Documentation ¶
Index ¶
- Variables
- func CacheExpires(r *http.Response) time.Time
- type APIClient
- type APIKey
- type APIResponse
- type AccessControlEntry
- type AccessControlEntryFilter
- type AccessPolicy
- type AclBinding
- type AclBindingFilter
- type AclFilterRequest
- type AclOperation
- type AclPermissionType
- type AclResourceType
- type Action
- type AuditLogConfigDefaultTopics
- type AuditLogConfigDestinationConfig
- type AuditLogConfigDestinations
- type AuditLogConfigListRoutesResponse
- type AuditLogConfigMetadata
- type AuditLogConfigResolveResourceRouteResponse
- type AuditLogConfigRouteCategories
- type AuditLogConfigRouteCategoryTopics
- type AuditLogConfigSpec
- type AuditLogConfigurationApi
- type AuditLogConfigurationApiService
- func (a *AuditLogConfigurationApiService) GetConfig(ctx _context.Context) (AuditLogConfigSpec, *_nethttp.Response, error)
- func (a *AuditLogConfigurationApiService) ListRoutes(ctx _context.Context, localVarOptionals *ListRoutesOpts) (AuditLogConfigListRoutesResponse, *_nethttp.Response, error)
- func (a *AuditLogConfigurationApiService) PutConfig(ctx _context.Context, auditLogConfigSpec AuditLogConfigSpec) (AuditLogConfigSpec, *_nethttp.Response, error)
- func (a *AuditLogConfigurationApiService) ResolveResourceRoute(ctx _context.Context, localVarOptionals *ResolveResourceRouteOpts) (AuditLogConfigResolveResourceRouteResponse, *_nethttp.Response, error)
- type AuthenticationResponse
- type AuthorizationApi
- type AuthorizationApiService
- type AuthorizeRequest
- type BasicAuth
- type CheckDeviceAuthRequest
- type CheckDeviceAuthResponse
- type ClusterAccessInfo
- type ClusterInfo
- type ClusterRegistryApi
- type ClusterRegistryApiService
- func (a *ClusterRegistryApiService) ClusterRegistryList(ctx _context.Context, localVarOptionals *ClusterRegistryListOpts) ([]ClusterInfo, *_nethttp.Response, error)
- func (a *ClusterRegistryApiService) DeleteNamedCluster(ctx _context.Context, clusterName string) (*_nethttp.Response, error)
- func (a *ClusterRegistryApiService) GetNamedCluster(ctx _context.Context, clusterName string) (ClusterInfo, *_nethttp.Response, error)
- func (a *ClusterRegistryApiService) UpdateClusters(ctx _context.Context, clusterInfo []ClusterInfo) (*_nethttp.Response, error)
- type ClusterRegistryListOpts
- type ClusterVisibility
- type Configuration
- type CreateAclRequest
- type ErrorDetail
- type ErrorResponse
- type ExtendAuthRequest
- type ExtendAuthResponse
- type FeaturesInfo
- type GenericOpenAPIError
- type HostInfo
- type InitDeviceAuthResponse
- type KafkaACLManagementApi
- type KafkaACLManagementApiService
- func (a *KafkaACLManagementApiService) AddAclBinding(ctx _context.Context, createAclRequest CreateAclRequest) (*_nethttp.Response, error)
- func (a *KafkaACLManagementApiService) RemoveAclBindings(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error)
- func (a *KafkaACLManagementApiService) SearchAclBinding(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error)
- type KafkaResourcePattern
- type KafkaResourcePatternFilter
- type KafkaScope
- type KafkaScopeClusters
- type ListManagedClustersOpts
- type ListRoutesOpts
- type ManagedResourceBinding
- type ManagedRoleBindings
- type ManagedRoleBindingsOpts
- type MdsScope
- type MetadataServiceOperationsApi
- type MetadataServiceOperationsApiService
- func (a *MetadataServiceOperationsApiService) Activenodes(ctx _context.Context, protocol string) ([]string, *_nethttp.Response, error)
- func (a *MetadataServiceOperationsApiService) Features(ctx _context.Context) (FeaturesInfo, *_nethttp.Response, error)
- func (a *MetadataServiceOperationsApiService) MetadataClusterId(ctx _context.Context) (string, *_nethttp.Response, error)
- type MyRoleBindingsAllOpts
- type Operation
- type PatternType
- type PrivateRBACUICachedUserStoreInformationApi
- type PrivateRBACUICachedUserStoreInformationApiService
- type PrivateRBACUIClusterVisibilityApi
- type PrivateRBACUIClusterVisibilityApiService
- func (a *PrivateRBACUIClusterVisibilityApiService) ListManagedClusters(ctx _context.Context, principal string, ...) ([]Scope, *_nethttp.Response, error)
- func (a *PrivateRBACUIClusterVisibilityApiService) Visibility(ctx _context.Context, principal string, visibilityRequest []VisibilityRequest) (VisibilityResponse, *_nethttp.Response, error)
- type PrivateRBACUICreationGuidelinesApi
- type PrivateRBACUICreationGuidelinesApiService
- type PrivateRBACUIManageRoleBindingsApi
- type PrivateRBACUIManageRoleBindingsApiService
- func (a *PrivateRBACUIManageRoleBindingsApiService) ClusterAccessInfo(ctx _context.Context, principal string, scope Scope) (ClusterAccessInfo, *_nethttp.Response, error)
- func (a *PrivateRBACUIManageRoleBindingsApiService) ManagedRoleBindings(ctx _context.Context, principal string, scope Scope, ...) (ManagedRoleBindings, *_nethttp.Response, error)
- type PrivateRBACUIMyRoleBindingsApi
- type PrivateRBACUIMyRoleBindingsApiService
- func (a *PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsAll(ctx _context.Context, principal string, ...) ([]ScopeRoleBindingMapping, *_nethttp.Response, error)
- func (a *PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsSingleScope(ctx _context.Context, principal string, scope Scope) (ScopeRoleBindingMapping, *_nethttp.Response, error)
- type Protocol
- type RBACRoleBindingCRUDApi
- type RBACRoleBindingCRUDApiService
- func (a *RBACRoleBindingCRUDApiService) AddRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error)
- func (a *RBACRoleBindingCRUDApiService) AddRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, ...) (*_nethttp.Response, error)
- func (a *RBACRoleBindingCRUDApiService) DeleteRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error)
- func (a *RBACRoleBindingCRUDApiService) GetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) ([]ResourcePattern, *_nethttp.Response, error)
- func (a *RBACRoleBindingCRUDApiService) RemoveRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, ...) (*_nethttp.Response, error)
- func (a *RBACRoleBindingCRUDApiService) SetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, ...) (*_nethttp.Response, error)
- type RBACRoleBindingSummariesApi
- type RBACRoleBindingSummariesApiService
- func (a *RBACRoleBindingSummariesApiService) LookupPrincipalsWithRole(ctx _context.Context, roleName string, mdsScope MdsScope) ([]string, *_nethttp.Response, error)
- func (a *RBACRoleBindingSummariesApiService) LookupPrincipalsWithRoleOnResource(ctx _context.Context, roleName string, resourceType string, ...) ([]string, *_nethttp.Response, error)
- func (a *RBACRoleBindingSummariesApiService) LookupResourcesForPrincipal(ctx _context.Context, principal string, mdsScope MdsScope) (map[string]map[string][]ResourcePattern, *_nethttp.Response, error)
- func (a *RBACRoleBindingSummariesApiService) ScopedPrincipalRolenames(ctx _context.Context, principal string, mdsScope MdsScope) ([]string, *_nethttp.Response, error)
- type RBACRoleDefinitionsApi
- type RBACRoleDefinitionsApiService
- func (a *RBACRoleDefinitionsApiService) RoleDetail(ctx _context.Context, roleName string) (Role, *_nethttp.Response, error)
- func (a *RBACRoleDefinitionsApiService) Rolenames(ctx _context.Context) ([]string, *_nethttp.Response, error)
- func (a *RBACRoleDefinitionsApiService) Roles(ctx _context.Context) ([]Role, *_nethttp.Response, error)
- type ResolveResourceRouteOpts
- type ResourcePattern
- type ResourcesRequest
- type Role
- type SSODeviceAuthorizationApi
- type SSODeviceAuthorizationApiService
- func (a *SSODeviceAuthorizationApiService) CheckDeviceAuth(ctx _context.Context, checkDeviceAuthRequest CheckDeviceAuthRequest) (CheckDeviceAuthResponse, *_nethttp.Response, error)
- func (a *SSODeviceAuthorizationApiService) ExtendDeviceAuth(ctx _context.Context, extendAuthRequest ExtendAuthRequest) (ExtendAuthResponse, *_nethttp.Response, error)
- func (a *SSODeviceAuthorizationApiService) Security10OidcDeviceAuthenticatePost(ctx _context.Context) (InitDeviceAuthResponse, *_nethttp.Response, error)
- type Scope
- type ScopeClusters
- type ScopeRoleBindingMapping
- type ServerConfiguration
- type ServerVariable
- type TokensAndAuthenticationApi
- type TokensAndAuthenticationApiService
- type UsersGroupsListOpts
- type VisibilityRequest
- type VisibilityResponse
Constants ¶
This section is empty.
