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[10] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -539,7 +539,7 @@ func (x *ListAuthStrategiesResponse) String() string { func (*ListAuthStrategiesResponse) ProtoMessage() {} func (x *ListAuthStrategiesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[10] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[10] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -552,7 +552,7 @@ func (x *ListAuthStrategiesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListAuthStrategiesResponse.ProtoReflect.Descriptor instead. func (*ListAuthStrategiesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{10} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{10} } func (x *ListAuthStrategiesResponse) GetStrategies() []*AuthStrategy { @@ -581,7 +581,7 @@ type AuthTokenRequest struct { func (x *AuthTokenRequest) Reset() { *x = AuthTokenRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[11] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -594,7 +594,7 @@ func (x *AuthTokenRequest) String() string { func (*AuthTokenRequest) ProtoMessage() {} func (x *AuthTokenRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[11] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[11] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -607,7 +607,7 @@ func (x *AuthTokenRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthTokenRequest.ProtoReflect.Descriptor instead. func (*AuthTokenRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{11} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{11} } func (x *AuthTokenRequest) GetGrantType() string { @@ -650,7 +650,7 @@ type AuthTokenResponse struct { func (x *AuthTokenResponse) Reset() { *x = AuthTokenResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[12] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -663,7 +663,7 @@ func (x *AuthTokenResponse) String() string { func (*AuthTokenResponse) ProtoMessage() {} func (x *AuthTokenResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[12] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[12] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -676,7 +676,7 @@ func (x *AuthTokenResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AuthTokenResponse.ProtoReflect.Descriptor instead. func (*AuthTokenResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{12} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{12} } func (x *AuthTokenResponse) GetAccessToken() string { @@ -707,7 +707,7 @@ type UserRequestBody struct { func (x *UserRequestBody) Reset() { *x = UserRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[13] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -720,7 +720,7 @@ func (x *UserRequestBody) String() string { func (*UserRequestBody) ProtoMessage() {} func (x *UserRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[13] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[13] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -733,7 +733,7 @@ func (x *UserRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use UserRequestBody.ProtoReflect.Descriptor instead. func (*UserRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{13} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{13} } func (x *UserRequestBody) GetName() string { @@ -780,7 +780,7 @@ type ListUsersRequest struct { func (x *ListUsersRequest) Reset() { *x = ListUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[14] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -793,7 +793,7 @@ func (x *ListUsersRequest) String() string { func (*ListUsersRequest) ProtoMessage() {} func (x *ListUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[14] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[14] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -806,7 +806,7 @@ func (x *ListUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUsersRequest.ProtoReflect.Descriptor instead. func (*ListUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{14} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{14} } func (x *ListUsersRequest) GetPageSize() int32 { @@ -863,7 +863,7 @@ type ListUsersResponse struct { func (x *ListUsersResponse) Reset() { *x = ListUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[15] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -876,7 +876,7 @@ func (x *ListUsersResponse) String() string { func (*ListUsersResponse) ProtoMessage() {} func (x *ListUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[15] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[15] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -889,7 +889,7 @@ func (x *ListUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUsersResponse.ProtoReflect.Descriptor instead. func (*ListUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{15} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{15} } func (x *ListUsersResponse) GetCount() int32 { @@ -917,7 +917,7 @@ type CreateUserRequest struct { func (x *CreateUserRequest) Reset() { *x = CreateUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[16] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -930,7 +930,7 @@ func (x *CreateUserRequest) String() string { func (*CreateUserRequest) ProtoMessage() {} func (x *CreateUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[16] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[16] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -943,7 +943,7 @@ func (x *CreateUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateUserRequest.ProtoReflect.Descriptor instead. func (*CreateUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{16} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{16} } func (x *CreateUserRequest) GetBody() *UserRequestBody { @@ -964,7 +964,7 @@ type CreateUserResponse struct { func (x *CreateUserResponse) Reset() { *x = CreateUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[17] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -977,7 +977,7 @@ func (x *CreateUserResponse) String() string { func (*CreateUserResponse) ProtoMessage() {} func (x *CreateUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[17] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[17] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -990,7 +990,7 @@ func (x *CreateUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateUserResponse.ProtoReflect.Descriptor instead. func (*CreateUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{17} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{17} } func (x *CreateUserResponse) GetUser() *User { @@ -1011,7 +1011,7 @@ type GetOrganizationsByUserRequest struct { func (x *GetOrganizationsByUserRequest) Reset() { *x = GetOrganizationsByUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[18] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1024,7 +1024,7 @@ func (x *GetOrganizationsByUserRequest) String() string { func (*GetOrganizationsByUserRequest) ProtoMessage() {} func (x *GetOrganizationsByUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[18] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[18] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1037,7 +1037,7 @@ func (x *GetOrganizationsByUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationsByUserRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationsByUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{18} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{18} } func (x *GetOrganizationsByUserRequest) GetId() string { @@ -1058,7 +1058,7 @@ type GetOrganizationsByUserResponse struct { func (x *GetOrganizationsByUserResponse) Reset() { *x = GetOrganizationsByUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[19] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1071,7 +1071,7 @@ func (x *GetOrganizationsByUserResponse) String() string { func (*GetOrganizationsByUserResponse) ProtoMessage() {} func (x *GetOrganizationsByUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[19] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[19] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1084,7 +1084,7 @@ func (x *GetOrganizationsByUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationsByUserResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationsByUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{19} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{19} } func (x *GetOrganizationsByUserResponse) GetOrganizations() []*Organization { @@ -1103,7 +1103,7 @@ type GetOrganizationsByCurrentUserRequest struct { func (x *GetOrganizationsByCurrentUserRequest) Reset() { *x = GetOrganizationsByCurrentUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[20] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1116,7 +1116,7 @@ func (x *GetOrganizationsByCurrentUserRequest) String() string { func (*GetOrganizationsByCurrentUserRequest) ProtoMessage() {} func (x *GetOrganizationsByCurrentUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[20] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[20] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1129,7 +1129,7 @@ func (x *GetOrganizationsByCurrentUserRequest) ProtoReflect() protoreflect.Messa // Deprecated: Use GetOrganizationsByCurrentUserRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationsByCurrentUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{20} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{20} } type GetOrganizationsByCurrentUserResponse struct { @@ -1143,7 +1143,7 @@ type GetOrganizationsByCurrentUserResponse struct { func (x *GetOrganizationsByCurrentUserResponse) Reset() { *x = GetOrganizationsByCurrentUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[21] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[21] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1156,7 +1156,7 @@ func (x *GetOrganizationsByCurrentUserResponse) String() string { func (*GetOrganizationsByCurrentUserResponse) ProtoMessage() {} func (x *GetOrganizationsByCurrentUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[21] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[21] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1169,7 +1169,7 @@ func (x *GetOrganizationsByCurrentUserResponse) ProtoReflect() protoreflect.Mess // Deprecated: Use GetOrganizationsByCurrentUserResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationsByCurrentUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{21} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{21} } func (x *GetOrganizationsByCurrentUserResponse) GetOrganizations() []*Organization { @@ -1190,7 +1190,7 @@ type GetProjectsByUserRequest struct { func (x *GetProjectsByUserRequest) Reset() { *x = GetProjectsByUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[22] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[22] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1203,7 +1203,7 @@ func (x *GetProjectsByUserRequest) String() string { func (*GetProjectsByUserRequest) ProtoMessage() {} func (x *GetProjectsByUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[22] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[22] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1216,7 +1216,7 @@ func (x *GetProjectsByUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectsByUserRequest.ProtoReflect.Descriptor instead. func (*GetProjectsByUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{22} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{22} } func (x *GetProjectsByUserRequest) GetId() string { @@ -1237,7 +1237,7 @@ type GetProjectsByUserResponse struct { func (x *GetProjectsByUserResponse) Reset() { *x = GetProjectsByUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[23] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[23] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1250,7 +1250,7 @@ func (x *GetProjectsByUserResponse) String() string { func (*GetProjectsByUserResponse) ProtoMessage() {} func (x *GetProjectsByUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[23] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[23] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1263,7 +1263,7 @@ func (x *GetProjectsByUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectsByUserResponse.ProtoReflect.Descriptor instead. func (*GetProjectsByUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{23} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{23} } func (x *GetProjectsByUserResponse) GetProjects() []*Project { @@ -1282,7 +1282,7 @@ type GetProjectsByCurrentUserRequest struct { func (x *GetProjectsByCurrentUserRequest) Reset() { *x = GetProjectsByCurrentUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[24] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[24] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1295,7 +1295,7 @@ func (x *GetProjectsByCurrentUserRequest) String() string { func (*GetProjectsByCurrentUserRequest) ProtoMessage() {} func (x *GetProjectsByCurrentUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[24] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[24] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1308,7 +1308,7 @@ func (x *GetProjectsByCurrentUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectsByCurrentUserRequest.ProtoReflect.Descriptor instead. func (*GetProjectsByCurrentUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{24} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{24} } type GetProjectsByCurrentUserResponse struct { @@ -1322,7 +1322,7 @@ type GetProjectsByCurrentUserResponse struct { func (x *GetProjectsByCurrentUserResponse) Reset() { *x = GetProjectsByCurrentUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[25] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[25] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1335,7 +1335,7 @@ func (x *GetProjectsByCurrentUserResponse) String() string { func (*GetProjectsByCurrentUserResponse) ProtoMessage() {} func (x *GetProjectsByCurrentUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[25] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[25] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1348,7 +1348,7 @@ func (x *GetProjectsByCurrentUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectsByCurrentUserResponse.ProtoReflect.Descriptor instead. func (*GetProjectsByCurrentUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{25} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{25} } func (x *GetProjectsByCurrentUserResponse) GetProjects() []*Project { @@ -1369,7 +1369,7 @@ type EnableUserRequest struct { func (x *EnableUserRequest) Reset() { *x = EnableUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[26] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[26] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1382,7 +1382,7 @@ func (x *EnableUserRequest) String() string { func (*EnableUserRequest) ProtoMessage() {} func (x *EnableUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[26] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[26] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1395,7 +1395,7 @@ func (x *EnableUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableUserRequest.ProtoReflect.Descriptor instead. func (*EnableUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{26} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{26} } func (x *EnableUserRequest) GetId() string { @@ -1414,7 +1414,7 @@ type EnableUserResponse struct { func (x *EnableUserResponse) Reset() { *x = EnableUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[27] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[27] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1427,7 +1427,7 @@ func (x *EnableUserResponse) String() string { func (*EnableUserResponse) ProtoMessage() {} func (x *EnableUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[27] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[27] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1440,7 +1440,7 @@ func (x *EnableUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableUserResponse.ProtoReflect.Descriptor instead. func (*EnableUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{27} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{27} } type DisableUserRequest struct { @@ -1454,7 +1454,7 @@ type DisableUserRequest struct { func (x *DisableUserRequest) Reset() { *x = DisableUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[28] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[28] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1467,7 +1467,7 @@ func (x *DisableUserRequest) String() string { func (*DisableUserRequest) ProtoMessage() {} func (x *DisableUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[28] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[28] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1480,7 +1480,7 @@ func (x *DisableUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableUserRequest.ProtoReflect.Descriptor instead. func (*DisableUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{28} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{28} } func (x *DisableUserRequest) GetId() string { @@ -1499,7 +1499,7 @@ type DisableUserResponse struct { func (x *DisableUserResponse) Reset() { *x = DisableUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[29] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[29] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1512,7 +1512,7 @@ func (x *DisableUserResponse) String() string { func (*DisableUserResponse) ProtoMessage() {} func (x *DisableUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[29] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[29] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1525,7 +1525,7 @@ func (x *DisableUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableUserResponse.ProtoReflect.Descriptor instead. func (*DisableUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{29} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{29} } type DeleteUserRequest struct { @@ -1539,7 +1539,7 @@ type DeleteUserRequest struct { func (x *DeleteUserRequest) Reset() { *x = DeleteUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[30] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[30] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1552,7 +1552,7 @@ func (x *DeleteUserRequest) String() string { func (*DeleteUserRequest) ProtoMessage() {} func (x *DeleteUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[30] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[30] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1565,7 +1565,7 @@ func (x *DeleteUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteUserRequest.ProtoReflect.Descriptor instead. func (*DeleteUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{30} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{30} } func (x *DeleteUserRequest) GetId() string { @@ -1584,7 +1584,7 @@ type DeleteUserResponse struct { func (x *DeleteUserResponse) Reset() { *x = DeleteUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[31] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[31] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1597,7 +1597,7 @@ func (x *DeleteUserResponse) String() string { func (*DeleteUserResponse) ProtoMessage() {} func (x *DeleteUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[31] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[31] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1610,7 +1610,7 @@ func (x *DeleteUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteUserResponse.ProtoReflect.Descriptor instead. func (*DeleteUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{31} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{31} } type GetUserResponse struct { @@ -1624,7 +1624,7 @@ type GetUserResponse struct { func (x *GetUserResponse) Reset() { *x = GetUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[32] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[32] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1637,7 +1637,7 @@ func (x *GetUserResponse) String() string { func (*GetUserResponse) ProtoMessage() {} func (x *GetUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[32] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[32] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1650,7 +1650,7 @@ func (x *GetUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetUserResponse.ProtoReflect.Descriptor instead. func (*GetUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{32} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{32} } func (x *GetUserResponse) GetUser() *User { @@ -1669,7 +1669,7 @@ type GetCurrentUserRequest struct { func (x *GetCurrentUserRequest) Reset() { *x = GetCurrentUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[33] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[33] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1682,7 +1682,7 @@ func (x *GetCurrentUserRequest) String() string { func (*GetCurrentUserRequest) ProtoMessage() {} func (x *GetCurrentUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[33] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[33] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1695,7 +1695,7 @@ func (x *GetCurrentUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetCurrentUserRequest.ProtoReflect.Descriptor instead. func (*GetCurrentUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{33} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{33} } type GetCurrentUserResponse struct { @@ -1710,7 +1710,7 @@ type GetCurrentUserResponse struct { func (x *GetCurrentUserResponse) Reset() { *x = GetCurrentUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[34] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[34] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1723,7 +1723,7 @@ func (x *GetCurrentUserResponse) String() string { func (*GetCurrentUserResponse) ProtoMessage() {} func (x *GetCurrentUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[34] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[34] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1736,7 +1736,7 @@ func (x *GetCurrentUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetCurrentUserResponse.ProtoReflect.Descriptor instead. func (*GetCurrentUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{34} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{34} } func (x *GetCurrentUserResponse) GetUser() *User { @@ -1764,7 +1764,7 @@ type UpdateUserResponse struct { func (x *UpdateUserResponse) Reset() { *x = UpdateUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[35] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[35] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1777,7 +1777,7 @@ func (x *UpdateUserResponse) String() string { func (*UpdateUserResponse) ProtoMessage() {} func (x *UpdateUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[35] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[35] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1790,7 +1790,7 @@ func (x *UpdateUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateUserResponse.ProtoReflect.Descriptor instead. func (*UpdateUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{35} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{35} } func (x *UpdateUserResponse) GetUser() *User { @@ -1811,7 +1811,7 @@ type UpdateCurrentUserResponse struct { func (x *UpdateCurrentUserResponse) Reset() { *x = UpdateCurrentUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[36] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[36] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1824,7 +1824,7 @@ func (x *UpdateCurrentUserResponse) String() string { func (*UpdateCurrentUserResponse) ProtoMessage() {} func (x *UpdateCurrentUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[36] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[36] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1837,7 +1837,7 @@ func (x *UpdateCurrentUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateCurrentUserResponse.ProtoReflect.Descriptor instead. func (*UpdateCurrentUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{36} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{36} } func (x *UpdateCurrentUserResponse) GetUser() *User { @@ -1859,7 +1859,7 @@ type UpdateUserRequest struct { func (x *UpdateUserRequest) Reset() { *x = UpdateUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[37] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[37] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1872,7 +1872,7 @@ func (x *UpdateUserRequest) String() string { func (*UpdateUserRequest) ProtoMessage() {} func (x *UpdateUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[37] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[37] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1885,7 +1885,7 @@ func (x *UpdateUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateUserRequest.ProtoReflect.Descriptor instead. func (*UpdateUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{37} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{37} } func (x *UpdateUserRequest) GetId() string { @@ -1913,7 +1913,7 @@ type GetUserRequest struct { func (x *GetUserRequest) Reset() { *x = GetUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[38] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[38] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1926,7 +1926,7 @@ func (x *GetUserRequest) String() string { func (*GetUserRequest) ProtoMessage() {} func (x *GetUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[38] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[38] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1939,7 +1939,7 @@ func (x *GetUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetUserRequest.ProtoReflect.Descriptor instead. func (*GetUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{38} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{38} } func (x *GetUserRequest) GetId() string { @@ -1958,7 +1958,7 @@ type ListCurrentUserGroupsRequest struct { func (x *ListCurrentUserGroupsRequest) Reset() { *x = ListCurrentUserGroupsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[39] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[39] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -1971,7 +1971,7 @@ func (x *ListCurrentUserGroupsRequest) String() string { func (*ListCurrentUserGroupsRequest) ProtoMessage() {} func (x *ListCurrentUserGroupsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[39] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[39] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -1984,7 +1984,7 @@ func (x *ListCurrentUserGroupsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListCurrentUserGroupsRequest.ProtoReflect.Descriptor instead. func (*ListCurrentUserGroupsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{39} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{39} } type ListCurrentUserGroupsResponse struct { @@ -1998,7 +1998,7 @@ type ListCurrentUserGroupsResponse struct { func (x *ListCurrentUserGroupsResponse) Reset() { *x = ListCurrentUserGroupsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[40] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[40] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2011,7 +2011,7 @@ func (x *ListCurrentUserGroupsResponse) String() string { func (*ListCurrentUserGroupsResponse) ProtoMessage() {} func (x *ListCurrentUserGroupsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[40] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[40] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2024,7 +2024,7 @@ func (x *ListCurrentUserGroupsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListCurrentUserGroupsResponse.ProtoReflect.Descriptor instead. func (*ListCurrentUserGroupsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{40} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{40} } func (x *ListCurrentUserGroupsResponse) GetGroups() []*Group { @@ -2046,7 +2046,7 @@ type ListUserGroupsRequest struct { func (x *ListUserGroupsRequest) Reset() { *x = ListUserGroupsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[41] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[41] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2059,7 +2059,7 @@ func (x *ListUserGroupsRequest) String() string { func (*ListUserGroupsRequest) ProtoMessage() {} func (x *ListUserGroupsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[41] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[41] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2072,7 +2072,7 @@ func (x *ListUserGroupsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUserGroupsRequest.ProtoReflect.Descriptor instead. func (*ListUserGroupsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{41} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{41} } func (x *ListUserGroupsRequest) GetId() string { @@ -2100,7 +2100,7 @@ type ListUserGroupsResponse struct { func (x *ListUserGroupsResponse) Reset() { *x = ListUserGroupsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[42] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[42] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2113,7 +2113,7 @@ func (x *ListUserGroupsResponse) String() string { func (*ListUserGroupsResponse) ProtoMessage() {} func (x *ListUserGroupsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[42] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[42] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2126,7 +2126,7 @@ func (x *ListUserGroupsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUserGroupsResponse.ProtoReflect.Descriptor instead. func (*ListUserGroupsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{42} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{42} } func (x *ListUserGroupsResponse) GetGroups() []*Group { @@ -2147,7 +2147,7 @@ type UpdateCurrentUserRequest struct { func (x *UpdateCurrentUserRequest) Reset() { *x = UpdateCurrentUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[43] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[43] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2160,7 +2160,7 @@ func (x *UpdateCurrentUserRequest) String() string { func (*UpdateCurrentUserRequest) ProtoMessage() {} func (x *UpdateCurrentUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[43] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[43] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2173,7 +2173,7 @@ func (x *UpdateCurrentUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateCurrentUserRequest.ProtoReflect.Descriptor instead. func (*UpdateCurrentUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{43} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{43} } func (x *UpdateCurrentUserRequest) GetBody() *UserRequestBody { @@ -2194,7 +2194,7 @@ type ListUserInvitationsRequest struct { func (x *ListUserInvitationsRequest) Reset() { *x = ListUserInvitationsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[44] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[44] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2207,7 +2207,7 @@ func (x *ListUserInvitationsRequest) String() string { func (*ListUserInvitationsRequest) ProtoMessage() {} func (x *ListUserInvitationsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[44] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[44] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2220,7 +2220,7 @@ func (x *ListUserInvitationsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUserInvitationsRequest.ProtoReflect.Descriptor instead. func (*ListUserInvitationsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{44} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{44} } func (x *ListUserInvitationsRequest) GetId() string { @@ -2241,7 +2241,7 @@ type ListUserInvitationsResponse struct { func (x *ListUserInvitationsResponse) Reset() { *x = ListUserInvitationsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[45] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[45] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2254,7 +2254,7 @@ func (x *ListUserInvitationsResponse) String() string { func (*ListUserInvitationsResponse) ProtoMessage() {} func (x *ListUserInvitationsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[45] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[45] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2267,7 +2267,7 @@ func (x *ListUserInvitationsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListUserInvitationsResponse.ProtoReflect.Descriptor instead. func (*ListUserInvitationsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{45} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{45} } func (x *ListUserInvitationsResponse) GetInvitations() []*Invitation { @@ -2289,7 +2289,7 @@ type ListServiceUsersRequest struct { func (x *ListServiceUsersRequest) Reset() { *x = ListServiceUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[46] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[46] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2302,7 +2302,7 @@ func (x *ListServiceUsersRequest) String() string { func (*ListServiceUsersRequest) ProtoMessage() {} func (x *ListServiceUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[46] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[46] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2315,7 +2315,7 @@ func (x *ListServiceUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUsersRequest.ProtoReflect.Descriptor instead. func (*ListServiceUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{46} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{46} } func (x *ListServiceUsersRequest) GetOrgId() string { @@ -2343,7 +2343,7 @@ type ListServiceUsersResponse struct { func (x *ListServiceUsersResponse) Reset() { *x = ListServiceUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[47] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[47] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2356,7 +2356,7 @@ func (x *ListServiceUsersResponse) String() string { func (*ListServiceUsersResponse) ProtoMessage() {} func (x *ListServiceUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[47] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[47] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2369,7 +2369,7 @@ func (x *ListServiceUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUsersResponse.ProtoReflect.Descriptor instead. func (*ListServiceUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{47} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{47} } func (x *ListServiceUsersResponse) GetServiceusers() []*ServiceUser { @@ -2391,7 +2391,7 @@ type ServiceUserRequestBody struct { func (x *ServiceUserRequestBody) Reset() { *x = ServiceUserRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[48] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[48] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2404,7 +2404,7 @@ func (x *ServiceUserRequestBody) String() string { func (*ServiceUserRequestBody) ProtoMessage() {} func (x *ServiceUserRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[48] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[48] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2417,7 +2417,7 @@ func (x *ServiceUserRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use ServiceUserRequestBody.ProtoReflect.Descriptor instead. func (*ServiceUserRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{48} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{48} } func (x *ServiceUserRequestBody) GetTitle() string { @@ -2446,7 +2446,7 @@ type CreateServiceUserRequest struct { func (x *CreateServiceUserRequest) Reset() { *x = CreateServiceUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[49] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[49] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2459,7 +2459,7 @@ func (x *CreateServiceUserRequest) String() string { func (*CreateServiceUserRequest) ProtoMessage() {} func (x *CreateServiceUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[49] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[49] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2472,7 +2472,7 @@ func (x *CreateServiceUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserRequest.ProtoReflect.Descriptor instead. func (*CreateServiceUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{49} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{49} } func (x *CreateServiceUserRequest) GetBody() *ServiceUserRequestBody { @@ -2500,7 +2500,7 @@ type CreateServiceUserResponse struct { func (x *CreateServiceUserResponse) Reset() { *x = CreateServiceUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[50] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[50] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2513,7 +2513,7 @@ func (x *CreateServiceUserResponse) String() string { func (*CreateServiceUserResponse) ProtoMessage() {} func (x *CreateServiceUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[50] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[50] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2526,7 +2526,7 @@ func (x *CreateServiceUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserResponse.ProtoReflect.Descriptor instead. func (*CreateServiceUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{50} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{50} } func (x *CreateServiceUserResponse) GetServiceuser() *ServiceUser { @@ -2547,7 +2547,7 @@ type GetServiceUserRequest struct { func (x *GetServiceUserRequest) Reset() { *x = GetServiceUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[51] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[51] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2560,7 +2560,7 @@ func (x *GetServiceUserRequest) String() string { func (*GetServiceUserRequest) ProtoMessage() {} func (x *GetServiceUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[51] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[51] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2573,7 +2573,7 @@ func (x *GetServiceUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetServiceUserRequest.ProtoReflect.Descriptor instead. func (*GetServiceUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{51} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{51} } func (x *GetServiceUserRequest) GetId() string { @@ -2594,7 +2594,7 @@ type GetServiceUserResponse struct { func (x *GetServiceUserResponse) Reset() { *x = GetServiceUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[52] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[52] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2607,7 +2607,7 @@ func (x *GetServiceUserResponse) String() string { func (*GetServiceUserResponse) ProtoMessage() {} func (x *GetServiceUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[52] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[52] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2620,7 +2620,7 @@ func (x *GetServiceUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetServiceUserResponse.ProtoReflect.Descriptor instead. func (*GetServiceUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{52} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{52} } func (x *GetServiceUserResponse) GetServiceuser() *ServiceUser { @@ -2642,7 +2642,7 @@ type UpdateServiceUserRequest struct { func (x *UpdateServiceUserRequest) Reset() { *x = UpdateServiceUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[53] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[53] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2655,7 +2655,7 @@ func (x *UpdateServiceUserRequest) String() string { func (*UpdateServiceUserRequest) ProtoMessage() {} func (x *UpdateServiceUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[53] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[53] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2668,7 +2668,7 @@ func (x *UpdateServiceUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateServiceUserRequest.ProtoReflect.Descriptor instead. func (*UpdateServiceUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{53} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{53} } func (x *UpdateServiceUserRequest) GetId() string { @@ -2696,7 +2696,7 @@ type UpdateServiceUserResponse struct { func (x *UpdateServiceUserResponse) Reset() { *x = UpdateServiceUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[54] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[54] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2709,7 +2709,7 @@ func (x *UpdateServiceUserResponse) String() string { func (*UpdateServiceUserResponse) ProtoMessage() {} func (x *UpdateServiceUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[54] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[54] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2722,7 +2722,7 @@ func (x *UpdateServiceUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateServiceUserResponse.ProtoReflect.Descriptor instead. func (*UpdateServiceUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{54} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{54} } func (x *UpdateServiceUserResponse) GetServiceuser() *ServiceUser { @@ -2744,7 +2744,7 @@ type DeleteServiceUserRequest struct { func (x *DeleteServiceUserRequest) Reset() { *x = DeleteServiceUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[55] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[55] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2757,7 +2757,7 @@ func (x *DeleteServiceUserRequest) String() string { func (*DeleteServiceUserRequest) ProtoMessage() {} func (x *DeleteServiceUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[55] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[55] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2770,7 +2770,7 @@ func (x *DeleteServiceUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserRequest.ProtoReflect.Descriptor instead. func (*DeleteServiceUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{55} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{55} } func (x *DeleteServiceUserRequest) GetId() string { @@ -2796,7 +2796,7 @@ type DeleteServiceUserResponse struct { func (x *DeleteServiceUserResponse) Reset() { *x = DeleteServiceUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[56] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[56] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2809,7 +2809,7 @@ func (x *DeleteServiceUserResponse) String() string { func (*DeleteServiceUserResponse) ProtoMessage() {} func (x *DeleteServiceUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[56] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[56] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2822,7 +2822,7 @@ func (x *DeleteServiceUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserResponse.ProtoReflect.Descriptor instead. func (*DeleteServiceUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{56} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{56} } type CreateServiceUserKeyRequest struct { @@ -2837,7 +2837,7 @@ type CreateServiceUserKeyRequest struct { func (x *CreateServiceUserKeyRequest) Reset() { *x = CreateServiceUserKeyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[57] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[57] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2850,7 +2850,7 @@ func (x *CreateServiceUserKeyRequest) String() string { func (*CreateServiceUserKeyRequest) ProtoMessage() {} func (x *CreateServiceUserKeyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[57] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[57] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2863,7 +2863,7 @@ func (x *CreateServiceUserKeyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserKeyRequest.ProtoReflect.Descriptor instead. func (*CreateServiceUserKeyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{57} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{57} } func (x *CreateServiceUserKeyRequest) GetId() string { @@ -2891,7 +2891,7 @@ type CreateServiceUserKeyResponse struct { func (x *CreateServiceUserKeyResponse) Reset() { *x = CreateServiceUserKeyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[58] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[58] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2904,7 +2904,7 @@ func (x *CreateServiceUserKeyResponse) String() string { func (*CreateServiceUserKeyResponse) ProtoMessage() {} func (x *CreateServiceUserKeyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[58] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[58] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2917,7 +2917,7 @@ func (x *CreateServiceUserKeyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserKeyResponse.ProtoReflect.Descriptor instead. func (*CreateServiceUserKeyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{58} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{58} } func (x *CreateServiceUserKeyResponse) GetKey() *KeyCredential { @@ -2939,7 +2939,7 @@ type GetServiceUserKeyRequest struct { func (x *GetServiceUserKeyRequest) Reset() { *x = GetServiceUserKeyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[59] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[59] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -2952,7 +2952,7 @@ func (x *GetServiceUserKeyRequest) String() string { func (*GetServiceUserKeyRequest) ProtoMessage() {} func (x *GetServiceUserKeyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[59] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[59] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -2965,7 +2965,7 @@ func (x *GetServiceUserKeyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetServiceUserKeyRequest.ProtoReflect.Descriptor instead. func (*GetServiceUserKeyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{59} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{59} } func (x *GetServiceUserKeyRequest) GetId() string { @@ -2993,7 +2993,7 @@ type GetServiceUserKeyResponse struct { func (x *GetServiceUserKeyResponse) Reset() { *x = GetServiceUserKeyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[60] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[60] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3006,7 +3006,7 @@ func (x *GetServiceUserKeyResponse) String() string { func (*GetServiceUserKeyResponse) ProtoMessage() {} func (x *GetServiceUserKeyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[60] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[60] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3019,7 +3019,7 @@ func (x *GetServiceUserKeyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetServiceUserKeyResponse.ProtoReflect.Descriptor instead. func (*GetServiceUserKeyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{60} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{60} } func (x *GetServiceUserKeyResponse) GetKeys() []*JSONWebKey { @@ -3040,7 +3040,7 @@ type ListServiceUserKeysRequest struct { func (x *ListServiceUserKeysRequest) Reset() { *x = ListServiceUserKeysRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[61] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[61] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3053,7 +3053,7 @@ func (x *ListServiceUserKeysRequest) String() string { func (*ListServiceUserKeysRequest) ProtoMessage() {} func (x *ListServiceUserKeysRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[61] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[61] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3066,7 +3066,7 @@ func (x *ListServiceUserKeysRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUserKeysRequest.ProtoReflect.Descriptor instead. func (*ListServiceUserKeysRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{61} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{61} } func (x *ListServiceUserKeysRequest) GetId() string { @@ -3087,7 +3087,7 @@ type ListServiceUserKeysResponse struct { func (x *ListServiceUserKeysResponse) Reset() { *x = ListServiceUserKeysResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[62] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[62] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3100,7 +3100,7 @@ func (x *ListServiceUserKeysResponse) String() string { func (*ListServiceUserKeysResponse) ProtoMessage() {} func (x *ListServiceUserKeysResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[62] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[62] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3113,7 +3113,7 @@ func (x *ListServiceUserKeysResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUserKeysResponse.ProtoReflect.Descriptor instead. func (*ListServiceUserKeysResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{62} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{62} } func (x *ListServiceUserKeysResponse) GetKeys() []*ServiceUserKey { @@ -3135,7 +3135,7 @@ type DeleteServiceUserKeyRequest struct { func (x *DeleteServiceUserKeyRequest) Reset() { *x = DeleteServiceUserKeyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[63] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[63] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3148,7 +3148,7 @@ func (x *DeleteServiceUserKeyRequest) String() string { func (*DeleteServiceUserKeyRequest) ProtoMessage() {} func (x *DeleteServiceUserKeyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[63] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[63] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3161,7 +3161,7 @@ func (x *DeleteServiceUserKeyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserKeyRequest.ProtoReflect.Descriptor instead. func (*DeleteServiceUserKeyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{63} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{63} } func (x *DeleteServiceUserKeyRequest) GetId() string { @@ -3187,7 +3187,7 @@ type DeleteServiceUserKeyResponse struct { func (x *DeleteServiceUserKeyResponse) Reset() { *x = DeleteServiceUserKeyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[64] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[64] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3200,7 +3200,7 @@ func (x *DeleteServiceUserKeyResponse) String() string { func (*DeleteServiceUserKeyResponse) ProtoMessage() {} func (x *DeleteServiceUserKeyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[64] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[64] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3213,7 +3213,7 @@ func (x *DeleteServiceUserKeyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserKeyResponse.ProtoReflect.Descriptor instead. func (*DeleteServiceUserKeyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{64} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{64} } type CreateServiceUserSecretRequest struct { @@ -3228,7 +3228,7 @@ type CreateServiceUserSecretRequest struct { func (x *CreateServiceUserSecretRequest) Reset() { *x = CreateServiceUserSecretRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[65] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[65] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3241,7 +3241,7 @@ func (x *CreateServiceUserSecretRequest) String() string { func (*CreateServiceUserSecretRequest) ProtoMessage() {} func (x *CreateServiceUserSecretRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[65] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[65] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3254,7 +3254,7 @@ func (x *CreateServiceUserSecretRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserSecretRequest.ProtoReflect.Descriptor instead. func (*CreateServiceUserSecretRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{65} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{65} } func (x *CreateServiceUserSecretRequest) GetId() string { @@ -3282,7 +3282,7 @@ type CreateServiceUserSecretResponse struct { func (x *CreateServiceUserSecretResponse) Reset() { *x = CreateServiceUserSecretResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[66] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[66] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3295,7 +3295,7 @@ func (x *CreateServiceUserSecretResponse) String() string { func (*CreateServiceUserSecretResponse) ProtoMessage() {} func (x *CreateServiceUserSecretResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[66] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[66] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3308,7 +3308,7 @@ func (x *CreateServiceUserSecretResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateServiceUserSecretResponse.ProtoReflect.Descriptor instead. func (*CreateServiceUserSecretResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{66} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{66} } func (x *CreateServiceUserSecretResponse) GetSecret() *SecretCredential { @@ -3329,7 +3329,7 @@ type ListServiceUserSecretsRequest struct { func (x *ListServiceUserSecretsRequest) Reset() { *x = ListServiceUserSecretsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[67] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[67] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3342,7 +3342,7 @@ func (x *ListServiceUserSecretsRequest) String() string { func (*ListServiceUserSecretsRequest) ProtoMessage() {} func (x *ListServiceUserSecretsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[67] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[67] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3355,7 +3355,7 @@ func (x *ListServiceUserSecretsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUserSecretsRequest.ProtoReflect.Descriptor instead. func (*ListServiceUserSecretsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{67} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{67} } func (x *ListServiceUserSecretsRequest) GetId() string { @@ -3377,7 +3377,7 @@ type ListServiceUserSecretsResponse struct { func (x *ListServiceUserSecretsResponse) Reset() { *x = ListServiceUserSecretsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[68] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[68] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3390,7 +3390,7 @@ func (x *ListServiceUserSecretsResponse) String() string { func (*ListServiceUserSecretsResponse) ProtoMessage() {} func (x *ListServiceUserSecretsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[68] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[68] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3403,7 +3403,7 @@ func (x *ListServiceUserSecretsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListServiceUserSecretsResponse.ProtoReflect.Descriptor instead. func (*ListServiceUserSecretsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{68} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{68} } func (x *ListServiceUserSecretsResponse) GetSecrets() []*SecretCredential { @@ -3425,7 +3425,7 @@ type DeleteServiceUserSecretRequest struct { func (x *DeleteServiceUserSecretRequest) Reset() { *x = DeleteServiceUserSecretRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[69] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[69] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3438,7 +3438,7 @@ func (x *DeleteServiceUserSecretRequest) String() string { func (*DeleteServiceUserSecretRequest) ProtoMessage() {} func (x *DeleteServiceUserSecretRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[69] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[69] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3451,7 +3451,7 @@ func (x *DeleteServiceUserSecretRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserSecretRequest.ProtoReflect.Descriptor instead. func (*DeleteServiceUserSecretRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{69} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{69} } func (x *DeleteServiceUserSecretRequest) GetId() string { @@ -3477,7 +3477,7 @@ type DeleteServiceUserSecretResponse struct { func (x *DeleteServiceUserSecretResponse) Reset() { *x = DeleteServiceUserSecretResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[70] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[70] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3490,7 +3490,7 @@ func (x *DeleteServiceUserSecretResponse) String() string { func (*DeleteServiceUserSecretResponse) ProtoMessage() {} func (x *DeleteServiceUserSecretResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[70] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[70] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3503,7 +3503,7 @@ func (x *DeleteServiceUserSecretResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteServiceUserSecretResponse.ProtoReflect.Descriptor instead. func (*DeleteServiceUserSecretResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{70} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{70} } type ListOrganizationGroupsRequest struct { @@ -3518,7 +3518,7 @@ type ListOrganizationGroupsRequest struct { func (x *ListOrganizationGroupsRequest) Reset() { *x = ListOrganizationGroupsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[71] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[71] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3531,7 +3531,7 @@ func (x *ListOrganizationGroupsRequest) String() string { func (*ListOrganizationGroupsRequest) ProtoMessage() {} func (x *ListOrganizationGroupsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[71] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[71] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3544,7 +3544,7 @@ func (x *ListOrganizationGroupsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationGroupsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationGroupsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{71} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{71} } func (x *ListOrganizationGroupsRequest) GetOrgId() string { @@ -3572,7 +3572,7 @@ type ListOrganizationGroupsResponse struct { func (x *ListOrganizationGroupsResponse) Reset() { *x = ListOrganizationGroupsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[72] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[72] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3585,7 +3585,7 @@ func (x *ListOrganizationGroupsResponse) String() string { func (*ListOrganizationGroupsResponse) ProtoMessage() {} func (x *ListOrganizationGroupsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[72] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[72] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3598,7 +3598,7 @@ func (x *ListOrganizationGroupsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationGroupsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationGroupsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{72} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{72} } func (x *ListOrganizationGroupsResponse) GetGroups() []*Group { @@ -3620,7 +3620,7 @@ type CreateOrganizationRoleRequest struct { func (x *CreateOrganizationRoleRequest) Reset() { *x = CreateOrganizationRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[73] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[73] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3633,7 +3633,7 @@ func (x *CreateOrganizationRoleRequest) String() string { func (*CreateOrganizationRoleRequest) ProtoMessage() {} func (x *CreateOrganizationRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[73] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[73] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3646,7 +3646,7 @@ func (x *CreateOrganizationRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateOrganizationRoleRequest.ProtoReflect.Descriptor instead. func (*CreateOrganizationRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{73} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{73} } func (x *CreateOrganizationRoleRequest) GetBody() *RoleRequestBody { @@ -3674,7 +3674,7 @@ type CreateOrganizationRoleResponse struct { func (x *CreateOrganizationRoleResponse) Reset() { *x = CreateOrganizationRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[74] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[74] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3687,7 +3687,7 @@ func (x *CreateOrganizationRoleResponse) String() string { func (*CreateOrganizationRoleResponse) ProtoMessage() {} func (x *CreateOrganizationRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[74] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[74] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3700,7 +3700,7 @@ func (x *CreateOrganizationRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateOrganizationRoleResponse.ProtoReflect.Descriptor instead. func (*CreateOrganizationRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{74} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{74} } func (x *CreateOrganizationRoleResponse) GetRole() *Role { @@ -3722,7 +3722,7 @@ type GetOrganizationRoleRequest struct { func (x *GetOrganizationRoleRequest) Reset() { *x = GetOrganizationRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[75] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[75] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3735,7 +3735,7 @@ func (x *GetOrganizationRoleRequest) String() string { func (*GetOrganizationRoleRequest) ProtoMessage() {} func (x *GetOrganizationRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[75] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[75] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3748,7 +3748,7 @@ func (x *GetOrganizationRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationRoleRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{75} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{75} } func (x *GetOrganizationRoleRequest) GetId() string { @@ -3776,7 +3776,7 @@ type GetOrganizationRoleResponse struct { func (x *GetOrganizationRoleResponse) Reset() { *x = GetOrganizationRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[76] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[76] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3789,7 +3789,7 @@ func (x *GetOrganizationRoleResponse) String() string { func (*GetOrganizationRoleResponse) ProtoMessage() {} func (x *GetOrganizationRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[76] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[76] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3802,7 +3802,7 @@ func (x *GetOrganizationRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationRoleResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{76} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{76} } func (x *GetOrganizationRoleResponse) GetRole() *Role { @@ -3825,7 +3825,7 @@ type UpdateOrganizationRoleRequest struct { func (x *UpdateOrganizationRoleRequest) Reset() { *x = UpdateOrganizationRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[77] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[77] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3838,7 +3838,7 @@ func (x *UpdateOrganizationRoleRequest) String() string { func (*UpdateOrganizationRoleRequest) ProtoMessage() {} func (x *UpdateOrganizationRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[77] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[77] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3851,7 +3851,7 @@ func (x *UpdateOrganizationRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateOrganizationRoleRequest.ProtoReflect.Descriptor instead. func (*UpdateOrganizationRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{77} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{77} } func (x *UpdateOrganizationRoleRequest) GetId() string { @@ -3886,7 +3886,7 @@ type UpdateOrganizationRoleResponse struct { func (x *UpdateOrganizationRoleResponse) Reset() { *x = UpdateOrganizationRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[78] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[78] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3899,7 +3899,7 @@ func (x *UpdateOrganizationRoleResponse) String() string { func (*UpdateOrganizationRoleResponse) ProtoMessage() {} func (x *UpdateOrganizationRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[78] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[78] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3912,7 +3912,7 @@ func (x *UpdateOrganizationRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateOrganizationRoleResponse.ProtoReflect.Descriptor instead. func (*UpdateOrganizationRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{78} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{78} } func (x *UpdateOrganizationRoleResponse) GetRole() *Role { @@ -3933,7 +3933,7 @@ type ListRolesRequest struct { func (x *ListRolesRequest) Reset() { *x = ListRolesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[79] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[79] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3946,7 +3946,7 @@ func (x *ListRolesRequest) String() string { func (*ListRolesRequest) ProtoMessage() {} func (x *ListRolesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[79] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[79] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -3959,7 +3959,7 @@ func (x *ListRolesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListRolesRequest.ProtoReflect.Descriptor instead. func (*ListRolesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{79} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{79} } func (x *ListRolesRequest) GetState() string { @@ -3980,7 +3980,7 @@ type ListRolesResponse struct { func (x *ListRolesResponse) Reset() { *x = ListRolesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[80] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[80] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -3993,7 +3993,7 @@ func (x *ListRolesResponse) String() string { func (*ListRolesResponse) ProtoMessage() {} func (x *ListRolesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[80] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[80] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4006,7 +4006,7 @@ func (x *ListRolesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListRolesResponse.ProtoReflect.Descriptor instead. func (*ListRolesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{80} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{80} } func (x *ListRolesResponse) GetRoles() []*Role { @@ -4028,7 +4028,7 @@ type ListOrganizationRolesRequest struct { func (x *ListOrganizationRolesRequest) Reset() { *x = ListOrganizationRolesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[81] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[81] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4041,7 +4041,7 @@ func (x *ListOrganizationRolesRequest) String() string { func (*ListOrganizationRolesRequest) ProtoMessage() {} func (x *ListOrganizationRolesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[81] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[81] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4054,7 +4054,7 @@ func (x *ListOrganizationRolesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationRolesRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationRolesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{81} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{81} } func (x *ListOrganizationRolesRequest) GetOrgId() string { @@ -4082,7 +4082,7 @@ type ListOrganizationRolesResponse struct { func (x *ListOrganizationRolesResponse) Reset() { *x = ListOrganizationRolesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[82] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[82] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4095,7 +4095,7 @@ func (x *ListOrganizationRolesResponse) String() string { func (*ListOrganizationRolesResponse) ProtoMessage() {} func (x *ListOrganizationRolesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[82] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[82] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4108,7 +4108,7 @@ func (x *ListOrganizationRolesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationRolesResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationRolesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{82} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{82} } func (x *ListOrganizationRolesResponse) GetRoles() []*Role { @@ -4130,7 +4130,7 @@ type DeleteOrganizationRoleRequest struct { func (x *DeleteOrganizationRoleRequest) Reset() { *x = DeleteOrganizationRoleRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[83] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[83] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4143,7 +4143,7 @@ func (x *DeleteOrganizationRoleRequest) String() string { func (*DeleteOrganizationRoleRequest) ProtoMessage() {} func (x *DeleteOrganizationRoleRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[83] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[83] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4156,7 +4156,7 @@ func (x *DeleteOrganizationRoleRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteOrganizationRoleRequest.ProtoReflect.Descriptor instead. func (*DeleteOrganizationRoleRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{83} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{83} } func (x *DeleteOrganizationRoleRequest) GetId() string { @@ -4182,7 +4182,7 @@ type DeleteOrganizationRoleResponse struct { func (x *DeleteOrganizationRoleResponse) Reset() { *x = DeleteOrganizationRoleResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[84] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[84] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4195,7 +4195,7 @@ func (x *DeleteOrganizationRoleResponse) String() string { func (*DeleteOrganizationRoleResponse) ProtoMessage() {} func (x *DeleteOrganizationRoleResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[84] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[84] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4208,7 +4208,7 @@ func (x *DeleteOrganizationRoleResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteOrganizationRoleResponse.ProtoReflect.Descriptor instead. func (*DeleteOrganizationRoleResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{84} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{84} } type OrganizationRequestBody struct { @@ -4224,7 +4224,7 @@ type OrganizationRequestBody struct { func (x *OrganizationRequestBody) Reset() { *x = OrganizationRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[85] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[85] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4237,7 +4237,7 @@ func (x *OrganizationRequestBody) String() string { func (*OrganizationRequestBody) ProtoMessage() {} func (x *OrganizationRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[85] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[85] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4250,7 +4250,7 @@ func (x *OrganizationRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use OrganizationRequestBody.ProtoReflect.Descriptor instead. func (*OrganizationRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{85} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{85} } func (x *OrganizationRequestBody) GetName() string { @@ -4286,7 +4286,7 @@ type ListOrganizationsRequest struct { func (x *ListOrganizationsRequest) Reset() { *x = ListOrganizationsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[86] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[86] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4299,7 +4299,7 @@ func (x *ListOrganizationsRequest) String() string { func (*ListOrganizationsRequest) ProtoMessage() {} func (x *ListOrganizationsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[86] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[86] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4312,7 +4312,7 @@ func (x *ListOrganizationsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{86} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{86} } func (x *ListOrganizationsRequest) GetUserId() string { @@ -4340,7 +4340,7 @@ type ListOrganizationsResponse struct { func (x *ListOrganizationsResponse) Reset() { *x = ListOrganizationsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[87] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[87] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4353,7 +4353,7 @@ func (x *ListOrganizationsResponse) String() string { func (*ListOrganizationsResponse) ProtoMessage() {} func (x *ListOrganizationsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[87] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[87] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4366,7 +4366,7 @@ func (x *ListOrganizationsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{87} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{87} } func (x *ListOrganizationsResponse) GetOrganizations() []*Organization { @@ -4387,7 +4387,7 @@ type CreateOrganizationRequest struct { func (x *CreateOrganizationRequest) Reset() { *x = CreateOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[88] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[88] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4400,7 +4400,7 @@ func (x *CreateOrganizationRequest) String() string { func (*CreateOrganizationRequest) ProtoMessage() {} func (x *CreateOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[88] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[88] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4413,7 +4413,7 @@ func (x *CreateOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateOrganizationRequest.ProtoReflect.Descriptor instead. func (*CreateOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{88} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{88} } func (x *CreateOrganizationRequest) GetBody() *OrganizationRequestBody { @@ -4434,7 +4434,7 @@ type CreateOrganizationResponse struct { func (x *CreateOrganizationResponse) Reset() { *x = CreateOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[89] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[89] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4447,7 +4447,7 @@ func (x *CreateOrganizationResponse) String() string { func (*CreateOrganizationResponse) ProtoMessage() {} func (x *CreateOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[89] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[89] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4460,7 +4460,7 @@ func (x *CreateOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateOrganizationResponse.ProtoReflect.Descriptor instead. func (*CreateOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{89} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{89} } func (x *CreateOrganizationResponse) GetOrganization() *Organization { @@ -4481,7 +4481,7 @@ type GetOrganizationResponse struct { func (x *GetOrganizationResponse) Reset() { *x = GetOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[90] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[90] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4494,7 +4494,7 @@ func (x *GetOrganizationResponse) String() string { func (*GetOrganizationResponse) ProtoMessage() {} func (x *GetOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[90] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[90] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4507,7 +4507,7 @@ func (x *GetOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{90} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{90} } func (x *GetOrganizationResponse) GetOrganization() *Organization { @@ -4528,7 +4528,7 @@ type UpdateOrganizationResponse struct { func (x *UpdateOrganizationResponse) Reset() { *x = UpdateOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[91] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[91] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4541,7 +4541,7 @@ func (x *UpdateOrganizationResponse) String() string { func (*UpdateOrganizationResponse) ProtoMessage() {} func (x *UpdateOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[91] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[91] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4554,7 +4554,7 @@ func (x *UpdateOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateOrganizationResponse.ProtoReflect.Descriptor instead. func (*UpdateOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{91} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{91} } func (x *UpdateOrganizationResponse) GetOrganization() *Organization { @@ -4575,7 +4575,7 @@ type GetOrganizationRequest struct { func (x *GetOrganizationRequest) Reset() { *x = GetOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[92] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[92] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4588,7 +4588,7 @@ func (x *GetOrganizationRequest) String() string { func (*GetOrganizationRequest) ProtoMessage() {} func (x *GetOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[92] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[92] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4601,7 +4601,7 @@ func (x *GetOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{92} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{92} } func (x *GetOrganizationRequest) GetId() string { @@ -4623,7 +4623,7 @@ type UpdateOrganizationRequest struct { func (x *UpdateOrganizationRequest) Reset() { *x = UpdateOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[93] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[93] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4636,7 +4636,7 @@ func (x *UpdateOrganizationRequest) String() string { func (*UpdateOrganizationRequest) ProtoMessage() {} func (x *UpdateOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[93] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[93] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4649,7 +4649,7 @@ func (x *UpdateOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateOrganizationRequest.ProtoReflect.Descriptor instead. func (*UpdateOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{93} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{93} } func (x *UpdateOrganizationRequest) GetId() string { @@ -4677,7 +4677,7 @@ type ListOrganizationAdminsRequest struct { func (x *ListOrganizationAdminsRequest) Reset() { *x = ListOrganizationAdminsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[94] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[94] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4690,7 +4690,7 @@ func (x *ListOrganizationAdminsRequest) String() string { func (*ListOrganizationAdminsRequest) ProtoMessage() {} func (x *ListOrganizationAdminsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[94] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[94] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4703,7 +4703,7 @@ func (x *ListOrganizationAdminsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationAdminsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationAdminsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{94} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{94} } func (x *ListOrganizationAdminsRequest) GetId() string { @@ -4724,7 +4724,7 @@ type ListOrganizationAdminsResponse struct { func (x *ListOrganizationAdminsResponse) Reset() { *x = ListOrganizationAdminsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[95] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[95] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4737,7 +4737,7 @@ func (x *ListOrganizationAdminsResponse) String() string { func (*ListOrganizationAdminsResponse) ProtoMessage() {} func (x *ListOrganizationAdminsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[95] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[95] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4750,7 +4750,7 @@ func (x *ListOrganizationAdminsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationAdminsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationAdminsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{95} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{95} } func (x *ListOrganizationAdminsResponse) GetUsers() []*User { @@ -4766,14 +4766,14 @@ type ListOrganizationUsersRequest struct { unknownFields protoimpl.UnknownFields Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"` - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. PermissionFilter string `protobuf:"bytes,2,opt,name=permission_filter,json=permissionFilter,proto3" json:"permission_filter,omitempty"` } func (x *ListOrganizationUsersRequest) Reset() { *x = ListOrganizationUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[96] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[96] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4786,7 +4786,7 @@ func (x *ListOrganizationUsersRequest) String() string { func (*ListOrganizationUsersRequest) ProtoMessage() {} func (x *ListOrganizationUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[96] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[96] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4799,7 +4799,7 @@ func (x *ListOrganizationUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationUsersRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{96} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{96} } func (x *ListOrganizationUsersRequest) GetId() string { @@ -4809,7 +4809,7 @@ func (x *ListOrganizationUsersRequest) GetId() string { return "" } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. func (x *ListOrganizationUsersRequest) GetPermissionFilter() string { if x != nil { return x.PermissionFilter @@ -4828,7 +4828,7 @@ type ListOrganizationUsersResponse struct { func (x *ListOrganizationUsersResponse) Reset() { *x = ListOrganizationUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[97] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[97] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4841,7 +4841,7 @@ func (x *ListOrganizationUsersResponse) String() string { func (*ListOrganizationUsersResponse) ProtoMessage() {} func (x *ListOrganizationUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[97] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[97] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4854,7 +4854,7 @@ func (x *ListOrganizationUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationUsersResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{97} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{97} } func (x *ListOrganizationUsersResponse) GetUsers() []*User { @@ -4876,7 +4876,7 @@ type AddOrganizationUsersRequest struct { func (x *AddOrganizationUsersRequest) Reset() { *x = AddOrganizationUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[98] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[98] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4889,7 +4889,7 @@ func (x *AddOrganizationUsersRequest) String() string { func (*AddOrganizationUsersRequest) ProtoMessage() {} func (x *AddOrganizationUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[98] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[98] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4902,7 +4902,7 @@ func (x *AddOrganizationUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AddOrganizationUsersRequest.ProtoReflect.Descriptor instead. func (*AddOrganizationUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{98} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{98} } func (x *AddOrganizationUsersRequest) GetId() string { @@ -4928,7 +4928,7 @@ type AddOrganizationUsersResponse struct { func (x *AddOrganizationUsersResponse) Reset() { *x = AddOrganizationUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[99] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[99] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4941,7 +4941,7 @@ func (x *AddOrganizationUsersResponse) String() string { func (*AddOrganizationUsersResponse) ProtoMessage() {} func (x *AddOrganizationUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[99] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[99] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4954,7 +4954,7 @@ func (x *AddOrganizationUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AddOrganizationUsersResponse.ProtoReflect.Descriptor instead. func (*AddOrganizationUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{99} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{99} } type RemoveOrganizationUserRequest struct { @@ -4969,7 +4969,7 @@ type RemoveOrganizationUserRequest struct { func (x *RemoveOrganizationUserRequest) Reset() { *x = RemoveOrganizationUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[100] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[100] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -4982,7 +4982,7 @@ func (x *RemoveOrganizationUserRequest) String() string { func (*RemoveOrganizationUserRequest) ProtoMessage() {} func (x *RemoveOrganizationUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[100] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[100] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -4995,7 +4995,7 @@ func (x *RemoveOrganizationUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use RemoveOrganizationUserRequest.ProtoReflect.Descriptor instead. func (*RemoveOrganizationUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{100} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{100} } func (x *RemoveOrganizationUserRequest) GetId() string { @@ -5021,7 +5021,7 @@ type RemoveOrganizationUserResponse struct { func (x *RemoveOrganizationUserResponse) Reset() { *x = RemoveOrganizationUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[101] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[101] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5034,7 +5034,7 @@ func (x *RemoveOrganizationUserResponse) String() string { func (*RemoveOrganizationUserResponse) ProtoMessage() {} func (x *RemoveOrganizationUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[101] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[101] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5047,7 +5047,7 @@ func (x *RemoveOrganizationUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use RemoveOrganizationUserResponse.ProtoReflect.Descriptor instead. func (*RemoveOrganizationUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{101} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{101} } type ListOrganizationServiceUsersRequest struct { @@ -5061,7 +5061,7 @@ type ListOrganizationServiceUsersRequest struct { func (x *ListOrganizationServiceUsersRequest) Reset() { *x = ListOrganizationServiceUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[102] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[102] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5074,7 +5074,7 @@ func (x *ListOrganizationServiceUsersRequest) String() string { func (*ListOrganizationServiceUsersRequest) ProtoMessage() {} func (x *ListOrganizationServiceUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[102] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[102] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5087,7 +5087,7 @@ func (x *ListOrganizationServiceUsersRequest) ProtoReflect() protoreflect.Messag // Deprecated: Use ListOrganizationServiceUsersRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationServiceUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{102} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{102} } func (x *ListOrganizationServiceUsersRequest) GetId() string { @@ -5108,7 +5108,7 @@ type ListOrganizationServiceUsersResponse struct { func (x *ListOrganizationServiceUsersResponse) Reset() { *x = ListOrganizationServiceUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[103] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[103] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5121,7 +5121,7 @@ func (x *ListOrganizationServiceUsersResponse) String() string { func (*ListOrganizationServiceUsersResponse) ProtoMessage() {} func (x *ListOrganizationServiceUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[103] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[103] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5134,7 +5134,7 @@ func (x *ListOrganizationServiceUsersResponse) ProtoReflect() protoreflect.Messa // Deprecated: Use ListOrganizationServiceUsersResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationServiceUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{103} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{103} } func (x *ListOrganizationServiceUsersResponse) GetServiceusers() []*ServiceUser { @@ -5156,7 +5156,7 @@ type ListOrganizationInvitationsRequest struct { func (x *ListOrganizationInvitationsRequest) Reset() { *x = ListOrganizationInvitationsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[104] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[104] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5169,7 +5169,7 @@ func (x *ListOrganizationInvitationsRequest) String() string { func (*ListOrganizationInvitationsRequest) ProtoMessage() {} func (x *ListOrganizationInvitationsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[104] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[104] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5182,7 +5182,7 @@ func (x *ListOrganizationInvitationsRequest) ProtoReflect() protoreflect.Message // Deprecated: Use ListOrganizationInvitationsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationInvitationsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{104} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{104} } func (x *ListOrganizationInvitationsRequest) GetOrgId() string { @@ -5210,7 +5210,7 @@ type ListOrganizationInvitationsResponse struct { func (x *ListOrganizationInvitationsResponse) Reset() { *x = ListOrganizationInvitationsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[105] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[105] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5223,7 +5223,7 @@ func (x *ListOrganizationInvitationsResponse) String() string { func (*ListOrganizationInvitationsResponse) ProtoMessage() {} func (x *ListOrganizationInvitationsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[105] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[105] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5236,7 +5236,7 @@ func (x *ListOrganizationInvitationsResponse) ProtoReflect() protoreflect.Messag // Deprecated: Use ListOrganizationInvitationsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationInvitationsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{105} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{105} } func (x *ListOrganizationInvitationsResponse) GetInvitations() []*Invitation { @@ -5259,7 +5259,7 @@ type CreateOrganizationInvitationRequest struct { func (x *CreateOrganizationInvitationRequest) Reset() { *x = CreateOrganizationInvitationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[106] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[106] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5272,7 +5272,7 @@ func (x *CreateOrganizationInvitationRequest) String() string { func (*CreateOrganizationInvitationRequest) ProtoMessage() {} func (x *CreateOrganizationInvitationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[106] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[106] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5285,7 +5285,7 @@ func (x *CreateOrganizationInvitationRequest) ProtoReflect() protoreflect.Messag // Deprecated: Use CreateOrganizationInvitationRequest.ProtoReflect.Descriptor instead. func (*CreateOrganizationInvitationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{106} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{106} } func (x *CreateOrganizationInvitationRequest) GetOrgId() string { @@ -5320,7 +5320,7 @@ type CreateOrganizationInvitationResponse struct { func (x *CreateOrganizationInvitationResponse) Reset() { *x = CreateOrganizationInvitationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[107] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[107] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5333,7 +5333,7 @@ func (x *CreateOrganizationInvitationResponse) String() string { func (*CreateOrganizationInvitationResponse) ProtoMessage() {} func (x *CreateOrganizationInvitationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[107] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[107] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5346,7 +5346,7 @@ func (x *CreateOrganizationInvitationResponse) ProtoReflect() protoreflect.Messa // Deprecated: Use CreateOrganizationInvitationResponse.ProtoReflect.Descriptor instead. func (*CreateOrganizationInvitationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{107} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{107} } func (x *CreateOrganizationInvitationResponse) GetInvitation() *Invitation { @@ -5368,7 +5368,7 @@ type GetOrganizationInvitationRequest struct { func (x *GetOrganizationInvitationRequest) Reset() { *x = GetOrganizationInvitationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[108] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[108] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5381,7 +5381,7 @@ func (x *GetOrganizationInvitationRequest) String() string { func (*GetOrganizationInvitationRequest) ProtoMessage() {} func (x *GetOrganizationInvitationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[108] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[108] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5394,7 +5394,7 @@ func (x *GetOrganizationInvitationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationInvitationRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationInvitationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{108} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{108} } func (x *GetOrganizationInvitationRequest) GetId() string { @@ -5422,7 +5422,7 @@ type GetOrganizationInvitationResponse struct { func (x *GetOrganizationInvitationResponse) Reset() { *x = GetOrganizationInvitationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[109] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[109] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5435,7 +5435,7 @@ func (x *GetOrganizationInvitationResponse) String() string { func (*GetOrganizationInvitationResponse) ProtoMessage() {} func (x *GetOrganizationInvitationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[109] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[109] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5448,7 +5448,7 @@ func (x *GetOrganizationInvitationResponse) ProtoReflect() protoreflect.Message // Deprecated: Use GetOrganizationInvitationResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationInvitationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{109} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{109} } func (x *GetOrganizationInvitationResponse) GetInvitation() *Invitation { @@ -5470,7 +5470,7 @@ type AcceptOrganizationInvitationRequest struct { func (x *AcceptOrganizationInvitationRequest) Reset() { *x = AcceptOrganizationInvitationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[110] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[110] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5483,7 +5483,7 @@ func (x *AcceptOrganizationInvitationRequest) String() string { func (*AcceptOrganizationInvitationRequest) ProtoMessage() {} func (x *AcceptOrganizationInvitationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[110] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[110] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5496,7 +5496,7 @@ func (x *AcceptOrganizationInvitationRequest) ProtoReflect() protoreflect.Messag // Deprecated: Use AcceptOrganizationInvitationRequest.ProtoReflect.Descriptor instead. func (*AcceptOrganizationInvitationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{110} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{110} } func (x *AcceptOrganizationInvitationRequest) GetId() string { @@ -5522,7 +5522,7 @@ type AcceptOrganizationInvitationResponse struct { func (x *AcceptOrganizationInvitationResponse) Reset() { *x = AcceptOrganizationInvitationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[111] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[111] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5535,7 +5535,7 @@ func (x *AcceptOrganizationInvitationResponse) String() string { func (*AcceptOrganizationInvitationResponse) ProtoMessage() {} func (x *AcceptOrganizationInvitationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[111] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[111] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5548,7 +5548,7 @@ func (x *AcceptOrganizationInvitationResponse) ProtoReflect() protoreflect.Messa // Deprecated: Use AcceptOrganizationInvitationResponse.ProtoReflect.Descriptor instead. func (*AcceptOrganizationInvitationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{111} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{111} } type DeleteOrganizationInvitationRequest struct { @@ -5563,7 +5563,7 @@ type DeleteOrganizationInvitationRequest struct { func (x *DeleteOrganizationInvitationRequest) Reset() { *x = DeleteOrganizationInvitationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[112] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[112] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5576,7 +5576,7 @@ func (x *DeleteOrganizationInvitationRequest) String() string { func (*DeleteOrganizationInvitationRequest) ProtoMessage() {} func (x *DeleteOrganizationInvitationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[112] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[112] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5589,7 +5589,7 @@ func (x *DeleteOrganizationInvitationRequest) ProtoReflect() protoreflect.Messag // Deprecated: Use DeleteOrganizationInvitationRequest.ProtoReflect.Descriptor instead. func (*DeleteOrganizationInvitationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{112} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{112} } func (x *DeleteOrganizationInvitationRequest) GetId() string { @@ -5615,7 +5615,7 @@ type DeleteOrganizationInvitationResponse struct { func (x *DeleteOrganizationInvitationResponse) Reset() { *x = DeleteOrganizationInvitationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[113] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[113] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5628,7 +5628,7 @@ func (x *DeleteOrganizationInvitationResponse) String() string { func (*DeleteOrganizationInvitationResponse) ProtoMessage() {} func (x *DeleteOrganizationInvitationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[113] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[113] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5641,7 +5641,7 @@ func (x *DeleteOrganizationInvitationResponse) ProtoReflect() protoreflect.Messa // Deprecated: Use DeleteOrganizationInvitationResponse.ProtoReflect.Descriptor instead. func (*DeleteOrganizationInvitationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{113} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{113} } type EnableOrganizationRequest struct { @@ -5655,7 +5655,7 @@ type EnableOrganizationRequest struct { func (x *EnableOrganizationRequest) Reset() { *x = EnableOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[114] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[114] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5668,7 +5668,7 @@ func (x *EnableOrganizationRequest) String() string { func (*EnableOrganizationRequest) ProtoMessage() {} func (x *EnableOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[114] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[114] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5681,7 +5681,7 @@ func (x *EnableOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableOrganizationRequest.ProtoReflect.Descriptor instead. func (*EnableOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{114} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{114} } func (x *EnableOrganizationRequest) GetId() string { @@ -5700,7 +5700,7 @@ type EnableOrganizationResponse struct { func (x *EnableOrganizationResponse) Reset() { *x = EnableOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[115] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[115] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5713,7 +5713,7 @@ func (x *EnableOrganizationResponse) String() string { func (*EnableOrganizationResponse) ProtoMessage() {} func (x *EnableOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[115] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[115] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5726,7 +5726,7 @@ func (x *EnableOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableOrganizationResponse.ProtoReflect.Descriptor instead. func (*EnableOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{115} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{115} } type DisableOrganizationRequest struct { @@ -5740,7 +5740,7 @@ type DisableOrganizationRequest struct { func (x *DisableOrganizationRequest) Reset() { *x = DisableOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[116] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[116] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5753,7 +5753,7 @@ func (x *DisableOrganizationRequest) String() string { func (*DisableOrganizationRequest) ProtoMessage() {} func (x *DisableOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[116] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[116] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5766,7 +5766,7 @@ func (x *DisableOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableOrganizationRequest.ProtoReflect.Descriptor instead. func (*DisableOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{116} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{116} } func (x *DisableOrganizationRequest) GetId() string { @@ -5785,7 +5785,7 @@ type DisableOrganizationResponse struct { func (x *DisableOrganizationResponse) Reset() { *x = DisableOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[117] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[117] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5798,7 +5798,7 @@ func (x *DisableOrganizationResponse) String() string { func (*DisableOrganizationResponse) ProtoMessage() {} func (x *DisableOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[117] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[117] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5811,7 +5811,7 @@ func (x *DisableOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableOrganizationResponse.ProtoReflect.Descriptor instead. func (*DisableOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{117} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{117} } type DeleteOrganizationRequest struct { @@ -5825,7 +5825,7 @@ type DeleteOrganizationRequest struct { func (x *DeleteOrganizationRequest) Reset() { *x = DeleteOrganizationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[118] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[118] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5838,7 +5838,7 @@ func (x *DeleteOrganizationRequest) String() string { func (*DeleteOrganizationRequest) ProtoMessage() {} func (x *DeleteOrganizationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[118] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[118] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5851,7 +5851,7 @@ func (x *DeleteOrganizationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteOrganizationRequest.ProtoReflect.Descriptor instead. func (*DeleteOrganizationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{118} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{118} } func (x *DeleteOrganizationRequest) GetId() string { @@ -5870,7 +5870,7 @@ type DeleteOrganizationResponse struct { func (x *DeleteOrganizationResponse) Reset() { *x = DeleteOrganizationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[119] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[119] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5883,7 +5883,7 @@ func (x *DeleteOrganizationResponse) String() string { func (*DeleteOrganizationResponse) ProtoMessage() {} func (x *DeleteOrganizationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[119] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[119] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5896,7 +5896,7 @@ func (x *DeleteOrganizationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteOrganizationResponse.ProtoReflect.Descriptor instead. func (*DeleteOrganizationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{119} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{119} } type ProjectRequestBody struct { @@ -5913,7 +5913,7 @@ type ProjectRequestBody struct { func (x *ProjectRequestBody) Reset() { *x = ProjectRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[120] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[120] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5926,7 +5926,7 @@ func (x *ProjectRequestBody) String() string { func (*ProjectRequestBody) ProtoMessage() {} func (x *ProjectRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[120] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[120] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -5939,7 +5939,7 @@ func (x *ProjectRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use ProjectRequestBody.ProtoReflect.Descriptor instead. func (*ProjectRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{120} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{120} } func (x *ProjectRequestBody) GetName() string { @@ -5981,7 +5981,7 @@ type CreateProjectRequest struct { func (x *CreateProjectRequest) Reset() { *x = CreateProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[121] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[121] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -5994,7 +5994,7 @@ func (x *CreateProjectRequest) String() string { func (*CreateProjectRequest) ProtoMessage() {} func (x *CreateProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[121] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[121] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6007,7 +6007,7 @@ func (x *CreateProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateProjectRequest.ProtoReflect.Descriptor instead. func (*CreateProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{121} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{121} } func (x *CreateProjectRequest) GetBody() *ProjectRequestBody { @@ -6028,7 +6028,7 @@ type CreateProjectResponse struct { func (x *CreateProjectResponse) Reset() { *x = CreateProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[122] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[122] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6041,7 +6041,7 @@ func (x *CreateProjectResponse) String() string { func (*CreateProjectResponse) ProtoMessage() {} func (x *CreateProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[122] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[122] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6054,7 +6054,7 @@ func (x *CreateProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateProjectResponse.ProtoReflect.Descriptor instead. func (*CreateProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{122} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{122} } func (x *CreateProjectResponse) GetProject() *Project { @@ -6075,7 +6075,7 @@ type GetProjectResponse struct { func (x *GetProjectResponse) Reset() { *x = GetProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[123] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[123] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6088,7 +6088,7 @@ func (x *GetProjectResponse) String() string { func (*GetProjectResponse) ProtoMessage() {} func (x *GetProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[123] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[123] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6101,7 +6101,7 @@ func (x *GetProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectResponse.ProtoReflect.Descriptor instead. func (*GetProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{123} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{123} } func (x *GetProjectResponse) GetProject() *Project { @@ -6122,7 +6122,7 @@ type UpdateProjectResponse struct { func (x *UpdateProjectResponse) Reset() { *x = UpdateProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[124] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[124] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6135,7 +6135,7 @@ func (x *UpdateProjectResponse) String() string { func (*UpdateProjectResponse) ProtoMessage() {} func (x *UpdateProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[124] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[124] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6148,7 +6148,7 @@ func (x *UpdateProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateProjectResponse.ProtoReflect.Descriptor instead. func (*UpdateProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{124} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{124} } func (x *UpdateProjectResponse) GetProject() *Project { @@ -6170,7 +6170,7 @@ type ListOrganizationProjectsRequest struct { func (x *ListOrganizationProjectsRequest) Reset() { *x = ListOrganizationProjectsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[125] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[125] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6183,7 +6183,7 @@ func (x *ListOrganizationProjectsRequest) String() string { func (*ListOrganizationProjectsRequest) ProtoMessage() {} func (x *ListOrganizationProjectsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[125] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[125] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6196,7 +6196,7 @@ func (x *ListOrganizationProjectsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationProjectsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationProjectsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{125} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{125} } func (x *ListOrganizationProjectsRequest) GetId() string { @@ -6224,7 +6224,7 @@ type ListOrganizationProjectsResponse struct { func (x *ListOrganizationProjectsResponse) Reset() { *x = ListOrganizationProjectsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[126] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[126] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6237,7 +6237,7 @@ func (x *ListOrganizationProjectsResponse) String() string { func (*ListOrganizationProjectsResponse) ProtoMessage() {} func (x *ListOrganizationProjectsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[126] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[126] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6250,7 +6250,7 @@ func (x *ListOrganizationProjectsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationProjectsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationProjectsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{126} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{126} } func (x *ListOrganizationProjectsResponse) GetProjects() []*Project { @@ -6271,7 +6271,7 @@ type GetProjectRequest struct { func (x *GetProjectRequest) Reset() { *x = GetProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[127] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[127] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6284,7 +6284,7 @@ func (x *GetProjectRequest) String() string { func (*GetProjectRequest) ProtoMessage() {} func (x *GetProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[127] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[127] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6297,7 +6297,7 @@ func (x *GetProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectRequest.ProtoReflect.Descriptor instead. func (*GetProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{127} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{127} } func (x *GetProjectRequest) GetId() string { @@ -6319,7 +6319,7 @@ type UpdateProjectRequest struct { func (x *UpdateProjectRequest) Reset() { *x = UpdateProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[128] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[128] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6332,7 +6332,7 @@ func (x *UpdateProjectRequest) String() string { func (*UpdateProjectRequest) ProtoMessage() {} func (x *UpdateProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[128] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[128] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6345,7 +6345,7 @@ func (x *UpdateProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateProjectRequest.ProtoReflect.Descriptor instead. func (*UpdateProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{128} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{128} } func (x *UpdateProjectRequest) GetId() string { @@ -6373,7 +6373,7 @@ type ListProjectAdminsRequest struct { func (x *ListProjectAdminsRequest) Reset() { *x = ListProjectAdminsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[129] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[129] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6386,7 +6386,7 @@ func (x *ListProjectAdminsRequest) String() string { func (*ListProjectAdminsRequest) ProtoMessage() {} func (x *ListProjectAdminsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[129] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[129] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6399,7 +6399,7 @@ func (x *ListProjectAdminsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectAdminsRequest.ProtoReflect.Descriptor instead. func (*ListProjectAdminsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{129} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{129} } func (x *ListProjectAdminsRequest) GetId() string { @@ -6420,7 +6420,7 @@ type ListProjectAdminsResponse struct { func (x *ListProjectAdminsResponse) Reset() { *x = ListProjectAdminsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[130] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[130] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6433,7 +6433,7 @@ func (x *ListProjectAdminsResponse) String() string { func (*ListProjectAdminsResponse) ProtoMessage() {} func (x *ListProjectAdminsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[130] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[130] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6446,7 +6446,7 @@ func (x *ListProjectAdminsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectAdminsResponse.ProtoReflect.Descriptor instead. func (*ListProjectAdminsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{130} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{130} } func (x *ListProjectAdminsResponse) GetUsers() []*User { @@ -6468,7 +6468,7 @@ type ListProjectUsersRequest struct { func (x *ListProjectUsersRequest) Reset() { *x = ListProjectUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[131] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[131] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6481,7 +6481,7 @@ func (x *ListProjectUsersRequest) String() string { func (*ListProjectUsersRequest) ProtoMessage() {} func (x *ListProjectUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[131] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[131] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6494,7 +6494,7 @@ func (x *ListProjectUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectUsersRequest.ProtoReflect.Descriptor instead. func (*ListProjectUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{131} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{131} } func (x *ListProjectUsersRequest) GetId() string { @@ -6522,7 +6522,7 @@ type ListProjectUsersResponse struct { func (x *ListProjectUsersResponse) Reset() { *x = ListProjectUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[132] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[132] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6535,7 +6535,7 @@ func (x *ListProjectUsersResponse) String() string { func (*ListProjectUsersResponse) ProtoMessage() {} func (x *ListProjectUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[132] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[132] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6548,7 +6548,7 @@ func (x *ListProjectUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectUsersResponse.ProtoReflect.Descriptor instead. func (*ListProjectUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{132} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{132} } func (x *ListProjectUsersResponse) GetUsers() []*User { @@ -6569,7 +6569,7 @@ type EnableProjectRequest struct { func (x *EnableProjectRequest) Reset() { *x = EnableProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[133] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[133] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6582,7 +6582,7 @@ func (x *EnableProjectRequest) String() string { func (*EnableProjectRequest) ProtoMessage() {} func (x *EnableProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[133] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[133] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6595,7 +6595,7 @@ func (x *EnableProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableProjectRequest.ProtoReflect.Descriptor instead. func (*EnableProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{133} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{133} } func (x *EnableProjectRequest) GetId() string { @@ -6614,7 +6614,7 @@ type EnableProjectResponse struct { func (x *EnableProjectResponse) Reset() { *x = EnableProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[134] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[134] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6627,7 +6627,7 @@ func (x *EnableProjectResponse) String() string { func (*EnableProjectResponse) ProtoMessage() {} func (x *EnableProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[134] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[134] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6640,7 +6640,7 @@ func (x *EnableProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableProjectResponse.ProtoReflect.Descriptor instead. func (*EnableProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{134} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{134} } type DisableProjectRequest struct { @@ -6654,7 +6654,7 @@ type DisableProjectRequest struct { func (x *DisableProjectRequest) Reset() { *x = DisableProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[135] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[135] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6667,7 +6667,7 @@ func (x *DisableProjectRequest) String() string { func (*DisableProjectRequest) ProtoMessage() {} func (x *DisableProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[135] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[135] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6680,7 +6680,7 @@ func (x *DisableProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableProjectRequest.ProtoReflect.Descriptor instead. func (*DisableProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{135} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{135} } func (x *DisableProjectRequest) GetId() string { @@ -6699,7 +6699,7 @@ type DisableProjectResponse struct { func (x *DisableProjectResponse) Reset() { *x = DisableProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[136] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[136] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6712,7 +6712,7 @@ func (x *DisableProjectResponse) String() string { func (*DisableProjectResponse) ProtoMessage() {} func (x *DisableProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[136] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[136] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6725,7 +6725,7 @@ func (x *DisableProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableProjectResponse.ProtoReflect.Descriptor instead. func (*DisableProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{136} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{136} } type DeleteProjectRequest struct { @@ -6739,7 +6739,7 @@ type DeleteProjectRequest struct { func (x *DeleteProjectRequest) Reset() { *x = DeleteProjectRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[137] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[137] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6752,7 +6752,7 @@ func (x *DeleteProjectRequest) String() string { func (*DeleteProjectRequest) ProtoMessage() {} func (x *DeleteProjectRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[137] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[137] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6765,7 +6765,7 @@ func (x *DeleteProjectRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteProjectRequest.ProtoReflect.Descriptor instead. func (*DeleteProjectRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{137} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{137} } func (x *DeleteProjectRequest) GetId() string { @@ -6784,7 +6784,7 @@ type DeleteProjectResponse struct { func (x *DeleteProjectResponse) Reset() { *x = DeleteProjectResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[138] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[138] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6797,7 +6797,7 @@ func (x *DeleteProjectResponse) String() string { func (*DeleteProjectResponse) ProtoMessage() {} func (x *DeleteProjectResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[138] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[138] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6810,7 +6810,7 @@ func (x *DeleteProjectResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteProjectResponse.ProtoReflect.Descriptor instead. func (*DeleteProjectResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{138} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{138} } type PolicyRequestBody struct { @@ -6828,7 +6828,7 @@ type PolicyRequestBody struct { func (x *PolicyRequestBody) Reset() { *x = PolicyRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[139] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[139] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6841,7 +6841,7 @@ func (x *PolicyRequestBody) String() string { func (*PolicyRequestBody) ProtoMessage() {} func (x *PolicyRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[139] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[139] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6854,7 +6854,7 @@ func (x *PolicyRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use PolicyRequestBody.ProtoReflect.Descriptor instead. func (*PolicyRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{139} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{139} } func (x *PolicyRequestBody) GetRoleId() string { @@ -6903,7 +6903,7 @@ type GetPermissionRequest struct { func (x *GetPermissionRequest) Reset() { *x = GetPermissionRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[140] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[140] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6916,7 +6916,7 @@ func (x *GetPermissionRequest) String() string { func (*GetPermissionRequest) ProtoMessage() {} func (x *GetPermissionRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[140] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[140] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6929,7 +6929,7 @@ func (x *GetPermissionRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetPermissionRequest.ProtoReflect.Descriptor instead. func (*GetPermissionRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{140} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{140} } func (x *GetPermissionRequest) GetId() string { @@ -6950,7 +6950,7 @@ type GetPermissionResponse struct { func (x *GetPermissionResponse) Reset() { *x = GetPermissionResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[141] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[141] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -6963,7 +6963,7 @@ func (x *GetPermissionResponse) String() string { func (*GetPermissionResponse) ProtoMessage() {} func (x *GetPermissionResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[141] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[141] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -6976,7 +6976,7 @@ func (x *GetPermissionResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetPermissionResponse.ProtoReflect.Descriptor instead. func (*GetPermissionResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{141} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{141} } func (x *GetPermissionResponse) GetPermission() *Permission { @@ -6995,7 +6995,7 @@ type ListPermissionsRequest struct { func (x *ListPermissionsRequest) Reset() { *x = ListPermissionsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[142] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[142] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7008,7 +7008,7 @@ func (x *ListPermissionsRequest) String() string { func (*ListPermissionsRequest) ProtoMessage() {} func (x *ListPermissionsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[142] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[142] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7021,7 +7021,7 @@ func (x *ListPermissionsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListPermissionsRequest.ProtoReflect.Descriptor instead. func (*ListPermissionsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{142} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{142} } type ListPermissionsResponse struct { @@ -7035,7 +7035,7 @@ type ListPermissionsResponse struct { func (x *ListPermissionsResponse) Reset() { *x = ListPermissionsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[143] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[143] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7048,7 +7048,7 @@ func (x *ListPermissionsResponse) String() string { func (*ListPermissionsResponse) ProtoMessage() {} func (x *ListPermissionsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[143] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[143] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7061,7 +7061,7 @@ func (x *ListPermissionsResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListPermissionsResponse.ProtoReflect.Descriptor instead. func (*ListPermissionsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{143} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{143} } func (x *ListPermissionsResponse) GetPermissions() []*Permission { @@ -7080,7 +7080,7 @@ type ListNamespacesRequest struct { func (x *ListNamespacesRequest) Reset() { *x = ListNamespacesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[144] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[144] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7093,7 +7093,7 @@ func (x *ListNamespacesRequest) String() string { func (*ListNamespacesRequest) ProtoMessage() {} func (x *ListNamespacesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[144] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[144] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7106,7 +7106,7 @@ func (x *ListNamespacesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListNamespacesRequest.ProtoReflect.Descriptor instead. func (*ListNamespacesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{144} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{144} } type ListNamespacesResponse struct { @@ -7120,7 +7120,7 @@ type ListNamespacesResponse struct { func (x *ListNamespacesResponse) Reset() { *x = ListNamespacesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[145] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[145] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7133,7 +7133,7 @@ func (x *ListNamespacesResponse) String() string { func (*ListNamespacesResponse) ProtoMessage() {} func (x *ListNamespacesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[145] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[145] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7146,7 +7146,7 @@ func (x *ListNamespacesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListNamespacesResponse.ProtoReflect.Descriptor instead. func (*ListNamespacesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{145} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{145} } func (x *ListNamespacesResponse) GetNamespaces() []*Namespace { @@ -7167,7 +7167,7 @@ type GetNamespaceRequest struct { func (x *GetNamespaceRequest) Reset() { *x = GetNamespaceRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[146] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[146] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7180,7 +7180,7 @@ func (x *GetNamespaceRequest) String() string { func (*GetNamespaceRequest) ProtoMessage() {} func (x *GetNamespaceRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[146] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[146] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7193,7 +7193,7 @@ func (x *GetNamespaceRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetNamespaceRequest.ProtoReflect.Descriptor instead. func (*GetNamespaceRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{146} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{146} } func (x *GetNamespaceRequest) GetId() string { @@ -7214,7 +7214,7 @@ type GetNamespaceResponse struct { func (x *GetNamespaceResponse) Reset() { *x = GetNamespaceResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[147] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[147] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7227,7 +7227,7 @@ func (x *GetNamespaceResponse) String() string { func (*GetNamespaceResponse) ProtoMessage() {} func (x *GetNamespaceResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[147] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[147] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7240,7 +7240,7 @@ func (x *GetNamespaceResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetNamespaceResponse.ProtoReflect.Descriptor instead. func (*GetNamespaceResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{147} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{147} } func (x *GetNamespaceResponse) GetNamespace() *Namespace { @@ -7261,7 +7261,7 @@ type CreatePolicyRequest struct { func (x *CreatePolicyRequest) Reset() { *x = CreatePolicyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[148] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[148] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7274,7 +7274,7 @@ func (x *CreatePolicyRequest) String() string { func (*CreatePolicyRequest) ProtoMessage() {} func (x *CreatePolicyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[148] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[148] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7287,7 +7287,7 @@ func (x *CreatePolicyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreatePolicyRequest.ProtoReflect.Descriptor instead. func (*CreatePolicyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{148} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{148} } func (x *CreatePolicyRequest) GetBody() *PolicyRequestBody { @@ -7308,7 +7308,7 @@ type CreatePolicyResponse struct { func (x *CreatePolicyResponse) Reset() { *x = CreatePolicyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[149] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[149] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7321,7 +7321,7 @@ func (x *CreatePolicyResponse) String() string { func (*CreatePolicyResponse) ProtoMessage() {} func (x *CreatePolicyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[149] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[149] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7334,7 +7334,7 @@ func (x *CreatePolicyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreatePolicyResponse.ProtoReflect.Descriptor instead. func (*CreatePolicyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{149} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{149} } func (x *CreatePolicyResponse) GetPolicy() *Policy { @@ -7355,7 +7355,7 @@ type GetPolicyRequest struct { func (x *GetPolicyRequest) Reset() { *x = GetPolicyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[150] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[150] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7368,7 +7368,7 @@ func (x *GetPolicyRequest) String() string { func (*GetPolicyRequest) ProtoMessage() {} func (x *GetPolicyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[150] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[150] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7381,7 +7381,7 @@ func (x *GetPolicyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetPolicyRequest.ProtoReflect.Descriptor instead. func (*GetPolicyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{150} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{150} } func (x *GetPolicyRequest) GetId() string { @@ -7402,7 +7402,7 @@ type GetPolicyResponse struct { func (x *GetPolicyResponse) Reset() { *x = GetPolicyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[151] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[151] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7415,7 +7415,7 @@ func (x *GetPolicyResponse) String() string { func (*GetPolicyResponse) ProtoMessage() {} func (x *GetPolicyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[151] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[151] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7428,7 +7428,7 @@ func (x *GetPolicyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetPolicyResponse.ProtoReflect.Descriptor instead. func (*GetPolicyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{151} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{151} } func (x *GetPolicyResponse) GetPolicy() *Policy { @@ -7450,7 +7450,7 @@ type UpdatePolicyRequest struct { func (x *UpdatePolicyRequest) Reset() { *x = UpdatePolicyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[152] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[152] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7463,7 +7463,7 @@ func (x *UpdatePolicyRequest) String() string { func (*UpdatePolicyRequest) ProtoMessage() {} func (x *UpdatePolicyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[152] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[152] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7476,7 +7476,7 @@ func (x *UpdatePolicyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdatePolicyRequest.ProtoReflect.Descriptor instead. func (*UpdatePolicyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{152} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{152} } func (x *UpdatePolicyRequest) GetId() string { @@ -7504,7 +7504,7 @@ type UpdatePolicyResponse struct { func (x *UpdatePolicyResponse) Reset() { *x = UpdatePolicyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[153] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[153] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7517,7 +7517,7 @@ func (x *UpdatePolicyResponse) String() string { func (*UpdatePolicyResponse) ProtoMessage() {} func (x *UpdatePolicyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[153] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[153] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7530,7 +7530,7 @@ func (x *UpdatePolicyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdatePolicyResponse.ProtoReflect.Descriptor instead. func (*UpdatePolicyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{153} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{153} } func (x *UpdatePolicyResponse) GetPolicies() []*Policy { @@ -7551,7 +7551,7 @@ type DeletePolicyRequest struct { func (x *DeletePolicyRequest) Reset() { *x = DeletePolicyRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[154] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[154] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7564,7 +7564,7 @@ func (x *DeletePolicyRequest) String() string { func (*DeletePolicyRequest) ProtoMessage() {} func (x *DeletePolicyRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[154] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[154] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7577,7 +7577,7 @@ func (x *DeletePolicyRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeletePolicyRequest.ProtoReflect.Descriptor instead. func (*DeletePolicyRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{154} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{154} } func (x *DeletePolicyRequest) GetId() string { @@ -7596,7 +7596,7 @@ type DeletePolicyResponse struct { func (x *DeletePolicyResponse) Reset() { *x = DeletePolicyResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[155] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[155] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7609,7 +7609,7 @@ func (x *DeletePolicyResponse) String() string { func (*DeletePolicyResponse) ProtoMessage() {} func (x *DeletePolicyResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[155] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[155] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7622,7 +7622,7 @@ func (x *DeletePolicyResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeletePolicyResponse.ProtoReflect.Descriptor instead. func (*DeletePolicyResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{155} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{155} } type RelationRequestBody struct { @@ -7641,7 +7641,7 @@ type RelationRequestBody struct { func (x *RelationRequestBody) Reset() { *x = RelationRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[156] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[156] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7654,7 +7654,7 @@ func (x *RelationRequestBody) String() string { func (*RelationRequestBody) ProtoMessage() {} func (x *RelationRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[156] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[156] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7667,7 +7667,7 @@ func (x *RelationRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use RelationRequestBody.ProtoReflect.Descriptor instead. func (*RelationRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{156} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{156} } func (x *RelationRequestBody) GetObject() string { @@ -7709,7 +7709,7 @@ type CreateRelationRequest struct { func (x *CreateRelationRequest) Reset() { *x = CreateRelationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[157] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[157] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7722,7 +7722,7 @@ func (x *CreateRelationRequest) String() string { func (*CreateRelationRequest) ProtoMessage() {} func (x *CreateRelationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[157] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[157] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7735,7 +7735,7 @@ func (x *CreateRelationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateRelationRequest.ProtoReflect.Descriptor instead. func (*CreateRelationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{157} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{157} } func (x *CreateRelationRequest) GetBody() *RelationRequestBody { @@ -7756,7 +7756,7 @@ type CreateRelationResponse struct { func (x *CreateRelationResponse) Reset() { *x = CreateRelationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[158] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[158] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7769,7 +7769,7 @@ func (x *CreateRelationResponse) String() string { func (*CreateRelationResponse) ProtoMessage() {} func (x *CreateRelationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[158] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[158] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7782,7 +7782,7 @@ func (x *CreateRelationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateRelationResponse.ProtoReflect.Descriptor instead. func (*CreateRelationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{158} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{158} } func (x *CreateRelationResponse) GetRelation() *Relation { @@ -7803,7 +7803,7 @@ type GetRelationRequest struct { func (x *GetRelationRequest) Reset() { *x = GetRelationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[159] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[159] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7816,7 +7816,7 @@ func (x *GetRelationRequest) String() string { func (*GetRelationRequest) ProtoMessage() {} func (x *GetRelationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[159] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[159] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7829,7 +7829,7 @@ func (x *GetRelationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetRelationRequest.ProtoReflect.Descriptor instead. func (*GetRelationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{159} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{159} } func (x *GetRelationRequest) GetId() string { @@ -7850,7 +7850,7 @@ type GetRelationResponse struct { func (x *GetRelationResponse) Reset() { *x = GetRelationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[160] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[160] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7863,7 +7863,7 @@ func (x *GetRelationResponse) String() string { func (*GetRelationResponse) ProtoMessage() {} func (x *GetRelationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[160] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[160] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7876,7 +7876,7 @@ func (x *GetRelationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetRelationResponse.ProtoReflect.Descriptor instead. func (*GetRelationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{160} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{160} } func (x *GetRelationResponse) GetRelation() *Relation { @@ -7898,7 +7898,7 @@ type UpdateRelationRequest struct { func (x *UpdateRelationRequest) Reset() { *x = UpdateRelationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[161] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[161] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7911,7 +7911,7 @@ func (x *UpdateRelationRequest) String() string { func (*UpdateRelationRequest) ProtoMessage() {} func (x *UpdateRelationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[161] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[161] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7924,7 +7924,7 @@ func (x *UpdateRelationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateRelationRequest.ProtoReflect.Descriptor instead. func (*UpdateRelationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{161} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{161} } func (x *UpdateRelationRequest) GetId() string { @@ -7952,7 +7952,7 @@ type UpdateRelationResponse struct { func (x *UpdateRelationResponse) Reset() { *x = UpdateRelationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[162] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[162] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -7965,7 +7965,7 @@ func (x *UpdateRelationResponse) String() string { func (*UpdateRelationResponse) ProtoMessage() {} func (x *UpdateRelationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[162] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[162] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -7978,7 +7978,7 @@ func (x *UpdateRelationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateRelationResponse.ProtoReflect.Descriptor instead. func (*UpdateRelationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{162} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{162} } func (x *UpdateRelationResponse) GetRelation() *Relation { @@ -8001,7 +8001,7 @@ type GroupRequestBody struct { func (x *GroupRequestBody) Reset() { *x = GroupRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[163] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[163] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8014,7 +8014,7 @@ func (x *GroupRequestBody) String() string { func (*GroupRequestBody) ProtoMessage() {} func (x *GroupRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[163] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[163] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8027,7 +8027,7 @@ func (x *GroupRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use GroupRequestBody.ProtoReflect.Descriptor instead. func (*GroupRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{163} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{163} } func (x *GroupRequestBody) GetName() string { @@ -8063,7 +8063,7 @@ type CreateGroupRequest struct { func (x *CreateGroupRequest) Reset() { *x = CreateGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[164] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[164] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8076,7 +8076,7 @@ func (x *CreateGroupRequest) String() string { func (*CreateGroupRequest) ProtoMessage() {} func (x *CreateGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[164] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[164] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8089,7 +8089,7 @@ func (x *CreateGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateGroupRequest.ProtoReflect.Descriptor instead. func (*CreateGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{164} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{164} } func (x *CreateGroupRequest) GetBody() *GroupRequestBody { @@ -8118,7 +8118,7 @@ type GetGroupRequest struct { func (x *GetGroupRequest) Reset() { *x = GetGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[165] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[165] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8131,7 +8131,7 @@ func (x *GetGroupRequest) String() string { func (*GetGroupRequest) ProtoMessage() {} func (x *GetGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[165] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[165] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8144,7 +8144,7 @@ func (x *GetGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetGroupRequest.ProtoReflect.Descriptor instead. func (*GetGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{165} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{165} } func (x *GetGroupRequest) GetId() string { @@ -8172,7 +8172,7 @@ type CreateGroupResponse struct { func (x *CreateGroupResponse) Reset() { *x = CreateGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[166] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[166] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8185,7 +8185,7 @@ func (x *CreateGroupResponse) String() string { func (*CreateGroupResponse) ProtoMessage() {} func (x *CreateGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[166] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[166] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8198,7 +8198,7 @@ func (x *CreateGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateGroupResponse.ProtoReflect.Descriptor instead. func (*CreateGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{166} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{166} } func (x *CreateGroupResponse) GetGroup() *Group { @@ -8219,7 +8219,7 @@ type GetGroupResponse struct { func (x *GetGroupResponse) Reset() { *x = GetGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[167] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[167] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8232,7 +8232,7 @@ func (x *GetGroupResponse) String() string { func (*GetGroupResponse) ProtoMessage() {} func (x *GetGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[167] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[167] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8245,7 +8245,7 @@ func (x *GetGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetGroupResponse.ProtoReflect.Descriptor instead. func (*GetGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{167} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{167} } func (x *GetGroupResponse) GetGroup() *Group { @@ -8266,7 +8266,7 @@ type UpdateGroupResponse struct { func (x *UpdateGroupResponse) Reset() { *x = UpdateGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[168] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[168] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8279,7 +8279,7 @@ func (x *UpdateGroupResponse) String() string { func (*UpdateGroupResponse) ProtoMessage() {} func (x *UpdateGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[168] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[168] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8292,7 +8292,7 @@ func (x *UpdateGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateGroupResponse.ProtoReflect.Descriptor instead. func (*UpdateGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{168} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{168} } func (x *UpdateGroupResponse) GetGroup() *Group { @@ -8315,7 +8315,7 @@ type UpdateGroupRequest struct { func (x *UpdateGroupRequest) Reset() { *x = UpdateGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[169] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[169] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8328,7 +8328,7 @@ func (x *UpdateGroupRequest) String() string { func (*UpdateGroupRequest) ProtoMessage() {} func (x *UpdateGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[169] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[169] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8341,7 +8341,7 @@ func (x *UpdateGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateGroupRequest.ProtoReflect.Descriptor instead. func (*UpdateGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{169} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{169} } func (x *UpdateGroupRequest) GetId() string { @@ -8377,7 +8377,7 @@ type ListGroupUsersRequest struct { func (x *ListGroupUsersRequest) Reset() { *x = ListGroupUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[170] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[170] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8390,7 +8390,7 @@ func (x *ListGroupUsersRequest) String() string { func (*ListGroupUsersRequest) ProtoMessage() {} func (x *ListGroupUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[170] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[170] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8403,7 +8403,7 @@ func (x *ListGroupUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListGroupUsersRequest.ProtoReflect.Descriptor instead. func (*ListGroupUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{170} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{170} } func (x *ListGroupUsersRequest) GetId() string { @@ -8431,7 +8431,7 @@ type ListGroupUsersResponse struct { func (x *ListGroupUsersResponse) Reset() { *x = ListGroupUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[171] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[171] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8444,7 +8444,7 @@ func (x *ListGroupUsersResponse) String() string { func (*ListGroupUsersResponse) ProtoMessage() {} func (x *ListGroupUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[171] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[171] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8457,7 +8457,7 @@ func (x *ListGroupUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListGroupUsersResponse.ProtoReflect.Descriptor instead. func (*ListGroupUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{171} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{171} } func (x *ListGroupUsersResponse) GetUsers() []*User { @@ -8479,7 +8479,7 @@ type EnableGroupRequest struct { func (x *EnableGroupRequest) Reset() { *x = EnableGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[172] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[172] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8492,7 +8492,7 @@ func (x *EnableGroupRequest) String() string { func (*EnableGroupRequest) ProtoMessage() {} func (x *EnableGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[172] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[172] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8505,7 +8505,7 @@ func (x *EnableGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableGroupRequest.ProtoReflect.Descriptor instead. func (*EnableGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{172} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{172} } func (x *EnableGroupRequest) GetId() string { @@ -8531,7 +8531,7 @@ type EnableGroupResponse struct { func (x *EnableGroupResponse) Reset() { *x = EnableGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[173] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[173] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8544,7 +8544,7 @@ func (x *EnableGroupResponse) String() string { func (*EnableGroupResponse) ProtoMessage() {} func (x *EnableGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[173] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[173] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8557,7 +8557,7 @@ func (x *EnableGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use EnableGroupResponse.ProtoReflect.Descriptor instead. func (*EnableGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{173} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{173} } type DisableGroupRequest struct { @@ -8572,7 +8572,7 @@ type DisableGroupRequest struct { func (x *DisableGroupRequest) Reset() { *x = DisableGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[174] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[174] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8585,7 +8585,7 @@ func (x *DisableGroupRequest) String() string { func (*DisableGroupRequest) ProtoMessage() {} func (x *DisableGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[174] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[174] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8598,7 +8598,7 @@ func (x *DisableGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableGroupRequest.ProtoReflect.Descriptor instead. func (*DisableGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{174} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{174} } func (x *DisableGroupRequest) GetId() string { @@ -8624,7 +8624,7 @@ type DisableGroupResponse struct { func (x *DisableGroupResponse) Reset() { *x = DisableGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[175] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[175] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8637,7 +8637,7 @@ func (x *DisableGroupResponse) String() string { func (*DisableGroupResponse) ProtoMessage() {} func (x *DisableGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[175] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[175] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8650,7 +8650,7 @@ func (x *DisableGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DisableGroupResponse.ProtoReflect.Descriptor instead. func (*DisableGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{175} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{175} } type DeleteGroupRequest struct { @@ -8665,7 +8665,7 @@ type DeleteGroupRequest struct { func (x *DeleteGroupRequest) Reset() { *x = DeleteGroupRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[176] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[176] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8678,7 +8678,7 @@ func (x *DeleteGroupRequest) String() string { func (*DeleteGroupRequest) ProtoMessage() {} func (x *DeleteGroupRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[176] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[176] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8691,7 +8691,7 @@ func (x *DeleteGroupRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteGroupRequest.ProtoReflect.Descriptor instead. func (*DeleteGroupRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{176} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{176} } func (x *DeleteGroupRequest) GetId() string { @@ -8717,7 +8717,7 @@ type DeleteGroupResponse struct { func (x *DeleteGroupResponse) Reset() { *x = DeleteGroupResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[177] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[177] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8730,7 +8730,7 @@ func (x *DeleteGroupResponse) String() string { func (*DeleteGroupResponse) ProtoMessage() {} func (x *DeleteGroupResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[177] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[177] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8743,7 +8743,7 @@ func (x *DeleteGroupResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteGroupResponse.ProtoReflect.Descriptor instead. func (*DeleteGroupResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{177} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{177} } type AddGroupUsersRequest struct { @@ -8759,7 +8759,7 @@ type AddGroupUsersRequest struct { func (x *AddGroupUsersRequest) Reset() { *x = AddGroupUsersRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[178] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[178] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8772,7 +8772,7 @@ func (x *AddGroupUsersRequest) String() string { func (*AddGroupUsersRequest) ProtoMessage() {} func (x *AddGroupUsersRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[178] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[178] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8785,7 +8785,7 @@ func (x *AddGroupUsersRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use AddGroupUsersRequest.ProtoReflect.Descriptor instead. func (*AddGroupUsersRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{178} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{178} } func (x *AddGroupUsersRequest) GetId() string { @@ -8818,7 +8818,7 @@ type AddGroupUsersResponse struct { func (x *AddGroupUsersResponse) Reset() { *x = AddGroupUsersResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[179] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[179] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8831,7 +8831,7 @@ func (x *AddGroupUsersResponse) String() string { func (*AddGroupUsersResponse) ProtoMessage() {} func (x *AddGroupUsersResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[179] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[179] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8844,7 +8844,7 @@ func (x *AddGroupUsersResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use AddGroupUsersResponse.ProtoReflect.Descriptor instead. func (*AddGroupUsersResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{179} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{179} } type RemoveGroupUserRequest struct { @@ -8860,7 +8860,7 @@ type RemoveGroupUserRequest struct { func (x *RemoveGroupUserRequest) Reset() { *x = RemoveGroupUserRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[180] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[180] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8873,7 +8873,7 @@ func (x *RemoveGroupUserRequest) String() string { func (*RemoveGroupUserRequest) ProtoMessage() {} func (x *RemoveGroupUserRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[180] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[180] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8886,7 +8886,7 @@ func (x *RemoveGroupUserRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use RemoveGroupUserRequest.ProtoReflect.Descriptor instead. func (*RemoveGroupUserRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{180} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{180} } func (x *RemoveGroupUserRequest) GetId() string { @@ -8919,7 +8919,7 @@ type RemoveGroupUserResponse struct { func (x *RemoveGroupUserResponse) Reset() { *x = RemoveGroupUserResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[181] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[181] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8932,7 +8932,7 @@ func (x *RemoveGroupUserResponse) String() string { func (*RemoveGroupUserResponse) ProtoMessage() {} func (x *RemoveGroupUserResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[181] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[181] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8945,7 +8945,7 @@ func (x *RemoveGroupUserResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use RemoveGroupUserResponse.ProtoReflect.Descriptor instead. func (*RemoveGroupUserResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{181} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{181} } type DeleteRelationRequest struct { @@ -8963,7 +8963,7 @@ type DeleteRelationRequest struct { func (x *DeleteRelationRequest) Reset() { *x = DeleteRelationRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[182] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[182] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -8976,7 +8976,7 @@ func (x *DeleteRelationRequest) String() string { func (*DeleteRelationRequest) ProtoMessage() {} func (x *DeleteRelationRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[182] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[182] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -8989,7 +8989,7 @@ func (x *DeleteRelationRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteRelationRequest.ProtoReflect.Descriptor instead. func (*DeleteRelationRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{182} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{182} } func (x *DeleteRelationRequest) GetObject() string { @@ -9022,7 +9022,7 @@ type DeleteRelationResponse struct { func (x *DeleteRelationResponse) Reset() { *x = DeleteRelationResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[183] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[183] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9035,7 +9035,7 @@ func (x *DeleteRelationResponse) String() string { func (*DeleteRelationResponse) ProtoMessage() {} func (x *DeleteRelationResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[183] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[183] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9048,7 +9048,7 @@ func (x *DeleteRelationResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteRelationResponse.ProtoReflect.Descriptor instead. func (*DeleteRelationResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{183} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{183} } type ListProjectResourcesRequest struct { @@ -9063,7 +9063,7 @@ type ListProjectResourcesRequest struct { func (x *ListProjectResourcesRequest) Reset() { *x = ListProjectResourcesRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[184] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[184] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9076,7 +9076,7 @@ func (x *ListProjectResourcesRequest) String() string { func (*ListProjectResourcesRequest) ProtoMessage() {} func (x *ListProjectResourcesRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[184] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[184] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9089,7 +9089,7 @@ func (x *ListProjectResourcesRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectResourcesRequest.ProtoReflect.Descriptor instead. func (*ListProjectResourcesRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{184} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{184} } func (x *ListProjectResourcesRequest) GetProjectId() string { @@ -9117,7 +9117,7 @@ type ListProjectResourcesResponse struct { func (x *ListProjectResourcesResponse) Reset() { *x = ListProjectResourcesResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[185] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[185] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9130,7 +9130,7 @@ func (x *ListProjectResourcesResponse) String() string { func (*ListProjectResourcesResponse) ProtoMessage() {} func (x *ListProjectResourcesResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[185] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[185] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9143,7 +9143,7 @@ func (x *ListProjectResourcesResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListProjectResourcesResponse.ProtoReflect.Descriptor instead. func (*ListProjectResourcesResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{185} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{185} } func (x *ListProjectResourcesResponse) GetResources() []*Resource { @@ -9169,7 +9169,7 @@ type ResourceRequestBody struct { func (x *ResourceRequestBody) Reset() { *x = ResourceRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[186] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[186] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9182,7 +9182,7 @@ func (x *ResourceRequestBody) String() string { func (*ResourceRequestBody) ProtoMessage() {} func (x *ResourceRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[186] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[186] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9195,7 +9195,7 @@ func (x *ResourceRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use ResourceRequestBody.ProtoReflect.Descriptor instead. func (*ResourceRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{186} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{186} } func (x *ResourceRequestBody) GetName() string { @@ -9247,7 +9247,7 @@ type CreateProjectResourceRequest struct { func (x *CreateProjectResourceRequest) Reset() { *x = CreateProjectResourceRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[187] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[187] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9260,7 +9260,7 @@ func (x *CreateProjectResourceRequest) String() string { func (*CreateProjectResourceRequest) ProtoMessage() {} func (x *CreateProjectResourceRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[187] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[187] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9273,7 +9273,7 @@ func (x *CreateProjectResourceRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateProjectResourceRequest.ProtoReflect.Descriptor instead. func (*CreateProjectResourceRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{187} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{187} } func (x *CreateProjectResourceRequest) GetBody() *ResourceRequestBody { @@ -9308,7 +9308,7 @@ type CreateProjectResourceResponse struct { func (x *CreateProjectResourceResponse) Reset() { *x = CreateProjectResourceResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[188] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[188] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9321,7 +9321,7 @@ func (x *CreateProjectResourceResponse) String() string { func (*CreateProjectResourceResponse) ProtoMessage() {} func (x *CreateProjectResourceResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[188] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[188] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9334,7 +9334,7 @@ func (x *CreateProjectResourceResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateProjectResourceResponse.ProtoReflect.Descriptor instead. func (*CreateProjectResourceResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{188} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{188} } func (x *CreateProjectResourceResponse) GetResource() *Resource { @@ -9356,7 +9356,7 @@ type GetProjectResourceRequest struct { func (x *GetProjectResourceRequest) Reset() { *x = GetProjectResourceRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[189] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[189] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9369,7 +9369,7 @@ func (x *GetProjectResourceRequest) String() string { func (*GetProjectResourceRequest) ProtoMessage() {} func (x *GetProjectResourceRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[189] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[189] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9382,7 +9382,7 @@ func (x *GetProjectResourceRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectResourceRequest.ProtoReflect.Descriptor instead. func (*GetProjectResourceRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{189} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{189} } func (x *GetProjectResourceRequest) GetId() string { @@ -9410,7 +9410,7 @@ type GetProjectResourceResponse struct { func (x *GetProjectResourceResponse) Reset() { *x = GetProjectResourceResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[190] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[190] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9423,7 +9423,7 @@ func (x *GetProjectResourceResponse) String() string { func (*GetProjectResourceResponse) ProtoMessage() {} func (x *GetProjectResourceResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[190] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[190] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9436,7 +9436,7 @@ func (x *GetProjectResourceResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetProjectResourceResponse.ProtoReflect.Descriptor instead. func (*GetProjectResourceResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{190} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{190} } func (x *GetProjectResourceResponse) GetResource() *Resource { @@ -9459,7 +9459,7 @@ type UpdateProjectResourceRequest struct { func (x *UpdateProjectResourceRequest) Reset() { *x = UpdateProjectResourceRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[191] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[191] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9472,7 +9472,7 @@ func (x *UpdateProjectResourceRequest) String() string { func (*UpdateProjectResourceRequest) ProtoMessage() {} func (x *UpdateProjectResourceRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[191] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[191] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9485,7 +9485,7 @@ func (x *UpdateProjectResourceRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateProjectResourceRequest.ProtoReflect.Descriptor instead. func (*UpdateProjectResourceRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{191} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{191} } func (x *UpdateProjectResourceRequest) GetId() string { @@ -9520,7 +9520,7 @@ type UpdateProjectResourceResponse struct { func (x *UpdateProjectResourceResponse) Reset() { *x = UpdateProjectResourceResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[192] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[192] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9533,7 +9533,7 @@ func (x *UpdateProjectResourceResponse) String() string { func (*UpdateProjectResourceResponse) ProtoMessage() {} func (x *UpdateProjectResourceResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[192] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[192] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9546,7 +9546,7 @@ func (x *UpdateProjectResourceResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateProjectResourceResponse.ProtoReflect.Descriptor instead. func (*UpdateProjectResourceResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{192} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{192} } func (x *UpdateProjectResourceResponse) GetResource() *Resource { @@ -9568,7 +9568,7 @@ type DeleteProjectResourceRequest struct { func (x *DeleteProjectResourceRequest) Reset() { *x = DeleteProjectResourceRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[193] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[193] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9581,7 +9581,7 @@ func (x *DeleteProjectResourceRequest) String() string { func (*DeleteProjectResourceRequest) ProtoMessage() {} func (x *DeleteProjectResourceRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[193] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[193] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9594,7 +9594,7 @@ func (x *DeleteProjectResourceRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteProjectResourceRequest.ProtoReflect.Descriptor instead. func (*DeleteProjectResourceRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{193} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{193} } func (x *DeleteProjectResourceRequest) GetId() string { @@ -9620,7 +9620,7 @@ type DeleteProjectResourceResponse struct { func (x *DeleteProjectResourceResponse) Reset() { *x = DeleteProjectResourceResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[194] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[194] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9633,7 +9633,7 @@ func (x *DeleteProjectResourceResponse) String() string { func (*DeleteProjectResourceResponse) ProtoMessage() {} func (x *DeleteProjectResourceResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[194] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[194] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9646,7 +9646,7 @@ func (x *DeleteProjectResourceResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteProjectResourceResponse.ProtoReflect.Descriptor instead. func (*DeleteProjectResourceResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{194} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{194} } type CheckResourcePermissionRequest struct { @@ -9654,9 +9654,9 @@ type CheckResourcePermissionRequest struct { sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. ObjectId string `protobuf:"bytes,1,opt,name=object_id,json=objectId,proto3" json:"object_id,omitempty"` - // Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. + // Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. ObjectNamespace string `protobuf:"bytes,2,opt,name=object_namespace,json=objectNamespace,proto3" json:"object_namespace,omitempty"` Permission string `protobuf:"bytes,3,opt,name=permission,proto3" json:"permission,omitempty"` Resource string `protobuf:"bytes,4,opt,name=resource,proto3" json:"resource,omitempty"` @@ -9665,7 +9665,7 @@ type CheckResourcePermissionRequest struct { func (x *CheckResourcePermissionRequest) Reset() { *x = CheckResourcePermissionRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[195] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[195] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9678,7 +9678,7 @@ func (x *CheckResourcePermissionRequest) String() string { func (*CheckResourcePermissionRequest) ProtoMessage() {} func (x *CheckResourcePermissionRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[195] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[195] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9691,10 +9691,10 @@ func (x *CheckResourcePermissionRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CheckResourcePermissionRequest.ProtoReflect.Descriptor instead. func (*CheckResourcePermissionRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{195} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{195} } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. func (x *CheckResourcePermissionRequest) GetObjectId() string { if x != nil { return x.ObjectId @@ -9702,7 +9702,7 @@ func (x *CheckResourcePermissionRequest) GetObjectId() string { return "" } -// Deprecated: Marked as deprecated in raystack/shield/v1beta1/shield.proto. +// Deprecated: Marked as deprecated in raystack/frontier/v1beta1/frontier.proto. func (x *CheckResourcePermissionRequest) GetObjectNamespace() string { if x != nil { return x.ObjectNamespace @@ -9735,7 +9735,7 @@ type CheckResourcePermissionResponse struct { func (x *CheckResourcePermissionResponse) Reset() { *x = CheckResourcePermissionResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[196] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[196] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9748,7 +9748,7 @@ func (x *CheckResourcePermissionResponse) String() string { func (*CheckResourcePermissionResponse) ProtoMessage() {} func (x *CheckResourcePermissionResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[196] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[196] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9761,7 +9761,7 @@ func (x *CheckResourcePermissionResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CheckResourcePermissionResponse.ProtoReflect.Descriptor instead. func (*CheckResourcePermissionResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{196} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{196} } func (x *CheckResourcePermissionResponse) GetStatus() bool { @@ -9783,7 +9783,7 @@ type MetaSchemaRequestBody struct { func (x *MetaSchemaRequestBody) Reset() { *x = MetaSchemaRequestBody{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[197] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[197] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9796,7 +9796,7 @@ func (x *MetaSchemaRequestBody) String() string { func (*MetaSchemaRequestBody) ProtoMessage() {} func (x *MetaSchemaRequestBody) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[197] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[197] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9809,7 +9809,7 @@ func (x *MetaSchemaRequestBody) ProtoReflect() protoreflect.Message { // Deprecated: Use MetaSchemaRequestBody.ProtoReflect.Descriptor instead. func (*MetaSchemaRequestBody) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{197} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{197} } func (x *MetaSchemaRequestBody) GetName() string { @@ -9837,7 +9837,7 @@ type CreateMetaSchemaRequest struct { func (x *CreateMetaSchemaRequest) Reset() { *x = CreateMetaSchemaRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[198] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[198] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9850,7 +9850,7 @@ func (x *CreateMetaSchemaRequest) String() string { func (*CreateMetaSchemaRequest) ProtoMessage() {} func (x *CreateMetaSchemaRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[198] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[198] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9863,7 +9863,7 @@ func (x *CreateMetaSchemaRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateMetaSchemaRequest.ProtoReflect.Descriptor instead. func (*CreateMetaSchemaRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{198} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{198} } func (x *CreateMetaSchemaRequest) GetBody() *MetaSchemaRequestBody { @@ -9884,7 +9884,7 @@ type CreateMetaSchemaResponse struct { func (x *CreateMetaSchemaResponse) Reset() { *x = CreateMetaSchemaResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[199] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[199] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9897,7 +9897,7 @@ func (x *CreateMetaSchemaResponse) String() string { func (*CreateMetaSchemaResponse) ProtoMessage() {} func (x *CreateMetaSchemaResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[199] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[199] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9910,7 +9910,7 @@ func (x *CreateMetaSchemaResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use CreateMetaSchemaResponse.ProtoReflect.Descriptor instead. func (*CreateMetaSchemaResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{199} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{199} } func (x *CreateMetaSchemaResponse) GetMetaschema() *MetaSchema { @@ -9931,7 +9931,7 @@ type GetMetaSchemaRequest struct { func (x *GetMetaSchemaRequest) Reset() { *x = GetMetaSchemaRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[200] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[200] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9944,7 +9944,7 @@ func (x *GetMetaSchemaRequest) String() string { func (*GetMetaSchemaRequest) ProtoMessage() {} func (x *GetMetaSchemaRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[200] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[200] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -9957,7 +9957,7 @@ func (x *GetMetaSchemaRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetMetaSchemaRequest.ProtoReflect.Descriptor instead. func (*GetMetaSchemaRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{200} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{200} } func (x *GetMetaSchemaRequest) GetId() string { @@ -9978,7 +9978,7 @@ type GetMetaSchemaResponse struct { func (x *GetMetaSchemaResponse) Reset() { *x = GetMetaSchemaResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[201] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[201] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -9991,7 +9991,7 @@ func (x *GetMetaSchemaResponse) String() string { func (*GetMetaSchemaResponse) ProtoMessage() {} func (x *GetMetaSchemaResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[201] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[201] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10004,7 +10004,7 @@ func (x *GetMetaSchemaResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetMetaSchemaResponse.ProtoReflect.Descriptor instead. func (*GetMetaSchemaResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{201} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{201} } func (x *GetMetaSchemaResponse) GetMetaschema() *MetaSchema { @@ -10026,7 +10026,7 @@ type UpdateMetaSchemaRequest struct { func (x *UpdateMetaSchemaRequest) Reset() { *x = UpdateMetaSchemaRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[202] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[202] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10039,7 +10039,7 @@ func (x *UpdateMetaSchemaRequest) String() string { func (*UpdateMetaSchemaRequest) ProtoMessage() {} func (x *UpdateMetaSchemaRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[202] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[202] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10052,7 +10052,7 @@ func (x *UpdateMetaSchemaRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateMetaSchemaRequest.ProtoReflect.Descriptor instead. func (*UpdateMetaSchemaRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{202} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{202} } func (x *UpdateMetaSchemaRequest) GetId() string { @@ -10080,7 +10080,7 @@ type UpdateMetaSchemaResponse struct { func (x *UpdateMetaSchemaResponse) Reset() { *x = UpdateMetaSchemaResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[203] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[203] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10093,7 +10093,7 @@ func (x *UpdateMetaSchemaResponse) String() string { func (*UpdateMetaSchemaResponse) ProtoMessage() {} func (x *UpdateMetaSchemaResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[203] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[203] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10106,7 +10106,7 @@ func (x *UpdateMetaSchemaResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use UpdateMetaSchemaResponse.ProtoReflect.Descriptor instead. func (*UpdateMetaSchemaResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{203} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{203} } func (x *UpdateMetaSchemaResponse) GetMetaschema() *MetaSchema { @@ -10127,7 +10127,7 @@ type DeleteMetaSchemaRequest struct { func (x *DeleteMetaSchemaRequest) Reset() { *x = DeleteMetaSchemaRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[204] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[204] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10140,7 +10140,7 @@ func (x *DeleteMetaSchemaRequest) String() string { func (*DeleteMetaSchemaRequest) ProtoMessage() {} func (x *DeleteMetaSchemaRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[204] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[204] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10153,7 +10153,7 @@ func (x *DeleteMetaSchemaRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteMetaSchemaRequest.ProtoReflect.Descriptor instead. func (*DeleteMetaSchemaRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{204} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{204} } func (x *DeleteMetaSchemaRequest) GetId() string { @@ -10172,7 +10172,7 @@ type DeleteMetaSchemaResponse struct { func (x *DeleteMetaSchemaResponse) Reset() { *x = DeleteMetaSchemaResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[205] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[205] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10185,7 +10185,7 @@ func (x *DeleteMetaSchemaResponse) String() string { func (*DeleteMetaSchemaResponse) ProtoMessage() {} func (x *DeleteMetaSchemaResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[205] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[205] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10198,7 +10198,7 @@ func (x *DeleteMetaSchemaResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use DeleteMetaSchemaResponse.ProtoReflect.Descriptor instead. func (*DeleteMetaSchemaResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{205} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{205} } type ListMetaSchemasRequest struct { @@ -10210,7 +10210,7 @@ type ListMetaSchemasRequest struct { func (x *ListMetaSchemasRequest) Reset() { *x = ListMetaSchemasRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[206] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[206] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10223,7 +10223,7 @@ func (x *ListMetaSchemasRequest) String() string { func (*ListMetaSchemasRequest) ProtoMessage() {} func (x *ListMetaSchemasRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[206] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[206] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10236,7 +10236,7 @@ func (x *ListMetaSchemasRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListMetaSchemasRequest.ProtoReflect.Descriptor instead. func (*ListMetaSchemasRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{206} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{206} } type ListMetaSchemasResponse struct { @@ -10250,7 +10250,7 @@ type ListMetaSchemasResponse struct { func (x *ListMetaSchemasResponse) Reset() { *x = ListMetaSchemasResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[207] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[207] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10263,7 +10263,7 @@ func (x *ListMetaSchemasResponse) String() string { func (*ListMetaSchemasResponse) ProtoMessage() {} func (x *ListMetaSchemasResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[207] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[207] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10276,7 +10276,7 @@ func (x *ListMetaSchemasResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use ListMetaSchemasResponse.ProtoReflect.Descriptor instead. func (*ListMetaSchemasResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{207} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{207} } func (x *ListMetaSchemasResponse) GetMetaschemas() []*MetaSchema { @@ -10302,7 +10302,7 @@ type ListOrganizationAuditLogsRequest struct { func (x *ListOrganizationAuditLogsRequest) Reset() { *x = ListOrganizationAuditLogsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[208] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[208] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10315,7 +10315,7 @@ func (x *ListOrganizationAuditLogsRequest) String() string { func (*ListOrganizationAuditLogsRequest) ProtoMessage() {} func (x *ListOrganizationAuditLogsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[208] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[208] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10328,7 +10328,7 @@ func (x *ListOrganizationAuditLogsRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use ListOrganizationAuditLogsRequest.ProtoReflect.Descriptor instead. func (*ListOrganizationAuditLogsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{208} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{208} } func (x *ListOrganizationAuditLogsRequest) GetOrgId() string { @@ -10377,7 +10377,7 @@ type ListOrganizationAuditLogsResponse struct { func (x *ListOrganizationAuditLogsResponse) Reset() { *x = ListOrganizationAuditLogsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[209] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[209] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10390,7 +10390,7 @@ func (x *ListOrganizationAuditLogsResponse) String() string { func (*ListOrganizationAuditLogsResponse) ProtoMessage() {} func (x *ListOrganizationAuditLogsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[209] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[209] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10403,7 +10403,7 @@ func (x *ListOrganizationAuditLogsResponse) ProtoReflect() protoreflect.Message // Deprecated: Use ListOrganizationAuditLogsResponse.ProtoReflect.Descriptor instead. func (*ListOrganizationAuditLogsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{209} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{209} } func (x *ListOrganizationAuditLogsResponse) GetLogs() []*AuditLog { @@ -10425,7 +10425,7 @@ type CreateOrganizationAuditLogsRequest struct { func (x *CreateOrganizationAuditLogsRequest) Reset() { *x = CreateOrganizationAuditLogsRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[210] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[210] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10438,7 +10438,7 @@ func (x *CreateOrganizationAuditLogsRequest) String() string { func (*CreateOrganizationAuditLogsRequest) ProtoMessage() {} func (x *CreateOrganizationAuditLogsRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[210] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[210] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10451,7 +10451,7 @@ func (x *CreateOrganizationAuditLogsRequest) ProtoReflect() protoreflect.Message // Deprecated: Use CreateOrganizationAuditLogsRequest.ProtoReflect.Descriptor instead. func (*CreateOrganizationAuditLogsRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{210} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{210} } func (x *CreateOrganizationAuditLogsRequest) GetOrgId() string { @@ -10477,7 +10477,7 @@ type CreateOrganizationAuditLogsResponse struct { func (x *CreateOrganizationAuditLogsResponse) Reset() { *x = CreateOrganizationAuditLogsResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[211] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[211] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10490,7 +10490,7 @@ func (x *CreateOrganizationAuditLogsResponse) String() string { func (*CreateOrganizationAuditLogsResponse) ProtoMessage() {} func (x *CreateOrganizationAuditLogsResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[211] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[211] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10503,7 +10503,7 @@ func (x *CreateOrganizationAuditLogsResponse) ProtoReflect() protoreflect.Messag // Deprecated: Use CreateOrganizationAuditLogsResponse.ProtoReflect.Descriptor instead. func (*CreateOrganizationAuditLogsResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{211} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{211} } type GetOrganizationAuditLogRequest struct { @@ -10518,7 +10518,7 @@ type GetOrganizationAuditLogRequest struct { func (x *GetOrganizationAuditLogRequest) Reset() { *x = GetOrganizationAuditLogRequest{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[212] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[212] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10531,7 +10531,7 @@ func (x *GetOrganizationAuditLogRequest) String() string { func (*GetOrganizationAuditLogRequest) ProtoMessage() {} func (x *GetOrganizationAuditLogRequest) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[212] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[212] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10544,7 +10544,7 @@ func (x *GetOrganizationAuditLogRequest) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationAuditLogRequest.ProtoReflect.Descriptor instead. func (*GetOrganizationAuditLogRequest) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{212} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{212} } func (x *GetOrganizationAuditLogRequest) GetOrgId() string { @@ -10572,7 +10572,7 @@ type GetOrganizationAuditLogResponse struct { func (x *GetOrganizationAuditLogResponse) Reset() { *x = GetOrganizationAuditLogResponse{} if protoimpl.UnsafeEnabled { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[213] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[213] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } @@ -10585,7 +10585,7 @@ func (x *GetOrganizationAuditLogResponse) String() string { func (*GetOrganizationAuditLogResponse) ProtoMessage() {} func (x *GetOrganizationAuditLogResponse) ProtoReflect() protoreflect.Message { - mi := &file_raystack_shield_v1beta1_shield_proto_msgTypes[213] + mi := &file_raystack_frontier_v1beta1_frontier_proto_msgTypes[213] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { @@ -10598,7 +10598,7 @@ func (x *GetOrganizationAuditLogResponse) ProtoReflect() protoreflect.Message { // Deprecated: Use GetOrganizationAuditLogResponse.ProtoReflect.Descriptor instead. func (*GetOrganizationAuditLogResponse) Descriptor() ([]byte, []int) { - return file_raystack_shield_v1beta1_shield_proto_rawDescGZIP(), []int{213} + return file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP(), []int{213} } func (x *GetOrganizationAuditLogResponse) GetLog() *AuditLog { @@ -10608,9 +10608,9 @@ func (x *GetOrganizationAuditLogResponse) GetLog() *AuditLog { return nil } -var File_raystack_shield_v1beta1_shield_proto protoreflect.FileDescriptor +var File_raystack_frontier_v1beta1_frontier_proto protoreflect.FileDescriptor -var file_raystack_shield_v1beta1_shield_proto_rawDesc = []byte{ +var file_raystack_frontier_v1beta1_frontier_proto_rawDesc = []byte{ 0x0a, 0x24, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, 0x2f, 0x73, 0x68, 0x69, 0x65, 0x6c, 0x64, 0x2f, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x31, 0x2f, 0x73, 0x68, 0x69, 0x65, 0x6c, 0x64, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x17, 0x72, 0x61, 0x79, 0x73, 0x74, 0x61, 0x63, 0x6b, @@ -14167,559 +14167,559 @@ var file_raystack_shield_v1beta1_shield_proto_rawDesc = []byte{ } var ( - file_raystack_shield_v1beta1_shield_proto_rawDescOnce sync.Once - file_raystack_shield_v1beta1_shield_proto_rawDescData = file_raystack_shield_v1beta1_shield_proto_rawDesc + file_raystack_frontier_v1beta1_frontier_proto_rawDescOnce sync.Once + file_raystack_frontier_v1beta1_frontier_proto_rawDescData = file_raystack_frontier_v1beta1_frontier_proto_rawDesc ) -func file_raystack_shield_v1beta1_shield_proto_rawDescGZIP() []byte { - file_raystack_shield_v1beta1_shield_proto_rawDescOnce.Do(func() { - file_raystack_shield_v1beta1_shield_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_shield_v1beta1_shield_proto_rawDescData) +func file_raystack_frontier_v1beta1_frontier_proto_rawDescGZIP() []byte { + file_raystack_frontier_v1beta1_frontier_proto_rawDescOnce.Do(func() { + file_raystack_frontier_v1beta1_frontier_proto_rawDescData = protoimpl.X.CompressGZIP(file_raystack_frontier_v1beta1_frontier_proto_rawDescData) }) - return file_raystack_shield_v1beta1_shield_proto_rawDescData -} - -var file_raystack_shield_v1beta1_shield_proto_msgTypes = make([]protoimpl.MessageInfo, 214) -var file_raystack_shield_v1beta1_shield_proto_goTypes = []interface{}{ - (*GetJWKsRequest)(nil), // 0: raystack.shield.v1beta1.GetJWKsRequest - (*GetJWKsResponse)(nil), // 1: raystack.shield.v1beta1.GetJWKsResponse - (*AuthLogoutRequest)(nil), // 2: raystack.shield.v1beta1.AuthLogoutRequest - (*AuthLogoutResponse)(nil), // 3: raystack.shield.v1beta1.AuthLogoutResponse - (*AuthCallbackRequest)(nil), // 4: raystack.shield.v1beta1.AuthCallbackRequest - (*AuthCallbackResponse)(nil), // 5: raystack.shield.v1beta1.AuthCallbackResponse - (*AuthenticateRequest)(nil), // 6: raystack.shield.v1beta1.AuthenticateRequest - (*AuthenticateResponse)(nil), // 7: raystack.shield.v1beta1.AuthenticateResponse - (*AuthStrategy)(nil), // 8: raystack.shield.v1beta1.AuthStrategy - (*ListAuthStrategiesRequest)(nil), // 9: raystack.shield.v1beta1.ListAuthStrategiesRequest - (*ListAuthStrategiesResponse)(nil), // 10: raystack.shield.v1beta1.ListAuthStrategiesResponse - (*AuthTokenRequest)(nil), // 11: raystack.shield.v1beta1.AuthTokenRequest - (*AuthTokenResponse)(nil), // 12: raystack.shield.v1beta1.AuthTokenResponse - (*UserRequestBody)(nil), // 13: raystack.shield.v1beta1.UserRequestBody - (*ListUsersRequest)(nil), // 14: raystack.shield.v1beta1.ListUsersRequest - (*ListUsersResponse)(nil), // 15: raystack.shield.v1beta1.ListUsersResponse - (*CreateUserRequest)(nil), // 16: raystack.shield.v1beta1.CreateUserRequest - (*CreateUserResponse)(nil), // 17: raystack.shield.v1beta1.CreateUserResponse - (*GetOrganizationsByUserRequest)(nil), // 18: raystack.shield.v1beta1.GetOrganizationsByUserRequest - (*GetOrganizationsByUserResponse)(nil), // 19: raystack.shield.v1beta1.GetOrganizationsByUserResponse - (*GetOrganizationsByCurrentUserRequest)(nil), // 20: raystack.shield.v1beta1.GetOrganizationsByCurrentUserRequest - (*GetOrganizationsByCurrentUserResponse)(nil), // 21: raystack.shield.v1beta1.GetOrganizationsByCurrentUserResponse - (*GetProjectsByUserRequest)(nil), // 22: raystack.shield.v1beta1.GetProjectsByUserRequest - (*GetProjectsByUserResponse)(nil), // 23: raystack.shield.v1beta1.GetProjectsByUserResponse - (*GetProjectsByCurrentUserRequest)(nil), // 24: raystack.shield.v1beta1.GetProjectsByCurrentUserRequest - (*GetProjectsByCurrentUserResponse)(nil), // 25: raystack.shield.v1beta1.GetProjectsByCurrentUserResponse - (*EnableUserRequest)(nil), // 26: raystack.shield.v1beta1.EnableUserRequest - (*EnableUserResponse)(nil), // 27: raystack.shield.v1beta1.EnableUserResponse - (*DisableUserRequest)(nil), // 28: raystack.shield.v1beta1.DisableUserRequest - (*DisableUserResponse)(nil), // 29: raystack.shield.v1beta1.DisableUserResponse - (*DeleteUserRequest)(nil), // 30: raystack.shield.v1beta1.DeleteUserRequest - (*DeleteUserResponse)(nil), // 31: raystack.shield.v1beta1.DeleteUserResponse - (*GetUserResponse)(nil), // 32: raystack.shield.v1beta1.GetUserResponse - (*GetCurrentUserRequest)(nil), // 33: raystack.shield.v1beta1.GetCurrentUserRequest - (*GetCurrentUserResponse)(nil), // 34: raystack.shield.v1beta1.GetCurrentUserResponse - (*UpdateUserResponse)(nil), // 35: raystack.shield.v1beta1.UpdateUserResponse - (*UpdateCurrentUserResponse)(nil), // 36: raystack.shield.v1beta1.UpdateCurrentUserResponse - (*UpdateUserRequest)(nil), // 37: raystack.shield.v1beta1.UpdateUserRequest - (*GetUserRequest)(nil), // 38: raystack.shield.v1beta1.GetUserRequest - (*ListCurrentUserGroupsRequest)(nil), // 39: raystack.shield.v1beta1.ListCurrentUserGroupsRequest - (*ListCurrentUserGroupsResponse)(nil), // 40: raystack.shield.v1beta1.ListCurrentUserGroupsResponse - (*ListUserGroupsRequest)(nil), // 41: raystack.shield.v1beta1.ListUserGroupsRequest - (*ListUserGroupsResponse)(nil), // 42: raystack.shield.v1beta1.ListUserGroupsResponse - (*UpdateCurrentUserRequest)(nil), // 43: raystack.shield.v1beta1.UpdateCurrentUserRequest - (*ListUserInvitationsRequest)(nil), // 44: raystack.shield.v1beta1.ListUserInvitationsRequest - (*ListUserInvitationsResponse)(nil), // 45: raystack.shield.v1beta1.ListUserInvitationsResponse - (*ListServiceUsersRequest)(nil), // 46: raystack.shield.v1beta1.ListServiceUsersRequest - (*ListServiceUsersResponse)(nil), // 47: raystack.shield.v1beta1.ListServiceUsersResponse - (*ServiceUserRequestBody)(nil), // 48: raystack.shield.v1beta1.ServiceUserRequestBody - (*CreateServiceUserRequest)(nil), // 49: raystack.shield.v1beta1.CreateServiceUserRequest - (*CreateServiceUserResponse)(nil), // 50: raystack.shield.v1beta1.CreateServiceUserResponse - (*GetServiceUserRequest)(nil), // 51: raystack.shield.v1beta1.GetServiceUserRequest - (*GetServiceUserResponse)(nil), // 52: raystack.shield.v1beta1.GetServiceUserResponse - (*UpdateServiceUserRequest)(nil), // 53: raystack.shield.v1beta1.UpdateServiceUserRequest - (*UpdateServiceUserResponse)(nil), // 54: raystack.shield.v1beta1.UpdateServiceUserResponse - (*DeleteServiceUserRequest)(nil), // 55: raystack.shield.v1beta1.DeleteServiceUserRequest - (*DeleteServiceUserResponse)(nil), // 56: raystack.shield.v1beta1.DeleteServiceUserResponse - (*CreateServiceUserKeyRequest)(nil), // 57: raystack.shield.v1beta1.CreateServiceUserKeyRequest - (*CreateServiceUserKeyResponse)(nil), // 58: raystack.shield.v1beta1.CreateServiceUserKeyResponse - (*GetServiceUserKeyRequest)(nil), // 59: raystack.shield.v1beta1.GetServiceUserKeyRequest - (*GetServiceUserKeyResponse)(nil), // 60: raystack.shield.v1beta1.GetServiceUserKeyResponse - (*ListServiceUserKeysRequest)(nil), // 61: raystack.shield.v1beta1.ListServiceUserKeysRequest - (*ListServiceUserKeysResponse)(nil), // 62: raystack.shield.v1beta1.ListServiceUserKeysResponse - (*DeleteServiceUserKeyRequest)(nil), // 63: raystack.shield.v1beta1.DeleteServiceUserKeyRequest - (*DeleteServiceUserKeyResponse)(nil), // 64: raystack.shield.v1beta1.DeleteServiceUserKeyResponse - (*CreateServiceUserSecretRequest)(nil), // 65: raystack.shield.v1beta1.CreateServiceUserSecretRequest - (*CreateServiceUserSecretResponse)(nil), // 66: raystack.shield.v1beta1.CreateServiceUserSecretResponse - (*ListServiceUserSecretsRequest)(nil), // 67: raystack.shield.v1beta1.ListServiceUserSecretsRequest - (*ListServiceUserSecretsResponse)(nil), // 68: raystack.shield.v1beta1.ListServiceUserSecretsResponse - (*DeleteServiceUserSecretRequest)(nil), // 69: raystack.shield.v1beta1.DeleteServiceUserSecretRequest - (*DeleteServiceUserSecretResponse)(nil), // 70: raystack.shield.v1beta1.DeleteServiceUserSecretResponse - (*ListOrganizationGroupsRequest)(nil), // 71: raystack.shield.v1beta1.ListOrganizationGroupsRequest - (*ListOrganizationGroupsResponse)(nil), // 72: raystack.shield.v1beta1.ListOrganizationGroupsResponse - (*CreateOrganizationRoleRequest)(nil), // 73: raystack.shield.v1beta1.CreateOrganizationRoleRequest - (*CreateOrganizationRoleResponse)(nil), // 74: raystack.shield.v1beta1.CreateOrganizationRoleResponse - (*GetOrganizationRoleRequest)(nil), // 75: raystack.shield.v1beta1.GetOrganizationRoleRequest - (*GetOrganizationRoleResponse)(nil), // 76: raystack.shield.v1beta1.GetOrganizationRoleResponse - (*UpdateOrganizationRoleRequest)(nil), // 77: raystack.shield.v1beta1.UpdateOrganizationRoleRequest - (*UpdateOrganizationRoleResponse)(nil), // 78: raystack.shield.v1beta1.UpdateOrganizationRoleResponse - (*ListRolesRequest)(nil), // 79: raystack.shield.v1beta1.ListRolesRequest - (*ListRolesResponse)(nil), // 80: raystack.shield.v1beta1.ListRolesResponse - (*ListOrganizationRolesRequest)(nil), // 81: raystack.shield.v1beta1.ListOrganizationRolesRequest - (*ListOrganizationRolesResponse)(nil), // 82: raystack.shield.v1beta1.ListOrganizationRolesResponse - (*DeleteOrganizationRoleRequest)(nil), // 83: raystack.shield.v1beta1.DeleteOrganizationRoleRequest - (*DeleteOrganizationRoleResponse)(nil), // 84: raystack.shield.v1beta1.DeleteOrganizationRoleResponse - (*OrganizationRequestBody)(nil), // 85: raystack.shield.v1beta1.OrganizationRequestBody - (*ListOrganizationsRequest)(nil), // 86: raystack.shield.v1beta1.ListOrganizationsRequest - (*ListOrganizationsResponse)(nil), // 87: raystack.shield.v1beta1.ListOrganizationsResponse - (*CreateOrganizationRequest)(nil), // 88: raystack.shield.v1beta1.CreateOrganizationRequest - (*CreateOrganizationResponse)(nil), // 89: raystack.shield.v1beta1.CreateOrganizationResponse - (*GetOrganizationResponse)(nil), // 90: raystack.shield.v1beta1.GetOrganizationResponse - (*UpdateOrganizationResponse)(nil), // 91: raystack.shield.v1beta1.UpdateOrganizationResponse - (*GetOrganizationRequest)(nil), // 92: raystack.shield.v1beta1.GetOrganizationRequest - (*UpdateOrganizationRequest)(nil), // 93: raystack.shield.v1beta1.UpdateOrganizationRequest - (*ListOrganizationAdminsRequest)(nil), // 94: raystack.shield.v1beta1.ListOrganizationAdminsRequest - (*ListOrganizationAdminsResponse)(nil), // 95: raystack.shield.v1beta1.ListOrganizationAdminsResponse - (*ListOrganizationUsersRequest)(nil), // 96: raystack.shield.v1beta1.ListOrganizationUsersRequest - (*ListOrganizationUsersResponse)(nil), // 97: raystack.shield.v1beta1.ListOrganizationUsersResponse - (*AddOrganizationUsersRequest)(nil), // 98: raystack.shield.v1beta1.AddOrganizationUsersRequest - (*AddOrganizationUsersResponse)(nil), // 99: raystack.shield.v1beta1.AddOrganizationUsersResponse - (*RemoveOrganizationUserRequest)(nil), // 100: raystack.shield.v1beta1.RemoveOrganizationUserRequest - (*RemoveOrganizationUserResponse)(nil), // 101: raystack.shield.v1beta1.RemoveOrganizationUserResponse - (*ListOrganizationServiceUsersRequest)(nil), // 102: raystack.shield.v1beta1.ListOrganizationServiceUsersRequest - (*ListOrganizationServiceUsersResponse)(nil), // 103: raystack.shield.v1beta1.ListOrganizationServiceUsersResponse - (*ListOrganizationInvitationsRequest)(nil), // 104: raystack.shield.v1beta1.ListOrganizationInvitationsRequest - (*ListOrganizationInvitationsResponse)(nil), // 105: raystack.shield.v1beta1.ListOrganizationInvitationsResponse - (*CreateOrganizationInvitationRequest)(nil), // 106: raystack.shield.v1beta1.CreateOrganizationInvitationRequest - (*CreateOrganizationInvitationResponse)(nil), // 107: raystack.shield.v1beta1.CreateOrganizationInvitationResponse - (*GetOrganizationInvitationRequest)(nil), // 108: raystack.shield.v1beta1.GetOrganizationInvitationRequest - (*GetOrganizationInvitationResponse)(nil), // 109: raystack.shield.v1beta1.GetOrganizationInvitationResponse - (*AcceptOrganizationInvitationRequest)(nil), // 110: raystack.shield.v1beta1.AcceptOrganizationInvitationRequest - (*AcceptOrganizationInvitationResponse)(nil), // 111: raystack.shield.v1beta1.AcceptOrganizationInvitationResponse - (*DeleteOrganizationInvitationRequest)(nil), // 112: raystack.shield.v1beta1.DeleteOrganizationInvitationRequest - (*DeleteOrganizationInvitationResponse)(nil), // 113: raystack.shield.v1beta1.DeleteOrganizationInvitationResponse - (*EnableOrganizationRequest)(nil), // 114: raystack.shield.v1beta1.EnableOrganizationRequest - (*EnableOrganizationResponse)(nil), // 115: raystack.shield.v1beta1.EnableOrganizationResponse - (*DisableOrganizationRequest)(nil), // 116: raystack.shield.v1beta1.DisableOrganizationRequest - (*DisableOrganizationResponse)(nil), // 117: raystack.shield.v1beta1.DisableOrganizationResponse - (*DeleteOrganizationRequest)(nil), // 118: raystack.shield.v1beta1.DeleteOrganizationRequest - (*DeleteOrganizationResponse)(nil), // 119: raystack.shield.v1beta1.DeleteOrganizationResponse - (*ProjectRequestBody)(nil), // 120: raystack.shield.v1beta1.ProjectRequestBody - (*CreateProjectRequest)(nil), // 121: raystack.shield.v1beta1.CreateProjectRequest - (*CreateProjectResponse)(nil), // 122: raystack.shield.v1beta1.CreateProjectResponse - (*GetProjectResponse)(nil), // 123: raystack.shield.v1beta1.GetProjectResponse - (*UpdateProjectResponse)(nil), // 124: raystack.shield.v1beta1.UpdateProjectResponse - (*ListOrganizationProjectsRequest)(nil), // 125: raystack.shield.v1beta1.ListOrganizationProjectsRequest - (*ListOrganizationProjectsResponse)(nil), // 126: raystack.shield.v1beta1.ListOrganizationProjectsResponse - (*GetProjectRequest)(nil), // 127: raystack.shield.v1beta1.GetProjectRequest - (*UpdateProjectRequest)(nil), // 128: raystack.shield.v1beta1.UpdateProjectRequest - (*ListProjectAdminsRequest)(nil), // 129: raystack.shield.v1beta1.ListProjectAdminsRequest - (*ListProjectAdminsResponse)(nil), // 130: raystack.shield.v1beta1.ListProjectAdminsResponse - (*ListProjectUsersRequest)(nil), // 131: raystack.shield.v1beta1.ListProjectUsersRequest - (*ListProjectUsersResponse)(nil), // 132: raystack.shield.v1beta1.ListProjectUsersResponse - (*EnableProjectRequest)(nil), // 133: raystack.shield.v1beta1.EnableProjectRequest - (*EnableProjectResponse)(nil), // 134: raystack.shield.v1beta1.EnableProjectResponse - (*DisableProjectRequest)(nil), // 135: raystack.shield.v1beta1.DisableProjectRequest - (*DisableProjectResponse)(nil), // 136: raystack.shield.v1beta1.DisableProjectResponse - (*DeleteProjectRequest)(nil), // 137: raystack.shield.v1beta1.DeleteProjectRequest - (*DeleteProjectResponse)(nil), // 138: raystack.shield.v1beta1.DeleteProjectResponse - (*PolicyRequestBody)(nil), // 139: raystack.shield.v1beta1.PolicyRequestBody - (*GetPermissionRequest)(nil), // 140: raystack.shield.v1beta1.GetPermissionRequest - (*GetPermissionResponse)(nil), // 141: raystack.shield.v1beta1.GetPermissionResponse - (*ListPermissionsRequest)(nil), // 142: raystack.shield.v1beta1.ListPermissionsRequest - (*ListPermissionsResponse)(nil), // 143: raystack.shield.v1beta1.ListPermissionsResponse - (*ListNamespacesRequest)(nil), // 144: raystack.shield.v1beta1.ListNamespacesRequest - (*ListNamespacesResponse)(nil), // 145: raystack.shield.v1beta1.ListNamespacesResponse - (*GetNamespaceRequest)(nil), // 146: raystack.shield.v1beta1.GetNamespaceRequest - (*GetNamespaceResponse)(nil), // 147: raystack.shield.v1beta1.GetNamespaceResponse - (*CreatePolicyRequest)(nil), // 148: raystack.shield.v1beta1.CreatePolicyRequest - (*CreatePolicyResponse)(nil), // 149: raystack.shield.v1beta1.CreatePolicyResponse - (*GetPolicyRequest)(nil), // 150: raystack.shield.v1beta1.GetPolicyRequest - (*GetPolicyResponse)(nil), // 151: raystack.shield.v1beta1.GetPolicyResponse - (*UpdatePolicyRequest)(nil), // 152: raystack.shield.v1beta1.UpdatePolicyRequest - (*UpdatePolicyResponse)(nil), // 153: raystack.shield.v1beta1.UpdatePolicyResponse - (*DeletePolicyRequest)(nil), // 154: raystack.shield.v1beta1.DeletePolicyRequest - (*DeletePolicyResponse)(nil), // 155: raystack.shield.v1beta1.DeletePolicyResponse - (*RelationRequestBody)(nil), // 156: raystack.shield.v1beta1.RelationRequestBody - (*CreateRelationRequest)(nil), // 157: raystack.shield.v1beta1.CreateRelationRequest - (*CreateRelationResponse)(nil), // 158: raystack.shield.v1beta1.CreateRelationResponse - (*GetRelationRequest)(nil), // 159: raystack.shield.v1beta1.GetRelationRequest - (*GetRelationResponse)(nil), // 160: raystack.shield.v1beta1.GetRelationResponse - (*UpdateRelationRequest)(nil), // 161: raystack.shield.v1beta1.UpdateRelationRequest - (*UpdateRelationResponse)(nil), // 162: raystack.shield.v1beta1.UpdateRelationResponse - (*GroupRequestBody)(nil), // 163: raystack.shield.v1beta1.GroupRequestBody - (*CreateGroupRequest)(nil), // 164: raystack.shield.v1beta1.CreateGroupRequest - (*GetGroupRequest)(nil), // 165: raystack.shield.v1beta1.GetGroupRequest - (*CreateGroupResponse)(nil), // 166: raystack.shield.v1beta1.CreateGroupResponse - (*GetGroupResponse)(nil), // 167: raystack.shield.v1beta1.GetGroupResponse - (*UpdateGroupResponse)(nil), // 168: raystack.shield.v1beta1.UpdateGroupResponse - (*UpdateGroupRequest)(nil), // 169: raystack.shield.v1beta1.UpdateGroupRequest - (*ListGroupUsersRequest)(nil), // 170: raystack.shield.v1beta1.ListGroupUsersRequest - (*ListGroupUsersResponse)(nil), // 171: raystack.shield.v1beta1.ListGroupUsersResponse - (*EnableGroupRequest)(nil), // 172: raystack.shield.v1beta1.EnableGroupRequest - (*EnableGroupResponse)(nil), // 173: raystack.shield.v1beta1.EnableGroupResponse - (*DisableGroupRequest)(nil), // 174: raystack.shield.v1beta1.DisableGroupRequest - (*DisableGroupResponse)(nil), // 175: raystack.shield.v1beta1.DisableGroupResponse - (*DeleteGroupRequest)(nil), // 176: raystack.shield.v1beta1.DeleteGroupRequest - (*DeleteGroupResponse)(nil), // 177: raystack.shield.v1beta1.DeleteGroupResponse - (*AddGroupUsersRequest)(nil), // 178: raystack.shield.v1beta1.AddGroupUsersRequest - (*AddGroupUsersResponse)(nil), // 179: raystack.shield.v1beta1.AddGroupUsersResponse - (*RemoveGroupUserRequest)(nil), // 180: raystack.shield.v1beta1.RemoveGroupUserRequest - (*RemoveGroupUserResponse)(nil), // 181: raystack.shield.v1beta1.RemoveGroupUserResponse - (*DeleteRelationRequest)(nil), // 182: raystack.shield.v1beta1.DeleteRelationRequest - (*DeleteRelationResponse)(nil), // 183: raystack.shield.v1beta1.DeleteRelationResponse - (*ListProjectResourcesRequest)(nil), // 184: raystack.shield.v1beta1.ListProjectResourcesRequest - (*ListProjectResourcesResponse)(nil), // 185: raystack.shield.v1beta1.ListProjectResourcesResponse - (*ResourceRequestBody)(nil), // 186: raystack.shield.v1beta1.ResourceRequestBody - (*CreateProjectResourceRequest)(nil), // 187: raystack.shield.v1beta1.CreateProjectResourceRequest - (*CreateProjectResourceResponse)(nil), // 188: raystack.shield.v1beta1.CreateProjectResourceResponse - (*GetProjectResourceRequest)(nil), // 189: raystack.shield.v1beta1.GetProjectResourceRequest - (*GetProjectResourceResponse)(nil), // 190: raystack.shield.v1beta1.GetProjectResourceResponse - (*UpdateProjectResourceRequest)(nil), // 191: raystack.shield.v1beta1.UpdateProjectResourceRequest - (*UpdateProjectResourceResponse)(nil), // 192: raystack.shield.v1beta1.UpdateProjectResourceResponse - (*DeleteProjectResourceRequest)(nil), // 193: raystack.shield.v1beta1.DeleteProjectResourceRequest - (*DeleteProjectResourceResponse)(nil), // 194: raystack.shield.v1beta1.DeleteProjectResourceResponse - (*CheckResourcePermissionRequest)(nil), // 195: raystack.shield.v1beta1.CheckResourcePermissionRequest - (*CheckResourcePermissionResponse)(nil), // 196: raystack.shield.v1beta1.CheckResourcePermissionResponse - (*MetaSchemaRequestBody)(nil), // 197: raystack.shield.v1beta1.MetaSchemaRequestBody - (*CreateMetaSchemaRequest)(nil), // 198: raystack.shield.v1beta1.CreateMetaSchemaRequest - (*CreateMetaSchemaResponse)(nil), // 199: raystack.shield.v1beta1.CreateMetaSchemaResponse - (*GetMetaSchemaRequest)(nil), // 200: raystack.shield.v1beta1.GetMetaSchemaRequest - (*GetMetaSchemaResponse)(nil), // 201: raystack.shield.v1beta1.GetMetaSchemaResponse - (*UpdateMetaSchemaRequest)(nil), // 202: raystack.shield.v1beta1.UpdateMetaSchemaRequest - (*UpdateMetaSchemaResponse)(nil), // 203: raystack.shield.v1beta1.UpdateMetaSchemaResponse - (*DeleteMetaSchemaRequest)(nil), // 204: raystack.shield.v1beta1.DeleteMetaSchemaRequest - (*DeleteMetaSchemaResponse)(nil), // 205: raystack.shield.v1beta1.DeleteMetaSchemaResponse - (*ListMetaSchemasRequest)(nil), // 206: raystack.shield.v1beta1.ListMetaSchemasRequest - (*ListMetaSchemasResponse)(nil), // 207: raystack.shield.v1beta1.ListMetaSchemasResponse - (*ListOrganizationAuditLogsRequest)(nil), // 208: raystack.shield.v1beta1.ListOrganizationAuditLogsRequest - (*ListOrganizationAuditLogsResponse)(nil), // 209: raystack.shield.v1beta1.ListOrganizationAuditLogsResponse - (*CreateOrganizationAuditLogsRequest)(nil), // 210: raystack.shield.v1beta1.CreateOrganizationAuditLogsRequest - (*CreateOrganizationAuditLogsResponse)(nil), // 211: raystack.shield.v1beta1.CreateOrganizationAuditLogsResponse - (*GetOrganizationAuditLogRequest)(nil), // 212: raystack.shield.v1beta1.GetOrganizationAuditLogRequest - (*GetOrganizationAuditLogResponse)(nil), // 213: raystack.shield.v1beta1.GetOrganizationAuditLogResponse - (*JSONWebKey)(nil), // 214: raystack.shield.v1beta1.JSONWebKey + return file_raystack_frontier_v1beta1_frontier_proto_rawDescData +} + +var file_raystack_frontier_v1beta1_frontier_proto_msgTypes = make([]protoimpl.MessageInfo, 214) +var file_raystack_frontier_v1beta1_frontier_proto_goTypes = []interface{}{ + (*GetJWKsRequest)(nil), // 0: raystack.frontier.v1beta1.GetJWKsRequest + (*GetJWKsResponse)(nil), // 1: raystack.frontier.v1beta1.GetJWKsResponse + (*AuthLogoutRequest)(nil), // 2: raystack.frontier.v1beta1.AuthLogoutRequest + (*AuthLogoutResponse)(nil), // 3: raystack.frontier.v1beta1.AuthLogoutResponse + (*AuthCallbackRequest)(nil), // 4: raystack.frontier.v1beta1.AuthCallbackRequest + (*AuthCallbackResponse)(nil), // 5: raystack.frontier.v1beta1.AuthCallbackResponse + (*AuthenticateRequest)(nil), // 6: raystack.frontier.v1beta1.AuthenticateRequest + (*AuthenticateResponse)(nil), // 7: raystack.frontier.v1beta1.AuthenticateResponse + (*AuthStrategy)(nil), // 8: raystack.frontier.v1beta1.AuthStrategy + (*ListAuthStrategiesRequest)(nil), // 9: raystack.frontier.v1beta1.ListAuthStrategiesRequest + (*ListAuthStrategiesResponse)(nil), // 10: raystack.frontier.v1beta1.ListAuthStrategiesResponse + (*AuthTokenRequest)(nil), // 11: raystack.frontier.v1beta1.AuthTokenRequest + (*AuthTokenResponse)(nil), // 12: raystack.frontier.v1beta1.AuthTokenResponse + (*UserRequestBody)(nil), // 13: raystack.frontier.v1beta1.UserRequestBody + (*ListUsersRequest)(nil), // 14: raystack.frontier.v1beta1.ListUsersRequest + (*ListUsersResponse)(nil), // 15: raystack.frontier.v1beta1.ListUsersResponse + (*CreateUserRequest)(nil), // 16: raystack.frontier.v1beta1.CreateUserRequest + (*CreateUserResponse)(nil), // 17: raystack.frontier.v1beta1.CreateUserResponse + (*GetOrganizationsByUserRequest)(nil), // 18: raystack.frontier.v1beta1.GetOrganizationsByUserRequest + (*GetOrganizationsByUserResponse)(nil), // 19: raystack.frontier.v1beta1.GetOrganizationsByUserResponse + (*GetOrganizationsByCurrentUserRequest)(nil), // 20: raystack.frontier.v1beta1.GetOrganizationsByCurrentUserRequest + (*GetOrganizationsByCurrentUserResponse)(nil), // 21: raystack.frontier.v1beta1.GetOrganizationsByCurrentUserResponse + (*GetProjectsByUserRequest)(nil), // 22: raystack.frontier.v1beta1.GetProjectsByUserRequest + (*GetProjectsByUserResponse)(nil), // 23: raystack.frontier.v1beta1.GetProjectsByUserResponse + (*GetProjectsByCurrentUserRequest)(nil), // 24: raystack.frontier.v1beta1.GetProjectsByCurrentUserRequest + (*GetProjectsByCurrentUserResponse)(nil), // 25: raystack.frontier.v1beta1.GetProjectsByCurrentUserResponse + (*EnableUserRequest)(nil), // 26: raystack.frontier.v1beta1.EnableUserRequest + (*EnableUserResponse)(nil), // 27: raystack.frontier.v1beta1.EnableUserResponse + (*DisableUserRequest)(nil), // 28: raystack.frontier.v1beta1.DisableUserRequest + (*DisableUserResponse)(nil), // 29: raystack.frontier.v1beta1.DisableUserResponse + (*DeleteUserRequest)(nil), // 30: raystack.frontier.v1beta1.DeleteUserRequest + (*DeleteUserResponse)(nil), // 31: raystack.frontier.v1beta1.DeleteUserResponse + (*GetUserResponse)(nil), // 32: raystack.frontier.v1beta1.GetUserResponse + (*GetCurrentUserRequest)(nil), // 33: raystack.frontier.v1beta1.GetCurrentUserRequest + (*GetCurrentUserResponse)(nil), // 34: raystack.frontier.v1beta1.GetCurrentUserResponse + (*UpdateUserResponse)(nil), // 35: raystack.frontier.v1beta1.UpdateUserResponse + (*UpdateCurrentUserResponse)(nil), // 36: raystack.frontier.v1beta1.UpdateCurrentUserResponse + (*UpdateUserRequest)(nil), // 37: raystack.frontier.v1beta1.UpdateUserRequest + (*GetUserRequest)(nil), // 38: raystack.frontier.v1beta1.GetUserRequest + (*ListCurrentUserGroupsRequest)(nil), // 39: raystack.frontier.v1beta1.ListCurrentUserGroupsRequest + (*ListCurrentUserGroupsResponse)(nil), // 40: raystack.frontier.v1beta1.ListCurrentUserGroupsResponse + (*ListUserGroupsRequest)(nil), // 41: raystack.frontier.v1beta1.ListUserGroupsRequest + (*ListUserGroupsResponse)(nil), // 42: raystack.frontier.v1beta1.ListUserGroupsResponse + (*UpdateCurrentUserRequest)(nil), // 43: raystack.frontier.v1beta1.UpdateCurrentUserRequest + (*ListUserInvitationsRequest)(nil), // 44: raystack.frontier.v1beta1.ListUserInvitationsRequest + (*ListUserInvitationsResponse)(nil), // 45: raystack.frontier.v1beta1.ListUserInvitationsResponse + (*ListServiceUsersRequest)(nil), // 46: raystack.frontier.v1beta1.ListServiceUsersRequest + (*ListServiceUsersResponse)(nil), // 47: raystack.frontier.v1beta1.ListServiceUsersResponse + (*ServiceUserRequestBody)(nil), // 48: raystack.frontier.v1beta1.ServiceUserRequestBody + (*CreateServiceUserRequest)(nil), // 49: raystack.frontier.v1beta1.CreateServiceUserRequest + (*CreateServiceUserResponse)(nil), // 50: raystack.frontier.v1beta1.CreateServiceUserResponse + (*GetServiceUserRequest)(nil), // 51: raystack.frontier.v1beta1.GetServiceUserRequest + (*GetServiceUserResponse)(nil), // 52: raystack.frontier.v1beta1.GetServiceUserResponse + (*UpdateServiceUserRequest)(nil), // 53: raystack.frontier.v1beta1.UpdateServiceUserRequest + (*UpdateServiceUserResponse)(nil), // 54: raystack.frontier.v1beta1.UpdateServiceUserResponse + (*DeleteServiceUserRequest)(nil), // 55: raystack.frontier.v1beta1.DeleteServiceUserRequest + (*DeleteServiceUserResponse)(nil), // 56: raystack.frontier.v1beta1.DeleteServiceUserResponse + (*CreateServiceUserKeyRequest)(nil), // 57: raystack.frontier.v1beta1.CreateServiceUserKeyRequest + (*CreateServiceUserKeyResponse)(nil), // 58: raystack.frontier.v1beta1.CreateServiceUserKeyResponse + (*GetServiceUserKeyRequest)(nil), // 59: raystack.frontier.v1beta1.GetServiceUserKeyRequest + (*GetServiceUserKeyResponse)(nil), // 60: raystack.frontier.v1beta1.GetServiceUserKeyResponse + (*ListServiceUserKeysRequest)(nil), // 61: raystack.frontier.v1beta1.ListServiceUserKeysRequest + (*ListServiceUserKeysResponse)(nil), // 62: raystack.frontier.v1beta1.ListServiceUserKeysResponse + (*DeleteServiceUserKeyRequest)(nil), // 63: raystack.frontier.v1beta1.DeleteServiceUserKeyRequest + (*DeleteServiceUserKeyResponse)(nil), // 64: raystack.frontier.v1beta1.DeleteServiceUserKeyResponse + (*CreateServiceUserSecretRequest)(nil), // 65: raystack.frontier.v1beta1.CreateServiceUserSecretRequest + (*CreateServiceUserSecretResponse)(nil), // 66: raystack.frontier.v1beta1.CreateServiceUserSecretResponse + (*ListServiceUserSecretsRequest)(nil), // 67: raystack.frontier.v1beta1.ListServiceUserSecretsRequest + (*ListServiceUserSecretsResponse)(nil), // 68: raystack.frontier.v1beta1.ListServiceUserSecretsResponse + (*DeleteServiceUserSecretRequest)(nil), // 69: raystack.frontier.v1beta1.DeleteServiceUserSecretRequest + (*DeleteServiceUserSecretResponse)(nil), // 70: raystack.frontier.v1beta1.DeleteServiceUserSecretResponse + (*ListOrganizationGroupsRequest)(nil), // 71: raystack.frontier.v1beta1.ListOrganizationGroupsRequest + (*ListOrganizationGroupsResponse)(nil), // 72: raystack.frontier.v1beta1.ListOrganizationGroupsResponse + (*CreateOrganizationRoleRequest)(nil), // 73: raystack.frontier.v1beta1.CreateOrganizationRoleRequest + (*CreateOrganizationRoleResponse)(nil), // 74: raystack.frontier.v1beta1.CreateOrganizationRoleResponse + (*GetOrganizationRoleRequest)(nil), // 75: raystack.frontier.v1beta1.GetOrganizationRoleRequest + (*GetOrganizationRoleResponse)(nil), // 76: raystack.frontier.v1beta1.GetOrganizationRoleResponse + (*UpdateOrganizationRoleRequest)(nil), // 77: raystack.frontier.v1beta1.UpdateOrganizationRoleRequest + (*UpdateOrganizationRoleResponse)(nil), // 78: raystack.frontier.v1beta1.UpdateOrganizationRoleResponse + (*ListRolesRequest)(nil), // 79: raystack.frontier.v1beta1.ListRolesRequest + (*ListRolesResponse)(nil), // 80: raystack.frontier.v1beta1.ListRolesResponse + (*ListOrganizationRolesRequest)(nil), // 81: raystack.frontier.v1beta1.ListOrganizationRolesRequest + (*ListOrganizationRolesResponse)(nil), // 82: raystack.frontier.v1beta1.ListOrganizationRolesResponse + (*DeleteOrganizationRoleRequest)(nil), // 83: raystack.frontier.v1beta1.DeleteOrganizationRoleRequest + (*DeleteOrganizationRoleResponse)(nil), // 84: raystack.frontier.v1beta1.DeleteOrganizationRoleResponse + (*OrganizationRequestBody)(nil), // 85: raystack.frontier.v1beta1.OrganizationRequestBody + (*ListOrganizationsRequest)(nil), // 86: raystack.frontier.v1beta1.ListOrganizationsRequest + (*ListOrganizationsResponse)(nil), // 87: raystack.frontier.v1beta1.ListOrganizationsResponse + (*CreateOrganizationRequest)(nil), // 88: raystack.frontier.v1beta1.CreateOrganizationRequest + (*CreateOrganizationResponse)(nil), // 89: raystack.frontier.v1beta1.CreateOrganizationResponse + (*GetOrganizationResponse)(nil), // 90: raystack.frontier.v1beta1.GetOrganizationResponse + (*UpdateOrganizationResponse)(nil), // 91: raystack.frontier.v1beta1.UpdateOrganizationResponse + (*GetOrganizationRequest)(nil), // 92: raystack.frontier.v1beta1.GetOrganizationRequest + (*UpdateOrganizationRequest)(nil), // 93: raystack.frontier.v1beta1.UpdateOrganizationRequest + (*ListOrganizationAdminsRequest)(nil), // 94: raystack.frontier.v1beta1.ListOrganizationAdminsRequest + (*ListOrganizationAdminsResponse)(nil), // 95: raystack.frontier.v1beta1.ListOrganizationAdminsResponse + (*ListOrganizationUsersRequest)(nil), // 96: raystack.frontier.v1beta1.ListOrganizationUsersRequest + (*ListOrganizationUsersResponse)(nil), // 97: raystack.frontier.v1beta1.ListOrganizationUsersResponse + (*AddOrganizationUsersRequest)(nil), // 98: raystack.frontier.v1beta1.AddOrganizationUsersRequest + (*AddOrganizationUsersResponse)(nil), // 99: raystack.frontier.v1beta1.AddOrganizationUsersResponse + (*RemoveOrganizationUserRequest)(nil), // 100: raystack.frontier.v1beta1.RemoveOrganizationUserRequest + (*RemoveOrganizationUserResponse)(nil), // 101: raystack.frontier.v1beta1.RemoveOrganizationUserResponse + (*ListOrganizationServiceUsersRequest)(nil), // 102: raystack.frontier.v1beta1.ListOrganizationServiceUsersRequest + (*ListOrganizationServiceUsersResponse)(nil), // 103: raystack.frontier.v1beta1.ListOrganizationServiceUsersResponse + (*ListOrganizationInvitationsRequest)(nil), // 104: raystack.frontier.v1beta1.ListOrganizationInvitationsRequest + (*ListOrganizationInvitationsResponse)(nil), // 105: raystack.frontier.v1beta1.ListOrganizationInvitationsResponse + (*CreateOrganizationInvitationRequest)(nil), // 106: raystack.frontier.v1beta1.CreateOrganizationInvitationRequest + (*CreateOrganizationInvitationResponse)(nil), // 107: raystack.frontier.v1beta1.CreateOrganizationInvitationResponse + (*GetOrganizationInvitationRequest)(nil), // 108: raystack.frontier.v1beta1.GetOrganizationInvitationRequest + (*GetOrganizationInvitationResponse)(nil), // 109: raystack.frontier.v1beta1.GetOrganizationInvitationResponse + (*AcceptOrganizationInvitationRequest)(nil), // 110: raystack.frontier.v1beta1.AcceptOrganizationInvitationRequest + (*AcceptOrganizationInvitationResponse)(nil), // 111: raystack.frontier.v1beta1.AcceptOrganizationInvitationResponse + (*DeleteOrganizationInvitationRequest)(nil), // 112: raystack.frontier.v1beta1.DeleteOrganizationInvitationRequest + (*DeleteOrganizationInvitationResponse)(nil), // 113: raystack.frontier.v1beta1.DeleteOrganizationInvitationResponse + (*EnableOrganizationRequest)(nil), // 114: raystack.frontier.v1beta1.EnableOrganizationRequest + (*EnableOrganizationResponse)(nil), // 115: raystack.frontier.v1beta1.EnableOrganizationResponse + (*DisableOrganizationRequest)(nil), // 116: raystack.frontier.v1beta1.DisableOrganizationRequest + (*DisableOrganizationResponse)(nil), // 117: raystack.frontier.v1beta1.DisableOrganizationResponse + (*DeleteOrganizationRequest)(nil), // 118: raystack.frontier.v1beta1.DeleteOrganizationRequest + (*DeleteOrganizationResponse)(nil), // 119: raystack.frontier.v1beta1.DeleteOrganizationResponse + (*ProjectRequestBody)(nil), // 120: raystack.frontier.v1beta1.ProjectRequestBody + (*CreateProjectRequest)(nil), // 121: raystack.frontier.v1beta1.CreateProjectRequest + (*CreateProjectResponse)(nil), // 122: raystack.frontier.v1beta1.CreateProjectResponse + (*GetProjectResponse)(nil), // 123: raystack.frontier.v1beta1.GetProjectResponse + (*UpdateProjectResponse)(nil), // 124: raystack.frontier.v1beta1.UpdateProjectResponse + (*ListOrganizationProjectsRequest)(nil), // 125: raystack.frontier.v1beta1.ListOrganizationProjectsRequest + (*ListOrganizationProjectsResponse)(nil), // 126: raystack.frontier.v1beta1.ListOrganizationProjectsResponse + (*GetProjectRequest)(nil), // 127: raystack.frontier.v1beta1.GetProjectRequest + (*UpdateProjectRequest)(nil), // 128: raystack.frontier.v1beta1.UpdateProjectRequest + (*ListProjectAdminsRequest)(nil), // 129: raystack.frontier.v1beta1.ListProjectAdminsRequest + (*ListProjectAdminsResponse)(nil), // 130: raystack.frontier.v1beta1.ListProjectAdminsResponse + (*ListProjectUsersRequest)(nil), // 131: raystack.frontier.v1beta1.ListProjectUsersRequest + (*ListProjectUsersResponse)(nil), // 132: raystack.frontier.v1beta1.ListProjectUsersResponse + (*EnableProjectRequest)(nil), // 133: raystack.frontier.v1beta1.EnableProjectRequest + (*EnableProjectResponse)(nil), // 134: raystack.frontier.v1beta1.EnableProjectResponse + (*DisableProjectRequest)(nil), // 135: raystack.frontier.v1beta1.DisableProjectRequest + (*DisableProjectResponse)(nil), // 136: raystack.frontier.v1beta1.DisableProjectResponse + (*DeleteProjectRequest)(nil), // 137: raystack.frontier.v1beta1.DeleteProjectRequest + (*DeleteProjectResponse)(nil), // 138: raystack.frontier.v1beta1.DeleteProjectResponse + (*PolicyRequestBody)(nil), // 139: raystack.frontier.v1beta1.PolicyRequestBody + (*GetPermissionRequest)(nil), // 140: raystack.frontier.v1beta1.GetPermissionRequest + (*GetPermissionResponse)(nil), // 141: raystack.frontier.v1beta1.GetPermissionResponse + (*ListPermissionsRequest)(nil), // 142: raystack.frontier.v1beta1.ListPermissionsRequest + (*ListPermissionsResponse)(nil), // 143: raystack.frontier.v1beta1.ListPermissionsResponse + (*ListNamespacesRequest)(nil), // 144: raystack.frontier.v1beta1.ListNamespacesRequest + (*ListNamespacesResponse)(nil), // 145: raystack.frontier.v1beta1.ListNamespacesResponse + (*GetNamespaceRequest)(nil), // 146: raystack.frontier.v1beta1.GetNamespaceRequest + (*GetNamespaceResponse)(nil), // 147: raystack.frontier.v1beta1.GetNamespaceResponse + (*CreatePolicyRequest)(nil), // 148: raystack.frontier.v1beta1.CreatePolicyRequest + (*CreatePolicyResponse)(nil), // 149: raystack.frontier.v1beta1.CreatePolicyResponse + (*GetPolicyRequest)(nil), // 150: raystack.frontier.v1beta1.GetPolicyRequest + (*GetPolicyResponse)(nil), // 151: raystack.frontier.v1beta1.GetPolicyResponse + (*UpdatePolicyRequest)(nil), // 152: raystack.frontier.v1beta1.UpdatePolicyRequest + (*UpdatePolicyResponse)(nil), // 153: raystack.frontier.v1beta1.UpdatePolicyResponse + (*DeletePolicyRequest)(nil), // 154: raystack.frontier.v1beta1.DeletePolicyRequest + (*DeletePolicyResponse)(nil), // 155: raystack.frontier.v1beta1.DeletePolicyResponse + (*RelationRequestBody)(nil), // 156: raystack.frontier.v1beta1.RelationRequestBody + (*CreateRelationRequest)(nil), // 157: raystack.frontier.v1beta1.CreateRelationRequest + (*CreateRelationResponse)(nil), // 158: raystack.frontier.v1beta1.CreateRelationResponse + (*GetRelationRequest)(nil), // 159: raystack.frontier.v1beta1.GetRelationRequest + (*GetRelationResponse)(nil), // 160: raystack.frontier.v1beta1.GetRelationResponse + (*UpdateRelationRequest)(nil), // 161: raystack.frontier.v1beta1.UpdateRelationRequest + (*UpdateRelationResponse)(nil), // 162: raystack.frontier.v1beta1.UpdateRelationResponse + (*GroupRequestBody)(nil), // 163: raystack.frontier.v1beta1.GroupRequestBody + (*CreateGroupRequest)(nil), // 164: raystack.frontier.v1beta1.CreateGroupRequest + (*GetGroupRequest)(nil), // 165: raystack.frontier.v1beta1.GetGroupRequest + (*CreateGroupResponse)(nil), // 166: raystack.frontier.v1beta1.CreateGroupResponse + (*GetGroupResponse)(nil), // 167: raystack.frontier.v1beta1.GetGroupResponse + (*UpdateGroupResponse)(nil), // 168: raystack.frontier.v1beta1.UpdateGroupResponse + (*UpdateGroupRequest)(nil), // 169: raystack.frontier.v1beta1.UpdateGroupRequest + (*ListGroupUsersRequest)(nil), // 170: raystack.frontier.v1beta1.ListGroupUsersRequest + (*ListGroupUsersResponse)(nil), // 171: raystack.frontier.v1beta1.ListGroupUsersResponse + (*EnableGroupRequest)(nil), // 172: raystack.frontier.v1beta1.EnableGroupRequest + (*EnableGroupResponse)(nil), // 173: raystack.frontier.v1beta1.EnableGroupResponse + (*DisableGroupRequest)(nil), // 174: raystack.frontier.v1beta1.DisableGroupRequest + (*DisableGroupResponse)(nil), // 175: raystack.frontier.v1beta1.DisableGroupResponse + (*DeleteGroupRequest)(nil), // 176: raystack.frontier.v1beta1.DeleteGroupRequest + (*DeleteGroupResponse)(nil), // 177: raystack.frontier.v1beta1.DeleteGroupResponse + (*AddGroupUsersRequest)(nil), // 178: raystack.frontier.v1beta1.AddGroupUsersRequest + (*AddGroupUsersResponse)(nil), // 179: raystack.frontier.v1beta1.AddGroupUsersResponse + (*RemoveGroupUserRequest)(nil), // 180: raystack.frontier.v1beta1.RemoveGroupUserRequest + (*RemoveGroupUserResponse)(nil), // 181: raystack.frontier.v1beta1.RemoveGroupUserResponse + (*DeleteRelationRequest)(nil), // 182: raystack.frontier.v1beta1.DeleteRelationRequest + (*DeleteRelationResponse)(nil), // 183: raystack.frontier.v1beta1.DeleteRelationResponse + (*ListProjectResourcesRequest)(nil), // 184: raystack.frontier.v1beta1.ListProjectResourcesRequest + (*ListProjectResourcesResponse)(nil), // 185: raystack.frontier.v1beta1.ListProjectResourcesResponse + (*ResourceRequestBody)(nil), // 186: raystack.frontier.v1beta1.ResourceRequestBody + (*CreateProjectResourceRequest)(nil), // 187: raystack.frontier.v1beta1.CreateProjectResourceRequest + (*CreateProjectResourceResponse)(nil), // 188: raystack.frontier.v1beta1.CreateProjectResourceResponse + (*GetProjectResourceRequest)(nil), // 189: raystack.frontier.v1beta1.GetProjectResourceRequest + (*GetProjectResourceResponse)(nil), // 190: raystack.frontier.v1beta1.GetProjectResourceResponse + (*UpdateProjectResourceRequest)(nil), // 191: raystack.frontier.v1beta1.UpdateProjectResourceRequest + (*UpdateProjectResourceResponse)(nil), // 192: raystack.frontier.v1beta1.UpdateProjectResourceResponse + (*DeleteProjectResourceRequest)(nil), // 193: raystack.frontier.v1beta1.DeleteProjectResourceRequest + (*DeleteProjectResourceResponse)(nil), // 194: raystack.frontier.v1beta1.DeleteProjectResourceResponse + (*CheckResourcePermissionRequest)(nil), // 195: raystack.frontier.v1beta1.CheckResourcePermissionRequest + (*CheckResourcePermissionResponse)(nil), // 196: raystack.frontier.v1beta1.CheckResourcePermissionResponse + (*MetaSchemaRequestBody)(nil), // 197: raystack.frontier.v1beta1.MetaSchemaRequestBody + (*CreateMetaSchemaRequest)(nil), // 198: raystack.frontier.v1beta1.CreateMetaSchemaRequest + (*CreateMetaSchemaResponse)(nil), // 199: raystack.frontier.v1beta1.CreateMetaSchemaResponse + (*GetMetaSchemaRequest)(nil), // 200: raystack.frontier.v1beta1.GetMetaSchemaRequest + (*GetMetaSchemaResponse)(nil), // 201: raystack.frontier.v1beta1.GetMetaSchemaResponse + (*UpdateMetaSchemaRequest)(nil), // 202: raystack.frontier.v1beta1.UpdateMetaSchemaRequest + (*UpdateMetaSchemaResponse)(nil), // 203: raystack.frontier.v1beta1.UpdateMetaSchemaResponse + (*DeleteMetaSchemaRequest)(nil), // 204: raystack.frontier.v1beta1.DeleteMetaSchemaRequest + (*DeleteMetaSchemaResponse)(nil), // 205: raystack.frontier.v1beta1.DeleteMetaSchemaResponse + (*ListMetaSchemasRequest)(nil), // 206: raystack.frontier.v1beta1.ListMetaSchemasRequest + (*ListMetaSchemasResponse)(nil), // 207: raystack.frontier.v1beta1.ListMetaSchemasResponse + (*ListOrganizationAuditLogsRequest)(nil), // 208: raystack.frontier.v1beta1.ListOrganizationAuditLogsRequest + (*ListOrganizationAuditLogsResponse)(nil), // 209: raystack.frontier.v1beta1.ListOrganizationAuditLogsResponse + (*CreateOrganizationAuditLogsRequest)(nil), // 210: raystack.frontier.v1beta1.CreateOrganizationAuditLogsRequest + (*CreateOrganizationAuditLogsResponse)(nil), // 211: raystack.frontier.v1beta1.CreateOrganizationAuditLogsResponse + (*GetOrganizationAuditLogRequest)(nil), // 212: raystack.frontier.v1beta1.GetOrganizationAuditLogRequest + (*GetOrganizationAuditLogResponse)(nil), // 213: raystack.frontier.v1beta1.GetOrganizationAuditLogResponse + (*JSONWebKey)(nil), // 214: raystack.frontier.v1beta1.JSONWebKey (*structpb.Struct)(nil), // 215: google.protobuf.Struct - (*User)(nil), // 216: raystack.shield.v1beta1.User - (*Organization)(nil), // 217: raystack.shield.v1beta1.Organization - (*Project)(nil), // 218: raystack.shield.v1beta1.Project - (*ServiceUser)(nil), // 219: raystack.shield.v1beta1.ServiceUser - (*Group)(nil), // 220: raystack.shield.v1beta1.Group - (*Invitation)(nil), // 221: raystack.shield.v1beta1.Invitation - (*KeyCredential)(nil), // 222: raystack.shield.v1beta1.KeyCredential - (*ServiceUserKey)(nil), // 223: raystack.shield.v1beta1.ServiceUserKey - (*SecretCredential)(nil), // 224: raystack.shield.v1beta1.SecretCredential - (*RoleRequestBody)(nil), // 225: raystack.shield.v1beta1.RoleRequestBody - (*Role)(nil), // 226: raystack.shield.v1beta1.Role - (*Permission)(nil), // 227: raystack.shield.v1beta1.Permission - (*Namespace)(nil), // 228: raystack.shield.v1beta1.Namespace - (*Policy)(nil), // 229: raystack.shield.v1beta1.Policy - (*Relation)(nil), // 230: raystack.shield.v1beta1.Relation - (*Resource)(nil), // 231: raystack.shield.v1beta1.Resource - (*MetaSchema)(nil), // 232: raystack.shield.v1beta1.MetaSchema + (*User)(nil), // 216: raystack.frontier.v1beta1.User + (*Organization)(nil), // 217: raystack.frontier.v1beta1.Organization + (*Project)(nil), // 218: raystack.frontier.v1beta1.Project + (*ServiceUser)(nil), // 219: raystack.frontier.v1beta1.ServiceUser + (*Group)(nil), // 220: raystack.frontier.v1beta1.Group + (*Invitation)(nil), // 221: raystack.frontier.v1beta1.Invitation + (*KeyCredential)(nil), // 222: raystack.frontier.v1beta1.KeyCredential + (*ServiceUserKey)(nil), // 223: raystack.frontier.v1beta1.ServiceUserKey + (*SecretCredential)(nil), // 224: raystack.frontier.v1beta1.SecretCredential + (*RoleRequestBody)(nil), // 225: raystack.frontier.v1beta1.RoleRequestBody + (*Role)(nil), // 226: raystack.frontier.v1beta1.Role + (*Permission)(nil), // 227: raystack.frontier.v1beta1.Permission + (*Namespace)(nil), // 228: raystack.frontier.v1beta1.Namespace + (*Policy)(nil), // 229: raystack.frontier.v1beta1.Policy + (*Relation)(nil), // 230: raystack.frontier.v1beta1.Relation + (*Resource)(nil), // 231: raystack.frontier.v1beta1.Resource + (*MetaSchema)(nil), // 232: raystack.frontier.v1beta1.MetaSchema (*timestamppb.Timestamp)(nil), // 233: google.protobuf.Timestamp - (*AuditLog)(nil), // 234: raystack.shield.v1beta1.AuditLog -} -var file_raystack_shield_v1beta1_shield_proto_depIdxs = []int32{ - 214, // 0: raystack.shield.v1beta1.GetJWKsResponse.keys:type_name -> raystack.shield.v1beta1.JSONWebKey - 215, // 1: raystack.shield.v1beta1.AuthStrategy.params:type_name -> google.protobuf.Struct - 8, // 2: raystack.shield.v1beta1.ListAuthStrategiesResponse.strategies:type_name -> raystack.shield.v1beta1.AuthStrategy - 215, // 3: raystack.shield.v1beta1.UserRequestBody.metadata:type_name -> google.protobuf.Struct - 216, // 4: raystack.shield.v1beta1.ListUsersResponse.users:type_name -> raystack.shield.v1beta1.User - 13, // 5: raystack.shield.v1beta1.CreateUserRequest.body:type_name -> raystack.shield.v1beta1.UserRequestBody - 216, // 6: raystack.shield.v1beta1.CreateUserResponse.user:type_name -> raystack.shield.v1beta1.User - 217, // 7: raystack.shield.v1beta1.GetOrganizationsByUserResponse.organizations:type_name -> raystack.shield.v1beta1.Organization - 217, // 8: raystack.shield.v1beta1.GetOrganizationsByCurrentUserResponse.organizations:type_name -> raystack.shield.v1beta1.Organization - 218, // 9: raystack.shield.v1beta1.GetProjectsByUserResponse.projects:type_name -> raystack.shield.v1beta1.Project - 218, // 10: raystack.shield.v1beta1.GetProjectsByCurrentUserResponse.projects:type_name -> raystack.shield.v1beta1.Project - 216, // 11: raystack.shield.v1beta1.GetUserResponse.user:type_name -> raystack.shield.v1beta1.User - 216, // 12: raystack.shield.v1beta1.GetCurrentUserResponse.user:type_name -> raystack.shield.v1beta1.User - 219, // 13: raystack.shield.v1beta1.GetCurrentUserResponse.serviceuser:type_name -> raystack.shield.v1beta1.ServiceUser - 216, // 14: raystack.shield.v1beta1.UpdateUserResponse.user:type_name -> raystack.shield.v1beta1.User - 216, // 15: raystack.shield.v1beta1.UpdateCurrentUserResponse.user:type_name -> raystack.shield.v1beta1.User - 13, // 16: raystack.shield.v1beta1.UpdateUserRequest.body:type_name -> raystack.shield.v1beta1.UserRequestBody - 220, // 17: raystack.shield.v1beta1.ListCurrentUserGroupsResponse.groups:type_name -> raystack.shield.v1beta1.Group - 220, // 18: raystack.shield.v1beta1.ListUserGroupsResponse.groups:type_name -> raystack.shield.v1beta1.Group - 13, // 19: raystack.shield.v1beta1.UpdateCurrentUserRequest.body:type_name -> raystack.shield.v1beta1.UserRequestBody - 221, // 20: raystack.shield.v1beta1.ListUserInvitationsResponse.invitations:type_name -> raystack.shield.v1beta1.Invitation - 219, // 21: raystack.shield.v1beta1.ListServiceUsersResponse.serviceusers:type_name -> raystack.shield.v1beta1.ServiceUser - 215, // 22: raystack.shield.v1beta1.ServiceUserRequestBody.metadata:type_name -> google.protobuf.Struct - 48, // 23: raystack.shield.v1beta1.CreateServiceUserRequest.body:type_name -> raystack.shield.v1beta1.ServiceUserRequestBody - 219, // 24: raystack.shield.v1beta1.CreateServiceUserResponse.serviceuser:type_name -> raystack.shield.v1beta1.ServiceUser - 219, // 25: raystack.shield.v1beta1.GetServiceUserResponse.serviceuser:type_name -> raystack.shield.v1beta1.ServiceUser - 48, // 26: raystack.shield.v1beta1.UpdateServiceUserRequest.body:type_name -> raystack.shield.v1beta1.ServiceUserRequestBody - 219, // 27: raystack.shield.v1beta1.UpdateServiceUserResponse.serviceuser:type_name -> raystack.shield.v1beta1.ServiceUser - 222, // 28: raystack.shield.v1beta1.CreateServiceUserKeyResponse.key:type_name -> raystack.shield.v1beta1.KeyCredential - 214, // 29: raystack.shield.v1beta1.GetServiceUserKeyResponse.keys:type_name -> raystack.shield.v1beta1.JSONWebKey - 223, // 30: raystack.shield.v1beta1.ListServiceUserKeysResponse.keys:type_name -> raystack.shield.v1beta1.ServiceUserKey - 224, // 31: raystack.shield.v1beta1.CreateServiceUserSecretResponse.secret:type_name -> raystack.shield.v1beta1.SecretCredential - 224, // 32: raystack.shield.v1beta1.ListServiceUserSecretsResponse.secrets:type_name -> raystack.shield.v1beta1.SecretCredential - 220, // 33: raystack.shield.v1beta1.ListOrganizationGroupsResponse.groups:type_name -> raystack.shield.v1beta1.Group - 225, // 34: raystack.shield.v1beta1.CreateOrganizationRoleRequest.body:type_name -> raystack.shield.v1beta1.RoleRequestBody - 226, // 35: raystack.shield.v1beta1.CreateOrganizationRoleResponse.role:type_name -> raystack.shield.v1beta1.Role - 226, // 36: raystack.shield.v1beta1.GetOrganizationRoleResponse.role:type_name -> raystack.shield.v1beta1.Role - 225, // 37: raystack.shield.v1beta1.UpdateOrganizationRoleRequest.body:type_name -> raystack.shield.v1beta1.RoleRequestBody - 226, // 38: raystack.shield.v1beta1.UpdateOrganizationRoleResponse.role:type_name -> raystack.shield.v1beta1.Role - 226, // 39: raystack.shield.v1beta1.ListRolesResponse.roles:type_name -> raystack.shield.v1beta1.Role - 226, // 40: raystack.shield.v1beta1.ListOrganizationRolesResponse.roles:type_name -> raystack.shield.v1beta1.Role - 215, // 41: raystack.shield.v1beta1.OrganizationRequestBody.metadata:type_name -> google.protobuf.Struct - 217, // 42: raystack.shield.v1beta1.ListOrganizationsResponse.organizations:type_name -> raystack.shield.v1beta1.Organization - 85, // 43: raystack.shield.v1beta1.CreateOrganizationRequest.body:type_name -> raystack.shield.v1beta1.OrganizationRequestBody - 217, // 44: raystack.shield.v1beta1.CreateOrganizationResponse.organization:type_name -> raystack.shield.v1beta1.Organization - 217, // 45: raystack.shield.v1beta1.GetOrganizationResponse.organization:type_name -> raystack.shield.v1beta1.Organization - 217, // 46: raystack.shield.v1beta1.UpdateOrganizationResponse.organization:type_name -> raystack.shield.v1beta1.Organization - 85, // 47: raystack.shield.v1beta1.UpdateOrganizationRequest.body:type_name -> raystack.shield.v1beta1.OrganizationRequestBody - 216, // 48: raystack.shield.v1beta1.ListOrganizationAdminsResponse.users:type_name -> raystack.shield.v1beta1.User - 216, // 49: raystack.shield.v1beta1.ListOrganizationUsersResponse.users:type_name -> raystack.shield.v1beta1.User - 219, // 50: raystack.shield.v1beta1.ListOrganizationServiceUsersResponse.serviceusers:type_name -> raystack.shield.v1beta1.ServiceUser - 221, // 51: raystack.shield.v1beta1.ListOrganizationInvitationsResponse.invitations:type_name -> raystack.shield.v1beta1.Invitation - 221, // 52: raystack.shield.v1beta1.CreateOrganizationInvitationResponse.invitation:type_name -> raystack.shield.v1beta1.Invitation - 221, // 53: raystack.shield.v1beta1.GetOrganizationInvitationResponse.invitation:type_name -> raystack.shield.v1beta1.Invitation - 215, // 54: raystack.shield.v1beta1.ProjectRequestBody.metadata:type_name -> google.protobuf.Struct - 120, // 55: raystack.shield.v1beta1.CreateProjectRequest.body:type_name -> raystack.shield.v1beta1.ProjectRequestBody - 218, // 56: raystack.shield.v1beta1.CreateProjectResponse.project:type_name -> raystack.shield.v1beta1.Project - 218, // 57: raystack.shield.v1beta1.GetProjectResponse.project:type_name -> raystack.shield.v1beta1.Project - 218, // 58: raystack.shield.v1beta1.UpdateProjectResponse.project:type_name -> raystack.shield.v1beta1.Project - 218, // 59: raystack.shield.v1beta1.ListOrganizationProjectsResponse.projects:type_name -> raystack.shield.v1beta1.Project - 120, // 60: raystack.shield.v1beta1.UpdateProjectRequest.body:type_name -> raystack.shield.v1beta1.ProjectRequestBody - 216, // 61: raystack.shield.v1beta1.ListProjectAdminsResponse.users:type_name -> raystack.shield.v1beta1.User - 216, // 62: raystack.shield.v1beta1.ListProjectUsersResponse.users:type_name -> raystack.shield.v1beta1.User - 215, // 63: raystack.shield.v1beta1.PolicyRequestBody.metadata:type_name -> google.protobuf.Struct - 227, // 64: raystack.shield.v1beta1.GetPermissionResponse.permission:type_name -> raystack.shield.v1beta1.Permission - 227, // 65: raystack.shield.v1beta1.ListPermissionsResponse.permissions:type_name -> raystack.shield.v1beta1.Permission - 228, // 66: raystack.shield.v1beta1.ListNamespacesResponse.namespaces:type_name -> raystack.shield.v1beta1.Namespace - 228, // 67: raystack.shield.v1beta1.GetNamespaceResponse.namespace:type_name -> raystack.shield.v1beta1.Namespace - 139, // 68: raystack.shield.v1beta1.CreatePolicyRequest.body:type_name -> raystack.shield.v1beta1.PolicyRequestBody - 229, // 69: raystack.shield.v1beta1.CreatePolicyResponse.policy:type_name -> raystack.shield.v1beta1.Policy - 229, // 70: raystack.shield.v1beta1.GetPolicyResponse.policy:type_name -> raystack.shield.v1beta1.Policy - 139, // 71: raystack.shield.v1beta1.UpdatePolicyRequest.body:type_name -> raystack.shield.v1beta1.PolicyRequestBody - 229, // 72: raystack.shield.v1beta1.UpdatePolicyResponse.policies:type_name -> raystack.shield.v1beta1.Policy - 156, // 73: raystack.shield.v1beta1.CreateRelationRequest.body:type_name -> raystack.shield.v1beta1.RelationRequestBody - 230, // 74: raystack.shield.v1beta1.CreateRelationResponse.relation:type_name -> raystack.shield.v1beta1.Relation - 230, // 75: raystack.shield.v1beta1.GetRelationResponse.relation:type_name -> raystack.shield.v1beta1.Relation - 156, // 76: raystack.shield.v1beta1.UpdateRelationRequest.body:type_name -> raystack.shield.v1beta1.RelationRequestBody - 230, // 77: raystack.shield.v1beta1.UpdateRelationResponse.relation:type_name -> raystack.shield.v1beta1.Relation - 215, // 78: raystack.shield.v1beta1.GroupRequestBody.metadata:type_name -> google.protobuf.Struct - 163, // 79: raystack.shield.v1beta1.CreateGroupRequest.body:type_name -> raystack.shield.v1beta1.GroupRequestBody - 220, // 80: raystack.shield.v1beta1.CreateGroupResponse.group:type_name -> raystack.shield.v1beta1.Group - 220, // 81: raystack.shield.v1beta1.GetGroupResponse.group:type_name -> raystack.shield.v1beta1.Group - 220, // 82: raystack.shield.v1beta1.UpdateGroupResponse.group:type_name -> raystack.shield.v1beta1.Group - 163, // 83: raystack.shield.v1beta1.UpdateGroupRequest.body:type_name -> raystack.shield.v1beta1.GroupRequestBody - 216, // 84: raystack.shield.v1beta1.ListGroupUsersResponse.users:type_name -> raystack.shield.v1beta1.User - 231, // 85: raystack.shield.v1beta1.ListProjectResourcesResponse.resources:type_name -> raystack.shield.v1beta1.Resource - 215, // 86: raystack.shield.v1beta1.ResourceRequestBody.metadata:type_name -> google.protobuf.Struct - 186, // 87: raystack.shield.v1beta1.CreateProjectResourceRequest.body:type_name -> raystack.shield.v1beta1.ResourceRequestBody - 231, // 88: raystack.shield.v1beta1.CreateProjectResourceResponse.resource:type_name -> raystack.shield.v1beta1.Resource - 231, // 89: raystack.shield.v1beta1.GetProjectResourceResponse.resource:type_name -> raystack.shield.v1beta1.Resource - 186, // 90: raystack.shield.v1beta1.UpdateProjectResourceRequest.body:type_name -> raystack.shield.v1beta1.ResourceRequestBody - 231, // 91: raystack.shield.v1beta1.UpdateProjectResourceResponse.resource:type_name -> raystack.shield.v1beta1.Resource - 197, // 92: raystack.shield.v1beta1.CreateMetaSchemaRequest.body:type_name -> raystack.shield.v1beta1.MetaSchemaRequestBody - 232, // 93: raystack.shield.v1beta1.CreateMetaSchemaResponse.metaschema:type_name -> raystack.shield.v1beta1.MetaSchema - 232, // 94: raystack.shield.v1beta1.GetMetaSchemaResponse.metaschema:type_name -> raystack.shield.v1beta1.MetaSchema - 197, // 95: raystack.shield.v1beta1.UpdateMetaSchemaRequest.body:type_name -> raystack.shield.v1beta1.MetaSchemaRequestBody - 232, // 96: raystack.shield.v1beta1.UpdateMetaSchemaResponse.metaschema:type_name -> raystack.shield.v1beta1.MetaSchema - 232, // 97: raystack.shield.v1beta1.ListMetaSchemasResponse.metaschemas:type_name -> raystack.shield.v1beta1.MetaSchema - 233, // 98: raystack.shield.v1beta1.ListOrganizationAuditLogsRequest.start_time:type_name -> google.protobuf.Timestamp - 233, // 99: raystack.shield.v1beta1.ListOrganizationAuditLogsRequest.end_time:type_name -> google.protobuf.Timestamp - 234, // 100: raystack.shield.v1beta1.ListOrganizationAuditLogsResponse.logs:type_name -> raystack.shield.v1beta1.AuditLog - 234, // 101: raystack.shield.v1beta1.CreateOrganizationAuditLogsRequest.logs:type_name -> raystack.shield.v1beta1.AuditLog - 234, // 102: raystack.shield.v1beta1.GetOrganizationAuditLogResponse.log:type_name -> raystack.shield.v1beta1.AuditLog - 14, // 103: raystack.shield.v1beta1.ShieldService.ListUsers:input_type -> raystack.shield.v1beta1.ListUsersRequest - 16, // 104: raystack.shield.v1beta1.ShieldService.CreateUser:input_type -> raystack.shield.v1beta1.CreateUserRequest - 38, // 105: raystack.shield.v1beta1.ShieldService.GetUser:input_type -> raystack.shield.v1beta1.GetUserRequest - 41, // 106: raystack.shield.v1beta1.ShieldService.ListUserGroups:input_type -> raystack.shield.v1beta1.ListUserGroupsRequest - 39, // 107: raystack.shield.v1beta1.ShieldService.ListCurrentUserGroups:input_type -> raystack.shield.v1beta1.ListCurrentUserGroupsRequest - 33, // 108: raystack.shield.v1beta1.ShieldService.GetCurrentUser:input_type -> raystack.shield.v1beta1.GetCurrentUserRequest - 37, // 109: raystack.shield.v1beta1.ShieldService.UpdateUser:input_type -> raystack.shield.v1beta1.UpdateUserRequest - 43, // 110: raystack.shield.v1beta1.ShieldService.UpdateCurrentUser:input_type -> raystack.shield.v1beta1.UpdateCurrentUserRequest - 26, // 111: raystack.shield.v1beta1.ShieldService.EnableUser:input_type -> raystack.shield.v1beta1.EnableUserRequest - 28, // 112: raystack.shield.v1beta1.ShieldService.DisableUser:input_type -> raystack.shield.v1beta1.DisableUserRequest - 30, // 113: raystack.shield.v1beta1.ShieldService.DeleteUser:input_type -> raystack.shield.v1beta1.DeleteUserRequest - 18, // 114: raystack.shield.v1beta1.ShieldService.GetOrganizationsByUser:input_type -> raystack.shield.v1beta1.GetOrganizationsByUserRequest - 20, // 115: raystack.shield.v1beta1.ShieldService.GetOrganizationsByCurrentUser:input_type -> raystack.shield.v1beta1.GetOrganizationsByCurrentUserRequest - 22, // 116: raystack.shield.v1beta1.ShieldService.GetProjectsByUser:input_type -> raystack.shield.v1beta1.GetProjectsByUserRequest - 24, // 117: raystack.shield.v1beta1.ShieldService.GetProjectsByCurrentUser:input_type -> raystack.shield.v1beta1.GetProjectsByCurrentUserRequest - 44, // 118: raystack.shield.v1beta1.ShieldService.ListUserInvitations:input_type -> raystack.shield.v1beta1.ListUserInvitationsRequest - 46, // 119: raystack.shield.v1beta1.ShieldService.ListServiceUsers:input_type -> raystack.shield.v1beta1.ListServiceUsersRequest - 49, // 120: raystack.shield.v1beta1.ShieldService.CreateServiceUser:input_type -> raystack.shield.v1beta1.CreateServiceUserRequest - 51, // 121: raystack.shield.v1beta1.ShieldService.GetServiceUser:input_type -> raystack.shield.v1beta1.GetServiceUserRequest - 55, // 122: raystack.shield.v1beta1.ShieldService.DeleteServiceUser:input_type -> raystack.shield.v1beta1.DeleteServiceUserRequest - 57, // 123: raystack.shield.v1beta1.ShieldService.CreateServiceUserKey:input_type -> raystack.shield.v1beta1.CreateServiceUserKeyRequest - 61, // 124: raystack.shield.v1beta1.ShieldService.ListServiceUserKeys:input_type -> raystack.shield.v1beta1.ListServiceUserKeysRequest - 59, // 125: raystack.shield.v1beta1.ShieldService.GetServiceUserKey:input_type -> raystack.shield.v1beta1.GetServiceUserKeyRequest - 63, // 126: raystack.shield.v1beta1.ShieldService.DeleteServiceUserKey:input_type -> raystack.shield.v1beta1.DeleteServiceUserKeyRequest - 65, // 127: raystack.shield.v1beta1.ShieldService.CreateServiceUserSecret:input_type -> raystack.shield.v1beta1.CreateServiceUserSecretRequest - 67, // 128: raystack.shield.v1beta1.ShieldService.ListServiceUserSecrets:input_type -> raystack.shield.v1beta1.ListServiceUserSecretsRequest - 69, // 129: raystack.shield.v1beta1.ShieldService.DeleteServiceUserSecret:input_type -> raystack.shield.v1beta1.DeleteServiceUserSecretRequest - 71, // 130: raystack.shield.v1beta1.ShieldService.ListOrganizationGroups:input_type -> raystack.shield.v1beta1.ListOrganizationGroupsRequest - 164, // 131: raystack.shield.v1beta1.ShieldService.CreateGroup:input_type -> raystack.shield.v1beta1.CreateGroupRequest - 165, // 132: raystack.shield.v1beta1.ShieldService.GetGroup:input_type -> raystack.shield.v1beta1.GetGroupRequest - 169, // 133: raystack.shield.v1beta1.ShieldService.UpdateGroup:input_type -> raystack.shield.v1beta1.UpdateGroupRequest - 170, // 134: raystack.shield.v1beta1.ShieldService.ListGroupUsers:input_type -> raystack.shield.v1beta1.ListGroupUsersRequest - 178, // 135: raystack.shield.v1beta1.ShieldService.AddGroupUsers:input_type -> raystack.shield.v1beta1.AddGroupUsersRequest - 180, // 136: raystack.shield.v1beta1.ShieldService.RemoveGroupUser:input_type -> raystack.shield.v1beta1.RemoveGroupUserRequest - 172, // 137: raystack.shield.v1beta1.ShieldService.EnableGroup:input_type -> raystack.shield.v1beta1.EnableGroupRequest - 174, // 138: raystack.shield.v1beta1.ShieldService.DisableGroup:input_type -> raystack.shield.v1beta1.DisableGroupRequest - 176, // 139: raystack.shield.v1beta1.ShieldService.DeleteGroup:input_type -> raystack.shield.v1beta1.DeleteGroupRequest - 79, // 140: raystack.shield.v1beta1.ShieldService.ListRoles:input_type -> raystack.shield.v1beta1.ListRolesRequest - 81, // 141: raystack.shield.v1beta1.ShieldService.ListOrganizationRoles:input_type -> raystack.shield.v1beta1.ListOrganizationRolesRequest - 73, // 142: raystack.shield.v1beta1.ShieldService.CreateOrganizationRole:input_type -> raystack.shield.v1beta1.CreateOrganizationRoleRequest - 75, // 143: raystack.shield.v1beta1.ShieldService.GetOrganizationRole:input_type -> raystack.shield.v1beta1.GetOrganizationRoleRequest - 77, // 144: raystack.shield.v1beta1.ShieldService.UpdateOrganizationRole:input_type -> raystack.shield.v1beta1.UpdateOrganizationRoleRequest - 83, // 145: raystack.shield.v1beta1.ShieldService.DeleteOrganizationRole:input_type -> raystack.shield.v1beta1.DeleteOrganizationRoleRequest - 86, // 146: raystack.shield.v1beta1.ShieldService.ListOrganizations:input_type -> raystack.shield.v1beta1.ListOrganizationsRequest - 88, // 147: raystack.shield.v1beta1.ShieldService.CreateOrganization:input_type -> raystack.shield.v1beta1.CreateOrganizationRequest - 92, // 148: raystack.shield.v1beta1.ShieldService.GetOrganization:input_type -> raystack.shield.v1beta1.GetOrganizationRequest - 93, // 149: raystack.shield.v1beta1.ShieldService.UpdateOrganization:input_type -> raystack.shield.v1beta1.UpdateOrganizationRequest - 125, // 150: raystack.shield.v1beta1.ShieldService.ListOrganizationProjects:input_type -> raystack.shield.v1beta1.ListOrganizationProjectsRequest - 94, // 151: raystack.shield.v1beta1.ShieldService.ListOrganizationAdmins:input_type -> raystack.shield.v1beta1.ListOrganizationAdminsRequest - 96, // 152: raystack.shield.v1beta1.ShieldService.ListOrganizationUsers:input_type -> raystack.shield.v1beta1.ListOrganizationUsersRequest - 98, // 153: raystack.shield.v1beta1.ShieldService.AddOrganizationUsers:input_type -> raystack.shield.v1beta1.AddOrganizationUsersRequest - 100, // 154: raystack.shield.v1beta1.ShieldService.RemoveOrganizationUser:input_type -> raystack.shield.v1beta1.RemoveOrganizationUserRequest - 102, // 155: raystack.shield.v1beta1.ShieldService.ListOrganizationServiceUsers:input_type -> raystack.shield.v1beta1.ListOrganizationServiceUsersRequest - 104, // 156: raystack.shield.v1beta1.ShieldService.ListOrganizationInvitations:input_type -> raystack.shield.v1beta1.ListOrganizationInvitationsRequest - 106, // 157: raystack.shield.v1beta1.ShieldService.CreateOrganizationInvitation:input_type -> raystack.shield.v1beta1.CreateOrganizationInvitationRequest - 108, // 158: raystack.shield.v1beta1.ShieldService.GetOrganizationInvitation:input_type -> raystack.shield.v1beta1.GetOrganizationInvitationRequest - 110, // 159: raystack.shield.v1beta1.ShieldService.AcceptOrganizationInvitation:input_type -> raystack.shield.v1beta1.AcceptOrganizationInvitationRequest - 112, // 160: raystack.shield.v1beta1.ShieldService.DeleteOrganizationInvitation:input_type -> raystack.shield.v1beta1.DeleteOrganizationInvitationRequest - 114, // 161: raystack.shield.v1beta1.ShieldService.EnableOrganization:input_type -> raystack.shield.v1beta1.EnableOrganizationRequest - 116, // 162: raystack.shield.v1beta1.ShieldService.DisableOrganization:input_type -> raystack.shield.v1beta1.DisableOrganizationRequest - 118, // 163: raystack.shield.v1beta1.ShieldService.DeleteOrganization:input_type -> raystack.shield.v1beta1.DeleteOrganizationRequest - 121, // 164: raystack.shield.v1beta1.ShieldService.CreateProject:input_type -> raystack.shield.v1beta1.CreateProjectRequest - 127, // 165: raystack.shield.v1beta1.ShieldService.GetProject:input_type -> raystack.shield.v1beta1.GetProjectRequest - 128, // 166: raystack.shield.v1beta1.ShieldService.UpdateProject:input_type -> raystack.shield.v1beta1.UpdateProjectRequest - 129, // 167: raystack.shield.v1beta1.ShieldService.ListProjectAdmins:input_type -> raystack.shield.v1beta1.ListProjectAdminsRequest - 131, // 168: raystack.shield.v1beta1.ShieldService.ListProjectUsers:input_type -> raystack.shield.v1beta1.ListProjectUsersRequest - 133, // 169: raystack.shield.v1beta1.ShieldService.EnableProject:input_type -> raystack.shield.v1beta1.EnableProjectRequest - 135, // 170: raystack.shield.v1beta1.ShieldService.DisableProject:input_type -> raystack.shield.v1beta1.DisableProjectRequest - 137, // 171: raystack.shield.v1beta1.ShieldService.DeleteProject:input_type -> raystack.shield.v1beta1.DeleteProjectRequest - 148, // 172: raystack.shield.v1beta1.ShieldService.CreatePolicy:input_type -> raystack.shield.v1beta1.CreatePolicyRequest - 150, // 173: raystack.shield.v1beta1.ShieldService.GetPolicy:input_type -> raystack.shield.v1beta1.GetPolicyRequest - 152, // 174: raystack.shield.v1beta1.ShieldService.UpdatePolicy:input_type -> raystack.shield.v1beta1.UpdatePolicyRequest - 154, // 175: raystack.shield.v1beta1.ShieldService.DeletePolicy:input_type -> raystack.shield.v1beta1.DeletePolicyRequest - 157, // 176: raystack.shield.v1beta1.ShieldService.CreateRelation:input_type -> raystack.shield.v1beta1.CreateRelationRequest - 159, // 177: raystack.shield.v1beta1.ShieldService.GetRelation:input_type -> raystack.shield.v1beta1.GetRelationRequest - 182, // 178: raystack.shield.v1beta1.ShieldService.DeleteRelation:input_type -> raystack.shield.v1beta1.DeleteRelationRequest - 142, // 179: raystack.shield.v1beta1.ShieldService.ListPermissions:input_type -> raystack.shield.v1beta1.ListPermissionsRequest - 140, // 180: raystack.shield.v1beta1.ShieldService.GetPermission:input_type -> raystack.shield.v1beta1.GetPermissionRequest - 144, // 181: raystack.shield.v1beta1.ShieldService.ListNamespaces:input_type -> raystack.shield.v1beta1.ListNamespacesRequest - 146, // 182: raystack.shield.v1beta1.ShieldService.GetNamespace:input_type -> raystack.shield.v1beta1.GetNamespaceRequest - 184, // 183: raystack.shield.v1beta1.ShieldService.ListProjectResources:input_type -> raystack.shield.v1beta1.ListProjectResourcesRequest - 187, // 184: raystack.shield.v1beta1.ShieldService.CreateProjectResource:input_type -> raystack.shield.v1beta1.CreateProjectResourceRequest - 189, // 185: raystack.shield.v1beta1.ShieldService.GetProjectResource:input_type -> raystack.shield.v1beta1.GetProjectResourceRequest - 191, // 186: raystack.shield.v1beta1.ShieldService.UpdateProjectResource:input_type -> raystack.shield.v1beta1.UpdateProjectResourceRequest - 193, // 187: raystack.shield.v1beta1.ShieldService.DeleteProjectResource:input_type -> raystack.shield.v1beta1.DeleteProjectResourceRequest - 195, // 188: raystack.shield.v1beta1.ShieldService.CheckResourcePermission:input_type -> raystack.shield.v1beta1.CheckResourcePermissionRequest - 0, // 189: raystack.shield.v1beta1.ShieldService.GetJWKs:input_type -> raystack.shield.v1beta1.GetJWKsRequest - 9, // 190: raystack.shield.v1beta1.ShieldService.ListAuthStrategies:input_type -> raystack.shield.v1beta1.ListAuthStrategiesRequest - 6, // 191: raystack.shield.v1beta1.ShieldService.Authenticate:input_type -> raystack.shield.v1beta1.AuthenticateRequest - 4, // 192: raystack.shield.v1beta1.ShieldService.AuthCallback:input_type -> raystack.shield.v1beta1.AuthCallbackRequest - 11, // 193: raystack.shield.v1beta1.ShieldService.AuthToken:input_type -> raystack.shield.v1beta1.AuthTokenRequest - 2, // 194: raystack.shield.v1beta1.ShieldService.AuthLogout:input_type -> raystack.shield.v1beta1.AuthLogoutRequest - 206, // 195: raystack.shield.v1beta1.ShieldService.ListMetaSchemas:input_type -> raystack.shield.v1beta1.ListMetaSchemasRequest - 198, // 196: raystack.shield.v1beta1.ShieldService.CreateMetaSchema:input_type -> raystack.shield.v1beta1.CreateMetaSchemaRequest - 200, // 197: raystack.shield.v1beta1.ShieldService.GetMetaSchema:input_type -> raystack.shield.v1beta1.GetMetaSchemaRequest - 202, // 198: raystack.shield.v1beta1.ShieldService.UpdateMetaSchema:input_type -> raystack.shield.v1beta1.UpdateMetaSchemaRequest - 204, // 199: raystack.shield.v1beta1.ShieldService.DeleteMetaSchema:input_type -> raystack.shield.v1beta1.DeleteMetaSchemaRequest - 208, // 200: raystack.shield.v1beta1.ShieldService.ListOrganizationAuditLogs:input_type -> raystack.shield.v1beta1.ListOrganizationAuditLogsRequest - 210, // 201: raystack.shield.v1beta1.ShieldService.CreateOrganizationAuditLogs:input_type -> raystack.shield.v1beta1.CreateOrganizationAuditLogsRequest - 212, // 202: raystack.shield.v1beta1.ShieldService.GetOrganizationAuditLog:input_type -> raystack.shield.v1beta1.GetOrganizationAuditLogRequest - 15, // 203: raystack.shield.v1beta1.ShieldService.ListUsers:output_type -> raystack.shield.v1beta1.ListUsersResponse - 17, // 204: raystack.shield.v1beta1.ShieldService.CreateUser:output_type -> raystack.shield.v1beta1.CreateUserResponse - 32, // 205: raystack.shield.v1beta1.ShieldService.GetUser:output_type -> raystack.shield.v1beta1.GetUserResponse - 42, // 206: raystack.shield.v1beta1.ShieldService.ListUserGroups:output_type -> raystack.shield.v1beta1.ListUserGroupsResponse - 40, // 207: raystack.shield.v1beta1.ShieldService.ListCurrentUserGroups:output_type -> raystack.shield.v1beta1.ListCurrentUserGroupsResponse - 34, // 208: raystack.shield.v1beta1.ShieldService.GetCurrentUser:output_type -> raystack.shield.v1beta1.GetCurrentUserResponse - 35, // 209: raystack.shield.v1beta1.ShieldService.UpdateUser:output_type -> raystack.shield.v1beta1.UpdateUserResponse - 36, // 210: raystack.shield.v1beta1.ShieldService.UpdateCurrentUser:output_type -> raystack.shield.v1beta1.UpdateCurrentUserResponse - 27, // 211: raystack.shield.v1beta1.ShieldService.EnableUser:output_type -> raystack.shield.v1beta1.EnableUserResponse - 29, // 212: raystack.shield.v1beta1.ShieldService.DisableUser:output_type -> raystack.shield.v1beta1.DisableUserResponse - 31, // 213: raystack.shield.v1beta1.ShieldService.DeleteUser:output_type -> raystack.shield.v1beta1.DeleteUserResponse - 19, // 214: raystack.shield.v1beta1.ShieldService.GetOrganizationsByUser:output_type -> raystack.shield.v1beta1.GetOrganizationsByUserResponse - 21, // 215: raystack.shield.v1beta1.ShieldService.GetOrganizationsByCurrentUser:output_type -> raystack.shield.v1beta1.GetOrganizationsByCurrentUserResponse - 23, // 216: raystack.shield.v1beta1.ShieldService.GetProjectsByUser:output_type -> raystack.shield.v1beta1.GetProjectsByUserResponse - 25, // 217: raystack.shield.v1beta1.ShieldService.GetProjectsByCurrentUser:output_type -> raystack.shield.v1beta1.GetProjectsByCurrentUserResponse - 45, // 218: raystack.shield.v1beta1.ShieldService.ListUserInvitations:output_type -> raystack.shield.v1beta1.ListUserInvitationsResponse - 47, // 219: raystack.shield.v1beta1.ShieldService.ListServiceUsers:output_type -> raystack.shield.v1beta1.ListServiceUsersResponse - 50, // 220: raystack.shield.v1beta1.ShieldService.CreateServiceUser:output_type -> raystack.shield.v1beta1.CreateServiceUserResponse - 52, // 221: raystack.shield.v1beta1.ShieldService.GetServiceUser:output_type -> raystack.shield.v1beta1.GetServiceUserResponse - 56, // 222: raystack.shield.v1beta1.ShieldService.DeleteServiceUser:output_type -> raystack.shield.v1beta1.DeleteServiceUserResponse - 58, // 223: raystack.shield.v1beta1.ShieldService.CreateServiceUserKey:output_type -> raystack.shield.v1beta1.CreateServiceUserKeyResponse - 62, // 224: raystack.shield.v1beta1.ShieldService.ListServiceUserKeys:output_type -> raystack.shield.v1beta1.ListServiceUserKeysResponse - 60, // 225: raystack.shield.v1beta1.ShieldService.GetServiceUserKey:output_type -> raystack.shield.v1beta1.GetServiceUserKeyResponse - 64, // 226: raystack.shield.v1beta1.ShieldService.DeleteServiceUserKey:output_type -> raystack.shield.v1beta1.DeleteServiceUserKeyResponse - 66, // 227: raystack.shield.v1beta1.ShieldService.CreateServiceUserSecret:output_type -> raystack.shield.v1beta1.CreateServiceUserSecretResponse - 68, // 228: raystack.shield.v1beta1.ShieldService.ListServiceUserSecrets:output_type -> raystack.shield.v1beta1.ListServiceUserSecretsResponse - 70, // 229: raystack.shield.v1beta1.ShieldService.DeleteServiceUserSecret:output_type -> raystack.shield.v1beta1.DeleteServiceUserSecretResponse - 72, // 230: raystack.shield.v1beta1.ShieldService.ListOrganizationGroups:output_type -> raystack.shield.v1beta1.ListOrganizationGroupsResponse - 166, // 231: raystack.shield.v1beta1.ShieldService.CreateGroup:output_type -> raystack.shield.v1beta1.CreateGroupResponse - 167, // 232: raystack.shield.v1beta1.ShieldService.GetGroup:output_type -> raystack.shield.v1beta1.GetGroupResponse - 168, // 233: raystack.shield.v1beta1.ShieldService.UpdateGroup:output_type -> raystack.shield.v1beta1.UpdateGroupResponse - 171, // 234: raystack.shield.v1beta1.ShieldService.ListGroupUsers:output_type -> raystack.shield.v1beta1.ListGroupUsersResponse - 179, // 235: raystack.shield.v1beta1.ShieldService.AddGroupUsers:output_type -> raystack.shield.v1beta1.AddGroupUsersResponse - 181, // 236: raystack.shield.v1beta1.ShieldService.RemoveGroupUser:output_type -> raystack.shield.v1beta1.RemoveGroupUserResponse - 173, // 237: raystack.shield.v1beta1.ShieldService.EnableGroup:output_type -> raystack.shield.v1beta1.EnableGroupResponse - 175, // 238: raystack.shield.v1beta1.ShieldService.DisableGroup:output_type -> raystack.shield.v1beta1.DisableGroupResponse - 177, // 239: raystack.shield.v1beta1.ShieldService.DeleteGroup:output_type -> raystack.shield.v1beta1.DeleteGroupResponse - 80, // 240: raystack.shield.v1beta1.ShieldService.ListRoles:output_type -> raystack.shield.v1beta1.ListRolesResponse - 82, // 241: raystack.shield.v1beta1.ShieldService.ListOrganizationRoles:output_type -> raystack.shield.v1beta1.ListOrganizationRolesResponse - 74, // 242: raystack.shield.v1beta1.ShieldService.CreateOrganizationRole:output_type -> raystack.shield.v1beta1.CreateOrganizationRoleResponse - 76, // 243: raystack.shield.v1beta1.ShieldService.GetOrganizationRole:output_type -> raystack.shield.v1beta1.GetOrganizationRoleResponse - 78, // 244: raystack.shield.v1beta1.ShieldService.UpdateOrganizationRole:output_type -> raystack.shield.v1beta1.UpdateOrganizationRoleResponse - 84, // 245: raystack.shield.v1beta1.ShieldService.DeleteOrganizationRole:output_type -> raystack.shield.v1beta1.DeleteOrganizationRoleResponse - 87, // 246: raystack.shield.v1beta1.ShieldService.ListOrganizations:output_type -> raystack.shield.v1beta1.ListOrganizationsResponse - 89, // 247: raystack.shield.v1beta1.ShieldService.CreateOrganization:output_type -> raystack.shield.v1beta1.CreateOrganizationResponse - 90, // 248: raystack.shield.v1beta1.ShieldService.GetOrganization:output_type -> raystack.shield.v1beta1.GetOrganizationResponse - 91, // 249: raystack.shield.v1beta1.ShieldService.UpdateOrganization:output_type -> raystack.shield.v1beta1.UpdateOrganizationResponse - 126, // 250: raystack.shield.v1beta1.ShieldService.ListOrganizationProjects:output_type -> raystack.shield.v1beta1.ListOrganizationProjectsResponse - 95, // 251: raystack.shield.v1beta1.ShieldService.ListOrganizationAdmins:output_type -> raystack.shield.v1beta1.ListOrganizationAdminsResponse - 97, // 252: raystack.shield.v1beta1.ShieldService.ListOrganizationUsers:output_type -> raystack.shield.v1beta1.ListOrganizationUsersResponse - 99, // 253: raystack.shield.v1beta1.ShieldService.AddOrganizationUsers:output_type -> raystack.shield.v1beta1.AddOrganizationUsersResponse - 101, // 254: raystack.shield.v1beta1.ShieldService.RemoveOrganizationUser:output_type -> raystack.shield.v1beta1.RemoveOrganizationUserResponse - 103, // 255: raystack.shield.v1beta1.ShieldService.ListOrganizationServiceUsers:output_type -> raystack.shield.v1beta1.ListOrganizationServiceUsersResponse - 105, // 256: raystack.shield.v1beta1.ShieldService.ListOrganizationInvitations:output_type -> raystack.shield.v1beta1.ListOrganizationInvitationsResponse - 107, // 257: raystack.shield.v1beta1.ShieldService.CreateOrganizationInvitation:output_type -> raystack.shield.v1beta1.CreateOrganizationInvitationResponse - 109, // 258: raystack.shield.v1beta1.ShieldService.GetOrganizationInvitation:output_type -> raystack.shield.v1beta1.GetOrganizationInvitationResponse - 111, // 259: raystack.shield.v1beta1.ShieldService.AcceptOrganizationInvitation:output_type -> raystack.shield.v1beta1.AcceptOrganizationInvitationResponse - 113, // 260: raystack.shield.v1beta1.ShieldService.DeleteOrganizationInvitation:output_type -> raystack.shield.v1beta1.DeleteOrganizationInvitationResponse - 115, // 261: raystack.shield.v1beta1.ShieldService.EnableOrganization:output_type -> raystack.shield.v1beta1.EnableOrganizationResponse - 117, // 262: raystack.shield.v1beta1.ShieldService.DisableOrganization:output_type -> raystack.shield.v1beta1.DisableOrganizationResponse - 119, // 263: raystack.shield.v1beta1.ShieldService.DeleteOrganization:output_type -> raystack.shield.v1beta1.DeleteOrganizationResponse - 122, // 264: raystack.shield.v1beta1.ShieldService.CreateProject:output_type -> raystack.shield.v1beta1.CreateProjectResponse - 123, // 265: raystack.shield.v1beta1.ShieldService.GetProject:output_type -> raystack.shield.v1beta1.GetProjectResponse - 124, // 266: raystack.shield.v1beta1.ShieldService.UpdateProject:output_type -> raystack.shield.v1beta1.UpdateProjectResponse - 130, // 267: raystack.shield.v1beta1.ShieldService.ListProjectAdmins:output_type -> raystack.shield.v1beta1.ListProjectAdminsResponse - 132, // 268: raystack.shield.v1beta1.ShieldService.ListProjectUsers:output_type -> raystack.shield.v1beta1.ListProjectUsersResponse - 134, // 269: raystack.shield.v1beta1.ShieldService.EnableProject:output_type -> raystack.shield.v1beta1.EnableProjectResponse - 136, // 270: raystack.shield.v1beta1.ShieldService.DisableProject:output_type -> raystack.shield.v1beta1.DisableProjectResponse - 138, // 271: raystack.shield.v1beta1.ShieldService.DeleteProject:output_type -> raystack.shield.v1beta1.DeleteProjectResponse - 149, // 272: raystack.shield.v1beta1.ShieldService.CreatePolicy:output_type -> raystack.shield.v1beta1.CreatePolicyResponse - 151, // 273: raystack.shield.v1beta1.ShieldService.GetPolicy:output_type -> raystack.shield.v1beta1.GetPolicyResponse - 153, // 274: raystack.shield.v1beta1.ShieldService.UpdatePolicy:output_type -> raystack.shield.v1beta1.UpdatePolicyResponse - 155, // 275: raystack.shield.v1beta1.ShieldService.DeletePolicy:output_type -> raystack.shield.v1beta1.DeletePolicyResponse - 158, // 276: raystack.shield.v1beta1.ShieldService.CreateRelation:output_type -> raystack.shield.v1beta1.CreateRelationResponse - 160, // 277: raystack.shield.v1beta1.ShieldService.GetRelation:output_type -> raystack.shield.v1beta1.GetRelationResponse - 183, // 278: raystack.shield.v1beta1.ShieldService.DeleteRelation:output_type -> raystack.shield.v1beta1.DeleteRelationResponse - 143, // 279: raystack.shield.v1beta1.ShieldService.ListPermissions:output_type -> raystack.shield.v1beta1.ListPermissionsResponse - 141, // 280: raystack.shield.v1beta1.ShieldService.GetPermission:output_type -> raystack.shield.v1beta1.GetPermissionResponse - 145, // 281: raystack.shield.v1beta1.ShieldService.ListNamespaces:output_type -> raystack.shield.v1beta1.ListNamespacesResponse - 147, // 282: raystack.shield.v1beta1.ShieldService.GetNamespace:output_type -> raystack.shield.v1beta1.GetNamespaceResponse - 185, // 283: raystack.shield.v1beta1.ShieldService.ListProjectResources:output_type -> raystack.shield.v1beta1.ListProjectResourcesResponse - 188, // 284: raystack.shield.v1beta1.ShieldService.CreateProjectResource:output_type -> raystack.shield.v1beta1.CreateProjectResourceResponse - 190, // 285: raystack.shield.v1beta1.ShieldService.GetProjectResource:output_type -> raystack.shield.v1beta1.GetProjectResourceResponse - 192, // 286: raystack.shield.v1beta1.ShieldService.UpdateProjectResource:output_type -> raystack.shield.v1beta1.UpdateProjectResourceResponse - 194, // 287: raystack.shield.v1beta1.ShieldService.DeleteProjectResource:output_type -> raystack.shield.v1beta1.DeleteProjectResourceResponse - 196, // 288: raystack.shield.v1beta1.ShieldService.CheckResourcePermission:output_type -> raystack.shield.v1beta1.CheckResourcePermissionResponse - 1, // 289: raystack.shield.v1beta1.ShieldService.GetJWKs:output_type -> raystack.shield.v1beta1.GetJWKsResponse - 10, // 290: raystack.shield.v1beta1.ShieldService.ListAuthStrategies:output_type -> raystack.shield.v1beta1.ListAuthStrategiesResponse - 7, // 291: raystack.shield.v1beta1.ShieldService.Authenticate:output_type -> raystack.shield.v1beta1.AuthenticateResponse - 5, // 292: raystack.shield.v1beta1.ShieldService.AuthCallback:output_type -> raystack.shield.v1beta1.AuthCallbackResponse - 12, // 293: raystack.shield.v1beta1.ShieldService.AuthToken:output_type -> raystack.shield.v1beta1.AuthTokenResponse - 3, // 294: raystack.shield.v1beta1.ShieldService.AuthLogout:output_type -> raystack.shield.v1beta1.AuthLogoutResponse - 207, // 295: raystack.shield.v1beta1.ShieldService.ListMetaSchemas:output_type -> raystack.shield.v1beta1.ListMetaSchemasResponse - 199, // 296: raystack.shield.v1beta1.ShieldService.CreateMetaSchema:output_type -> raystack.shield.v1beta1.CreateMetaSchemaResponse - 201, // 297: raystack.shield.v1beta1.ShieldService.GetMetaSchema:output_type -> raystack.shield.v1beta1.GetMetaSchemaResponse - 203, // 298: raystack.shield.v1beta1.ShieldService.UpdateMetaSchema:output_type -> raystack.shield.v1beta1.UpdateMetaSchemaResponse - 205, // 299: raystack.shield.v1beta1.ShieldService.DeleteMetaSchema:output_type -> raystack.shield.v1beta1.DeleteMetaSchemaResponse - 209, // 300: raystack.shield.v1beta1.ShieldService.ListOrganizationAuditLogs:output_type -> raystack.shield.v1beta1.ListOrganizationAuditLogsResponse - 211, // 301: raystack.shield.v1beta1.ShieldService.CreateOrganizationAuditLogs:output_type -> raystack.shield.v1beta1.CreateOrganizationAuditLogsResponse - 213, // 302: raystack.shield.v1beta1.ShieldService.GetOrganizationAuditLog:output_type -> raystack.shield.v1beta1.GetOrganizationAuditLogResponse + (*AuditLog)(nil), // 234: raystack.frontier.v1beta1.AuditLog +} +var file_raystack_frontier_v1beta1_frontier_proto_depIdxs = []int32{ + 214, // 0: raystack.frontier.v1beta1.GetJWKsResponse.keys:type_name -> raystack.frontier.v1beta1.JSONWebKey + 215, // 1: raystack.frontier.v1beta1.AuthStrategy.params:type_name -> google.protobuf.Struct + 8, // 2: raystack.frontier.v1beta1.ListAuthStrategiesResponse.strategies:type_name -> raystack.frontier.v1beta1.AuthStrategy + 215, // 3: raystack.frontier.v1beta1.UserRequestBody.metadata:type_name -> google.protobuf.Struct + 216, // 4: raystack.frontier.v1beta1.ListUsersResponse.users:type_name -> raystack.frontier.v1beta1.User + 13, // 5: raystack.frontier.v1beta1.CreateUserRequest.body:type_name -> raystack.frontier.v1beta1.UserRequestBody + 216, // 6: raystack.frontier.v1beta1.CreateUserResponse.user:type_name -> raystack.frontier.v1beta1.User + 217, // 7: raystack.frontier.v1beta1.GetOrganizationsByUserResponse.organizations:type_name -> raystack.frontier.v1beta1.Organization + 217, // 8: raystack.frontier.v1beta1.GetOrganizationsByCurrentUserResponse.organizations:type_name -> raystack.frontier.v1beta1.Organization + 218, // 9: raystack.frontier.v1beta1.GetProjectsByUserResponse.projects:type_name -> raystack.frontier.v1beta1.Project + 218, // 10: raystack.frontier.v1beta1.GetProjectsByCurrentUserResponse.projects:type_name -> raystack.frontier.v1beta1.Project + 216, // 11: raystack.frontier.v1beta1.GetUserResponse.user:type_name -> raystack.frontier.v1beta1.User + 216, // 12: raystack.frontier.v1beta1.GetCurrentUserResponse.user:type_name -> raystack.frontier.v1beta1.User + 219, // 13: raystack.frontier.v1beta1.GetCurrentUserResponse.serviceuser:type_name -> raystack.frontier.v1beta1.ServiceUser + 216, // 14: raystack.frontier.v1beta1.UpdateUserResponse.user:type_name -> raystack.frontier.v1beta1.User + 216, // 15: raystack.frontier.v1beta1.UpdateCurrentUserResponse.user:type_name -> raystack.frontier.v1beta1.User + 13, // 16: raystack.frontier.v1beta1.UpdateUserRequest.body:type_name -> raystack.frontier.v1beta1.UserRequestBody + 220, // 17: raystack.frontier.v1beta1.ListCurrentUserGroupsResponse.groups:type_name -> raystack.frontier.v1beta1.Group + 220, // 18: raystack.frontier.v1beta1.ListUserGroupsResponse.groups:type_name -> raystack.frontier.v1beta1.Group + 13, // 19: raystack.frontier.v1beta1.UpdateCurrentUserRequest.body:type_name -> raystack.frontier.v1beta1.UserRequestBody + 221, // 20: raystack.frontier.v1beta1.ListUserInvitationsResponse.invitations:type_name -> raystack.frontier.v1beta1.Invitation + 219, // 21: raystack.frontier.v1beta1.ListServiceUsersResponse.serviceusers:type_name -> raystack.frontier.v1beta1.ServiceUser + 215, // 22: raystack.frontier.v1beta1.ServiceUserRequestBody.metadata:type_name -> google.protobuf.Struct + 48, // 23: raystack.frontier.v1beta1.CreateServiceUserRequest.body:type_name -> raystack.frontier.v1beta1.ServiceUserRequestBody + 219, // 24: raystack.frontier.v1beta1.CreateServiceUserResponse.serviceuser:type_name -> raystack.frontier.v1beta1.ServiceUser + 219, // 25: raystack.frontier.v1beta1.GetServiceUserResponse.serviceuser:type_name -> raystack.frontier.v1beta1.ServiceUser + 48, // 26: raystack.frontier.v1beta1.UpdateServiceUserRequest.body:type_name -> raystack.frontier.v1beta1.ServiceUserRequestBody + 219, // 27: raystack.frontier.v1beta1.UpdateServiceUserResponse.serviceuser:type_name -> raystack.frontier.v1beta1.ServiceUser + 222, // 28: raystack.frontier.v1beta1.CreateServiceUserKeyResponse.key:type_name -> raystack.frontier.v1beta1.KeyCredential + 214, // 29: raystack.frontier.v1beta1.GetServiceUserKeyResponse.keys:type_name -> raystack.frontier.v1beta1.JSONWebKey + 223, // 30: raystack.frontier.v1beta1.ListServiceUserKeysResponse.keys:type_name -> raystack.frontier.v1beta1.ServiceUserKey + 224, // 31: raystack.frontier.v1beta1.CreateServiceUserSecretResponse.secret:type_name -> raystack.frontier.v1beta1.SecretCredential + 224, // 32: raystack.frontier.v1beta1.ListServiceUserSecretsResponse.secrets:type_name -> raystack.frontier.v1beta1.SecretCredential + 220, // 33: raystack.frontier.v1beta1.ListOrganizationGroupsResponse.groups:type_name -> raystack.frontier.v1beta1.Group + 225, // 34: raystack.frontier.v1beta1.CreateOrganizationRoleRequest.body:type_name -> raystack.frontier.v1beta1.RoleRequestBody + 226, // 35: raystack.frontier.v1beta1.CreateOrganizationRoleResponse.role:type_name -> raystack.frontier.v1beta1.Role + 226, // 36: raystack.frontier.v1beta1.GetOrganizationRoleResponse.role:type_name -> raystack.frontier.v1beta1.Role + 225, // 37: raystack.frontier.v1beta1.UpdateOrganizationRoleRequest.body:type_name -> raystack.frontier.v1beta1.RoleRequestBody + 226, // 38: raystack.frontier.v1beta1.UpdateOrganizationRoleResponse.role:type_name -> raystack.frontier.v1beta1.Role + 226, // 39: raystack.frontier.v1beta1.ListRolesResponse.roles:type_name -> raystack.frontier.v1beta1.Role + 226, // 40: raystack.frontier.v1beta1.ListOrganizationRolesResponse.roles:type_name -> raystack.frontier.v1beta1.Role + 215, // 41: raystack.frontier.v1beta1.OrganizationRequestBody.metadata:type_name -> google.protobuf.Struct + 217, // 42: raystack.frontier.v1beta1.ListOrganizationsResponse.organizations:type_name -> raystack.frontier.v1beta1.Organization + 85, // 43: raystack.frontier.v1beta1.CreateOrganizationRequest.body:type_name -> raystack.frontier.v1beta1.OrganizationRequestBody + 217, // 44: raystack.frontier.v1beta1.CreateOrganizationResponse.organization:type_name -> raystack.frontier.v1beta1.Organization + 217, // 45: raystack.frontier.v1beta1.GetOrganizationResponse.organization:type_name -> raystack.frontier.v1beta1.Organization + 217, // 46: raystack.frontier.v1beta1.UpdateOrganizationResponse.organization:type_name -> raystack.frontier.v1beta1.Organization + 85, // 47: raystack.frontier.v1beta1.UpdateOrganizationRequest.body:type_name -> raystack.frontier.v1beta1.OrganizationRequestBody + 216, // 48: raystack.frontier.v1beta1.ListOrganizationAdminsResponse.users:type_name -> raystack.frontier.v1beta1.User + 216, // 49: raystack.frontier.v1beta1.ListOrganizationUsersResponse.users:type_name -> raystack.frontier.v1beta1.User + 219, // 50: raystack.frontier.v1beta1.ListOrganizationServiceUsersResponse.serviceusers:type_name -> raystack.frontier.v1beta1.ServiceUser + 221, // 51: raystack.frontier.v1beta1.ListOrganizationInvitationsResponse.invitations:type_name -> raystack.frontier.v1beta1.Invitation + 221, // 52: raystack.frontier.v1beta1.CreateOrganizationInvitationResponse.invitation:type_name -> raystack.frontier.v1beta1.Invitation + 221, // 53: raystack.frontier.v1beta1.GetOrganizationInvitationResponse.invitation:type_name -> raystack.frontier.v1beta1.Invitation + 215, // 54: raystack.frontier.v1beta1.ProjectRequestBody.metadata:type_name -> google.protobuf.Struct + 120, // 55: raystack.frontier.v1beta1.CreateProjectRequest.body:type_name -> raystack.frontier.v1beta1.ProjectRequestBody + 218, // 56: raystack.frontier.v1beta1.CreateProjectResponse.project:type_name -> raystack.frontier.v1beta1.Project + 218, // 57: raystack.frontier.v1beta1.GetProjectResponse.project:type_name -> raystack.frontier.v1beta1.Project + 218, // 58: raystack.frontier.v1beta1.UpdateProjectResponse.project:type_name -> raystack.frontier.v1beta1.Project + 218, // 59: raystack.frontier.v1beta1.ListOrganizationProjectsResponse.projects:type_name -> raystack.frontier.v1beta1.Project + 120, // 60: raystack.frontier.v1beta1.UpdateProjectRequest.body:type_name -> raystack.frontier.v1beta1.ProjectRequestBody + 216, // 61: raystack.frontier.v1beta1.ListProjectAdminsResponse.users:type_name -> raystack.frontier.v1beta1.User + 216, // 62: raystack.frontier.v1beta1.ListProjectUsersResponse.users:type_name -> raystack.frontier.v1beta1.User + 215, // 63: raystack.frontier.v1beta1.PolicyRequestBody.metadata:type_name -> google.protobuf.Struct + 227, // 64: raystack.frontier.v1beta1.GetPermissionResponse.permission:type_name -> raystack.frontier.v1beta1.Permission + 227, // 65: raystack.frontier.v1beta1.ListPermissionsResponse.permissions:type_name -> raystack.frontier.v1beta1.Permission + 228, // 66: raystack.frontier.v1beta1.ListNamespacesResponse.namespaces:type_name -> raystack.frontier.v1beta1.Namespace + 228, // 67: raystack.frontier.v1beta1.GetNamespaceResponse.namespace:type_name -> raystack.frontier.v1beta1.Namespace + 139, // 68: raystack.frontier.v1beta1.CreatePolicyRequest.body:type_name -> raystack.frontier.v1beta1.PolicyRequestBody + 229, // 69: raystack.frontier.v1beta1.CreatePolicyResponse.policy:type_name -> raystack.frontier.v1beta1.Policy + 229, // 70: raystack.frontier.v1beta1.GetPolicyResponse.policy:type_name -> raystack.frontier.v1beta1.Policy + 139, // 71: raystack.frontier.v1beta1.UpdatePolicyRequest.body:type_name -> raystack.frontier.v1beta1.PolicyRequestBody + 229, // 72: raystack.frontier.v1beta1.UpdatePolicyResponse.policies:type_name -> raystack.frontier.v1beta1.Policy + 156, // 73: raystack.frontier.v1beta1.CreateRelationRequest.body:type_name -> raystack.frontier.v1beta1.RelationRequestBody + 230, // 74: raystack.frontier.v1beta1.CreateRelationResponse.relation:type_name -> raystack.frontier.v1beta1.Relation + 230, // 75: raystack.frontier.v1beta1.GetRelationResponse.relation:type_name -> raystack.frontier.v1beta1.Relation + 156, // 76: raystack.frontier.v1beta1.UpdateRelationRequest.body:type_name -> raystack.frontier.v1beta1.RelationRequestBody + 230, // 77: raystack.frontier.v1beta1.UpdateRelationResponse.relation:type_name -> raystack.frontier.v1beta1.Relation + 215, // 78: raystack.frontier.v1beta1.GroupRequestBody.metadata:type_name -> google.protobuf.Struct + 163, // 79: raystack.frontier.v1beta1.CreateGroupRequest.body:type_name -> raystack.frontier.v1beta1.GroupRequestBody + 220, // 80: raystack.frontier.v1beta1.CreateGroupResponse.group:type_name -> raystack.frontier.v1beta1.Group + 220, // 81: raystack.frontier.v1beta1.GetGroupResponse.group:type_name -> raystack.frontier.v1beta1.Group + 220, // 82: raystack.frontier.v1beta1.UpdateGroupResponse.group:type_name -> raystack.frontier.v1beta1.Group + 163, // 83: raystack.frontier.v1beta1.UpdateGroupRequest.body:type_name -> raystack.frontier.v1beta1.GroupRequestBody + 216, // 84: raystack.frontier.v1beta1.ListGroupUsersResponse.users:type_name -> raystack.frontier.v1beta1.User + 231, // 85: raystack.frontier.v1beta1.ListProjectResourcesResponse.resources:type_name -> raystack.frontier.v1beta1.Resource + 215, // 86: raystack.frontier.v1beta1.ResourceRequestBody.metadata:type_name -> google.protobuf.Struct + 186, // 87: raystack.frontier.v1beta1.CreateProjectResourceRequest.body:type_name -> raystack.frontier.v1beta1.ResourceRequestBody + 231, // 88: raystack.frontier.v1beta1.CreateProjectResourceResponse.resource:type_name -> raystack.frontier.v1beta1.Resource + 231, // 89: raystack.frontier.v1beta1.GetProjectResourceResponse.resource:type_name -> raystack.frontier.v1beta1.Resource + 186, // 90: raystack.frontier.v1beta1.UpdateProjectResourceRequest.body:type_name -> raystack.frontier.v1beta1.ResourceRequestBody + 231, // 91: raystack.frontier.v1beta1.UpdateProjectResourceResponse.resource:type_name -> raystack.frontier.v1beta1.Resource + 197, // 92: raystack.frontier.v1beta1.CreateMetaSchemaRequest.body:type_name -> raystack.frontier.v1beta1.MetaSchemaRequestBody + 232, // 93: raystack.frontier.v1beta1.CreateMetaSchemaResponse.metaschema:type_name -> raystack.frontier.v1beta1.MetaSchema + 232, // 94: raystack.frontier.v1beta1.GetMetaSchemaResponse.metaschema:type_name -> raystack.frontier.v1beta1.MetaSchema + 197, // 95: raystack.frontier.v1beta1.UpdateMetaSchemaRequest.body:type_name -> raystack.frontier.v1beta1.MetaSchemaRequestBody + 232, // 96: raystack.frontier.v1beta1.UpdateMetaSchemaResponse.metaschema:type_name -> raystack.frontier.v1beta1.MetaSchema + 232, // 97: raystack.frontier.v1beta1.ListMetaSchemasResponse.metaschemas:type_name -> raystack.frontier.v1beta1.MetaSchema + 233, // 98: raystack.frontier.v1beta1.ListOrganizationAuditLogsRequest.start_time:type_name -> google.protobuf.Timestamp + 233, // 99: raystack.frontier.v1beta1.ListOrganizationAuditLogsRequest.end_time:type_name -> google.protobuf.Timestamp + 234, // 100: raystack.frontier.v1beta1.ListOrganizationAuditLogsResponse.logs:type_name -> raystack.frontier.v1beta1.AuditLog + 234, // 101: raystack.frontier.v1beta1.CreateOrganizationAuditLogsRequest.logs:type_name -> raystack.frontier.v1beta1.AuditLog + 234, // 102: raystack.frontier.v1beta1.GetOrganizationAuditLogResponse.log:type_name -> raystack.frontier.v1beta1.AuditLog + 14, // 103: raystack.frontier.v1beta1.FrontierService.ListUsers:input_type -> raystack.frontier.v1beta1.ListUsersRequest + 16, // 104: raystack.frontier.v1beta1.FrontierService.CreateUser:input_type -> raystack.frontier.v1beta1.CreateUserRequest + 38, // 105: raystack.frontier.v1beta1.FrontierService.GetUser:input_type -> raystack.frontier.v1beta1.GetUserRequest + 41, // 106: raystack.frontier.v1beta1.FrontierService.ListUserGroups:input_type -> raystack.frontier.v1beta1.ListUserGroupsRequest + 39, // 107: raystack.frontier.v1beta1.FrontierService.ListCurrentUserGroups:input_type -> raystack.frontier.v1beta1.ListCurrentUserGroupsRequest + 33, // 108: raystack.frontier.v1beta1.FrontierService.GetCurrentUser:input_type -> raystack.frontier.v1beta1.GetCurrentUserRequest + 37, // 109: raystack.frontier.v1beta1.FrontierService.UpdateUser:input_type -> raystack.frontier.v1beta1.UpdateUserRequest + 43, // 110: raystack.frontier.v1beta1.FrontierService.UpdateCurrentUser:input_type -> raystack.frontier.v1beta1.UpdateCurrentUserRequest + 26, // 111: raystack.frontier.v1beta1.FrontierService.EnableUser:input_type -> raystack.frontier.v1beta1.EnableUserRequest + 28, // 112: raystack.frontier.v1beta1.FrontierService.DisableUser:input_type -> raystack.frontier.v1beta1.DisableUserRequest + 30, // 113: raystack.frontier.v1beta1.FrontierService.DeleteUser:input_type -> raystack.frontier.v1beta1.DeleteUserRequest + 18, // 114: raystack.frontier.v1beta1.FrontierService.GetOrganizationsByUser:input_type -> raystack.frontier.v1beta1.GetOrganizationsByUserRequest + 20, // 115: raystack.frontier.v1beta1.FrontierService.GetOrganizationsByCurrentUser:input_type -> raystack.frontier.v1beta1.GetOrganizationsByCurrentUserRequest + 22, // 116: raystack.frontier.v1beta1.FrontierService.GetProjectsByUser:input_type -> raystack.frontier.v1beta1.GetProjectsByUserRequest + 24, // 117: raystack.frontier.v1beta1.FrontierService.GetProjectsByCurrentUser:input_type -> raystack.frontier.v1beta1.GetProjectsByCurrentUserRequest + 44, // 118: raystack.frontier.v1beta1.FrontierService.ListUserInvitations:input_type -> raystack.frontier.v1beta1.ListUserInvitationsRequest + 46, // 119: raystack.frontier.v1beta1.FrontierService.ListServiceUsers:input_type -> raystack.frontier.v1beta1.ListServiceUsersRequest + 49, // 120: raystack.frontier.v1beta1.FrontierService.CreateServiceUser:input_type -> raystack.frontier.v1beta1.CreateServiceUserRequest + 51, // 121: raystack.frontier.v1beta1.FrontierService.GetServiceUser:input_type -> raystack.frontier.v1beta1.GetServiceUserRequest + 55, // 122: raystack.frontier.v1beta1.FrontierService.DeleteServiceUser:input_type -> raystack.frontier.v1beta1.DeleteServiceUserRequest + 57, // 123: raystack.frontier.v1beta1.FrontierService.CreateServiceUserKey:input_type -> raystack.frontier.v1beta1.CreateServiceUserKeyRequest + 61, // 124: raystack.frontier.v1beta1.FrontierService.ListServiceUserKeys:input_type -> raystack.frontier.v1beta1.ListServiceUserKeysRequest + 59, // 125: raystack.frontier.v1beta1.FrontierService.GetServiceUserKey:input_type -> raystack.frontier.v1beta1.GetServiceUserKeyRequest + 63, // 126: raystack.frontier.v1beta1.FrontierService.DeleteServiceUserKey:input_type -> raystack.frontier.v1beta1.DeleteServiceUserKeyRequest + 65, // 127: raystack.frontier.v1beta1.FrontierService.CreateServiceUserSecret:input_type -> raystack.frontier.v1beta1.CreateServiceUserSecretRequest + 67, // 128: raystack.frontier.v1beta1.FrontierService.ListServiceUserSecrets:input_type -> raystack.frontier.v1beta1.ListServiceUserSecretsRequest + 69, // 129: raystack.frontier.v1beta1.FrontierService.DeleteServiceUserSecret:input_type -> raystack.frontier.v1beta1.DeleteServiceUserSecretRequest + 71, // 130: raystack.frontier.v1beta1.FrontierService.ListOrganizationGroups:input_type -> raystack.frontier.v1beta1.ListOrganizationGroupsRequest + 164, // 131: raystack.frontier.v1beta1.FrontierService.CreateGroup:input_type -> raystack.frontier.v1beta1.CreateGroupRequest + 165, // 132: raystack.frontier.v1beta1.FrontierService.GetGroup:input_type -> raystack.frontier.v1beta1.GetGroupRequest + 169, // 133: raystack.frontier.v1beta1.FrontierService.UpdateGroup:input_type -> raystack.frontier.v1beta1.UpdateGroupRequest + 170, // 134: raystack.frontier.v1beta1.FrontierService.ListGroupUsers:input_type -> raystack.frontier.v1beta1.ListGroupUsersRequest + 178, // 135: raystack.frontier.v1beta1.FrontierService.AddGroupUsers:input_type -> raystack.frontier.v1beta1.AddGroupUsersRequest + 180, // 136: raystack.frontier.v1beta1.FrontierService.RemoveGroupUser:input_type -> raystack.frontier.v1beta1.RemoveGroupUserRequest + 172, // 137: raystack.frontier.v1beta1.FrontierService.EnableGroup:input_type -> raystack.frontier.v1beta1.EnableGroupRequest + 174, // 138: raystack.frontier.v1beta1.FrontierService.DisableGroup:input_type -> raystack.frontier.v1beta1.DisableGroupRequest + 176, // 139: raystack.frontier.v1beta1.FrontierService.DeleteGroup:input_type -> raystack.frontier.v1beta1.DeleteGroupRequest + 79, // 140: raystack.frontier.v1beta1.FrontierService.ListRoles:input_type -> raystack.frontier.v1beta1.ListRolesRequest + 81, // 141: raystack.frontier.v1beta1.FrontierService.ListOrganizationRoles:input_type -> raystack.frontier.v1beta1.ListOrganizationRolesRequest + 73, // 142: raystack.frontier.v1beta1.FrontierService.CreateOrganizationRole:input_type -> raystack.frontier.v1beta1.CreateOrganizationRoleRequest + 75, // 143: raystack.frontier.v1beta1.FrontierService.GetOrganizationRole:input_type -> raystack.frontier.v1beta1.GetOrganizationRoleRequest + 77, // 144: raystack.frontier.v1beta1.FrontierService.UpdateOrganizationRole:input_type -> raystack.frontier.v1beta1.UpdateOrganizationRoleRequest + 83, // 145: raystack.frontier.v1beta1.FrontierService.DeleteOrganizationRole:input_type -> raystack.frontier.v1beta1.DeleteOrganizationRoleRequest + 86, // 146: raystack.frontier.v1beta1.FrontierService.ListOrganizations:input_type -> raystack.frontier.v1beta1.ListOrganizationsRequest + 88, // 147: raystack.frontier.v1beta1.FrontierService.CreateOrganization:input_type -> raystack.frontier.v1beta1.CreateOrganizationRequest + 92, // 148: raystack.frontier.v1beta1.FrontierService.GetOrganization:input_type -> raystack.frontier.v1beta1.GetOrganizationRequest + 93, // 149: raystack.frontier.v1beta1.FrontierService.UpdateOrganization:input_type -> raystack.frontier.v1beta1.UpdateOrganizationRequest + 125, // 150: raystack.frontier.v1beta1.FrontierService.ListOrganizationProjects:input_type -> raystack.frontier.v1beta1.ListOrganizationProjectsRequest + 94, // 151: raystack.frontier.v1beta1.FrontierService.ListOrganizationAdmins:input_type -> raystack.frontier.v1beta1.ListOrganizationAdminsRequest + 96, // 152: raystack.frontier.v1beta1.FrontierService.ListOrganizationUsers:input_type -> raystack.frontier.v1beta1.ListOrganizationUsersRequest + 98, // 153: raystack.frontier.v1beta1.FrontierService.AddOrganizationUsers:input_type -> raystack.frontier.v1beta1.AddOrganizationUsersRequest + 100, // 154: raystack.frontier.v1beta1.FrontierService.RemoveOrganizationUser:input_type -> raystack.frontier.v1beta1.RemoveOrganizationUserRequest + 102, // 155: raystack.frontier.v1beta1.FrontierService.ListOrganizationServiceUsers:input_type -> raystack.frontier.v1beta1.ListOrganizationServiceUsersRequest + 104, // 156: raystack.frontier.v1beta1.FrontierService.ListOrganizationInvitations:input_type -> raystack.frontier.v1beta1.ListOrganizationInvitationsRequest + 106, // 157: raystack.frontier.v1beta1.FrontierService.CreateOrganizationInvitation:input_type -> raystack.frontier.v1beta1.CreateOrganizationInvitationRequest + 108, // 158: raystack.frontier.v1beta1.FrontierService.GetOrganizationInvitation:input_type -> raystack.frontier.v1beta1.GetOrganizationInvitationRequest + 110, // 159: raystack.frontier.v1beta1.FrontierService.AcceptOrganizationInvitation:input_type -> raystack.frontier.v1beta1.AcceptOrganizationInvitationRequest + 112, // 160: raystack.frontier.v1beta1.FrontierService.DeleteOrganizationInvitation:input_type -> raystack.frontier.v1beta1.DeleteOrganizationInvitationRequest + 114, // 161: raystack.frontier.v1beta1.FrontierService.EnableOrganization:input_type -> raystack.frontier.v1beta1.EnableOrganizationRequest + 116, // 162: raystack.frontier.v1beta1.FrontierService.DisableOrganization:input_type -> raystack.frontier.v1beta1.DisableOrganizationRequest + 118, // 163: raystack.frontier.v1beta1.FrontierService.DeleteOrganization:input_type -> raystack.frontier.v1beta1.DeleteOrganizationRequest + 121, // 164: raystack.frontier.v1beta1.FrontierService.CreateProject:input_type -> raystack.frontier.v1beta1.CreateProjectRequest + 127, // 165: raystack.frontier.v1beta1.FrontierService.GetProject:input_type -> raystack.frontier.v1beta1.GetProjectRequest + 128, // 166: raystack.frontier.v1beta1.FrontierService.UpdateProject:input_type -> raystack.frontier.v1beta1.UpdateProjectRequest + 129, // 167: raystack.frontier.v1beta1.FrontierService.ListProjectAdmins:input_type -> raystack.frontier.v1beta1.ListProjectAdminsRequest + 131, // 168: raystack.frontier.v1beta1.FrontierService.ListProjectUsers:input_type -> raystack.frontier.v1beta1.ListProjectUsersRequest + 133, // 169: raystack.frontier.v1beta1.FrontierService.EnableProject:input_type -> raystack.frontier.v1beta1.EnableProjectRequest + 135, // 170: raystack.frontier.v1beta1.FrontierService.DisableProject:input_type -> raystack.frontier.v1beta1.DisableProjectRequest + 137, // 171: raystack.frontier.v1beta1.FrontierService.DeleteProject:input_type -> raystack.frontier.v1beta1.DeleteProjectRequest + 148, // 172: raystack.frontier.v1beta1.FrontierService.CreatePolicy:input_type -> raystack.frontier.v1beta1.CreatePolicyRequest + 150, // 173: raystack.frontier.v1beta1.FrontierService.GetPolicy:input_type -> raystack.frontier.v1beta1.GetPolicyRequest + 152, // 174: raystack.frontier.v1beta1.FrontierService.UpdatePolicy:input_type -> raystack.frontier.v1beta1.UpdatePolicyRequest + 154, // 175: raystack.frontier.v1beta1.FrontierService.DeletePolicy:input_type -> raystack.frontier.v1beta1.DeletePolicyRequest + 157, // 176: raystack.frontier.v1beta1.FrontierService.CreateRelation:input_type -> raystack.frontier.v1beta1.CreateRelationRequest + 159, // 177: raystack.frontier.v1beta1.FrontierService.GetRelation:input_type -> raystack.frontier.v1beta1.GetRelationRequest + 182, // 178: raystack.frontier.v1beta1.FrontierService.DeleteRelation:input_type -> raystack.frontier.v1beta1.DeleteRelationRequest + 142, // 179: raystack.frontier.v1beta1.FrontierService.ListPermissions:input_type -> raystack.frontier.v1beta1.ListPermissionsRequest + 140, // 180: raystack.frontier.v1beta1.FrontierService.GetPermission:input_type -> raystack.frontier.v1beta1.GetPermissionRequest + 144, // 181: raystack.frontier.v1beta1.FrontierService.ListNamespaces:input_type -> raystack.frontier.v1beta1.ListNamespacesRequest + 146, // 182: raystack.frontier.v1beta1.FrontierService.GetNamespace:input_type -> raystack.frontier.v1beta1.GetNamespaceRequest + 184, // 183: raystack.frontier.v1beta1.FrontierService.ListProjectResources:input_type -> raystack.frontier.v1beta1.ListProjectResourcesRequest + 187, // 184: raystack.frontier.v1beta1.FrontierService.CreateProjectResource:input_type -> raystack.frontier.v1beta1.CreateProjectResourceRequest + 189, // 185: raystack.frontier.v1beta1.FrontierService.GetProjectResource:input_type -> raystack.frontier.v1beta1.GetProjectResourceRequest + 191, // 186: raystack.frontier.v1beta1.FrontierService.UpdateProjectResource:input_type -> raystack.frontier.v1beta1.UpdateProjectResourceRequest + 193, // 187: raystack.frontier.v1beta1.FrontierService.DeleteProjectResource:input_type -> raystack.frontier.v1beta1.DeleteProjectResourceRequest + 195, // 188: raystack.frontier.v1beta1.FrontierService.CheckResourcePermission:input_type -> raystack.frontier.v1beta1.CheckResourcePermissionRequest + 0, // 189: raystack.frontier.v1beta1.FrontierService.GetJWKs:input_type -> raystack.frontier.v1beta1.GetJWKsRequest + 9, // 190: raystack.frontier.v1beta1.FrontierService.ListAuthStrategies:input_type -> raystack.frontier.v1beta1.ListAuthStrategiesRequest + 6, // 191: raystack.frontier.v1beta1.FrontierService.Authenticate:input_type -> raystack.frontier.v1beta1.AuthenticateRequest + 4, // 192: raystack.frontier.v1beta1.FrontierService.AuthCallback:input_type -> raystack.frontier.v1beta1.AuthCallbackRequest + 11, // 193: raystack.frontier.v1beta1.FrontierService.AuthToken:input_type -> raystack.frontier.v1beta1.AuthTokenRequest + 2, // 194: raystack.frontier.v1beta1.FrontierService.AuthLogout:input_type -> raystack.frontier.v1beta1.AuthLogoutRequest + 206, // 195: raystack.frontier.v1beta1.FrontierService.ListMetaSchemas:input_type -> raystack.frontier.v1beta1.ListMetaSchemasRequest + 198, // 196: raystack.frontier.v1beta1.FrontierService.CreateMetaSchema:input_type -> raystack.frontier.v1beta1.CreateMetaSchemaRequest + 200, // 197: raystack.frontier.v1beta1.FrontierService.GetMetaSchema:input_type -> raystack.frontier.v1beta1.GetMetaSchemaRequest + 202, // 198: raystack.frontier.v1beta1.FrontierService.UpdateMetaSchema:input_type -> raystack.frontier.v1beta1.UpdateMetaSchemaRequest + 204, // 199: raystack.frontier.v1beta1.FrontierService.DeleteMetaSchema:input_type -> raystack.frontier.v1beta1.DeleteMetaSchemaRequest + 208, // 200: raystack.frontier.v1beta1.FrontierService.ListOrganizationAuditLogs:input_type -> raystack.frontier.v1beta1.ListOrganizationAuditLogsRequest + 210, // 201: raystack.frontier.v1beta1.FrontierService.CreateOrganizationAuditLogs:input_type -> raystack.frontier.v1beta1.CreateOrganizationAuditLogsRequest + 212, // 202: raystack.frontier.v1beta1.FrontierService.GetOrganizationAuditLog:input_type -> raystack.frontier.v1beta1.GetOrganizationAuditLogRequest + 15, // 203: raystack.frontier.v1beta1.FrontierService.ListUsers:output_type -> raystack.frontier.v1beta1.ListUsersResponse + 17, // 204: raystack.frontier.v1beta1.FrontierService.CreateUser:output_type -> raystack.frontier.v1beta1.CreateUserResponse + 32, // 205: raystack.frontier.v1beta1.FrontierService.GetUser:output_type -> raystack.frontier.v1beta1.GetUserResponse + 42, // 206: raystack.frontier.v1beta1.FrontierService.ListUserGroups:output_type -> raystack.frontier.v1beta1.ListUserGroupsResponse + 40, // 207: raystack.frontier.v1beta1.FrontierService.ListCurrentUserGroups:output_type -> raystack.frontier.v1beta1.ListCurrentUserGroupsResponse + 34, // 208: raystack.frontier.v1beta1.FrontierService.GetCurrentUser:output_type -> raystack.frontier.v1beta1.GetCurrentUserResponse + 35, // 209: raystack.frontier.v1beta1.FrontierService.UpdateUser:output_type -> raystack.frontier.v1beta1.UpdateUserResponse + 36, // 210: raystack.frontier.v1beta1.FrontierService.UpdateCurrentUser:output_type -> raystack.frontier.v1beta1.UpdateCurrentUserResponse + 27, // 211: raystack.frontier.v1beta1.FrontierService.EnableUser:output_type -> raystack.frontier.v1beta1.EnableUserResponse + 29, // 212: raystack.frontier.v1beta1.FrontierService.DisableUser:output_type -> raystack.frontier.v1beta1.DisableUserResponse + 31, // 213: raystack.frontier.v1beta1.FrontierService.DeleteUser:output_type -> raystack.frontier.v1beta1.DeleteUserResponse + 19, // 214: raystack.frontier.v1beta1.FrontierService.GetOrganizationsByUser:output_type -> raystack.frontier.v1beta1.GetOrganizationsByUserResponse + 21, // 215: raystack.frontier.v1beta1.FrontierService.GetOrganizationsByCurrentUser:output_type -> raystack.frontier.v1beta1.GetOrganizationsByCurrentUserResponse + 23, // 216: raystack.frontier.v1beta1.FrontierService.GetProjectsByUser:output_type -> raystack.frontier.v1beta1.GetProjectsByUserResponse + 25, // 217: raystack.frontier.v1beta1.FrontierService.GetProjectsByCurrentUser:output_type -> raystack.frontier.v1beta1.GetProjectsByCurrentUserResponse + 45, // 218: raystack.frontier.v1beta1.FrontierService.ListUserInvitations:output_type -> raystack.frontier.v1beta1.ListUserInvitationsResponse + 47, // 219: raystack.frontier.v1beta1.FrontierService.ListServiceUsers:output_type -> raystack.frontier.v1beta1.ListServiceUsersResponse + 50, // 220: raystack.frontier.v1beta1.FrontierService.CreateServiceUser:output_type -> raystack.frontier.v1beta1.CreateServiceUserResponse + 52, // 221: raystack.frontier.v1beta1.FrontierService.GetServiceUser:output_type -> raystack.frontier.v1beta1.GetServiceUserResponse + 56, // 222: raystack.frontier.v1beta1.FrontierService.DeleteServiceUser:output_type -> raystack.frontier.v1beta1.DeleteServiceUserResponse + 58, // 223: raystack.frontier.v1beta1.FrontierService.CreateServiceUserKey:output_type -> raystack.frontier.v1beta1.CreateServiceUserKeyResponse + 62, // 224: raystack.frontier.v1beta1.FrontierService.ListServiceUserKeys:output_type -> raystack.frontier.v1beta1.ListServiceUserKeysResponse + 60, // 225: raystack.frontier.v1beta1.FrontierService.GetServiceUserKey:output_type -> raystack.frontier.v1beta1.GetServiceUserKeyResponse + 64, // 226: raystack.frontier.v1beta1.FrontierService.DeleteServiceUserKey:output_type -> raystack.frontier.v1beta1.DeleteServiceUserKeyResponse + 66, // 227: raystack.frontier.v1beta1.FrontierService.CreateServiceUserSecret:output_type -> raystack.frontier.v1beta1.CreateServiceUserSecretResponse + 68, // 228: raystack.frontier.v1beta1.FrontierService.ListServiceUserSecrets:output_type -> raystack.frontier.v1beta1.ListServiceUserSecretsResponse + 70, // 229: raystack.frontier.v1beta1.FrontierService.DeleteServiceUserSecret:output_type -> raystack.frontier.v1beta1.DeleteServiceUserSecretResponse + 72, // 230: raystack.frontier.v1beta1.FrontierService.ListOrganizationGroups:output_type -> raystack.frontier.v1beta1.ListOrganizationGroupsResponse + 166, // 231: raystack.frontier.v1beta1.FrontierService.CreateGroup:output_type -> raystack.frontier.v1beta1.CreateGroupResponse + 167, // 232: raystack.frontier.v1beta1.FrontierService.GetGroup:output_type -> raystack.frontier.v1beta1.GetGroupResponse + 168, // 233: raystack.frontier.v1beta1.FrontierService.UpdateGroup:output_type -> raystack.frontier.v1beta1.UpdateGroupResponse + 171, // 234: raystack.frontier.v1beta1.FrontierService.ListGroupUsers:output_type -> raystack.frontier.v1beta1.ListGroupUsersResponse + 179, // 235: raystack.frontier.v1beta1.FrontierService.AddGroupUsers:output_type -> raystack.frontier.v1beta1.AddGroupUsersResponse + 181, // 236: raystack.frontier.v1beta1.FrontierService.RemoveGroupUser:output_type -> raystack.frontier.v1beta1.RemoveGroupUserResponse + 173, // 237: raystack.frontier.v1beta1.FrontierService.EnableGroup:output_type -> raystack.frontier.v1beta1.EnableGroupResponse + 175, // 238: raystack.frontier.v1beta1.FrontierService.DisableGroup:output_type -> raystack.frontier.v1beta1.DisableGroupResponse + 177, // 239: raystack.frontier.v1beta1.FrontierService.DeleteGroup:output_type -> raystack.frontier.v1beta1.DeleteGroupResponse + 80, // 240: raystack.frontier.v1beta1.FrontierService.ListRoles:output_type -> raystack.frontier.v1beta1.ListRolesResponse + 82, // 241: raystack.frontier.v1beta1.FrontierService.ListOrganizationRoles:output_type -> raystack.frontier.v1beta1.ListOrganizationRolesResponse + 74, // 242: raystack.frontier.v1beta1.FrontierService.CreateOrganizationRole:output_type -> raystack.frontier.v1beta1.CreateOrganizationRoleResponse + 76, // 243: raystack.frontier.v1beta1.FrontierService.GetOrganizationRole:output_type -> raystack.frontier.v1beta1.GetOrganizationRoleResponse + 78, // 244: raystack.frontier.v1beta1.FrontierService.UpdateOrganizationRole:output_type -> raystack.frontier.v1beta1.UpdateOrganizationRoleResponse + 84, // 245: raystack.frontier.v1beta1.FrontierService.DeleteOrganizationRole:output_type -> raystack.frontier.v1beta1.DeleteOrganizationRoleResponse + 87, // 246: raystack.frontier.v1beta1.FrontierService.ListOrganizations:output_type -> raystack.frontier.v1beta1.ListOrganizationsResponse + 89, // 247: raystack.frontier.v1beta1.FrontierService.CreateOrganization:output_type -> raystack.frontier.v1beta1.CreateOrganizationResponse + 90, // 248: raystack.frontier.v1beta1.FrontierService.GetOrganization:output_type -> raystack.frontier.v1beta1.GetOrganizationResponse + 91, // 249: raystack.frontier.v1beta1.FrontierService.UpdateOrganization:output_type -> raystack.frontier.v1beta1.UpdateOrganizationResponse + 126, // 250: raystack.frontier.v1beta1.FrontierService.ListOrganizationProjects:output_type -> raystack.frontier.v1beta1.ListOrganizationProjectsResponse + 95, // 251: raystack.frontier.v1beta1.FrontierService.ListOrganizationAdmins:output_type -> raystack.frontier.v1beta1.ListOrganizationAdminsResponse + 97, // 252: raystack.frontier.v1beta1.FrontierService.ListOrganizationUsers:output_type -> raystack.frontier.v1beta1.ListOrganizationUsersResponse + 99, // 253: raystack.frontier.v1beta1.FrontierService.AddOrganizationUsers:output_type -> raystack.frontier.v1beta1.AddOrganizationUsersResponse + 101, // 254: raystack.frontier.v1beta1.FrontierService.RemoveOrganizationUser:output_type -> raystack.frontier.v1beta1.RemoveOrganizationUserResponse + 103, // 255: raystack.frontier.v1beta1.FrontierService.ListOrganizationServiceUsers:output_type -> raystack.frontier.v1beta1.ListOrganizationServiceUsersResponse + 105, // 256: raystack.frontier.v1beta1.FrontierService.ListOrganizationInvitations:output_type -> raystack.frontier.v1beta1.ListOrganizationInvitationsResponse + 107, // 257: raystack.frontier.v1beta1.FrontierService.CreateOrganizationInvitation:output_type -> raystack.frontier.v1beta1.CreateOrganizationInvitationResponse + 109, // 258: raystack.frontier.v1beta1.FrontierService.GetOrganizationInvitation:output_type -> raystack.frontier.v1beta1.GetOrganizationInvitationResponse + 111, // 259: raystack.frontier.v1beta1.FrontierService.AcceptOrganizationInvitation:output_type -> raystack.frontier.v1beta1.AcceptOrganizationInvitationResponse + 113, // 260: raystack.frontier.v1beta1.FrontierService.DeleteOrganizationInvitation:output_type -> raystack.frontier.v1beta1.DeleteOrganizationInvitationResponse + 115, // 261: raystack.frontier.v1beta1.FrontierService.EnableOrganization:output_type -> raystack.frontier.v1beta1.EnableOrganizationResponse + 117, // 262: raystack.frontier.v1beta1.FrontierService.DisableOrganization:output_type -> raystack.frontier.v1beta1.DisableOrganizationResponse + 119, // 263: raystack.frontier.v1beta1.FrontierService.DeleteOrganization:output_type -> raystack.frontier.v1beta1.DeleteOrganizationResponse + 122, // 264: raystack.frontier.v1beta1.FrontierService.CreateProject:output_type -> raystack.frontier.v1beta1.CreateProjectResponse + 123, // 265: raystack.frontier.v1beta1.FrontierService.GetProject:output_type -> raystack.frontier.v1beta1.GetProjectResponse + 124, // 266: raystack.frontier.v1beta1.FrontierService.UpdateProject:output_type -> raystack.frontier.v1beta1.UpdateProjectResponse + 130, // 267: raystack.frontier.v1beta1.FrontierService.ListProjectAdmins:output_type -> raystack.frontier.v1beta1.ListProjectAdminsResponse + 132, // 268: raystack.frontier.v1beta1.FrontierService.ListProjectUsers:output_type -> raystack.frontier.v1beta1.ListProjectUsersResponse + 134, // 269: raystack.frontier.v1beta1.FrontierService.EnableProject:output_type -> raystack.frontier.v1beta1.EnableProjectResponse + 136, // 270: raystack.frontier.v1beta1.FrontierService.DisableProject:output_type -> raystack.frontier.v1beta1.DisableProjectResponse + 138, // 271: raystack.frontier.v1beta1.FrontierService.DeleteProject:output_type -> raystack.frontier.v1beta1.DeleteProjectResponse + 149, // 272: raystack.frontier.v1beta1.FrontierService.CreatePolicy:output_type -> raystack.frontier.v1beta1.CreatePolicyResponse + 151, // 273: raystack.frontier.v1beta1.FrontierService.GetPolicy:output_type -> raystack.frontier.v1beta1.GetPolicyResponse + 153, // 274: raystack.frontier.v1beta1.FrontierService.UpdatePolicy:output_type -> raystack.frontier.v1beta1.UpdatePolicyResponse + 155, // 275: raystack.frontier.v1beta1.FrontierService.DeletePolicy:output_type -> raystack.frontier.v1beta1.DeletePolicyResponse + 158, // 276: raystack.frontier.v1beta1.FrontierService.CreateRelation:output_type -> raystack.frontier.v1beta1.CreateRelationResponse + 160, // 277: raystack.frontier.v1beta1.FrontierService.GetRelation:output_type -> raystack.frontier.v1beta1.GetRelationResponse + 183, // 278: raystack.frontier.v1beta1.FrontierService.DeleteRelation:output_type -> raystack.frontier.v1beta1.DeleteRelationResponse + 143, // 279: raystack.frontier.v1beta1.FrontierService.ListPermissions:output_type -> raystack.frontier.v1beta1.ListPermissionsResponse + 141, // 280: raystack.frontier.v1beta1.FrontierService.GetPermission:output_type -> raystack.frontier.v1beta1.GetPermissionResponse + 145, // 281: raystack.frontier.v1beta1.FrontierService.ListNamespaces:output_type -> raystack.frontier.v1beta1.ListNamespacesResponse + 147, // 282: raystack.frontier.v1beta1.FrontierService.GetNamespace:output_type -> raystack.frontier.v1beta1.GetNamespaceResponse + 185, // 283: raystack.frontier.v1beta1.FrontierService.ListProjectResources:output_type -> raystack.frontier.v1beta1.ListProjectResourcesResponse + 188, // 284: raystack.frontier.v1beta1.FrontierService.CreateProjectResource:output_type -> raystack.frontier.v1beta1.CreateProjectResourceResponse + 190, // 285: raystack.frontier.v1beta1.FrontierService.GetProjectResource:output_type -> raystack.frontier.v1beta1.GetProjectResourceResponse + 192, // 286: raystack.frontier.v1beta1.FrontierService.UpdateProjectResource:output_type -> raystack.frontier.v1beta1.UpdateProjectResourceResponse + 194, // 287: raystack.frontier.v1beta1.FrontierService.DeleteProjectResource:output_type -> raystack.frontier.v1beta1.DeleteProjectResourceResponse + 196, // 288: raystack.frontier.v1beta1.FrontierService.CheckResourcePermission:output_type -> raystack.frontier.v1beta1.CheckResourcePermissionResponse + 1, // 289: raystack.frontier.v1beta1.FrontierService.GetJWKs:output_type -> raystack.frontier.v1beta1.GetJWKsResponse + 10, // 290: raystack.frontier.v1beta1.FrontierService.ListAuthStrategies:output_type -> raystack.frontier.v1beta1.ListAuthStrategiesResponse + 7, // 291: raystack.frontier.v1beta1.FrontierService.Authenticate:output_type -> raystack.frontier.v1beta1.AuthenticateResponse + 5, // 292: raystack.frontier.v1beta1.FrontierService.AuthCallback:output_type -> raystack.frontier.v1beta1.AuthCallbackResponse + 12, // 293: raystack.frontier.v1beta1.FrontierService.AuthToken:output_type -> raystack.frontier.v1beta1.AuthTokenResponse + 3, // 294: raystack.frontier.v1beta1.FrontierService.AuthLogout:output_type -> raystack.frontier.v1beta1.AuthLogoutResponse + 207, // 295: raystack.frontier.v1beta1.FrontierService.ListMetaSchemas:output_type -> raystack.frontier.v1beta1.ListMetaSchemasResponse + 199, // 296: raystack.frontier.v1beta1.FrontierService.CreateMetaSchema:output_type -> raystack.frontier.v1beta1.CreateMetaSchemaResponse + 201, // 297: raystack.frontier.v1beta1.FrontierService.GetMetaSchema:output_type -> raystack.frontier.v1beta1.GetMetaSchemaResponse + 203, // 298: raystack.frontier.v1beta1.FrontierService.UpdateMetaSchema:output_type -> raystack.frontier.v1beta1.UpdateMetaSchemaResponse + 205, // 299: raystack.frontier.v1beta1.FrontierService.DeleteMetaSchema:output_type -> raystack.frontier.v1beta1.DeleteMetaSchemaResponse + 209, // 300: raystack.frontier.v1beta1.FrontierService.ListOrganizationAuditLogs:output_type -> raystack.frontier.v1beta1.ListOrganizationAuditLogsResponse + 211, // 301: raystack.frontier.v1beta1.FrontierService.CreateOrganizationAuditLogs:output_type -> raystack.frontier.v1beta1.CreateOrganizationAuditLogsResponse + 213, // 302: raystack.frontier.v1beta1.FrontierService.GetOrganizationAuditLog:output_type -> raystack.frontier.v1beta1.GetOrganizationAuditLogResponse 203, // [203:303] is the sub-list for method output_type 103, // [103:203] is the sub-list for method input_type 103, // [103:103] is the sub-list for extension type_name @@ -14727,14 +14727,14 @@ var file_raystack_shield_v1beta1_shield_proto_depIdxs = []int32{ 0, // [0:103] is the sub-list for field type_name } -func init() { file_raystack_shield_v1beta1_shield_proto_init() } -func file_raystack_shield_v1beta1_shield_proto_init() { - if File_raystack_shield_v1beta1_shield_proto != nil { +func init() { file_raystack_frontier_v1beta1_frontier_proto_init() } +func file_raystack_frontier_v1beta1_frontier_proto_init() { + if File_raystack_frontier_v1beta1_frontier_proto != nil { return } - file_raystack_shield_v1beta1_models_proto_init() + file_raystack_frontier_v1beta1_models_proto_init() if !protoimpl.UnsafeEnabled { - file_raystack_shield_v1beta1_shield_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetJWKsRequest); i { case 0: return &v.state @@ -14746,7 +14746,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetJWKsResponse); i { case 0: return &v.state @@ -14758,7 +14758,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthLogoutRequest); i { case 0: return &v.state @@ -14770,7 +14770,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthLogoutResponse); i { case 0: return &v.state @@ -14782,7 +14782,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthCallbackRequest); i { case 0: return &v.state @@ -14794,7 +14794,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthCallbackResponse); i { case 0: return &v.state @@ -14806,7 +14806,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthenticateRequest); i { case 0: return &v.state @@ -14818,7 +14818,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthenticateResponse); i { case 0: return &v.state @@ -14830,7 +14830,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthStrategy); i { case 0: return &v.state @@ -14842,7 +14842,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[9].