oathkeeper: github.com/ory/oathkeeper/pipeline/authz Index | Files

package authz

import "github.com/ory/oathkeeper/pipeline/authz"

Index

Package Files

authorizer.go authorizer_allow.go authorizer_deny.go keto_engine_acp_ory.go registry.go

Variables

var ErrAuthorizerNotEnabled = herodot.DefaultError{
    ErrorField:  "authorizer matching this route is misconfigured or disabled",
    CodeField:   http.StatusInternalServerError,
    StatusField: http.StatusText(http.StatusInternalServerError),
}

func NewErrAuthorizerMisconfigured Uses

func NewErrAuthorizerMisconfigured(a Authorizer, err error) *herodot.DefaultError

func NewErrAuthorizerNotEnabled Uses

func NewErrAuthorizerNotEnabled(a Authorizer) *herodot.DefaultError

type Authorizer Uses

type Authorizer interface {
    Authorize(r *http.Request, session *authn.AuthenticationSession, config json.RawMessage, rule pipeline.Rule) error
    GetID() string
    Validate(config json.RawMessage) error
}

type AuthorizerAllow Uses

type AuthorizerAllow struct {
    // contains filtered or unexported fields
}

func NewAuthorizerAllow Uses

func NewAuthorizerAllow(c configuration.Provider) *AuthorizerAllow

func (*AuthorizerAllow) Authorize Uses

func (a *AuthorizerAllow) Authorize(r *http.Request, session *authn.AuthenticationSession, config json.RawMessage, _ pipeline.Rule) error

func (*AuthorizerAllow) GetID Uses

func (a *AuthorizerAllow) GetID() string

func (*AuthorizerAllow) Validate Uses

func (a *AuthorizerAllow) Validate(config json.RawMessage) error

type AuthorizerDeny Uses

type AuthorizerDeny struct {
    // contains filtered or unexported fields
}

func NewAuthorizerDeny Uses

func NewAuthorizerDeny(c configuration.Provider) *AuthorizerDeny

func (*AuthorizerDeny) Authorize Uses

func (a *AuthorizerDeny) Authorize(r *http.Request, session *authn.AuthenticationSession, config json.RawMessage, _ pipeline.Rule) error

func (*AuthorizerDeny) GetID Uses

func (a *AuthorizerDeny) GetID() string

func (*AuthorizerDeny) Validate Uses

func (a *AuthorizerDeny) Validate(config json.RawMessage) error

type AuthorizerKetoEngineACPORY Uses

type AuthorizerKetoEngineACPORY struct {
    // contains filtered or unexported fields
}

func NewAuthorizerKetoEngineACPORY Uses

func NewAuthorizerKetoEngineACPORY(c configuration.Provider) *AuthorizerKetoEngineACPORY

func (*AuthorizerKetoEngineACPORY) Authorize Uses

func (a *AuthorizerKetoEngineACPORY) Authorize(r *http.Request, session *authn.AuthenticationSession, config json.RawMessage, rule pipeline.Rule) error

func (*AuthorizerKetoEngineACPORY) Config Uses

func (a *AuthorizerKetoEngineACPORY) Config(config json.RawMessage) (*AuthorizerKetoEngineACPORYConfiguration, error)

func (*AuthorizerKetoEngineACPORY) GetID Uses

func (a *AuthorizerKetoEngineACPORY) GetID() string

func (*AuthorizerKetoEngineACPORY) ParseSubject Uses

func (a *AuthorizerKetoEngineACPORY) ParseSubject(session *authn.AuthenticationSession, templateId, templateString string) (string, error)

func (*AuthorizerKetoEngineACPORY) Validate Uses

func (a *AuthorizerKetoEngineACPORY) Validate(config json.RawMessage) error

func (*AuthorizerKetoEngineACPORY) WithContextCreator Uses

func (a *AuthorizerKetoEngineACPORY) WithContextCreator(f authorizerKetoWardenContext)

type AuthorizerKetoEngineACPORYConfiguration Uses

type AuthorizerKetoEngineACPORYConfiguration struct {
    RequiredAction   string `json:"required_action"`
    RequiredResource string `json:"required_resource"`
    Subject          string `json:"subject"`
    Flavor           string `json:"flavor"`
    BaseURL          string `json:"base_url"`
}

type AuthorizerKetoEngineACPORYRequestBody Uses

type AuthorizerKetoEngineACPORYRequestBody struct {
    Action   string                 `json:"action"`
    Context  map[string]interface{} `json:"context"`
    Resource string                 `json:"resource"`
    Subject  string                 `json:"subject"`
}

type Registry Uses

type Registry interface {
    AvailablePipelineAuthorizers() []string
    PipelineAuthorizer(string) (Authorizer, error)
}

Package authz imports 16 packages (graph) and is imported by 3 packages. Updated 2019-11-21. Refresh now. Tools for package owners.