Variables ¶
var ( // ContextOAuth2 takes an oauth2.TokenSource as authentication for the request. ContextOAuth2 = contextKey("token") // ContextBasicAuth takes BasicAuth as authentication for the request. ContextBasicAuth = contextKey("basic") // ContextAccessToken takes a string oauth2 access token as authentication for the request. ContextAccessToken = contextKey("accesstoken") // ContextAPIKey takes an APIKey as authentication for the request ContextAPIKey = contextKey("apikey") )
Functions ¶
Types ¶
type APIClient ¶
type APIClient struct { AuditLogConfigurationApi AuditLogConfigurationApi AuthorizationApi AuthorizationApi ClusterRegistryApi ClusterRegistryApi KafkaACLManagementApi KafkaACLManagementApi MetadataServiceOperationsApi MetadataServiceOperationsApi PrivateRBACUICachedUserStoreInformationApi PrivateRBACUICachedUserStoreInformationApi PrivateRBACUIClusterVisibilityApi PrivateRBACUIClusterVisibilityApi PrivateRBACUICreationGuidelinesApi PrivateRBACUICreationGuidelinesApi PrivateRBACUIManageRoleBindingsApi PrivateRBACUIManageRoleBindingsApi PrivateRBACUIMyRoleBindingsApi PrivateRBACUIMyRoleBindingsApi RBACRoleBindingCRUDApi RBACRoleBindingCRUDApi RBACRoleBindingSummariesApi RBACRoleBindingSummariesApi RBACRoleDefinitionsApi RBACRoleDefinitionsApi SSODeviceAuthorizationApi SSODeviceAuthorizationApi TokensAndAuthenticationApi TokensAndAuthenticationApi // contains filtered or unexported fields }
APIClient manages communication with the MDS API API v1.0 In most cases there should be only one, shared, APIClient.
func NewAPIClient ¶
func NewAPIClient(cfg *Configuration) *APIClient
NewAPIClient creates a new API client. Requires a userAgent string describing your application. optionally a custom http.Client to allow for advanced features such as caching.
func (*APIClient) ChangeBasePath ¶
ChangeBasePath changes base path to allow switching to mocks
func (*APIClient) GetConfig ¶
func (c *APIClient) GetConfig() *Configuration
Allow modification of underlying config for alternate implementations and testing Caution: modifying the configuration while live can cause data races and potentially unwanted behavior
type APIKey ¶
APIKey provides API key based authentication to a request passed via context using ContextAPIKey
type APIResponse ¶
type APIResponse struct { *http.Response `json:"-"` Message string `json:"message,omitempty"` // Operation is the name of the OpenAPI operation. Operation string `json:"operation,omitempty"` // RequestURL is the request URL. This value is always available, even if the // embedded *http.Response is nil. RequestURL string `json:"url,omitempty"` // Method is the HTTP method used for the request. This value is always // available, even if the embedded *http.Response is nil. Method string `json:"method,omitempty"` // Payload holds the contents of the response body (which may be nil or empty). // This is provided here as the raw response.Body() reader will have already // been drained. Payload []byte `json:"-"` }
APIResponse stores the API response returned by the server.
func NewAPIResponse ¶
func NewAPIResponse(r *http.Response) *APIResponse
NewAPIResponse returns a new APIResonse object.
func NewAPIResponseWithError ¶
func NewAPIResponseWithError(errorMessage string) *APIResponse
NewAPIResponseWithError returns a new APIResponse object with the provided error message.
type AccessControlEntry ¶
type AccessControlEntry struct { Principal string `json:"principal"` Host string `json:"host"` Operation AclOperation `json:"operation"` PermissionType AclPermissionType `json:"permissionType"` }
AccessControlEntry struct for AccessControlEntry
type AccessControlEntryFilter ¶
type AccessControlEntryFilter struct { Principal string `json:"principal,omitempty"` Host string `json:"host,omitempty"` Operation AclOperation `json:"operation"` PermissionType AclPermissionType `json:"permissionType"` }
AccessControlEntryFilter struct for AccessControlEntryFilter
type AccessPolicy ¶
type AccessPolicy struct { ScopeType string `json:"scopeType,omitempty"` AllowedOperations []Operation `json:"allowedOperations,omitempty"` }
AccessPolicy struct for AccessPolicy
type AclBinding ¶
type AclBinding struct { Pattern KafkaResourcePattern `json:"pattern"` Entry AccessControlEntry `json:"entry"` }
AclBinding struct for AclBinding
type AclBindingFilter ¶
type AclBindingFilter struct { PatternFilter KafkaResourcePatternFilter `json:"patternFilter"` EntryFilter AccessControlEntryFilter `json:"entryFilter"` }
AclBindingFilter struct for AclBindingFilter
type AclFilterRequest ¶
type AclFilterRequest struct { Scope KafkaScope `json:"scope"` AclBindingFilter AclBindingFilter `json:"aclBindingFilter"` }
AclFilterRequest struct for AclFilterRequest
type AclOperation ¶
type AclOperation string
AclOperation the model 'AclOperation'
const ( ACLOPERATION_UNKNOWN AclOperation = "UNKNOWN" ACLOPERATION_ANY AclOperation = "ANY" ACLOPERATION_ALL AclOperation = "ALL" ACLOPERATION_READ AclOperation = "READ" ACLOPERATION_WRITE AclOperation = "WRITE" ACLOPERATION_CREATE AclOperation = "CREATE" ACLOPERATION_DELETE AclOperation = "DELETE" ACLOPERATION_ALTER AclOperation = "ALTER" ACLOPERATION_DESCRIBE AclOperation = "DESCRIBE" ACLOPERATION_CLUSTER_ACTION AclOperation = "CLUSTER_ACTION" ACLOPERATION_DESCRIBE_CONFIGS AclOperation = "DESCRIBE_CONFIGS" ACLOPERATION_ALTER_CONFIGS AclOperation = "ALTER_CONFIGS" ACLOPERATION_IDEMPOTENT_WRITE AclOperation = "IDEMPOTENT_WRITE" )
List of AclOperation
type AclPermissionType ¶
type AclPermissionType string
AclPermissionType the model 'AclPermissionType'
const ( ACLPERMISSIONTYPE_UNKNOWN AclPermissionType = "UNKNOWN" ACLPERMISSIONTYPE_ANY AclPermissionType = "ANY" ACLPERMISSIONTYPE_DENY AclPermissionType = "DENY" ACLPERMISSIONTYPE_ALLOW AclPermissionType = "ALLOW" )
List of AclPermissionType
type AclResourceType ¶
type AclResourceType string
AclResourceType the model 'AclResourceType'
const ( ACLRESOURCETYPE_UNKNOWN AclResourceType = "UNKNOWN" ACLRESOURCETYPE_ANY AclResourceType = "ANY" ACLRESOURCETYPE_TOPIC AclResourceType = "TOPIC" ACLRESOURCETYPE_GROUP AclResourceType = "GROUP" ACLRESOURCETYPE_CLUSTER AclResourceType = "CLUSTER" ACLRESOURCETYPE_TRANSACTIONAL_ID AclResourceType = "TRANSACTIONAL_ID" )
List of AclResourceType
type Action ¶
type Action struct { Scope Scope `json:"scope"` Operation string `json:"operation"` ResourceType string `json:"resourceType"` ResourceName string `json:"resourceName"` }
Action struct for Action
type AuditLogConfigDefaultTopics ¶
type AuditLogConfigDefaultTopics struct { // The name of one of the destination Kafka topics, defined elsewhere in the audit log configuration, that shall receive messages about attempted actions when they are \"allowed\" by the system based on security access policies. You can set this value to an empty string instead, to discard the \"allowed\" events routed here. The empty string is the only valid value other than one of the Kafka topic names in the spec's “destinations“ section. This field specifies the default destination for events related to \"allowed\" actions in the following categories: “authentication“, “management“, and “authorize“. All other event categories are discarded by default. Events only follow the default behavior if they do not match any of the audit log configuration “routes“ CRN patterns, or if their selected route omits (or leaves “null“) the destination topic. Allowed string `json:"allowed"` // The name of one of the destination Kafka topics, defined elsewhere in the audit log configuration, that shall receive messages about attempted actions when they are \"denied\" by the system based on security access policies. You can set this value to an empty string instead, to discard the \"denied\" events routed here.The empty string is the only valid value other than one of the Kafka topic names in the spec's “destinations“ section. This field specifies the default destination for events related to \"denied\" actions in the following categories: “authentication“, “management“, and “authorize“. All other event categories are discarded by default. Events only follow the default behavior if they do not match any of the audit log configuration “routes“ CRN patterns, or if their selected route omits (or leaves “null“) the destination topic. Denied string `json:"denied"` }
AuditLogConfigDefaultTopics struct for AuditLogConfigDefaultTopics
type AuditLogConfigDestinationConfig ¶
type AuditLogConfigDestinationConfig struct { // The number of milliseconds to keep events sent to this topic RetentionMs int64 `json:"retention_ms"` }
AuditLogConfigDestinationConfig struct for AuditLogConfigDestinationConfig
type AuditLogConfigDestinations ¶
type AuditLogConfigDestinations struct { // A list of Kafka broker endpoints, used when configuring the Kafka producer(s) that will emit audit log events as they occur. See Kafka Producer Configuration “bootstrap.servers“: https://kafka.apache.org/documentation/#producerconfigs BootstrapServers []string `json:"bootstrap_servers,omitempty"` // The destination Kafka topics that can receive audit log events. The keys are Kafka topic names used in routes within the audit log configuration specification. The values are the configuration details for each destination topic. Note that topic names must match the pattern “^confluent-audit-log-events[-_a-zA-Z0-9]*$“ and be 249 characters or less. Topics map[string]AuditLogConfigDestinationConfig `json:"topics"` }
AuditLogConfigDestinations struct for AuditLogConfigDestinations
type AuditLogConfigListRoutesResponse ¶
type AuditLogConfigListRoutesResponse struct { DefaultTopics AuditLogConfigDefaultTopics `json:"default_topics,omitempty"` // Events are matched to exactly one of these route patterns (or else to the “default_topics“). The route patterns can be any valid Confluent resource name (CRN), or even a CRN containing wildcards. The most specific pattern that matches an event will be chosen. Consider these example route patterns that match events on Kafka topic resources. They are ordered here from most to least specific: “crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=clicks“ “crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=*“ “crn://mds1.example.com/kafka=*_/topic=clicks“ “crn://mds1.example.com/kafka=*_/topic=*“ “crn:///kafka=abcde_FGHIJKL-01234567/topic=clicks“ “crn:///kafka=*_/topic=*“ For a CRN pattern to match a CRN, the Authority sections must match and the CRN pattern and the CRN must have all of the same path element types in the same order. The Authority section of a CRN is between the second and third slash (\"mds1.example.com\" in “crn://mds1.example.com/kafka=*_/topic=*“). It may be left empty (as in “crn:///kafka=*_/topic=*“). A CRN pattern with an empty Authority section matches a CRN with ANY Authority. The converse is not true: A CRN pattern with a non-empty Authority will not match a CRN with an empty Authority. A resource with an empty Authority CRN can only be matched by a CRN pattern with an empty Authority. So an event on the resource with the CRN... “crn://confluent.cloud/kafka=abcde_FGHIJKL-01234567/topic=clicks“ ... would not match a route with pattern ... “crn://confluent.cloud/kafka=abcde_FGHIJKL-01234567“ ... because they do not have matching path element types. Once the most specific matching route for an event is determined, it is then matched within that route to exactly one event category, and then based on whether it was \"allowed\" or \"denied\", matched to exactly one destination topic (or discarded, if the rule's destination topic name is the empty string). If the category rule's destination topic is “null“ then it either falls through to the “default_topics“ (for “authentication“, “authorize“, and “management“ categories), or is discarded (which is the default for all other categories of events). Routes *map[string]AuditLogConfigRouteCategories `json:"routes,omitempty"` }
AuditLogConfigListRoutesResponse struct for AuditLogConfigListRoutesResponse
type AuditLogConfigMetadata ¶
type AuditLogConfigMetadata struct { // An opaque, server-generated marker, used to detect concurrent modification collisions. When submitting an update, the request will be rejected unless this value agrees with the version expected by the server. GET the current configuration first, to find out the expected “resource_version“. ResourceVersion string `json:"resource_version"` // When the audit log configuration was last modified. This value is set by the server, and ignored when submitted. UpdatedAt *time.Time `json:"updated_at,omitempty"` // When the server detects that the audit log configuration has been modified through another mechanism but is not sure when the modification occurred, the “updated_at“ property is renamed to “modified_since“. This value is set by the server, and ignored when submitted. ModifiedSince *time.Time `json:"modified_since,omitempty"` }
AuditLogConfigMetadata struct for AuditLogConfigMetadata
type AuditLogConfigResolveResourceRouteResponse ¶
type AuditLogConfigResolveResourceRouteResponse struct { // The Confluent resource name (CRN) pattern of the route, or else the string “\"default\"“. Route string `json:"route,omitempty"` Categories AuditLogConfigRouteCategories `json:"categories,omitempty"` }
AuditLogConfigResolveResourceRouteResponse struct for AuditLogConfigResolveResourceRouteResponse
type AuditLogConfigRouteCategories ¶
type AuditLogConfigRouteCategories struct { Other *AuditLogConfigRouteCategoryTopics `json:"other,omitempty"` Authentication *AuditLogConfigRouteCategoryTopics `json:"authentication,omitempty"` Authorize *AuditLogConfigRouteCategoryTopics `json:"authorize,omitempty"` Management *AuditLogConfigRouteCategoryTopics `json:"management,omitempty"` Produce *AuditLogConfigRouteCategoryTopics `json:"produce,omitempty"` Consume *AuditLogConfigRouteCategoryTopics `json:"consume,omitempty"` Interbroker *AuditLogConfigRouteCategoryTopics `json:"interbroker,omitempty"` Heartbeat *AuditLogConfigRouteCategoryTopics `json:"heartbeat,omitempty"` Describe *AuditLogConfigRouteCategoryTopics `json:"describe,omitempty"` }
AuditLogConfigRouteCategories Once the most specific matching route for an event is selected based on the event's associated resource (CRN), it is then matched within that route to exactly one event category rule, based on the category of event, and finally matched within the category rule to a logging destination based on whether the event was \"allowed\" or \"denied\". Event categories include “authorize“, “management“, “authentication“, “interbroker“, “produce“, “consume“, “heartbeat“, and “describe“. The “authorize“ category of events are those where the metadata service was asked to check whether the principal was authorized via RBAC to perform an operation on a resource. The “management“ category of events are those involving Kafka APIs that alter cluster or topic configuration settings, create, delete or modify topics or delegation tokens, initiate shutdown, etc. The “produce“, “consume“, “interbroker“, “heartbeat“, and “describe“ categories may include a potentially high volume of events. For example, every \"fetch\" request received by a Kafka broker from a Kafka consumer could result in one or more auditable events in the “consume“ category. Consider the possible write load on your audit log destination cluster before enabling audit logging for these categories. If the matched rule's logging destination is the empty string, the event is discarded. If the logging destination is “null“, matched events in the “authentication“, “authorize“ and “management“ categories will be routed to the corresponding entry in “default_topics“; but matched events in any other category will be discarded. Note: the “other“ category is deprecated and will be removed in a future version.