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAuthStrategiesRequest); i { case 0: return &v.state @@ -14854,7 +14854,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[10].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListAuthStrategiesResponse); i { case 0: return &v.state @@ -14866,7 +14866,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[11].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthTokenRequest); i { case 0: return &v.state @@ -14878,7 +14878,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AuthTokenResponse); i { case 0: return &v.state @@ -14890,7 +14890,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UserRequestBody); i { case 0: return &v.state @@ -14902,7 +14902,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUsersRequest); i { case 0: return &v.state @@ -14914,7 +14914,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUsersResponse); i { case 0: return &v.state @@ -14926,7 +14926,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateUserRequest); i { case 0: return &v.state @@ -14938,7 +14938,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateUserResponse); i { case 0: return &v.state @@ -14950,7 +14950,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[18].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationsByUserRequest); i { case 0: return &v.state @@ -14962,7 +14962,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[19].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationsByUserResponse); i { case 0: return &v.state @@ -14974,7 +14974,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[20].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationsByCurrentUserRequest); i { case 0: return &v.state @@ -14986,7 +14986,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[21].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationsByCurrentUserResponse); i { case 0: return &v.state @@ -14998,7 +14998,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[22].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectsByUserRequest); i { case 0: return &v.state @@ -15010,7 +15010,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[23].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectsByUserResponse); i { case 0: return &v.state @@ -15022,7 +15022,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[24].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectsByCurrentUserRequest); i { case 0: return &v.state @@ -15034,7 +15034,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[25].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[25].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectsByCurrentUserResponse); i { case 0: return &v.state @@ -15046,7 +15046,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[26].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[26].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableUserRequest); i { case 0: return &v.state @@ -15058,7 +15058,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[27].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[27].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableUserResponse); i { case 0: return &v.state @@ -15070,7 +15070,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[28].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[28].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableUserRequest); i { case 0: return &v.state @@ -15082,7 +15082,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[29].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[29].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableUserResponse); i { case 0: return &v.state @@ -15094,7 +15094,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[30].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[30].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteUserRequest); i { case 0: return &v.state @@ -15106,7 +15106,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[31].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[31].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteUserResponse); i { case 0: return &v.state @@ -15118,7 +15118,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[32].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[32].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetUserResponse); i { case 0: return &v.state @@ -15130,7 +15130,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[33].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[33].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetCurrentUserRequest); i { case 0: return &v.state @@ -15142,7 +15142,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[34].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[34].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetCurrentUserResponse); i { case 0: return &v.state @@ -15154,7 +15154,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[35].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[35].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateUserResponse); i { case 0: return &v.state @@ -15166,7 +15166,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[36].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[36].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateCurrentUserResponse); i { case 0: return &v.state @@ -15178,7 +15178,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[37].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[37].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateUserRequest); i { case 0: return &v.state @@ -15190,7 +15190,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[38].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[38].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetUserRequest); i { case 0: return &v.state @@ -15202,7 +15202,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[39].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[39].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListCurrentUserGroupsRequest); i { case 0: return &v.state @@ -15214,7 +15214,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[40].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[40].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListCurrentUserGroupsResponse); i { case 0: return &v.state @@ -15226,7 +15226,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[41].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[41].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUserGroupsRequest); i { case 0: return &v.state @@ -15238,7 +15238,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[42].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[42].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUserGroupsResponse); i { case 0: return &v.state @@ -15250,7 +15250,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[43].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[43].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateCurrentUserRequest); i { case 0: return &v.state @@ -15262,7 +15262,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[44].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[44].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUserInvitationsRequest); i { case 0: return &v.state @@ -15274,7 +15274,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[45].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[45].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListUserInvitationsResponse); i { case 0: return &v.state @@ -15286,7 +15286,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[46].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[46].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUsersRequest); i { case 0: return &v.state @@ -15298,7 +15298,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[47].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[47].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUsersResponse); i { case 0: return &v.state @@ -15310,7 +15310,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[48].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[48].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ServiceUserRequestBody); i { case 0: return &v.state @@ -15322,7 +15322,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[49].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[49].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserRequest); i { case 0: return &v.state @@ -15334,7 +15334,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[50].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[50].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserResponse); i { case 0: return &v.state @@ -15346,7 +15346,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[51].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[51].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetServiceUserRequest); i { case 0: return &v.state @@ -15358,7 +15358,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[52].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[52].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetServiceUserResponse); i { case 0: return &v.state @@ -15370,7 +15370,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[53].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[53].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateServiceUserRequest); i { case 0: return &v.state @@ -15382,7 +15382,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[54].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[54].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateServiceUserResponse); i { case 0: return &v.state @@ -15394,7 +15394,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[55].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[55].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserRequest); i { case 0: return &v.state @@ -15406,7 +15406,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[56].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[56].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserResponse); i { case 0: return &v.state @@ -15418,7 +15418,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[57].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[57].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserKeyRequest); i { case 0: return &v.state @@ -15430,7 +15430,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[58].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[58].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserKeyResponse); i { case 0: return &v.state @@ -15442,7 +15442,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[59].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[59].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetServiceUserKeyRequest); i { case 0: return &v.state @@ -15454,7 +15454,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[60].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[60].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetServiceUserKeyResponse); i { case 0: return &v.state @@ -15466,7 +15466,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[61].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[61].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUserKeysRequest); i { case 0: return &v.state @@ -15478,7 +15478,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[62].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[62].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUserKeysResponse); i { case 0: return &v.state @@ -15490,7 +15490,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[63].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[63].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserKeyRequest); i { case 0: return &v.state @@ -15502,7 +15502,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[64].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[64].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserKeyResponse); i { case 0: return &v.state @@ -15514,7 +15514,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[65].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[65].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserSecretRequest); i { case 0: return &v.state @@ -15526,7 +15526,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[66].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[66].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateServiceUserSecretResponse); i { case 0: return &v.state @@ -15538,7 +15538,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[67].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[67].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUserSecretsRequest); i { case 0: return &v.state @@ -15550,7 +15550,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[68].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[68].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListServiceUserSecretsResponse); i { case 0: return &v.state @@ -15562,7 +15562,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[69].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[69].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserSecretRequest); i { case 0: return &v.state @@ -15574,7 +15574,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[70].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[70].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteServiceUserSecretResponse); i { case 0: return &v.state @@ -15586,7 +15586,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[71].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[71].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationGroupsRequest); i { case 0: return &v.state @@ -15598,7 +15598,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[72].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[72].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationGroupsResponse); i { case 0: return &v.state @@ -15610,7 +15610,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[73].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[73].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationRoleRequest); i { case 0: return &v.state @@ -15622,7 +15622,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[74].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[74].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationRoleResponse); i { case 0: return &v.state @@ -15634,7 +15634,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[75].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[75].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationRoleRequest); i { case 0: return &v.state @@ -15646,7 +15646,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[76].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[76].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationRoleResponse); i { case 0: return &v.state @@ -15658,7 +15658,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[77].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[77].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateOrganizationRoleRequest); i { case 0: return &v.state @@ -15670,7 +15670,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[78].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[78].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateOrganizationRoleResponse); i { case 0: return &v.state @@ -15682,7 +15682,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[79].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[79].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListRolesRequest); i { case 0: return &v.state @@ -15694,7 +15694,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[80].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[80].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListRolesResponse); i { case 0: return &v.state @@ -15706,7 +15706,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[81].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[81].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationRolesRequest); i { case 0: return &v.state @@ -15718,7 +15718,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[82].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[82].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationRolesResponse); i { case 0: return &v.state @@ -15730,7 +15730,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[83].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[83].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationRoleRequest); i { case 0: return &v.state @@ -15742,7 +15742,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[84].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[84].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationRoleResponse); i { case 0: return &v.state @@ -15754,7 +15754,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[85].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[85].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*OrganizationRequestBody); i { case 0: return &v.state @@ -15766,7 +15766,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[86].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[86].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationsRequest); i { case 0: return &v.state @@ -15778,7 +15778,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[87].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[87].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationsResponse); i { case 0: return &v.state @@ -15790,7 +15790,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[88].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[88].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationRequest); i { case 0: return &v.state @@ -15802,7 +15802,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[89].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[89].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationResponse); i { case 0: return &v.state @@ -15814,7 +15814,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[90].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[90].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationResponse); i { case 0: return &v.state @@ -15826,7 +15826,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[91].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[91].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateOrganizationResponse); i { case 0: return &v.state @@ -15838,7 +15838,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[92].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[92].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationRequest); i { case 0: return &v.state @@ -15850,7 +15850,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[93].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[93].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateOrganizationRequest); i { case 0: return &v.state @@ -15862,7 +15862,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[94].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[94].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationAdminsRequest); i { case 0: return &v.state @@ -15874,7 +15874,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[95].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[95].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationAdminsResponse); i { case 0: return &v.state @@ -15886,7 +15886,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[96].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[96].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationUsersRequest); i { case 0: return &v.state @@ -15898,7 +15898,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[97].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[97].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationUsersResponse); i { case 0: return &v.state @@ -15910,7 +15910,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[98].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[98].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AddOrganizationUsersRequest); i { case 0: return &v.state @@ -15922,7 +15922,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[99].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[99].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AddOrganizationUsersResponse); i { case 0: return &v.state @@ -15934,7 +15934,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[100].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[100].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RemoveOrganizationUserRequest); i { case 0: return &v.state @@ -15946,7 +15946,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[101].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[101].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RemoveOrganizationUserResponse); i { case 0: return &v.state @@ -15958,7 +15958,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[102].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[102].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationServiceUsersRequest); i { case 0: return &v.state @@ -15970,7 +15970,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[103].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[103].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationServiceUsersResponse); i { case 0: return &v.state @@ -15982,7 +15982,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[104].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[104].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationInvitationsRequest); i { case 0: return &v.state @@ -15994,7 +15994,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[105].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[105].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationInvitationsResponse); i { case 0: return &v.state @@ -16006,7 +16006,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[106].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[106].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationInvitationRequest); i { case 0: return &v.state @@ -16018,7 +16018,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[107].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[107].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationInvitationResponse); i { case 0: return &v.state @@ -16030,7 +16030,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[108].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[108].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationInvitationRequest); i { case 0: return &v.state @@ -16042,7 +16042,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[109].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[109].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationInvitationResponse); i { case 0: return &v.state @@ -16054,7 +16054,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[110].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[110].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AcceptOrganizationInvitationRequest); i { case 0: return &v.state @@ -16066,7 +16066,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[111].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[111].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AcceptOrganizationInvitationResponse); i { case 0: return &v.state @@ -16078,7 +16078,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[112].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[112].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationInvitationRequest); i { case 0: return &v.state @@ -16090,7 +16090,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[113].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[113].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationInvitationResponse); i { case 0: return &v.state @@ -16102,7 +16102,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[114].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[114].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableOrganizationRequest); i { case 0: return &v.state @@ -16114,7 +16114,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[115].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[115].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableOrganizationResponse); i { case 0: return &v.state @@ -16126,7 +16126,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[116].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[116].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableOrganizationRequest); i { case 0: return &v.state @@ -16138,7 +16138,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[117].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[117].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableOrganizationResponse); i { case 0: return &v.state @@ -16150,7 +16150,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[118].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[118].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationRequest); i { case 0: return &v.state @@ -16162,7 +16162,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[119].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[119].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteOrganizationResponse); i { case 0: return &v.state @@ -16174,7 +16174,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[120].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[120].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ProjectRequestBody); i { case 0: return &v.state @@ -16186,7 +16186,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[121].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[121].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateProjectRequest); i { case 0: return &v.state @@ -16198,7 +16198,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[122].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[122].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateProjectResponse); i { case 0: return &v.state @@ -16210,7 +16210,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[123].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[123].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectResponse); i { case 0: return &v.state @@ -16222,7 +16222,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[124].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[124].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateProjectResponse); i { case 0: return &v.state @@ -16234,7 +16234,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[125].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[125].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationProjectsRequest); i { case 0: return &v.state @@ -16246,7 +16246,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[126].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[126].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationProjectsResponse); i { case 0: return &v.state @@ -16258,7 +16258,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[127].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[127].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectRequest); i { case 0: return &v.state @@ -16270,7 +16270,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[128].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[128].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateProjectRequest); i { case 0: return &v.state @@ -16282,7 +16282,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[129].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[129].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectAdminsRequest); i { case 0: return &v.state @@ -16294,7 +16294,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[130].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[130].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectAdminsResponse); i { case 0: return &v.state @@ -16306,7 +16306,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[131].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[131].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectUsersRequest); i { case 0: return &v.state @@ -16318,7 +16318,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[132].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[132].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectUsersResponse); i { case 0: return &v.state @@ -16330,7 +16330,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[133].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[133].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableProjectRequest); i { case 0: return &v.state @@ -16342,7 +16342,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[134].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[134].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableProjectResponse); i { case 0: return &v.state @@ -16354,7 +16354,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[135].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[135].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableProjectRequest); i { case 0: return &v.state @@ -16366,7 +16366,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[136].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[136].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableProjectResponse); i { case 0: return &v.state @@ -16378,7 +16378,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[137].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[137].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteProjectRequest); i { case 0: return &v.state @@ -16390,7 +16390,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[138].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[138].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteProjectResponse); i { case 0: return &v.state @@ -16402,7 +16402,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[139].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[139].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*PolicyRequestBody); i { case 0: return &v.state @@ -16414,7 +16414,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[140].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[140].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetPermissionRequest); i { case 0: return &v.state @@ -16426,7 +16426,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[141].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[141].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetPermissionResponse); i { case 0: return &v.state @@ -16438,7 +16438,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[142].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[142].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListPermissionsRequest); i { case 0: return &v.state @@ -16450,7 +16450,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[143].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[143].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListPermissionsResponse); i { case 0: return &v.state @@ -16462,7 +16462,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[144].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[144].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListNamespacesRequest); i { case 0: return &v.state @@ -16474,7 +16474,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[145].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[145].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListNamespacesResponse); i { case 0: return &v.state @@ -16486,7 +16486,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[146].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[146].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetNamespaceRequest); i { case 0: return &v.state @@ -16498,7 +16498,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[147].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[147].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetNamespaceResponse); i { case 0: return &v.state @@ -16510,7 +16510,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[148].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[148].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreatePolicyRequest); i { case 0: return &v.state @@ -16522,7 +16522,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[149].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[149].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreatePolicyResponse); i { case 0: return &v.state @@ -16534,7 +16534,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[150].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[150].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetPolicyRequest); i { case 0: return &v.state @@ -16546,7 +16546,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[151].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[151].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetPolicyResponse); i { case 0: return &v.state @@ -16558,7 +16558,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[152].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[152].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdatePolicyRequest); i { case 0: return &v.state @@ -16570,7 +16570,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[153].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[153].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdatePolicyResponse); i { case 0: return &v.state @@ -16582,7 +16582,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[154].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[154].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeletePolicyRequest); i { case 0: return &v.state @@ -16594,7 +16594,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[155].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[155].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeletePolicyResponse); i { case 0: return &v.state @@ -16606,7 +16606,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[156].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[156].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RelationRequestBody); i { case 0: return &v.state @@ -16618,7 +16618,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[157].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[157].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateRelationRequest); i { case 0: return &v.state @@ -16630,7 +16630,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[158].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[158].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateRelationResponse); i { case 0: return &v.state @@ -16642,7 +16642,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[159].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[159].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetRelationRequest); i { case 0: return &v.state @@ -16654,7 +16654,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[160].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[160].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetRelationResponse); i { case 0: return &v.state @@ -16666,7 +16666,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[161].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[161].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateRelationRequest); i { case 0: return &v.state @@ -16678,7 +16678,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[162].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[162].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateRelationResponse); i { case 0: return &v.state @@ -16690,7 +16690,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[163].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[163].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GroupRequestBody); i { case 0: return &v.state @@ -16702,7 +16702,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[164].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[164].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateGroupRequest); i { case 0: return &v.state @@ -16714,7 +16714,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[165].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[165].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetGroupRequest); i { case 0: return &v.state @@ -16726,7 +16726,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[166].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[166].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateGroupResponse); i { case 0: return &v.state @@ -16738,7 +16738,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[167].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[167].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetGroupResponse); i { case 0: return &v.state @@ -16750,7 +16750,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[168].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[168].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateGroupResponse); i { case 0: return &v.state @@ -16762,7 +16762,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[169].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[169].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateGroupRequest); i { case 0: return &v.state @@ -16774,7 +16774,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[170].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[170].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListGroupUsersRequest); i { case 0: return &v.state @@ -16786,7 +16786,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[171].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[171].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListGroupUsersResponse); i { case 0: return &v.state @@ -16798,7 +16798,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[172].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[172].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableGroupRequest); i { case 0: return &v.state @@ -16810,7 +16810,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[173].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[173].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*EnableGroupResponse); i { case 0: return &v.state @@ -16822,7 +16822,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[174].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[174].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableGroupRequest); i { case 0: return &v.state @@ -16834,7 +16834,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[175].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[175].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DisableGroupResponse); i { case 0: return &v.state @@ -16846,7 +16846,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[176].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[176].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteGroupRequest); i { case 0: return &v.state @@ -16858,7 +16858,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[177].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[177].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteGroupResponse); i { case 0: return &v.state @@ -16870,7 +16870,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[178].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[178].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AddGroupUsersRequest); i { case 0: return &v.state @@ -16882,7 +16882,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[179].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[179].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*AddGroupUsersResponse); i { case 0: return &v.state @@ -16894,7 +16894,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[180].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[180].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RemoveGroupUserRequest); i { case 0: return &v.state @@ -16906,7 +16906,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[181].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[181].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*RemoveGroupUserResponse); i { case 0: return &v.state @@ -16918,7 +16918,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[182].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[182].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteRelationRequest); i { case 0: return &v.state @@ -16930,7 +16930,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[183].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[183].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteRelationResponse); i { case 0: return &v.state @@ -16942,7 +16942,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[184].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[184].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectResourcesRequest); i { case 0: return &v.state @@ -16954,7 +16954,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[185].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[185].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListProjectResourcesResponse); i { case 0: return &v.state @@ -16966,7 +16966,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[186].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[186].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ResourceRequestBody); i { case 0: return &v.state @@ -16978,7 +16978,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[187].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[187].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateProjectResourceRequest); i { case 0: return &v.state @@ -16990,7 +16990,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[188].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[188].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateProjectResourceResponse); i { case 0: return &v.state @@ -17002,7 +17002,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[189].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[189].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectResourceRequest); i { case 0: return &v.state @@ -17014,7 +17014,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[190].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[190].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetProjectResourceResponse); i { case 0: return &v.state @@ -17026,7 +17026,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[191].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[191].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateProjectResourceRequest); i { case 0: return &v.state @@ -17038,7 +17038,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[192].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[192].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateProjectResourceResponse); i { case 0: return &v.state @@ -17050,7 +17050,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[193].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[193].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteProjectResourceRequest); i { case 0: return &v.state @@ -17062,7 +17062,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[194].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[194].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteProjectResourceResponse); i { case 0: return &v.state @@ -17074,7 +17074,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[195].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[195].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CheckResourcePermissionRequest); i { case 0: return &v.state @@ -17086,7 +17086,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[196].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[196].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CheckResourcePermissionResponse); i { case 0: return &v.state @@ -17098,7 +17098,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[197].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[197].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*MetaSchemaRequestBody); i { case 0: return &v.state @@ -17110,7 +17110,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[198].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[198].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateMetaSchemaRequest); i { case 0: return &v.state @@ -17122,7 +17122,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[199].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[199].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateMetaSchemaResponse); i { case 0: return &v.state @@ -17134,7 +17134,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[200].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[200].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetMetaSchemaRequest); i { case 0: return &v.state @@ -17146,7 +17146,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[201].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[201].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetMetaSchemaResponse); i { case 0: return &v.state @@ -17158,7 +17158,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[202].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[202].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateMetaSchemaRequest); i { case 0: return &v.state @@ -17170,7 +17170,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[203].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[203].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*UpdateMetaSchemaResponse); i { case 0: return &v.state @@ -17182,7 +17182,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[204].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[204].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteMetaSchemaRequest); i { case 0: return &v.state @@ -17194,7 +17194,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[205].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[205].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*DeleteMetaSchemaResponse); i { case 0: return &v.state @@ -17206,7 +17206,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[206].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[206].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListMetaSchemasRequest); i { case 0: return &v.state @@ -17218,7 +17218,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[207].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[207].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListMetaSchemasResponse); i { case 0: return &v.state @@ -17230,7 +17230,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[208].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[208].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationAuditLogsRequest); i { case 0: return &v.state @@ -17242,7 +17242,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[209].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[209].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ListOrganizationAuditLogsResponse); i { case 0: return &v.state @@ -17254,7 +17254,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[210].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[210].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationAuditLogsRequest); i { case 0: return &v.state @@ -17266,7 +17266,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[211].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[211].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CreateOrganizationAuditLogsResponse); i { case 0: return &v.state @@ -17278,7 +17278,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[212].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[212].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationAuditLogRequest); i { case 0: return &v.state @@ -17290,7 +17290,7 @@ func file_raystack_shield_v1beta1_shield_proto_init() { return nil } } - file_raystack_shield_v1beta1_shield_proto_msgTypes[213].Exporter = func(v interface{}, i int) interface{} { + file_raystack_frontier_v1beta1_frontier_proto_msgTypes[213].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*GetOrganizationAuditLogResponse); i { case 0: return &v.state @@ -17307,18 +17307,18 @@ func file_raystack_shield_v1beta1_shield_proto_init() { out := protoimpl.TypeBuilder{ File: protoimpl.DescBuilder{ GoPackagePath: reflect.TypeOf(x{}).PkgPath(), - RawDescriptor: file_raystack_shield_v1beta1_shield_proto_rawDesc, + RawDescriptor: file_raystack_frontier_v1beta1_frontier_proto_rawDesc, NumEnums: 0, NumMessages: 214, NumExtensions: 0, NumServices: 1, }, - GoTypes: file_raystack_shield_v1beta1_shield_proto_goTypes, - DependencyIndexes: file_raystack_shield_v1beta1_shield_proto_depIdxs, - MessageInfos: file_raystack_shield_v1beta1_shield_proto_msgTypes, + GoTypes: file_raystack_frontier_v1beta1_frontier_proto_goTypes, + DependencyIndexes: file_raystack_frontier_v1beta1_frontier_proto_depIdxs, + MessageInfos: file_raystack_frontier_v1beta1_frontier_proto_msgTypes, }.Build() - File_raystack_shield_v1beta1_shield_proto = out.File - file_raystack_shield_v1beta1_shield_proto_rawDesc = nil - file_raystack_shield_v1beta1_shield_proto_goTypes = nil - file_raystack_shield_v1beta1_shield_proto_depIdxs = nil + File_raystack_frontier_v1beta1_frontier_proto = out.File + file_raystack_frontier_v1beta1_frontier_proto_rawDesc = nil + file_raystack_frontier_v1beta1_frontier_proto_goTypes = nil + file_raystack_frontier_v1beta1_frontier_proto_depIdxs = nil } diff --git a/proto/v1beta1/shield.pb.gw.go b/proto/v1beta1/shield.pb.gw.go index 9c789e26a..1d4ea986e 100644 --- a/proto/v1beta1/shield.pb.gw.go +++ b/proto/v1beta1/shield.pb.gw.go @@ -1,12 +1,12 @@ // Code generated by protoc-gen-grpc-gateway. DO NOT EDIT. -// source: raystack/shield/v1beta1/shield.proto +// source: raystack/frontier/v1beta1/frontier.proto /* -Package shieldv1beta1 is a reverse proxy. +Package frontierv1beta1 is a reverse proxy. It translates gRPC into RESTful JSON APIs. */ -package shieldv1beta1 +package frontierv1beta1 import ( "context" @@ -32,17 +32,17 @@ var _ = utilities.NewDoubleArray var _ = metadata.Join var ( - filter_ShieldService_ListUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} + filter_FrontierService_ListUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} ) -func request_ShieldService_ListUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUsersRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -51,14 +51,14 @@ func request_ShieldService_ListUsers_0(ctx context.Context, marshaler runtime.Ma } -func local_request_ShieldService_ListUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUsersRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -67,7 +67,7 @@ func local_request_ShieldService_ListUsers_0(ctx context.Context, marshaler runt } -func request_ShieldService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateUserRequest var metadata runtime.ServerMetadata @@ -84,7 +84,7 @@ func request_ShieldService_CreateUser_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateUserRequest var metadata runtime.ServerMetadata @@ -101,7 +101,7 @@ func local_request_ShieldService_CreateUser_0(ctx context.Context, marshaler run } -func request_ShieldService_GetUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetUserRequest var metadata runtime.ServerMetadata @@ -127,7 +127,7 @@ func request_ShieldService_GetUser_0(ctx context.Context, marshaler runtime.Mars } -func local_request_ShieldService_GetUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetUserRequest var metadata runtime.ServerMetadata @@ -154,10 +154,10 @@ func local_request_ShieldService_GetUser_0(ctx context.Context, marshaler runtim } var ( - filter_ShieldService_ListUserGroups_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} + filter_FrontierService_ListUserGroups_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} ) -func request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUserGroupsRequest var metadata runtime.ServerMetadata @@ -181,7 +181,7 @@ func request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler runti if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListUserGroups_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListUserGroups_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -190,7 +190,7 @@ func request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUserGroupsRequest var metadata runtime.ServerMetadata @@ -214,7 +214,7 @@ func local_request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListUserGroups_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListUserGroups_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -223,7 +223,7 @@ func local_request_ShieldService_ListUserGroups_0(ctx context.Context, marshaler } -func request_ShieldService_ListCurrentUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListCurrentUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListCurrentUserGroupsRequest var metadata runtime.ServerMetadata @@ -232,7 +232,7 @@ func request_ShieldService_ListCurrentUserGroups_0(ctx context.Context, marshale } -func local_request_ShieldService_ListCurrentUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListCurrentUserGroups_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListCurrentUserGroupsRequest var metadata runtime.ServerMetadata @@ -241,7 +241,7 @@ func local_request_ShieldService_ListCurrentUserGroups_0(ctx context.Context, ma } -func request_ShieldService_GetCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetCurrentUserRequest var metadata runtime.ServerMetadata @@ -250,7 +250,7 @@ func request_ShieldService_GetCurrentUser_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_GetCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetCurrentUserRequest var metadata runtime.ServerMetadata @@ -259,7 +259,7 @@ func local_request_ShieldService_GetCurrentUser_0(ctx context.Context, marshaler } -func request_ShieldService_UpdateUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateUserRequest var metadata runtime.ServerMetadata @@ -293,7 +293,7 @@ func request_ShieldService_UpdateUser_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_UpdateUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateUserRequest var metadata runtime.ServerMetadata @@ -327,7 +327,7 @@ func local_request_ShieldService_UpdateUser_0(ctx context.Context, marshaler run } -func request_ShieldService_UpdateCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateCurrentUserRequest var metadata runtime.ServerMetadata @@ -344,7 +344,7 @@ func request_ShieldService_UpdateCurrentUser_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_UpdateCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateCurrentUserRequest var metadata runtime.ServerMetadata @@ -361,7 +361,7 @@ func local_request_ShieldService_UpdateCurrentUser_0(ctx context.Context, marsha } -func request_ShieldService_EnableUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_EnableUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableUserRequest var metadata runtime.ServerMetadata @@ -395,7 +395,7 @@ func request_ShieldService_EnableUser_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_EnableUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_EnableUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableUserRequest var metadata runtime.ServerMetadata @@ -429,7 +429,7 @@ func local_request_ShieldService_EnableUser_0(ctx context.Context, marshaler run } -func request_ShieldService_DisableUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DisableUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableUserRequest var metadata runtime.ServerMetadata @@ -463,7 +463,7 @@ func request_ShieldService_DisableUser_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_DisableUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DisableUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableUserRequest var metadata runtime.ServerMetadata @@ -497,7 +497,7 @@ func local_request_ShieldService_DisableUser_0(ctx context.Context, marshaler ru } -func request_ShieldService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteUserRequest var metadata runtime.ServerMetadata @@ -523,7 +523,7 @@ func request_ShieldService_DeleteUser_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteUserRequest var metadata runtime.ServerMetadata @@ -549,7 +549,7 @@ func local_request_ShieldService_DeleteUser_0(ctx context.Context, marshaler run } -func request_ShieldService_GetOrganizationsByUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganizationsByUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationsByUserRequest var metadata runtime.ServerMetadata @@ -575,7 +575,7 @@ func request_ShieldService_GetOrganizationsByUser_0(ctx context.Context, marshal } -func local_request_ShieldService_GetOrganizationsByUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganizationsByUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationsByUserRequest var metadata runtime.ServerMetadata @@ -601,7 +601,7 @@ func local_request_ShieldService_GetOrganizationsByUser_0(ctx context.Context, m } -func request_ShieldService_GetOrganizationsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganizationsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationsByCurrentUserRequest var metadata runtime.ServerMetadata @@ -610,7 +610,7 @@ func request_ShieldService_GetOrganizationsByCurrentUser_0(ctx context.Context, } -func local_request_ShieldService_GetOrganizationsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganizationsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationsByCurrentUserRequest var metadata runtime.ServerMetadata @@ -619,7 +619,7 @@ func local_request_ShieldService_GetOrganizationsByCurrentUser_0(ctx context.Con } -func request_ShieldService_GetProjectsByUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetProjectsByUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectsByUserRequest var metadata runtime.ServerMetadata @@ -645,7 +645,7 @@ func request_ShieldService_GetProjectsByUser_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_GetProjectsByUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetProjectsByUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectsByUserRequest var metadata runtime.ServerMetadata @@ -671,7 +671,7 @@ func local_request_ShieldService_GetProjectsByUser_0(ctx context.Context, marsha } -func request_ShieldService_GetProjectsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetProjectsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectsByCurrentUserRequest var metadata runtime.ServerMetadata @@ -680,7 +680,7 @@ func request_ShieldService_GetProjectsByCurrentUser_0(ctx context.Context, marsh } -func local_request_ShieldService_GetProjectsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetProjectsByCurrentUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectsByCurrentUserRequest var metadata runtime.ServerMetadata @@ -689,7 +689,7 @@ func local_request_ShieldService_GetProjectsByCurrentUser_0(ctx context.Context, } -func request_ShieldService_ListUserInvitations_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListUserInvitations_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUserInvitationsRequest var metadata runtime.ServerMetadata @@ -715,7 +715,7 @@ func request_ShieldService_ListUserInvitations_0(ctx context.Context, marshaler } -func local_request_ShieldService_ListUserInvitations_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListUserInvitations_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListUserInvitationsRequest var metadata runtime.ServerMetadata @@ -742,17 +742,17 @@ func local_request_ShieldService_ListUserInvitations_0(ctx context.Context, mars } var ( - filter_ShieldService_ListServiceUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} + filter_FrontierService_ListServiceUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} ) -func request_ShieldService_ListServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUsersRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListServiceUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListServiceUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -761,14 +761,14 @@ func request_ShieldService_ListServiceUsers_0(ctx context.Context, marshaler run } -func local_request_ShieldService_ListServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUsersRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListServiceUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListServiceUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -777,7 +777,7 @@ func local_request_ShieldService_ListServiceUsers_0(ctx context.Context, marshal } -func request_ShieldService_CreateServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserRequest var metadata runtime.ServerMetadata @@ -794,7 +794,7 @@ func request_ShieldService_CreateServiceUser_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_CreateServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserRequest var metadata runtime.ServerMetadata @@ -811,7 +811,7 @@ func local_request_ShieldService_CreateServiceUser_0(ctx context.Context, marsha } -func request_ShieldService_GetServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetServiceUserRequest var metadata runtime.ServerMetadata @@ -837,7 +837,7 @@ func request_ShieldService_GetServiceUser_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_GetServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetServiceUserRequest var metadata runtime.ServerMetadata @@ -864,10 +864,10 @@ func local_request_ShieldService_GetServiceUser_0(ctx context.Context, marshaler } var ( - filter_ShieldService_DeleteServiceUser_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} + filter_FrontierService_DeleteServiceUser_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} ) -func request_ShieldService_DeleteServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserRequest var metadata runtime.ServerMetadata @@ -891,7 +891,7 @@ func request_ShieldService_DeleteServiceUser_0(ctx context.Context, marshaler ru if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_DeleteServiceUser_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_DeleteServiceUser_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -900,7 +900,7 @@ func request_ShieldService_DeleteServiceUser_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_DeleteServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteServiceUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserRequest var metadata runtime.ServerMetadata @@ -924,7 +924,7 @@ func local_request_ShieldService_DeleteServiceUser_0(ctx context.Context, marsha if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_DeleteServiceUser_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_DeleteServiceUser_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -933,7 +933,7 @@ func local_request_ShieldService_DeleteServiceUser_0(ctx context.Context, marsha } -func request_ShieldService_CreateServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -967,7 +967,7 @@ func request_ShieldService_CreateServiceUserKey_0(ctx context.Context, marshaler } -func local_request_ShieldService_CreateServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -1001,7 +1001,7 @@ func local_request_ShieldService_CreateServiceUserKey_0(ctx context.Context, mar } -func request_ShieldService_ListServiceUserKeys_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListServiceUserKeys_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUserKeysRequest var metadata runtime.ServerMetadata @@ -1027,7 +1027,7 @@ func request_ShieldService_ListServiceUserKeys_0(ctx context.Context, marshaler } -func local_request_ShieldService_ListServiceUserKeys_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListServiceUserKeys_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUserKeysRequest var metadata runtime.ServerMetadata @@ -1053,7 +1053,7 @@ func local_request_ShieldService_ListServiceUserKeys_0(ctx context.Context, mars } -func request_ShieldService_GetServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -1089,7 +1089,7 @@ func request_ShieldService_GetServiceUserKey_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_GetServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -1125,7 +1125,7 @@ func local_request_ShieldService_GetServiceUserKey_0(ctx context.Context, marsha } -func request_ShieldService_DeleteServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -1161,7 +1161,7 @@ func request_ShieldService_DeleteServiceUserKey_0(ctx context.Context, marshaler } -func local_request_ShieldService_DeleteServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteServiceUserKey_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserKeyRequest var metadata runtime.ServerMetadata @@ -1197,7 +1197,7 @@ func local_request_ShieldService_DeleteServiceUserKey_0(ctx context.Context, mar } -func request_ShieldService_CreateServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserSecretRequest var metadata runtime.ServerMetadata @@ -1231,7 +1231,7 @@ func request_ShieldService_CreateServiceUserSecret_0(ctx context.Context, marsha } -func local_request_ShieldService_CreateServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateServiceUserSecretRequest var metadata runtime.ServerMetadata @@ -1265,7 +1265,7 @@ func local_request_ShieldService_CreateServiceUserSecret_0(ctx context.Context, } -func request_ShieldService_ListServiceUserSecrets_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListServiceUserSecrets_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUserSecretsRequest var metadata runtime.ServerMetadata @@ -1291,7 +1291,7 @@ func request_ShieldService_ListServiceUserSecrets_0(ctx context.Context, marshal } -func local_request_ShieldService_ListServiceUserSecrets_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListServiceUserSecrets_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListServiceUserSecretsRequest var metadata runtime.ServerMetadata @@ -1317,7 +1317,7 @@ func local_request_ShieldService_ListServiceUserSecrets_0(ctx context.Context, m } -func request_ShieldService_DeleteServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserSecretRequest var metadata runtime.ServerMetadata @@ -1353,7 +1353,7 @@ func request_ShieldService_DeleteServiceUserSecret_0(ctx context.Context, marsha } -func local_request_ShieldService_DeleteServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteServiceUserSecret_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteServiceUserSecretRequest var metadata runtime.ServerMetadata @@ -1390,10 +1390,10 @@ func local_request_ShieldService_DeleteServiceUserSecret_0(ctx context.Context, } var ( - filter_ShieldService_ListOrganizationGroups_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_ListOrganizationGroups_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_ListOrganizationGroups_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationGroups_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationGroupsRequest var metadata runtime.ServerMetadata @@ -1417,7 +1417,7 @@ func request_ShieldService_ListOrganizationGroups_0(ctx context.Context, marshal if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationGroups_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationGroups_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -1426,7 +1426,7 @@ func request_ShieldService_ListOrganizationGroups_0(ctx context.Context, marshal } -func local_request_ShieldService_ListOrganizationGroups_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationGroups_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationGroupsRequest var metadata runtime.ServerMetadata @@ -1450,7 +1450,7 @@ func local_request_ShieldService_ListOrganizationGroups_0(ctx context.Context, m if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationGroups_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationGroups_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -1459,7 +1459,7 @@ func local_request_ShieldService_ListOrganizationGroups_0(ctx context.Context, m } -func request_ShieldService_CreateGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateGroupRequest var metadata runtime.ServerMetadata @@ -1493,7 +1493,7 @@ func request_ShieldService_CreateGroup_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_CreateGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateGroupRequest var metadata runtime.ServerMetadata @@ -1527,7 +1527,7 @@ func local_request_ShieldService_CreateGroup_0(ctx context.Context, marshaler ru } -func request_ShieldService_GetGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetGroupRequest var metadata runtime.ServerMetadata @@ -1563,7 +1563,7 @@ func request_ShieldService_GetGroup_0(ctx context.Context, marshaler runtime.Mar } -func local_request_ShieldService_GetGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetGroupRequest var metadata runtime.ServerMetadata @@ -1599,7 +1599,7 @@ func local_request_ShieldService_GetGroup_0(ctx context.Context, marshaler runti } -func request_ShieldService_UpdateGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateGroupRequest var metadata runtime.ServerMetadata @@ -1643,7 +1643,7 @@ func request_ShieldService_UpdateGroup_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_UpdateGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateGroupRequest var metadata runtime.ServerMetadata @@ -1687,7 +1687,7 @@ func local_request_ShieldService_UpdateGroup_0(ctx context.Context, marshaler ru } -func request_ShieldService_ListGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListGroupUsersRequest var metadata runtime.ServerMetadata @@ -1723,7 +1723,7 @@ func request_ShieldService_ListGroupUsers_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_ListGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListGroupUsersRequest var metadata runtime.ServerMetadata @@ -1759,7 +1759,7 @@ func local_request_ShieldService_ListGroupUsers_0(ctx context.Context, marshaler } -func request_ShieldService_AddGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AddGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AddGroupUsersRequest var metadata runtime.ServerMetadata @@ -1803,7 +1803,7 @@ func request_ShieldService_AddGroupUsers_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_AddGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AddGroupUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AddGroupUsersRequest var metadata runtime.ServerMetadata @@ -1847,7 +1847,7 @@ func local_request_ShieldService_AddGroupUsers_0(ctx context.Context, marshaler } -func request_ShieldService_RemoveGroupUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_RemoveGroupUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq RemoveGroupUserRequest var metadata runtime.ServerMetadata @@ -1893,7 +1893,7 @@ func request_ShieldService_RemoveGroupUser_0(ctx context.Context, marshaler runt } -func local_request_ShieldService_RemoveGroupUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_RemoveGroupUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq RemoveGroupUserRequest var metadata runtime.ServerMetadata @@ -1939,7 +1939,7 @@ func local_request_ShieldService_RemoveGroupUser_0(ctx context.Context, marshale } -func request_ShieldService_EnableGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_EnableGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableGroupRequest var metadata runtime.ServerMetadata @@ -1983,7 +1983,7 @@ func request_ShieldService_EnableGroup_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_EnableGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_EnableGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableGroupRequest var metadata runtime.ServerMetadata @@ -2027,7 +2027,7 @@ func local_request_ShieldService_EnableGroup_0(ctx context.Context, marshaler ru } -func request_ShieldService_DisableGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DisableGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableGroupRequest var metadata runtime.ServerMetadata @@ -2071,7 +2071,7 @@ func request_ShieldService_DisableGroup_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_DisableGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DisableGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableGroupRequest var metadata runtime.ServerMetadata @@ -2115,7 +2115,7 @@ func local_request_ShieldService_DisableGroup_0(ctx context.Context, marshaler r } -func request_ShieldService_DeleteGroup_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteGroup_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteGroupRequest var metadata runtime.ServerMetadata @@ -2151,7 +2151,7 @@ func request_ShieldService_DeleteGroup_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_DeleteGroup_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteGroup_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteGroupRequest var metadata runtime.ServerMetadata @@ -2188,17 +2188,17 @@ func local_request_ShieldService_DeleteGroup_0(ctx context.Context, marshaler ru } var ( - filter_ShieldService_ListRoles_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} + filter_FrontierService_ListRoles_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} ) -func request_ShieldService_ListRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListRoles_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListRolesRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListRoles_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListRoles_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2207,14 +2207,14 @@ func request_ShieldService_ListRoles_0(ctx context.Context, marshaler runtime.Ma } -func local_request_ShieldService_ListRoles_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListRoles_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListRolesRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListRoles_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListRoles_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2224,10 +2224,10 @@ func local_request_ShieldService_ListRoles_0(ctx context.Context, marshaler runt } var ( - filter_ShieldService_ListOrganizationRoles_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_ListOrganizationRoles_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_ListOrganizationRoles_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationRoles_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationRolesRequest var metadata runtime.ServerMetadata @@ -2251,7 +2251,7 @@ func request_ShieldService_ListOrganizationRoles_0(ctx context.Context, marshale if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationRoles_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationRoles_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2260,7 +2260,7 @@ func request_ShieldService_ListOrganizationRoles_0(ctx context.Context, marshale } -func local_request_ShieldService_ListOrganizationRoles_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationRoles_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationRolesRequest var metadata runtime.ServerMetadata @@ -2284,7 +2284,7 @@ func local_request_ShieldService_ListOrganizationRoles_0(ctx context.Context, ma if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationRoles_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationRoles_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2293,7 +2293,7 @@ func local_request_ShieldService_ListOrganizationRoles_0(ctx context.Context, ma } -func request_ShieldService_CreateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2327,7 +2327,7 @@ func request_ShieldService_CreateOrganizationRole_0(ctx context.Context, marshal } -func local_request_ShieldService_CreateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2361,7 +2361,7 @@ func local_request_ShieldService_CreateOrganizationRole_0(ctx context.Context, m } -func request_ShieldService_GetOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2397,7 +2397,7 @@ func request_ShieldService_GetOrganizationRole_0(ctx context.Context, marshaler } -func local_request_ShieldService_GetOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2433,7 +2433,7 @@ func local_request_ShieldService_GetOrganizationRole_0(ctx context.Context, mars } -func request_ShieldService_UpdateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2477,7 +2477,7 @@ func request_ShieldService_UpdateOrganizationRole_0(ctx context.Context, marshal } -func local_request_ShieldService_UpdateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2521,7 +2521,7 @@ func local_request_ShieldService_UpdateOrganizationRole_0(ctx context.Context, m } -func request_ShieldService_DeleteOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2557,7 +2557,7 @@ func request_ShieldService_DeleteOrganizationRole_0(ctx context.Context, marshal } -func local_request_ShieldService_DeleteOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteOrganizationRole_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationRoleRequest var metadata runtime.ServerMetadata @@ -2594,17 +2594,17 @@ func local_request_ShieldService_DeleteOrganizationRole_0(ctx context.Context, m } var ( - filter_ShieldService_ListOrganizations_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} + filter_FrontierService_ListOrganizations_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} ) -func request_ShieldService_ListOrganizations_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizations_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationsRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizations_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizations_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2613,14 +2613,14 @@ func request_ShieldService_ListOrganizations_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_ListOrganizations_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizations_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationsRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizations_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizations_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2629,7 +2629,7 @@ func local_request_ShieldService_ListOrganizations_0(ctx context.Context, marsha } -func request_ShieldService_CreateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationRequest var metadata runtime.ServerMetadata @@ -2646,7 +2646,7 @@ func request_ShieldService_CreateOrganization_0(ctx context.Context, marshaler r } -func local_request_ShieldService_CreateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationRequest var metadata runtime.ServerMetadata @@ -2663,7 +2663,7 @@ func local_request_ShieldService_CreateOrganization_0(ctx context.Context, marsh } -func request_ShieldService_GetOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationRequest var metadata runtime.ServerMetadata @@ -2689,7 +2689,7 @@ func request_ShieldService_GetOrganization_0(ctx context.Context, marshaler runt } -func local_request_ShieldService_GetOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationRequest var metadata runtime.ServerMetadata @@ -2715,7 +2715,7 @@ func local_request_ShieldService_GetOrganization_0(ctx context.Context, marshale } -func request_ShieldService_UpdateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateOrganizationRequest var metadata runtime.ServerMetadata @@ -2749,7 +2749,7 @@ func request_ShieldService_UpdateOrganization_0(ctx context.Context, marshaler r } -func local_request_ShieldService_UpdateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateOrganizationRequest var metadata runtime.ServerMetadata @@ -2784,10 +2784,10 @@ func local_request_ShieldService_UpdateOrganization_0(ctx context.Context, marsh } var ( - filter_ShieldService_ListOrganizationProjects_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} + filter_FrontierService_ListOrganizationProjects_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} ) -func request_ShieldService_ListOrganizationProjects_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationProjects_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationProjectsRequest var metadata runtime.ServerMetadata @@ -2811,7 +2811,7 @@ func request_ShieldService_ListOrganizationProjects_0(ctx context.Context, marsh if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationProjects_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationProjects_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2820,7 +2820,7 @@ func request_ShieldService_ListOrganizationProjects_0(ctx context.Context, marsh } -func local_request_ShieldService_ListOrganizationProjects_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationProjects_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationProjectsRequest var metadata runtime.ServerMetadata @@ -2844,7 +2844,7 @@ func local_request_ShieldService_ListOrganizationProjects_0(ctx context.Context, if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationProjects_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationProjects_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2853,7 +2853,7 @@ func local_request_ShieldService_ListOrganizationProjects_0(ctx context.Context, } -func request_ShieldService_ListOrganizationAdmins_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationAdmins_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationAdminsRequest var metadata runtime.ServerMetadata @@ -2879,7 +2879,7 @@ func request_ShieldService_ListOrganizationAdmins_0(ctx context.Context, marshal } -func local_request_ShieldService_ListOrganizationAdmins_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationAdmins_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationAdminsRequest var metadata runtime.ServerMetadata @@ -2906,10 +2906,10 @@ func local_request_ShieldService_ListOrganizationAdmins_0(ctx context.Context, m } var ( - filter_ShieldService_ListOrganizationUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} + filter_FrontierService_ListOrganizationUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} ) -func request_ShieldService_ListOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationUsersRequest var metadata runtime.ServerMetadata @@ -2933,7 +2933,7 @@ func request_ShieldService_ListOrganizationUsers_0(ctx context.Context, marshale if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2942,7 +2942,7 @@ func request_ShieldService_ListOrganizationUsers_0(ctx context.Context, marshale } -func local_request_ShieldService_ListOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationUsersRequest var metadata runtime.ServerMetadata @@ -2966,7 +2966,7 @@ func local_request_ShieldService_ListOrganizationUsers_0(ctx context.Context, ma if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -2975,7 +2975,7 @@ func local_request_ShieldService_ListOrganizationUsers_0(ctx context.Context, ma } -func request_ShieldService_AddOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AddOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AddOrganizationUsersRequest var metadata runtime.ServerMetadata @@ -3009,7 +3009,7 @@ func request_ShieldService_AddOrganizationUsers_0(ctx context.Context, marshaler } -func local_request_ShieldService_AddOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AddOrganizationUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AddOrganizationUsersRequest var metadata runtime.ServerMetadata @@ -3043,7 +3043,7 @@ func local_request_ShieldService_AddOrganizationUsers_0(ctx context.Context, mar } -func request_ShieldService_RemoveOrganizationUser_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_RemoveOrganizationUser_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq RemoveOrganizationUserRequest var metadata runtime.ServerMetadata @@ -3079,7 +3079,7 @@ func request_ShieldService_RemoveOrganizationUser_0(ctx context.Context, marshal } -func local_request_ShieldService_RemoveOrganizationUser_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_RemoveOrganizationUser_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq RemoveOrganizationUserRequest var metadata runtime.ServerMetadata @@ -3115,7 +3115,7 @@ func local_request_ShieldService_RemoveOrganizationUser_0(ctx context.Context, m } -func request_ShieldService_ListOrganizationServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationServiceUsersRequest var metadata runtime.ServerMetadata @@ -3141,7 +3141,7 @@ func request_ShieldService_ListOrganizationServiceUsers_0(ctx context.Context, m } -func local_request_ShieldService_ListOrganizationServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationServiceUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationServiceUsersRequest var metadata runtime.ServerMetadata @@ -3168,10 +3168,10 @@ func local_request_ShieldService_ListOrganizationServiceUsers_0(ctx context.Cont } var ( - filter_ShieldService_ListOrganizationInvitations_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_ListOrganizationInvitations_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_ListOrganizationInvitations_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationInvitations_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationInvitationsRequest var metadata runtime.ServerMetadata @@ -3195,7 +3195,7 @@ func request_ShieldService_ListOrganizationInvitations_0(ctx context.Context, ma if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationInvitations_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationInvitations_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -3204,7 +3204,7 @@ func request_ShieldService_ListOrganizationInvitations_0(ctx context.Context, ma } -func local_request_ShieldService_ListOrganizationInvitations_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationInvitations_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationInvitationsRequest var metadata runtime.ServerMetadata @@ -3228,7 +3228,7 @@ func local_request_ShieldService_ListOrganizationInvitations_0(ctx context.Conte if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationInvitations_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationInvitations_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -3237,7 +3237,7 @@ func local_request_ShieldService_ListOrganizationInvitations_0(ctx context.Conte } -func request_ShieldService_CreateOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3271,7 +3271,7 @@ func request_ShieldService_CreateOrganizationInvitation_0(ctx context.Context, m } -func local_request_ShieldService_CreateOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3305,7 +3305,7 @@ func local_request_ShieldService_CreateOrganizationInvitation_0(ctx context.Cont } -func request_ShieldService_GetOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3341,7 +3341,7 @@ func request_ShieldService_GetOrganizationInvitation_0(ctx context.Context, mars } -func local_request_ShieldService_GetOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3377,7 +3377,7 @@ func local_request_ShieldService_GetOrganizationInvitation_0(ctx context.Context } -func request_ShieldService_AcceptOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AcceptOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AcceptOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3413,7 +3413,7 @@ func request_ShieldService_AcceptOrganizationInvitation_0(ctx context.Context, m } -func local_request_ShieldService_AcceptOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AcceptOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AcceptOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3449,7 +3449,7 @@ func local_request_ShieldService_AcceptOrganizationInvitation_0(ctx context.Cont } -func request_ShieldService_DeleteOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3485,7 +3485,7 @@ func request_ShieldService_DeleteOrganizationInvitation_0(ctx context.Context, m } -func local_request_ShieldService_DeleteOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteOrganizationInvitation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationInvitationRequest var metadata runtime.ServerMetadata @@ -3521,7 +3521,7 @@ func local_request_ShieldService_DeleteOrganizationInvitation_0(ctx context.Cont } -func request_ShieldService_EnableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_EnableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableOrganizationRequest var metadata runtime.ServerMetadata @@ -3555,7 +3555,7 @@ func request_ShieldService_EnableOrganization_0(ctx context.Context, marshaler r } -func local_request_ShieldService_EnableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_EnableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableOrganizationRequest var metadata runtime.ServerMetadata @@ -3589,7 +3589,7 @@ func local_request_ShieldService_EnableOrganization_0(ctx context.Context, marsh } -func request_ShieldService_DisableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DisableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableOrganizationRequest var metadata runtime.ServerMetadata @@ -3623,7 +3623,7 @@ func request_ShieldService_DisableOrganization_0(ctx context.Context, marshaler } -func local_request_ShieldService_DisableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DisableOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableOrganizationRequest var metadata runtime.ServerMetadata @@ -3657,7 +3657,7 @@ func local_request_ShieldService_DisableOrganization_0(ctx context.Context, mars } -func request_ShieldService_DeleteOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteOrganization_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationRequest var metadata runtime.ServerMetadata @@ -3683,7 +3683,7 @@ func request_ShieldService_DeleteOrganization_0(ctx context.Context, marshaler r } -func local_request_ShieldService_DeleteOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteOrganization_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteOrganizationRequest var metadata runtime.ServerMetadata @@ -3709,7 +3709,7 @@ func local_request_ShieldService_DeleteOrganization_0(ctx context.Context, marsh } -func request_ShieldService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateProjectRequest var metadata runtime.ServerMetadata @@ -3726,7 +3726,7 @@ func request_ShieldService_CreateProject_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateProjectRequest var metadata runtime.ServerMetadata @@ -3743,7 +3743,7 @@ func local_request_ShieldService_CreateProject_0(ctx context.Context, marshaler } -func request_ShieldService_GetProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectRequest var metadata runtime.ServerMetadata @@ -3769,7 +3769,7 @@ func request_ShieldService_GetProject_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_GetProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectRequest var metadata runtime.ServerMetadata @@ -3795,7 +3795,7 @@ func local_request_ShieldService_GetProject_0(ctx context.Context, marshaler run } -func request_ShieldService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateProjectRequest var metadata runtime.ServerMetadata @@ -3829,7 +3829,7 @@ func request_ShieldService_UpdateProject_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateProjectRequest var metadata runtime.ServerMetadata @@ -3863,7 +3863,7 @@ func local_request_ShieldService_UpdateProject_0(ctx context.Context, marshaler } -func request_ShieldService_ListProjectAdmins_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListProjectAdmins_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectAdminsRequest var metadata runtime.ServerMetadata @@ -3889,7 +3889,7 @@ func request_ShieldService_ListProjectAdmins_0(ctx context.Context, marshaler ru } -func local_request_ShieldService_ListProjectAdmins_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListProjectAdmins_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectAdminsRequest var metadata runtime.ServerMetadata @@ -3916,10 +3916,10 @@ func local_request_ShieldService_ListProjectAdmins_0(ctx context.Context, marsha } var ( - filter_ShieldService_ListProjectUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} + filter_FrontierService_ListProjectUsers_0 = &utilities.DoubleArray{Encoding: map[string]int{"id": 0}, Base: []int{1, 2, 0, 0}, Check: []int{0, 1, 2, 2}} ) -func request_ShieldService_ListProjectUsers_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListProjectUsers_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectUsersRequest var metadata runtime.ServerMetadata @@ -3943,7 +3943,7 @@ func request_ShieldService_ListProjectUsers_0(ctx context.Context, marshaler run if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListProjectUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListProjectUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -3952,7 +3952,7 @@ func request_ShieldService_ListProjectUsers_0(ctx context.Context, marshaler run } -func local_request_ShieldService_ListProjectUsers_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListProjectUsers_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectUsersRequest var metadata runtime.ServerMetadata @@ -3976,7 +3976,7 @@ func local_request_ShieldService_ListProjectUsers_0(ctx context.Context, marshal if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListProjectUsers_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListProjectUsers_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -3985,7 +3985,7 @@ func local_request_ShieldService_ListProjectUsers_0(ctx context.Context, marshal } -func request_ShieldService_EnableProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_EnableProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableProjectRequest var metadata runtime.ServerMetadata @@ -4019,7 +4019,7 @@ func request_ShieldService_EnableProject_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_EnableProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_EnableProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq EnableProjectRequest var metadata runtime.ServerMetadata @@ -4053,7 +4053,7 @@ func local_request_ShieldService_EnableProject_0(ctx context.Context, marshaler } -func request_ShieldService_DisableProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DisableProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableProjectRequest var metadata runtime.ServerMetadata @@ -4087,7 +4087,7 @@ func request_ShieldService_DisableProject_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_DisableProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DisableProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DisableProjectRequest var metadata runtime.ServerMetadata @@ -4121,7 +4121,7 @@ func local_request_ShieldService_DisableProject_0(ctx context.Context, marshaler } -func request_ShieldService_DeleteProject_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteProject_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteProjectRequest var metadata runtime.ServerMetadata @@ -4147,7 +4147,7 @@ func request_ShieldService_DeleteProject_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_DeleteProject_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteProject_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteProjectRequest var metadata runtime.ServerMetadata @@ -4173,7 +4173,7 @@ func local_request_ShieldService_DeleteProject_0(ctx context.Context, marshaler } -func request_ShieldService_CreatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreatePolicyRequest var metadata runtime.ServerMetadata @@ -4190,7 +4190,7 @@ func request_ShieldService_CreatePolicy_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_CreatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreatePolicyRequest var metadata runtime.ServerMetadata @@ -4207,7 +4207,7 @@ func local_request_ShieldService_CreatePolicy_0(ctx context.Context, marshaler r } -func request_ShieldService_GetPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetPolicy_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetPolicyRequest var metadata runtime.ServerMetadata @@ -4233,7 +4233,7 @@ func request_ShieldService_GetPolicy_0(ctx context.Context, marshaler runtime.Ma } -func local_request_ShieldService_GetPolicy_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetPolicy_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetPolicyRequest var metadata runtime.ServerMetadata @@ -4259,7 +4259,7 @@ func local_request_ShieldService_GetPolicy_0(ctx context.Context, marshaler runt } -func request_ShieldService_UpdatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdatePolicyRequest var metadata runtime.ServerMetadata @@ -4293,7 +4293,7 @@ func request_ShieldService_UpdatePolicy_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_UpdatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdatePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdatePolicyRequest var metadata runtime.ServerMetadata @@ -4327,7 +4327,7 @@ func local_request_ShieldService_UpdatePolicy_0(ctx context.Context, marshaler r } -func request_ShieldService_DeletePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeletePolicy_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeletePolicyRequest var metadata runtime.ServerMetadata @@ -4353,7 +4353,7 @@ func request_ShieldService_DeletePolicy_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_DeletePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeletePolicy_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeletePolicyRequest var metadata runtime.ServerMetadata @@ -4379,7 +4379,7 @@ func local_request_ShieldService_DeletePolicy_0(ctx context.Context, marshaler r } -func request_ShieldService_CreateRelation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateRelation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateRelationRequest var metadata runtime.ServerMetadata @@ -4396,7 +4396,7 @@ func request_ShieldService_CreateRelation_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_CreateRelation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateRelation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateRelationRequest var metadata runtime.ServerMetadata @@ -4413,7 +4413,7 @@ func local_request_ShieldService_CreateRelation_0(ctx context.Context, marshaler } -func request_ShieldService_GetRelation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetRelation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetRelationRequest var metadata runtime.ServerMetadata @@ -4439,7 +4439,7 @@ func request_ShieldService_GetRelation_0(ctx context.Context, marshaler runtime. } -func local_request_ShieldService_GetRelation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetRelation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetRelationRequest var metadata runtime.ServerMetadata @@ -4465,7 +4465,7 @@ func local_request_ShieldService_GetRelation_0(ctx context.Context, marshaler ru } -func request_ShieldService_DeleteRelation_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteRelation_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteRelationRequest var metadata runtime.ServerMetadata @@ -4511,7 +4511,7 @@ func request_ShieldService_DeleteRelation_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_DeleteRelation_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteRelation_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteRelationRequest var metadata runtime.ServerMetadata @@ -4557,7 +4557,7 @@ func local_request_ShieldService_DeleteRelation_0(ctx context.Context, marshaler } -func request_ShieldService_ListPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListPermissions_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListPermissionsRequest var metadata runtime.ServerMetadata @@ -4566,7 +4566,7 @@ func request_ShieldService_ListPermissions_0(ctx context.Context, marshaler runt } -func local_request_ShieldService_ListPermissions_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListPermissions_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListPermissionsRequest var metadata runtime.ServerMetadata @@ -4575,7 +4575,7 @@ func local_request_ShieldService_ListPermissions_0(ctx context.Context, marshale } -func request_ShieldService_GetPermission_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetPermission_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetPermissionRequest var metadata runtime.ServerMetadata @@ -4601,7 +4601,7 @@ func request_ShieldService_GetPermission_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_GetPermission_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetPermission_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetPermissionRequest var metadata runtime.ServerMetadata @@ -4627,7 +4627,7 @@ func local_request_ShieldService_GetPermission_0(ctx context.Context, marshaler } -func request_ShieldService_ListNamespaces_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListNamespaces_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListNamespacesRequest var metadata runtime.ServerMetadata @@ -4636,7 +4636,7 @@ func request_ShieldService_ListNamespaces_0(ctx context.Context, marshaler runti } -func local_request_ShieldService_ListNamespaces_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListNamespaces_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListNamespacesRequest var metadata runtime.ServerMetadata @@ -4645,7 +4645,7 @@ func local_request_ShieldService_ListNamespaces_0(ctx context.Context, marshaler } -func request_ShieldService_GetNamespace_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetNamespace_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetNamespaceRequest var metadata runtime.ServerMetadata @@ -4671,7 +4671,7 @@ func request_ShieldService_GetNamespace_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_GetNamespace_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetNamespace_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetNamespaceRequest var metadata runtime.ServerMetadata @@ -4698,10 +4698,10 @@ func local_request_ShieldService_GetNamespace_0(ctx context.Context, marshaler r } var ( - filter_ShieldService_ListProjectResources_0 = &utilities.DoubleArray{Encoding: map[string]int{"project_id": 0, "projectId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_ListProjectResources_0 = &utilities.DoubleArray{Encoding: map[string]int{"project_id": 0, "projectId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_ListProjectResources_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListProjectResources_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectResourcesRequest var metadata runtime.ServerMetadata @@ -4725,7 +4725,7 @@ func request_ShieldService_ListProjectResources_0(ctx context.Context, marshaler if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListProjectResources_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListProjectResources_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -4734,7 +4734,7 @@ func request_ShieldService_ListProjectResources_0(ctx context.Context, marshaler } -func local_request_ShieldService_ListProjectResources_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListProjectResources_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListProjectResourcesRequest var metadata runtime.ServerMetadata @@ -4758,7 +4758,7 @@ func local_request_ShieldService_ListProjectResources_0(ctx context.Context, mar if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListProjectResources_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListProjectResources_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -4768,10 +4768,10 @@ func local_request_ShieldService_ListProjectResources_0(ctx context.Context, mar } var ( - filter_ShieldService_CreateProjectResource_0 = &utilities.DoubleArray{Encoding: map[string]int{"body": 0, "project_id": 1, "projectId": 2}, Base: []int{1, 2, 3, 4, 0, 0, 0, 0}, Check: []int{0, 1, 1, 1, 2, 2, 3, 4}} + filter_FrontierService_CreateProjectResource_0 = &utilities.DoubleArray{Encoding: map[string]int{"body": 0, "project_id": 1, "projectId": 2}, Base: []int{1, 2, 3, 4, 0, 0, 0, 0}, Check: []int{0, 1, 1, 1, 2, 2, 3, 4}} ) -func request_ShieldService_CreateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateProjectResourceRequest var metadata runtime.ServerMetadata @@ -4803,7 +4803,7 @@ func request_ShieldService_CreateProjectResource_0(ctx context.Context, marshale if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_CreateProjectResource_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_CreateProjectResource_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -4812,7 +4812,7 @@ func request_ShieldService_CreateProjectResource_0(ctx context.Context, marshale } -func local_request_ShieldService_CreateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateProjectResourceRequest var metadata runtime.ServerMetadata @@ -4844,7 +4844,7 @@ func local_request_ShieldService_CreateProjectResource_0(ctx context.Context, ma if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_CreateProjectResource_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_CreateProjectResource_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -4853,7 +4853,7 @@ func local_request_ShieldService_CreateProjectResource_0(ctx context.Context, ma } -func request_ShieldService_GetProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectResourceRequest var metadata runtime.ServerMetadata @@ -4889,7 +4889,7 @@ func request_ShieldService_GetProjectResource_0(ctx context.Context, marshaler r } -func local_request_ShieldService_GetProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetProjectResourceRequest var metadata runtime.ServerMetadata @@ -4925,7 +4925,7 @@ func local_request_ShieldService_GetProjectResource_0(ctx context.Context, marsh } -func request_ShieldService_UpdateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateProjectResourceRequest var metadata runtime.ServerMetadata @@ -4969,7 +4969,7 @@ func request_ShieldService_UpdateProjectResource_0(ctx context.Context, marshale } -func local_request_ShieldService_UpdateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateProjectResourceRequest var metadata runtime.ServerMetadata @@ -5013,7 +5013,7 @@ func local_request_ShieldService_UpdateProjectResource_0(ctx context.Context, ma } -func request_ShieldService_DeleteProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteProjectResourceRequest var metadata runtime.ServerMetadata @@ -5049,7 +5049,7 @@ func request_ShieldService_DeleteProjectResource_0(ctx context.Context, marshale } -func local_request_ShieldService_DeleteProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteProjectResource_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteProjectResourceRequest var metadata runtime.ServerMetadata @@ -5085,7 +5085,7 @@ func local_request_ShieldService_DeleteProjectResource_0(ctx context.Context, ma } -func request_ShieldService_CheckResourcePermission_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CheckResourcePermission_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CheckResourcePermissionRequest var metadata runtime.ServerMetadata @@ -5102,7 +5102,7 @@ func request_ShieldService_CheckResourcePermission_0(ctx context.Context, marsha } -func local_request_ShieldService_CheckResourcePermission_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CheckResourcePermission_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CheckResourcePermissionRequest var metadata runtime.ServerMetadata @@ -5119,7 +5119,7 @@ func local_request_ShieldService_CheckResourcePermission_0(ctx context.Context, } -func request_ShieldService_GetJWKs_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetJWKs_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetJWKsRequest var metadata runtime.ServerMetadata @@ -5128,7 +5128,7 @@ func request_ShieldService_GetJWKs_0(ctx context.Context, marshaler runtime.Mars } -func local_request_ShieldService_GetJWKs_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetJWKs_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetJWKsRequest var metadata runtime.ServerMetadata @@ -5137,7 +5137,7 @@ func local_request_ShieldService_GetJWKs_0(ctx context.Context, marshaler runtim } -func request_ShieldService_GetJWKs_1(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetJWKs_1(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetJWKsRequest var metadata runtime.ServerMetadata @@ -5146,7 +5146,7 @@ func request_ShieldService_GetJWKs_1(ctx context.Context, marshaler runtime.Mars } -func local_request_ShieldService_GetJWKs_1(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetJWKs_1(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetJWKsRequest var metadata runtime.ServerMetadata @@ -5155,7 +5155,7 @@ func local_request_ShieldService_GetJWKs_1(ctx context.Context, marshaler runtim } -func request_ShieldService_ListAuthStrategies_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListAuthStrategies_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListAuthStrategiesRequest var metadata runtime.ServerMetadata @@ -5164,7 +5164,7 @@ func request_ShieldService_ListAuthStrategies_0(ctx context.Context, marshaler r } -func local_request_ShieldService_ListAuthStrategies_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListAuthStrategies_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListAuthStrategiesRequest var metadata runtime.ServerMetadata @@ -5174,10 +5174,10 @@ func local_request_ShieldService_ListAuthStrategies_0(ctx context.Context, marsh } var ( - filter_ShieldService_Authenticate_0 = &utilities.DoubleArray{Encoding: map[string]int{"strategy_name": 0, "strategyName": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_Authenticate_0 = &utilities.DoubleArray{Encoding: map[string]int{"strategy_name": 0, "strategyName": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthenticateRequest var metadata runtime.ServerMetadata @@ -5201,7 +5201,7 @@ func request_ShieldService_Authenticate_0(ctx context.Context, marshaler runtime if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_Authenticate_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_Authenticate_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5210,7 +5210,7 @@ func request_ShieldService_Authenticate_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_Authenticate_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthenticateRequest var metadata runtime.ServerMetadata @@ -5234,7 +5234,7 @@ func local_request_ShieldService_Authenticate_0(ctx context.Context, marshaler r if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_Authenticate_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_Authenticate_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5243,7 +5243,7 @@ func local_request_ShieldService_Authenticate_0(ctx context.Context, marshaler r } -func request_ShieldService_Authenticate_1(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_Authenticate_1(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthenticateRequest var metadata runtime.ServerMetadata @@ -5277,7 +5277,7 @@ func request_ShieldService_Authenticate_1(ctx context.Context, marshaler runtime } -func local_request_ShieldService_Authenticate_1(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_Authenticate_1(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthenticateRequest var metadata runtime.ServerMetadata @@ -5312,17 +5312,17 @@ func local_request_ShieldService_Authenticate_1(ctx context.Context, marshaler r } var ( - filter_ShieldService_AuthCallback_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} + filter_FrontierService_AuthCallback_0 = &utilities.DoubleArray{Encoding: map[string]int{}, Base: []int(nil), Check: []int(nil)} ) -func request_ShieldService_AuthCallback_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AuthCallback_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthCallbackRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_AuthCallback_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_AuthCallback_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5331,14 +5331,14 @@ func request_ShieldService_AuthCallback_0(ctx context.Context, marshaler runtime } -func local_request_ShieldService_AuthCallback_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AuthCallback_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthCallbackRequest var metadata runtime.ServerMetadata if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_AuthCallback_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_AuthCallback_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5347,7 +5347,7 @@ func local_request_ShieldService_AuthCallback_0(ctx context.Context, marshaler r } -func request_ShieldService_AuthCallback_1(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AuthCallback_1(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthCallbackRequest var metadata runtime.ServerMetadata @@ -5364,7 +5364,7 @@ func request_ShieldService_AuthCallback_1(ctx context.Context, marshaler runtime } -func local_request_ShieldService_AuthCallback_1(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AuthCallback_1(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthCallbackRequest var metadata runtime.ServerMetadata @@ -5381,7 +5381,7 @@ func local_request_ShieldService_AuthCallback_1(ctx context.Context, marshaler r } -func request_ShieldService_AuthToken_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AuthToken_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthTokenRequest var metadata runtime.ServerMetadata @@ -5398,7 +5398,7 @@ func request_ShieldService_AuthToken_0(ctx context.Context, marshaler runtime.Ma } -func local_request_ShieldService_AuthToken_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AuthToken_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthTokenRequest var metadata runtime.ServerMetadata @@ -5415,7 +5415,7 @@ func local_request_ShieldService_AuthToken_0(ctx context.Context, marshaler runt } -func request_ShieldService_AuthLogout_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AuthLogout_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthLogoutRequest var metadata runtime.ServerMetadata @@ -5424,7 +5424,7 @@ func request_ShieldService_AuthLogout_0(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_AuthLogout_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AuthLogout_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthLogoutRequest var metadata runtime.ServerMetadata @@ -5433,7 +5433,7 @@ func local_request_ShieldService_AuthLogout_0(ctx context.Context, marshaler run } -func request_ShieldService_AuthLogout_1(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_AuthLogout_1(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthLogoutRequest var metadata runtime.ServerMetadata @@ -5442,7 +5442,7 @@ func request_ShieldService_AuthLogout_1(ctx context.Context, marshaler runtime.M } -func local_request_ShieldService_AuthLogout_1(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_AuthLogout_1(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq AuthLogoutRequest var metadata runtime.ServerMetadata @@ -5451,7 +5451,7 @@ func local_request_ShieldService_AuthLogout_1(ctx context.Context, marshaler run } -func request_ShieldService_ListMetaSchemas_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListMetaSchemas_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListMetaSchemasRequest var metadata runtime.ServerMetadata @@ -5460,7 +5460,7 @@ func request_ShieldService_ListMetaSchemas_0(ctx context.Context, marshaler runt } -func local_request_ShieldService_ListMetaSchemas_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListMetaSchemas_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListMetaSchemasRequest var metadata runtime.ServerMetadata @@ -5469,7 +5469,7 @@ func local_request_ShieldService_ListMetaSchemas_0(ctx context.Context, marshale } -func request_ShieldService_CreateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5486,7 +5486,7 @@ func request_ShieldService_CreateMetaSchema_0(ctx context.Context, marshaler run } -func local_request_ShieldService_CreateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5503,7 +5503,7 @@ func local_request_ShieldService_CreateMetaSchema_0(ctx context.Context, marshal } -func request_ShieldService_GetMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5529,7 +5529,7 @@ func request_ShieldService_GetMetaSchema_0(ctx context.Context, marshaler runtim } -func local_request_ShieldService_GetMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5555,7 +5555,7 @@ func local_request_ShieldService_GetMetaSchema_0(ctx context.Context, marshaler } -func request_ShieldService_UpdateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_UpdateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5589,7 +5589,7 @@ func request_ShieldService_UpdateMetaSchema_0(ctx context.Context, marshaler run } -func local_request_ShieldService_UpdateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_UpdateMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq UpdateMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5623,7 +5623,7 @@ func local_request_ShieldService_UpdateMetaSchema_0(ctx context.Context, marshal } -func request_ShieldService_DeleteMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_DeleteMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5649,7 +5649,7 @@ func request_ShieldService_DeleteMetaSchema_0(ctx context.Context, marshaler run } -func local_request_ShieldService_DeleteMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_DeleteMetaSchema_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq DeleteMetaSchemaRequest var metadata runtime.ServerMetadata @@ -5676,10 +5676,10 @@ func local_request_ShieldService_DeleteMetaSchema_0(ctx context.Context, marshal } var ( - filter_ShieldService_ListOrganizationAuditLogs_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} + filter_FrontierService_ListOrganizationAuditLogs_0 = &utilities.DoubleArray{Encoding: map[string]int{"org_id": 0, "orgId": 1}, Base: []int{1, 1, 2, 0, 0}, Check: []int{0, 1, 1, 2, 3}} ) -func request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_ListOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationAuditLogsRequest var metadata runtime.ServerMetadata @@ -5703,7 +5703,7 @@ func request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context, mars if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationAuditLogs_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationAuditLogs_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5712,7 +5712,7 @@ func request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context, mars } -func local_request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_ListOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq ListOrganizationAuditLogsRequest var metadata runtime.ServerMetadata @@ -5736,7 +5736,7 @@ func local_request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context if err := req.ParseForm(); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } - if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_ShieldService_ListOrganizationAuditLogs_0); err != nil { + if err := runtime.PopulateQueryParameters(&protoReq, req.Form, filter_FrontierService_ListOrganizationAuditLogs_0); err != nil { return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) } @@ -5745,7 +5745,7 @@ func local_request_ShieldService_ListOrganizationAuditLogs_0(ctx context.Context } -func request_ShieldService_CreateOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_CreateOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationAuditLogsRequest var metadata runtime.ServerMetadata @@ -5779,7 +5779,7 @@ func request_ShieldService_CreateOrganizationAuditLogs_0(ctx context.Context, ma } -func local_request_ShieldService_CreateOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_CreateOrganizationAuditLogs_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq CreateOrganizationAuditLogsRequest var metadata runtime.ServerMetadata @@ -5813,7 +5813,7 @@ func local_request_ShieldService_CreateOrganizationAuditLogs_0(ctx context.Conte } -func request_ShieldService_GetOrganizationAuditLog_0(ctx context.Context, marshaler runtime.Marshaler, client ShieldServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func request_FrontierService_GetOrganizationAuditLog_0(ctx context.Context, marshaler runtime.Marshaler, client FrontierServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationAuditLogRequest var metadata runtime.ServerMetadata @@ -5849,7 +5849,7 @@ func request_ShieldService_GetOrganizationAuditLog_0(ctx context.Context, marsha } -func local_request_ShieldService_GetOrganizationAuditLog_0(ctx context.Context, marshaler runtime.Marshaler, server ShieldServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { +func local_request_FrontierService_GetOrganizationAuditLog_0(ctx context.Context, marshaler runtime.Marshaler, server FrontierServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { var protoReq GetOrganizationAuditLogRequest var metadata runtime.ServerMetadata @@ -5885,13 +5885,13 @@ func local_request_ShieldService_GetOrganizationAuditLog_0(ctx context.Context, } -// RegisterShieldServiceHandlerServer registers the http handlers for service ShieldService to "mux". -// UnaryRPC :call ShieldServiceServer directly. +// RegisterFrontierServiceHandlerServer registers the http handlers for service FrontierService to "mux". +// UnaryRPC :call FrontierServiceServer directly. // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. -// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterShieldServiceHandlerFromEndpoint instead. -func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeMux, server ShieldServiceServer) error { +// Note that using this registration option will cause many gRPC library features to stop working. Consider using RegisterFrontierServiceHandlerFromEndpoint instead. +func RegisterFrontierServiceHandlerServer(ctx context.Context, mux *runtime.ServeMux, server FrontierServiceServer) error { - mux.Handle("GET", pattern_ShieldService_ListUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -5899,12 +5899,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUsers", runtime.WithHTTPPathPattern("/v1beta1/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUsers", runtime.WithHTTPPathPattern("/v1beta1/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -5912,11 +5912,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -5924,12 +5924,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateUser", runtime.WithHTTPPathPattern("/v1beta1/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateUser", runtime.WithHTTPPathPattern("/v1beta1/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -5937,11 +5937,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -5949,12 +5949,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -5962,11 +5962,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -5974,12 +5974,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/groups")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListUserGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListUserGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -5987,11 +5987,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListCurrentUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListCurrentUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -5999,12 +5999,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListCurrentUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/self/groups")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListCurrentUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/self/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListCurrentUserGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListCurrentUserGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6012,11 +6012,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListCurrentUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListCurrentUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6024,12 +6024,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6037,11 +6037,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6049,12 +6049,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6062,11 +6062,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6074,12 +6074,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6087,11 +6087,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6099,12 +6099,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/enable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_EnableUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_EnableUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6112,11 +6112,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_EnableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6124,12 +6124,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/disable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DisableUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DisableUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6137,11 +6137,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DisableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6149,12 +6149,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6162,11 +6162,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6174,12 +6174,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/organizations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganizationsByUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganizationsByUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6187,11 +6187,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganizationsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6199,12 +6199,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/organizations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganizationsByCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganizationsByCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6212,11 +6212,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganizationsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6224,12 +6224,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/projects")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetProjectsByUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetProjectsByUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6237,11 +6237,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetProjectsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6249,12 +6249,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/projects")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetProjectsByCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetProjectsByCurrentUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6262,11 +6262,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetProjectsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListUserInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUserInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6274,12 +6274,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUserInvitations", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/invitations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUserInvitations", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListUserInvitations_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListUserInvitations_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6287,11 +6287,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListUserInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUserInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6299,12 +6299,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListServiceUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListServiceUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6312,11 +6312,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6324,12 +6324,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6337,11 +6337,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6349,12 +6349,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6362,11 +6362,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6374,12 +6374,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteServiceUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6387,11 +6387,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6399,12 +6399,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6412,11 +6412,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUserKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUserKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6424,12 +6424,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUserKeys", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUserKeys", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListServiceUserKeys_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListServiceUserKeys_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6437,11 +6437,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListServiceUserKeys_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUserKeys_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6449,12 +6449,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6462,11 +6462,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6474,12 +6474,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteServiceUserKey_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6487,11 +6487,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6499,12 +6499,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateServiceUserSecret_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateServiceUserSecret_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6512,11 +6512,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUserSecrets_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUserSecrets_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6524,12 +6524,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUserSecrets", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUserSecrets", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListServiceUserSecrets_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListServiceUserSecrets_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6537,11 +6537,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListServiceUserSecrets_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUserSecrets_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6549,12 +6549,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets/{secret_id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets/{secret_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteServiceUserSecret_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteServiceUserSecret_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6562,11 +6562,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6574,12 +6574,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationGroups", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationGroups", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationGroups_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6587,11 +6587,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6599,12 +6599,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6612,11 +6612,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6624,12 +6624,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6637,11 +6637,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6649,12 +6649,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6662,11 +6662,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6674,12 +6674,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListGroupUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListGroupUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6687,11 +6687,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AddGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AddGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6699,12 +6699,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AddGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AddGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AddGroupUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AddGroupUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6712,11 +6712,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AddGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AddGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_RemoveGroupUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_RemoveGroupUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6724,12 +6724,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/RemoveGroupUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users/{user_id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/RemoveGroupUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users/{user_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_RemoveGroupUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_RemoveGroupUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6737,11 +6737,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_RemoveGroupUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_RemoveGroupUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6749,12 +6749,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/enable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_EnableGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_EnableGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6762,11 +6762,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_EnableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6774,12 +6774,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/disable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DisableGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DisableGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6787,11 +6787,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DisableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6799,12 +6799,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteGroup_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6812,11 +6812,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6824,12 +6824,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListRoles", runtime.WithHTTPPathPattern("/v1beta1/roles")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListRoles", runtime.WithHTTPPathPattern("/v1beta1/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListRoles_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListRoles_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6837,11 +6837,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6849,12 +6849,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationRoles", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationRoles", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationRoles_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationRoles_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6862,11 +6862,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6874,12 +6874,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6887,11 +6887,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6899,12 +6899,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6912,11 +6912,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6924,12 +6924,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6937,11 +6937,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6949,12 +6949,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteOrganizationRole_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6962,11 +6962,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6974,12 +6974,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizations", runtime.WithHTTPPathPattern("/v1beta1/organizations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizations", runtime.WithHTTPPathPattern("/v1beta1/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizations_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizations_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -6987,11 +6987,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -6999,12 +6999,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7012,11 +7012,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7024,12 +7024,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7037,11 +7037,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7049,12 +7049,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7062,11 +7062,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7074,12 +7074,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationProjects", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/projects")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationProjects", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationProjects_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationProjects_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7087,11 +7087,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationProjects_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationProjects_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7099,12 +7099,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationAdmins", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/admins")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAdmins", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/admins")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationAdmins_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationAdmins_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7112,11 +7112,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7124,12 +7124,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7137,11 +7137,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AddOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AddOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7149,12 +7149,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AddOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AddOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AddOrganizationUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AddOrganizationUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7162,11 +7162,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AddOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AddOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_RemoveOrganizationUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_RemoveOrganizationUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7174,12 +7174,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/RemoveOrganizationUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users/{user_id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/RemoveOrganizationUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users/{user_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_RemoveOrganizationUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_RemoveOrganizationUser_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7187,11 +7187,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_RemoveOrganizationUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_RemoveOrganizationUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7199,12 +7199,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/serviceusers")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationServiceUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationServiceUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7212,11 +7212,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7224,12 +7224,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationInvitations", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationInvitations", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationInvitations_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationInvitations_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7237,11 +7237,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7249,12 +7249,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7262,11 +7262,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7274,12 +7274,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7287,11 +7287,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AcceptOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AcceptOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7299,12 +7299,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AcceptOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}/accept")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AcceptOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}/accept")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AcceptOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AcceptOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7312,11 +7312,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AcceptOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AcceptOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7324,12 +7324,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteOrganizationInvitation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7337,11 +7337,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7349,12 +7349,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/enable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_EnableOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_EnableOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7362,11 +7362,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_EnableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7374,12 +7374,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/disable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DisableOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DisableOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7387,11 +7387,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DisableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7399,12 +7399,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteOrganization_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7412,11 +7412,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7424,12 +7424,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateProject", runtime.WithHTTPPathPattern("/v1beta1/projects")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateProject", runtime.WithHTTPPathPattern("/v1beta1/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7437,11 +7437,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7449,12 +7449,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7462,11 +7462,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7474,12 +7474,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7487,11 +7487,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7499,12 +7499,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectAdmins", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/admins")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectAdmins", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/admins")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListProjectAdmins_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListProjectAdmins_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7512,11 +7512,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListProjectAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7524,12 +7524,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectUsers", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/users")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectUsers", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListProjectUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListProjectUsers_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7537,11 +7537,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListProjectUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7549,12 +7549,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/enable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_EnableProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_EnableProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7562,11 +7562,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_EnableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7574,12 +7574,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/disable")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DisableProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DisableProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7587,11 +7587,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DisableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7599,12 +7599,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteProject_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7612,11 +7612,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7624,12 +7624,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreatePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreatePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7637,11 +7637,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7649,12 +7649,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetPolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetPolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetPolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetPolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7662,11 +7662,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetPolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetPolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7674,12 +7674,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdatePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdatePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7687,11 +7687,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeletePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeletePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7699,12 +7699,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeletePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeletePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeletePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeletePolicy_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7712,11 +7712,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeletePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeletePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7724,12 +7724,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateRelation", runtime.WithHTTPPathPattern("/v1beta1/relations")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateRelation", runtime.WithHTTPPathPattern("/v1beta1/relations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7737,11 +7737,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7749,12 +7749,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7762,11 +7762,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7774,12 +7774,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{relation}/object/{object}/subject/{subject}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{relation}/object/{object}/subject/{subject}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteRelation_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7787,11 +7787,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7799,12 +7799,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListPermissions", runtime.WithHTTPPathPattern("/v1beta1/permissions")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListPermissions", runtime.WithHTTPPathPattern("/v1beta1/permissions")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListPermissions_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListPermissions_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7812,11 +7812,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListPermissions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListPermissions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7824,12 +7824,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetPermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetPermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetPermission_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7837,11 +7837,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListNamespaces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListNamespaces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7849,12 +7849,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListNamespaces", runtime.WithHTTPPathPattern("/v1beta1/namespaces")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListNamespaces", runtime.WithHTTPPathPattern("/v1beta1/namespaces")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListNamespaces_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListNamespaces_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7862,11 +7862,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListNamespaces_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListNamespaces_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetNamespace_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetNamespace_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7874,12 +7874,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetNamespace", runtime.WithHTTPPathPattern("/v1beta1/namespaces/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetNamespace", runtime.WithHTTPPathPattern("/v1beta1/namespaces/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetNamespace_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetNamespace_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7887,11 +7887,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetNamespace_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetNamespace_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectResources_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectResources_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7899,12 +7899,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectResources", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectResources", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListProjectResources_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListProjectResources_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7912,11 +7912,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListProjectResources_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectResources_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7924,12 +7924,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7937,11 +7937,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7949,12 +7949,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7962,11 +7962,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7974,12 +7974,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -7987,11 +7987,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -7999,12 +7999,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteProjectResource_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8012,11 +8012,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CheckResourcePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CheckResourcePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8024,12 +8024,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CheckResourcePermission", runtime.WithHTTPPathPattern("/v1beta1/check")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CheckResourcePermission", runtime.WithHTTPPathPattern("/v1beta1/check")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CheckResourcePermission_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CheckResourcePermission_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8037,11 +8037,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CheckResourcePermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CheckResourcePermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetJWKs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetJWKs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8049,12 +8049,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetJWKs", runtime.WithHTTPPathPattern("/v1beta1/auth/jwks")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetJWKs", runtime.WithHTTPPathPattern("/v1beta1/auth/jwks")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetJWKs_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetJWKs_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8062,11 +8062,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetJWKs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetJWKs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetJWKs_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetJWKs_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8074,12 +8074,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetJWKs", runtime.WithHTTPPathPattern("/.well-known/jwks.json")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetJWKs", runtime.WithHTTPPathPattern("/.well-known/jwks.json")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetJWKs_1(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetJWKs_1(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8087,11 +8087,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetJWKs_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetJWKs_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListAuthStrategies_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListAuthStrategies_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8099,12 +8099,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListAuthStrategies", runtime.WithHTTPPathPattern("/v1beta1/auth")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListAuthStrategies", runtime.WithHTTPPathPattern("/v1beta1/auth")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListAuthStrategies_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListAuthStrategies_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8112,11 +8112,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListAuthStrategies_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListAuthStrategies_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8124,12 +8124,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_Authenticate_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_Authenticate_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8137,11 +8137,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_Authenticate_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_Authenticate_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_Authenticate_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_Authenticate_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8149,12 +8149,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_Authenticate_1(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_Authenticate_1(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8162,11 +8162,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_Authenticate_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_Authenticate_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_AuthCallback_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_AuthCallback_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8174,12 +8174,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AuthCallback_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AuthCallback_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8187,11 +8187,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AuthCallback_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthCallback_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AuthCallback_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AuthCallback_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8199,12 +8199,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AuthCallback_1(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AuthCallback_1(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8212,11 +8212,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AuthCallback_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthCallback_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AuthToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AuthToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8224,12 +8224,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthToken", runtime.WithHTTPPathPattern("/v1beta1/auth/token")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthToken", runtime.WithHTTPPathPattern("/v1beta1/auth/token")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AuthToken_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AuthToken_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8237,11 +8237,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AuthToken_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthToken_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_AuthLogout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_AuthLogout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8249,12 +8249,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AuthLogout_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AuthLogout_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8262,11 +8262,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AuthLogout_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthLogout_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_AuthLogout_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_AuthLogout_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8274,12 +8274,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_AuthLogout_1(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_AuthLogout_1(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8287,11 +8287,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_AuthLogout_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthLogout_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListMetaSchemas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListMetaSchemas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8299,12 +8299,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListMetaSchemas", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListMetaSchemas", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListMetaSchemas_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListMetaSchemas_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8312,11 +8312,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListMetaSchemas_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListMetaSchemas_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8324,12 +8324,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8337,11 +8337,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8349,12 +8349,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8362,11 +8362,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8374,12 +8374,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_UpdateMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_UpdateMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8387,11 +8387,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_UpdateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8399,12 +8399,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_DeleteMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_DeleteMetaSchema_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8412,11 +8412,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_DeleteMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8424,12 +8424,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_ListOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_ListOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8437,11 +8437,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_ListOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8449,12 +8449,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_CreateOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_CreateOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8462,11 +8462,11 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_CreateOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationAuditLog_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationAuditLog_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() var stream runtime.ServerTransportStream @@ -8474,12 +8474,12 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationAuditLog", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs/{id}")) + annotatedContext, err = runtime.AnnotateIncomingContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationAuditLog", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := local_request_ShieldService_GetOrganizationAuditLog_0(annotatedContext, inboundMarshaler, server, req, pathParams) + resp, md, err := local_request_FrontierService_GetOrganizationAuditLog_0(annotatedContext, inboundMarshaler, server, req, pathParams) md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { @@ -8487,16 +8487,16 @@ func RegisterShieldServiceHandlerServer(ctx context.Context, mux *runtime.ServeM return } - forward_ShieldService_GetOrganizationAuditLog_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationAuditLog_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) return nil } -// RegisterShieldServiceHandlerFromEndpoint is same as RegisterShieldServiceHandler but +// RegisterFrontierServiceHandlerFromEndpoint is same as RegisterFrontierServiceHandler but // automatically dials to "endpoint" and closes the connection when "ctx" gets done. -func RegisterShieldServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { +func RegisterFrontierServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) { conn, err := grpc.DialContext(ctx, endpoint, opts...) if err != nil { return err @@ -8516,2307 +8516,2307 @@ func RegisterShieldServiceHandlerFromEndpoint(ctx context.Context, mux *runtime. }() }() - return RegisterShieldServiceHandler(ctx, mux, conn) + return RegisterFrontierServiceHandler(ctx, mux, conn) } -// RegisterShieldServiceHandler registers the http handlers for service ShieldService to "mux". +// RegisterFrontierServiceHandler registers the http handlers for service FrontierService to "mux". // The handlers forward requests to the grpc endpoint over "conn". -func RegisterShieldServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { - return RegisterShieldServiceHandlerClient(ctx, mux, NewShieldServiceClient(conn)) +func RegisterFrontierServiceHandler(ctx context.Context, mux *runtime.ServeMux, conn *grpc.ClientConn) error { + return RegisterFrontierServiceHandlerClient(ctx, mux, NewFrontierServiceClient(conn)) } -// RegisterShieldServiceHandlerClient registers the http handlers for service ShieldService -// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "ShieldServiceClient". -// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "ShieldServiceClient" +// RegisterFrontierServiceHandlerClient registers the http handlers for service FrontierService +// to "mux". The handlers forward requests to the grpc endpoint over the given implementation of "FrontierServiceClient". +// Note: the gRPC framework executes interceptors within the gRPC handler. If the passed in "FrontierServiceClient" // doesn't go through the normal gRPC flow (creating a gRPC client etc.) then it will be up to the passed in -// "ShieldServiceClient" to call the correct interceptors. -func RegisterShieldServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client ShieldServiceClient) error { +// "FrontierServiceClient" to call the correct interceptors. +func RegisterFrontierServiceHandlerClient(ctx context.Context, mux *runtime.ServeMux, client FrontierServiceClient) error { - mux.Handle("GET", pattern_ShieldService_ListUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUsers", runtime.WithHTTPPathPattern("/v1beta1/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUsers", runtime.WithHTTPPathPattern("/v1beta1/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateUser", runtime.WithHTTPPathPattern("/v1beta1/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateUser", runtime.WithHTTPPathPattern("/v1beta1/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/groups")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListUserGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListUserGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListCurrentUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListCurrentUserGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListCurrentUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/self/groups")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListCurrentUserGroups", runtime.WithHTTPPathPattern("/v1beta1/users/self/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListCurrentUserGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListCurrentUserGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListCurrentUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListCurrentUserGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/enable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_EnableUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_EnableUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_EnableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/disable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DisableUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DisableUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DisableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/organizations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganizationsByUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganizationsByUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganizationsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/organizations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganizationsByCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganizationsByCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganizationsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectsByUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/projects")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectsByUser", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetProjectsByUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetProjectsByUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetProjectsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectsByUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectsByCurrentUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/projects")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectsByCurrentUser", runtime.WithHTTPPathPattern("/v1beta1/users/self/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetProjectsByCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetProjectsByCurrentUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetProjectsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectsByCurrentUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListUserInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListUserInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListUserInvitations", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/invitations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListUserInvitations", runtime.WithHTTPPathPattern("/v1beta1/users/{id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListUserInvitations_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListUserInvitations_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListUserInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListUserInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListServiceUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListServiceUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUser", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteServiceUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUserKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUserKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUserKeys", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUserKeys", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListServiceUserKeys_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListServiceUserKeys_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListServiceUserKeys_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUserKeys_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUserKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserKey", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/keys/{key_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteServiceUserKey_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUserKey_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateServiceUserSecret_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateServiceUserSecret_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListServiceUserSecrets_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListServiceUserSecrets_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListServiceUserSecrets", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListServiceUserSecrets", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListServiceUserSecrets_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListServiceUserSecrets_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListServiceUserSecrets_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListServiceUserSecrets_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteServiceUserSecret_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets/{secret_id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserSecret", runtime.WithHTTPPathPattern("/v1beta1/serviceusers/{id}/secrets/{secret_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteServiceUserSecret_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteServiceUserSecret_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteServiceUserSecret_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationGroups_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationGroups", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationGroups", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationGroups_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationGroups_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListGroupUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListGroupUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AddGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AddGroupUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AddGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AddGroupUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AddGroupUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AddGroupUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AddGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AddGroupUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_RemoveGroupUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_RemoveGroupUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/RemoveGroupUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users/{user_id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/RemoveGroupUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/users/{user_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_RemoveGroupUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_RemoveGroupUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_RemoveGroupUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_RemoveGroupUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/enable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_EnableGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_EnableGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_EnableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/disable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DisableGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DisableGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DisableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteGroup_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteGroup", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/groups/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteGroup_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteGroup_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListRoles", runtime.WithHTTPPathPattern("/v1beta1/roles")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListRoles", runtime.WithHTTPPathPattern("/v1beta1/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListRoles_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListRoles_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationRoles_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationRoles", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationRoles", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationRoles_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationRoles_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationRoles_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganizationRole_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationRole", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/roles/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteOrganizationRole_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganizationRole_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizations", runtime.WithHTTPPathPattern("/v1beta1/organizations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizations", runtime.WithHTTPPathPattern("/v1beta1/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizations_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizations_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationProjects_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationProjects", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/projects")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationProjects", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationProjects_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationProjects_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationProjects_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationProjects_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationAdmins", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/admins")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAdmins", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/admins")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationAdmins_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationAdmins_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AddOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AddOrganizationUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AddOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AddOrganizationUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AddOrganizationUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AddOrganizationUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AddOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AddOrganizationUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_RemoveOrganizationUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_RemoveOrganizationUser_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/RemoveOrganizationUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users/{user_id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/RemoveOrganizationUser", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/users/{user_id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_RemoveOrganizationUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_RemoveOrganizationUser_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_RemoveOrganizationUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_RemoveOrganizationUser_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationServiceUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/serviceusers")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationServiceUsers", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/serviceusers")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationServiceUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationServiceUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationServiceUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationInvitations_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationInvitations", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationInvitations", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationInvitations_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationInvitations_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationInvitations_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AcceptOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AcceptOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AcceptOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}/accept")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AcceptOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}/accept")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AcceptOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AcceptOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AcceptOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AcceptOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganizationInvitation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationInvitation", runtime.WithHTTPPathPattern("/v1beta1/organizations/{org_id}/invitations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteOrganizationInvitation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganizationInvitation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/enable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_EnableOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_EnableOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_EnableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/disable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DisableOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DisableOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DisableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteOrganization_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteOrganization", runtime.WithHTTPPathPattern("/v1beta1/organizations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteOrganization_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteOrganization_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateProject", runtime.WithHTTPPathPattern("/v1beta1/projects")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateProject", runtime.WithHTTPPathPattern("/v1beta1/projects")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectAdmins_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectAdmins", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/admins")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectAdmins", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/admins")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListProjectAdmins_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListProjectAdmins_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListProjectAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectAdmins_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectUsers_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectUsers", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/users")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectUsers", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/users")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListProjectUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListProjectUsers_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListProjectUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectUsers_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_EnableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_EnableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/EnableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/enable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/EnableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/enable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_EnableProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_EnableProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_EnableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_EnableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_DisableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_DisableProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DisableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/disable")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DisableProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}/disable")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DisableProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DisableProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DisableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DisableProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteProject_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteProject", runtime.WithHTTPPathPattern("/v1beta1/projects/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteProject_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteProject_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreatePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreatePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetPolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetPolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetPolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetPolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetPolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetPolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetPolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdatePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdatePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdatePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdatePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdatePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeletePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeletePolicy_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeletePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeletePolicy", runtime.WithHTTPPathPattern("/v1beta1/policies/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeletePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeletePolicy_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeletePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeletePolicy_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateRelation", runtime.WithHTTPPathPattern("/v1beta1/relations")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateRelation", runtime.WithHTTPPathPattern("/v1beta1/relations")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteRelation_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{relation}/object/{object}/subject/{subject}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteRelation", runtime.WithHTTPPathPattern("/v1beta1/relations/{relation}/object/{object}/subject/{subject}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteRelation_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteRelation_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListPermissions_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListPermissions", runtime.WithHTTPPathPattern("/v1beta1/permissions")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListPermissions", runtime.WithHTTPPathPattern("/v1beta1/permissions")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListPermissions_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListPermissions_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListPermissions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListPermissions_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetPermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetPermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetPermission", runtime.WithHTTPPathPattern("/v1beta1/permissions/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetPermission_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetPermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListNamespaces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListNamespaces_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListNamespaces", runtime.WithHTTPPathPattern("/v1beta1/namespaces")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListNamespaces", runtime.WithHTTPPathPattern("/v1beta1/namespaces")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListNamespaces_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListNamespaces_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListNamespaces_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListNamespaces_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetNamespace_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetNamespace_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetNamespace", runtime.WithHTTPPathPattern("/v1beta1/namespaces/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetNamespace", runtime.WithHTTPPathPattern("/v1beta1/namespaces/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetNamespace_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetNamespace_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetNamespace_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetNamespace_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListProjectResources_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListProjectResources_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListProjectResources", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListProjectResources", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListProjectResources_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListProjectResources_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListProjectResources_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListProjectResources_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteProjectResource_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteProjectResource", runtime.WithHTTPPathPattern("/v1beta1/projects/{project_id}/resources/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteProjectResource_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteProjectResource_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CheckResourcePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CheckResourcePermission_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CheckResourcePermission", runtime.WithHTTPPathPattern("/v1beta1/check")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CheckResourcePermission", runtime.WithHTTPPathPattern("/v1beta1/check")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CheckResourcePermission_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CheckResourcePermission_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CheckResourcePermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CheckResourcePermission_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetJWKs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetJWKs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetJWKs", runtime.WithHTTPPathPattern("/v1beta1/auth/jwks")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetJWKs", runtime.WithHTTPPathPattern("/v1beta1/auth/jwks")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetJWKs_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetJWKs_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetJWKs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetJWKs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetJWKs_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetJWKs_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetJWKs", runtime.WithHTTPPathPattern("/.well-known/jwks.json")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetJWKs", runtime.WithHTTPPathPattern("/.well-known/jwks.json")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetJWKs_1(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetJWKs_1(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetJWKs_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetJWKs_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListAuthStrategies_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListAuthStrategies_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListAuthStrategies", runtime.WithHTTPPathPattern("/v1beta1/auth")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListAuthStrategies", runtime.WithHTTPPathPattern("/v1beta1/auth")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListAuthStrategies_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListAuthStrategies_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListAuthStrategies_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListAuthStrategies_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_Authenticate_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_Authenticate_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_Authenticate_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_Authenticate_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_Authenticate_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_Authenticate_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_Authenticate_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/Authenticate", runtime.WithHTTPPathPattern("/v1beta1/auth/register/{strategy_name}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_Authenticate_1(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_Authenticate_1(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_Authenticate_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_Authenticate_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_AuthCallback_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_AuthCallback_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AuthCallback_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AuthCallback_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AuthCallback_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthCallback_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AuthCallback_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AuthCallback_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthCallback", runtime.WithHTTPPathPattern("/v1beta1/auth/callback")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AuthCallback_1(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AuthCallback_1(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AuthCallback_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthCallback_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_AuthToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_AuthToken_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthToken", runtime.WithHTTPPathPattern("/v1beta1/auth/token")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthToken", runtime.WithHTTPPathPattern("/v1beta1/auth/token")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AuthToken_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AuthToken_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AuthToken_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthToken_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_AuthLogout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_AuthLogout_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AuthLogout_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AuthLogout_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AuthLogout_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthLogout_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_AuthLogout_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_AuthLogout_1, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/AuthLogout", runtime.WithHTTPPathPattern("/v1beta1/auth/logout")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_AuthLogout_1(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_AuthLogout_1(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_AuthLogout_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_AuthLogout_1(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListMetaSchemas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListMetaSchemas_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListMetaSchemas", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListMetaSchemas", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListMetaSchemas_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListMetaSchemas_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListMetaSchemas_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListMetaSchemas_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("PUT", pattern_ShieldService_UpdateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("PUT", pattern_FrontierService_UpdateMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/UpdateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/UpdateMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_UpdateMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_UpdateMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_UpdateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_UpdateMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("DELETE", pattern_ShieldService_DeleteMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("DELETE", pattern_FrontierService_DeleteMetaSchema_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/DeleteMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/DeleteMetaSchema", runtime.WithHTTPPathPattern("/v1beta1/meta/schemas/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_DeleteMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_DeleteMetaSchema_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_DeleteMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_DeleteMetaSchema_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_ListOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_ListOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/ListOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_ListOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_ListOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_ListOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_ListOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("POST", pattern_ShieldService_CreateOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("POST", pattern_FrontierService_CreateOrganizationAuditLogs_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/CreateOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationAuditLogs", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_CreateOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_CreateOrganizationAuditLogs_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_CreateOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_CreateOrganizationAuditLogs_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) - mux.Handle("GET", pattern_ShieldService_GetOrganizationAuditLog_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + mux.Handle("GET", pattern_FrontierService_GetOrganizationAuditLog_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { ctx, cancel := context.WithCancel(req.Context()) defer cancel() inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) var err error var annotatedContext context.Context - annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.shield.v1beta1.ShieldService/GetOrganizationAuditLog", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs/{id}")) + annotatedContext, err = runtime.AnnotateContext(ctx, mux, req, "/raystack.frontier.v1beta1.FrontierService/GetOrganizationAuditLog", runtime.WithHTTPPathPattern("/v1beta1/organization/{org_id}/auditlogs/{id}")) if err != nil { runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) return } - resp, md, err := request_ShieldService_GetOrganizationAuditLog_0(annotatedContext, inboundMarshaler, client, req, pathParams) + resp, md, err := request_FrontierService_GetOrganizationAuditLog_0(annotatedContext, inboundMarshaler, client, req, pathParams) annotatedContext = runtime.NewServerMetadataContext(annotatedContext, md) if err != nil { runtime.HTTPError(annotatedContext, mux, outboundMarshaler, w, req, err) return } - forward_ShieldService_GetOrganizationAuditLog_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + forward_FrontierService_GetOrganizationAuditLog_0(annotatedContext, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) }) @@ -10824,421 +10824,421 @@ func RegisterShieldServiceHandlerClient(ctx context.Context, mux *runtime.ServeM } var ( - pattern_ShieldService_ListUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "users"}, "")) + pattern_FrontierService_ListUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "users"}, "")) - pattern_ShieldService_CreateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "users"}, "")) + pattern_FrontierService_CreateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "users"}, "")) - pattern_ShieldService_GetUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) + pattern_FrontierService_GetUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) - pattern_ShieldService_ListUserGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "groups"}, "")) + pattern_FrontierService_ListUserGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "groups"}, "")) - pattern_ShieldService_ListCurrentUserGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "groups"}, "")) + pattern_FrontierService_ListCurrentUserGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "groups"}, "")) - pattern_ShieldService_GetCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "users", "self"}, "")) + pattern_FrontierService_GetCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "users", "self"}, "")) - pattern_ShieldService_UpdateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) + pattern_FrontierService_UpdateUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) - pattern_ShieldService_UpdateCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "users", "self"}, "")) + pattern_FrontierService_UpdateCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "users", "self"}, "")) - pattern_ShieldService_EnableUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "enable"}, "")) + pattern_FrontierService_EnableUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "enable"}, "")) - pattern_ShieldService_DisableUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "disable"}, "")) + pattern_FrontierService_DisableUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "disable"}, "")) - pattern_ShieldService_DeleteUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) + pattern_FrontierService_DeleteUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "users", "id"}, "")) - pattern_ShieldService_GetOrganizationsByUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "organizations"}, "")) + pattern_FrontierService_GetOrganizationsByUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "organizations"}, "")) - pattern_ShieldService_GetOrganizationsByCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "organizations"}, "")) + pattern_FrontierService_GetOrganizationsByCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "organizations"}, "")) - pattern_ShieldService_GetProjectsByUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "projects"}, "")) + pattern_FrontierService_GetProjectsByUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "projects"}, "")) - pattern_ShieldService_GetProjectsByCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "projects"}, "")) + pattern_FrontierService_GetProjectsByCurrentUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"v1beta1", "users", "self", "projects"}, "")) - pattern_ShieldService_ListUserInvitations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "invitations"}, "")) + pattern_FrontierService_ListUserInvitations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "users", "id", "invitations"}, "")) - pattern_ShieldService_ListServiceUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "serviceusers"}, "")) + pattern_FrontierService_ListServiceUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "serviceusers"}, "")) - pattern_ShieldService_CreateServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "serviceusers"}, "")) + pattern_FrontierService_CreateServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "serviceusers"}, "")) - pattern_ShieldService_GetServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "serviceusers", "id"}, "")) + pattern_FrontierService_GetServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "serviceusers", "id"}, "")) - pattern_ShieldService_DeleteServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "serviceusers", "id"}, "")) + pattern_FrontierService_DeleteServiceUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "serviceusers", "id"}, "")) - pattern_ShieldService_CreateServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "keys"}, "")) + pattern_FrontierService_CreateServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "keys"}, "")) - pattern_ShieldService_ListServiceUserKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "keys"}, "")) + pattern_FrontierService_ListServiceUserKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "keys"}, "")) - pattern_ShieldService_GetServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "keys", "key_id"}, "")) + pattern_FrontierService_GetServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "keys", "key_id"}, "")) - pattern_ShieldService_DeleteServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "keys", "key_id"}, "")) + pattern_FrontierService_DeleteServiceUserKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "keys", "key_id"}, "")) - pattern_ShieldService_CreateServiceUserSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "secrets"}, "")) + pattern_FrontierService_CreateServiceUserSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "secrets"}, "")) - pattern_ShieldService_ListServiceUserSecrets_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "secrets"}, "")) + pattern_FrontierService_ListServiceUserSecrets_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "serviceusers", "id", "secrets"}, "")) - pattern_ShieldService_DeleteServiceUserSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "secrets", "secret_id"}, "")) + pattern_FrontierService_DeleteServiceUserSecret_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "serviceusers", "id", "secrets", "secret_id"}, "")) - pattern_ShieldService_ListOrganizationGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "groups"}, "")) + pattern_FrontierService_ListOrganizationGroups_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "groups"}, "")) - pattern_ShieldService_CreateGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "groups"}, "")) + pattern_FrontierService_CreateGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "groups"}, "")) - pattern_ShieldService_GetGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) + pattern_FrontierService_GetGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) - pattern_ShieldService_UpdateGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) + pattern_FrontierService_UpdateGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) - pattern_ShieldService_ListGroupUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users"}, "")) + pattern_FrontierService_ListGroupUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users"}, "")) - pattern_ShieldService_AddGroupUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users"}, "")) + pattern_FrontierService_AddGroupUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users"}, "")) - pattern_ShieldService_RemoveGroupUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5, 1, 0, 4, 1, 5, 6}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users", "user_id"}, "")) + pattern_FrontierService_RemoveGroupUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5, 1, 0, 4, 1, 5, 6}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "users", "user_id"}, "")) - pattern_ShieldService_EnableGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "enable"}, "")) + pattern_FrontierService_EnableGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "enable"}, "")) - pattern_ShieldService_DisableGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "disable"}, "")) + pattern_FrontierService_DisableGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "groups", "id", "disable"}, "")) - pattern_ShieldService_DeleteGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) + pattern_FrontierService_DeleteGroup_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "groups", "id"}, "")) - pattern_ShieldService_ListRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "roles"}, "")) + pattern_FrontierService_ListRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "roles"}, "")) - pattern_ShieldService_ListOrganizationRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "roles"}, "")) + pattern_FrontierService_ListOrganizationRoles_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "roles"}, "")) - pattern_ShieldService_CreateOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "roles"}, "")) + pattern_FrontierService_CreateOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "roles"}, "")) - pattern_ShieldService_GetOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) + pattern_FrontierService_GetOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) - pattern_ShieldService_UpdateOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) + pattern_FrontierService_UpdateOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) - pattern_ShieldService_DeleteOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) + pattern_FrontierService_DeleteOrganizationRole_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "roles", "id"}, "")) - pattern_ShieldService_ListOrganizations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "organizations"}, "")) + pattern_FrontierService_ListOrganizations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "organizations"}, "")) - pattern_ShieldService_CreateOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "organizations"}, "")) + pattern_FrontierService_CreateOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "organizations"}, "")) - pattern_ShieldService_GetOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) + pattern_FrontierService_GetOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) - pattern_ShieldService_UpdateOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) + pattern_FrontierService_UpdateOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) - pattern_ShieldService_ListOrganizationProjects_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "projects"}, "")) + pattern_FrontierService_ListOrganizationProjects_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "projects"}, "")) - pattern_ShieldService_ListOrganizationAdmins_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "admins"}, "")) + pattern_FrontierService_ListOrganizationAdmins_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "admins"}, "")) - pattern_ShieldService_ListOrganizationUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "users"}, "")) + pattern_FrontierService_ListOrganizationUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "users"}, "")) - pattern_ShieldService_AddOrganizationUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "users"}, "")) + pattern_FrontierService_AddOrganizationUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "users"}, "")) - pattern_ShieldService_RemoveOrganizationUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "id", "users", "user_id"}, "")) + pattern_FrontierService_RemoveOrganizationUser_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "id", "users", "user_id"}, "")) - pattern_ShieldService_ListOrganizationServiceUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "serviceusers"}, "")) + pattern_FrontierService_ListOrganizationServiceUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "serviceusers"}, "")) - pattern_ShieldService_ListOrganizationInvitations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "invitations"}, "")) + pattern_FrontierService_ListOrganizationInvitations_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "invitations"}, "")) - pattern_ShieldService_CreateOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "invitations"}, "")) + pattern_FrontierService_CreateOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "org_id", "invitations"}, "")) - pattern_ShieldService_GetOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "invitations", "id"}, "")) + pattern_FrontierService_GetOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "invitations", "id"}, "")) - pattern_ShieldService_AcceptOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "invitations", "id", "accept"}, "")) + pattern_FrontierService_AcceptOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4, 2, 