type AuditLogConfigRouteCategoryTopics ¶
type AuditLogConfigRouteCategoryTopics struct { // The name of one of the destination Kafka topics, defined elsewhere in the audit log configuration, that shall receive messages about attempted actions when they are \"allowed\" by the system based on security access policies. You can set this value to an empty string, to discard the events instead. You can set this value to “null“ (or omit this property) to use the default behavior. By default the “authentication“, “authorize“, and “management“ categories of events are routed according to the destination specified in “default_topics“. Events in all other categories are discarded by default. The empty string or a “null“ value are the only valid values other than one of the defined destination Kafka topic names. This route will only be selected for an event if the routing rule's CRN pattern matches the event's associated resource CRN, and its CRN pattern is the most specific among those that match the event. Allowed *string `json:"allowed"` // The name of one of the destination Kafka topics, defined elsewhere in the audit log configuration, that shall receive messages about attempted actions when they are \"denied\" by the system based on security access policies. You can set this value to an empty string, to discard the events instead. You can set this value to “null“ (or omit this property) to use the default behavior. By default the “authentication“, “authorize“, and “management“ categories of events are routed according to the destination specified in “default_topics“. Events in all other categories are discarded by default. The empty string or a “null“ value are the only valid values other than one of the defined destination Kafka topic names. This route will only be selected for an event if the routing rule's CRN pattern matches the event's associated resource CRN, and its CRN pattern is the most specific among those that match the event. Denied *string `json:"denied"` }
AuditLogConfigRouteCategoryTopics struct for AuditLogConfigRouteCategoryTopics
type AuditLogConfigSpec ¶
type AuditLogConfigSpec struct { Destinations AuditLogConfigDestinations `json:"destinations"` // A list of security principals to exclude from the audit log. The list may be empty. ExcludedPrincipals *[]string `json:"excluded_principals,omitempty"` DefaultTopics AuditLogConfigDefaultTopics `json:"default_topics"` // Events are matched to exactly one of these route patterns (or else to the “default_topics“). The route patterns can be any valid Confluent resource name (CRN), or even a CRN containing wildcards. The most specific pattern that matches an event will be chosen. Consider these example route patterns that match events on Kafka topic resources. They are ordered here from most to least specific: “crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=clicks“ “crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=*“ “crn://mds1.example.com/kafka=*_/topic=clicks“ “crn://mds1.example.com/kafka=*_/topic=*“ “crn:///kafka=abcde_FGHIJKL-01234567/topic=clicks“ “crn:///kafka=*_/topic=*“ For a CRN pattern to match a CRN, the Authority sections must match and the CRN pattern and the CRN must have all of the same path element types in the same order. The Authority section of a CRN is between the second and third slash (\"mds1.example.com\" in “crn://mds1.example.com/kafka=*_/topic=*“). It may be left empty (as in “crn:///kafka=*_/topic=*“). A CRN pattern with an empty Authority section matches a CRN with ANY Authority. The converse is not true: A CRN pattern with a non-empty Authority will not match a CRN with an empty Authority. A resource with an empty Authority CRN can only be matched by a CRN pattern with an empty Authority. So an event on the resource with the CRN... “crn://confluent.cloud/kafka=abcde_FGHIJKL-01234567/topic=clicks“ ... would not match a route with pattern ... “crn://confluent.cloud/kafka=abcde_FGHIJKL-01234567“ ... because they do not have matching path element types. Once the most specific matching route for an event is determined, it is then matched within that route to exactly one event category, and then based on whether it was \"allowed\" or \"denied\", matched to exactly one destination topic (or discarded, if the rule's destination topic name is the empty string). If the category rule's destination topic is “null“ then it either falls through to the “default_topics“ (for “authentication“, “authorize“, and “management“ categories), or is discarded (which is the default for all other categories of events). Routes *map[string]AuditLogConfigRouteCategories `json:"routes,omitempty"` Metadata *AuditLogConfigMetadata `json:"metadata"` }
AuditLogConfigSpec struct for AuditLogConfigSpec
type AuditLogConfigurationApi ¶
type AuditLogConfigurationApi interface { /* * GetConfig Get the entire audit log configuration, including the live retention time policy values (“retention_ms“) for the destination topics. * * Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return AuditLogConfigSpec */ GetConfig(ctx _context.Context) (AuditLogConfigSpec, *_nethttp.Response, error) /* * ListRoutes Lists all currently defined routes that match the queried resource or its sub-resources. * * Multiple routes may match a resource, but only the most specific route will be selected for events related to the resource. This endpoint returns all matching routes regardless of whether or not they would actually be selected, or ignored in favor of a more specific route. Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. Callable by Admins. The CRN patterns in the audit log config routes can contain wildcards. So a route with a CRN pattern like ``crn://mds.example.com/kafka=*_/topic=finance-*`` would match events associated with the topic at address ``crn://mds.example.com/kafka=abc123/topic=finance-deposits``, or events associated with the topic at ``crn://mds.example.com/kafka=xyz789/topic=finance-chargebacks``, but would not match events associated with the topic ``crn://mds.example.com/kafka=abc123/topic=server-deployments``. So a route's CRN pattern can match events from more than one resource, based on where the pattern's wildcards are. It is possible to write multiple routes with different CRN patterns that match a given resource's CRN. For example: the resource at ``crn://mds.example.com/kafka=abc123/topic=finance-chargebacks`` is matched by any of the following route CRN patterns: * ``crn://mds.example.com/kafka=*_/topic=*`` * ``crn://mds.example.com/kafka=abc123/topic=*`` * ``crn://mds.example.com/kafka=*_/topic=finance-*`` When there are multiple matching routes for an event, we select the matching route with the most specific CRN pattern. The most specific CRN pattern is the one with the greatest length before its first wildcard. So in the above example, ``crn://mds.example.com/kafka=abc123/topic=*`` wins. To break a tie, ignore the prefix that the patterns have in common. So, for example ``crn://mds.example.com/kafka=*_/topic=finance-*`` is more specific than ``crn://mds.example.com/kafka=*_/topic=*``. This endpoint lists all currently defined routes that match the queried resource or its sub-resources, regardless of whether or not they would actually be selected, or ignored in favor of a more specific route. A query pattern like ... ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test`` ... would match all of the following routes ... ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test/connector=from-db4`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test/connector=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=*_/connector=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=*`` ``crn://mds1.example.com/kafka=*_/connect=qa-*`` ``crn://mds1.example.com/kafka=*_/connect=qa-*_/connector=*`` ... but would not match any of these routes ... ``crn://mds1.example.com/kafka=*_/ksql=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=stg-*`` ``crn://mds1.example.com/kafka=zyxwv-UTSRQPO_98765432/connect=qa-*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=qa-*`` * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ListRoutesOpts - Optional Parameters: * @param "Q" (optional.String) - A Confluent resource name (CRN) . * @return AuditLogConfigListRoutesResponse */ ListRoutes(ctx _context.Context, localVarOptionals *ListRoutesOpts) (AuditLogConfigListRoutesResponse, *_nethttp.Response, error) /* * PutConfig Update the entire audit log configuration on the MDS cluster and all Kafka clusters known to the cluster registry. * * Also creates missing destination topics on the destination cluster and updates the retention time policy of destination topics, if necessary. Requires the \"AuditAdmin\" role on the MDS cluster and every Kafka cluster in the cluster registry. May result in a 409 conflict error status if the ``resource_version`` in the JSON body of the request does not match the current version. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param auditLogConfigSpec * @return AuditLogConfigSpec */ PutConfig(ctx _context.Context, auditLogConfigSpec AuditLogConfigSpec) (AuditLogConfigSpec, *_nethttp.Response, error) /* * ResolveResourceRoute Returns the route describing how messages regarding this CRN would be routed. * * Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. The CRN patterns in the audit log config routes can contain wildcards. So a route with a CRN pattern like ``crn://mds.example.com/kafka=*_/topic=finance-*`` would match events associated with the topic at address ``crn://mds.example.com/kafka=abc123/topic=finance-deposits``, or events associated with the topic at ``crn://mds.example.com/kafka=xyz789/topic=finance-chargebacks``, but would not match events associated with the topic ``crn://mds.example.com/kafka=abc123/topic=server-deployments``. So a route's CRN pattern can match events from more than one resource, based on where the pattern's wildcards are. It is possible to write multiple routes with different CRN patterns that match a given resource's CRN. For example: the resource at ``crn://mds.example.com/kafka=abc123/topic=finance-chargebacks`` is matched by any of the following route CRN patterns: * ``crn://mds.example.com/kafka=*_/topic=*`` * ``crn://mds.example.com/kafka=abc123/topic=*`` * ``crn://mds.example.com/kafka=*_/topic=finance-*`` When there are multiple matching routes for an event, we select the matching route with the most specific CRN pattern. The most specific CRN pattern is the one with the greatest length before its first wildcard. So in the above example, ``crn://mds.example.com/kafka=abc123/topic=*`` wins. To break a tie, ignore the prefix that the patterns have in common. So, for example ``crn://mds.example.com/kafka=*_/topic=finance-*`` is more specific than ``crn://mds.example.com/kafka=*_/topic=*``. This endpoint resolves the matching and precedence rules of all configured audit log routes for you, and returns the one selected (most specific) matching route describing how messages regarding the given CRN would be routed. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ResolveResourceRouteOpts - Optional Parameters: * @param "Crn" (optional.String) - A Confluent resource name (CRN). * @return AuditLogConfigResolveResourceRouteResponse */ ResolveResourceRoute(ctx _context.Context, localVarOptionals *ResolveResourceRouteOpts) (AuditLogConfigResolveResourceRouteResponse, *_nethttp.Response, error) }