5}, []string{"v1beta1", "organizations", "org_id", "invitations", "id", "accept"}, "")) - pattern_ShieldService_DeleteOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "invitations", "id"}, "")) + pattern_FrontierService_DeleteOrganizationInvitation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organizations", "org_id", "invitations", "id"}, "")) - pattern_ShieldService_EnableOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "enable"}, "")) + pattern_FrontierService_EnableOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "enable"}, "")) - pattern_ShieldService_DisableOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "disable"}, "")) + pattern_FrontierService_DisableOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organizations", "id", "disable"}, "")) - pattern_ShieldService_DeleteOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) + pattern_FrontierService_DeleteOrganization_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "organizations", "id"}, "")) - pattern_ShieldService_CreateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "projects"}, "")) + pattern_FrontierService_CreateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "projects"}, "")) - pattern_ShieldService_GetProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) + pattern_FrontierService_GetProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) - pattern_ShieldService_UpdateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) + pattern_FrontierService_UpdateProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) - pattern_ShieldService_ListProjectAdmins_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "admins"}, "")) + pattern_FrontierService_ListProjectAdmins_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "admins"}, "")) - pattern_ShieldService_ListProjectUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "users"}, "")) + pattern_FrontierService_ListProjectUsers_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "users"}, "")) - pattern_ShieldService_EnableProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "enable"}, "")) + pattern_FrontierService_EnableProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "enable"}, "")) - pattern_ShieldService_DisableProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "disable"}, "")) + pattern_FrontierService_DisableProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "id", "disable"}, "")) - pattern_ShieldService_DeleteProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) + pattern_FrontierService_DeleteProject_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "projects", "id"}, "")) - pattern_ShieldService_CreatePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "policies"}, "")) + pattern_FrontierService_CreatePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "policies"}, "")) - pattern_ShieldService_GetPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) + pattern_FrontierService_GetPolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) - pattern_ShieldService_UpdatePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) + pattern_FrontierService_UpdatePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) - pattern_ShieldService_DeletePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) + pattern_FrontierService_DeletePolicy_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "policies", "id"}, "")) - pattern_ShieldService_CreateRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "relations"}, "")) + pattern_FrontierService_CreateRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "relations"}, "")) - pattern_ShieldService_GetRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "relations", "id"}, "")) + pattern_FrontierService_GetRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "relations", "id"}, "")) - pattern_ShieldService_DeleteRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "relations", "relation", "object", "subject"}, "")) + pattern_FrontierService_DeleteRelation_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 3, 2, 4, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "relations", "relation", "object", "subject"}, "")) - pattern_ShieldService_ListPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "permissions"}, "")) + pattern_FrontierService_ListPermissions_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "permissions"}, "")) - pattern_ShieldService_GetPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "permissions", "id"}, "")) + pattern_FrontierService_GetPermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "permissions", "id"}, "")) - pattern_ShieldService_ListNamespaces_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "namespaces"}, "")) + pattern_FrontierService_ListNamespaces_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "namespaces"}, "")) - pattern_ShieldService_GetNamespace_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "namespaces", "id"}, "")) + pattern_FrontierService_GetNamespace_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2}, []string{"v1beta1", "namespaces", "id"}, "")) - pattern_ShieldService_ListProjectResources_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "project_id", "resources"}, "")) + pattern_FrontierService_ListProjectResources_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "project_id", "resources"}, "")) - pattern_ShieldService_CreateProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "project_id", "resources"}, "")) + pattern_FrontierService_CreateProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "projects", "project_id", "resources"}, "")) - pattern_ShieldService_GetProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) + pattern_FrontierService_GetProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) - pattern_ShieldService_UpdateProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) + pattern_FrontierService_UpdateProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) - pattern_ShieldService_DeleteProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) + pattern_FrontierService_DeleteProjectResource_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "projects", "project_id", "resources", "id"}, "")) - pattern_ShieldService_CheckResourcePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "check"}, "")) + pattern_FrontierService_CheckResourcePermission_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "check"}, "")) - pattern_ShieldService_GetJWKs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "jwks"}, "")) + pattern_FrontierService_GetJWKs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "jwks"}, "")) - pattern_ShieldService_GetJWKs_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{".well-known", "jwks.json"}, "")) + pattern_FrontierService_GetJWKs_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{".well-known", "jwks.json"}, "")) - pattern_ShieldService_ListAuthStrategies_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "auth"}, "")) + pattern_FrontierService_ListAuthStrategies_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1}, []string{"v1beta1", "auth"}, "")) - pattern_ShieldService_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "auth", "register", "strategy_name"}, "")) + pattern_FrontierService_Authenticate_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "auth", "register", "strategy_name"}, "")) - pattern_ShieldService_Authenticate_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "auth", "register", "strategy_name"}, "")) + pattern_FrontierService_Authenticate_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "auth", "register", "strategy_name"}, "")) - pattern_ShieldService_AuthCallback_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "callback"}, "")) + pattern_FrontierService_AuthCallback_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "callback"}, "")) - pattern_ShieldService_AuthCallback_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "callback"}, "")) + pattern_FrontierService_AuthCallback_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "callback"}, "")) - pattern_ShieldService_AuthToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "token"}, "")) + pattern_FrontierService_AuthToken_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "token"}, "")) - pattern_ShieldService_AuthLogout_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "logout"}, "")) + pattern_FrontierService_AuthLogout_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "logout"}, "")) - pattern_ShieldService_AuthLogout_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "logout"}, "")) + pattern_FrontierService_AuthLogout_1 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "auth", "logout"}, "")) - pattern_ShieldService_ListMetaSchemas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "meta", "schemas"}, "")) + pattern_FrontierService_ListMetaSchemas_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "meta", "schemas"}, "")) - pattern_ShieldService_CreateMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "meta", "schemas"}, "")) + pattern_FrontierService_CreateMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"v1beta1", "meta", "schemas"}, "")) - pattern_ShieldService_GetMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) + pattern_FrontierService_GetMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) - pattern_ShieldService_UpdateMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) + pattern_FrontierService_UpdateMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) - pattern_ShieldService_DeleteMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) + pattern_FrontierService_DeleteMetaSchema_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3}, []string{"v1beta1", "meta", "schemas", "id"}, "")) - pattern_ShieldService_ListOrganizationAuditLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organization", "org_id", "auditlogs"}, "")) + pattern_FrontierService_ListOrganizationAuditLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organization", "org_id", "auditlogs"}, "")) - pattern_ShieldService_CreateOrganizationAuditLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organization", "org_id", "auditlogs"}, "")) + pattern_FrontierService_CreateOrganizationAuditLogs_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3}, []string{"v1beta1", "organization", "org_id", "auditlogs"}, "")) - pattern_ShieldService_GetOrganizationAuditLog_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organization", "org_id", "auditlogs", "id"}, "")) + pattern_FrontierService_GetOrganizationAuditLog_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 1, 0, 4, 1, 5, 2, 2, 3, 1, 0, 4, 1, 5, 4}, []string{"v1beta1", "organization", "org_id", "auditlogs", "id"}, "")) ) var ( - forward_ShieldService_ListUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListUserGroups_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListUserGroups_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListCurrentUserGroups_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListCurrentUserGroups_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetCurrentUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetCurrentUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateCurrentUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateCurrentUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_EnableUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_EnableUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_DisableUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_DisableUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganizationsByUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganizationsByUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganizationsByCurrentUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganizationsByCurrentUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetProjectsByUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetProjectsByUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetProjectsByCurrentUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetProjectsByCurrentUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListUserInvitations_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListUserInvitations_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListServiceUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListServiceUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateServiceUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateServiceUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetServiceUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetServiceUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteServiceUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteServiceUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateServiceUserKey_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateServiceUserKey_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListServiceUserKeys_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListServiceUserKeys_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetServiceUserKey_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetServiceUserKey_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteServiceUserKey_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteServiceUserKey_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateServiceUserSecret_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateServiceUserSecret_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListServiceUserSecrets_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListServiceUserSecrets_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteServiceUserSecret_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteServiceUserSecret_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationGroups_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationGroups_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListGroupUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListGroupUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_AddGroupUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_AddGroupUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_RemoveGroupUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_RemoveGroupUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_EnableGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_EnableGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_DisableGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_DisableGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteGroup_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteGroup_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListRoles_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListRoles_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationRoles_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationRoles_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateOrganizationRole_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateOrganizationRole_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganizationRole_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganizationRole_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateOrganizationRole_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateOrganizationRole_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteOrganizationRole_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteOrganizationRole_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizations_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizations_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationProjects_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationProjects_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationAdmins_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationAdmins_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_AddOrganizationUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_AddOrganizationUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_RemoveOrganizationUser_0 = runtime.ForwardResponseMessage + forward_FrontierService_RemoveOrganizationUser_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationServiceUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationServiceUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationInvitations_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationInvitations_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateOrganizationInvitation_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateOrganizationInvitation_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganizationInvitation_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganizationInvitation_0 = runtime.ForwardResponseMessage - forward_ShieldService_AcceptOrganizationInvitation_0 = runtime.ForwardResponseMessage + forward_FrontierService_AcceptOrganizationInvitation_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteOrganizationInvitation_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteOrganizationInvitation_0 = runtime.ForwardResponseMessage - forward_ShieldService_EnableOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_EnableOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_DisableOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_DisableOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteOrganization_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteOrganization_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListProjectAdmins_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListProjectAdmins_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListProjectUsers_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListProjectUsers_0 = runtime.ForwardResponseMessage - forward_ShieldService_EnableProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_EnableProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_DisableProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_DisableProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteProject_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteProject_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreatePolicy_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreatePolicy_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetPolicy_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetPolicy_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdatePolicy_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdatePolicy_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeletePolicy_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeletePolicy_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateRelation_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateRelation_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetRelation_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetRelation_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteRelation_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteRelation_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListPermissions_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListPermissions_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetPermission_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetPermission_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListNamespaces_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListNamespaces_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetNamespace_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetNamespace_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListProjectResources_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListProjectResources_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateProjectResource_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateProjectResource_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetProjectResource_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetProjectResource_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateProjectResource_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateProjectResource_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteProjectResource_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteProjectResource_0 = runtime.ForwardResponseMessage - forward_ShieldService_CheckResourcePermission_0 = runtime.ForwardResponseMessage + forward_FrontierService_CheckResourcePermission_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetJWKs_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetJWKs_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetJWKs_1 = runtime.ForwardResponseMessage + forward_FrontierService_GetJWKs_1 = runtime.ForwardResponseMessage - forward_ShieldService_ListAuthStrategies_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListAuthStrategies_0 = runtime.ForwardResponseMessage - forward_ShieldService_Authenticate_0 = runtime.ForwardResponseMessage + forward_FrontierService_Authenticate_0 = runtime.ForwardResponseMessage - forward_ShieldService_Authenticate_1 = runtime.ForwardResponseMessage + forward_FrontierService_Authenticate_1 = runtime.ForwardResponseMessage - forward_ShieldService_AuthCallback_0 = runtime.ForwardResponseMessage + forward_FrontierService_AuthCallback_0 = runtime.ForwardResponseMessage - forward_ShieldService_AuthCallback_1 = runtime.ForwardResponseMessage + forward_FrontierService_AuthCallback_1 = runtime.ForwardResponseMessage - forward_ShieldService_AuthToken_0 = runtime.ForwardResponseMessage + forward_FrontierService_AuthToken_0 = runtime.ForwardResponseMessage - forward_ShieldService_AuthLogout_0 = runtime.ForwardResponseMessage + forward_FrontierService_AuthLogout_0 = runtime.ForwardResponseMessage - forward_ShieldService_AuthLogout_1 = runtime.ForwardResponseMessage + forward_FrontierService_AuthLogout_1 = runtime.ForwardResponseMessage - forward_ShieldService_ListMetaSchemas_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListMetaSchemas_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateMetaSchema_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateMetaSchema_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetMetaSchema_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetMetaSchema_0 = runtime.ForwardResponseMessage - forward_ShieldService_UpdateMetaSchema_0 = runtime.ForwardResponseMessage + forward_FrontierService_UpdateMetaSchema_0 = runtime.ForwardResponseMessage - forward_ShieldService_DeleteMetaSchema_0 = runtime.ForwardResponseMessage + forward_FrontierService_DeleteMetaSchema_0 = runtime.ForwardResponseMessage - forward_ShieldService_ListOrganizationAuditLogs_0 = runtime.ForwardResponseMessage + forward_FrontierService_ListOrganizationAuditLogs_0 = runtime.ForwardResponseMessage - forward_ShieldService_CreateOrganizationAuditLogs_0 = runtime.ForwardResponseMessage + forward_FrontierService_CreateOrganizationAuditLogs_0 = runtime.ForwardResponseMessage - forward_ShieldService_GetOrganizationAuditLog_0 = runtime.ForwardResponseMessage + forward_FrontierService_GetOrganizationAuditLog_0 = runtime.ForwardResponseMessage ) diff --git a/proto/v1beta1/shield.pb.validate.go b/proto/v1beta1/shield.pb.validate.go index 5cb78dd33..965ef7dda 100644 --- a/proto/v1beta1/shield.pb.validate.go +++ b/proto/v1beta1/shield.pb.validate.go @@ -1,7 +1,7 @@ // Code generated by protoc-gen-validate. DO NOT EDIT. -// source: raystack/shield/v1beta1/shield.proto +// source: raystack/frontier/v1beta1/frontier.proto -package shieldv1beta1 +package frontierv1beta1 import ( "bytes" diff --git a/proto/v1beta1/shield_grpc.pb.go b/proto/v1beta1/shield_grpc.pb.go index f62191c38..b39424b87 100644 --- a/proto/v1beta1/shield_grpc.pb.go +++ b/proto/v1beta1/shield_grpc.pb.go @@ -2,9 +2,9 @@ // versions: // - protoc-gen-go-grpc v1.3.0 // - protoc (unknown) -// source: raystack/shield/v1beta1/shield.proto +// source: raystack/frontier/v1beta1/frontier.proto -package shieldv1beta1 +package frontierv1beta1 import ( context "context" @@ -19,112 +19,112 @@ import ( const _ = grpc.SupportPackageIsVersion7 const ( - ShieldService_ListUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListUsers" - ShieldService_CreateUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateUser" - ShieldService_GetUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetUser" - ShieldService_ListUserGroups_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListUserGroups" - ShieldService_ListCurrentUserGroups_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListCurrentUserGroups" - ShieldService_GetCurrentUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetCurrentUser" - ShieldService_UpdateUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateUser" - ShieldService_UpdateCurrentUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateCurrentUser" - ShieldService_EnableUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/EnableUser" - ShieldService_DisableUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DisableUser" - ShieldService_DeleteUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteUser" - ShieldService_GetOrganizationsByUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByUser" - ShieldService_GetOrganizationsByCurrentUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganizationsByCurrentUser" - ShieldService_GetProjectsByUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetProjectsByUser" - ShieldService_GetProjectsByCurrentUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetProjectsByCurrentUser" - ShieldService_ListUserInvitations_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListUserInvitations" - ShieldService_ListServiceUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListServiceUsers" - ShieldService_CreateServiceUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateServiceUser" - ShieldService_GetServiceUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetServiceUser" - ShieldService_DeleteServiceUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteServiceUser" - ShieldService_CreateServiceUserKey_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateServiceUserKey" - ShieldService_ListServiceUserKeys_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListServiceUserKeys" - ShieldService_GetServiceUserKey_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetServiceUserKey" - ShieldService_DeleteServiceUserKey_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserKey" - ShieldService_CreateServiceUserSecret_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateServiceUserSecret" - ShieldService_ListServiceUserSecrets_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListServiceUserSecrets" - ShieldService_DeleteServiceUserSecret_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteServiceUserSecret" - ShieldService_ListOrganizationGroups_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationGroups" - ShieldService_CreateGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateGroup" - ShieldService_GetGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetGroup" - ShieldService_UpdateGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateGroup" - ShieldService_ListGroupUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListGroupUsers" - ShieldService_AddGroupUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AddGroupUsers" - ShieldService_RemoveGroupUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/RemoveGroupUser" - ShieldService_EnableGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/EnableGroup" - ShieldService_DisableGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DisableGroup" - ShieldService_DeleteGroup_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteGroup" - ShieldService_ListRoles_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListRoles" - ShieldService_ListOrganizationRoles_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationRoles" - ShieldService_CreateOrganizationRole_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateOrganizationRole" - ShieldService_GetOrganizationRole_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganizationRole" - ShieldService_UpdateOrganizationRole_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateOrganizationRole" - ShieldService_DeleteOrganizationRole_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationRole" - ShieldService_ListOrganizations_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizations" - ShieldService_CreateOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateOrganization" - ShieldService_GetOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganization" - ShieldService_UpdateOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateOrganization" - ShieldService_ListOrganizationProjects_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationProjects" - ShieldService_ListOrganizationAdmins_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationAdmins" - ShieldService_ListOrganizationUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationUsers" - ShieldService_AddOrganizationUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AddOrganizationUsers" - ShieldService_RemoveOrganizationUser_FullMethodName = "/raystack.shield.v1beta1.ShieldService/RemoveOrganizationUser" - ShieldService_ListOrganizationServiceUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationServiceUsers" - ShieldService_ListOrganizationInvitations_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationInvitations" - ShieldService_CreateOrganizationInvitation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateOrganizationInvitation" - ShieldService_GetOrganizationInvitation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganizationInvitation" - ShieldService_AcceptOrganizationInvitation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AcceptOrganizationInvitation" - ShieldService_DeleteOrganizationInvitation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteOrganizationInvitation" - ShieldService_EnableOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/EnableOrganization" - ShieldService_DisableOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DisableOrganization" - ShieldService_DeleteOrganization_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteOrganization" - ShieldService_CreateProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateProject" - ShieldService_GetProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetProject" - ShieldService_UpdateProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateProject" - ShieldService_ListProjectAdmins_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListProjectAdmins" - ShieldService_ListProjectUsers_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListProjectUsers" - ShieldService_EnableProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/EnableProject" - ShieldService_DisableProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DisableProject" - ShieldService_DeleteProject_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteProject" - ShieldService_CreatePolicy_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreatePolicy" - ShieldService_GetPolicy_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetPolicy" - ShieldService_UpdatePolicy_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdatePolicy" - ShieldService_DeletePolicy_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeletePolicy" - ShieldService_CreateRelation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateRelation" - ShieldService_GetRelation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetRelation" - ShieldService_DeleteRelation_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteRelation" - ShieldService_ListPermissions_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListPermissions" - ShieldService_GetPermission_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetPermission" - ShieldService_ListNamespaces_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListNamespaces" - ShieldService_GetNamespace_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetNamespace" - ShieldService_ListProjectResources_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListProjectResources" - ShieldService_CreateProjectResource_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateProjectResource" - ShieldService_GetProjectResource_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetProjectResource" - ShieldService_UpdateProjectResource_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateProjectResource" - ShieldService_DeleteProjectResource_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteProjectResource" - ShieldService_CheckResourcePermission_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CheckResourcePermission" - ShieldService_GetJWKs_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetJWKs" - ShieldService_ListAuthStrategies_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListAuthStrategies" - ShieldService_Authenticate_FullMethodName = "/raystack.shield.v1beta1.ShieldService/Authenticate" - ShieldService_AuthCallback_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AuthCallback" - ShieldService_AuthToken_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AuthToken" - ShieldService_AuthLogout_FullMethodName = "/raystack.shield.v1beta1.ShieldService/AuthLogout" - ShieldService_ListMetaSchemas_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListMetaSchemas" - ShieldService_CreateMetaSchema_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateMetaSchema" - ShieldService_GetMetaSchema_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetMetaSchema" - ShieldService_UpdateMetaSchema_FullMethodName = "/raystack.shield.v1beta1.ShieldService/UpdateMetaSchema" - ShieldService_DeleteMetaSchema_FullMethodName = "/raystack.shield.v1beta1.ShieldService/DeleteMetaSchema" - ShieldService_ListOrganizationAuditLogs_FullMethodName = "/raystack.shield.v1beta1.ShieldService/ListOrganizationAuditLogs" - ShieldService_CreateOrganizationAuditLogs_FullMethodName = "/raystack.shield.v1beta1.ShieldService/CreateOrganizationAuditLogs" - ShieldService_GetOrganizationAuditLog_FullMethodName = "/raystack.shield.v1beta1.ShieldService/GetOrganizationAuditLog" + FrontierService_ListUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListUsers" + FrontierService_CreateUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateUser" + FrontierService_GetUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetUser" + FrontierService_ListUserGroups_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListUserGroups" + FrontierService_ListCurrentUserGroups_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListCurrentUserGroups" + FrontierService_GetCurrentUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetCurrentUser" + FrontierService_UpdateUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateUser" + FrontierService_UpdateCurrentUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateCurrentUser" + FrontierService_EnableUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/EnableUser" + FrontierService_DisableUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DisableUser" + FrontierService_DeleteUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteUser" + FrontierService_GetOrganizationsByUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByUser" + FrontierService_GetOrganizationsByCurrentUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganizationsByCurrentUser" + FrontierService_GetProjectsByUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetProjectsByUser" + FrontierService_GetProjectsByCurrentUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetProjectsByCurrentUser" + FrontierService_ListUserInvitations_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListUserInvitations" + FrontierService_ListServiceUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListServiceUsers" + FrontierService_CreateServiceUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateServiceUser" + FrontierService_GetServiceUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetServiceUser" + FrontierService_DeleteServiceUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUser" + FrontierService_CreateServiceUserKey_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserKey" + FrontierService_ListServiceUserKeys_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListServiceUserKeys" + FrontierService_GetServiceUserKey_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetServiceUserKey" + FrontierService_DeleteServiceUserKey_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserKey" + FrontierService_CreateServiceUserSecret_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateServiceUserSecret" + FrontierService_ListServiceUserSecrets_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListServiceUserSecrets" + FrontierService_DeleteServiceUserSecret_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteServiceUserSecret" + FrontierService_ListOrganizationGroups_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationGroups" + FrontierService_CreateGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateGroup" + FrontierService_GetGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetGroup" + FrontierService_UpdateGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateGroup" + FrontierService_ListGroupUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListGroupUsers" + FrontierService_AddGroupUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AddGroupUsers" + FrontierService_RemoveGroupUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/RemoveGroupUser" + FrontierService_EnableGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/EnableGroup" + FrontierService_DisableGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DisableGroup" + FrontierService_DeleteGroup_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteGroup" + FrontierService_ListRoles_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListRoles" + FrontierService_ListOrganizationRoles_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationRoles" + FrontierService_CreateOrganizationRole_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationRole" + FrontierService_GetOrganizationRole_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganizationRole" + FrontierService_UpdateOrganizationRole_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateOrganizationRole" + FrontierService_DeleteOrganizationRole_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationRole" + FrontierService_ListOrganizations_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizations" + FrontierService_CreateOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateOrganization" + FrontierService_GetOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganization" + FrontierService_UpdateOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateOrganization" + FrontierService_ListOrganizationProjects_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationProjects" + FrontierService_ListOrganizationAdmins_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAdmins" + FrontierService_ListOrganizationUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationUsers" + FrontierService_AddOrganizationUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AddOrganizationUsers" + FrontierService_RemoveOrganizationUser_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/RemoveOrganizationUser" + FrontierService_ListOrganizationServiceUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationServiceUsers" + FrontierService_ListOrganizationInvitations_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationInvitations" + FrontierService_CreateOrganizationInvitation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationInvitation" + FrontierService_GetOrganizationInvitation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganizationInvitation" + FrontierService_AcceptOrganizationInvitation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AcceptOrganizationInvitation" + FrontierService_DeleteOrganizationInvitation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteOrganizationInvitation" + FrontierService_EnableOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/EnableOrganization" + FrontierService_DisableOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DisableOrganization" + FrontierService_DeleteOrganization_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteOrganization" + FrontierService_CreateProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateProject" + FrontierService_GetProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetProject" + FrontierService_UpdateProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateProject" + FrontierService_ListProjectAdmins_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListProjectAdmins" + FrontierService_ListProjectUsers_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListProjectUsers" + FrontierService_EnableProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/EnableProject" + FrontierService_DisableProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DisableProject" + FrontierService_DeleteProject_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteProject" + FrontierService_CreatePolicy_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreatePolicy" + FrontierService_GetPolicy_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetPolicy" + FrontierService_UpdatePolicy_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdatePolicy" + FrontierService_DeletePolicy_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeletePolicy" + FrontierService_CreateRelation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateRelation" + FrontierService_GetRelation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetRelation" + FrontierService_DeleteRelation_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteRelation" + FrontierService_ListPermissions_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListPermissions" + FrontierService_GetPermission_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetPermission" + FrontierService_ListNamespaces_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListNamespaces" + FrontierService_GetNamespace_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetNamespace" + FrontierService_ListProjectResources_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListProjectResources" + FrontierService_CreateProjectResource_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateProjectResource" + FrontierService_GetProjectResource_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetProjectResource" + FrontierService_UpdateProjectResource_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateProjectResource" + FrontierService_DeleteProjectResource_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteProjectResource" + FrontierService_CheckResourcePermission_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CheckResourcePermission" + FrontierService_GetJWKs_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetJWKs" + FrontierService_ListAuthStrategies_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListAuthStrategies" + FrontierService_Authenticate_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/Authenticate" + FrontierService_AuthCallback_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AuthCallback" + FrontierService_AuthToken_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AuthToken" + FrontierService_AuthLogout_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/AuthLogout" + FrontierService_ListMetaSchemas_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListMetaSchemas" + FrontierService_CreateMetaSchema_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateMetaSchema" + FrontierService_GetMetaSchema_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetMetaSchema" + FrontierService_UpdateMetaSchema_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/UpdateMetaSchema" + FrontierService_DeleteMetaSchema_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/DeleteMetaSchema" + FrontierService_ListOrganizationAuditLogs_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/ListOrganizationAuditLogs" + FrontierService_CreateOrganizationAuditLogs_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/CreateOrganizationAuditLogs" + FrontierService_GetOrganizationAuditLog_FullMethodName = "/raystack.frontier.v1beta1.FrontierService/GetOrganizationAuditLog" ) -// ShieldServiceClient is the client API for ShieldService service. +// FrontierServiceClient is the client API for FrontierService service. // // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://pkg.go.dev/google.golang.org/grpc/?tab=doc#ClientConn.NewStream. -type ShieldServiceClient interface { +type FrontierServiceClient interface { // Users ListUsers(ctx context.Context, in *ListUsersRequest, opts ...grpc.CallOption) (*ListUsersResponse, error) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*CreateUserResponse, error) @@ -242,918 +242,918 @@ type ShieldServiceClient interface { GetOrganizationAuditLog(ctx context.Context, in *GetOrganizationAuditLogRequest, opts ...grpc.CallOption) (*GetOrganizationAuditLogResponse, error) } -type shieldServiceClient struct { +type frontierServiceClient struct { cc grpc.ClientConnInterface } -func NewShieldServiceClient(cc grpc.ClientConnInterface) ShieldServiceClient { - return &shieldServiceClient{cc} +func NewFrontierServiceClient(cc grpc.ClientConnInterface) FrontierServiceClient { + return &frontierServiceClient{cc} } -func (c *shieldServiceClient) ListUsers(ctx context.Context, in *ListUsersRequest, opts ...grpc.CallOption) (*ListUsersResponse, error) { +func (c *frontierServiceClient) ListUsers(ctx context.Context, in *ListUsersRequest, opts ...grpc.CallOption) (*ListUsersResponse, error) { out := new(ListUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*CreateUserResponse, error) { +func (c *frontierServiceClient) CreateUser(ctx context.Context, in *CreateUserRequest, opts ...grpc.CallOption) (*CreateUserResponse, error) { out := new(CreateUserResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetUser(ctx context.Context, in *GetUserRequest, opts ...grpc.CallOption) (*GetUserResponse, error) { +func (c *frontierServiceClient) GetUser(ctx context.Context, in *GetUserRequest, opts ...grpc.CallOption) (*GetUserResponse, error) { out := new(GetUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListUserGroups(ctx context.Context, in *ListUserGroupsRequest, opts ...grpc.CallOption) (*ListUserGroupsResponse, error) { +func (c *frontierServiceClient) ListUserGroups(ctx context.Context, in *ListUserGroupsRequest, opts ...grpc.CallOption) (*ListUserGroupsResponse, error) { out := new(ListUserGroupsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListUserGroups_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListUserGroups_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListCurrentUserGroups(ctx context.Context, in *ListCurrentUserGroupsRequest, opts ...grpc.CallOption) (*ListCurrentUserGroupsResponse, error) { +func (c *frontierServiceClient) ListCurrentUserGroups(ctx context.Context, in *ListCurrentUserGroupsRequest, opts ...grpc.CallOption) (*ListCurrentUserGroupsResponse, error) { out := new(ListCurrentUserGroupsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListCurrentUserGroups_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListCurrentUserGroups_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetCurrentUser(ctx context.Context, in *GetCurrentUserRequest, opts ...grpc.CallOption) (*GetCurrentUserResponse, error) { +func (c *frontierServiceClient) GetCurrentUser(ctx context.Context, in *GetCurrentUserRequest, opts ...grpc.CallOption) (*GetCurrentUserResponse, error) { out := new(GetCurrentUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetCurrentUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetCurrentUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateUser(ctx context.Context, in *UpdateUserRequest, opts ...grpc.CallOption) (*UpdateUserResponse, error) { +func (c *frontierServiceClient) UpdateUser(ctx context.Context, in *UpdateUserRequest, opts ...grpc.CallOption) (*UpdateUserResponse, error) { out := new(UpdateUserResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateCurrentUser(ctx context.Context, in *UpdateCurrentUserRequest, opts ...grpc.CallOption) (*UpdateCurrentUserResponse, error) { +func (c *frontierServiceClient) UpdateCurrentUser(ctx context.Context, in *UpdateCurrentUserRequest, opts ...grpc.CallOption) (*UpdateCurrentUserResponse, error) { out := new(UpdateCurrentUserResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateCurrentUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateCurrentUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) EnableUser(ctx context.Context, in *EnableUserRequest, opts ...grpc.CallOption) (*EnableUserResponse, error) { +func (c *frontierServiceClient) EnableUser(ctx context.Context, in *EnableUserRequest, opts ...grpc.CallOption) (*EnableUserResponse, error) { out := new(EnableUserResponse) - err := c.cc.Invoke(ctx, ShieldService_EnableUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_EnableUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DisableUser(ctx context.Context, in *DisableUserRequest, opts ...grpc.CallOption) (*DisableUserResponse, error) { +func (c *frontierServiceClient) DisableUser(ctx context.Context, in *DisableUserRequest, opts ...grpc.CallOption) (*DisableUserResponse, error) { out := new(DisableUserResponse) - err := c.cc.Invoke(ctx, ShieldService_DisableUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DisableUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteUser(ctx context.Context, in *DeleteUserRequest, opts ...grpc.CallOption) (*DeleteUserResponse, error) { +func (c *frontierServiceClient) DeleteUser(ctx context.Context, in *DeleteUserRequest, opts ...grpc.CallOption) (*DeleteUserResponse, error) { out := new(DeleteUserResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganizationsByUser(ctx context.Context, in *GetOrganizationsByUserRequest, opts ...grpc.CallOption) (*GetOrganizationsByUserResponse, error) { +func (c *frontierServiceClient) GetOrganizationsByUser(ctx context.Context, in *GetOrganizationsByUserRequest, opts ...grpc.CallOption) (*GetOrganizationsByUserResponse, error) { out := new(GetOrganizationsByUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganizationsByUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganizationsByUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganizationsByCurrentUser(ctx context.Context, in *GetOrganizationsByCurrentUserRequest, opts ...grpc.CallOption) (*GetOrganizationsByCurrentUserResponse, error) { +func (c *frontierServiceClient) GetOrganizationsByCurrentUser(ctx context.Context, in *GetOrganizationsByCurrentUserRequest, opts ...grpc.CallOption) (*GetOrganizationsByCurrentUserResponse, error) { out := new(GetOrganizationsByCurrentUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganizationsByCurrentUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganizationsByCurrentUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetProjectsByUser(ctx context.Context, in *GetProjectsByUserRequest, opts ...grpc.CallOption) (*GetProjectsByUserResponse, error) { +func (c *frontierServiceClient) GetProjectsByUser(ctx context.Context, in *GetProjectsByUserRequest, opts ...grpc.CallOption) (*GetProjectsByUserResponse, error) { out := new(GetProjectsByUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetProjectsByUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetProjectsByUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetProjectsByCurrentUser(ctx context.Context, in *GetProjectsByCurrentUserRequest, opts ...grpc.CallOption) (*GetProjectsByCurrentUserResponse, error) { +func (c *frontierServiceClient) GetProjectsByCurrentUser(ctx context.Context, in *GetProjectsByCurrentUserRequest, opts ...grpc.CallOption) (*GetProjectsByCurrentUserResponse, error) { out := new(GetProjectsByCurrentUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetProjectsByCurrentUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetProjectsByCurrentUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListUserInvitations(ctx context.Context, in *ListUserInvitationsRequest, opts ...grpc.CallOption) (*ListUserInvitationsResponse, error) { +func (c *frontierServiceClient) ListUserInvitations(ctx context.Context, in *ListUserInvitationsRequest, opts ...grpc.CallOption) (*ListUserInvitationsResponse, error) { out := new(ListUserInvitationsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListUserInvitations_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListUserInvitations_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListServiceUsers(ctx context.Context, in *ListServiceUsersRequest, opts ...grpc.CallOption) (*ListServiceUsersResponse, error) { +func (c *frontierServiceClient) ListServiceUsers(ctx context.Context, in *ListServiceUsersRequest, opts ...grpc.CallOption) (*ListServiceUsersResponse, error) { out := new(ListServiceUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListServiceUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListServiceUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateServiceUser(ctx context.Context, in *CreateServiceUserRequest, opts ...grpc.CallOption) (*CreateServiceUserResponse, error) { +func (c *frontierServiceClient) CreateServiceUser(ctx context.Context, in *CreateServiceUserRequest, opts ...grpc.CallOption) (*CreateServiceUserResponse, error) { out := new(CreateServiceUserResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateServiceUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateServiceUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetServiceUser(ctx context.Context, in *GetServiceUserRequest, opts ...grpc.CallOption) (*GetServiceUserResponse, error) { +func (c *frontierServiceClient) GetServiceUser(ctx context.Context, in *GetServiceUserRequest, opts ...grpc.CallOption) (*GetServiceUserResponse, error) { out := new(GetServiceUserResponse) - err := c.cc.Invoke(ctx, ShieldService_GetServiceUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetServiceUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteServiceUser(ctx context.Context, in *DeleteServiceUserRequest, opts ...grpc.CallOption) (*DeleteServiceUserResponse, error) { +func (c *frontierServiceClient) DeleteServiceUser(ctx context.Context, in *DeleteServiceUserRequest, opts ...grpc.CallOption) (*DeleteServiceUserResponse, error) { out := new(DeleteServiceUserResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteServiceUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteServiceUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateServiceUserKey(ctx context.Context, in *CreateServiceUserKeyRequest, opts ...grpc.CallOption) (*CreateServiceUserKeyResponse, error) { +func (c *frontierServiceClient) CreateServiceUserKey(ctx context.Context, in *CreateServiceUserKeyRequest, opts ...grpc.CallOption) (*CreateServiceUserKeyResponse, error) { out := new(CreateServiceUserKeyResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateServiceUserKey_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateServiceUserKey_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListServiceUserKeys(ctx context.Context, in *ListServiceUserKeysRequest, opts ...grpc.CallOption) (*ListServiceUserKeysResponse, error) { +func (c *frontierServiceClient) ListServiceUserKeys(ctx context.Context, in *ListServiceUserKeysRequest, opts ...grpc.CallOption) (*ListServiceUserKeysResponse, error) { out := new(ListServiceUserKeysResponse) - err := c.cc.Invoke(ctx, ShieldService_ListServiceUserKeys_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListServiceUserKeys_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetServiceUserKey(ctx context.Context, in *GetServiceUserKeyRequest, opts ...grpc.CallOption) (*GetServiceUserKeyResponse, error) { +func (c *frontierServiceClient) GetServiceUserKey(ctx context.Context, in *GetServiceUserKeyRequest, opts ...grpc.CallOption) (*GetServiceUserKeyResponse, error) { out := new(GetServiceUserKeyResponse) - err := c.cc.Invoke(ctx, ShieldService_GetServiceUserKey_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetServiceUserKey_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteServiceUserKey(ctx context.Context, in *DeleteServiceUserKeyRequest, opts ...grpc.CallOption) (*DeleteServiceUserKeyResponse, error) { +func (c *frontierServiceClient) DeleteServiceUserKey(ctx context.Context, in *DeleteServiceUserKeyRequest, opts ...grpc.CallOption) (*DeleteServiceUserKeyResponse, error) { out := new(DeleteServiceUserKeyResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteServiceUserKey_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteServiceUserKey_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateServiceUserSecret(ctx context.Context, in *CreateServiceUserSecretRequest, opts ...grpc.CallOption) (*CreateServiceUserSecretResponse, error) { +func (c *frontierServiceClient) CreateServiceUserSecret(ctx context.Context, in *CreateServiceUserSecretRequest, opts ...grpc.CallOption) (*CreateServiceUserSecretResponse, error) { out := new(CreateServiceUserSecretResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateServiceUserSecret_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateServiceUserSecret_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListServiceUserSecrets(ctx context.Context, in *ListServiceUserSecretsRequest, opts ...grpc.CallOption) (*ListServiceUserSecretsResponse, error) { +func (c *frontierServiceClient) ListServiceUserSecrets(ctx context.Context, in *ListServiceUserSecretsRequest, opts ...grpc.CallOption) (*ListServiceUserSecretsResponse, error) { out := new(ListServiceUserSecretsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListServiceUserSecrets_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListServiceUserSecrets_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteServiceUserSecret(ctx context.Context, in *DeleteServiceUserSecretRequest, opts ...grpc.CallOption) (*DeleteServiceUserSecretResponse, error) { +func (c *frontierServiceClient) DeleteServiceUserSecret(ctx context.Context, in *DeleteServiceUserSecretRequest, opts ...grpc.CallOption) (*DeleteServiceUserSecretResponse, error) { out := new(DeleteServiceUserSecretResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteServiceUserSecret_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteServiceUserSecret_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationGroups(ctx context.Context, in *ListOrganizationGroupsRequest, opts ...grpc.CallOption) (*ListOrganizationGroupsResponse, error) { +func (c *frontierServiceClient) ListOrganizationGroups(ctx context.Context, in *ListOrganizationGroupsRequest, opts ...grpc.CallOption) (*ListOrganizationGroupsResponse, error) { out := new(ListOrganizationGroupsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationGroups_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationGroups_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateGroup(ctx context.Context, in *CreateGroupRequest, opts ...grpc.CallOption) (*CreateGroupResponse, error) { +func (c *frontierServiceClient) CreateGroup(ctx context.Context, in *CreateGroupRequest, opts ...grpc.CallOption) (*CreateGroupResponse, error) { out := new(CreateGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetGroup(ctx context.Context, in *GetGroupRequest, opts ...grpc.CallOption) (*GetGroupResponse, error) { +func (c *frontierServiceClient) GetGroup(ctx context.Context, in *GetGroupRequest, opts ...grpc.CallOption) (*GetGroupResponse, error) { out := new(GetGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_GetGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateGroup(ctx context.Context, in *UpdateGroupRequest, opts ...grpc.CallOption) (*UpdateGroupResponse, error) { +func (c *frontierServiceClient) UpdateGroup(ctx context.Context, in *UpdateGroupRequest, opts ...grpc.CallOption) (*UpdateGroupResponse, error) { out := new(UpdateGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListGroupUsers(ctx context.Context, in *ListGroupUsersRequest, opts ...grpc.CallOption) (*ListGroupUsersResponse, error) { +func (c *frontierServiceClient) ListGroupUsers(ctx context.Context, in *ListGroupUsersRequest, opts ...grpc.CallOption) (*ListGroupUsersResponse, error) { out := new(ListGroupUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListGroupUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListGroupUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AddGroupUsers(ctx context.Context, in *AddGroupUsersRequest, opts ...grpc.CallOption) (*AddGroupUsersResponse, error) { +func (c *frontierServiceClient) AddGroupUsers(ctx context.Context, in *AddGroupUsersRequest, opts ...grpc.CallOption) (*AddGroupUsersResponse, error) { out := new(AddGroupUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_AddGroupUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AddGroupUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) RemoveGroupUser(ctx context.Context, in *RemoveGroupUserRequest, opts ...grpc.CallOption) (*RemoveGroupUserResponse, error) { +func (c *frontierServiceClient) RemoveGroupUser(ctx context.Context, in *RemoveGroupUserRequest, opts ...grpc.CallOption) (*RemoveGroupUserResponse, error) { out := new(RemoveGroupUserResponse) - err := c.cc.Invoke(ctx, ShieldService_RemoveGroupUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_RemoveGroupUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) EnableGroup(ctx context.Context, in *EnableGroupRequest, opts ...grpc.CallOption) (*EnableGroupResponse, error) { +func (c *frontierServiceClient) EnableGroup(ctx context.Context, in *EnableGroupRequest, opts ...grpc.CallOption) (*EnableGroupResponse, error) { out := new(EnableGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_EnableGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_EnableGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DisableGroup(ctx context.Context, in *DisableGroupRequest, opts ...grpc.CallOption) (*DisableGroupResponse, error) { +func (c *frontierServiceClient) DisableGroup(ctx context.Context, in *DisableGroupRequest, opts ...grpc.CallOption) (*DisableGroupResponse, error) { out := new(DisableGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_DisableGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DisableGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteGroup(ctx context.Context, in *DeleteGroupRequest, opts ...grpc.CallOption) (*DeleteGroupResponse, error) { +func (c *frontierServiceClient) DeleteGroup(ctx context.Context, in *DeleteGroupRequest, opts ...grpc.CallOption) (*DeleteGroupResponse, error) { out := new(DeleteGroupResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteGroup_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteGroup_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListRoles(ctx context.Context, in *ListRolesRequest, opts ...grpc.CallOption) (*ListRolesResponse, error) { +func (c *frontierServiceClient) ListRoles(ctx context.Context, in *ListRolesRequest, opts ...grpc.CallOption) (*ListRolesResponse, error) { out := new(ListRolesResponse) - err := c.cc.Invoke(ctx, ShieldService_ListRoles_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListRoles_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationRoles(ctx context.Context, in *ListOrganizationRolesRequest, opts ...grpc.CallOption) (*ListOrganizationRolesResponse, error) { +func (c *frontierServiceClient) ListOrganizationRoles(ctx context.Context, in *ListOrganizationRolesRequest, opts ...grpc.CallOption) (*ListOrganizationRolesResponse, error) { out := new(ListOrganizationRolesResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationRoles_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationRoles_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateOrganizationRole(ctx context.Context, in *CreateOrganizationRoleRequest, opts ...grpc.CallOption) (*CreateOrganizationRoleResponse, error) { +func (c *frontierServiceClient) CreateOrganizationRole(ctx context.Context, in *CreateOrganizationRoleRequest, opts ...grpc.CallOption) (*CreateOrganizationRoleResponse, error) { out := new(CreateOrganizationRoleResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateOrganizationRole_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateOrganizationRole_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganizationRole(ctx context.Context, in *GetOrganizationRoleRequest, opts ...grpc.CallOption) (*GetOrganizationRoleResponse, error) { +func (c *frontierServiceClient) GetOrganizationRole(ctx context.Context, in *GetOrganizationRoleRequest, opts ...grpc.CallOption) (*GetOrganizationRoleResponse, error) { out := new(GetOrganizationRoleResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganizationRole_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganizationRole_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateOrganizationRole(ctx context.Context, in *UpdateOrganizationRoleRequest, opts ...grpc.CallOption) (*UpdateOrganizationRoleResponse, error) { +func (c *frontierServiceClient) UpdateOrganizationRole(ctx context.Context, in *UpdateOrganizationRoleRequest, opts ...grpc.CallOption) (*UpdateOrganizationRoleResponse, error) { out := new(UpdateOrganizationRoleResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateOrganizationRole_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateOrganizationRole_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteOrganizationRole(ctx context.Context, in *DeleteOrganizationRoleRequest, opts ...grpc.CallOption) (*DeleteOrganizationRoleResponse, error) { +func (c *frontierServiceClient) DeleteOrganizationRole(ctx context.Context, in *DeleteOrganizationRoleRequest, opts ...grpc.CallOption) (*DeleteOrganizationRoleResponse, error) { out := new(DeleteOrganizationRoleResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteOrganizationRole_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteOrganizationRole_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizations(ctx context.Context, in *ListOrganizationsRequest, opts ...grpc.CallOption) (*ListOrganizationsResponse, error) { +func (c *frontierServiceClient) ListOrganizations(ctx context.Context, in *ListOrganizationsRequest, opts ...grpc.CallOption) (*ListOrganizationsResponse, error) { out := new(ListOrganizationsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizations_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizations_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateOrganization(ctx context.Context, in *CreateOrganizationRequest, opts ...grpc.CallOption) (*CreateOrganizationResponse, error) { +func (c *frontierServiceClient) CreateOrganization(ctx context.Context, in *CreateOrganizationRequest, opts ...grpc.CallOption) (*CreateOrganizationResponse, error) { out := new(CreateOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganization(ctx context.Context, in *GetOrganizationRequest, opts ...grpc.CallOption) (*GetOrganizationResponse, error) { +func (c *frontierServiceClient) GetOrganization(ctx context.Context, in *GetOrganizationRequest, opts ...grpc.CallOption) (*GetOrganizationResponse, error) { out := new(GetOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateOrganization(ctx context.Context, in *UpdateOrganizationRequest, opts ...grpc.CallOption) (*UpdateOrganizationResponse, error) { +func (c *frontierServiceClient) UpdateOrganization(ctx context.Context, in *UpdateOrganizationRequest, opts ...grpc.CallOption) (*UpdateOrganizationResponse, error) { out := new(UpdateOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationProjects(ctx context.Context, in *ListOrganizationProjectsRequest, opts ...grpc.CallOption) (*ListOrganizationProjectsResponse, error) { +func (c *frontierServiceClient) ListOrganizationProjects(ctx context.Context, in *ListOrganizationProjectsRequest, opts ...grpc.CallOption) (*ListOrganizationProjectsResponse, error) { out := new(ListOrganizationProjectsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationProjects_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationProjects_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationAdmins(ctx context.Context, in *ListOrganizationAdminsRequest, opts ...grpc.CallOption) (*ListOrganizationAdminsResponse, error) { +func (c *frontierServiceClient) ListOrganizationAdmins(ctx context.Context, in *ListOrganizationAdminsRequest, opts ...grpc.CallOption) (*ListOrganizationAdminsResponse, error) { out := new(ListOrganizationAdminsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationAdmins_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationAdmins_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationUsers(ctx context.Context, in *ListOrganizationUsersRequest, opts ...grpc.CallOption) (*ListOrganizationUsersResponse, error) { +func (c *frontierServiceClient) ListOrganizationUsers(ctx context.Context, in *ListOrganizationUsersRequest, opts ...grpc.CallOption) (*ListOrganizationUsersResponse, error) { out := new(ListOrganizationUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AddOrganizationUsers(ctx context.Context, in *AddOrganizationUsersRequest, opts ...grpc.CallOption) (*AddOrganizationUsersResponse, error) { +func (c *frontierServiceClient) AddOrganizationUsers(ctx context.Context, in *AddOrganizationUsersRequest, opts ...grpc.CallOption) (*AddOrganizationUsersResponse, error) { out := new(AddOrganizationUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_AddOrganizationUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AddOrganizationUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) RemoveOrganizationUser(ctx context.Context, in *RemoveOrganizationUserRequest, opts ...grpc.CallOption) (*RemoveOrganizationUserResponse, error) { +func (c *frontierServiceClient) RemoveOrganizationUser(ctx context.Context, in *RemoveOrganizationUserRequest, opts ...grpc.CallOption) (*RemoveOrganizationUserResponse, error) { out := new(RemoveOrganizationUserResponse) - err := c.cc.Invoke(ctx, ShieldService_RemoveOrganizationUser_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_RemoveOrganizationUser_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationServiceUsers(ctx context.Context, in *ListOrganizationServiceUsersRequest, opts ...grpc.CallOption) (*ListOrganizationServiceUsersResponse, error) { +func (c *frontierServiceClient) ListOrganizationServiceUsers(ctx context.Context, in *ListOrganizationServiceUsersRequest, opts ...grpc.CallOption) (*ListOrganizationServiceUsersResponse, error) { out := new(ListOrganizationServiceUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationServiceUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationServiceUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationInvitations(ctx context.Context, in *ListOrganizationInvitationsRequest, opts ...grpc.CallOption) (*ListOrganizationInvitationsResponse, error) { +func (c *frontierServiceClient) ListOrganizationInvitations(ctx context.Context, in *ListOrganizationInvitationsRequest, opts ...grpc.CallOption) (*ListOrganizationInvitationsResponse, error) { out := new(ListOrganizationInvitationsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationInvitations_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationInvitations_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateOrganizationInvitation(ctx context.Context, in *CreateOrganizationInvitationRequest, opts ...grpc.CallOption) (*CreateOrganizationInvitationResponse, error) { +func (c *frontierServiceClient) CreateOrganizationInvitation(ctx context.Context, in *CreateOrganizationInvitationRequest, opts ...grpc.CallOption) (*CreateOrganizationInvitationResponse, error) { out := new(CreateOrganizationInvitationResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateOrganizationInvitation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateOrganizationInvitation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganizationInvitation(ctx context.Context, in *GetOrganizationInvitationRequest, opts ...grpc.CallOption) (*GetOrganizationInvitationResponse, error) { +func (c *frontierServiceClient) GetOrganizationInvitation(ctx context.Context, in *GetOrganizationInvitationRequest, opts ...grpc.CallOption) (*GetOrganizationInvitationResponse, error) { out := new(GetOrganizationInvitationResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganizationInvitation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganizationInvitation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AcceptOrganizationInvitation(ctx context.Context, in *AcceptOrganizationInvitationRequest, opts ...grpc.CallOption) (*AcceptOrganizationInvitationResponse, error) { +func (c *frontierServiceClient) AcceptOrganizationInvitation(ctx context.Context, in *AcceptOrganizationInvitationRequest, opts ...grpc.CallOption) (*AcceptOrganizationInvitationResponse, error) { out := new(AcceptOrganizationInvitationResponse) - err := c.cc.Invoke(ctx, ShieldService_AcceptOrganizationInvitation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AcceptOrganizationInvitation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteOrganizationInvitation(ctx context.Context, in *DeleteOrganizationInvitationRequest, opts ...grpc.CallOption) (*DeleteOrganizationInvitationResponse, error) { +func (c *frontierServiceClient) DeleteOrganizationInvitation(ctx context.Context, in *DeleteOrganizationInvitationRequest, opts ...grpc.CallOption) (*DeleteOrganizationInvitationResponse, error) { out := new(DeleteOrganizationInvitationResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteOrganizationInvitation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteOrganizationInvitation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) EnableOrganization(ctx context.Context, in *EnableOrganizationRequest, opts ...grpc.CallOption) (*EnableOrganizationResponse, error) { +func (c *frontierServiceClient) EnableOrganization(ctx context.Context, in *EnableOrganizationRequest, opts ...grpc.CallOption) (*EnableOrganizationResponse, error) { out := new(EnableOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_EnableOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_EnableOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DisableOrganization(ctx context.Context, in *DisableOrganizationRequest, opts ...grpc.CallOption) (*DisableOrganizationResponse, error) { +func (c *frontierServiceClient) DisableOrganization(ctx context.Context, in *DisableOrganizationRequest, opts ...grpc.CallOption) (*DisableOrganizationResponse, error) { out := new(DisableOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_DisableOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DisableOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteOrganization(ctx context.Context, in *DeleteOrganizationRequest, opts ...grpc.CallOption) (*DeleteOrganizationResponse, error) { +func (c *frontierServiceClient) DeleteOrganization(ctx context.Context, in *DeleteOrganizationRequest, opts ...grpc.CallOption) (*DeleteOrganizationResponse, error) { out := new(DeleteOrganizationResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteOrganization_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteOrganization_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateProject(ctx context.Context, in *CreateProjectRequest, opts ...grpc.CallOption) (*CreateProjectResponse, error) { +func (c *frontierServiceClient) CreateProject(ctx context.Context, in *CreateProjectRequest, opts ...grpc.CallOption) (*CreateProjectResponse, error) { out := new(CreateProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetProject(ctx context.Context, in *GetProjectRequest, opts ...grpc.CallOption) (*GetProjectResponse, error) { +func (c *frontierServiceClient) GetProject(ctx context.Context, in *GetProjectRequest, opts ...grpc.CallOption) (*GetProjectResponse, error) { out := new(GetProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_GetProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateProject(ctx context.Context, in *UpdateProjectRequest, opts ...grpc.CallOption) (*UpdateProjectResponse, error) { +func (c *frontierServiceClient) UpdateProject(ctx context.Context, in *UpdateProjectRequest, opts ...grpc.CallOption) (*UpdateProjectResponse, error) { out := new(UpdateProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListProjectAdmins(ctx context.Context, in *ListProjectAdminsRequest, opts ...grpc.CallOption) (*ListProjectAdminsResponse, error) { +func (c *frontierServiceClient) ListProjectAdmins(ctx context.Context, in *ListProjectAdminsRequest, opts ...grpc.CallOption) (*ListProjectAdminsResponse, error) { out := new(ListProjectAdminsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListProjectAdmins_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListProjectAdmins_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListProjectUsers(ctx context.Context, in *ListProjectUsersRequest, opts ...grpc.CallOption) (*ListProjectUsersResponse, error) { +func (c *frontierServiceClient) ListProjectUsers(ctx context.Context, in *ListProjectUsersRequest, opts ...grpc.CallOption) (*ListProjectUsersResponse, error) { out := new(ListProjectUsersResponse) - err := c.cc.Invoke(ctx, ShieldService_ListProjectUsers_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListProjectUsers_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) EnableProject(ctx context.Context, in *EnableProjectRequest, opts ...grpc.CallOption) (*EnableProjectResponse, error) { +func (c *frontierServiceClient) EnableProject(ctx context.Context, in *EnableProjectRequest, opts ...grpc.CallOption) (*EnableProjectResponse, error) { out := new(EnableProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_EnableProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_EnableProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DisableProject(ctx context.Context, in *DisableProjectRequest, opts ...grpc.CallOption) (*DisableProjectResponse, error) { +func (c *frontierServiceClient) DisableProject(ctx context.Context, in *DisableProjectRequest, opts ...grpc.CallOption) (*DisableProjectResponse, error) { out := new(DisableProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_DisableProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DisableProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteProject(ctx context.Context, in *DeleteProjectRequest, opts ...grpc.CallOption) (*DeleteProjectResponse, error) { +func (c *frontierServiceClient) DeleteProject(ctx context.Context, in *DeleteProjectRequest, opts ...grpc.CallOption) (*DeleteProjectResponse, error) { out := new(DeleteProjectResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteProject_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteProject_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreatePolicy(ctx context.Context, in *CreatePolicyRequest, opts ...grpc.CallOption) (*CreatePolicyResponse, error) { +func (c *frontierServiceClient) CreatePolicy(ctx context.Context, in *CreatePolicyRequest, opts ...grpc.CallOption) (*CreatePolicyResponse, error) { out := new(CreatePolicyResponse) - err := c.cc.Invoke(ctx, ShieldService_CreatePolicy_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreatePolicy_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetPolicy(ctx context.Context, in *GetPolicyRequest, opts ...grpc.CallOption) (*GetPolicyResponse, error) { +func (c *frontierServiceClient) GetPolicy(ctx context.Context, in *GetPolicyRequest, opts ...grpc.CallOption) (*GetPolicyResponse, error) { out := new(GetPolicyResponse) - err := c.cc.Invoke(ctx, ShieldService_GetPolicy_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetPolicy_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdatePolicy(ctx context.Context, in *UpdatePolicyRequest, opts ...grpc.CallOption) (*UpdatePolicyResponse, error) { +func (c *frontierServiceClient) UpdatePolicy(ctx context.Context, in *UpdatePolicyRequest, opts ...grpc.CallOption) (*UpdatePolicyResponse, error) { out := new(UpdatePolicyResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdatePolicy_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdatePolicy_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeletePolicy(ctx context.Context, in *DeletePolicyRequest, opts ...grpc.CallOption) (*DeletePolicyResponse, error) { +func (c *frontierServiceClient) DeletePolicy(ctx context.Context, in *DeletePolicyRequest, opts ...grpc.CallOption) (*DeletePolicyResponse, error) { out := new(DeletePolicyResponse) - err := c.cc.Invoke(ctx, ShieldService_DeletePolicy_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeletePolicy_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateRelation(ctx context.Context, in *CreateRelationRequest, opts ...grpc.CallOption) (*CreateRelationResponse, error) { +func (c *frontierServiceClient) CreateRelation(ctx context.Context, in *CreateRelationRequest, opts ...grpc.CallOption) (*CreateRelationResponse, error) { out := new(CreateRelationResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateRelation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateRelation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetRelation(ctx context.Context, in *GetRelationRequest, opts ...grpc.CallOption) (*GetRelationResponse, error) { +func (c *frontierServiceClient) GetRelation(ctx context.Context, in *GetRelationRequest, opts ...grpc.CallOption) (*GetRelationResponse, error) { out := new(GetRelationResponse) - err := c.cc.Invoke(ctx, ShieldService_GetRelation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetRelation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteRelation(ctx context.Context, in *DeleteRelationRequest, opts ...grpc.CallOption) (*DeleteRelationResponse, error) { +func (c *frontierServiceClient) DeleteRelation(ctx context.Context, in *DeleteRelationRequest, opts ...grpc.CallOption) (*DeleteRelationResponse, error) { out := new(DeleteRelationResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteRelation_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteRelation_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListPermissions(ctx context.Context, in *ListPermissionsRequest, opts ...grpc.CallOption) (*ListPermissionsResponse, error) { +func (c *frontierServiceClient) ListPermissions(ctx context.Context, in *ListPermissionsRequest, opts ...grpc.CallOption) (*ListPermissionsResponse, error) { out := new(ListPermissionsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListPermissions_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListPermissions_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetPermission(ctx context.Context, in *GetPermissionRequest, opts ...grpc.CallOption) (*GetPermissionResponse, error) { +func (c *frontierServiceClient) GetPermission(ctx context.Context, in *GetPermissionRequest, opts ...grpc.CallOption) (*GetPermissionResponse, error) { out := new(GetPermissionResponse) - err := c.cc.Invoke(ctx, ShieldService_GetPermission_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetPermission_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListNamespaces(ctx context.Context, in *ListNamespacesRequest, opts ...grpc.CallOption) (*ListNamespacesResponse, error) { +func (c *frontierServiceClient) ListNamespaces(ctx context.Context, in *ListNamespacesRequest, opts ...grpc.CallOption) (*ListNamespacesResponse, error) { out := new(ListNamespacesResponse) - err := c.cc.Invoke(ctx, ShieldService_ListNamespaces_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListNamespaces_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetNamespace(ctx context.Context, in *GetNamespaceRequest, opts ...grpc.CallOption) (*GetNamespaceResponse, error) { +func (c *frontierServiceClient) GetNamespace(ctx context.Context, in *GetNamespaceRequest, opts ...grpc.CallOption) (*GetNamespaceResponse, error) { out := new(GetNamespaceResponse) - err := c.cc.Invoke(ctx, ShieldService_GetNamespace_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetNamespace_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListProjectResources(ctx context.Context, in *ListProjectResourcesRequest, opts ...grpc.CallOption) (*ListProjectResourcesResponse, error) { +func (c *frontierServiceClient) ListProjectResources(ctx context.Context, in *ListProjectResourcesRequest, opts ...grpc.CallOption) (*ListProjectResourcesResponse, error) { out := new(ListProjectResourcesResponse) - err := c.cc.Invoke(ctx, ShieldService_ListProjectResources_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListProjectResources_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateProjectResource(ctx context.Context, in *CreateProjectResourceRequest, opts ...grpc.CallOption) (*CreateProjectResourceResponse, error) { +func (c *frontierServiceClient) CreateProjectResource(ctx context.Context, in *CreateProjectResourceRequest, opts ...grpc.CallOption) (*CreateProjectResourceResponse, error) { out := new(CreateProjectResourceResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateProjectResource_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateProjectResource_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetProjectResource(ctx context.Context, in *GetProjectResourceRequest, opts ...grpc.CallOption) (*GetProjectResourceResponse, error) { +func (c *frontierServiceClient) GetProjectResource(ctx context.Context, in *GetProjectResourceRequest, opts ...grpc.CallOption) (*GetProjectResourceResponse, error) { out := new(GetProjectResourceResponse) - err := c.cc.Invoke(ctx, ShieldService_GetProjectResource_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetProjectResource_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateProjectResource(ctx context.Context, in *UpdateProjectResourceRequest, opts ...grpc.CallOption) (*UpdateProjectResourceResponse, error) { +func (c *frontierServiceClient) UpdateProjectResource(ctx context.Context, in *UpdateProjectResourceRequest, opts ...grpc.CallOption) (*UpdateProjectResourceResponse, error) { out := new(UpdateProjectResourceResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateProjectResource_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateProjectResource_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteProjectResource(ctx context.Context, in *DeleteProjectResourceRequest, opts ...grpc.CallOption) (*DeleteProjectResourceResponse, error) { +func (c *frontierServiceClient) DeleteProjectResource(ctx context.Context, in *DeleteProjectResourceRequest, opts ...grpc.CallOption) (*DeleteProjectResourceResponse, error) { out := new(DeleteProjectResourceResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteProjectResource_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteProjectResource_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CheckResourcePermission(ctx context.Context, in *CheckResourcePermissionRequest, opts ...grpc.CallOption) (*CheckResourcePermissionResponse, error) { +func (c *frontierServiceClient) CheckResourcePermission(ctx context.Context, in *CheckResourcePermissionRequest, opts ...grpc.CallOption) (*CheckResourcePermissionResponse, error) { out := new(CheckResourcePermissionResponse) - err := c.cc.Invoke(ctx, ShieldService_CheckResourcePermission_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CheckResourcePermission_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetJWKs(ctx context.Context, in *GetJWKsRequest, opts ...grpc.CallOption) (*GetJWKsResponse, error) { +func (c *frontierServiceClient) GetJWKs(ctx context.Context, in *GetJWKsRequest, opts ...grpc.CallOption) (*GetJWKsResponse, error) { out := new(GetJWKsResponse) - err := c.cc.Invoke(ctx, ShieldService_GetJWKs_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetJWKs_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListAuthStrategies(ctx context.Context, in *ListAuthStrategiesRequest, opts ...grpc.CallOption) (*ListAuthStrategiesResponse, error) { +func (c *frontierServiceClient) ListAuthStrategies(ctx context.Context, in *ListAuthStrategiesRequest, opts ...grpc.CallOption) (*ListAuthStrategiesResponse, error) { out := new(ListAuthStrategiesResponse) - err := c.cc.Invoke(ctx, ShieldService_ListAuthStrategies_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListAuthStrategies_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) Authenticate(ctx context.Context, in *AuthenticateRequest, opts ...grpc.CallOption) (*AuthenticateResponse, error) { +func (c *frontierServiceClient) Authenticate(ctx context.Context, in *AuthenticateRequest, opts ...grpc.CallOption) (*AuthenticateResponse, error) { out := new(AuthenticateResponse) - err := c.cc.Invoke(ctx, ShieldService_Authenticate_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_Authenticate_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AuthCallback(ctx context.Context, in *AuthCallbackRequest, opts ...grpc.CallOption) (*AuthCallbackResponse, error) { +func (c *frontierServiceClient) AuthCallback(ctx context.Context, in *AuthCallbackRequest, opts ...grpc.CallOption) (*AuthCallbackResponse, error) { out := new(AuthCallbackResponse) - err := c.cc.Invoke(ctx, ShieldService_AuthCallback_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AuthCallback_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AuthToken(ctx context.Context, in *AuthTokenRequest, opts ...grpc.CallOption) (*AuthTokenResponse, error) { +func (c *frontierServiceClient) AuthToken(ctx context.Context, in *AuthTokenRequest, opts ...grpc.CallOption) (*AuthTokenResponse, error) { out := new(AuthTokenResponse) - err := c.cc.Invoke(ctx, ShieldService_AuthToken_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AuthToken_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) AuthLogout(ctx context.Context, in *AuthLogoutRequest, opts ...grpc.CallOption) (*AuthLogoutResponse, error) { +func (c *frontierServiceClient) AuthLogout(ctx context.Context, in *AuthLogoutRequest, opts ...grpc.CallOption) (*AuthLogoutResponse, error) { out := new(AuthLogoutResponse) - err := c.cc.Invoke(ctx, ShieldService_AuthLogout_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_AuthLogout_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListMetaSchemas(ctx context.Context, in *ListMetaSchemasRequest, opts ...grpc.CallOption) (*ListMetaSchemasResponse, error) { +func (c *frontierServiceClient) ListMetaSchemas(ctx context.Context, in *ListMetaSchemasRequest, opts ...grpc.CallOption) (*ListMetaSchemasResponse, error) { out := new(ListMetaSchemasResponse) - err := c.cc.Invoke(ctx, ShieldService_ListMetaSchemas_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListMetaSchemas_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateMetaSchema(ctx context.Context, in *CreateMetaSchemaRequest, opts ...grpc.CallOption) (*CreateMetaSchemaResponse, error) { +func (c *frontierServiceClient) CreateMetaSchema(ctx context.Context, in *CreateMetaSchemaRequest, opts ...grpc.CallOption) (*CreateMetaSchemaResponse, error) { out := new(CreateMetaSchemaResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateMetaSchema_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateMetaSchema_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetMetaSchema(ctx context.Context, in *GetMetaSchemaRequest, opts ...grpc.CallOption) (*GetMetaSchemaResponse, error) { +func (c *frontierServiceClient) GetMetaSchema(ctx context.Context, in *GetMetaSchemaRequest, opts ...grpc.CallOption) (*GetMetaSchemaResponse, error) { out := new(GetMetaSchemaResponse) - err := c.cc.Invoke(ctx, ShieldService_GetMetaSchema_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetMetaSchema_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) UpdateMetaSchema(ctx context.Context, in *UpdateMetaSchemaRequest, opts ...grpc.CallOption) (*UpdateMetaSchemaResponse, error) { +func (c *frontierServiceClient) UpdateMetaSchema(ctx context.Context, in *UpdateMetaSchemaRequest, opts ...grpc.CallOption) (*UpdateMetaSchemaResponse, error) { out := new(UpdateMetaSchemaResponse) - err := c.cc.Invoke(ctx, ShieldService_UpdateMetaSchema_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_UpdateMetaSchema_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) DeleteMetaSchema(ctx context.Context, in *DeleteMetaSchemaRequest, opts ...grpc.CallOption) (*DeleteMetaSchemaResponse, error) { +func (c *frontierServiceClient) DeleteMetaSchema(ctx context.Context, in *DeleteMetaSchemaRequest, opts ...grpc.CallOption) (*DeleteMetaSchemaResponse, error) { out := new(DeleteMetaSchemaResponse) - err := c.cc.Invoke(ctx, ShieldService_DeleteMetaSchema_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_DeleteMetaSchema_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) ListOrganizationAuditLogs(ctx context.Context, in *ListOrganizationAuditLogsRequest, opts ...grpc.CallOption) (*ListOrganizationAuditLogsResponse, error) { +func (c *frontierServiceClient) ListOrganizationAuditLogs(ctx context.Context, in *ListOrganizationAuditLogsRequest, opts ...grpc.CallOption) (*ListOrganizationAuditLogsResponse, error) { out := new(ListOrganizationAuditLogsResponse) - err := c.cc.Invoke(ctx, ShieldService_ListOrganizationAuditLogs_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_ListOrganizationAuditLogs_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) CreateOrganizationAuditLogs(ctx context.Context, in *CreateOrganizationAuditLogsRequest, opts ...grpc.CallOption) (*CreateOrganizationAuditLogsResponse, error) { +func (c *frontierServiceClient) CreateOrganizationAuditLogs(ctx context.Context, in *CreateOrganizationAuditLogsRequest, opts ...grpc.CallOption) (*CreateOrganizationAuditLogsResponse, error) { out := new(CreateOrganizationAuditLogsResponse) - err := c.cc.Invoke(ctx, ShieldService_CreateOrganizationAuditLogs_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_CreateOrganizationAuditLogs_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -func (c *shieldServiceClient) GetOrganizationAuditLog(ctx context.Context, in *GetOrganizationAuditLogRequest, opts ...grpc.CallOption) (*GetOrganizationAuditLogResponse, error) { +func (c *frontierServiceClient) GetOrganizationAuditLog(ctx context.Context, in *GetOrganizationAuditLogRequest, opts ...grpc.CallOption) (*GetOrganizationAuditLogResponse, error) { out := new(GetOrganizationAuditLogResponse) - err := c.cc.Invoke(ctx, ShieldService_GetOrganizationAuditLog_FullMethodName, in, out, opts...) + err := c.cc.Invoke(ctx, FrontierService_GetOrganizationAuditLog_FullMethodName, in, out, opts...) if err != nil { return nil, err } return out, nil } -// ShieldServiceServer is the server API for ShieldService service. -// All implementations must embed UnimplementedShieldServiceServer +// FrontierServiceServer is the server API for FrontierService service. +// All implementations must embed UnimplementedFrontierServiceServer // for forward compatibility -type ShieldServiceServer interface { +type FrontierServiceServer interface { // Users ListUsers(context.Context, *ListUsersRequest) (*ListUsersResponse, error) CreateUser(context.Context, *CreateUserRequest) (*CreateUserResponse, error) @@ -1269,2534 +1269,2534 @@ type ShieldServiceServer interface { ListOrganizationAuditLogs(context.Context, *ListOrganizationAuditLogsRequest) (*ListOrganizationAuditLogsResponse, error) CreateOrganizationAuditLogs(context.Context, *CreateOrganizationAuditLogsRequest) (*CreateOrganizationAuditLogsResponse, error) GetOrganizationAuditLog(context.Context, *GetOrganizationAuditLogRequest) (*GetOrganizationAuditLogResponse, error) - mustEmbedUnimplementedShieldServiceServer() + mustEmbedUnimplementedFrontierServiceServer() } -// UnimplementedShieldServiceServer must be embedded to have forward compatible implementations. -type UnimplementedShieldServiceServer struct { +// UnimplementedFrontierServiceServer must be embedded to have forward compatible implementations. +type UnimplementedFrontierServiceServer struct { } -func (UnimplementedShieldServiceServer) ListUsers(context.Context, *ListUsersRequest) (*ListUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListUsers(context.Context, *ListUsersRequest) (*ListUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListUsers not implemented") } -func (UnimplementedShieldServiceServer) CreateUser(context.Context, *CreateUserRequest) (*CreateUserResponse, error) { +func (UnimplementedFrontierServiceServer) CreateUser(context.Context, *CreateUserRequest) (*CreateUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateUser not implemented") } -func (UnimplementedShieldServiceServer) GetUser(context.Context, *GetUserRequest) (*GetUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetUser(context.Context, *GetUserRequest) (*GetUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetUser not implemented") } -func (UnimplementedShieldServiceServer) ListUserGroups(context.Context, *ListUserGroupsRequest) (*ListUserGroupsResponse, error) { +func (UnimplementedFrontierServiceServer) ListUserGroups(context.Context, *ListUserGroupsRequest) (*ListUserGroupsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListUserGroups not implemented") } -func (UnimplementedShieldServiceServer) ListCurrentUserGroups(context.Context, *ListCurrentUserGroupsRequest) (*ListCurrentUserGroupsResponse, error) { +func (UnimplementedFrontierServiceServer) ListCurrentUserGroups(context.Context, *ListCurrentUserGroupsRequest) (*ListCurrentUserGroupsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListCurrentUserGroups not implemented") } -func (UnimplementedShieldServiceServer) GetCurrentUser(context.Context, *GetCurrentUserRequest) (*GetCurrentUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetCurrentUser(context.Context, *GetCurrentUserRequest) (*GetCurrentUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetCurrentUser not implemented") } -func (UnimplementedShieldServiceServer) UpdateUser(context.Context, *UpdateUserRequest) (*UpdateUserResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateUser(context.Context, *UpdateUserRequest) (*UpdateUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateUser not implemented") } -func (UnimplementedShieldServiceServer) UpdateCurrentUser(context.Context, *UpdateCurrentUserRequest) (*UpdateCurrentUserResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateCurrentUser(context.Context, *UpdateCurrentUserRequest) (*UpdateCurrentUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateCurrentUser not implemented") } -func (UnimplementedShieldServiceServer) EnableUser(context.Context, *EnableUserRequest) (*EnableUserResponse, error) { +func (UnimplementedFrontierServiceServer) EnableUser(context.Context, *EnableUserRequest) (*EnableUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method EnableUser not implemented") } -func (UnimplementedShieldServiceServer) DisableUser(context.Context, *DisableUserRequest) (*DisableUserResponse, error) { +func (UnimplementedFrontierServiceServer) DisableUser(context.Context, *DisableUserRequest) (*DisableUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DisableUser not implemented") } -func (UnimplementedShieldServiceServer) DeleteUser(context.Context, *DeleteUserRequest) (*DeleteUserResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteUser(context.Context, *DeleteUserRequest) (*DeleteUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteUser not implemented") } -func (UnimplementedShieldServiceServer) GetOrganizationsByUser(context.Context, *GetOrganizationsByUserRequest) (*GetOrganizationsByUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganizationsByUser(context.Context, *GetOrganizationsByUserRequest) (*GetOrganizationsByUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganizationsByUser not implemented") } -func (UnimplementedShieldServiceServer) GetOrganizationsByCurrentUser(context.Context, *GetOrganizationsByCurrentUserRequest) (*GetOrganizationsByCurrentUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganizationsByCurrentUser(context.Context, *GetOrganizationsByCurrentUserRequest) (*GetOrganizationsByCurrentUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganizationsByCurrentUser not implemented") } -func (UnimplementedShieldServiceServer) GetProjectsByUser(context.Context, *GetProjectsByUserRequest) (*GetProjectsByUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetProjectsByUser(context.Context, *GetProjectsByUserRequest) (*GetProjectsByUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetProjectsByUser not implemented") } -func (UnimplementedShieldServiceServer) GetProjectsByCurrentUser(context.Context, *GetProjectsByCurrentUserRequest) (*GetProjectsByCurrentUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetProjectsByCurrentUser(context.Context, *GetProjectsByCurrentUserRequest) (*GetProjectsByCurrentUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetProjectsByCurrentUser not implemented") } -func (UnimplementedShieldServiceServer) ListUserInvitations(context.Context, *ListUserInvitationsRequest) (*ListUserInvitationsResponse, error) { +func (UnimplementedFrontierServiceServer) ListUserInvitations(context.Context, *ListUserInvitationsRequest) (*ListUserInvitationsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListUserInvitations not implemented") } -func (UnimplementedShieldServiceServer) ListServiceUsers(context.Context, *ListServiceUsersRequest) (*ListServiceUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListServiceUsers(context.Context, *ListServiceUsersRequest) (*ListServiceUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListServiceUsers not implemented") } -func (UnimplementedShieldServiceServer) CreateServiceUser(context.Context, *CreateServiceUserRequest) (*CreateServiceUserResponse, error) { +func (UnimplementedFrontierServiceServer) CreateServiceUser(context.Context, *CreateServiceUserRequest) (*CreateServiceUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateServiceUser not implemented") } -func (UnimplementedShieldServiceServer) GetServiceUser(context.Context, *GetServiceUserRequest) (*GetServiceUserResponse, error) { +func (UnimplementedFrontierServiceServer) GetServiceUser(context.Context, *GetServiceUserRequest) (*GetServiceUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetServiceUser not implemented") } -func (UnimplementedShieldServiceServer) DeleteServiceUser(context.Context, *DeleteServiceUserRequest) (*DeleteServiceUserResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteServiceUser(context.Context, *DeleteServiceUserRequest) (*DeleteServiceUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteServiceUser not implemented") } -func (UnimplementedShieldServiceServer) CreateServiceUserKey(context.Context, *CreateServiceUserKeyRequest) (*CreateServiceUserKeyResponse, error) { +func (UnimplementedFrontierServiceServer) CreateServiceUserKey(context.Context, *CreateServiceUserKeyRequest) (*CreateServiceUserKeyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateServiceUserKey not implemented") } -func (UnimplementedShieldServiceServer) ListServiceUserKeys(context.Context, *ListServiceUserKeysRequest) (*ListServiceUserKeysResponse, error) { +func (UnimplementedFrontierServiceServer) ListServiceUserKeys(context.Context, *ListServiceUserKeysRequest) (*ListServiceUserKeysResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListServiceUserKeys not implemented") } -func (UnimplementedShieldServiceServer) GetServiceUserKey(context.Context, *GetServiceUserKeyRequest) (*GetServiceUserKeyResponse, error) { +func (UnimplementedFrontierServiceServer) GetServiceUserKey(context.Context, *GetServiceUserKeyRequest) (*GetServiceUserKeyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetServiceUserKey not implemented") } -func (UnimplementedShieldServiceServer) DeleteServiceUserKey(context.Context, *DeleteServiceUserKeyRequest) (*DeleteServiceUserKeyResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteServiceUserKey(context.Context, *DeleteServiceUserKeyRequest) (*DeleteServiceUserKeyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteServiceUserKey not implemented") } -func (UnimplementedShieldServiceServer) CreateServiceUserSecret(context.Context, *CreateServiceUserSecretRequest) (*CreateServiceUserSecretResponse, error) { +func (UnimplementedFrontierServiceServer) CreateServiceUserSecret(context.Context, *CreateServiceUserSecretRequest) (*CreateServiceUserSecretResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateServiceUserSecret not implemented") } -func (UnimplementedShieldServiceServer) ListServiceUserSecrets(context.Context, *ListServiceUserSecretsRequest) (*ListServiceUserSecretsResponse, error) { +func (UnimplementedFrontierServiceServer) ListServiceUserSecrets(context.Context, *ListServiceUserSecretsRequest) (*ListServiceUserSecretsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListServiceUserSecrets not implemented") } -func (UnimplementedShieldServiceServer) DeleteServiceUserSecret(context.Context, *DeleteServiceUserSecretRequest) (*DeleteServiceUserSecretResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteServiceUserSecret(context.Context, *DeleteServiceUserSecretRequest) (*DeleteServiceUserSecretResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteServiceUserSecret not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationGroups(context.Context, *ListOrganizationGroupsRequest) (*ListOrganizationGroupsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationGroups(context.Context, *ListOrganizationGroupsRequest) (*ListOrganizationGroupsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationGroups not implemented") } -func (UnimplementedShieldServiceServer) CreateGroup(context.Context, *CreateGroupRequest) (*CreateGroupResponse, error) { +func (UnimplementedFrontierServiceServer) CreateGroup(context.Context, *CreateGroupRequest) (*CreateGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateGroup not implemented") } -func (UnimplementedShieldServiceServer) GetGroup(context.Context, *GetGroupRequest) (*GetGroupResponse, error) { +func (UnimplementedFrontierServiceServer) GetGroup(context.Context, *GetGroupRequest) (*GetGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetGroup not implemented") } -func (UnimplementedShieldServiceServer) UpdateGroup(context.Context, *UpdateGroupRequest) (*UpdateGroupResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateGroup(context.Context, *UpdateGroupRequest) (*UpdateGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateGroup not implemented") } -func (UnimplementedShieldServiceServer) ListGroupUsers(context.Context, *ListGroupUsersRequest) (*ListGroupUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListGroupUsers(context.Context, *ListGroupUsersRequest) (*ListGroupUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListGroupUsers not implemented") } -func (UnimplementedShieldServiceServer) AddGroupUsers(context.Context, *AddGroupUsersRequest) (*AddGroupUsersResponse, error) { +func (UnimplementedFrontierServiceServer) AddGroupUsers(context.Context, *AddGroupUsersRequest) (*AddGroupUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AddGroupUsers not implemented") } -func (UnimplementedShieldServiceServer) RemoveGroupUser(context.Context, *RemoveGroupUserRequest) (*RemoveGroupUserResponse, error) { +func (UnimplementedFrontierServiceServer) RemoveGroupUser(context.Context, *RemoveGroupUserRequest) (*RemoveGroupUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method RemoveGroupUser not implemented") } -func (UnimplementedShieldServiceServer) EnableGroup(context.Context, *EnableGroupRequest) (*EnableGroupResponse, error) { +func (UnimplementedFrontierServiceServer) EnableGroup(context.Context, *EnableGroupRequest) (*EnableGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method EnableGroup not implemented") } -func (UnimplementedShieldServiceServer) DisableGroup(context.Context, *DisableGroupRequest) (*DisableGroupResponse, error) { +func (UnimplementedFrontierServiceServer) DisableGroup(context.Context, *DisableGroupRequest) (*DisableGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DisableGroup not implemented") } -func (UnimplementedShieldServiceServer) DeleteGroup(context.Context, *DeleteGroupRequest) (*DeleteGroupResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteGroup(context.Context, *DeleteGroupRequest) (*DeleteGroupResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteGroup not implemented") } -func (UnimplementedShieldServiceServer) ListRoles(context.Context, *ListRolesRequest) (*ListRolesResponse, error) { +func (UnimplementedFrontierServiceServer) ListRoles(context.Context, *ListRolesRequest) (*ListRolesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListRoles not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationRoles(context.Context, *ListOrganizationRolesRequest) (*ListOrganizationRolesResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationRoles(context.Context, *ListOrganizationRolesRequest) (*ListOrganizationRolesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationRoles not implemented") } -func (UnimplementedShieldServiceServer) CreateOrganizationRole(context.Context, *CreateOrganizationRoleRequest) (*CreateOrganizationRoleResponse, error) { +func (UnimplementedFrontierServiceServer) CreateOrganizationRole(context.Context, *CreateOrganizationRoleRequest) (*CreateOrganizationRoleResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateOrganizationRole not implemented") } -func (UnimplementedShieldServiceServer) GetOrganizationRole(context.Context, *GetOrganizationRoleRequest) (*GetOrganizationRoleResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganizationRole(context.Context, *GetOrganizationRoleRequest) (*GetOrganizationRoleResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganizationRole not implemented") } -func (UnimplementedShieldServiceServer) UpdateOrganizationRole(context.Context, *UpdateOrganizationRoleRequest) (*UpdateOrganizationRoleResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateOrganizationRole(context.Context, *UpdateOrganizationRoleRequest) (*UpdateOrganizationRoleResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateOrganizationRole not implemented") } -func (UnimplementedShieldServiceServer) DeleteOrganizationRole(context.Context, *DeleteOrganizationRoleRequest) (*DeleteOrganizationRoleResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteOrganizationRole(context.Context, *DeleteOrganizationRoleRequest) (*DeleteOrganizationRoleResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteOrganizationRole not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizations(context.Context, *ListOrganizationsRequest) (*ListOrganizationsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizations(context.Context, *ListOrganizationsRequest) (*ListOrganizationsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizations not implemented") } -func (UnimplementedShieldServiceServer) CreateOrganization(context.Context, *CreateOrganizationRequest) (*CreateOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) CreateOrganization(context.Context, *CreateOrganizationRequest) (*CreateOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateOrganization not implemented") } -func (UnimplementedShieldServiceServer) GetOrganization(context.Context, *GetOrganizationRequest) (*GetOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganization(context.Context, *GetOrganizationRequest) (*GetOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganization not implemented") } -func (UnimplementedShieldServiceServer) UpdateOrganization(context.Context, *UpdateOrganizationRequest) (*UpdateOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateOrganization(context.Context, *UpdateOrganizationRequest) (*UpdateOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateOrganization not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationProjects(context.Context, *ListOrganizationProjectsRequest) (*ListOrganizationProjectsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationProjects(context.Context, *ListOrganizationProjectsRequest) (*ListOrganizationProjectsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationProjects not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationAdmins(context.Context, *ListOrganizationAdminsRequest) (*ListOrganizationAdminsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationAdmins(context.Context, *ListOrganizationAdminsRequest) (*ListOrganizationAdminsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationAdmins not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationUsers(context.Context, *ListOrganizationUsersRequest) (*ListOrganizationUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationUsers(context.Context, *ListOrganizationUsersRequest) (*ListOrganizationUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationUsers not implemented") } -func (UnimplementedShieldServiceServer) AddOrganizationUsers(context.Context, *AddOrganizationUsersRequest) (*AddOrganizationUsersResponse, error) { +func (UnimplementedFrontierServiceServer) AddOrganizationUsers(context.Context, *AddOrganizationUsersRequest) (*AddOrganizationUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AddOrganizationUsers not implemented") } -func (UnimplementedShieldServiceServer) RemoveOrganizationUser(context.Context, *RemoveOrganizationUserRequest) (*RemoveOrganizationUserResponse, error) { +func (UnimplementedFrontierServiceServer) RemoveOrganizationUser(context.Context, *RemoveOrganizationUserRequest) (*RemoveOrganizationUserResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method RemoveOrganizationUser not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationServiceUsers(context.Context, *ListOrganizationServiceUsersRequest) (*ListOrganizationServiceUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationServiceUsers(context.Context, *ListOrganizationServiceUsersRequest) (*ListOrganizationServiceUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationServiceUsers not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationInvitations(context.Context, *ListOrganizationInvitationsRequest) (*ListOrganizationInvitationsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationInvitations(context.Context, *ListOrganizationInvitationsRequest) (*ListOrganizationInvitationsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationInvitations not implemented") } -func (UnimplementedShieldServiceServer) CreateOrganizationInvitation(context.Context, *CreateOrganizationInvitationRequest) (*CreateOrganizationInvitationResponse, error) { +func (UnimplementedFrontierServiceServer) CreateOrganizationInvitation(context.Context, *CreateOrganizationInvitationRequest) (*CreateOrganizationInvitationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateOrganizationInvitation not implemented") } -func (UnimplementedShieldServiceServer) GetOrganizationInvitation(context.Context, *GetOrganizationInvitationRequest) (*GetOrganizationInvitationResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganizationInvitation(context.Context, *GetOrganizationInvitationRequest) (*GetOrganizationInvitationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganizationInvitation not implemented") } -func (UnimplementedShieldServiceServer) AcceptOrganizationInvitation(context.Context, *AcceptOrganizationInvitationRequest) (*AcceptOrganizationInvitationResponse, error) { +func (UnimplementedFrontierServiceServer) AcceptOrganizationInvitation(context.Context, *AcceptOrganizationInvitationRequest) (*AcceptOrganizationInvitationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AcceptOrganizationInvitation not implemented") } -func (UnimplementedShieldServiceServer) DeleteOrganizationInvitation(context.Context, *DeleteOrganizationInvitationRequest) (*DeleteOrganizationInvitationResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteOrganizationInvitation(context.Context, *DeleteOrganizationInvitationRequest) (*DeleteOrganizationInvitationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteOrganizationInvitation not implemented") } -func (UnimplementedShieldServiceServer) EnableOrganization(context.Context, *EnableOrganizationRequest) (*EnableOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) EnableOrganization(context.Context, *EnableOrganizationRequest) (*EnableOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method EnableOrganization not implemented") } -func (UnimplementedShieldServiceServer) DisableOrganization(context.Context, *DisableOrganizationRequest) (*DisableOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) DisableOrganization(context.Context, *DisableOrganizationRequest) (*DisableOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DisableOrganization not implemented") } -func (UnimplementedShieldServiceServer) DeleteOrganization(context.Context, *DeleteOrganizationRequest) (*DeleteOrganizationResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteOrganization(context.Context, *DeleteOrganizationRequest) (*DeleteOrganizationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteOrganization not implemented") } -func (UnimplementedShieldServiceServer) CreateProject(context.Context, *CreateProjectRequest) (*CreateProjectResponse, error) { +func (UnimplementedFrontierServiceServer) CreateProject(context.Context, *CreateProjectRequest) (*CreateProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateProject not implemented") } -func (UnimplementedShieldServiceServer) GetProject(context.Context, *GetProjectRequest) (*GetProjectResponse, error) { +func (UnimplementedFrontierServiceServer) GetProject(context.Context, *GetProjectRequest) (*GetProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetProject not implemented") } -func (UnimplementedShieldServiceServer) UpdateProject(context.Context, *UpdateProjectRequest) (*UpdateProjectResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateProject(context.Context, *UpdateProjectRequest) (*UpdateProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateProject not implemented") } -func (UnimplementedShieldServiceServer) ListProjectAdmins(context.Context, *ListProjectAdminsRequest) (*ListProjectAdminsResponse, error) { +func (UnimplementedFrontierServiceServer) ListProjectAdmins(context.Context, *ListProjectAdminsRequest) (*ListProjectAdminsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListProjectAdmins not implemented") } -func (UnimplementedShieldServiceServer) ListProjectUsers(context.Context, *ListProjectUsersRequest) (*ListProjectUsersResponse, error) { +func (UnimplementedFrontierServiceServer) ListProjectUsers(context.Context, *ListProjectUsersRequest) (*ListProjectUsersResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListProjectUsers not implemented") } -func (UnimplementedShieldServiceServer) EnableProject(context.Context, *EnableProjectRequest) (*EnableProjectResponse, error) { +func (UnimplementedFrontierServiceServer) EnableProject(context.Context, *EnableProjectRequest) (*EnableProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method EnableProject not implemented") } -func (UnimplementedShieldServiceServer) DisableProject(context.Context, *DisableProjectRequest) (*DisableProjectResponse, error) { +func (UnimplementedFrontierServiceServer) DisableProject(context.Context, *DisableProjectRequest) (*DisableProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DisableProject not implemented") } -func (UnimplementedShieldServiceServer) DeleteProject(context.Context, *DeleteProjectRequest) (*DeleteProjectResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteProject(context.Context, *DeleteProjectRequest) (*DeleteProjectResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteProject not implemented") } -func (UnimplementedShieldServiceServer) CreatePolicy(context.Context, *CreatePolicyRequest) (*CreatePolicyResponse, error) { +func (UnimplementedFrontierServiceServer) CreatePolicy(context.Context, *CreatePolicyRequest) (*CreatePolicyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreatePolicy not implemented") } -func (UnimplementedShieldServiceServer) GetPolicy(context.Context, *GetPolicyRequest) (*GetPolicyResponse, error) { +func (UnimplementedFrontierServiceServer) GetPolicy(context.Context, *GetPolicyRequest) (*GetPolicyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetPolicy not implemented") } -func (UnimplementedShieldServiceServer) UpdatePolicy(context.Context, *UpdatePolicyRequest) (*UpdatePolicyResponse, error) { +func (UnimplementedFrontierServiceServer) UpdatePolicy(context.Context, *UpdatePolicyRequest) (*UpdatePolicyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdatePolicy not implemented") } -func (UnimplementedShieldServiceServer) DeletePolicy(context.Context, *DeletePolicyRequest) (*DeletePolicyResponse, error) { +func (UnimplementedFrontierServiceServer) DeletePolicy(context.Context, *DeletePolicyRequest) (*DeletePolicyResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeletePolicy not implemented") } -func (UnimplementedShieldServiceServer) CreateRelation(context.Context, *CreateRelationRequest) (*CreateRelationResponse, error) { +func (UnimplementedFrontierServiceServer) CreateRelation(context.Context, *CreateRelationRequest) (*CreateRelationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateRelation not implemented") } -func (UnimplementedShieldServiceServer) GetRelation(context.Context, *GetRelationRequest) (*GetRelationResponse, error) { +func (UnimplementedFrontierServiceServer) GetRelation(context.Context, *GetRelationRequest) (*GetRelationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetRelation not implemented") } -func (UnimplementedShieldServiceServer) DeleteRelation(context.Context, *DeleteRelationRequest) (*DeleteRelationResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteRelation(context.Context, *DeleteRelationRequest) (*DeleteRelationResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteRelation not implemented") } -func (UnimplementedShieldServiceServer) ListPermissions(context.Context, *ListPermissionsRequest) (*ListPermissionsResponse, error) { +func (UnimplementedFrontierServiceServer) ListPermissions(context.Context, *ListPermissionsRequest) (*ListPermissionsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListPermissions not implemented") } -func (UnimplementedShieldServiceServer) GetPermission(context.Context, *GetPermissionRequest) (*GetPermissionResponse, error) { +func (UnimplementedFrontierServiceServer) GetPermission(context.Context, *GetPermissionRequest) (*GetPermissionResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetPermission not implemented") } -func (UnimplementedShieldServiceServer) ListNamespaces(context.Context, *ListNamespacesRequest) (*ListNamespacesResponse, error) { +func (UnimplementedFrontierServiceServer) ListNamespaces(context.Context, *ListNamespacesRequest) (*ListNamespacesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListNamespaces not implemented") } -func (UnimplementedShieldServiceServer) GetNamespace(context.Context, *GetNamespaceRequest) (*GetNamespaceResponse, error) { +func (UnimplementedFrontierServiceServer) GetNamespace(context.Context, *GetNamespaceRequest) (*GetNamespaceResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetNamespace not implemented") } -func (UnimplementedShieldServiceServer) ListProjectResources(context.Context, *ListProjectResourcesRequest) (*ListProjectResourcesResponse, error) { +func (UnimplementedFrontierServiceServer) ListProjectResources(context.Context, *ListProjectResourcesRequest) (*ListProjectResourcesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListProjectResources not implemented") } -func (UnimplementedShieldServiceServer) CreateProjectResource(context.Context, *CreateProjectResourceRequest) (*CreateProjectResourceResponse, error) { +func (UnimplementedFrontierServiceServer) CreateProjectResource(context.Context, *CreateProjectResourceRequest) (*CreateProjectResourceResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateProjectResource not implemented") } -func (UnimplementedShieldServiceServer) GetProjectResource(context.Context, *GetProjectResourceRequest) (*GetProjectResourceResponse, error) { +func (UnimplementedFrontierServiceServer) GetProjectResource(context.Context, *GetProjectResourceRequest) (*GetProjectResourceResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetProjectResource not implemented") } -func (UnimplementedShieldServiceServer) UpdateProjectResource(context.Context, *UpdateProjectResourceRequest) (*UpdateProjectResourceResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateProjectResource(context.Context, *UpdateProjectResourceRequest) (*UpdateProjectResourceResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateProjectResource not implemented") } -func (UnimplementedShieldServiceServer) DeleteProjectResource(context.Context, *DeleteProjectResourceRequest) (*DeleteProjectResourceResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteProjectResource(context.Context, *DeleteProjectResourceRequest) (*DeleteProjectResourceResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteProjectResource not implemented") } -func (UnimplementedShieldServiceServer) CheckResourcePermission(context.Context, *CheckResourcePermissionRequest) (*CheckResourcePermissionResponse, error) { +func (UnimplementedFrontierServiceServer) CheckResourcePermission(context.Context, *CheckResourcePermissionRequest) (*CheckResourcePermissionResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CheckResourcePermission not implemented") } -func (UnimplementedShieldServiceServer) GetJWKs(context.Context, *GetJWKsRequest) (*GetJWKsResponse, error) { +func (UnimplementedFrontierServiceServer) GetJWKs(context.Context, *GetJWKsRequest) (*GetJWKsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetJWKs not implemented") } -func (UnimplementedShieldServiceServer) ListAuthStrategies(context.Context, *ListAuthStrategiesRequest) (*ListAuthStrategiesResponse, error) { +func (UnimplementedFrontierServiceServer) ListAuthStrategies(context.Context, *ListAuthStrategiesRequest) (*ListAuthStrategiesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListAuthStrategies not implemented") } -func (UnimplementedShieldServiceServer) Authenticate(context.Context, *AuthenticateRequest) (*AuthenticateResponse, error) { +func (UnimplementedFrontierServiceServer) Authenticate(context.Context, *AuthenticateRequest) (*AuthenticateResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method Authenticate not implemented") } -func (UnimplementedShieldServiceServer) AuthCallback(context.Context, *AuthCallbackRequest) (*AuthCallbackResponse, error) { +func (UnimplementedFrontierServiceServer) AuthCallback(context.Context, *AuthCallbackRequest) (*AuthCallbackResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AuthCallback not implemented") } -func (UnimplementedShieldServiceServer) AuthToken(context.Context, *AuthTokenRequest) (*AuthTokenResponse, error) { +func (UnimplementedFrontierServiceServer) AuthToken(context.Context, *AuthTokenRequest) (*AuthTokenResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AuthToken not implemented") } -func (UnimplementedShieldServiceServer) AuthLogout(context.Context, *AuthLogoutRequest) (*AuthLogoutResponse, error) { +func (UnimplementedFrontierServiceServer) AuthLogout(context.Context, *AuthLogoutRequest) (*AuthLogoutResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method AuthLogout not implemented") } -func (UnimplementedShieldServiceServer) ListMetaSchemas(context.Context, *ListMetaSchemasRequest) (*ListMetaSchemasResponse, error) { +func (UnimplementedFrontierServiceServer) ListMetaSchemas(context.Context, *ListMetaSchemasRequest) (*ListMetaSchemasResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListMetaSchemas not implemented") } -func (UnimplementedShieldServiceServer) CreateMetaSchema(context.Context, *CreateMetaSchemaRequest) (*CreateMetaSchemaResponse, error) { +func (UnimplementedFrontierServiceServer) CreateMetaSchema(context.Context, *CreateMetaSchemaRequest) (*CreateMetaSchemaResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateMetaSchema not implemented") } -func (UnimplementedShieldServiceServer) GetMetaSchema(context.Context, *GetMetaSchemaRequest) (*GetMetaSchemaResponse, error) { +func (UnimplementedFrontierServiceServer) GetMetaSchema(context.Context, *GetMetaSchemaRequest) (*GetMetaSchemaResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetMetaSchema not implemented") } -func (UnimplementedShieldServiceServer) UpdateMetaSchema(context.Context, *UpdateMetaSchemaRequest) (*UpdateMetaSchemaResponse, error) { +func (UnimplementedFrontierServiceServer) UpdateMetaSchema(context.Context, *UpdateMetaSchemaRequest) (*UpdateMetaSchemaResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method UpdateMetaSchema not implemented") } -func (UnimplementedShieldServiceServer) DeleteMetaSchema(context.Context, *DeleteMetaSchemaRequest) (*DeleteMetaSchemaResponse, error) { +func (UnimplementedFrontierServiceServer) DeleteMetaSchema(context.Context, *DeleteMetaSchemaRequest) (*DeleteMetaSchemaResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method DeleteMetaSchema not implemented") } -func (UnimplementedShieldServiceServer) ListOrganizationAuditLogs(context.Context, *ListOrganizationAuditLogsRequest) (*ListOrganizationAuditLogsResponse, error) { +func (UnimplementedFrontierServiceServer) ListOrganizationAuditLogs(context.Context, *ListOrganizationAuditLogsRequest) (*ListOrganizationAuditLogsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method ListOrganizationAuditLogs not implemented") } -func (UnimplementedShieldServiceServer) CreateOrganizationAuditLogs(context.Context, *CreateOrganizationAuditLogsRequest) (*CreateOrganizationAuditLogsResponse, error) { +func (UnimplementedFrontierServiceServer) CreateOrganizationAuditLogs(context.Context, *CreateOrganizationAuditLogsRequest) (*CreateOrganizationAuditLogsResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method CreateOrganizationAuditLogs not implemented") } -func (UnimplementedShieldServiceServer) GetOrganizationAuditLog(context.Context, *GetOrganizationAuditLogRequest) (*GetOrganizationAuditLogResponse, error) { +func (UnimplementedFrontierServiceServer) GetOrganizationAuditLog(context.Context, *GetOrganizationAuditLogRequest) (*GetOrganizationAuditLogResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method GetOrganizationAuditLog not implemented") } -func (UnimplementedShieldServiceServer) mustEmbedUnimplementedShieldServiceServer() {} +func (UnimplementedFrontierServiceServer) mustEmbedUnimplementedFrontierServiceServer() {} -// UnsafeShieldServiceServer may be embedded to opt out of forward compatibility for this service. -// Use of this interface is not recommended, as added methods to ShieldServiceServer will +// UnsafeFrontierServiceServer may be embedded to opt out of forward compatibility for this service. +// Use of this interface is not recommended, as added methods to FrontierServiceServer will // result in compilation errors. -type UnsafeShieldServiceServer interface { - mustEmbedUnimplementedShieldServiceServer() +type UnsafeFrontierServiceServer interface { + mustEmbedUnimplementedFrontierServiceServer() } -func RegisterShieldServiceServer(s grpc.ServiceRegistrar, srv ShieldServiceServer) { - s.RegisterService(&ShieldService_ServiceDesc, srv) +func RegisterFrontierServiceServer(s grpc.ServiceRegistrar, srv FrontierServiceServer) { + s.RegisterService(&FrontierService_ServiceDesc, srv) } -func _ShieldService_ListUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListUsers(ctx, in) + return srv.(FrontierServiceServer).ListUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListUsers_FullMethodName, + FullMethod: FrontierService_ListUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListUsers(ctx, req.(*ListUsersRequest)) + return srv.(FrontierServiceServer).ListUsers(ctx, req.(*ListUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateUser(ctx, in) + return srv.(FrontierServiceServer).CreateUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateUser_FullMethodName, + FullMethod: FrontierService_CreateUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateUser(ctx, req.(*CreateUserRequest)) + return srv.(FrontierServiceServer).CreateUser(ctx, req.(*CreateUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetUser(ctx, in) + return srv.(FrontierServiceServer).GetUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetUser_FullMethodName, + FullMethod: FrontierService_GetUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetUser(ctx, req.(*GetUserRequest)) + return srv.(FrontierServiceServer).GetUser(ctx, req.(*GetUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListUserGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListUserGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListUserGroupsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListUserGroups(ctx, in) + return srv.(FrontierServiceServer).ListUserGroups(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListUserGroups_FullMethodName, + FullMethod: FrontierService_ListUserGroups_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListUserGroups(ctx, req.(*ListUserGroupsRequest)) + return srv.(FrontierServiceServer).ListUserGroups(ctx, req.(*ListUserGroupsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListCurrentUserGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListCurrentUserGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListCurrentUserGroupsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListCurrentUserGroups(ctx, in) + return srv.(FrontierServiceServer).ListCurrentUserGroups(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListCurrentUserGroups_FullMethodName, + FullMethod: FrontierService_ListCurrentUserGroups_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListCurrentUserGroups(ctx, req.(*ListCurrentUserGroupsRequest)) + return srv.(FrontierServiceServer).ListCurrentUserGroups(ctx, req.(*ListCurrentUserGroupsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetCurrentUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetCurrentUser(ctx, in) + return srv.(FrontierServiceServer).GetCurrentUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetCurrentUser_FullMethodName, + FullMethod: FrontierService_GetCurrentUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetCurrentUser(ctx, req.(*GetCurrentUserRequest)) + return srv.(FrontierServiceServer).GetCurrentUser(ctx, req.(*GetCurrentUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateUser(ctx, in) + return srv.(FrontierServiceServer).UpdateUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateUser_FullMethodName, + FullMethod: FrontierService_UpdateUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateUser(ctx, req.(*UpdateUserRequest)) + return srv.(FrontierServiceServer).UpdateUser(ctx, req.(*UpdateUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateCurrentUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateCurrentUser(ctx, in) + return srv.(FrontierServiceServer).UpdateCurrentUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateCurrentUser_FullMethodName, + FullMethod: FrontierService_UpdateCurrentUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateCurrentUser(ctx, req.(*UpdateCurrentUserRequest)) + return srv.(FrontierServiceServer).UpdateCurrentUser(ctx, req.(*UpdateCurrentUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_EnableUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_EnableUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EnableUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).EnableUser(ctx, in) + return srv.(FrontierServiceServer).EnableUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_EnableUser_FullMethodName, + FullMethod: FrontierService_EnableUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).EnableUser(ctx, req.(*EnableUserRequest)) + return srv.(FrontierServiceServer).EnableUser(ctx, req.(*EnableUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DisableUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DisableUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DisableUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DisableUser(ctx, in) + return srv.(FrontierServiceServer).DisableUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DisableUser_FullMethodName, + FullMethod: FrontierService_DisableUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DisableUser(ctx, req.(*DisableUserRequest)) + return srv.(FrontierServiceServer).DisableUser(ctx, req.(*DisableUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteUser(ctx, in) + return srv.(FrontierServiceServer).DeleteUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteUser_FullMethodName, + FullMethod: FrontierService_DeleteUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteUser(ctx, req.(*DeleteUserRequest)) + return srv.(FrontierServiceServer).DeleteUser(ctx, req.(*DeleteUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganizationsByUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganizationsByUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationsByUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganizationsByUser(ctx, in) + return srv.(FrontierServiceServer).GetOrganizationsByUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganizationsByUser_FullMethodName, + FullMethod: FrontierService_GetOrganizationsByUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganizationsByUser(ctx, req.(*GetOrganizationsByUserRequest)) + return srv.(FrontierServiceServer).GetOrganizationsByUser(ctx, req.(*GetOrganizationsByUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganizationsByCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganizationsByCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationsByCurrentUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganizationsByCurrentUser(ctx, in) + return srv.(FrontierServiceServer).GetOrganizationsByCurrentUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganizationsByCurrentUser_FullMethodName, + FullMethod: FrontierService_GetOrganizationsByCurrentUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganizationsByCurrentUser(ctx, req.(*GetOrganizationsByCurrentUserRequest)) + return srv.(FrontierServiceServer).GetOrganizationsByCurrentUser(ctx, req.(*GetOrganizationsByCurrentUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetProjectsByUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetProjectsByUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetProjectsByUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetProjectsByUser(ctx, in) + return srv.(FrontierServiceServer).GetProjectsByUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetProjectsByUser_FullMethodName, + FullMethod: FrontierService_GetProjectsByUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetProjectsByUser(ctx, req.(*GetProjectsByUserRequest)) + return srv.(FrontierServiceServer).GetProjectsByUser(ctx, req.(*GetProjectsByUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetProjectsByCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetProjectsByCurrentUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetProjectsByCurrentUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetProjectsByCurrentUser(ctx, in) + return srv.(FrontierServiceServer).GetProjectsByCurrentUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetProjectsByCurrentUser_FullMethodName, + FullMethod: FrontierService_GetProjectsByCurrentUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetProjectsByCurrentUser(ctx, req.(*GetProjectsByCurrentUserRequest)) + return srv.(FrontierServiceServer).GetProjectsByCurrentUser(ctx, req.(*GetProjectsByCurrentUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListUserInvitations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListUserInvitations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListUserInvitationsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListUserInvitations(ctx, in) + return srv.(FrontierServiceServer).ListUserInvitations(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListUserInvitations_FullMethodName, + FullMethod: FrontierService_ListUserInvitations_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListUserInvitations(ctx, req.(*ListUserInvitationsRequest)) + return srv.(FrontierServiceServer).ListUserInvitations(ctx, req.(*ListUserInvitationsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListServiceUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListServiceUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListServiceUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListServiceUsers(ctx, in) + return srv.(FrontierServiceServer).ListServiceUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListServiceUsers_FullMethodName, + FullMethod: FrontierService_ListServiceUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListServiceUsers(ctx, req.(*ListServiceUsersRequest)) + return srv.(FrontierServiceServer).ListServiceUsers(ctx, req.(*ListServiceUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateServiceUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateServiceUser(ctx, in) + return srv.(FrontierServiceServer).CreateServiceUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateServiceUser_FullMethodName, + FullMethod: FrontierService_CreateServiceUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateServiceUser(ctx, req.(*CreateServiceUserRequest)) + return srv.(FrontierServiceServer).CreateServiceUser(ctx, req.(*CreateServiceUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetServiceUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetServiceUser(ctx, in) + return srv.(FrontierServiceServer).GetServiceUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetServiceUser_FullMethodName, + FullMethod: FrontierService_GetServiceUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetServiceUser(ctx, req.(*GetServiceUserRequest)) + return srv.(FrontierServiceServer).GetServiceUser(ctx, req.(*GetServiceUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteServiceUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteServiceUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteServiceUser(ctx, in) + return srv.(FrontierServiceServer).DeleteServiceUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteServiceUser_FullMethodName, + FullMethod: FrontierService_DeleteServiceUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteServiceUser(ctx, req.(*DeleteServiceUserRequest)) + return srv.(FrontierServiceServer).DeleteServiceUser(ctx, req.(*DeleteServiceUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateServiceUserKeyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateServiceUserKey(ctx, in) + return srv.(FrontierServiceServer).CreateServiceUserKey(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateServiceUserKey_FullMethodName, + FullMethod: FrontierService_CreateServiceUserKey_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateServiceUserKey(ctx, req.(*CreateServiceUserKeyRequest)) + return srv.(FrontierServiceServer).CreateServiceUserKey(ctx, req.(*CreateServiceUserKeyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListServiceUserKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListServiceUserKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListServiceUserKeysRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListServiceUserKeys(ctx, in) + return srv.(FrontierServiceServer).ListServiceUserKeys(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListServiceUserKeys_FullMethodName, + FullMethod: FrontierService_ListServiceUserKeys_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListServiceUserKeys(ctx, req.(*ListServiceUserKeysRequest)) + return srv.(FrontierServiceServer).ListServiceUserKeys(ctx, req.(*ListServiceUserKeysRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetServiceUserKeyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetServiceUserKey(ctx, in) + return srv.(FrontierServiceServer).GetServiceUserKey(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetServiceUserKey_FullMethodName, + FullMethod: FrontierService_GetServiceUserKey_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetServiceUserKey(ctx, req.(*GetServiceUserKeyRequest)) + return srv.(FrontierServiceServer).GetServiceUserKey(ctx, req.(*GetServiceUserKeyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteServiceUserKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteServiceUserKeyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteServiceUserKey(ctx, in) + return srv.(FrontierServiceServer).DeleteServiceUserKey(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteServiceUserKey_FullMethodName, + FullMethod: FrontierService_DeleteServiceUserKey_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteServiceUserKey(ctx, req.(*DeleteServiceUserKeyRequest)) + return srv.(FrontierServiceServer).DeleteServiceUserKey(ctx, req.(*DeleteServiceUserKeyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateServiceUserSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateServiceUserSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateServiceUserSecretRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateServiceUserSecret(ctx, in) + return srv.(FrontierServiceServer).CreateServiceUserSecret(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateServiceUserSecret_FullMethodName, + FullMethod: FrontierService_CreateServiceUserSecret_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateServiceUserSecret(ctx, req.(*CreateServiceUserSecretRequest)) + return srv.(FrontierServiceServer).CreateServiceUserSecret(ctx, req.(*CreateServiceUserSecretRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListServiceUserSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListServiceUserSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListServiceUserSecretsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListServiceUserSecrets(ctx, in) + return srv.(FrontierServiceServer).ListServiceUserSecrets(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListServiceUserSecrets_FullMethodName, + FullMethod: FrontierService_ListServiceUserSecrets_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListServiceUserSecrets(ctx, req.(*ListServiceUserSecretsRequest)) + return srv.(FrontierServiceServer).ListServiceUserSecrets(ctx, req.(*ListServiceUserSecretsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteServiceUserSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteServiceUserSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteServiceUserSecretRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteServiceUserSecret(ctx, in) + return srv.(FrontierServiceServer).DeleteServiceUserSecret(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteServiceUserSecret_FullMethodName, + FullMethod: FrontierService_DeleteServiceUserSecret_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteServiceUserSecret(ctx, req.(*DeleteServiceUserSecretRequest)) + return srv.(FrontierServiceServer).DeleteServiceUserSecret(ctx, req.(*DeleteServiceUserSecretRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationGroups_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationGroupsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationGroups(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationGroups(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationGroups_FullMethodName, + FullMethod: FrontierService_ListOrganizationGroups_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationGroups(ctx, req.(*ListOrganizationGroupsRequest)) + return srv.(FrontierServiceServer).ListOrganizationGroups(ctx, req.(*ListOrganizationGroupsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateGroup(ctx, in) + return srv.(FrontierServiceServer).CreateGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateGroup_FullMethodName, + FullMethod: FrontierService_CreateGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateGroup(ctx, req.(*CreateGroupRequest)) + return srv.(FrontierServiceServer).CreateGroup(ctx, req.(*CreateGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetGroup(ctx, in) + return srv.(FrontierServiceServer).GetGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetGroup_FullMethodName, + FullMethod: FrontierService_GetGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetGroup(ctx, req.(*GetGroupRequest)) + return srv.(FrontierServiceServer).GetGroup(ctx, req.(*GetGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateGroup(ctx, in) + return srv.(FrontierServiceServer).UpdateGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateGroup_FullMethodName, + FullMethod: FrontierService_UpdateGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateGroup(ctx, req.(*UpdateGroupRequest)) + return srv.(FrontierServiceServer).UpdateGroup(ctx, req.(*UpdateGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListGroupUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListGroupUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListGroupUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListGroupUsers(ctx, in) + return srv.(FrontierServiceServer).ListGroupUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListGroupUsers_FullMethodName, + FullMethod: FrontierService_ListGroupUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListGroupUsers(ctx, req.(*ListGroupUsersRequest)) + return srv.(FrontierServiceServer).ListGroupUsers(ctx, req.(*ListGroupUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AddGroupUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AddGroupUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AddGroupUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AddGroupUsers(ctx, in) + return srv.(FrontierServiceServer).AddGroupUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AddGroupUsers_FullMethodName, + FullMethod: FrontierService_AddGroupUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AddGroupUsers(ctx, req.(*AddGroupUsersRequest)) + return srv.(FrontierServiceServer).AddGroupUsers(ctx, req.(*AddGroupUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_RemoveGroupUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_RemoveGroupUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(RemoveGroupUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).RemoveGroupUser(ctx, in) + return srv.(FrontierServiceServer).RemoveGroupUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_RemoveGroupUser_FullMethodName, + FullMethod: FrontierService_RemoveGroupUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).RemoveGroupUser(ctx, req.(*RemoveGroupUserRequest)) + return srv.(FrontierServiceServer).RemoveGroupUser(ctx, req.(*RemoveGroupUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_EnableGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_EnableGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EnableGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).EnableGroup(ctx, in) + return srv.(FrontierServiceServer).EnableGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_EnableGroup_FullMethodName, + FullMethod: FrontierService_EnableGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).EnableGroup(ctx, req.(*EnableGroupRequest)) + return srv.(FrontierServiceServer).EnableGroup(ctx, req.(*EnableGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DisableGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DisableGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DisableGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DisableGroup(ctx, in) + return srv.(FrontierServiceServer).DisableGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DisableGroup_FullMethodName, + FullMethod: FrontierService_DisableGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DisableGroup(ctx, req.(*DisableGroupRequest)) + return srv.(FrontierServiceServer).DisableGroup(ctx, req.(*DisableGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteGroup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteGroupRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteGroup(ctx, in) + return srv.(FrontierServiceServer).DeleteGroup(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteGroup_FullMethodName, + FullMethod: FrontierService_DeleteGroup_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteGroup(ctx, req.(*DeleteGroupRequest)) + return srv.(FrontierServiceServer).DeleteGroup(ctx, req.(*DeleteGroupRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListRolesRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListRoles(ctx, in) + return srv.(FrontierServiceServer).ListRoles(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListRoles_FullMethodName, + FullMethod: FrontierService_ListRoles_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListRoles(ctx, req.(*ListRolesRequest)) + return srv.(FrontierServiceServer).ListRoles(ctx, req.(*ListRolesRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationRoles_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationRolesRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationRoles(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationRoles(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationRoles_FullMethodName, + FullMethod: FrontierService_ListOrganizationRoles_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationRoles(ctx, req.(*ListOrganizationRolesRequest)) + return srv.(FrontierServiceServer).ListOrganizationRoles(ctx, req.(*ListOrganizationRolesRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateOrganizationRoleRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateOrganizationRole(ctx, in) + return srv.(FrontierServiceServer).CreateOrganizationRole(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateOrganizationRole_FullMethodName, + FullMethod: FrontierService_CreateOrganizationRole_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateOrganizationRole(ctx, req.(*CreateOrganizationRoleRequest)) + return srv.(FrontierServiceServer).CreateOrganizationRole(ctx, req.(*CreateOrganizationRoleRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationRoleRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganizationRole(ctx, in) + return srv.(FrontierServiceServer).GetOrganizationRole(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganizationRole_FullMethodName, + FullMethod: FrontierService_GetOrganizationRole_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganizationRole(ctx, req.(*GetOrganizationRoleRequest)) + return srv.(FrontierServiceServer).GetOrganizationRole(ctx, req.(*GetOrganizationRoleRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateOrganizationRoleRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateOrganizationRole(ctx, in) + return srv.(FrontierServiceServer).UpdateOrganizationRole(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateOrganizationRole_FullMethodName, + FullMethod: FrontierService_UpdateOrganizationRole_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateOrganizationRole(ctx, req.(*UpdateOrganizationRoleRequest)) + return srv.(FrontierServiceServer).UpdateOrganizationRole(ctx, req.(*UpdateOrganizationRoleRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteOrganizationRole_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteOrganizationRoleRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteOrganizationRole(ctx, in) + return srv.(FrontierServiceServer).DeleteOrganizationRole(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteOrganizationRole_FullMethodName, + FullMethod: FrontierService_DeleteOrganizationRole_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteOrganizationRole(ctx, req.(*DeleteOrganizationRoleRequest)) + return srv.(FrontierServiceServer).DeleteOrganizationRole(ctx, req.(*DeleteOrganizationRoleRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizations(ctx, in) + return srv.(FrontierServiceServer).ListOrganizations(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizations_FullMethodName, + FullMethod: FrontierService_ListOrganizations_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizations(ctx, req.(*ListOrganizationsRequest)) + return srv.(FrontierServiceServer).ListOrganizations(ctx, req.(*ListOrganizationsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateOrganization(ctx, in) + return srv.(FrontierServiceServer).CreateOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateOrganization_FullMethodName, + FullMethod: FrontierService_CreateOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateOrganization(ctx, req.(*CreateOrganizationRequest)) + return srv.(FrontierServiceServer).CreateOrganization(ctx, req.(*CreateOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganization(ctx, in) + return srv.(FrontierServiceServer).GetOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganization_FullMethodName, + FullMethod: FrontierService_GetOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganization(ctx, req.(*GetOrganizationRequest)) + return srv.(FrontierServiceServer).GetOrganization(ctx, req.(*GetOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateOrganization(ctx, in) + return srv.(FrontierServiceServer).UpdateOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateOrganization_FullMethodName, + FullMethod: FrontierService_UpdateOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateOrganization(ctx, req.(*UpdateOrganizationRequest)) + return srv.(FrontierServiceServer).UpdateOrganization(ctx, req.(*UpdateOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationProjects_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationProjects_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationProjectsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationProjects(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationProjects(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationProjects_FullMethodName, + FullMethod: FrontierService_ListOrganizationProjects_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationProjects(ctx, req.(*ListOrganizationProjectsRequest)) + return srv.(FrontierServiceServer).ListOrganizationProjects(ctx, req.(*ListOrganizationProjectsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationAdminsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationAdmins(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationAdmins(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationAdmins_FullMethodName, + FullMethod: FrontierService_ListOrganizationAdmins_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationAdmins(ctx, req.(*ListOrganizationAdminsRequest)) + return srv.(FrontierServiceServer).ListOrganizationAdmins(ctx, req.(*ListOrganizationAdminsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationUsers(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationUsers_FullMethodName, + FullMethod: FrontierService_ListOrganizationUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationUsers(ctx, req.(*ListOrganizationUsersRequest)) + return srv.(FrontierServiceServer).ListOrganizationUsers(ctx, req.(*ListOrganizationUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AddOrganizationUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AddOrganizationUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AddOrganizationUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AddOrganizationUsers(ctx, in) + return srv.(FrontierServiceServer).AddOrganizationUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AddOrganizationUsers_FullMethodName, + FullMethod: FrontierService_AddOrganizationUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AddOrganizationUsers(ctx, req.(*AddOrganizationUsersRequest)) + return srv.(FrontierServiceServer).AddOrganizationUsers(ctx, req.(*AddOrganizationUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_RemoveOrganizationUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_RemoveOrganizationUser_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(RemoveOrganizationUserRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).RemoveOrganizationUser(ctx, in) + return srv.(FrontierServiceServer).RemoveOrganizationUser(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_RemoveOrganizationUser_FullMethodName, + FullMethod: FrontierService_RemoveOrganizationUser_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).RemoveOrganizationUser(ctx, req.(*RemoveOrganizationUserRequest)) + return srv.(FrontierServiceServer).RemoveOrganizationUser(ctx, req.(*RemoveOrganizationUserRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationServiceUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationServiceUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationServiceUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationServiceUsers(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationServiceUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationServiceUsers_FullMethodName, + FullMethod: FrontierService_ListOrganizationServiceUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationServiceUsers(ctx, req.(*ListOrganizationServiceUsersRequest)) + return srv.(FrontierServiceServer).ListOrganizationServiceUsers(ctx, req.(*ListOrganizationServiceUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationInvitations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationInvitations_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationInvitationsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationInvitations(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationInvitations(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationInvitations_FullMethodName, + FullMethod: FrontierService_ListOrganizationInvitations_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationInvitations(ctx, req.(*ListOrganizationInvitationsRequest)) + return srv.(FrontierServiceServer).ListOrganizationInvitations(ctx, req.(*ListOrganizationInvitationsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateOrganizationInvitationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateOrganizationInvitation(ctx, in) + return srv.(FrontierServiceServer).CreateOrganizationInvitation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateOrganizationInvitation_FullMethodName, + FullMethod: FrontierService_CreateOrganizationInvitation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateOrganizationInvitation(ctx, req.(*CreateOrganizationInvitationRequest)) + return srv.(FrontierServiceServer).CreateOrganizationInvitation(ctx, req.(*CreateOrganizationInvitationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationInvitationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganizationInvitation(ctx, in) + return srv.(FrontierServiceServer).GetOrganizationInvitation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganizationInvitation_FullMethodName, + FullMethod: FrontierService_GetOrganizationInvitation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganizationInvitation(ctx, req.(*GetOrganizationInvitationRequest)) + return srv.(FrontierServiceServer).GetOrganizationInvitation(ctx, req.(*GetOrganizationInvitationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AcceptOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AcceptOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AcceptOrganizationInvitationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AcceptOrganizationInvitation(ctx, in) + return srv.(FrontierServiceServer).AcceptOrganizationInvitation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AcceptOrganizationInvitation_FullMethodName, + FullMethod: FrontierService_AcceptOrganizationInvitation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AcceptOrganizationInvitation(ctx, req.(*AcceptOrganizationInvitationRequest)) + return srv.(FrontierServiceServer).AcceptOrganizationInvitation(ctx, req.(*AcceptOrganizationInvitationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteOrganizationInvitation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteOrganizationInvitationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteOrganizationInvitation(ctx, in) + return srv.(FrontierServiceServer).DeleteOrganizationInvitation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteOrganizationInvitation_FullMethodName, + FullMethod: FrontierService_DeleteOrganizationInvitation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteOrganizationInvitation(ctx, req.(*DeleteOrganizationInvitationRequest)) + return srv.(FrontierServiceServer).DeleteOrganizationInvitation(ctx, req.(*DeleteOrganizationInvitationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_EnableOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_EnableOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EnableOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).EnableOrganization(ctx, in) + return srv.(FrontierServiceServer).EnableOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_EnableOrganization_FullMethodName, + FullMethod: FrontierService_EnableOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).EnableOrganization(ctx, req.(*EnableOrganizationRequest)) + return srv.(FrontierServiceServer).EnableOrganization(ctx, req.(*EnableOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DisableOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DisableOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DisableOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DisableOrganization(ctx, in) + return srv.(FrontierServiceServer).DisableOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DisableOrganization_FullMethodName, + FullMethod: FrontierService_DisableOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DisableOrganization(ctx, req.(*DisableOrganizationRequest)) + return srv.(FrontierServiceServer).DisableOrganization(ctx, req.(*DisableOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteOrganization_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteOrganizationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteOrganization(ctx, in) + return srv.(FrontierServiceServer).DeleteOrganization(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteOrganization_FullMethodName, + FullMethod: FrontierService_DeleteOrganization_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteOrganization(ctx, req.(*DeleteOrganizationRequest)) + return srv.(FrontierServiceServer).DeleteOrganization(ctx, req.(*DeleteOrganizationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateProject(ctx, in) + return srv.(FrontierServiceServer).CreateProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateProject_FullMethodName, + FullMethod: FrontierService_CreateProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateProject(ctx, req.(*CreateProjectRequest)) + return srv.(FrontierServiceServer).CreateProject(ctx, req.(*CreateProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetProject(ctx, in) + return srv.(FrontierServiceServer).GetProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetProject_FullMethodName, + FullMethod: FrontierService_GetProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetProject(ctx, req.(*GetProjectRequest)) + return srv.(FrontierServiceServer).GetProject(ctx, req.(*GetProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateProject(ctx, in) + return srv.(FrontierServiceServer).UpdateProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateProject_FullMethodName, + FullMethod: FrontierService_UpdateProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateProject(ctx, req.(*UpdateProjectRequest)) + return srv.(FrontierServiceServer).UpdateProject(ctx, req.(*UpdateProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListProjectAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListProjectAdmins_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListProjectAdminsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListProjectAdmins(ctx, in) + return srv.(FrontierServiceServer).ListProjectAdmins(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListProjectAdmins_FullMethodName, + FullMethod: FrontierService_ListProjectAdmins_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListProjectAdmins(ctx, req.(*ListProjectAdminsRequest)) + return srv.(FrontierServiceServer).ListProjectAdmins(ctx, req.(*ListProjectAdminsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListProjectUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListProjectUsers_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListProjectUsersRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListProjectUsers(ctx, in) + return srv.(FrontierServiceServer).ListProjectUsers(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListProjectUsers_FullMethodName, + FullMethod: FrontierService_ListProjectUsers_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListProjectUsers(ctx, req.(*ListProjectUsersRequest)) + return srv.(FrontierServiceServer).ListProjectUsers(ctx, req.(*ListProjectUsersRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_EnableProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_EnableProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(EnableProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).EnableProject(ctx, in) + return srv.(FrontierServiceServer).EnableProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_EnableProject_FullMethodName, + FullMethod: FrontierService_EnableProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).EnableProject(ctx, req.(*EnableProjectRequest)) + return srv.(FrontierServiceServer).EnableProject(ctx, req.(*EnableProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DisableProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DisableProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DisableProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DisableProject(ctx, in) + return srv.(FrontierServiceServer).DisableProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DisableProject_FullMethodName, + FullMethod: FrontierService_DisableProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DisableProject(ctx, req.(*DisableProjectRequest)) + return srv.(FrontierServiceServer).DisableProject(ctx, req.(*DisableProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteProject_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteProjectRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteProject(ctx, in) + return srv.(FrontierServiceServer).DeleteProject(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteProject_FullMethodName, + FullMethod: FrontierService_DeleteProject_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteProject(ctx, req.(*DeleteProjectRequest)) + return srv.(FrontierServiceServer).DeleteProject(ctx, req.(*DeleteProjectRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreatePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreatePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreatePolicyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreatePolicy(ctx, in) + return srv.(FrontierServiceServer).CreatePolicy(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreatePolicy_FullMethodName, + FullMethod: FrontierService_CreatePolicy_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreatePolicy(ctx, req.(*CreatePolicyRequest)) + return srv.(FrontierServiceServer).CreatePolicy(ctx, req.(*CreatePolicyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetPolicyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetPolicy(ctx, in) + return srv.(FrontierServiceServer).GetPolicy(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetPolicy_FullMethodName, + FullMethod: FrontierService_GetPolicy_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetPolicy(ctx, req.(*GetPolicyRequest)) + return srv.(FrontierServiceServer).GetPolicy(ctx, req.(*GetPolicyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdatePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdatePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdatePolicyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdatePolicy(ctx, in) + return srv.(FrontierServiceServer).UpdatePolicy(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdatePolicy_FullMethodName, + FullMethod: FrontierService_UpdatePolicy_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdatePolicy(ctx, req.(*UpdatePolicyRequest)) + return srv.(FrontierServiceServer).UpdatePolicy(ctx, req.(*UpdatePolicyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeletePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeletePolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeletePolicyRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeletePolicy(ctx, in) + return srv.(FrontierServiceServer).DeletePolicy(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeletePolicy_FullMethodName, + FullMethod: FrontierService_DeletePolicy_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeletePolicy(ctx, req.(*DeletePolicyRequest)) + return srv.(FrontierServiceServer).DeletePolicy(ctx, req.(*DeletePolicyRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateRelationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateRelation(ctx, in) + return srv.(FrontierServiceServer).CreateRelation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateRelation_FullMethodName, + FullMethod: FrontierService_CreateRelation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateRelation(ctx, req.(*CreateRelationRequest)) + return srv.(FrontierServiceServer).CreateRelation(ctx, req.(*CreateRelationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetRelationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetRelation(ctx, in) + return srv.(FrontierServiceServer).GetRelation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetRelation_FullMethodName, + FullMethod: FrontierService_GetRelation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetRelation(ctx, req.(*GetRelationRequest)) + return srv.(FrontierServiceServer).GetRelation(ctx, req.(*GetRelationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteRelation_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteRelationRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteRelation(ctx, in) + return srv.(FrontierServiceServer).DeleteRelation(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteRelation_FullMethodName, + FullMethod: FrontierService_DeleteRelation_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteRelation(ctx, req.(*DeleteRelationRequest)) + return srv.(FrontierServiceServer).DeleteRelation(ctx, req.(*DeleteRelationRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListPermissionsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListPermissions(ctx, in) + return srv.(FrontierServiceServer).ListPermissions(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListPermissions_FullMethodName, + FullMethod: FrontierService_ListPermissions_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListPermissions(ctx, req.(*ListPermissionsRequest)) + return srv.(FrontierServiceServer).ListPermissions(ctx, req.(*ListPermissionsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetPermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetPermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetPermissionRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetPermission(ctx, in) + return srv.(FrontierServiceServer).GetPermission(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetPermission_FullMethodName, + FullMethod: FrontierService_GetPermission_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetPermission(ctx, req.(*GetPermissionRequest)) + return srv.(FrontierServiceServer).GetPermission(ctx, req.(*GetPermissionRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListNamespaces_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListNamespaces_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListNamespacesRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListNamespaces(ctx, in) + return srv.(FrontierServiceServer).ListNamespaces(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListNamespaces_FullMethodName, + FullMethod: FrontierService_ListNamespaces_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListNamespaces(ctx, req.(*ListNamespacesRequest)) + return srv.(FrontierServiceServer).ListNamespaces(ctx, req.(*ListNamespacesRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetNamespace_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetNamespace_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetNamespaceRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetNamespace(ctx, in) + return srv.(FrontierServiceServer).GetNamespace(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetNamespace_FullMethodName, + FullMethod: FrontierService_GetNamespace_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetNamespace(ctx, req.(*GetNamespaceRequest)) + return srv.(FrontierServiceServer).GetNamespace(ctx, req.(*GetNamespaceRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListProjectResources_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListProjectResources_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListProjectResourcesRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListProjectResources(ctx, in) + return srv.(FrontierServiceServer).ListProjectResources(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListProjectResources_FullMethodName, + FullMethod: FrontierService_ListProjectResources_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListProjectResources(ctx, req.(*ListProjectResourcesRequest)) + return srv.(FrontierServiceServer).ListProjectResources(ctx, req.(*ListProjectResourcesRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateProjectResourceRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateProjectResource(ctx, in) + return srv.(FrontierServiceServer).CreateProjectResource(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateProjectResource_FullMethodName, + FullMethod: FrontierService_CreateProjectResource_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateProjectResource(ctx, req.(*CreateProjectResourceRequest)) + return srv.(FrontierServiceServer).CreateProjectResource(ctx, req.(*CreateProjectResourceRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetProjectResourceRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetProjectResource(ctx, in) + return srv.(FrontierServiceServer).GetProjectResource(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetProjectResource_FullMethodName, + FullMethod: FrontierService_GetProjectResource_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetProjectResource(ctx, req.(*GetProjectResourceRequest)) + return srv.(FrontierServiceServer).GetProjectResource(ctx, req.(*GetProjectResourceRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateProjectResourceRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateProjectResource(ctx, in) + return srv.(FrontierServiceServer).UpdateProjectResource(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateProjectResource_FullMethodName, + FullMethod: FrontierService_UpdateProjectResource_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateProjectResource(ctx, req.(*UpdateProjectResourceRequest)) + return srv.(FrontierServiceServer).UpdateProjectResource(ctx, req.(*UpdateProjectResourceRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteProjectResource_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteProjectResourceRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteProjectResource(ctx, in) + return srv.(FrontierServiceServer).DeleteProjectResource(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteProjectResource_FullMethodName, + FullMethod: FrontierService_DeleteProjectResource_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteProjectResource(ctx, req.(*DeleteProjectResourceRequest)) + return srv.(FrontierServiceServer).DeleteProjectResource(ctx, req.(*DeleteProjectResourceRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CheckResourcePermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CheckResourcePermission_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CheckResourcePermissionRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CheckResourcePermission(ctx, in) + return srv.(FrontierServiceServer).CheckResourcePermission(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CheckResourcePermission_FullMethodName, + FullMethod: FrontierService_CheckResourcePermission_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CheckResourcePermission(ctx, req.(*CheckResourcePermissionRequest)) + return srv.(FrontierServiceServer).CheckResourcePermission(ctx, req.(*CheckResourcePermissionRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetJWKs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetJWKs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetJWKsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetJWKs(ctx, in) + return srv.(FrontierServiceServer).GetJWKs(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetJWKs_FullMethodName, + FullMethod: FrontierService_GetJWKs_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetJWKs(ctx, req.(*GetJWKsRequest)) + return srv.(FrontierServiceServer).GetJWKs(ctx, req.(*GetJWKsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListAuthStrategies_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListAuthStrategies_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListAuthStrategiesRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListAuthStrategies(ctx, in) + return srv.(FrontierServiceServer).ListAuthStrategies(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListAuthStrategies_FullMethodName, + FullMethod: FrontierService_ListAuthStrategies_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListAuthStrategies(ctx, req.(*ListAuthStrategiesRequest)) + return srv.(FrontierServiceServer).ListAuthStrategies(ctx, req.(*ListAuthStrategiesRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_Authenticate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_Authenticate_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AuthenticateRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).Authenticate(ctx, in) + return srv.(FrontierServiceServer).Authenticate(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_Authenticate_FullMethodName, + FullMethod: FrontierService_Authenticate_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).Authenticate(ctx, req.(*AuthenticateRequest)) + return srv.(FrontierServiceServer).Authenticate(ctx, req.(*AuthenticateRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AuthCallback_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AuthCallback_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AuthCallbackRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AuthCallback(ctx, in) + return srv.(FrontierServiceServer).AuthCallback(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AuthCallback_FullMethodName, + FullMethod: FrontierService_AuthCallback_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AuthCallback(ctx, req.(*AuthCallbackRequest)) + return srv.(FrontierServiceServer).AuthCallback(ctx, req.(*AuthCallbackRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AuthToken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AuthToken_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AuthTokenRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AuthToken(ctx, in) + return srv.(FrontierServiceServer).AuthToken(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AuthToken_FullMethodName, + FullMethod: FrontierService_AuthToken_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AuthToken(ctx, req.(*AuthTokenRequest)) + return srv.(FrontierServiceServer).AuthToken(ctx, req.(*AuthTokenRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_AuthLogout_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_AuthLogout_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(AuthLogoutRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).AuthLogout(ctx, in) + return srv.(FrontierServiceServer).AuthLogout(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_AuthLogout_FullMethodName, + FullMethod: FrontierService_AuthLogout_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).AuthLogout(ctx, req.(*AuthLogoutRequest)) + return srv.(FrontierServiceServer).AuthLogout(ctx, req.(*AuthLogoutRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListMetaSchemas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListMetaSchemas_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListMetaSchemasRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListMetaSchemas(ctx, in) + return srv.(FrontierServiceServer).ListMetaSchemas(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListMetaSchemas_FullMethodName, + FullMethod: FrontierService_ListMetaSchemas_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListMetaSchemas(ctx, req.(*ListMetaSchemasRequest)) + return srv.(FrontierServiceServer).ListMetaSchemas(ctx, req.(*ListMetaSchemasRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateMetaSchemaRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateMetaSchema(ctx, in) + return srv.(FrontierServiceServer).CreateMetaSchema(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateMetaSchema_FullMethodName, + FullMethod: FrontierService_CreateMetaSchema_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateMetaSchema(ctx, req.(*CreateMetaSchemaRequest)) + return srv.(FrontierServiceServer).CreateMetaSchema(ctx, req.(*CreateMetaSchemaRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetMetaSchemaRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetMetaSchema(ctx, in) + return srv.(FrontierServiceServer).GetMetaSchema(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetMetaSchema_FullMethodName, + FullMethod: FrontierService_GetMetaSchema_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetMetaSchema(ctx, req.(*GetMetaSchemaRequest)) + return srv.(FrontierServiceServer).GetMetaSchema(ctx, req.(*GetMetaSchemaRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_UpdateMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_UpdateMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(UpdateMetaSchemaRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).UpdateMetaSchema(ctx, in) + return srv.(FrontierServiceServer).UpdateMetaSchema(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_UpdateMetaSchema_FullMethodName, + FullMethod: FrontierService_UpdateMetaSchema_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).UpdateMetaSchema(ctx, req.(*UpdateMetaSchemaRequest)) + return srv.(FrontierServiceServer).UpdateMetaSchema(ctx, req.(*UpdateMetaSchemaRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_DeleteMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_DeleteMetaSchema_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(DeleteMetaSchemaRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).DeleteMetaSchema(ctx, in) + return srv.(FrontierServiceServer).DeleteMetaSchema(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_DeleteMetaSchema_FullMethodName, + FullMethod: FrontierService_DeleteMetaSchema_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).DeleteMetaSchema(ctx, req.(*DeleteMetaSchemaRequest)) + return srv.(FrontierServiceServer).DeleteMetaSchema(ctx, req.(*DeleteMetaSchemaRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_ListOrganizationAuditLogs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_ListOrganizationAuditLogs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(ListOrganizationAuditLogsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).ListOrganizationAuditLogs(ctx, in) + return srv.(FrontierServiceServer).ListOrganizationAuditLogs(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_ListOrganizationAuditLogs_FullMethodName, + FullMethod: FrontierService_ListOrganizationAuditLogs_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).ListOrganizationAuditLogs(ctx, req.(*ListOrganizationAuditLogsRequest)) + return srv.(FrontierServiceServer).ListOrganizationAuditLogs(ctx, req.(*ListOrganizationAuditLogsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_CreateOrganizationAuditLogs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_CreateOrganizationAuditLogs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(CreateOrganizationAuditLogsRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).CreateOrganizationAuditLogs(ctx, in) + return srv.(FrontierServiceServer).CreateOrganizationAuditLogs(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_CreateOrganizationAuditLogs_FullMethodName, + FullMethod: FrontierService_CreateOrganizationAuditLogs_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).CreateOrganizationAuditLogs(ctx, req.(*CreateOrganizationAuditLogsRequest)) + return srv.(FrontierServiceServer).CreateOrganizationAuditLogs(ctx, req.(*CreateOrganizationAuditLogsRequest)) } return interceptor(ctx, in, info, handler) } -func _ShieldService_GetOrganizationAuditLog_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { +func _FrontierService_GetOrganizationAuditLog_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { in := new(GetOrganizationAuditLogRequest) if err := dec(in); err != nil { return nil, err } if interceptor == nil { - return srv.(ShieldServiceServer).GetOrganizationAuditLog(ctx, in) + return srv.(FrontierServiceServer).GetOrganizationAuditLog(ctx, in) } info := &grpc.UnaryServerInfo{ Server: srv, - FullMethod: ShieldService_GetOrganizationAuditLog_FullMethodName, + FullMethod: FrontierService_GetOrganizationAuditLog_FullMethodName, } handler := func(ctx context.Context, req interface{}) (interface{}, error) { - return srv.(ShieldServiceServer).GetOrganizationAuditLog(ctx, req.(*GetOrganizationAuditLogRequest)) + return srv.(FrontierServiceServer).GetOrganizationAuditLog(ctx, req.(*GetOrganizationAuditLogRequest)) } return interceptor(ctx, in, info, handler) } -// ShieldService_ServiceDesc is the grpc.ServiceDesc for ShieldService service. +// FrontierService_ServiceDesc is the grpc.ServiceDesc for FrontierService service. // It's only intended for direct use with grpc.RegisterService, // and not to be introspected or modified (even as a copy) -var ShieldService_ServiceDesc = grpc.ServiceDesc{ - ServiceName: "raystack.shield.v1beta1.ShieldService", - HandlerType: (*ShieldServiceServer)(nil), +var FrontierService_ServiceDesc = grpc.ServiceDesc{ + ServiceName: "raystack.frontier.v1beta1.FrontierService", + HandlerType: (*FrontierServiceServer)(nil), Methods: []grpc.MethodDesc{ { MethodName: "ListUsers", - Handler: _ShieldService_ListUsers_Handler, + Handler: _FrontierService_ListUsers_Handler, }, { MethodName: "CreateUser", - Handler: _ShieldService_CreateUser_Handler, + Handler: _FrontierService_CreateUser_Handler, }, { MethodName: "GetUser", - Handler: _ShieldService_GetUser_Handler, + Handler: _FrontierService_GetUser_Handler, }, { MethodName: "ListUserGroups", - Handler: _ShieldService_ListUserGroups_Handler, + Handler: _FrontierService_ListUserGroups_Handler, }, { MethodName: "ListCurrentUserGroups", - Handler: _ShieldService_ListCurrentUserGroups_Handler, + Handler: _FrontierService_ListCurrentUserGroups_Handler, }, { MethodName: "GetCurrentUser", - Handler: _ShieldService_GetCurrentUser_Handler, + Handler: _FrontierService_GetCurrentUser_Handler, }, { MethodName: "UpdateUser", - Handler: _ShieldService_UpdateUser_Handler, + Handler: _FrontierService_UpdateUser_Handler, }, { MethodName: "UpdateCurrentUser", - Handler: _ShieldService_UpdateCurrentUser_Handler, + Handler: _FrontierService_UpdateCurrentUser_Handler, }, { MethodName: "EnableUser", - Handler: _ShieldService_EnableUser_Handler, + Handler: _FrontierService_EnableUser_Handler, }, { MethodName: "DisableUser", - Handler: _ShieldService_DisableUser_Handler, + Handler: _FrontierService_DisableUser_Handler, }, { MethodName: "DeleteUser", - Handler: _ShieldService_DeleteUser_Handler, + Handler: _FrontierService_DeleteUser_Handler, }, { MethodName: "GetOrganizationsByUser", - Handler: _ShieldService_GetOrganizationsByUser_Handler, + Handler: _FrontierService_GetOrganizationsByUser_Handler, }, { MethodName: "GetOrganizationsByCurrentUser", - Handler: _ShieldService_GetOrganizationsByCurrentUser_Handler, + Handler: _FrontierService_GetOrganizationsByCurrentUser_Handler, }, { MethodName: "GetProjectsByUser", - Handler: _ShieldService_GetProjectsByUser_Handler, + Handler: _FrontierService_GetProjectsByUser_Handler, }, { MethodName: "GetProjectsByCurrentUser", - Handler: _ShieldService_GetProjectsByCurrentUser_Handler, + Handler: _FrontierService_GetProjectsByCurrentUser_Handler, }, { MethodName: "ListUserInvitations", - Handler: _ShieldService_ListUserInvitations_Handler, + Handler: _FrontierService_ListUserInvitations_Handler, }, { MethodName: "ListServiceUsers", - Handler: _ShieldService_ListServiceUsers_Handler, + Handler: _FrontierService_ListServiceUsers_Handler, }, { MethodName: "CreateServiceUser", - Handler: _ShieldService_CreateServiceUser_Handler, + Handler: _FrontierService_CreateServiceUser_Handler, }, { MethodName: "GetServiceUser", - Handler: _ShieldService_GetServiceUser_Handler, + Handler: _FrontierService_GetServiceUser_Handler, }, { MethodName: "DeleteServiceUser", - Handler: _ShieldService_DeleteServiceUser_Handler, + Handler: _FrontierService_DeleteServiceUser_Handler, }, { MethodName: "CreateServiceUserKey", - Handler: _ShieldService_CreateServiceUserKey_Handler, + Handler: _FrontierService_CreateServiceUserKey_Handler, }, { MethodName: "ListServiceUserKeys", - Handler: _ShieldService_ListServiceUserKeys_Handler, + Handler: _FrontierService_ListServiceUserKeys_Handler, }, { MethodName: "GetServiceUserKey", - Handler: _ShieldService_GetServiceUserKey_Handler, + Handler: _FrontierService_GetServiceUserKey_Handler, }, { MethodName: "DeleteServiceUserKey", - Handler: _ShieldService_DeleteServiceUserKey_Handler, + Handler: _FrontierService_DeleteServiceUserKey_Handler, }, { MethodName: "CreateServiceUserSecret", - Handler: _ShieldService_CreateServiceUserSecret_Handler, + Handler: _FrontierService_CreateServiceUserSecret_Handler, }, { MethodName: "ListServiceUserSecrets", - Handler: _ShieldService_ListServiceUserSecrets_Handler, + Handler: _FrontierService_ListServiceUserSecrets_Handler, }, { MethodName: "DeleteServiceUserSecret", - Handler: _ShieldService_DeleteServiceUserSecret_Handler, + Handler: _FrontierService_DeleteServiceUserSecret_Handler, }, { MethodName: "ListOrganizationGroups", - Handler: _ShieldService_ListOrganizationGroups_Handler, + Handler: _FrontierService_ListOrganizationGroups_Handler, }, { MethodName: "CreateGroup", - Handler: _ShieldService_CreateGroup_Handler, + Handler: _FrontierService_CreateGroup_Handler, }, { MethodName: "GetGroup", - Handler: _ShieldService_GetGroup_Handler, + Handler: _FrontierService_GetGroup_Handler, }, { MethodName: "UpdateGroup", - Handler: _ShieldService_UpdateGroup_Handler, + Handler: _FrontierService_UpdateGroup_Handler, }, { MethodName: "ListGroupUsers", - Handler: _ShieldService_ListGroupUsers_Handler, + Handler: _FrontierService_ListGroupUsers_Handler, }, { MethodName: "AddGroupUsers", - Handler: _ShieldService_AddGroupUsers_Handler, + Handler: _FrontierService_AddGroupUsers_Handler, }, { MethodName: "RemoveGroupUser", - Handler: _ShieldService_RemoveGroupUser_Handler, + Handler: _FrontierService_RemoveGroupUser_Handler, }, { MethodName: "EnableGroup", - Handler: _ShieldService_EnableGroup_Handler, + Handler: _FrontierService_EnableGroup_Handler, }, { MethodName: "DisableGroup", - Handler: _ShieldService_DisableGroup_Handler, + Handler: _FrontierService_DisableGroup_Handler, }, { MethodName: "DeleteGroup", - Handler: _ShieldService_DeleteGroup_Handler, + Handler: _FrontierService_DeleteGroup_Handler, }, { MethodName: "ListRoles", - Handler: _ShieldService_ListRoles_Handler, + Handler: _FrontierService_ListRoles_Handler, }, { MethodName: "ListOrganizationRoles", - Handler: _ShieldService_ListOrganizationRoles_Handler, + Handler: _FrontierService_ListOrganizationRoles_Handler, }, { MethodName: "CreateOrganizationRole", - Handler: _ShieldService_CreateOrganizationRole_Handler, + Handler: _FrontierService_CreateOrganizationRole_Handler, }, { MethodName: "GetOrganizationRole", - Handler: _ShieldService_GetOrganizationRole_Handler, + Handler: _FrontierService_GetOrganizationRole_Handler, }, { MethodName: "UpdateOrganizationRole", - Handler: _ShieldService_UpdateOrganizationRole_Handler, + Handler: _FrontierService_UpdateOrganizationRole_Handler, }, { MethodName: "DeleteOrganizationRole", - Handler: _ShieldService_DeleteOrganizationRole_Handler, + Handler: _FrontierService_DeleteOrganizationRole_Handler, }, { MethodName: "ListOrganizations", - Handler: _ShieldService_ListOrganizations_Handler, + Handler: _FrontierService_ListOrganizations_Handler, }, { MethodName: "CreateOrganization", - Handler: _ShieldService_CreateOrganization_Handler, + Handler: _FrontierService_CreateOrganization_Handler, }, { MethodName: "GetOrganization", - Handler: _ShieldService_GetOrganization_Handler, + Handler: _FrontierService_GetOrganization_Handler, }, { MethodName: "UpdateOrganization", - Handler: _ShieldService_UpdateOrganization_Handler, + Handler: _FrontierService_UpdateOrganization_Handler, }, { MethodName: "ListOrganizationProjects", - Handler: _ShieldService_ListOrganizationProjects_Handler, + Handler: _FrontierService_ListOrganizationProjects_Handler, }, { MethodName: "ListOrganizationAdmins", - Handler: _ShieldService_ListOrganizationAdmins_Handler, + Handler: _FrontierService_ListOrganizationAdmins_Handler, }, { MethodName: "ListOrganizationUsers", - Handler: _ShieldService_ListOrganizationUsers_Handler, + Handler: _FrontierService_ListOrganizationUsers_Handler, }, { MethodName: "AddOrganizationUsers", - Handler: _ShieldService_AddOrganizationUsers_Handler, + Handler: _FrontierService_AddOrganizationUsers_Handler, }, { MethodName: "RemoveOrganizationUser", - Handler: _ShieldService_RemoveOrganizationUser_Handler, + Handler: _FrontierService_RemoveOrganizationUser_Handler, }, { MethodName: "ListOrganizationServiceUsers", - Handler: _ShieldService_ListOrganizationServiceUsers_Handler, + Handler: _FrontierService_ListOrganizationServiceUsers_Handler, }, { MethodName: "ListOrganizationInvitations", - Handler: _ShieldService_ListOrganizationInvitations_Handler, + Handler: _FrontierService_ListOrganizationInvitations_Handler, }, { MethodName: "CreateOrganizationInvitation", - Handler: _ShieldService_CreateOrganizationInvitation_Handler, + Handler: _FrontierService_CreateOrganizationInvitation_Handler, }, { MethodName: "GetOrganizationInvitation", - Handler: _ShieldService_GetOrganizationInvitation_Handler, + Handler: _FrontierService_GetOrganizationInvitation_Handler, }, { MethodName: "AcceptOrganizationInvitation", - Handler: _ShieldService_AcceptOrganizationInvitation_Handler, + Handler: _FrontierService_AcceptOrganizationInvitation_Handler, }, { MethodName: "DeleteOrganizationInvitation", - Handler: _ShieldService_DeleteOrganizationInvitation_Handler, + Handler: _FrontierService_DeleteOrganizationInvitation_Handler, }, { MethodName: "EnableOrganization", - Handler: _ShieldService_EnableOrganization_Handler, + Handler: _FrontierService_EnableOrganization_Handler, }, { MethodName: "DisableOrganization", - Handler: _ShieldService_DisableOrganization_Handler, + Handler: _FrontierService_DisableOrganization_Handler, }, { MethodName: "DeleteOrganization", - Handler: _ShieldService_DeleteOrganization_Handler, + Handler: _FrontierService_DeleteOrganization_Handler, }, { MethodName: "CreateProject", - Handler: _ShieldService_CreateProject_Handler, + Handler: _FrontierService_CreateProject_Handler, }, { MethodName: "GetProject", - Handler: _ShieldService_GetProject_Handler, + Handler: _FrontierService_GetProject_Handler, }, { MethodName: "UpdateProject", - Handler: _ShieldService_UpdateProject_Handler, + Handler: _FrontierService_UpdateProject_Handler, }, { MethodName: "ListProjectAdmins", - Handler: _ShieldService_ListProjectAdmins_Handler, + Handler: _FrontierService_ListProjectAdmins_Handler, }, { MethodName: "ListProjectUsers", - Handler: _ShieldService_ListProjectUsers_Handler, + Handler: _FrontierService_ListProjectUsers_Handler, }, { MethodName: "EnableProject", - Handler: _ShieldService_EnableProject_Handler, + Handler: _FrontierService_EnableProject_Handler, }, { MethodName: "DisableProject", - Handler: _ShieldService_DisableProject_Handler, + Handler: _FrontierService_DisableProject_Handler, }, { MethodName: "DeleteProject", - Handler: _ShieldService_DeleteProject_Handler, + Handler: _FrontierService_DeleteProject_Handler, }, { MethodName: "CreatePolicy", - Handler: _ShieldService_CreatePolicy_Handler, + Handler: _FrontierService_CreatePolicy_Handler, }, { MethodName: "GetPolicy", - Handler: _ShieldService_GetPolicy_Handler, + Handler: _FrontierService_GetPolicy_Handler, }, { MethodName: "UpdatePolicy", - Handler: _ShieldService_UpdatePolicy_Handler, + Handler: _FrontierService_UpdatePolicy_Handler, }, { MethodName: "DeletePolicy", - Handler: _ShieldService_DeletePolicy_Handler, + Handler: _FrontierService_DeletePolicy_Handler, }, { MethodName: "CreateRelation", - Handler: _ShieldService_CreateRelation_Handler, + Handler: _FrontierService_CreateRelation_Handler, }, { MethodName: "GetRelation", - Handler: _ShieldService_GetRelation_Handler, + Handler: _FrontierService_GetRelation_Handler, }, { MethodName: "DeleteRelation", - Handler: _ShieldService_DeleteRelation_Handler, + Handler: _FrontierService_DeleteRelation_Handler, }, { MethodName: "ListPermissions", - Handler: _ShieldService_ListPermissions_Handler, + Handler: _FrontierService_ListPermissions_Handler, }, { MethodName: "GetPermission", - Handler: _ShieldService_GetPermission_Handler, + Handler: _FrontierService_GetPermission_Handler, }, { MethodName: "ListNamespaces", - Handler: _ShieldService_ListNamespaces_Handler, + Handler: _FrontierService_ListNamespaces_Handler, }, { MethodName: "GetNamespace", - Handler: _ShieldService_GetNamespace_Handler, + Handler: _FrontierService_GetNamespace_Handler, }, { MethodName: "ListProjectResources", - Handler: _ShieldService_ListProjectResources_Handler, + Handler: _FrontierService_ListProjectResources_Handler, }, { MethodName: "CreateProjectResource", - Handler: _ShieldService_CreateProjectResource_Handler, + Handler: _FrontierService_CreateProjectResource_Handler, }, { MethodName: "GetProjectResource", - Handler: _ShieldService_GetProjectResource_Handler, + Handler: _FrontierService_GetProjectResource_Handler, }, { MethodName: "UpdateProjectResource", - Handler: _ShieldService_UpdateProjectResource_Handler, + Handler: _FrontierService_UpdateProjectResource_Handler, }, { MethodName: "DeleteProjectResource", - Handler: _ShieldService_DeleteProjectResource_Handler, + Handler: _FrontierService_DeleteProjectResource_Handler, }, { MethodName: "CheckResourcePermission", - Handler: _ShieldService_CheckResourcePermission_Handler, + Handler: _FrontierService_CheckResourcePermission_Handler, }, { MethodName: "GetJWKs", - Handler: _ShieldService_GetJWKs_Handler, + Handler: _FrontierService_GetJWKs_Handler, }, { MethodName: "ListAuthStrategies", - Handler: _ShieldService_ListAuthStrategies_Handler, + Handler: _FrontierService_ListAuthStrategies_Handler, }, { MethodName: "Authenticate", - Handler: _ShieldService_Authenticate_Handler, + Handler: _FrontierService_Authenticate_Handler, }, { MethodName: "AuthCallback", - Handler: _ShieldService_AuthCallback_Handler, + Handler: _FrontierService_AuthCallback_Handler, }, { MethodName: "AuthToken", - Handler: _ShieldService_AuthToken_Handler, + Handler: _FrontierService_AuthToken_Handler, }, { MethodName: "AuthLogout", - Handler: _ShieldService_AuthLogout_Handler, + Handler: _FrontierService_AuthLogout_Handler, }, { MethodName: "ListMetaSchemas", - Handler: _ShieldService_ListMetaSchemas_Handler, + Handler: _FrontierService_ListMetaSchemas_Handler, }, { MethodName: "CreateMetaSchema", - Handler: _ShieldService_CreateMetaSchema_Handler, + Handler: _FrontierService_CreateMetaSchema_Handler, }, { MethodName: "GetMetaSchema", - Handler: _ShieldService_GetMetaSchema_Handler, + Handler: _FrontierService_GetMetaSchema_Handler, }, { MethodName: "UpdateMetaSchema", - Handler: _ShieldService_UpdateMetaSchema_Handler, + Handler: _FrontierService_UpdateMetaSchema_Handler, }, { MethodName: "DeleteMetaSchema", - Handler: _ShieldService_DeleteMetaSchema_Handler, + Handler: _FrontierService_DeleteMetaSchema_Handler, }, { MethodName: "ListOrganizationAuditLogs", - Handler: _ShieldService_ListOrganizationAuditLogs_Handler, + Handler: _FrontierService_ListOrganizationAuditLogs_Handler, }, { MethodName: "CreateOrganizationAuditLogs", - Handler: _ShieldService_CreateOrganizationAuditLogs_Handler, + Handler: _FrontierService_CreateOrganizationAuditLogs_Handler, }, { MethodName: "GetOrganizationAuditLog", - Handler: _ShieldService_GetOrganizationAuditLog_Handler, + Handler: _FrontierService_GetOrganizationAuditLog_Handler, }, }, Streams: []grpc.StreamDesc{}, - Metadata: "raystack/shield/v1beta1/shield.proto", + Metadata: "raystack/frontier/v1beta1/frontier.proto", } diff --git a/sdks/packages/shield-js/package.json b/sdks/packages/shield-js/package.json index 6c073d3f0..1a30a91cb 100644 --- a/sdks/packages/shield-js/package.json +++ b/sdks/packages/shield-js/package.json @@ -1,12 +1,12 @@ { - "name": "@raystack/shield", + "name": "@raystack/frontier", "version": "0.0.1", - "description": "A js library for shield", + "description": "A js library for frontier", "type": "module", "main": "dist/index.cjs", "module": "dist/index.js", "types": "dist/index.d.ts", - "unpkg": "dist/shield.min.js", + "unpkg": "dist/frontier.min.js", "files": [ "dist", "README.md" diff --git a/sdks/packages/shield-js/src/index.ts b/sdks/packages/shield-js/src/index.ts index 7e672531f..865e02b0e 100644 --- a/sdks/packages/shield-js/src/index.ts +++ b/sdks/packages/shield-js/src/index.ts @@ -1,2 +1,2 @@ export * from "./types"; -export class Shield {} +export class Frontier {} diff --git a/sdks/packages/shield-js/src/types.ts b/sdks/packages/shield-js/src/types.ts index 49a6535d9..48fe23f96 100644 --- a/sdks/packages/shield-js/src/types.ts +++ b/sdks/packages/shield-js/src/types.ts @@ -48,7 +48,7 @@ export interface Role { types: string[]; } -export interface ShieldClientOptions { +export interface FrontierClientOptions { endpoint?: string; redirectSignup?: string; redirectLogin?: string; @@ -58,8 +58,8 @@ export interface InitialState { sessionId?: string | null; } -export interface ShieldProviderProps { - config: ShieldClientOptions; +export interface FrontierProviderProps { + config: FrontierClientOptions; children: React.ReactNode; initialState?: InitialState; } diff --git a/sdks/packages/shield-js/tsup.config.ts b/sdks/packages/shield-js/tsup.config.ts index e3501651b..51d996c6d 100644 --- a/sdks/packages/shield-js/tsup.config.ts +++ b/sdks/packages/shield-js/tsup.config.ts @@ -15,16 +15,16 @@ export default defineConfig(() => [ { entry: { bundle: "src/index.ts" }, format: ["iife"], - globalName: "shielddev", + globalName: "frontierdev", clean: false, minify: true, platform: "browser", dts: false, - name: "shield", - // esbuild `globalName` option generates `var shielddev = (() => {})()` + name: "frontier", + // esbuild `globalName` option generates `var frontierdev = (() => {})()` // and var is not guaranteed to assign to the global `window` object so we make sure to assign it footer: { - js: "window.__SHIELD__ = shielddev", + js: "window.__SHIELD__ = frontierdev", }, outExtension({ format, options }) { return { @@ -32,7 +32,7 @@ export default defineConfig(() => [ }; }, esbuildOptions(options, ctx) { - options.entryNames = "shield"; + options.entryNames = "frontier"; }, }, ]); diff --git a/sdks/packages/shield-react/README.md b/sdks/packages/shield-react/README.md index 75c9ddc58..b29e357c5 100644 --- a/sdks/packages/shield-react/README.md +++ b/sdks/packages/shield-react/README.md @@ -1,47 +1,47 @@ -# shield-react +# frontier-react -Shield React SDK allows you to implement authentication in your [React](https://reactjs.org/) application quickly using Magic links and social sign-in. It also allows you to access the +Frontier React SDK allows you to implement authentication in your [React](https://reactjs.org/) application quickly using Magic links and social sign-in. It also allows you to access the SignIn, SignUp, user profile, Workspace creation, Workspace Profile etc. components. -Here is a quick guide on getting started with `@raystack/shield-react` package. +Here is a quick guide on getting started with `@raystack/frontier-react` package. ## Step 1 - Create Instance -Get Shield URL by instantiating [Shield instance](https://github.com/odpf/shield) +Get Frontier URL by instantiating [Frontier instance](https://github.com/odpf/frontier) . ## Step 2 - Install package -Install `@raystack/shield-react` library +Install `@raystack/frontier-react` library ```sh -npm i --save @raystack/shield-react +npm i --save @raystack/frontier-react OR -yarn add @raystack/shield-react +yarn add @raystack/frontier-react ``` -## Step 3 - Configure Provider and use Shield Components +## Step 3 - Configure Provider and use Frontier Components -Shield comes with [react context](https://reactjs.org/docs/context.html) which serves as `Provider` component for the application +Frontier comes with [react context](https://reactjs.org/docs/context.html) which serves as `Provider` component for the application ```jsx -import { ShieldProvider, Shield, useShield } from "@raystack/shield-react"; +import { FrontierProvider, Frontier, useFrontier } from "@raystack/frontier-react"; const App = () => { return ( - - + ); }; const Profile = () => { - const { user } = useShield(); + const { user } = useFrontier(); if (user) { return
        {user.email}