type AuditLogConfigurationApiService ¶
type AuditLogConfigurationApiService service
AuditLogConfigurationApiService AuditLogConfigurationApi service
func (*AuditLogConfigurationApiService) GetConfig ¶
func (a *AuditLogConfigurationApiService) GetConfig(ctx _context.Context) (AuditLogConfigSpec, *_nethttp.Response, error)
* GetConfig Get the entire audit log configuration, including the live retention time policy values (“retention_ms“) for the destination topics. * * Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return AuditLogConfigSpec
func (*AuditLogConfigurationApiService) ListRoutes ¶
func (a *AuditLogConfigurationApiService) ListRoutes(ctx _context.Context, localVarOptionals *ListRoutesOpts) (AuditLogConfigListRoutesResponse, *_nethttp.Response, error)
* ListRoutes Lists all currently defined routes that match the queried resource or its sub-resources. * * Multiple routes may match a resource, but only the most specific route will be selected for events related to the resource. This endpoint returns all matching routes regardless of whether or not they would actually be selected, or ignored in favor of a more specific route. Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. Callable by Admins. The CRN patterns in the audit log config routes can contain wildcards. So a route with a CRN pattern like ``crn://mds.example.com/kafka=*_/topic=finance-*`` would match events associated with the topic at address ``crn://mds.example.com/kafka=abc123/topic=finance-deposits``, or events associated with the topic at ``crn://mds.example.com/kafka=xyz789/topic=finance-chargebacks``, but would not match events associated with the topic ``crn://mds.example.com/kafka=abc123/topic=server-deployments``. So a route's CRN pattern can match events from more than one resource, based on where the pattern's wildcards are. It is possible to write multiple routes with different CRN patterns that match a given resource's CRN. For example: the resource at ``crn://mds.example.com/kafka=abc123/topic=finance-chargebacks`` is matched by any of the following route CRN patterns: * ``crn://mds.example.com/kafka=*_/topic=*`` * ``crn://mds.example.com/kafka=abc123/topic=*`` * ``crn://mds.example.com/kafka=*_/topic=finance-*`` When there are multiple matching routes for an event, we select the matching route with the most specific CRN pattern. The most specific CRN pattern is the one with the greatest length before its first wildcard. So in the above example, ``crn://mds.example.com/kafka=abc123/topic=*`` wins. To break a tie, ignore the prefix that the patterns have in common. So, for example ``crn://mds.example.com/kafka=*_/topic=finance-*`` is more specific than ``crn://mds.example.com/kafka=*_/topic=*``. This endpoint lists all currently defined routes that match the queried resource or its sub-resources, regardless of whether or not they would actually be selected, or ignored in favor of a more specific route. A query pattern like ... ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test`` ... would match all of the following routes ... ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test/connector=from-db4`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-test/connector=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=*_/connector=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=qa-*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=*`` ``crn://mds1.example.com/kafka=*_/connect=qa-*`` ``crn://mds1.example.com/kafka=*_/connect=qa-*_/connector=*`` ... but would not match any of these routes ... ``crn://mds1.example.com/kafka=*_/ksql=*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/connect=stg-*`` ``crn://mds1.example.com/kafka=zyxwv-UTSRQPO_98765432/connect=qa-*`` ``crn://mds1.example.com/kafka=abcde_FGHIJKL-01234567/topic=qa-*`` * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ListRoutesOpts - Optional Parameters: * @param "Q" (optional.String) - A Confluent resource name (CRN) . * @return AuditLogConfigListRoutesResponse
func (*AuditLogConfigurationApiService) PutConfig ¶
func (a *AuditLogConfigurationApiService) PutConfig(ctx _context.Context, auditLogConfigSpec AuditLogConfigSpec) (AuditLogConfigSpec, *_nethttp.Response, error)
* PutConfig Update the entire audit log configuration on the MDS cluster and all Kafka clusters known to the cluster registry. * * Also creates missing destination topics on the destination cluster and updates the retention time policy of destination topics, if necessary. Requires the \"AuditAdmin\" role on the MDS cluster and every Kafka cluster in the cluster registry. May result in a 409 conflict error status if the ``resource_version`` in the JSON body of the request does not match the current version. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param auditLogConfigSpec * @return AuditLogConfigSpec
func (*AuditLogConfigurationApiService) ResolveResourceRoute ¶
func (a *AuditLogConfigurationApiService) ResolveResourceRoute(ctx _context.Context, localVarOptionals *ResolveResourceRouteOpts) (AuditLogConfigResolveResourceRouteResponse, *_nethttp.Response, error)
* ResolveResourceRoute Returns the route describing how messages regarding this CRN would be routed. * * Requires the \"AuditAdmin\" role on the metadata service (MDS) cluster and every Kafka cluster in the cluster registry. The CRN patterns in the audit log config routes can contain wildcards. So a route with a CRN pattern like ``crn://mds.example.com/kafka=*_/topic=finance-*`` would match events associated with the topic at address ``crn://mds.example.com/kafka=abc123/topic=finance-deposits``, or events associated with the topic at ``crn://mds.example.com/kafka=xyz789/topic=finance-chargebacks``, but would not match events associated with the topic ``crn://mds.example.com/kafka=abc123/topic=server-deployments``. So a route's CRN pattern can match events from more than one resource, based on where the pattern's wildcards are. It is possible to write multiple routes with different CRN patterns that match a given resource's CRN. For example: the resource at ``crn://mds.example.com/kafka=abc123/topic=finance-chargebacks`` is matched by any of the following route CRN patterns: * ``crn://mds.example.com/kafka=*_/topic=*`` * ``crn://mds.example.com/kafka=abc123/topic=*`` * ``crn://mds.example.com/kafka=*_/topic=finance-*`` When there are multiple matching routes for an event, we select the matching route with the most specific CRN pattern. The most specific CRN pattern is the one with the greatest length before its first wildcard. So in the above example, ``crn://mds.example.com/kafka=abc123/topic=*`` wins. To break a tie, ignore the prefix that the patterns have in common. So, for example ``crn://mds.example.com/kafka=*_/topic=finance-*`` is more specific than ``crn://mds.example.com/kafka=*_/topic=*``. This endpoint resolves the matching and precedence rules of all configured audit log routes for you, and returns the one selected (most specific) matching route describing how messages regarding the given CRN would be routed. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ResolveResourceRouteOpts - Optional Parameters: * @param "Crn" (optional.String) - A Confluent resource name (CRN). * @return AuditLogConfigResolveResourceRouteResponse
type AuthenticationResponse ¶
type AuthenticationResponse struct { AuthToken string `json:"auth_token,omitempty"` TokenType string `json:"token_type,omitempty"` ExpiresIn float32 `json:"expires_in,omitempty"` }
AuthenticationResponse struct for AuthenticationResponse
type AuthorizationApi ¶
type AuthorizationApi interface { /* * Authorize Authorize operations against resourceType for a given user. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param authorizeRequest * @return []string */ Authorize(ctx _context.Context, authorizeRequest AuthorizeRequest) ([]string, *_nethttp.Response, error) }
type AuthorizationApiService ¶
type AuthorizationApiService service
AuthorizationApiService AuthorizationApi service
func (*AuthorizationApiService) Authorize ¶
func (a *AuthorizationApiService) Authorize(ctx _context.Context, authorizeRequest AuthorizeRequest) ([]string, *_nethttp.Response, error)
* Authorize Authorize operations against resourceType for a given user. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param authorizeRequest * @return []string
type AuthorizeRequest ¶
type AuthorizeRequest struct { // The 'target' user principal. UserPrincipal string `json:"userPrincipal"` // Actions to authorize. Actions []Action `json:"actions"` }
AuthorizeRequest struct for AuthorizeRequest
type BasicAuth ¶
type BasicAuth struct { UserName string `json:"userName,omitempty"` Password string `json:"password,omitempty"` }
BasicAuth provides basic http authentication to a request passed via context using ContextBasicAuth
type CheckDeviceAuthRequest ¶
type CheckDeviceAuthRequest struct { // The user code associated with the authentication request UserCode string `json:"user_code"` // An encrypted key to check the status of authentication Key string `json:"key"` }
CheckDeviceAuthRequest struct for CheckDeviceAuthRequest
type CheckDeviceAuthResponse ¶
type CheckDeviceAuthResponse struct { // The user code associated with the authentication request UserCode string `json:"user_code,omitempty"` // Indicates whether the authentication is complete or error happened Complete bool `json:"complete,omitempty"` // The error message, if some error happened Error string `json:"error,omitempty"` // The status of the authentication process Status string `json:"status,omitempty"` // A description of the error or status Description string `json:"description,omitempty"` // The authentication token, if available AuthToken string `json:"auth_token,omitempty"` // The encrypted refresh token, if available RefreshToken string `json:"refresh_token,omitempty"` // The duration (in seconds) for which the token is valid ExpiresIn int32 `json:"expires_in,omitempty"` }
CheckDeviceAuthResponse struct for CheckDeviceAuthResponse
type ClusterAccessInfo ¶
type ClusterAccessInfo struct { Cluster []string `json:"cluster,omitempty"` Resources map[string]map[string][]string `json:"resources,omitempty"` }
ClusterAccessInfo struct for ClusterAccessInfo
type ClusterInfo ¶
type ClusterInfo struct { ClusterName string `json:"clusterName,omitempty"` Scope Scope `json:"scope,omitempty"` Hosts []HostInfo `json:"hosts,omitempty"` Protocol Protocol `json:"protocol,omitempty"` }
ClusterInfo struct for ClusterInfo
type ClusterRegistryApi ¶
type ClusterRegistryApi interface { /* * ClusterRegistryList Returns a list of all clusters in the registry, optionally filtered by cluster type. * * If the calling principal doesn't have permissions to see the full cluster info, some information (\"hosts\", \"protocol\", etc) is redacted. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ClusterRegistryListOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Optionally filter down by cluster type. * @return []ClusterInfo */ ClusterRegistryList(ctx _context.Context, localVarOptionals *ClusterRegistryListOpts) ([]ClusterInfo, *_nethttp.Response, error) /* * DeleteNamedCluster Remove a named cluster from the registry. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterName The name of cluster (ASCII printable characters without spaces). */ DeleteNamedCluster(ctx _context.Context, clusterName string) (*_nethttp.Response, error) /* * GetNamedCluster Returns the information for a single named cluster, assuming the cluster exists and is visible to the calling principal. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterName The name of cluster (ASCII printable characters without spaces). * @return ClusterInfo */ GetNamedCluster(ctx _context.Context, clusterName string) (ClusterInfo, *_nethttp.Response, error) /* * UpdateClusters Define/overwrite named clusters. * * May result in a 409 Conflict if the name and scope combination of any cluster conflicts with existing clusters in the registry. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterInfo */ UpdateClusters(ctx _context.Context, clusterInfo []ClusterInfo) (*_nethttp.Response, error) }
type ClusterRegistryApiService ¶
type ClusterRegistryApiService service
ClusterRegistryApiService ClusterRegistryApi service
func (*ClusterRegistryApiService) ClusterRegistryList ¶
func (a *ClusterRegistryApiService) ClusterRegistryList(ctx _context.Context, localVarOptionals *ClusterRegistryListOpts) ([]ClusterInfo, *_nethttp.Response, error)
* ClusterRegistryList Returns a list of all clusters in the registry, optionally filtered by cluster type. * * If the calling principal doesn't have permissions to see the full cluster info, some information (\"hosts\", \"protocol\", etc) is redacted. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param optional nil or *ClusterRegistryListOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Optionally filter down by cluster type. * @return []ClusterInfo
func (*ClusterRegistryApiService) DeleteNamedCluster ¶
func (a *ClusterRegistryApiService) DeleteNamedCluster(ctx _context.Context, clusterName string) (*_nethttp.Response, error)
* DeleteNamedCluster Remove a named cluster from the registry. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterName The name of cluster (ASCII printable characters without spaces).
func (*ClusterRegistryApiService) GetNamedCluster ¶
func (a *ClusterRegistryApiService) GetNamedCluster(ctx _context.Context, clusterName string) (ClusterInfo, *_nethttp.Response, error)
* GetNamedCluster Returns the information for a single named cluster, assuming the cluster exists and is visible to the calling principal. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterName The name of cluster (ASCII printable characters without spaces). * @return ClusterInfo
func (*ClusterRegistryApiService) UpdateClusters ¶
func (a *ClusterRegistryApiService) UpdateClusters(ctx _context.Context, clusterInfo []ClusterInfo) (*_nethttp.Response, error)
* UpdateClusters Define/overwrite named clusters. * * May result in a 409 Conflict if the name and scope combination of any cluster conflicts with existing clusters in the registry. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param clusterInfo
type ClusterRegistryListOpts ¶
ClusterRegistryListOpts Optional parameters for the method 'ClusterRegistryList'
type ClusterVisibility ¶
type ClusterVisibility struct { Id string `json:"id,omitempty"` Visible bool `json:"visible,omitempty"` ClusterName *string `json:"clusterName,omitempty"` }
ClusterVisibility struct for ClusterVisibility
type Configuration ¶
type Configuration struct { BasePath string `json:"basePath,omitempty"` Host string `json:"host,omitempty"` Scheme string `json:"scheme,omitempty"` DefaultHeader map[string]string `json:"defaultHeader,omitempty"` UserAgent string `json:"userAgent,omitempty"` Debug bool `json:"debug,omitempty"` Servers []ServerConfiguration HTTPClient *http.Client }
Configuration stores the configuration of the API client
func NewConfiguration ¶
func NewConfiguration() *Configuration
NewConfiguration returns a new Configuration object
func (*Configuration) AddDefaultHeader ¶
func (c *Configuration) AddDefaultHeader(key string, value string)
AddDefaultHeader adds a new HTTP header to the default header in the request
type CreateAclRequest ¶
type CreateAclRequest struct { Scope KafkaScope `json:"scope"` AclBinding AclBinding `json:"aclBinding"` }
CreateAclRequest struct for CreateAclRequest
type ErrorDetail ¶
type ErrorDetail struct { ErrorType string `json:"error_type"` Message string `json:"message,omitempty"` }
ErrorDetail struct for ErrorDetail
type ErrorResponse ¶
type ErrorResponse struct { // Optional - http status code StatusCode int32 `json:"status_code,omitempty"` // Optional - Kafka error code (typically 5 digits) ErrorCode int32 `json:"error_code,omitempty"` // Optional - Type of error Type string `json:"type,omitempty"` // Required - Top level error message Message string `json:"message"` // Optional - List of errors Errors []ErrorDetail `json:"errors,omitempty"` }
ErrorResponse struct for ErrorResponse
type ExtendAuthRequest ¶
type ExtendAuthRequest struct { // The auth token received from the device authentication AccessToken string `json:"access_token,omitempty"` // The encrypted refresh token RefreshToken string `json:"refresh_token,omitempty"` }
ExtendAuthRequest struct for ExtendAuthRequest
type ExtendAuthResponse ¶
type ExtendAuthResponse struct { // The authentication token AuthToken string `json:"auth_token,omitempty"` // The duration (in seconds) for which the token is valid ExpiresIn int64 `json:"expires_in,omitempty"` }
ExtendAuthResponse struct for ExtendAuthResponse
type FeaturesInfo ¶
type FeaturesInfo struct { Features map[string]bool `json:"features,omitempty"` Legend map[string]string `json:"legend,omitempty"` }
FeaturesInfo struct for FeaturesInfo
type GenericOpenAPIError ¶
type GenericOpenAPIError struct {
// contains filtered or unexported fields
}
GenericOpenAPIError Provides access to the body, error and model on returned errors.
func (GenericOpenAPIError) Body ¶
func (e GenericOpenAPIError) Body() []byte
Body returns the raw bytes of the response
func (GenericOpenAPIError) Error ¶
func (e GenericOpenAPIError) Error() string
Error returns non-empty string if there was an error.
func (GenericOpenAPIError) Model ¶
func (e GenericOpenAPIError) Model() interface{}
Model returns the unpacked model of the error
type InitDeviceAuthResponse ¶
type InitDeviceAuthResponse struct { // The user code for device authentication UserCode string `json:"user_code,omitempty"` // The verification URI for the user to visit VerificationUri string `json:"verification_uri,omitempty"` // The key to be used for checking authentication Key string `json:"key,omitempty"` // The interval for polling to check authentication Interval int32 `json:"interval,omitempty"` // The validity of verification URI in seconds. User must authorize within this time ExpiresIn float32 `json:"expires_in,omitempty"` }
InitDeviceAuthResponse struct for InitDeviceAuthResponse
type KafkaACLManagementApi ¶
type KafkaACLManagementApi interface { /* * AddAclBinding Creates Kafka ACLs for given AclBinding. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param createAclRequest */ AddAclBinding(ctx _context.Context, createAclRequest CreateAclRequest) (*_nethttp.Response, error) /* * RemoveAclBindings Deletes Kafka ACLs according to the supplied filter. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param aclFilterRequest * @return []AclBinding */ RemoveAclBindings(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error) /* * SearchAclBinding Lists Kafka ACLs according to the supplied filter. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param aclFilterRequest * @return []AclBinding */ SearchAclBinding(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error) }
type KafkaACLManagementApiService ¶
type KafkaACLManagementApiService service
KafkaACLManagementApiService KafkaACLManagementApi service
func (*KafkaACLManagementApiService) AddAclBinding ¶
func (a *KafkaACLManagementApiService) AddAclBinding(ctx _context.Context, createAclRequest CreateAclRequest) (*_nethttp.Response, error)
* AddAclBinding Creates Kafka ACLs for given AclBinding. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param createAclRequest
func (*KafkaACLManagementApiService) RemoveAclBindings ¶
func (a *KafkaACLManagementApiService) RemoveAclBindings(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error)
* RemoveAclBindings Deletes Kafka ACLs according to the supplied filter. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param aclFilterRequest * @return []AclBinding
func (*KafkaACLManagementApiService) SearchAclBinding ¶
func (a *KafkaACLManagementApiService) SearchAclBinding(ctx _context.Context, aclFilterRequest AclFilterRequest) ([]AclBinding, *_nethttp.Response, error)
* SearchAclBinding Lists Kafka ACLs according to the supplied filter. * * Callable by Admins+AclUsers. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param aclFilterRequest * @return []AclBinding
type KafkaResourcePattern ¶
type KafkaResourcePattern struct { ResourceType AclResourceType `json:"resourceType"` Name string `json:"name"` PatternType PatternType `json:"patternType"` }
KafkaResourcePattern struct for KafkaResourcePattern
type KafkaResourcePatternFilter ¶
type KafkaResourcePatternFilter struct { ResourceType AclResourceType `json:"resourceType"` Name string `json:"name,omitempty"` PatternType PatternType `json:"patternType"` }
KafkaResourcePatternFilter struct for KafkaResourcePatternFilter
type KafkaScope ¶
type KafkaScope struct {
Clusters KafkaScopeClusters `json:"clusters"`
}
KafkaScope struct for KafkaScope
type KafkaScopeClusters ¶
type KafkaScopeClusters struct {
KafkaCluster string `json:"kafka-cluster"`
}
KafkaScopeClusters struct for KafkaScopeClusters
type ListManagedClustersOpts ¶
ListManagedClustersOpts Optional parameters for the method 'ListManagedClusters'
type ListRoutesOpts ¶
ListRoutesOpts Optional parameters for the method 'ListRoutes'
type ManagedResourceBinding ¶
type ManagedResourceBinding struct { Role string `json:"role,omitempty"` ResourceType string `json:"resourceType,omitempty"` ResourceName string `json:"resourceName,omitempty"` ResourcePattern string `json:"resourcePattern,omitempty"` AlterAccess bool `json:"alterAccess,omitempty"` }
ManagedResourceBinding struct for ManagedResourceBinding
type ManagedRoleBindings ¶
type ManagedRoleBindings struct { Scope Scope `json:"scope,omitempty"` ClusterRoleBindings map[string]map[string][]string `json:"cluster_role_bindings,omitempty"` ResourceRoleBindings map[string]map[string][]ManagedResourceBinding `json:"resource_role_bindings,omitempty"` }
ManagedRoleBindings struct for ManagedRoleBindings
type ManagedRoleBindingsOpts ¶
ManagedRoleBindingsOpts Optional parameters for the method 'ManagedRoleBindings'
type MdsScope ¶
type MdsScope struct { ClusterName string `json:"clusterName,omitempty"` Clusters ScopeClusters `json:"clusters,omitempty"` }
MdsScope struct for MdsScope
type MetadataServiceOperationsApi ¶