        ; } @@ -53,7 +53,7 @@ const Profile = () => { ### Local Development -The recommended workflow is to run react shield in one terminal: +The recommended workflow is to run react frontier in one terminal: ```bash npm start # or yarn start @@ -61,7 +61,7 @@ npm start # or yarn start This builds to `/dist` and runs the project in watch mode so any edits you save inside `src` causes a rebuild to `/dist`. -Then run any example package which use shield-react: +Then run any example package which use frontier-react: ### Example package diff --git a/sdks/packages/shield-react/package.json b/sdks/packages/shield-react/package.json index a5b06b755..bdfbd13b5 100644 --- a/sdks/packages/shield-react/package.json +++ b/sdks/packages/shield-react/package.json @@ -1,7 +1,7 @@ { - "name": "@raystack/shield-react", + "name": "@raystack/frontier-react", "version": "0.0.4", - "description": "A react library for shield", + "description": "A react library for frontier", "type": "module", "main": "dist/index.cjs", "module": "dist/index.js", @@ -39,7 +39,7 @@ ], "devDependencies": { "@hookform/resolvers": "^3.1.1", - "@raystack/shield": "workspace:^", + "@raystack/frontier": "workspace:^", "@size-limit/preset-small-lib": "^8.2.6", "@types/react": "^18.2.5", "@types/react-dom": "^18.2.7", diff --git a/sdks/packages/shield-react/src/components/Header.tsx b/sdks/packages/shield-react/src/components/Header.tsx index 5640a0a20..28b3d78e3 100644 --- a/sdks/packages/shield-react/src/components/Header.tsx +++ b/sdks/packages/shield-react/src/components/Header.tsx @@ -1,6 +1,6 @@ import { Flex, Text } from "@raystack/apsara"; import React, { ComponentPropsWithRef } from "react"; -import { useShield } from "../contexts/ShieldContext"; +import { useFrontier } from "../contexts/FrontierContext"; const styles = { container: { @@ -33,7 +33,7 @@ type HeaderProps = ComponentPropsWithRef<"div"> & { }; export const Header = ({ title, logo }: HeaderProps) => { - const { config } = useShield(); + const { config } = useFrontier(); return ( { - const { config } = useShield(); - const { client, strategies = [] } = useShield(); + const { config } = useFrontier(); + const { client, strategies = [] } = useFrontier(); const clickHandler = useCallback( async (name: string) => { diff --git a/sdks/packages/shield-react/src/components/magiclink-verify.tsx b/sdks/packages/shield-react/src/components/magiclink-verify.tsx index 1c7b35bef..3b3557489 100644 --- a/sdks/packages/shield-react/src/components/magiclink-verify.tsx +++ b/sdks/packages/shield-react/src/components/magiclink-verify.tsx @@ -7,7 +7,7 @@ import React, { useEffect, useState, } from "react"; -import { useShield } from "../contexts/ShieldContext"; +import { useFrontier } from "../contexts/FrontierContext"; import { Container } from "./Container"; import { Header } from "./Header"; import { hasWindow } from "./helper"; @@ -29,7 +29,7 @@ export const MagicLinkVerify = ({ ...props }: MagicLinkVerifyProps) => { const [loading, setLoading] = useState(false); - const { client, config, strategies = [] } = useShield(); + const { client, config, strategies = [] } = useFrontier(); const [visiable, setVisiable] = useState(false); const [email, setEmail] = useState(""); const [emailParam, setEmailParam] = useState(""); diff --git a/sdks/packages/shield-react/src/components/magiclink.tsx b/sdks/packages/shield-react/src/components/magiclink.tsx index cbc484659..064230a50 100644 --- a/sdks/packages/shield-react/src/components/magiclink.tsx +++ b/sdks/packages/shield-react/src/components/magiclink.tsx @@ -1,6 +1,6 @@ import { Button, Separator, Text, TextField } from "@raystack/apsara"; import React, { useCallback, useState } from "react"; -import { useShield } from "../contexts/ShieldContext"; +import { useFrontier } from "../contexts/FrontierContext"; const styles = { container: { @@ -20,7 +20,7 @@ type MagicLinkProps = { children?: React.ReactNode; }; export const MagicLink = ({ children, ...props }: MagicLinkProps) => { - const { client, config } = useShield(); + const { client, config } = useFrontier(); const [visiable, setVisiable] = useState(false); const [loading, setLoading] = useState(false); const [email, setEmail] = useState(""); diff --git a/sdks/packages/shield-react/src/components/organization.tsx b/sdks/packages/shield-react/src/components/organization.tsx index b0f61b2ca..ae971b5dc 100644 --- a/sdks/packages/shield-react/src/components/organization.tsx +++ b/sdks/packages/shield-react/src/components/organization.tsx @@ -5,7 +5,7 @@ import { Button, Flex, InputField, Text, TextField } from "@raystack/apsara"; import React, { ComponentPropsWithRef } from "react"; import { Controller, useForm } from "react-hook-form"; import * as yup from "yup"; -import { useShield } from "../contexts/ShieldContext"; +import { useFrontier } from "../contexts/FrontierContext"; import { Container } from "./Container"; const styles = { @@ -46,7 +46,7 @@ export const CreateOrganization = ({ resolver: yupResolver(schema), }); - const { client } = useShield(); + const { client } = useFrontier(); async function onSubmit(data: any) { const { diff --git a/sdks/packages/shield-react/src/components/signup.tsx b/sdks/packages/shield-react/src/components/signup.tsx index 179d6e56d..61d184257 100644 --- a/sdks/packages/shield-react/src/components/signup.tsx +++ b/sdks/packages/shield-react/src/components/signup.tsx @@ -1,6 +1,6 @@ import { Flex, Link, Text } from "@raystack/apsara"; import React, { ComponentPropsWithRef, useCallback } from "react"; -import { useShield } from "../contexts/ShieldContext"; +import { useFrontier } from "../contexts/FrontierContext"; import { Container } from "./Container"; import { Header } from "./Header"; import { MagicLink } from "./magiclink"; @@ -21,8 +21,8 @@ export const Signup = ({ title = "Create your account", ...props }: SignupProps) => { - const { config } = useShield(); - const { client, strategies = [] } = useShield(); + const { config } = useFrontier(); + const { client, strategies = [] } = useFrontier(); const clickHandler = useCallback( async (name: string) => { diff --git a/sdks/packages/shield-react/src/contexts/ShieldContext.tsx b/sdks/packages/shield-react/src/contexts/ShieldContext.tsx index 8b4f30087..66e544a8e 100644 --- a/sdks/packages/shield-react/src/contexts/ShieldContext.tsx +++ b/sdks/packages/shield-react/src/contexts/ShieldContext.tsx @@ -1,11 +1,11 @@ import { Group, Organization, - ShieldClientOptions, - ShieldProviderProps, + FrontierClientOptions, + FrontierProviderProps, Strategy, User, -} from "@raystack/shield"; +} from "@raystack/frontier"; import React, { createContext, Dispatch, @@ -15,10 +15,10 @@ import React, { useState, } from "react"; -import Shield from "../shield"; -interface ShieldContextProviderProps { - config: ShieldClientOptions; - client: Shield; +import Frontier from "../frontier"; +interface FrontierContextProviderProps { + config: FrontierClientOptions; + client: Frontier; organizations: Organization[]; setOrganizations: Dispatch>; @@ -40,9 +40,9 @@ const defaultConfig = { redirectMagicLinkVerify: "http://localhost:3000/magiclink-verify", }; -const initialValues: ShieldContextProviderProps = { +const initialValues: FrontierContextProviderProps = { config: defaultConfig, - client: Shield.getOrCreateInstance(defaultConfig), + client: Frontier.getOrCreateInstance(defaultConfig), organizations: [], setOrganizations: () => undefined, @@ -57,17 +57,17 @@ const initialValues: ShieldContextProviderProps = { setUser: () => undefined, }; -export const ShieldContext = - createContext(initialValues); -ShieldContext.displayName = "ShieldContext "; +export const FrontierContext = + createContext(initialValues); +FrontierContext.displayName = "FrontierContext "; -export const ShieldContextProvider = ({ +export const FrontierContextProvider = ({ children, config, initialState, ...options -}: ShieldProviderProps) => { - const { shieldClient } = useShieldClient(config); +}: FrontierProviderProps) => { + const { frontierClient } = useFrontierClient(config); const [organizations, setOrganizations] = useState([]); const [groups, setGroups] = useState([]); @@ -75,80 +75,80 @@ export const ShieldContextProvider = ({ const [user, setUser] = useState(null); useEffect(() => { - async function getShieldInformation() { + async function getFrontierInformation() { try { const { data: { strategies }, - } = await shieldClient.getAuthAtrategies(); + } = await frontierClient.getAuthAtrategies(); setStrategies(strategies); } catch (error) { console.error( - "shield:sdk:: There is problem with fetching auth strategies" + "frontier:sdk:: There is problem with fetching auth strategies" ); } } - getShieldInformation(); + getFrontierInformation(); }, []); useEffect(() => { - async function getShieldCurrentUser() { + async function getFrontierCurrentUser() { try { const { data: { user }, - } = await shieldClient.getCurrentUser(); + } = await frontierClient.getCurrentUser(); setUser(user); } catch (error) { console.error( - "shield:sdk:: There is problem with fetching current user information" + "frontier:sdk:: There is problem with fetching current user information" ); } } - getShieldCurrentUser(); + getFrontierCurrentUser(); }, []); useEffect(() => { - async function getShieldCurrentUserGroups(userId: string) { + async function getFrontierCurrentUserGroups(userId: string) { try { const { data: { groups }, - } = await shieldClient.getUserGroups(userId); + } = await frontierClient.getUserGroups(userId); setGroups(groups); } catch (error) { console.error( - "shield:sdk:: There is problem with fetching user groups information" + "frontier:sdk:: There is problem with fetching user groups information" ); } } if (user) { - getShieldCurrentUserGroups(user.id); + getFrontierCurrentUserGroups(user.id); } }, [user]); useEffect(() => { - async function getShieldCurrentUserOrganizations(userId: string) { + async function getFrontierCurrentUserOrganizations(userId: string) { try { const { data: { organizations }, - } = await shieldClient.getUserOrganisations(userId); + } = await frontierClient.getUserOrganisations(userId); setOrganizations(organizations); } catch (error) { console.error( - "shield:sdk:: There is problem with fetching user current organizations" + "frontier:sdk:: There is problem with fetching user current organizations" ); } } if (user) { - getShieldCurrentUserOrganizations(user.id); + getFrontierCurrentUserOrganizations(user.id); } }, [user]); return ( - {children} - + ); }; -export const useShieldClient = (options: ShieldClientOptions) => { - const shieldClient = React.useMemo( - () => Shield.getOrCreateInstance(options), +export const useFrontierClient = (options: FrontierClientOptions) => { + const frontierClient = React.useMemo( + () => Frontier.getOrCreateInstance(options), [] ); - return { shieldClient }; + return { frontierClient }; }; -export function useShield() { - const context = useContext(ShieldContext); - return context ? context : (initialValues as ShieldContextProviderProps); +export function useFrontier() { + const context = useContext(FrontierContext); + return context ? context : (initialValues as FrontierContextProviderProps); } diff --git a/sdks/packages/shield-react/src/contexts/ShieldProvider.tsx b/sdks/packages/shield-react/src/contexts/ShieldProvider.tsx index 068fd0670..711ccba5b 100644 --- a/sdks/packages/shield-react/src/contexts/ShieldProvider.tsx +++ b/sdks/packages/shield-react/src/contexts/ShieldProvider.tsx @@ -1,28 +1,28 @@ -import { ShieldProviderProps } from "@raystack/shield"; +import { FrontierProviderProps } from "@raystack/frontier"; import React from "react"; -import { ShieldContextProvider } from "./ShieldContext"; +import { FrontierContextProvider } from "./FrontierContext"; import { withMaxAllowedInstancesGuard } from "./useMaxAllowedInstancesGuard"; -export const multipleShieldProvidersError = - "Shield: You've added multiple components in your React component tree. Wrap your components in a single ."; +export const multipleFrontierProvidersError = + "Frontier: You've added multiple components in your React component tree. Wrap your components in a single ."; -const ShieldProviderBase = (props: ShieldProviderProps) => { +const FrontierProviderBase = (props: FrontierProviderProps) => { const { children, initialState, config, ...options } = props; return ( - {children} - + ); }; -export const ShieldProvider = withMaxAllowedInstancesGuard( - ShieldProviderBase, - "ShieldProvider", - multipleShieldProvidersError +export const FrontierProvider = withMaxAllowedInstancesGuard( + FrontierProviderBase, + "FrontierProvider", + multipleFrontierProvidersError ); -ShieldProvider.displayName = "ShieldProvider"; +FrontierProvider.displayName = "FrontierProvider"; diff --git a/sdks/packages/shield-react/src/index.ts b/sdks/packages/shield-react/src/index.ts index 6e0691a3e..3a419a831 100644 --- a/sdks/packages/shield-react/src/index.ts +++ b/sdks/packages/shield-react/src/index.ts @@ -4,5 +4,5 @@ export * from "./components/login"; export * from "./components/magiclink-verify"; export * from "./components/organization"; export * from "./components/signup"; -export { useShield } from "./contexts/ShieldContext"; -export { ShieldProvider } from "./contexts/ShieldProvider"; +export { useFrontier } from "./contexts/FrontierContext"; +export { FrontierProvider } from "./contexts/FrontierProvider"; diff --git a/sdks/packages/shield-react/src/shield.ts b/sdks/packages/shield-react/src/shield.ts index e52eb143c..05a00c64e 100644 --- a/sdks/packages/shield-react/src/shield.ts +++ b/sdks/packages/shield-react/src/shield.ts @@ -1,26 +1,26 @@ import { Group, Organization, - ShieldClientOptions, + FrontierClientOptions, Strategy, User, -} from "@raystack/shield"; +} from "@raystack/frontier"; import type { AxiosInstance, AxiosResponse } from "axios"; import axios from "axios"; -export default class Shield { +export default class Frontier { protected readonly instance: AxiosInstance; - private readonly options: ShieldClientOptions; - private static classInstance?: Shield; + private readonly options: FrontierClientOptions; + private static classInstance?: Frontier; - static getOrCreateInstance(options: ShieldClientOptions) { + static getOrCreateInstance(options: FrontierClientOptions) { if (!this.classInstance) { - return new Shield(options); + return new Frontier(options); } return this.classInstance; } - constructor(options: ShieldClientOptions) { + constructor(options: FrontierClientOptions) { this.options = options; this.instance = axios.create({ baseURL: options.endpoint, diff --git a/sdks/packages/shield-react/tsup.config.ts b/sdks/packages/shield-react/tsup.config.ts index eda9541c5..cf26d923f 100644 --- a/sdks/packages/shield-react/tsup.config.ts +++ b/sdks/packages/shield-react/tsup.config.ts @@ -9,7 +9,7 @@ export const tsup: Options = { external: ["react", "react-dom"], format: ["cjs", "esm", "iife"], skipNodeModulesBundle: true, - globalName: "Shield", + globalName: "Frontier", target: "es6", banner: { js: "'use client'", diff --git a/sdks/pnpm-lock.yaml b/sdks/pnpm-lock.yaml index 7716eaf29..f71e2a901 100644 --- a/sdks/pnpm-lock.yaml +++ b/sdks/pnpm-lock.yaml @@ -24,7 +24,7 @@ importers: specifier: '4.7' version: 4.7.2 - packages/shield-js: + packages/frontier-js: dependencies: '@types/react': specifier: ^18.2.5 @@ -58,7 +58,7 @@ importers: specifier: '4.7' version: 4.7.2 - packages/shield-react: + packages/frontier-react: dependencies: '@raystack/apsara': specifier: ^0.10.3 @@ -70,9 +70,9 @@ importers: '@hookform/resolvers': specifier: ^3.1.1 version: 3.1.1(react-hook-form@7.45.2) - '@raystack/shield': + '@raystack/frontier': specifier: workspace:^ - version: link:../shield-js + version: link:../frontier-js '@size-limit/preset-small-lib': specifier: ^8.2.6 version: 8.2.6(size-limit@8.2.6) diff --git a/test/e2e/regression/api_test.go b/test/e2e/regression/api_test.go index b7f4975a5..6b12a6e7a 100644 --- a/test/e2e/regression/api_test.go +++ b/test/e2e/regression/api_test.go @@ -8,16 +8,16 @@ import ( "golang.org/x/exp/slices" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/core/organization" + "github.com/raystack/frontier/core/organization" - "github.com/raystack/shield/config" - "github.com/raystack/shield/pkg/logger" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/pkg/logger" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" "google.golang.org/grpc/codes" "google.golang.org/grpc/metadata" @@ -46,7 +46,7 @@ func (s *APIRegressionTestSuite) SetupSuite() { grpcPort, err := testbench.GetFreePort() s.Require().NoError(err) - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", AuditEvents: "db", @@ -86,8 +86,8 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { })) s.Run("1. a user should successfully create a new org and become its admin", func() { - createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Title: "org acme 1", Name: "org-acme-1", Metadata: &structpb.Struct{ @@ -99,7 +99,7 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { }) s.Assert().NoError(err) - orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: createOrgResp.GetOrganization().GetId(), }) s.Assert().NoError(err) @@ -107,8 +107,8 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { s.Assert().Equal(testbench.OrgAdminEmail, orgUsersResp.GetUsers()[0].Email) }) s.Run("2. user attached to an org as member should have no basic permission other than membership", func() { - createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Title: "org acme 2", Name: "org-acme-2", Metadata: &structpb.Struct{ @@ -120,36 +120,36 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { }) s.Assert().NoError(err) - userResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{Body: &shieldv1beta1.UserRequestBody{ + userResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{Body: &frontierv1beta1.UserRequestBody{ Title: "acme 2 member", Email: "acme-member@raystack.org", Name: "acme_2_member", }}) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, createOrgResp.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, userResp.GetUser().GetId()), Relation: schema.MemberRelationName, }}) s.Assert().NoError(err) - orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: createOrgResp.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(2, len(orgUsersResp.GetUsers())) }) s.Run("3. deleting an org should delete all of its internal relations/projects/groups/resources", func() { - createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Title: "org acme 3", Name: "org-acme-3", }, }) s.Assert().NoError(err) - createUserResponse, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{Body: &shieldv1beta1.UserRequestBody{ + createUserResponse, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{Body: &frontierv1beta1.UserRequestBody{ Title: "acme 3 member 1", Email: "acme-member-1@raystack.org", Name: "acme_3_member_1", @@ -157,24 +157,24 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { s.Assert().NoError(err) // attach user to org - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, createOrgResp.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResponse.GetUser().GetId()), Relation: schema.MemberRelationName, }}) s.Assert().NoError(err) - createProjResp, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + createProjResp, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-3-proj-1", OrgId: createOrgResp.GetOrganization().GetId(), }, }) s.Assert().NoError(err) - createResourceResp, err := s.testBench.Client.CreateProjectResource(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectResourceRequest{ + createResourceResp, err := s.testBench.Client.CreateProjectResource(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectResourceRequest{ ProjectId: createProjResp.GetProject().GetId(), - Body: &shieldv1beta1.ResourceRequestBody{ + Body: &frontierv1beta1.ResourceRequestBody{ Name: "res-1", Namespace: computeOrderNamespace, }, @@ -183,38 +183,38 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { s.Assert().NotNil(createResourceResp) // check users - listUsersBeforeDelete, err := s.testBench.Client.ListUsers(ctxOrgAdminAuth, &shieldv1beta1.ListUsersRequest{ + listUsersBeforeDelete, err := s.testBench.Client.ListUsers(ctxOrgAdminAuth, &frontierv1beta1.ListUsersRequest{ OrgId: createOrgResp.Organization.Id, }) s.Assert().NoError(err) s.Assert().Equal(2, len(listUsersBeforeDelete.Users)) // delete org and all its items - _, err = s.testBench.Client.DeleteOrganization(ctxOrgAdminAuth, &shieldv1beta1.DeleteOrganizationRequest{ + _, err = s.testBench.Client.DeleteOrganization(ctxOrgAdminAuth, &frontierv1beta1.DeleteOrganizationRequest{ Id: createOrgResp.Organization.Id, }) s.Assert().NoError(err) // check org - _, err = s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + _, err = s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: createOrgResp.Organization.Id, }) s.Assert().NotNil(err) // check project - _, err = s.testBench.Client.GetProject(ctxOrgAdminAuth, &shieldv1beta1.GetProjectRequest{ + _, err = s.testBench.Client.GetProject(ctxOrgAdminAuth, &frontierv1beta1.GetProjectRequest{ Id: createProjResp.Project.Id, }) s.Assert().NotNil(err) // check resource - _, err = s.testBench.Client.GetProjectResource(ctxOrgAdminAuth, &shieldv1beta1.GetProjectResourceRequest{ + _, err = s.testBench.Client.GetProjectResource(ctxOrgAdminAuth, &frontierv1beta1.GetProjectResourceRequest{ Id: createResourceResp.Resource.Id, }) s.Assert().NotNil(err) // check user relations - listUsersAfterDelete, err := s.testBench.Client.ListUsers(ctxOrgAdminAuth, &shieldv1beta1.ListUsersRequest{ + listUsersAfterDelete, err := s.testBench.Client.ListUsers(ctxOrgAdminAuth, &frontierv1beta1.ListUsersRequest{ OrgId: createOrgResp.Organization.Id, }) s.Assert().NoError(err) @@ -223,21 +223,21 @@ func (s *APIRegressionTestSuite) TestOrganizationAPI() { } func (s *APIRegressionTestSuite) TestProjectAPI() { - var newProject *shieldv1beta1.Project + var newProject *frontierv1beta1.Project ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) // get my org - res, err := s.testBench.Client.ListOrganizations(context.Background(), &shieldv1beta1.ListOrganizationsRequest{}) + res, err := s.testBench.Client.ListOrganizations(context.Background(), &frontierv1beta1.ListOrganizationsRequest{}) s.Require().NoError(err) s.Require().Greater(len(res.GetOrganizations()), 0) myOrg := res.GetOrganizations()[0] s.Run("1. org admin create a new project successfully", func() { - _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project", OrgId: myOrg.GetId(), Metadata: &structpb.Struct{ @@ -251,8 +251,8 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { }) s.Run("2. org admin create a new project with empty name should return invalid argument", func() { - _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "", OrgId: myOrg.GetId(), }, @@ -261,8 +261,8 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { }) s.Run("3. org admin create a new project with wrong org id should return invalid argument", func() { - _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project", OrgId: "not-uuid", }, @@ -271,8 +271,8 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { }) s.Run("4. org admin create a new project with same name and org-id should conflict", func() { - res, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + res, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project-duplicate", OrgId: myOrg.GetId(), }, @@ -281,8 +281,8 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { newProject = res.GetProject() s.Assert().NotNil(newProject) - _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project-duplicate", OrgId: myOrg.GetId(), }, @@ -291,7 +291,7 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { }) s.Run("5. org admin update a new project with empty body should return invalid argument", func() { - _, err := s.testBench.Client.UpdateProject(ctxOrgAdminAuth, &shieldv1beta1.UpdateProjectRequest{ + _, err := s.testBench.Client.UpdateProject(ctxOrgAdminAuth, &frontierv1beta1.UpdateProjectRequest{ Id: newProject.GetId(), Body: nil, }) @@ -299,9 +299,9 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { }) s.Run("6. org admin update a new project with empty project id but correct project name should work", func() { - _, err := s.testBench.Client.UpdateProject(ctxOrgAdminAuth, &shieldv1beta1.UpdateProjectRequest{ + _, err := s.testBench.Client.UpdateProject(ctxOrgAdminAuth, &frontierv1beta1.UpdateProjectRequest{ Id: "", - Body: &shieldv1beta1.ProjectRequestBody{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project", OrgId: myOrg.GetId(), }, @@ -309,89 +309,89 @@ func (s *APIRegressionTestSuite) TestProjectAPI() { s.Assert().NoError(err) }) s.Run("7. list all projects attached/filtered to an org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-project-1", }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-project-1-p1", OrgId: existingOrg.Organization.GetId(), }, }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-project-1-p2", OrgId: existingOrg.Organization.GetId(), }, }) s.Assert().NoError(err) - listResp, err := s.testBench.Client.ListOrganizationProjects(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationProjectsRequest{ + listResp, err := s.testBench.Client.ListOrganizationProjects(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationProjectsRequest{ Id: existingOrg.Organization.GetId(), }) s.Assert().NoError(err) s.Assert().Equal(2, len(listResp.Projects)) }) s.Run("8. list all users who have access to a project", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-project-1", }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-project-2-p1", OrgId: existingOrg.Organization.GetId(), }, }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + _, err = s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-project-2-p2", OrgId: existingOrg.Organization.GetId(), }, }) s.Assert().NoError(err) - listProjUsersResp, err := s.testBench.Client.ListProjectUsers(ctxOrgAdminAuth, &shieldv1beta1.ListProjectUsersRequest{ + listProjUsersResp, err := s.testBench.Client.ListProjectUsers(ctxOrgAdminAuth, &frontierv1beta1.ListProjectUsersRequest{ Id: "org-project-2-p1", }) s.Assert().NoError(err) s.Assert().Equal(1, len(listProjUsersResp.Users)) - listProjCurrentUsersResp, err := s.testBench.Client.GetProjectsByCurrentUser(ctxOrgAdminAuth, &shieldv1beta1.GetProjectsByCurrentUserRequest{}) + listProjCurrentUsersResp, err := s.testBench.Client.GetProjectsByCurrentUser(ctxOrgAdminAuth, &frontierv1beta1.GetProjectsByCurrentUserRequest{}) s.Assert().NoError(err) - s.Assert().True(slices.ContainsFunc[*shieldv1beta1.Project](listProjCurrentUsersResp.GetProjects(), func(p *shieldv1beta1.Project) bool { + s.Assert().True(slices.ContainsFunc[*frontierv1beta1.Project](listProjCurrentUsersResp.GetProjects(), func(p *frontierv1beta1.Project) bool { return p.Name == "org-project-2-p1" })) - s.Assert().True(slices.ContainsFunc[*shieldv1beta1.Project](listProjCurrentUsersResp.GetProjects(), func(p *shieldv1beta1.Project) bool { + s.Assert().True(slices.ContainsFunc[*frontierv1beta1.Project](listProjCurrentUsersResp.GetProjects(), func(p *frontierv1beta1.Project) bool { return p.Name == "org-project-2-p2" })) }) } func (s *APIRegressionTestSuite) TestGroupAPI() { - var newGroup *shieldv1beta1.Group + var newGroup *frontierv1beta1.Group ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) // get my org - res, err := s.testBench.Client.ListOrganizations(context.Background(), &shieldv1beta1.ListOrganizationsRequest{}) + res, err := s.testBench.Client.ListOrganizations(context.Background(), &frontierv1beta1.ListOrganizationsRequest{}) s.Require().NoError(err) s.Require().Greater(len(res.GetOrganizations()), 0) myOrg := res.GetOrganizations()[0] s.Run("1. org admin create a new team with empty auth email should return unauthenticated error", func() { - _, err := s.testBench.Client.CreateGroup(context.Background(), &shieldv1beta1.CreateGroupRequest{ + _, err := s.testBench.Client.CreateGroup(context.Background(), &frontierv1beta1.CreateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "group-basic-1", }, }) @@ -399,9 +399,9 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("2. org admin create a new team with empty name should return invalid argument", func() { - _, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + _, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "", }, }) @@ -409,9 +409,9 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("3. org admin create a new team with wrong org id should return invalid argument", func() { - _, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + _, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: "not-uuid", - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "new-group", }, }) @@ -419,9 +419,9 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("4. org admin create a new team with same name and org-id should conflict", func() { - res, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + res, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "new-group", }, }) @@ -429,9 +429,9 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { newGroup = res.GetGroup() s.Assert().NotNil(newGroup) - _, err = s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + _, err = s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "new-group", }, }) @@ -439,7 +439,7 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("5. group admin update a new team with empty body should return invalid argument", func() { - _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &shieldv1beta1.UpdateGroupRequest{ + _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &frontierv1beta1.UpdateGroupRequest{ Id: newGroup.GetId(), Body: nil, }) @@ -447,18 +447,18 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("6. group admin update a new team with empty group id should return invalid arg", func() { - _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &shieldv1beta1.UpdateGroupRequest{ + _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &frontierv1beta1.UpdateGroupRequest{ Id: "", OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{}, + Body: &frontierv1beta1.GroupRequestBody{}, }) s.Assert().Equal(codes.InvalidArgument, status.Convert(err).Code()) }) s.Run("7. group admin update a new team with just name and org-id should fail", func() { - _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &shieldv1beta1.UpdateGroupRequest{ + _, err := s.testBench.Client.UpdateGroup(ctxOrgAdminAuth, &frontierv1beta1.UpdateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "org1-group1", Metadata: &structpb.Struct{ Fields: map[string]*structpb.Value{ @@ -472,16 +472,16 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { }) s.Run("8. create a group and add new member to it successfully", func() { - createGroupResp, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + createGroupResp, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: myOrg.GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "group-8", }, }) s.Assert().NoError(err) s.Assert().NotNil(createGroupResp.GetGroup()) - listGroupUsers, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + listGroupUsers, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: createGroupResp.GetGroup().GetId(), OrgId: createGroupResp.GetGroup().GetOrgId(), }) @@ -490,15 +490,15 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { s.Assert().Len(listGroupUsers.GetUsers(), 1) // add a user - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Email: "user-for-group@raystack.org", Name: "user-for-group", }, }) s.Assert().NoError(err) s.Assert().NotNil(createUserResp) - addMemberResp, err := s.testBench.Client.AddGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.AddGroupUsersRequest{ + addMemberResp, err := s.testBench.Client.AddGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.AddGroupUsersRequest{ Id: createGroupResp.GetGroup().GetId(), OrgId: createGroupResp.GetGroup().GetOrgId(), UserIds: []string{createUserResp.GetUser().GetId()}, @@ -506,7 +506,7 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { s.Assert().NoError(err) s.Assert().NotNil(addMemberResp) - listGroupUsersAfterUser, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + listGroupUsersAfterUser, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: createGroupResp.GetGroup().GetId(), OrgId: createGroupResp.GetGroup().GetOrgId(), }) @@ -516,15 +516,15 @@ func (s *APIRegressionTestSuite) TestGroupAPI() { } func (s *APIRegressionTestSuite) TestUserAPI() { - var newUser *shieldv1beta1.User + var newUser *frontierv1beta1.User ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) s.Run("1. org admin create a new user with empty auth email should return unauthenticated error", func() { - _, err := s.testBench.Client.CreateUser(context.Background(), &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err := s.testBench.Client.CreateUser(context.Background(), &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "new-user-a@raystack.org", Name: "new_user_123456", @@ -539,8 +539,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { }) s.Run("2. org admin create a new user with unparsable metadata should return invalid argument error", func() { - _, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "new-user-a@raystack.org", Name: "new_user_123456", @@ -555,8 +555,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { }) s.Run("3. org admin create a new user with empty email should return invalid argument error", func() { - _, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "", Name: "new_user_123456", @@ -571,8 +571,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { }) s.Run("4. org admin create a new user with same email should return conflict error", func() { - res, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + res, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "new-user-a@raystack.org", Name: "new-user-123456", @@ -586,8 +586,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().NoError(err) newUser = res.GetUser() - _, err = s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err = s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "new-user-a@raystack.org", Name: "new_user_123456", @@ -603,9 +603,9 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Run("5. org admin update user with conflicted detail should not update the email and return nil error", func() { ExpectedEmail := "new-user-a@raystack.org" - res, err := s.testBench.Client.UpdateUser(ctxOrgAdminAuth, &shieldv1beta1.UpdateUserRequest{ + res, err := s.testBench.Client.UpdateUser(ctxOrgAdminAuth, &frontierv1beta1.UpdateUserRequest{ Id: newUser.GetId(), - Body: &shieldv1beta1.UserRequestBody{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "admin1-group2-org1@raystack.org", Name: "new_user_123456", @@ -625,8 +625,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { })) s.Run("6. update current user with empty email should return invalid argument error", func() { - _, err := s.testBench.Client.UpdateCurrentUser(ctxCurrentUser, &shieldv1beta1.UpdateCurrentUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err := s.testBench.Client.UpdateCurrentUser(ctxCurrentUser, &frontierv1beta1.UpdateCurrentUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "", Name: "new_user_123456", @@ -640,8 +640,8 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(codes.InvalidArgument, status.Convert(err).Code()) }) s.Run("7. update current user with different email in header and body should return invalid argument error", func() { - _, err := s.testBench.Client.UpdateCurrentUser(ctxCurrentUser, &shieldv1beta1.UpdateCurrentUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + _, err := s.testBench.Client.UpdateCurrentUser(ctxCurrentUser, &frontierv1beta1.UpdateCurrentUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user a", Email: "admin1-group1-org1@raystack.org", Name: "new_user_123456", @@ -655,43 +655,43 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(codes.InvalidArgument, status.Convert(err).Code()) }) s.Run("8. deleting a user should detach it from its respective relations", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-1", }) s.Assert().NoError(err) - existingGroups, err := s.testBench.Client.ListOrganizationGroups(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationGroupsRequest{ + existingGroups, err := s.testBench.Client.ListOrganizationGroups(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationGroupsRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) existingGroup := existingGroups.GetGroups()[0] - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user for org 1", Email: "user-1-for-org-1@raystack.org", Name: "user_1_for_org_1_raystack_io", }, }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.OwnerRelationName, }}) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.GroupNamespace, existingGroup.GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.MemberRelationName, }}) s.Assert().NoError(err) - orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) s.Assert().NoError(err) s.Assert().Equal(2, len(orgUsersRespAfterRelation.GetUsers())) - groupUsersResp, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + groupUsersResp, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: existingGroup.Id, }) s.Assert().NoError(err) @@ -704,27 +704,27 @@ func (s *APIRegressionTestSuite) TestUserAPI() { } s.Assert().True(userPartOfGroup) - listUserGroups, err := s.testBench.Client.ListUserGroups(ctxOrgAdminAuth, &shieldv1beta1.ListUserGroupsRequest{ + listUserGroups, err := s.testBench.Client.ListUserGroups(ctxOrgAdminAuth, &frontierv1beta1.ListUserGroupsRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(1, len(listUserGroups.GetGroups())) // delete user - _, err = s.testBench.Client.DeleteUser(ctxOrgAdminAuth, &shieldv1beta1.DeleteUserRequest{ + _, err = s.testBench.Client.DeleteUser(ctxOrgAdminAuth, &frontierv1beta1.DeleteUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) // check its existence - getUserResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &shieldv1beta1.GetUserRequest{ + getUserResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &frontierv1beta1.GetUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NotNil(err) s.Assert().Nil(getUserResp) // check its relations with org - orgUsersRespAfterDeletion, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterDeletion, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -732,7 +732,7 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(1, len(orgUsersRespAfterDeletion.GetUsers())) // check its relations with group - groupUsersRespAfterDeletion, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + groupUsersRespAfterDeletion, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: existingGroup.Id, }) s.Assert().NoError(err) @@ -741,25 +741,25 @@ func (s *APIRegressionTestSuite) TestUserAPI() { } }) s.Run("9. disabling a user should return not found in list/get api", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-user-1", }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user for org 1", Email: "user-2-for-org-1@raystack.org", Name: "user_2_for_org_1_raystack_io", }, }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.OwnerRelationName, }}) s.Assert().NoError(err) - orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -767,20 +767,20 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(2, len(orgUsersRespAfterRelation.GetUsers())) // disable user - _, err = s.testBench.Client.DisableUser(ctxOrgAdminAuth, &shieldv1beta1.DisableUserRequest{ + _, err = s.testBench.Client.DisableUser(ctxOrgAdminAuth, &frontierv1beta1.DisableUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) // check its existence - getUserResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &shieldv1beta1.GetUserRequest{ + getUserResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &frontierv1beta1.GetUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NotNil(err) s.Assert().Nil(getUserResp) // check its relations with org - orgUsersRespAfterDisable, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterDisable, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -788,20 +788,20 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(1, len(orgUsersRespAfterDisable.GetUsers())) // enable user - _, err = s.testBench.Client.EnableUser(ctxOrgAdminAuth, &shieldv1beta1.EnableUserRequest{ + _, err = s.testBench.Client.EnableUser(ctxOrgAdminAuth, &frontierv1beta1.EnableUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) // check its existence - getUserAfterEnableResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &shieldv1beta1.GetUserRequest{ + getUserAfterEnableResp, err := s.testBench.Client.GetUser(ctxOrgAdminAuth, &frontierv1beta1.GetUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(getUserAfterEnableResp) // check its relations with org - orgUsersRespAfterEnable, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterEnable, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -809,12 +809,12 @@ func (s *APIRegressionTestSuite) TestUserAPI() { s.Assert().Equal(2, len(orgUsersRespAfterEnable.GetUsers())) }) s.Run("10. correctly filter users using list api in an org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-user-2", }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user for org 2", Email: "user-1-for-org-2@raystack.org", Name: "user_1_for_org_2_raystack_io", @@ -822,28 +822,28 @@ func (s *APIRegressionTestSuite) TestUserAPI() { }) s.Assert().NoError(err) - listExistingUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &shieldv1beta1.ListUsersRequest{ + listExistingUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &frontierv1beta1.ListUsersRequest{ OrgId: existingOrg.Organization.Id, }) s.Assert().NoError(err) s.Assert().Equal(1, len(listExistingUsers.GetUsers())) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.OwnerRelationName, }}) s.Assert().NoError(err) - listNewUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &shieldv1beta1.ListUsersRequest{ + listNewUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &frontierv1beta1.ListUsersRequest{ OrgId: existingOrg.Organization.Id, }) s.Assert().NoError(err) s.Assert().Equal(2, len(listNewUsers.GetUsers())) }) s.Run("11. correctly filter users using list api with user keyword", func() { - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user", Email: "user-1-random-1@raystack.org", Name: "user_1_random_1_raystack_io", @@ -851,7 +851,7 @@ func (s *APIRegressionTestSuite) TestUserAPI() { }) s.Assert().NoError(err) - listExistingUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &shieldv1beta1.ListUsersRequest{ + listExistingUsers, err := s.testBench.Client.ListUsers(ctxCurrentUser, &frontierv1beta1.ListUsersRequest{ Keyword: createUserResp.User.Email, }) s.Assert().NoError(err) @@ -865,13 +865,13 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { })) s.Run("1. creating a new relation between org and user should attach user to the org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-relation-1", }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user 1", Email: "new-user-for-rel-1@raystack.org", Name: "new_user_for_rel_1_raystack_io", @@ -879,20 +879,20 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { }) s.Assert().NoError(err) - orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(1, len(orgUsersResp.GetUsers())) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: organization.AdminRole, }}) s.Assert().NoError(err) - orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -900,13 +900,13 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { s.Assert().Equal(2, len(orgUsersRespAfterRelation.GetUsers())) }) s.Run("2. creating a relation between org and user with editor role should provide view & edit permission in that org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-relation-2", }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user 2", Email: "new-user-for-rel-2@raystack.org", Name: "new_user_for_rel_2_raystack_io", @@ -914,21 +914,21 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { }) s.Assert().NoError(err) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: organization.AdminRole, }}) s.Assert().NoError(err) - orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: organization.AdminPermission, }) s.Assert().NoError(err) s.Assert().Equal(2, len(orgUsersRespAfterRelation.GetUsers())) - checkViewPermResp, err := s.testBench.Client.CheckResourcePermission(ctxOrgAdminAuth, &shieldv1beta1.CheckResourcePermissionRequest{ + checkViewPermResp, err := s.testBench.Client.CheckResourcePermission(ctxOrgAdminAuth, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: existingOrg.GetOrganization().GetId(), ObjectNamespace: schema.OrganizationNamespace, Permission: schema.GetPermission, @@ -936,7 +936,7 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { s.Assert().NoError(err) s.Assert().Equal(true, checkViewPermResp.Status) - checkEditPermResp, err := s.testBench.Client.CheckResourcePermission(ctxOrgAdminAuth, &shieldv1beta1.CheckResourcePermissionRequest{ + checkEditPermResp, err := s.testBench.Client.CheckResourcePermission(ctxOrgAdminAuth, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: existingOrg.GetOrganization().GetId(), ObjectNamespace: schema.OrganizationNamespace, Permission: schema.UpdatePermission, @@ -945,13 +945,13 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { s.Assert().Equal(true, checkEditPermResp.Status) }) s.Run("3. deleting a relation between user and org should remove user from that org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-relation-3", }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user 3", Email: "new-user-for-rel-3@raystack.org", Name: "new_user_for_rel_3_raystack_io", @@ -959,34 +959,34 @@ func (s *APIRegressionTestSuite) TestRelationAPI() { }) s.Assert().NoError(err) - orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(1, len(orgUsersResp.GetUsers())) - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.OwnerRelationName, }}) s.Assert().NoError(err) - orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelation, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) s.Assert().NoError(err) s.Assert().Equal(2, len(orgUsersRespAfterRelation.GetUsers())) - _, err = s.testBench.Client.DeleteRelation(ctxOrgAdminAuth, &shieldv1beta1.DeleteRelationRequest{ + _, err = s.testBench.Client.DeleteRelation(ctxOrgAdminAuth, &frontierv1beta1.DeleteRelationRequest{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, existingOrg.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.GetUser().GetId()), Relation: schema.OwnerRelationName, }) s.Assert().NoError(err) - orgUsersRespAfterRelationDelete, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersRespAfterRelationDelete, err := s.testBench.Client.ListOrganizationUsers(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationUsersRequest{ Id: existingOrg.GetOrganization().GetId(), PermissionFilter: schema.GetPermission, }) @@ -1002,15 +1002,15 @@ func (s *APIRegressionTestSuite) TestResourceAPI() { })) s.Run("1. creating a resource under a project/org successfully", func() { - createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Title: "org 1", Name: "org-resource-1", }, }) s.Assert().NoError(err) - userResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{Body: &shieldv1beta1.UserRequestBody{ + userResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{Body: &frontierv1beta1.UserRequestBody{ Title: "member 1", Email: "user-org-resource-1@raystack.org", Name: "user_org_resource_1", @@ -1018,24 +1018,24 @@ func (s *APIRegressionTestSuite) TestResourceAPI() { s.Assert().NoError(err) // attach user to org - _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &shieldv1beta1.CreateRelationRequest{Body: &shieldv1beta1.RelationRequestBody{ + _, err = s.testBench.Client.CreateRelation(ctxOrgAdminAuth, &frontierv1beta1.CreateRelationRequest{Body: &frontierv1beta1.RelationRequestBody{ Object: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, createOrgResp.GetOrganization().GetId()), Subject: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, userResp.GetUser().GetId()), Relation: schema.MemberRelationName, }}) s.Assert().NoError(err) - createProjResp, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + createProjResp, err := s.testBench.Client.CreateProject(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "org-1-proj-1", OrgId: createOrgResp.GetOrganization().GetId(), }, }) s.Assert().NoError(err) - createResourceResp, err := s.testBench.Client.CreateProjectResource(ctxOrgAdminAuth, &shieldv1beta1.CreateProjectResourceRequest{ + createResourceResp, err := s.testBench.Client.CreateProjectResource(ctxOrgAdminAuth, &frontierv1beta1.CreateProjectResourceRequest{ ProjectId: createProjResp.GetProject().GetId(), - Body: &shieldv1beta1.ResourceRequestBody{ + Body: &frontierv1beta1.ResourceRequestBody{ Name: "res-1", Namespace: computeOrderNamespace, Principal: userResp.GetUser().GetId(), @@ -1045,7 +1045,7 @@ func (s *APIRegressionTestSuite) TestResourceAPI() { s.Assert().NoError(err) s.Assert().NotNil(createResourceResp) - listResourcesResp, err := s.testBench.Client.ListProjectResources(ctxOrgAdminAuth, &shieldv1beta1.ListProjectResourcesRequest{ + listResourcesResp, err := s.testBench.Client.ListProjectResources(ctxOrgAdminAuth, &frontierv1beta1.ListProjectResourcesRequest{ ProjectId: createProjResp.GetProject().GetId(), }) s.Assert().NoError(err) @@ -1059,20 +1059,20 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { })) s.Run("1. a user should successfully create a new invitation in org and accept it", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-invitation-1", }) s.Assert().NoError(err) - createGroupResp, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &shieldv1beta1.CreateGroupRequest{ + createGroupResp, err := s.testBench.Client.CreateGroup(ctxOrgAdminAuth, &frontierv1beta1.CreateGroupRequest{ OrgId: existingOrg.GetOrganization().GetId(), - Body: &shieldv1beta1.GroupRequestBody{ + Body: &frontierv1beta1.GroupRequestBody{ Name: "new-group", }, }) s.Assert().NoError(err) - createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctxOrgAdminAuth, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user 1", Email: "new-user-for-invite-1@raystack.org", Name: "new_user_for_invite_1_raystack_io", @@ -1080,7 +1080,7 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { }) s.Assert().NoError(err) - createInviteResp, err := s.testBench.Client.CreateOrganizationInvitation(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationInvitationRequest{ + createInviteResp, err := s.testBench.Client.CreateOrganizationInvitation(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationInvitationRequest{ OrgId: existingOrg.GetOrganization().GetId(), UserId: createUserResp.GetUser().GetEmail(), GroupIds: []string{createGroupResp.GetGroup().GetId()}, @@ -1088,7 +1088,7 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { s.Assert().NoError(err) s.Assert().NotNil(createInviteResp) - getInviteResp, err := s.testBench.Client.GetOrganizationInvitation(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationInvitationRequest{ + getInviteResp, err := s.testBench.Client.GetOrganizationInvitation(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationInvitationRequest{ Id: createInviteResp.GetInvitation().GetId(), OrgId: existingOrg.GetOrganization().GetId(), }) @@ -1096,14 +1096,14 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { s.Assert().NotNil(getInviteResp) s.Assert().Equal(createInviteResp.GetInvitation().GetId(), getInviteResp.GetInvitation().GetId()) - listInviteByOrgResp, err := s.testBench.Client.ListOrganizationInvitations(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationInvitationsRequest{ + listInviteByOrgResp, err := s.testBench.Client.ListOrganizationInvitations(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationInvitationsRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(getInviteResp) s.Assert().Equal(createInviteResp.GetInvitation().GetId(), listInviteByOrgResp.GetInvitations()[0].GetId()) - listInviteByUserResp, err := s.testBench.Client.ListOrganizationInvitations(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationInvitationsRequest{ + listInviteByUserResp, err := s.testBench.Client.ListOrganizationInvitations(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationInvitationsRequest{ UserId: createUserResp.GetUser().GetEmail(), }) s.Assert().NoError(err) @@ -1111,12 +1111,12 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { s.Assert().Equal(createInviteResp.GetInvitation().GetId(), listInviteByUserResp.GetInvitations()[0].GetId()) // user should not be part of the org before accept - userOrgsBeforeAcceptResp, err := s.testBench.Client.GetOrganizationsByUser(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationsByUserRequest{ + userOrgsBeforeAcceptResp, err := s.testBench.Client.GetOrganizationsByUser(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationsByUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(0, len(userOrgsBeforeAcceptResp.GetOrganizations())) - listGroupUsersBeforeAccept, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + listGroupUsersBeforeAccept, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: createGroupResp.GetGroup().GetId(), OrgId: createGroupResp.GetGroup().GetOrgId(), }) @@ -1124,26 +1124,26 @@ func (s *APIRegressionTestSuite) TestInvitationAPI() { s.Assert().Len(listGroupUsersBeforeAccept.GetUsers(), 1) // accept invite should add user to org and delete it - _, err = s.testBench.Client.AcceptOrganizationInvitation(ctxOrgAdminAuth, &shieldv1beta1.AcceptOrganizationInvitationRequest{ + _, err = s.testBench.Client.AcceptOrganizationInvitation(ctxOrgAdminAuth, &frontierv1beta1.AcceptOrganizationInvitationRequest{ Id: createInviteResp.GetInvitation().GetId(), }) s.Assert().NoError(err) - _, err = s.testBench.Client.GetOrganizationInvitation(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationInvitationRequest{ + _, err = s.testBench.Client.GetOrganizationInvitation(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationInvitationRequest{ Id: createInviteResp.GetInvitation().GetId(), OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().Error(err) // user should be part of the org - userOrgsAfterAcceptResp, err := s.testBench.Client.GetOrganizationsByUser(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationsByUserRequest{ + userOrgsAfterAcceptResp, err := s.testBench.Client.GetOrganizationsByUser(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationsByUserRequest{ Id: createUserResp.GetUser().GetId(), }) s.Assert().NoError(err) s.Assert().Equal(1, len(userOrgsAfterAcceptResp.GetOrganizations())) // should be part of group - listGroupUsersAfterAccept, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &shieldv1beta1.ListGroupUsersRequest{ + listGroupUsersAfterAccept, err := s.testBench.Client.ListGroupUsers(ctxOrgAdminAuth, &frontierv1beta1.ListGroupUsersRequest{ Id: createGroupResp.GetGroup().GetId(), OrgId: createGroupResp.GetGroup().GetOrgId(), }) @@ -1157,15 +1157,15 @@ func (s *APIRegressionTestSuite) TestOrganizationAuditLogsAPI() { testbench.IdentityHeader: testbench.OrgAdminEmail, })) - dummyAuditLogs := []*shieldv1beta1.AuditLog{ + dummyAuditLogs := []*frontierv1beta1.AuditLog{ { - Source: "shield", + Source: "frontier", Action: "user.login", - Actor: &shieldv1beta1.AuditLogActor{ + Actor: &frontierv1beta1.AuditLogActor{ Type: schema.UserPrincipal, Name: "john", }, - Target: &shieldv1beta1.AuditLogTarget{ + Target: &frontierv1beta1.AuditLogTarget{ Name: "org-1", Type: schema.OrganizationNamespace, }, @@ -1174,25 +1174,25 @@ func (s *APIRegressionTestSuite) TestOrganizationAuditLogsAPI() { }, }, { - Source: "shield", + Source: "frontier", Action: "user.logout", - Actor: &shieldv1beta1.AuditLogActor{ + Actor: &frontierv1beta1.AuditLogActor{ Type: schema.UserPrincipal, Name: "john", }, - Target: &shieldv1beta1.AuditLogTarget{ + Target: &frontierv1beta1.AuditLogTarget{ Name: "org-1", Type: schema.OrganizationNamespace, }, }, } s.Run("1. create a new log successfully under an org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-auditlogs-1", }) s.Assert().NoError(err) - createLogResp, err := s.testBench.Client.CreateOrganizationAuditLogs(ctxOrgAdminAuth, &shieldv1beta1.CreateOrganizationAuditLogsRequest{ + createLogResp, err := s.testBench.Client.CreateOrganizationAuditLogs(ctxOrgAdminAuth, &frontierv1beta1.CreateOrganizationAuditLogsRequest{ OrgId: existingOrg.GetOrganization().GetId(), Logs: dummyAuditLogs, }) @@ -1200,19 +1200,19 @@ func (s *APIRegressionTestSuite) TestOrganizationAuditLogsAPI() { s.Assert().NotNil(createLogResp) }) s.Run("2. list logs successfully under an org", func() { - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-auditlogs-1", }) s.Assert().NoError(err) - listLogResp, err := s.testBench.Client.ListOrganizationAuditLogs(ctxOrgAdminAuth, &shieldv1beta1.ListOrganizationAuditLogsRequest{ + listLogResp, err := s.testBench.Client.ListOrganizationAuditLogs(ctxOrgAdminAuth, &frontierv1beta1.ListOrganizationAuditLogsRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(listLogResp) unMatchedLogs := 2 for _, log := range listLogResp.GetLogs() { - if slices.ContainsFunc[*shieldv1beta1.AuditLog](dummyAuditLogs, func(l *shieldv1beta1.AuditLog) bool { + if slices.ContainsFunc[*frontierv1beta1.AuditLog](dummyAuditLogs, func(l *frontierv1beta1.AuditLog) bool { return l.Action == log.Action && l.Source == log.Source }) { unMatchedLogs-- diff --git a/test/e2e/regression/authentication_test.go b/test/e2e/regression/authentication_test.go index 81870cfa2..7d1171ac8 100644 --- a/test/e2e/regression/authentication_test.go +++ b/test/e2e/regression/authentication_test.go @@ -12,12 +12,12 @@ import ( "github.com/golang/protobuf/jsonpb" "github.com/oauth2-proxy/mockoidc" - "github.com/raystack/shield/config" - "github.com/raystack/shield/core/authenticate" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/pkg/server" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/core/authenticate" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/pkg/server" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -48,7 +48,7 @@ func (s *AuthenticationRegressionTestSuite) SetupSuite() { // mock callback host - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", }, @@ -68,7 +68,7 @@ func (s *AuthenticationRegressionTestSuite) SetupSuite() { }, Token: authenticate.TokenConfig{ RSAPath: "testdata/jwks.json", - Issuer: "shield", + Issuer: "frontier", }, OIDCConfig: map[string]authenticate.OIDCConfig{ "mock": { @@ -96,13 +96,13 @@ func (s *AuthenticationRegressionTestSuite) TearDownSuite() { func (s *AuthenticationRegressionTestSuite) TestUserSession() { ctx := context.Background() s.Run("1. return authenticate strategies of oidc", func() { - authStrategyResp, err := s.testBench.Client.ListAuthStrategies(ctx, &shieldv1beta1.ListAuthStrategiesRequest{}) + authStrategyResp, err := s.testBench.Client.ListAuthStrategies(ctx, &frontierv1beta1.ListAuthStrategiesRequest{}) s.Assert().NoError(err) s.Assert().Equal("mock", authStrategyResp.GetStrategies()[0].GetName()) }) s.Run("2. authenticate a user successfully using oidc and create a session via cookies", func() { // start registration flow - authResp, err := s.testBench.Client.Authenticate(ctx, &shieldv1beta1.AuthenticateRequest{ + authResp, err := s.testBench.Client.Authenticate(ctx, &frontierv1beta1.AuthenticateRequest{ StrategyName: "mock", Redirect: false, ReturnTo: "", @@ -143,7 +143,7 @@ func (s *AuthenticationRegressionTestSuite) TestUserSession() { s.Assert().NoError(err) s.Assert().Equal(http.StatusOK, endpointRes.StatusCode) - // callback to shield and get valid cookies + // callback to frontier and get valid cookies authCallbackFinalResp, err := http.Get(fmt.Sprintf("http://localhost:%d/v1beta1/auth/callback?code=%s&state=%s", s.apiPort, mockAuth0Code, parsedEndpoint.Query().Get("state"))) s.Assert().NoError(err) @@ -158,7 +158,7 @@ func (s *AuthenticationRegressionTestSuite) TestUserSession() { s.Assert().NoError(err) s.Assert().Equal(http.StatusOK, userResp.StatusCode) - user := &shieldv1beta1.GetCurrentUserResponse{} + user := &frontierv1beta1.GetCurrentUserResponse{} s.Assert().NoError(jsonpb.Unmarshal(userResp.Body, user)) s.Assert().Equal(mockoidc.DefaultUser().Email, user.GetUser().Email) }) diff --git a/test/e2e/regression/onboarding_test.go b/test/e2e/regression/onboarding_test.go index e4988971e..169a5dd60 100644 --- a/test/e2e/regression/onboarding_test.go +++ b/test/e2e/regression/onboarding_test.go @@ -6,14 +6,14 @@ import ( "path" "testing" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" - "github.com/raystack/shield/internal/bootstrap/schema" + "github.com/raystack/frontier/internal/bootstrap/schema" - "github.com/raystack/shield/config" - "github.com/raystack/shield/pkg/logger" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/pkg/logger" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" "google.golang.org/grpc/metadata" "google.golang.org/protobuf/types/known/structpb" @@ -34,7 +34,7 @@ func (s *OnboardingRegressionTestSuite) SetupSuite() { grpcPort, err := testbench.GetFreePort() s.Require().NoError(err) - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", }, @@ -80,8 +80,8 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { var roleToLookFor = "app_project_owner" var roleID = "" s.Run("1. a user should successfully create a new org and become its admin", func() { - createOrgResp, err := s.testBench.Client.CreateOrganization(ctx, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctx, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Title: "org acme 1", Name: "org-acme-1", Metadata: &structpb.Struct{ @@ -94,7 +94,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().NoError(err) orgID = createOrgResp.Organization.Id - orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctx, &shieldv1beta1.ListOrganizationUsersRequest{ + orgUsersResp, err := s.testBench.Client.ListOrganizationUsers(ctx, &frontierv1beta1.ListOrganizationUsersRequest{ Id: orgID, }) s.Assert().NoError(err) @@ -103,8 +103,8 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { adminID = orgUsersResp.Users[0].Id }) s.Run("2. org admin should be able to create a new project", func() { - projResponse, err := s.testBench.Client.CreateProject(ctx, &shieldv1beta1.CreateProjectRequest{ - Body: &shieldv1beta1.ProjectRequestBody{ + projResponse, err := s.testBench.Client.CreateProject(ctx, &frontierv1beta1.CreateProjectRequest{ + Body: &frontierv1beta1.ProjectRequestBody{ Name: "new-project", OrgId: orgID, Metadata: &structpb.Struct{ @@ -118,9 +118,9 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { projectID = projResponse.Project.Id }) s.Run("3. org admin should be able to create a new resource inside project", func() { - createResourceResp, err := s.testBench.Client.CreateProjectResource(ctx, &shieldv1beta1.CreateProjectResourceRequest{ + createResourceResp, err := s.testBench.Client.CreateProjectResource(ctx, &frontierv1beta1.CreateProjectResourceRequest{ ProjectId: projectID, - Body: &shieldv1beta1.ResourceRequestBody{ + Body: &frontierv1beta1.ResourceRequestBody{ Name: "res-1", Namespace: computeOrderNamespace, Principal: adminID, @@ -131,7 +131,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { resourceID = createResourceResp.Resource.Id }) s.Run("4. org admin should have access to the resource created", func() { - createResourceResp, err := s.testBench.Client.CheckResourcePermission(ctx, &shieldv1beta1.CheckResourcePermissionRequest{ + createResourceResp, err := s.testBench.Client.CheckResourcePermission(ctx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: resourceID, ObjectNamespace: computeOrderNamespace, Permission: schema.UpdatePermission, @@ -141,7 +141,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().True(createResourceResp.Status) }) s.Run("5. list all predefined roles/permissions successfully", func() { - listRolesResp, err := s.testBench.Client.ListRoles(ctx, &shieldv1beta1.ListRolesRequest{}) + listRolesResp, err := s.testBench.Client.ListRoles(ctx, &frontierv1beta1.ListRolesRequest{}) s.Assert().NoError(err) s.Assert().NotNil(listRolesResp) s.Assert().Len(listRolesResp.GetRoles(), 10) @@ -151,24 +151,24 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { } } - listPermissionsResp, err := s.testBench.Client.ListPermissions(ctx, &shieldv1beta1.ListPermissionsRequest{}) + listPermissionsResp, err := s.testBench.Client.ListPermissions(ctx, &frontierv1beta1.ListPermissionsRequest{}) s.Assert().NoError(err) s.Assert().NotNil(listPermissionsResp) s.Assert().Len(listPermissionsResp.GetPermissions(), 28) }) s.Run("6. creating role with bad body should fail", func() { - _, err := s.testBench.Client.CreateOrganizationRole(ctx, &shieldv1beta1.CreateOrganizationRoleRequest{ + _, err := s.testBench.Client.CreateOrganizationRole(ctx, &frontierv1beta1.CreateOrganizationRoleRequest{ OrgId: orgID, - Body: &shieldv1beta1.RoleRequestBody{ + Body: &frontierv1beta1.RoleRequestBody{ Name: "should-fail-without-permission", Permissions: nil, }, }) s.Assert().Error(err) - _, err = s.testBench.Client.CreateOrganizationRole(ctx, &shieldv1beta1.CreateOrganizationRoleRequest{ + _, err = s.testBench.Client.CreateOrganizationRole(ctx, &frontierv1beta1.CreateOrganizationRoleRequest{ OrgId: orgID, - Body: &shieldv1beta1.RoleRequestBody{ + Body: &frontierv1beta1.RoleRequestBody{ Name: "should-fail", Permissions: []string{"unknown-permission"}, }, @@ -176,9 +176,9 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().Error(err) }) s.Run("7. list all custom roles successfully", func() { - createRoleResp, err := s.testBench.Client.CreateOrganizationRole(ctx, &shieldv1beta1.CreateOrganizationRoleRequest{ + createRoleResp, err := s.testBench.Client.CreateOrganizationRole(ctx, &frontierv1beta1.CreateOrganizationRoleRequest{ OrgId: orgID, - Body: &shieldv1beta1.RoleRequestBody{ + Body: &frontierv1beta1.RoleRequestBody{ Name: "something_owner", Permissions: []string{"app_organization_get"}, }, @@ -186,7 +186,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().NoError(err) s.Assert().NotNil(createRoleResp) - listRolesResp, err := s.testBench.Client.ListOrganizationRoles(ctx, &shieldv1beta1.ListOrganizationRolesRequest{ + listRolesResp, err := s.testBench.Client.ListOrganizationRoles(ctx, &frontierv1beta1.ListOrganizationRolesRequest{ OrgId: orgID, }) s.Assert().NoError(err) @@ -194,8 +194,8 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().Len(listRolesResp.GetRoles(), 1) }) s.Run("8. create a new user and create a policy to make it a project manager", func() { - createUserResp, err := s.testBench.Client.CreateUser(ctx, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctx, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user for org 1", Email: "user-1-for-org-1@raystack.org", Name: "user_1_for_org_1_raystack_io", @@ -207,14 +207,14 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { newUserEmail = createUserResp.User.Email // make user member of the org - _, err = s.testBench.Client.AddOrganizationUsers(ctx, &shieldv1beta1.AddOrganizationUsersRequest{ + _, err = s.testBench.Client.AddOrganizationUsers(ctx, &frontierv1beta1.AddOrganizationUsersRequest{ Id: orgID, UserIds: []string{newUserID}, }) s.Assert().NoError(err) // assign new user as project admin - createPolicyResp, err := s.testBench.Client.CreatePolicy(ctx, &shieldv1beta1.CreatePolicyRequest{Body: &shieldv1beta1.PolicyRequestBody{ + createPolicyResp, err := s.testBench.Client.CreatePolicy(ctx, &frontierv1beta1.CreatePolicyRequest{Body: &frontierv1beta1.PolicyRequestBody{ RoleId: roleID, Resource: schema.JoinNamespaceAndResourceID(schema.ProjectNamespace, projectID), Principal: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, newUserID), @@ -227,7 +227,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { testbench.IdentityHeader: newUserEmail, })) - checkUpdateProjectResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &shieldv1beta1.CheckResourcePermissionRequest{ + checkUpdateProjectResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: projectID, ObjectNamespace: schema.ProjectNamespace, Permission: schema.UpdatePermission, @@ -237,7 +237,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().True(checkUpdateProjectResp.Status) // resources under the project - checkUpdateResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &shieldv1beta1.CheckResourcePermissionRequest{ + checkUpdateResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: resourceID, ObjectNamespace: computeOrderNamespace, Permission: schema.UpdatePermission, @@ -250,7 +250,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { userCtx := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: newUserEmail, })) - checkUpdateOrgResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &shieldv1beta1.CheckResourcePermissionRequest{ + checkUpdateOrgResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: orgID, ObjectNamespace: schema.OrganizationNamespace, Permission: schema.UpdatePermission, @@ -260,8 +260,8 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().False(checkUpdateOrgResp.Status) }) s.Run("11. a role assigned at org level for a resource should have access across projects", func() { - createUserResp, err := s.testBench.Client.CreateUser(ctx, &shieldv1beta1.CreateUserRequest{ - Body: &shieldv1beta1.UserRequestBody{ + createUserResp, err := s.testBench.Client.CreateUser(ctx, &frontierv1beta1.CreateUserRequest{ + Body: &frontierv1beta1.UserRequestBody{ Title: "new user for org 1", Email: "user-2-for-org-1@raystack.org", Name: "user_2_for_org_1_raystack_io", @@ -271,14 +271,14 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().NotNil(createUserResp) // make user member of the org - _, err = s.testBench.Client.AddOrganizationUsers(ctx, &shieldv1beta1.AddOrganizationUsersRequest{ + _, err = s.testBench.Client.AddOrganizationUsers(ctx, &frontierv1beta1.AddOrganizationUsersRequest{ Id: orgID, UserIds: []string{createUserResp.User.Id}, }) s.Assert().NoError(err) resourceViewerRole := "" - listRolesResp, err := s.testBench.Client.ListRoles(ctx, &shieldv1beta1.ListRolesRequest{}) + listRolesResp, err := s.testBench.Client.ListRoles(ctx, &frontierv1beta1.ListRolesRequest{}) s.Assert().NoError(err) s.Assert().NotNil(listRolesResp) for _, r := range listRolesResp.GetRoles() { @@ -288,7 +288,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { } // assign new user resource role across org - createPolicyResp, err := s.testBench.Client.CreatePolicy(ctx, &shieldv1beta1.CreatePolicyRequest{Body: &shieldv1beta1.PolicyRequestBody{ + createPolicyResp, err := s.testBench.Client.CreatePolicy(ctx, &frontierv1beta1.CreatePolicyRequest{Body: &frontierv1beta1.PolicyRequestBody{ RoleId: resourceViewerRole, Resource: schema.JoinNamespaceAndResourceID(schema.OrganizationNamespace, orgID), Principal: schema.JoinNamespaceAndResourceID(schema.UserPrincipal, createUserResp.User.Id), @@ -301,7 +301,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { testbench.IdentityHeader: createUserResp.User.Email, })) - checkGetResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &shieldv1beta1.CheckResourcePermissionRequest{ + checkGetResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: resourceID, ObjectNamespace: computeOrderNamespace, Permission: schema.GetPermission, @@ -310,7 +310,7 @@ func (s *OnboardingRegressionTestSuite) TestOnboardOrganizationWithUser() { s.Assert().NotNil(checkGetResourceResp) s.Assert().True(checkGetResourceResp.Status) - checkUpdateResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &shieldv1beta1.CheckResourcePermissionRequest{ + checkUpdateResourceResp, err := s.testBench.Client.CheckResourcePermission(userCtx, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: resourceID, ObjectNamespace: computeOrderNamespace, Permission: schema.UpdatePermission, diff --git a/test/e2e/regression/passthrough_header_test.go b/test/e2e/regression/passthrough_header_test.go index f549589b5..6d355ff34 100644 --- a/test/e2e/regression/passthrough_header_test.go +++ b/test/e2e/regression/passthrough_header_test.go @@ -8,14 +8,14 @@ import ( "path" "testing" - "github.com/raystack/shield/core/authenticate" - "github.com/raystack/shield/pkg/server" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + "github.com/raystack/frontier/core/authenticate" + "github.com/raystack/frontier/pkg/server" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "google.golang.org/grpc/metadata" - "github.com/raystack/shield/config" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -36,7 +36,7 @@ func (s *PassthroughEmailRegressionTestSuite) SetupSuite() { s.Require().NoError(err) s.apiPort = apiPort - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", }, @@ -56,7 +56,7 @@ func (s *PassthroughEmailRegressionTestSuite) SetupSuite() { }, Token: authenticate.TokenConfig{ RSAPath: "testdata/jwks.json", - Issuer: "shield", + Issuer: "frontier", }, }, }, @@ -77,11 +77,11 @@ func (s *PassthroughEmailRegressionTestSuite) TestWithoutHeader() { })) s.Run("1. passing no context header should fail", func() { ctx := context.Background() - _, err := s.testBench.Client.GetCurrentUser(ctx, &shieldv1beta1.GetCurrentUserRequest{}) + _, err := s.testBench.Client.GetCurrentUser(ctx, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().Error(err) }) s.Run("2. passing context with header should fail if not configured", func() { - _, err := s.testBench.Client.GetCurrentUser(ctxOrgAdminAuth, &shieldv1beta1.GetCurrentUserRequest{}) + _, err := s.testBench.Client.GetCurrentUser(ctxOrgAdminAuth, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().Error(err) }) s.Run("3. passing context with header should fail if not configured", func() { diff --git a/test/e2e/regression/service_registration_test.go b/test/e2e/regression/service_registration_test.go index 58af6af2f..f6f87e159 100644 --- a/test/e2e/regression/service_registration_test.go +++ b/test/e2e/regression/service_registration_test.go @@ -6,15 +6,15 @@ import ( "path" "testing" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "google.golang.org/grpc/metadata" "google.golang.org/protobuf/types/known/structpb" - "github.com/raystack/shield/config" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -33,7 +33,7 @@ func (s *ServiceRegistrationRegressionTestSuite) SetupSuite() { grpcPort, err := testbench.GetFreePort() s.Require().NoError(err) - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", }, @@ -71,8 +71,8 @@ func (s *ServiceRegistrationRegressionTestSuite) TestServiceRegistration() { })) s.Run("1. register a new service with custom permissions", func() { - createPermResp, err := s.testBench.AdminClient.CreatePermission(ctx, &shieldv1beta1.CreatePermissionRequest{ - Bodies: []*shieldv1beta1.PermissionRequestBody{ + createPermResp, err := s.testBench.AdminClient.CreatePermission(ctx, &frontierv1beta1.CreatePermissionRequest{ + Bodies: []*frontierv1beta1.PermissionRequestBody{ { Name: "get", Namespace: "database/instance", @@ -97,7 +97,7 @@ func (s *ServiceRegistrationRegressionTestSuite) TestServiceRegistration() { s.Assert().NoError(err) s.Assert().Equal(3, len(createPermResp.GetPermissions())) - listPermResp, err := s.testBench.Client.ListPermissions(ctx, &shieldv1beta1.ListPermissionsRequest{}) + listPermResp, err := s.testBench.Client.ListPermissions(ctx, &frontierv1beta1.ListPermissionsRequest{}) s.Assert().NoError(err) s.Assert().NotNil(listPermResp.GetPermissions()) // check if list contains newly created permissions @@ -108,8 +108,8 @@ func (s *ServiceRegistrationRegressionTestSuite) TestServiceRegistration() { s.Assert().GreaterOrEqual(len(listPermResp.GetPermissions()), len(createPermResp.GetPermissions())) }) s.Run("2. registering a new service should not remove existing permissions", func() { - createPermResp, err := s.testBench.AdminClient.CreatePermission(ctx, &shieldv1beta1.CreatePermissionRequest{ - Bodies: []*shieldv1beta1.PermissionRequestBody{ + createPermResp, err := s.testBench.AdminClient.CreatePermission(ctx, &frontierv1beta1.CreatePermissionRequest{ + Bodies: []*frontierv1beta1.PermissionRequestBody{ { Name: "update", Namespace: "database/alert", @@ -129,7 +129,7 @@ func (s *ServiceRegistrationRegressionTestSuite) TestServiceRegistration() { s.Assert().NoError(err) s.Assert().Equal(2, len(createPermResp.GetPermissions())) - listPermResp, err := s.testBench.Client.ListPermissions(ctx, &shieldv1beta1.ListPermissionsRequest{}) + listPermResp, err := s.testBench.Client.ListPermissions(ctx, &frontierv1beta1.ListPermissionsRequest{}) s.Assert().NoError(err) s.Assert().NotNil(listPermResp.GetPermissions()) // check if list contains newly created permissions diff --git a/test/e2e/regression/serviceusers_test.go b/test/e2e/regression/serviceusers_test.go index da1fe995a..e8894660c 100644 --- a/test/e2e/regression/serviceusers_test.go +++ b/test/e2e/regression/serviceusers_test.go @@ -11,18 +11,18 @@ import ( "time" "github.com/lestrrat-go/jwx/v2/jwk" - "github.com/raystack/shield/internal/bootstrap/schema" - "github.com/raystack/shield/pkg/server/consts" - "github.com/raystack/shield/pkg/utils" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + "github.com/raystack/frontier/internal/bootstrap/schema" + "github.com/raystack/frontier/pkg/server/consts" + "github.com/raystack/frontier/pkg/utils" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "google.golang.org/grpc/metadata" - "github.com/raystack/shield/core/authenticate" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/core/authenticate" + "github.com/raystack/frontier/pkg/server" - "github.com/raystack/shield/config" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -43,7 +43,7 @@ func (s *ServiceUsersRegressionTestSuite) SetupSuite() { s.Require().NoError(err) s.apiPort = apiPort - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "error", }, @@ -64,7 +64,7 @@ func (s *ServiceUsersRegressionTestSuite) SetupSuite() { }, Token: authenticate.TokenConfig{ RSAPath: "testdata/jwks.json", - Issuer: "shield", + Issuer: "frontier", }, }, }, @@ -101,24 +101,24 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { HMACSHA256(password) */ sampleHMACJwt := "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.kXSdJhhUKTJemgs8O0rfIJmUaxoSIDdClL_OPmaC7Eo" - var svUserKey *shieldv1beta1.KeyCredential + var svUserKey *frontierv1beta1.KeyCredential var svKeyToken []byte s.Run("1. create a service user in an org and generate a key", func() { ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-sv-user-1", }) s.Assert().NoError(err) - createServiceUserResp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserRequest{ + createServiceUserResp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(createServiceUserResp) - createServiceUserKeyResp, err := s.testBench.Client.CreateServiceUserKey(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserKeyRequest{ + createServiceUserKeyResp, err := s.testBench.Client.CreateServiceUserKey(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserKeyRequest{ Id: createServiceUserResp.GetServiceuser().GetId(), }) s.Assert().NoError(err) @@ -141,7 +141,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { "Authorization": "Bearer " + string(svKeyToken), })) - getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &shieldv1beta1.GetCurrentUserRequest{}) + getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().NoError(err) s.Assert().NotNil(getCurrentUserResp) s.Assert().Equal(svUserKey.GetPrincipalId(), getCurrentUserResp.GetServiceuser().GetId()) @@ -151,7 +151,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { consts.UserTokenRequestKey: string(svKeyToken), })) - getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &shieldv1beta1.GetCurrentUserRequest{}) + getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().NoError(err) s.Assert().NotNil(getCurrentUserResp) s.Assert().Equal(svUserKey.GetPrincipalId(), getCurrentUserResp.GetServiceuser().GetId()) @@ -160,7 +160,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { ctx := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ consts.UserTokenRequestKey: sampleHMACJwt, })) - _, err := s.testBench.Client.GetCurrentUser(ctx, &shieldv1beta1.GetCurrentUserRequest{}) + _, err := s.testBench.Client.GetCurrentUser(ctx, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().Error(err) }) s.Run("5. fetch current profile and pass additional headers via rest", func() { @@ -174,8 +174,8 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { s.Assert().NotNil(currentUserResp.Body) }) s.Run("6. service user should be able to create an organization with full permission", func() { - _, err := s.testBench.Client.CreateOrganization(context.Background(), &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + _, err := s.testBench.Client.CreateOrganization(context.Background(), &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Name: "org-su-test-1", }, }) @@ -184,15 +184,15 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { ctxWithKey := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ "Authorization": "Bearer " + string(svKeyToken), })) - createOrgResp, err := s.testBench.Client.CreateOrganization(ctxWithKey, &shieldv1beta1.CreateOrganizationRequest{ - Body: &shieldv1beta1.OrganizationRequestBody{ + createOrgResp, err := s.testBench.Client.CreateOrganization(ctxWithKey, &frontierv1beta1.CreateOrganizationRequest{ + Body: &frontierv1beta1.OrganizationRequestBody{ Name: "org-su-test-1", }, }) s.Assert().NoError(err) s.Assert().NotNil(createOrgResp) - checkPermResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &shieldv1beta1.CheckResourcePermissionRequest{ + checkPermResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: createOrgResp.Organization.Id, ObjectNamespace: "organization", Permission: schema.UpdatePermission, @@ -204,13 +204,13 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { ctxWithKey := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ "Authorization": "Bearer " + string(svKeyToken), })) - existingOrg, err := s.testBench.Client.GetOrganization(ctxWithKey, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxWithKey, &frontierv1beta1.GetOrganizationRequest{ Id: "org-sv-user-1", }) s.Assert().NoError(err) // by default it should not have any permission - checkPermResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &shieldv1beta1.CheckResourcePermissionRequest{ + checkPermResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &frontierv1beta1.CheckResourcePermissionRequest{ Resource: schema.JoinNamespaceAndResourceID("organization", existingOrg.Organization.Id), Permission: schema.UpdatePermission, }) @@ -218,8 +218,8 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { s.Assert().False(checkPermResp.Status) // assign role - _, err = s.testBench.Client.CreatePolicy(ctxWithKey, &shieldv1beta1.CreatePolicyRequest{ - Body: &shieldv1beta1.PolicyRequestBody{ + _, err = s.testBench.Client.CreatePolicy(ctxWithKey, &frontierv1beta1.CreatePolicyRequest{ + Body: &frontierv1beta1.PolicyRequestBody{ RoleId: "app_organization_manager", Resource: schema.JoinNamespaceAndResourceID("organization", existingOrg.Organization.Id), Principal: schema.JoinNamespaceAndResourceID(schema.ServiceUserPrincipal, svUserKey.GetPrincipalId()), @@ -227,7 +227,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { }) s.Assert().NoError(err) - checkPermAfterResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &shieldv1beta1.CheckResourcePermissionRequest{ + checkPermAfterResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey, &frontierv1beta1.CheckResourcePermissionRequest{ ObjectId: existingOrg.Organization.Id, ObjectNamespace: "organization", Permission: schema.UpdatePermission, @@ -239,18 +239,18 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-sv-user-1", }) s.Assert().NoError(err) // create another service user - createServiceUser2Resp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserRequest{ + createServiceUser2Resp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(createServiceUser2Resp) - createServiceUser2KeyResp, err := s.testBench.Client.CreateServiceUserKey(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserKeyRequest{ + createServiceUser2KeyResp, err := s.testBench.Client.CreateServiceUserKey(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserKeyRequest{ Id: createServiceUser2Resp.GetServiceuser().GetId(), }) s.Assert().NoError(err) @@ -271,7 +271,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { })) // by default it should not have any permission - checkPermAfterResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey2, &shieldv1beta1.CheckResourcePermissionRequest{ + checkPermAfterResp, err := s.testBench.Client.CheckResourcePermission(ctxWithKey2, &frontierv1beta1.CheckResourcePermissionRequest{ Resource: schema.JoinNamespaceAndResourceID(schema.ServiceUserPrincipal, svUserKey.GetPrincipalId()), Permission: schema.ManagePermission, }) @@ -281,24 +281,24 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithKey() { } func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithSecret() { - var svUserSecret *shieldv1beta1.SecretCredential + var svUserSecret *frontierv1beta1.SecretCredential var svKeySecret string s.Run("1. create a service user in an org and generate a secret", func() { ctxOrgAdminAuth := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) - existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &shieldv1beta1.GetOrganizationRequest{ + existingOrg, err := s.testBench.Client.GetOrganization(ctxOrgAdminAuth, &frontierv1beta1.GetOrganizationRequest{ Id: "org-sv-user-1", }) s.Assert().NoError(err) - createServiceUserResp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserRequest{ + createServiceUserResp, err := s.testBench.Client.CreateServiceUser(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserRequest{ OrgId: existingOrg.GetOrganization().GetId(), }) s.Assert().NoError(err) s.Assert().NotNil(createServiceUserResp) - createServiceUserSecretResp, err := s.testBench.Client.CreateServiceUserSecret(ctxOrgAdminAuth, &shieldv1beta1.CreateServiceUserSecretRequest{ + createServiceUserSecretResp, err := s.testBench.Client.CreateServiceUserSecret(ctxOrgAdminAuth, &frontierv1beta1.CreateServiceUserSecretRequest{ Id: createServiceUserResp.GetServiceuser().GetId(), }) s.Assert().NoError(err) @@ -313,7 +313,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithSecret() { "Authorization": "Basic " + svKeySecret, })) - getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &shieldv1beta1.GetCurrentUserRequest{}) + getCurrentUserResp, err := s.testBench.Client.GetCurrentUser(ctxWithKey, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().NoError(err) s.Assert().NotNil(getCurrentUserResp) }) @@ -321,7 +321,7 @@ func (s *ServiceUsersRegressionTestSuite) TestServiceUserWithSecret() { ctx := metadata.NewOutgoingContext(context.Background(), metadata.New(map[string]string{ "Authorization": "Basic randomsecret", })) - _, err := s.testBench.Client.GetCurrentUser(ctx, &shieldv1beta1.GetCurrentUserRequest{}) + _, err := s.testBench.Client.GetCurrentUser(ctx, &frontierv1beta1.GetCurrentUserRequest{}) s.Assert().Error(err) }) } diff --git a/test/e2e/smoke/ping_test.go b/test/e2e/smoke/ping_test.go index a472e013a..ac25b92f3 100644 --- a/test/e2e/smoke/ping_test.go +++ b/test/e2e/smoke/ping_test.go @@ -8,12 +8,12 @@ import ( "path" "testing" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" - "github.com/raystack/shield/config" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -43,7 +43,7 @@ func (s *PingSmokeTestSuite) SetupSuite() { s.Assert().NoError(err) s.proxyPort = proxyPort - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "fatal", }, @@ -85,7 +85,7 @@ func (s *PingSmokeTestSuite) TearDownSuite() { } func (s *PingSmokeTestSuite) TestPing() { - s.Run("should be able to ping shield", func() { + s.Run("should be able to ping frontier", func() { url := fmt.Sprintf("http://localhost:%d/ping", s.apiPort) req, err := http.NewRequest(http.MethodGet, url, nil) s.Require().NoError(err) diff --git a/test/e2e/smoke/proxy_test.go b/test/e2e/smoke/proxy_test.go index 720d7ca26..a317f3040 100644 --- a/test/e2e/smoke/proxy_test.go +++ b/test/e2e/smoke/proxy_test.go @@ -15,21 +15,21 @@ import ( "google.golang.org/grpc/metadata" - "github.com/raystack/shield/pkg/server" + "github.com/raystack/frontier/pkg/server" "github.com/google/uuid" "github.com/ory/dockertest/v3" "github.com/ory/dockertest/v3/docker" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" _ "embed" - "github.com/raystack/shield/config" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/internal/store/spicedb" - "github.com/raystack/shield/pkg/db" - "github.com/raystack/shield/pkg/logger" - "github.com/raystack/shield/test/e2e/testbench" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/internal/store/spicedb" + "github.com/raystack/frontier/pkg/db" + "github.com/raystack/frontier/pkg/logger" + "github.com/raystack/frontier/test/e2e/testbench" "github.com/stretchr/testify/suite" ) @@ -39,7 +39,7 @@ var ruleTemplate string type ProxySmokeTestSuite struct { suite.Suite - sClient shieldv1beta1.ShieldServiceClient + sClient frontierv1beta1.FrontierServiceClient proxyPort int orgID string projID string @@ -60,14 +60,14 @@ func (s *ProxySmokeTestSuite) SetupSuite() { grpcPort, err := testbench.GetFreePort() s.Assert().NoError(err) - ruleDir, err := os.MkdirTemp("", "shield_rules_") + ruleDir, err := os.MkdirTemp("", "frontier_rules_") s.Assert().NoError(err) - ruleFile, err := os.CreateTemp(ruleDir, "shield_rule_*.yml") + ruleFile, err := os.CreateTemp(ruleDir, "frontier_rule_*.yml") s.Assert().NoError(err) ruleTmpl, err := template.New("rule").Parse(ruleTemplate) s.Assert().NoError(err) - appConfig := &config.Shield{ + appConfig := &config.Frontier{ Log: logger.Config{ Level: "fatal", }, @@ -95,7 +95,7 @@ func (s *ProxySmokeTestSuite) SetupSuite() { }, DB: db.Config{ Driver: "postgres", - URL: "postgres://shield:12345@localhost:5432/shield?sslmode=disable", + URL: "postgres://frontier:12345@localhost:5432/frontier?sslmode=disable", MaxIdleConns: 10, MaxOpenConns: 10, ConnMaxLifeTime: time.Millisecond * 10, @@ -104,7 +104,7 @@ func (s *ProxySmokeTestSuite) SetupSuite() { SpiceDB: spicedb.Config{ Host: "localhost", Port: "50051", - PreSharedKey: "shield", + PreSharedKey: "frontier", FullyConsistent: true, }, } @@ -129,13 +129,13 @@ func (s *ProxySmokeTestSuite) SetupSuite() { s.Assert().NoError(err) appConfig.SpiceDB.Port = spiceDBPort - // setup pg for shield - _, connStringExternal, pgResource, err := testbench.StartPG(network, pool, "shield") + // setup pg for frontier + _, connStringExternal, pgResource, err := testbench.StartPG(network, pool, "frontier") s.Assert().NoError(err) appConfig.DB.URL = connStringExternal // run migrations - err = testbench.MigrateShield(logger, appConfig) + err = testbench.MigrateFrontier(logger, appConfig) s.Assert().NoError(err) // echo server for proxy @@ -148,9 +148,9 @@ func (s *ProxySmokeTestSuite) SetupSuite() { }) s.Assert().NoError(err) - testbench.StartShield(logger, appConfig) + testbench.StartFrontier(logger, appConfig) - // let shield start + // let frontier start time.Sleep(time.Second * 3) // create fixtures @@ -174,7 +174,7 @@ func (s *ProxySmokeTestSuite) SetupSuite() { err = testbench.BootstrapOrganizations(ctx, sClient, testbench.OrgAdminEmail) s.Assert().NoError(err) - orgResp, err := sClient.ListOrganizations(ctx, &shieldv1beta1.ListOrganizationsRequest{}) + orgResp, err := sClient.ListOrganizations(ctx, &frontierv1beta1.ListOrganizationsRequest{}) s.Assert().NoError(err) s.Assert().NotEqual(0, len(orgResp.Organizations)) s.orgID = orgResp.Organizations[0].GetId() @@ -185,14 +185,14 @@ func (s *ProxySmokeTestSuite) SetupSuite() { ctx = metadata.NewOutgoingContext(ctx, metadata.New(map[string]string{ testbench.IdentityHeader: testbench.OrgAdminEmail, })) - projResp, err := sClient.ListOrganizationProjects(ctx, &shieldv1beta1.ListOrganizationProjectsRequest{ + projResp, err := sClient.ListOrganizationProjects(ctx, &frontierv1beta1.ListOrganizationProjectsRequest{ Id: s.orgID, }) s.Assert().NoError(err) s.Assert().NotEqual(0, len(projResp.Projects)) s.projID = projResp.Projects[0].GetId() - listUsers, err := sClient.ListUsers(ctx, &shieldv1beta1.ListUsersRequest{}) + listUsers, err := sClient.ListUsers(ctx, &frontierv1beta1.ListUsersRequest{}) s.Assert().NoError(err) s.userID = listUsers.Users[0].Id } @@ -202,7 +202,7 @@ func (s *ProxySmokeTestSuite) TearDownSuite() { s.Assert().NoError(err) proc.Signal(os.Interrupt) - // let shield finish + // let frontier finish time.Sleep(time.Second * 1) err = s.close() @@ -226,23 +226,23 @@ func (s *ProxySmokeTestSuite) TestProxyToEchoServer() { defer res.Body.Close() s.Assert().Equal(200, res.StatusCode) }) - s.Run("resource created on echo server should persist in shieldDB", func() { + s.Run("resource created on echo server should persist in frontierDB", func() { url := fmt.Sprintf("http://localhost:%d/api/resource", s.proxyPort) req, err := http.NewRequest(http.MethodPost, url, nil) s.Require().NoError(err) req.Header.Set(testbench.IdentityHeader, testbench.OrgAdminEmail) - req.Header.Set("X-Shield-Project", s.projID) - req.Header.Set("X-Shield-User", s.userID) - req.Header.Set("X-Shield-Name", "test-resource") - req.Header.Set("X-Shield-Resource-Type", "cart") + req.Header.Set("X-Frontier-Project", s.projID) + req.Header.Set("X-Frontier-User", s.userID) + req.Header.Set("X-Frontier-Name", "test-resource") + req.Header.Set("X-Frontier-Resource-Type", "cart") res, err := http.DefaultClient.Do(req) s.Require().NoError(err) defer res.Body.Close() - resourceResp, err := s.sClient.ListProjectResources(ctx, &shieldv1beta1.ListProjectResourcesRequest{ + resourceResp, err := s.sClient.ListProjectResources(ctx, &frontierv1beta1.ListProjectResourcesRequest{ ProjectId: s.projID, }) s.Assert().NoError(err) diff --git a/test/e2e/smoke/testdata/rule_tmpl/rule.tmpl b/test/e2e/smoke/testdata/rule_tmpl/rule.tmpl index 48fd1a1a9..2eeb31f93 100644 --- a/test/e2e/smoke/testdata/rule_tmpl/rule.tmpl +++ b/test/e2e/smoke/testdata/rule_tmpl/rule.tmpl @@ -16,18 +16,18 @@ rules: action: authz_action attributes: resource: - key: X-Shield-Name + key: X-Frontier-Name type: header source: request project: - key: X-Shield-Project + key: X-Frontier-Project type: header source: request user: - key: X-Shield-User + key: X-Frontier-User type: header source: request resource_type: - key: X-Shield-Resource-Type + key: X-Frontier-Resource-Type type: header source: request \ No newline at end of file diff --git a/test/e2e/testbench/helper.go b/test/e2e/testbench/helper.go index c5382bfd9..12efdc0a5 100644 --- a/test/e2e/testbench/helper.go +++ b/test/e2e/testbench/helper.go @@ -7,7 +7,7 @@ import ( "errors" "net" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "google.golang.org/grpc" "google.golang.org/grpc/credentials/insecure" "google.golang.org/grpc/metadata" @@ -26,7 +26,7 @@ var ( const ( OrgAdminEmail = "admin1-group1-org1@raystack.org" - IdentityHeader = "X-Shield-Email" + IdentityHeader = "X-Frontier-Email" ) func GetFreePort() (int, error) { @@ -52,26 +52,26 @@ func createConnection(ctx context.Context, host string) (*grpc.ClientConn, error return grpc.DialContext(ctx, host, opts...) } -func CreateClient(ctx context.Context, host string) (shieldv1beta1.ShieldServiceClient, func() error, error) { +func CreateClient(ctx context.Context, host string) (frontierv1beta1.FrontierServiceClient, func() error, error) { conn, err := createConnection(ctx, host) if err != nil { return nil, nil, err } - client := shieldv1beta1.NewShieldServiceClient(conn) + client := frontierv1beta1.NewFrontierServiceClient(conn) return client, conn.Close, nil } -func CreateAdminClient(ctx context.Context, host string) (shieldv1beta1.AdminServiceClient, func() error, error) { +func CreateAdminClient(ctx context.Context, host string) (frontierv1beta1.AdminServiceClient, func() error, error) { conn, err := createConnection(ctx, host) if err != nil { return nil, nil, err } - client := shieldv1beta1.NewAdminServiceClient(conn) + client := frontierv1beta1.NewAdminServiceClient(conn) return client, conn.Close, nil } -func BootstrapUsers(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, creatorEmail string) error { - var data []*shieldv1beta1.UserRequestBody +func BootstrapUsers(ctx context.Context, cl frontierv1beta1.FrontierServiceClient, creatorEmail string) error { + var data []*frontierv1beta1.UserRequestBody if err := json.Unmarshal(mockUserFixture, &data); err != nil { return err } @@ -80,7 +80,7 @@ func BootstrapUsers(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c ctx = metadata.NewOutgoingContext(ctx, metadata.New(map[string]string{ IdentityHeader: creatorEmail, })) - if _, err := cl.CreateUser(ctx, &shieldv1beta1.CreateUserRequest{ + if _, err := cl.CreateUser(ctx, &frontierv1beta1.CreateUserRequest{ Body: d, }); err != nil { return err @@ -88,7 +88,7 @@ func BootstrapUsers(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c } // validate - uRes, err := cl.ListUsers(ctx, &shieldv1beta1.ListUsersRequest{}) + uRes, err := cl.ListUsers(ctx, &frontierv1beta1.ListUsersRequest{}) if err != nil { return err } @@ -99,8 +99,8 @@ func BootstrapUsers(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c return nil } -func BootstrapOrganizations(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, creatorEmail string) error { - var data []*shieldv1beta1.OrganizationRequestBody +func BootstrapOrganizations(ctx context.Context, cl frontierv1beta1.FrontierServiceClient, creatorEmail string) error { + var data []*frontierv1beta1.OrganizationRequestBody if err := json.Unmarshal(mockOrganizationFixture, &data); err != nil { return err } @@ -109,7 +109,7 @@ func BootstrapOrganizations(ctx context.Context, cl shieldv1beta1.ShieldServiceC ctx = metadata.NewOutgoingContext(ctx, metadata.New(map[string]string{ IdentityHeader: creatorEmail, })) - if _, err := cl.CreateOrganization(ctx, &shieldv1beta1.CreateOrganizationRequest{ + if _, err := cl.CreateOrganization(ctx, &frontierv1beta1.CreateOrganizationRequest{ Body: d, }); err != nil { return err @@ -117,7 +117,7 @@ func BootstrapOrganizations(ctx context.Context, cl shieldv1beta1.ShieldServiceC } // validate - uRes, err := cl.ListOrganizations(ctx, &shieldv1beta1.ListOrganizationsRequest{}) + uRes, err := cl.ListOrganizations(ctx, &frontierv1beta1.ListOrganizationsRequest{}) if err != nil { return err } @@ -127,8 +127,8 @@ func BootstrapOrganizations(ctx context.Context, cl shieldv1beta1.ShieldServiceC return nil } -func BootstrapProject(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, creatorEmail string) error { - orgResp, err := cl.ListOrganizations(ctx, &shieldv1beta1.ListOrganizationsRequest{}) +func BootstrapProject(ctx context.Context, cl frontierv1beta1.FrontierServiceClient, creatorEmail string) error { + orgResp, err := cl.ListOrganizations(ctx, &frontierv1beta1.ListOrganizationsRequest{}) if err != nil { return err } @@ -137,7 +137,7 @@ func BootstrapProject(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, return errors.New("no organization found") } - var data []*shieldv1beta1.ProjectRequestBody + var data []*frontierv1beta1.ProjectRequestBody if err = json.Unmarshal(mockProjectFixture, &data); err != nil { return err } @@ -147,7 +147,7 @@ func BootstrapProject(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, ctx = metadata.NewOutgoingContext(ctx, metadata.New(map[string]string{ IdentityHeader: creatorEmail, })) - if _, err := cl.CreateProject(ctx, &shieldv1beta1.CreateProjectRequest{ + if _, err := cl.CreateProject(ctx, &frontierv1beta1.CreateProjectRequest{ Body: d, }); err != nil { return err @@ -155,7 +155,7 @@ func BootstrapProject(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, } // validate - uRes, err := cl.ListOrganizationProjects(ctx, &shieldv1beta1.ListOrganizationProjectsRequest{ + uRes, err := cl.ListOrganizationProjects(ctx, &frontierv1beta1.ListOrganizationProjectsRequest{ Id: orgResp.GetOrganizations()[0].GetId(), }) if err != nil { @@ -167,8 +167,8 @@ func BootstrapProject(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, return nil } -func BootstrapGroup(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, creatorEmail string) error { - orgResp, err := cl.ListOrganizations(ctx, &shieldv1beta1.ListOrganizationsRequest{}) +func BootstrapGroup(ctx context.Context, cl frontierv1beta1.FrontierServiceClient, creatorEmail string) error { + orgResp, err := cl.ListOrganizations(ctx, &frontierv1beta1.ListOrganizationsRequest{}) if err != nil { return err } @@ -177,7 +177,7 @@ func BootstrapGroup(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c return errors.New("no organization found") } - var data []*shieldv1beta1.GroupRequestBody + var data []*frontierv1beta1.GroupRequestBody if err = json.Unmarshal(mockGroupFixture, &data); err != nil { return err } @@ -186,7 +186,7 @@ func BootstrapGroup(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c ctx = metadata.NewOutgoingContext(ctx, metadata.New(map[string]string{ IdentityHeader: creatorEmail, })) - if _, err := cl.CreateGroup(ctx, &shieldv1beta1.CreateGroupRequest{ + if _, err := cl.CreateGroup(ctx, &frontierv1beta1.CreateGroupRequest{ Body: d, OrgId: orgResp.GetOrganizations()[0].GetId(), }); err != nil { @@ -195,7 +195,7 @@ func BootstrapGroup(ctx context.Context, cl shieldv1beta1.ShieldServiceClient, c } // validate - uRes, err := cl.ListOrganizationGroups(ctx, &shieldv1beta1.ListOrganizationGroupsRequest{ + uRes, err := cl.ListOrganizationGroups(ctx, &frontierv1beta1.ListOrganizationGroupsRequest{ OrgId: orgResp.GetOrganizations()[0].GetId(), }) if err != nil { diff --git a/test/e2e/testbench/shield.go b/test/e2e/testbench/shield.go index 3ce92375e..81e1b37a1 100644 --- a/test/e2e/testbench/shield.go +++ b/test/e2e/testbench/shield.go @@ -1,16 +1,16 @@ package testbench import ( + "github.com/raystack/frontier/cmd" + "github.com/raystack/frontier/config" "github.com/raystack/salt/log" - "github.com/raystack/shield/cmd" - "github.com/raystack/shield/config" ) -func MigrateShield(logger *log.Zap, appConfig *config.Shield) error { +func MigrateFrontier(logger *log.Zap, appConfig *config.Frontier) error { return cmd.RunMigrations(logger, appConfig.DB) } -func StartShield(logger *log.Zap, appConfig *config.Shield) { +func StartFrontier(logger *log.Zap, appConfig *config.Frontier) { go func() { if err := cmd.StartServer(logger, appConfig); err != nil { logger.Fatal("err starting", "err", err) diff --git a/test/e2e/testbench/spicedb.go b/test/e2e/testbench/spicedb.go index 0791cda9d..6a1592ee3 100644 --- a/test/e2e/testbench/spicedb.go +++ b/test/e2e/testbench/spicedb.go @@ -9,8 +9,8 @@ import ( "github.com/ory/dockertest/v3" "github.com/ory/dockertest/v3/docker" + "github.com/raystack/frontier/internal/store/spicedb" "github.com/raystack/salt/log" - "github.com/raystack/shield/internal/store/spicedb" ) const ( diff --git a/test/e2e/testbench/testbench.go b/test/e2e/testbench/testbench.go index da15471f9..1ca85a5b3 100644 --- a/test/e2e/testbench/testbench.go +++ b/test/e2e/testbench/testbench.go @@ -9,19 +9,19 @@ import ( "strconv" "time" - "github.com/raystack/shield/pkg/logger" - shieldv1beta1 "github.com/raystack/shield/proto/v1beta1" + "github.com/raystack/frontier/pkg/logger" + frontierv1beta1 "github.com/raystack/frontier/proto/v1beta1" "github.com/google/uuid" "github.com/ory/dockertest/v3" "github.com/ory/dockertest/v3/docker" - "github.com/raystack/shield/config" - "github.com/raystack/shield/internal/store/spicedb" - "github.com/raystack/shield/pkg/db" + "github.com/raystack/frontier/config" + "github.com/raystack/frontier/internal/store/spicedb" + "github.com/raystack/frontier/pkg/db" ) const ( - preSharedKey = "shield" + preSharedKey = "frontier" waitContainerTimeout = 60 * time.Second ) @@ -33,12 +33,12 @@ type TestBench struct { Pool *dockertest.Pool Network *docker.Network Resources []*dockertest.Resource - Client shieldv1beta1.ShieldServiceClient - AdminClient shieldv1beta1.AdminServiceClient + Client frontierv1beta1.FrontierServiceClient + AdminClient frontierv1beta1.AdminServiceClient close func() error } -func Init(appConfig *config.Shield) (*TestBench, error) { +func Init(appConfig *config.Frontier) (*TestBench, error) { var ( err error logger = logger.InitLogger(appConfig.Log) @@ -58,7 +58,7 @@ func Init(appConfig *config.Shield) (*TestBench, error) { return nil, err } - _, connMainPGExternal, pgResource, err := StartPG(te.Network, te.Pool, "shield") + _, connMainPGExternal, pgResource, err := StartPG(te.Network, te.Pool, "frontier") if err != nil { return nil, err } @@ -83,7 +83,7 @@ func Init(appConfig *config.Shield) (*TestBench, error) { FullyConsistent: true, } - if err = MigrateShield(logger, appConfig); err != nil { + if err = MigrateFrontier(logger, appConfig); err != nil { return nil, err } @@ -93,7 +93,7 @@ func Init(appConfig *config.Shield) (*TestBench, error) { return errors.Join(err1, err2) } - StartShield(logger, appConfig) + StartFrontier(logger, appConfig) // create fixtures sClient, sClose, err := CreateClient(context.Background(), net.JoinHostPort(appConfig.App.Host, strconv.Itoa(appConfig.App.GRPC.Port))) @@ -116,7 +116,7 @@ func Init(appConfig *config.Shield) (*TestBench, error) { return errors.Join(err1, err2, err3, err4) } - // let shield start + // let frontier start time.Sleep(time.Second * 2) return te, nil } diff --git a/test/integration/fixtures/ruleset.grpc.yaml b/test/integration/fixtures/ruleset.grpc.yaml index 5b08f30c1..120ec6516 100644 --- a/test/integration/fixtures/ruleset.grpc.yaml +++ b/test/integration/fixtures/ruleset.grpc.yaml @@ -1,43 +1,43 @@ rules: - backends: - - name: some_post - methods: ["POST"] - target: "http://127.0.0.1:13877/" - frontends: - - name: basic_auth_1 - path: "/helloworld.Greeter/StreamExample" - method: "POST" - middlewares: - - name: basic_auth - config: - users: - - user: user - password: $apr1$RfxoV6GP$.GsGgD580H5FOuUfTzKZh0 - # hooks: - # - name: authz - # config: - # action: some_action - # attributes: - # project_resp: - # index: "1" - # type: grpc_payload + - name: some_post + methods: ["POST"] + target: "http://127.0.0.1:13877/" + frontends: + - name: basic_auth_1 + path: "/helloworld.Greeter/StreamExample" + method: "POST" + middlewares: + - name: basic_auth + config: + users: + - user: user + password: $apr1$RfxoV6GP$.GsGgD580H5FOuUfTzKZh0 + # hooks: + # - name: authz + # config: + # action: some_action + # attributes: + # project_resp: + # index: "1" + # type: grpc_payload - - name: basic_auth_2 - path: "/helloworld.Greeter/SayHello" - method: "POST" - middlewares: - - name: basic_auth - config: - users: - - user: user - password: $apr1$RfxoV6GP$.GsGgD580H5FOuUfTzKZh0 - capabilities: [ "hello:shield" ] - scope: - action: "hello:{{.name}}" - attributes: - name: - type: grpc_payload - index: "1" + - name: basic_auth_2 + path: "/helloworld.Greeter/SayHello" + method: "POST" + middlewares: + - name: basic_auth + config: + users: + - user: user + password: $apr1$RfxoV6GP$.GsGgD580H5FOuUfTzKZh0 + capabilities: ["hello:frontier"] + scope: + action: "hello:{{.name}}" + attributes: + name: + type: grpc_payload + index: "1" # hooks: # - name: authz # config: diff --git a/test/integration/grpc_test.go b/test/integration/grpc_test.go index 1f3d65542..75d03e3aa 100644 --- a/test/integration/grpc_test.go +++ b/test/integration/grpc_test.go @@ -9,12 +9,12 @@ import ( "testing" "time" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/core/rule" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/internal/proxy/hook" - "github.com/raystack/shield/internal/store/blob" - "github.com/raystack/shield/test/integration/fixtures/helloworld" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/core/rule" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/internal/proxy/hook" + "github.com/raystack/frontier/internal/store/blob" + "github.com/raystack/frontier/test/integration/fixtures/helloworld" "github.com/raystack/salt/log" "github.com/stretchr/testify/assert" @@ -94,13 +94,13 @@ func TestGRPCProxyHelloWorld(t *testing.T) { defer conn.Close() client := helloworld.NewGreeterClient(conn) resp, err := client.SayHello(context.Background(), &helloworld.HelloRequest{ - Name: "shield", + Name: "frontier", }) if err != nil { t.Error(err) assert.Nil(t, err) } - assert.Equal(t, "Hello shield", resp.Message) + assert.Equal(t, "Hello frontier", resp.Message) }) t.Run("stream call with basic rpc credential", func(t *testing.T) { conn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", grpcProxyPort), @@ -195,13 +195,13 @@ func BenchmarkGRPCProxyHelloWorld(b *testing.B) { client := helloworld.NewGreeterClient(conn) for i := 0; i < b.N; i++ { resp, err := client.SayHello(context.Background(), &helloworld.HelloRequest{ - Name: "shield", + Name: "frontier", }) if err != nil { b.Error(err) assert.Nil(b, err) } - assert.Equal(b, "Hello shield", resp.Message) + assert.Equal(b, "Hello frontier", resp.Message) } }) } diff --git a/test/integration/rest_test.go b/test/integration/rest_test.go index 4fedb8746..25e7955c8 100644 --- a/test/integration/rest_test.go +++ b/test/integration/rest_test.go @@ -10,19 +10,19 @@ import ( "testing" "time" + "github.com/raystack/frontier/core/project" + "github.com/raystack/frontier/core/relation" + "github.com/raystack/frontier/core/resource" + "github.com/raystack/frontier/core/rule" + "github.com/raystack/frontier/internal/proxy" + "github.com/raystack/frontier/internal/proxy/hook" + authz_hook "github.com/raystack/frontier/internal/proxy/hook/authz" + "github.com/raystack/frontier/internal/proxy/middleware/attributes" + basic_auth "github.com/raystack/frontier/internal/proxy/middleware/basic_auth" + "github.com/raystack/frontier/internal/proxy/middleware/prefix" + "github.com/raystack/frontier/internal/proxy/middleware/rulematch" + "github.com/raystack/frontier/internal/store/blob" "github.com/raystack/salt/log" - "github.com/raystack/shield/core/project" - "github.com/raystack/shield/core/relation" - "github.com/raystack/shield/core/resource" - "github.com/raystack/shield/core/rule" - "github.com/raystack/shield/internal/proxy" - "github.com/raystack/shield/internal/proxy/hook" - authz_hook "github.com/raystack/shield/internal/proxy/hook/authz" - "github.com/raystack/shield/internal/proxy/middleware/attributes" - basic_auth "github.com/raystack/shield/internal/proxy/middleware/basic_auth" - "github.com/raystack/shield/internal/proxy/middleware/prefix" - "github.com/raystack/shield/internal/proxy/middleware/rulematch" - "github.com/raystack/shield/internal/store/blob" "github.com/stretchr/testify/assert" "gocloud.dev/blob/fileblob" diff --git a/ui/index.html b/ui/index.html index 0c95384aa..e344f7be7 100644 --- a/ui/index.html +++ b/ui/index.html @@ -4,7 +4,7 @@ - Shield + Frontier