type MetadataServiceOperationsApi interface { /* * Activenodes Returns all the nodes running the Metadata Service REST API. * * Clients are expected to round robin call to these endpoints if they don't set up a load balancer in front of the Metadata Service nodes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param protocol Should be \"http\" or \"https\". * @return []string */ Activenodes(ctx _context.Context, protocol string) ([]string, *_nethttp.Response, error) /* * Features What features the running version of MDS supports. * * This endpoint does not require authentication. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return FeaturesInfo */ Features(ctx _context.Context) (FeaturesInfo, *_nethttp.Response, error) /* * MetadataClusterId Returns the ID of the Kafka cluster that MDS is running on. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return string */ MetadataClusterId(ctx _context.Context) (string, *_nethttp.Response, error) }
type MetadataServiceOperationsApiService ¶
type MetadataServiceOperationsApiService service
MetadataServiceOperationsApiService MetadataServiceOperationsApi service
func (*MetadataServiceOperationsApiService) Activenodes ¶
func (a *MetadataServiceOperationsApiService) Activenodes(ctx _context.Context, protocol string) ([]string, *_nethttp.Response, error)
* Activenodes Returns all the nodes running the Metadata Service REST API. * * Clients are expected to round robin call to these endpoints if they don't set up a load balancer in front of the Metadata Service nodes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param protocol Should be \"http\" or \"https\". * @return []string
func (*MetadataServiceOperationsApiService) Features ¶
func (a *MetadataServiceOperationsApiService) Features(ctx _context.Context) (FeaturesInfo, *_nethttp.Response, error)
* Features What features the running version of MDS supports. * * This endpoint does not require authentication. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return FeaturesInfo
func (*MetadataServiceOperationsApiService) MetadataClusterId ¶
func (a *MetadataServiceOperationsApiService) MetadataClusterId(ctx _context.Context) (string, *_nethttp.Response, error)
* MetadataClusterId Returns the ID of the Kafka cluster that MDS is running on. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return string
type MyRoleBindingsAllOpts ¶
MyRoleBindingsAllOpts Optional parameters for the method 'MyRoleBindingsAll'
type Operation ¶
type Operation struct { ResourceType string `json:"resourceType,omitempty"` Operations []string `json:"operations,omitempty"` }
Operation struct for Operation
type PatternType ¶
type PatternType string
PatternType the model 'PatternType'
const ( PATTERNTYPE_UNKNOWN PatternType = "UNKNOWN" PATTERNTYPE_ANY PatternType = "ANY" PATTERNTYPE_MATCH PatternType = "MATCH" PATTERNTYPE_LITERAL PatternType = "LITERAL" PATTERNTYPE_PREFIXED PatternType = "PREFIXED" )
List of PatternType
type PrivateRBACUICachedUserStoreInformationApi ¶
type PrivateRBACUICachedUserStoreInformationApi interface { /* * UsersGroupsList List of MDS cached users and groups. * * For use by a rolebinding admin on the provided scope. Callable by Admins+ResourceOwners, but not broker super.users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param scope * @param optional nil or *UsersGroupsListOpts - Optional Parameters: * @param "Type_" (optional.String) - The type of principals requested. * @return []string */ UsersGroupsList(ctx _context.Context, scope Scope, localVarOptionals *UsersGroupsListOpts) ([]string, *_nethttp.Response, error) }
type PrivateRBACUICachedUserStoreInformationApiService ¶
type PrivateRBACUICachedUserStoreInformationApiService service
PrivateRBACUICachedUserStoreInformationApiService PrivateRBACUICachedUserStoreInformationApi service
func (*PrivateRBACUICachedUserStoreInformationApiService) UsersGroupsList ¶
func (a *PrivateRBACUICachedUserStoreInformationApiService) UsersGroupsList(ctx _context.Context, scope Scope, localVarOptionals *UsersGroupsListOpts) ([]string, *_nethttp.Response, error)
* UsersGroupsList List of MDS cached users and groups. * * For use by a rolebinding admin on the provided scope. Callable by Admins+ResourceOwners, but not broker super.users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param scope * @param optional nil or *UsersGroupsListOpts - Optional Parameters: * @param "Type_" (optional.String) - The type of principals requested. * @return []string
type PrivateRBACUIClusterVisibilityApi ¶
type PrivateRBACUIClusterVisibilityApi interface { /* * ListManagedClusters Identifies the scopes for the rolebindings that a user can see. * * May include rolebindings from scopes and clusters that never existed or previously existed (in other words, rolebindings that have been decommissioned, but are still defined in the system). Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param optional nil or *ListManagedClustersOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Filter down by cluster type. * @return []Scope */ ListManagedClusters(ctx _context.Context, principal string, localVarOptionals *ListManagedClustersOpts) ([]Scope, *_nethttp.Response, error) /* * Visibility Endpoint for Confluent Control Center to determine visibilty of Kafka and its sub-clusters for the specifed principal. * * The intent is that this endpoint is called with cluster IDs that actually exist. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param visibilityRequest * @return VisibilityResponse */ Visibility(ctx _context.Context, principal string, visibilityRequest []VisibilityRequest) (VisibilityResponse, *_nethttp.Response, error) }
type PrivateRBACUIClusterVisibilityApiService ¶
type PrivateRBACUIClusterVisibilityApiService service
PrivateRBACUIClusterVisibilityApiService PrivateRBACUIClusterVisibilityApi service
func (*PrivateRBACUIClusterVisibilityApiService) ListManagedClusters ¶
func (a *PrivateRBACUIClusterVisibilityApiService) ListManagedClusters(ctx _context.Context, principal string, localVarOptionals *ListManagedClustersOpts) ([]Scope, *_nethttp.Response, error)
* ListManagedClusters Identifies the scopes for the rolebindings that a user can see. * * May include rolebindings from scopes and clusters that never existed or previously existed (in other words, rolebindings that have been decommissioned, but are still defined in the system). Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param optional nil or *ListManagedClustersOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Filter down by cluster type. * @return []Scope
func (*PrivateRBACUIClusterVisibilityApiService) Visibility ¶
func (a *PrivateRBACUIClusterVisibilityApiService) Visibility(ctx _context.Context, principal string, visibilityRequest []VisibilityRequest) (VisibilityResponse, *_nethttp.Response, error)
* Visibility Endpoint for Confluent Control Center to determine visibilty of Kafka and its sub-clusters for the specifed principal. * * The intent is that this endpoint is called with cluster IDs that actually exist. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param visibilityRequest * @return VisibilityResponse
type PrivateRBACUICreationGuidelinesApi ¶
type PrivateRBACUICreationGuidelinesApi interface { /* * LookupCreateGuidelines Summarizes what resources and rolebindings this principal is allowed to create. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param resourceType The type of resource to create or the type of resource to specify when creating a new rolebinding. * @param operation \"Create\" for creating an actual resource, \"AlterAccess\" for creating a rolebinding for a user. * @param scope * @return map[string]interface{} */ LookupCreateGuidelines(ctx _context.Context, principal string, resourceType string, operation string, scope Scope) (map[string]interface{}, *_nethttp.Response, error) }
type PrivateRBACUICreationGuidelinesApiService ¶
type PrivateRBACUICreationGuidelinesApiService service
PrivateRBACUICreationGuidelinesApiService PrivateRBACUICreationGuidelinesApi service
func (*PrivateRBACUICreationGuidelinesApiService) LookupCreateGuidelines ¶
func (a *PrivateRBACUICreationGuidelinesApiService) LookupCreateGuidelines(ctx _context.Context, principal string, resourceType string, operation string, scope Scope) (map[string]interface{}, *_nethttp.Response, error)
* LookupCreateGuidelines Summarizes what resources and rolebindings this principal is allowed to create. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param resourceType The type of resource to create or the type of resource to specify when creating a new rolebinding. * @param operation \"Create\" for creating an actual resource, \"AlterAccess\" for creating a rolebinding for a user. * @param scope * @return map[string]interface{}
type PrivateRBACUIManageRoleBindingsApi ¶
type PrivateRBACUIManageRoleBindingsApi interface { /* * ClusterAccessInfo Identify the rolebinding abilities (view vs manage) the user has on the specified scope. * * Used by the Confluent Control Center UI to control access to rolebinding add/remove buttons. Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @return ClusterAccessInfo */ ClusterAccessInfo(ctx _context.Context, principal string, scope Scope) (ClusterAccessInfo, *_nethttp.Response, error) /* * ManagedRoleBindings Identify the rolebindings this user can see and manage. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @param optional nil or *ManagedRoleBindingsOpts - Optional Parameters: * @param "ResourceType" (optional.String) - Filter down by resource type. * @return ManagedRoleBindings */ ManagedRoleBindings(ctx _context.Context, principal string, scope Scope, localVarOptionals *ManagedRoleBindingsOpts) (ManagedRoleBindings, *_nethttp.Response, error) }
type PrivateRBACUIManageRoleBindingsApiService ¶
type PrivateRBACUIManageRoleBindingsApiService service
PrivateRBACUIManageRoleBindingsApiService PrivateRBACUIManageRoleBindingsApi service
func (*PrivateRBACUIManageRoleBindingsApiService) ClusterAccessInfo ¶
func (a *PrivateRBACUIManageRoleBindingsApiService) ClusterAccessInfo(ctx _context.Context, principal string, scope Scope) (ClusterAccessInfo, *_nethttp.Response, error)
* ClusterAccessInfo Identify the rolebinding abilities (view vs manage) the user has on the specified scope. * * Used by the Confluent Control Center UI to control access to rolebinding add/remove buttons. Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @return ClusterAccessInfo
func (*PrivateRBACUIManageRoleBindingsApiService) ManagedRoleBindings ¶
func (a *PrivateRBACUIManageRoleBindingsApiService) ManagedRoleBindings(ctx _context.Context, principal string, scope Scope, localVarOptionals *ManagedRoleBindingsOpts) (ManagedRoleBindings, *_nethttp.Response, error)
* ManagedRoleBindings Identify the rolebindings this user can see and manage. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @param optional nil or *ManagedRoleBindingsOpts - Optional Parameters: * @param "ResourceType" (optional.String) - Filter down by resource type. * @return ManagedRoleBindings
type PrivateRBACUIMyRoleBindingsApi ¶
type PrivateRBACUIMyRoleBindingsApi interface { /* * MyRoleBindingsAll List all rolebindings for the specifed principal for all scopes and clusters that have any rolebindings. * * Be aware that this simply looks at the rolebinding data, and does not mean that the clusters actually exist. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param optional nil or *MyRoleBindingsAllOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Filter down by a cluster type. * @return []ScopeRoleBindingMapping */ MyRoleBindingsAll(ctx _context.Context, principal string, localVarOptionals *MyRoleBindingsAllOpts) ([]ScopeRoleBindingMapping, *_nethttp.Response, error) /* * MyRoleBindingsSingleScope List all rolebindings for the specifed principal and scope. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @return ScopeRoleBindingMapping */ MyRoleBindingsSingleScope(ctx _context.Context, principal string, scope Scope) (ScopeRoleBindingMapping, *_nethttp.Response, error) }
type PrivateRBACUIMyRoleBindingsApiService ¶
type PrivateRBACUIMyRoleBindingsApiService service
PrivateRBACUIMyRoleBindingsApiService PrivateRBACUIMyRoleBindingsApi service
func (*PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsAll ¶
func (a *PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsAll(ctx _context.Context, principal string, localVarOptionals *MyRoleBindingsAllOpts) ([]ScopeRoleBindingMapping, *_nethttp.Response, error)
* MyRoleBindingsAll List all rolebindings for the specifed principal for all scopes and clusters that have any rolebindings. * * Be aware that this simply looks at the rolebinding data, and does not mean that the clusters actually exist. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param optional nil or *MyRoleBindingsAllOpts - Optional Parameters: * @param "ClusterType" (optional.String) - Filter down by a cluster type. * @return []ScopeRoleBindingMapping
func (*PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsSingleScope ¶
func (a *PrivateRBACUIMyRoleBindingsApiService) MyRoleBindingsSingleScope(ctx _context.Context, principal string, scope Scope) (ScopeRoleBindingMapping, *_nethttp.Response, error)
* MyRoleBindingsSingleScope List all rolebindings for the specifed principal and scope. * * Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param scope * @return ScopeRoleBindingMapping
type RBACRoleBindingCRUDApi ¶
type RBACRoleBindingCRUDApi interface { /* * AddRoleForPrincipal Binds the principal to a cluster-scoped role for a specific cluster or in the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the cluster-scoped role to bind the user to. * @param mdsScope */ AddRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error) /* * AddRoleResourcesForPrincipal Incrementally grant the resources to the principal at the given scope/cluster using the given role. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest */ AddRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error) /* * DeleteRoleForPrincipal Remove the role (cluster or resource scoped) from the principal at the given scope/cluster. * * No-op if the user doesn't have the role. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param mdsScope */ DeleteRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error) /* * GetRoleResourcesForPrincipal Look up the rolebindings for the principal at the given scope/cluster using the given role. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param mdsScope * @return []ResourcePattern */ GetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) ([]ResourcePattern, *_nethttp.Response, error) /* * RemoveRoleResourcesForPrincipal Incrementally remove the resources from the principal at the given scope/cluster using the given role. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest */ RemoveRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error) /* * SetRoleResourcesForPrincipal Overwrite existing resource grants. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest */ SetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error) }
type RBACRoleBindingCRUDApiService ¶
type RBACRoleBindingCRUDApiService service
RBACRoleBindingCRUDApiService RBACRoleBindingCRUDApi service
func (*RBACRoleBindingCRUDApiService) AddRoleForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) AddRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error)
* AddRoleForPrincipal Binds the principal to a cluster-scoped role for a specific cluster or in the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the cluster-scoped role to bind the user to. * @param mdsScope
func (*RBACRoleBindingCRUDApiService) AddRoleResourcesForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) AddRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error)
* AddRoleResourcesForPrincipal Incrementally grant the resources to the principal at the given scope/cluster using the given role. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest
func (*RBACRoleBindingCRUDApiService) DeleteRoleForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) DeleteRoleForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) (*_nethttp.Response, error)
* DeleteRoleForPrincipal Remove the role (cluster or resource scoped) from the principal at the given scope/cluster. * * No-op if the user doesn't have the role. Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param mdsScope
func (*RBACRoleBindingCRUDApiService) GetRoleResourcesForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) GetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, mdsScope MdsScope) ([]ResourcePattern, *_nethttp.Response, error)
* GetRoleResourcesForPrincipal Look up the rolebindings for the principal at the given scope/cluster using the given role. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param mdsScope * @return []ResourcePattern
func (*RBACRoleBindingCRUDApiService) RemoveRoleResourcesForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) RemoveRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error)
* RemoveRoleResourcesForPrincipal Incrementally remove the resources from the principal at the given scope/cluster using the given role. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest
func (*RBACRoleBindingCRUDApiService) SetRoleResourcesForPrincipal ¶
func (a *RBACRoleBindingCRUDApiService) SetRoleResourcesForPrincipal(ctx _context.Context, principal string, roleName string, resourcesRequest ResourcesRequest) (*_nethttp.Response, error)
* SetRoleResourcesForPrincipal Overwrite existing resource grants. * * Callable by Admins+ResourceOwners. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param roleName The name of the role. * @param resourcesRequest
type RBACRoleBindingSummariesApi ¶
type RBACRoleBindingSummariesApi interface { /* * LookupPrincipalsWithRole Look up the KafkaPrincipals who have the given role for the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @param mdsScope * @return []string */ LookupPrincipalsWithRole(ctx _context.Context, roleName string, mdsScope MdsScope) ([]string, *_nethttp.Response, error) /* * LookupPrincipalsWithRoleOnResource Look up the KafkaPrincipals who have the given role on the specified resource for the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @param resourceType Type of resource to look up. * @param resourceName Name of resource to look up. * @param mdsScope * @return []string */ LookupPrincipalsWithRoleOnResource(ctx _context.Context, roleName string, resourceType string, resourceName string, mdsScope MdsScope) ([]string, *_nethttp.Response, error) /* * LookupResourcesForPrincipal Look up the resource bindings for the principal at the given scope/cluster. * * Includes bindings from groups that the user belongs to. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param mdsScope * @return map[string]map[string][]ResourcePattern */ LookupResourcesForPrincipal(ctx _context.Context, principal string, mdsScope MdsScope) (map[string]map[string][]ResourcePattern, *_nethttp.Response, error) /* * ScopedPrincipalRolenames Returns the effective list of role names for a principal. * * For groups, these are the roles that are bound. For users, this is the combination of roles granted to the specific user and roles granted to the user's groups. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param mdsScope * @return []string */ ScopedPrincipalRolenames(ctx _context.Context, principal string, mdsScope MdsScope) ([]string, *_nethttp.Response, error) }
type RBACRoleBindingSummariesApiService ¶
type RBACRoleBindingSummariesApiService service
RBACRoleBindingSummariesApiService RBACRoleBindingSummariesApi service
func (*RBACRoleBindingSummariesApiService) LookupPrincipalsWithRole ¶
func (a *RBACRoleBindingSummariesApiService) LookupPrincipalsWithRole(ctx _context.Context, roleName string, mdsScope MdsScope) ([]string, *_nethttp.Response, error)
* LookupPrincipalsWithRole Look up the KafkaPrincipals who have the given role for the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @param mdsScope * @return []string
func (*RBACRoleBindingSummariesApiService) LookupPrincipalsWithRoleOnResource ¶
func (a *RBACRoleBindingSummariesApiService) LookupPrincipalsWithRoleOnResource(ctx _context.Context, roleName string, resourceType string, resourceName string, mdsScope MdsScope) ([]string, *_nethttp.Response, error)
* LookupPrincipalsWithRoleOnResource Look up the KafkaPrincipals who have the given role on the specified resource for the given scope. * * Callable by Admins. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @param resourceType Type of resource to look up. * @param resourceName Name of resource to look up. * @param mdsScope * @return []string
func (*RBACRoleBindingSummariesApiService) LookupResourcesForPrincipal ¶
func (a *RBACRoleBindingSummariesApiService) LookupResourcesForPrincipal(ctx _context.Context, principal string, mdsScope MdsScope) (map[string]map[string][]ResourcePattern, *_nethttp.Response, error)
* LookupResourcesForPrincipal Look up the resource bindings for the principal at the given scope/cluster. * * Includes bindings from groups that the user belongs to. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param mdsScope * @return map[string]map[string][]ResourcePattern
func (*RBACRoleBindingSummariesApiService) ScopedPrincipalRolenames ¶
func (a *RBACRoleBindingSummariesApiService) ScopedPrincipalRolenames(ctx _context.Context, principal string, mdsScope MdsScope) ([]string, *_nethttp.Response, error)
* ScopedPrincipalRolenames Returns the effective list of role names for a principal. * * For groups, these are the roles that are bound. For users, this is the combination of roles granted to the specific user and roles granted to the user's groups. Callable by Admins+User. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param principal Fully-qualified KafkaPrincipal string for a user or group. * @param mdsScope * @return []string
type RBACRoleDefinitionsApi ¶
type RBACRoleDefinitionsApi interface { /* * RoleDetail List the resourceType and operations allowed for a given role. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @return Role */ RoleDetail(ctx _context.Context, roleName string) (Role, *_nethttp.Response, error) /* * Rolenames Returns the names of all the roles defined in the system. * * For information and developer purposes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return []string */ Rolenames(ctx _context.Context) ([]string, *_nethttp.Response, error) /* * Roles Returns all the roles defined in the system. * * For information and developer purposes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return []Role */ Roles(ctx _context.Context) ([]Role, *_nethttp.Response, error) }
type RBACRoleDefinitionsApiService ¶
type RBACRoleDefinitionsApiService service
RBACRoleDefinitionsApiService RBACRoleDefinitionsApi service
func (*RBACRoleDefinitionsApiService) RoleDetail ¶
func (a *RBACRoleDefinitionsApiService) RoleDetail(ctx _context.Context, roleName string) (Role, *_nethttp.Response, error)
* RoleDetail List the resourceType and operations allowed for a given role. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param roleName Role name to look up. * @return Role
func (*RBACRoleDefinitionsApiService) Rolenames ¶
func (a *RBACRoleDefinitionsApiService) Rolenames(ctx _context.Context) ([]string, *_nethttp.Response, error)
* Rolenames Returns the names of all the roles defined in the system. * * For information and developer purposes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return []string
func (*RBACRoleDefinitionsApiService) Roles ¶
func (a *RBACRoleDefinitionsApiService) Roles(ctx _context.Context) ([]Role, *_nethttp.Response, error)
* Roles Returns all the roles defined in the system. * * For information and developer purposes. Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return []Role
type ResolveResourceRouteOpts ¶
ResolveResourceRouteOpts Optional parameters for the method 'ResolveResourceRoute'
type ResourcePattern ¶
type ResourcePattern struct { ResourceType string `json:"resourceType"` Name string `json:"name"` PatternType string `json:"patternType"` }
ResourcePattern struct for ResourcePattern
type ResourcesRequest ¶
type ResourcesRequest struct { Scope MdsScope `json:"scope"` ResourcePatterns []ResourcePattern `json:"resourcePatterns"` }
ResourcesRequest struct for ResourcesRequest
type Role ¶
type Role struct { Name string `json:"name,omitempty"` AccessPolicy AccessPolicy `json:"accessPolicy,omitempty"` }
Role struct for Role
type SSODeviceAuthorizationApi ¶
type SSODeviceAuthorizationApi interface { /* * CheckDeviceAuth Provides information about current status of user authentication * * Checks if the user has authorized and logged in. If the user has authorized, then the response contains the auth token, and the complete flag is set to true. If the user has not authorized in right time or some other error occurred, then the response contains the error details, and again complete flag is set to true. Otherwise, in case of pending auth, the response contains the status, description and the complete flag is set to false. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param checkDeviceAuthRequest * @return CheckDeviceAuthResponse */ CheckDeviceAuth(ctx _context.Context, checkDeviceAuthRequest CheckDeviceAuthRequest) (CheckDeviceAuthResponse, *_nethttp.Response, error) /* * ExtendDeviceAuth Extend auth by generating a new token * * Attempts to refresh the Confluent token if applicable, based on the provided JwtPrincipal. If refresh token is configured to be used, the session is extended until expiry time of new ID token requested using the refresh token. Else session is extended until min(`mex`, `currentTime`+ `sessionTokenExpiryConfig`) where `mex` is the claim already present in auth token. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param extendAuthRequest * @return ExtendAuthResponse */ ExtendDeviceAuth(ctx _context.Context, extendAuthRequest ExtendAuthRequest) (ExtendAuthResponse, *_nethttp.Response, error) /* * Security10OidcDeviceAuthenticatePost Provides user authentication details and device polling for authentication status * * This initiates user authentication in CLI. Response contains 1. `user_code` and `verification_uri` which are used by user to authenticate from the identity provider (IdP). 2. `key` is used to poll the IdP to check if the user has authorized and logged in. 3. `interval` to hint client about polling frequency. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return InitDeviceAuthResponse */ Security10OidcDeviceAuthenticatePost(ctx _context.Context) (InitDeviceAuthResponse, *_nethttp.Response, error) }
type SSODeviceAuthorizationApiService ¶
type SSODeviceAuthorizationApiService service
SSODeviceAuthorizationApiService SSODeviceAuthorizationApi service
func (*SSODeviceAuthorizationApiService) CheckDeviceAuth ¶
func (a *SSODeviceAuthorizationApiService) CheckDeviceAuth(ctx _context.Context, checkDeviceAuthRequest CheckDeviceAuthRequest) (CheckDeviceAuthResponse, *_nethttp.Response, error)
* CheckDeviceAuth Provides information about current status of user authentication * * Checks if the user has authorized and logged in. If the user has authorized, then the response contains the auth token, and the complete flag is set to true. If the user has not authorized in right time or some other error occurred, then the response contains the error details, and again complete flag is set to true. Otherwise, in case of pending auth, the response contains the status, description and the complete flag is set to false. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param checkDeviceAuthRequest * @return CheckDeviceAuthResponse
func (*SSODeviceAuthorizationApiService) ExtendDeviceAuth ¶
func (a *SSODeviceAuthorizationApiService) ExtendDeviceAuth(ctx _context.Context, extendAuthRequest ExtendAuthRequest) (ExtendAuthResponse, *_nethttp.Response, error)
* ExtendDeviceAuth Extend auth by generating a new token * * Attempts to refresh the Confluent token if applicable, based on the provided JwtPrincipal. If refresh token is configured to be used, the session is extended until expiry time of new ID token requested using the refresh token. Else session is extended until min(`mex`, `currentTime`+ `sessionTokenExpiryConfig`) where `mex` is the claim already present in auth token. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param extendAuthRequest * @return ExtendAuthResponse
func (*SSODeviceAuthorizationApiService) Security10OidcDeviceAuthenticatePost ¶
func (a *SSODeviceAuthorizationApiService) Security10OidcDeviceAuthenticatePost(ctx _context.Context) (InitDeviceAuthResponse, *_nethttp.Response, error)
* Security10OidcDeviceAuthenticatePost Provides user authentication details and device polling for authentication status * * This initiates user authentication in CLI. Response contains 1. `user_code` and `verification_uri` which are used by user to authenticate from the identity provider (IdP). 2. `key` is used to poll the IdP to check if the user has authorized and logged in. 3. `interval` to hint client about polling frequency. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return InitDeviceAuthResponse
type ScopeClusters ¶
type ScopeClusters struct { KafkaCluster string `json:"kafka-cluster,omitempty"` ConnectCluster string `json:"connect-cluster,omitempty"` KsqlCluster string `json:"ksql-cluster,omitempty"` SchemaRegistryCluster string `json:"schema-registry-cluster,omitempty"` Cmf string `json:"cmf,omitempty"` FlinkEnvironment string `json:"flink-environment,omitempty"` }
ScopeClusters struct for ScopeClusters
type ScopeRoleBindingMapping ¶
type ScopeRoleBindingMapping struct { Scope MdsScope `json:"scope,omitempty"` Rolebindings map[string]map[string][]ResourcePattern `json:"rolebindings,omitempty"` }
ScopeRoleBindingMapping struct for ScopeRoleBindingMapping
type ServerConfiguration ¶
type ServerConfiguration struct { Url string Description string Variables map[string]ServerVariable }
ServerConfiguration stores the information about a server
type ServerVariable ¶
ServerVariable stores the information about a server variable
type TokensAndAuthenticationApi ¶
type TokensAndAuthenticationApi interface { /* * GetToken Get a bearer token. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return AuthenticationResponse */ GetToken(ctx _context.Context) (AuthenticationResponse, *_nethttp.Response, error) }
type TokensAndAuthenticationApiService ¶
type TokensAndAuthenticationApiService service
TokensAndAuthenticationApiService TokensAndAuthenticationApi service
func (*TokensAndAuthenticationApiService) GetToken ¶
func (a *TokensAndAuthenticationApiService) GetToken(ctx _context.Context) (AuthenticationResponse, *_nethttp.Response, error)
* GetToken Get a bearer token. * * Callable by LDAP users. * * @param ctx _context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @return AuthenticationResponse
type UsersGroupsListOpts ¶
UsersGroupsListOpts Optional parameters for the method 'UsersGroupsList'
type VisibilityRequest ¶
type VisibilityRequest struct { KafkaCluster string `json:"kafka-cluster"` ConnectClusters []string `json:"connect-clusters,omitempty"` SchemaRegistryClusters []string `json:"schema-registry-clusters,omitempty"` KsqlClusters []string `json:"ksql-clusters,omitempty"` }
VisibilityRequest struct for VisibilityRequest
type VisibilityResponse ¶
type VisibilityResponse struct { KafkaCluster ClusterVisibility `json:"kafka-cluster,omitempty"` ConnectClusters []ClusterVisibility `json:"connect-clusters,omitempty"` SchemaRegistryClusters []ClusterVisibility `json:"schema-registry-clusters,omitempty"` KsqlClusters []ClusterVisibility `json:"ksql-clusters,omitempty"` }
VisibilityResponse struct for VisibilityResponse
Source Files ¶
- api_audit_log_configuration.go
- api_authorization.go
- api_cluster_registry.go
- api_kafka_acl_management.go
- api_metadata_service_operations.go
- api_private_rbacui_cached_user_store_information.go
- api_private_rbacui_cluster_visibility.go
- api_private_rbacui_creation_guidelines.go
- api_private_rbacui_manage_role_bindings.go
- api_private_rbacuimy_role_bindings.go
- api_rbac_role_binding_crud.go
- api_rbac_role_binding_summaries.go
- api_rbac_role_definitions.go
- api_sso_device_authorization.go
- api_tokens_and_authentication.go
- client.go
- configuration.go
- model_access_control_entry.go
- model_access_control_entry_filter.go
- model_access_policy.go
- model_acl_binding.go
- model_acl_binding_filter.go
- model_acl_filter_request.go
- model_acl_operation.go
- model_acl_permission_type.go
- model_acl_resource_type.go
- model_action.go
- model_audit_log_config_default_topics.go
- model_audit_log_config_destination_config.go
- model_audit_log_config_destinations.go
- model_audit_log_config_list_routes_response.go
- model_audit_log_config_metadata.go
- model_audit_log_config_resolve_resource_route_response.go
- model_audit_log_config_route_categories.go
- model_audit_log_config_route_category_topics.go
- model_audit_log_config_spec.go
- model_authentication_response.go
- model_authorize_request.go
- model_check_device_auth_request.go
- model_check_device_auth_response.go
- model_cluster_access_info.go
- model_cluster_info.go
- model_cluster_visibility.go
- model_create_acl_request.go
- model_error_detail.go
- model_error_response.go
- model_extend_auth_request.go
- model_extend_auth_response.go
- model_features_info.go
- model_host_info.go
- model_init_device_auth_response.go
- model_kafka_resource_pattern.go
- model_kafka_resource_pattern_filter.go
- model_kafka_scope.go
- model_kafka_scope_clusters.go
- model_managed_resource_binding.go
- model_managed_role_bindings.go
- model_mds_scope.go
- model_operation.go
- model_pattern_type.go
- model_protocol.go
- model_resource_pattern.go
- model_resources_request.go
- model_role.go
- model_scope.go
- model_scope_clusters.go
- model_scope_role_binding_mapping.go
- model_visibility_request.go
- model_visibility_response.go
- response.go