Documentation ¶
Index ¶
- type AnonymousAuth
- type DynamicAuthorizer
- type DynamicTicketAuth
- type FeatureAuthorizer
- func (this *FeatureAuthorizer) Authorize(sess *wamp.Session, msg wamp.Message) (bool, error)
- func (this *FeatureAuthorizer) Initialize()
- func (this *FeatureAuthorizer) Update(_ context.Context, args wamp.List, _, _ wamp.Dict) *client.InvokeResult
- func (this *FeatureAuthorizer) UpdateMapping() error
- func (this *FeatureAuthorizer) UpdateMatrix() error
- type FeatureMapping
- type FeatureMatrix
- type ResumeAuthenticator
- type SharedSecretAuthenticator
- type TLSAuth
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type AnonymousAuth ¶
type AnonymousAuth struct {
AuthRole string
}
AnonymousAuth is a authenticator which provides a configurable authrole for previously unauthenticated clients.
func (AnonymousAuth) AuthMethod ¶
func (a AnonymousAuth) AuthMethod() string
AuthMethod returns a string representing the type of the authenticator Use the crossbar.io "anonymous" authmethod name here.
type DynamicAuthorizer ¶
type DynamicAuthorizer struct { PermitDefault bool TrustedAuthRoles mapset.Set UpstreamAuthorizer string Realm string }
DynamicAuthorizer is an authorizer that uses a WAMP RPC call to verify permissions for various actions like CALL, SUBSCRIBE, PUBLISH, REGISTER
type DynamicTicketAuth ¶
DynamicTicketAuth is an authenticator which performs authentication based on a user and its password (i.e. shared secret)
func NewDynamicTicket ¶
func NewDynamicTicket(authfunc string, authrolefunc string, realm string, invalid mapset.Set, allowtoken bool) (*DynamicTicketAuth, error)
NewDynamicTicket creates a new DynamicTicketAuth object based on the given parameters
type FeatureAuthorizer ¶
type FeatureAuthorizer struct { PermitDefault bool MatrixURI string MappingURI string TrustedAuthRoles mapset.Set FeatureMatrix *FeatureMatrix FeatureMapping *FeatureMapping CallCounter int }
func NewFeatureAuthorizer ¶
func (*FeatureAuthorizer) Initialize ¶
func (this *FeatureAuthorizer) Initialize()
func (*FeatureAuthorizer) Update ¶
func (this *FeatureAuthorizer) Update(_ context.Context, args wamp.List, _, _ wamp.Dict) *client.InvokeResult
func (*FeatureAuthorizer) UpdateMapping ¶
func (this *FeatureAuthorizer) UpdateMapping() error
func (*FeatureAuthorizer) UpdateMatrix ¶
func (this *FeatureAuthorizer) UpdateMatrix() error
type ResumeAuthenticator ¶
type ResumeAuthenticator struct { // Map from token -> Token Tokens map[string]token }
ResumeAuthenticator is an authenticator which performs authentication based on a previously created one-time-token. It is designed to be used with the normal ticket authenticator.
func NewResumeAuthenticator ¶
func NewResumeAuthenticator(authrolefunc string, realm string, invalidRoles mapset.Set) (*ResumeAuthenticator, error)
NewResumeAuthenticator creates a new ResumeAuthenticator based on the given parameters
func (*ResumeAuthenticator) Authenticate ¶
func (r *ResumeAuthenticator) Authenticate(sid wamp.ID, details wamp.Dict, client wamp.Peer) (*wamp.Welcome, error)
Authenticate asks for the users ticket, checks the provided response with the list of previously created tokens.
func (*ResumeAuthenticator) Initialize ¶
func (r *ResumeAuthenticator) Initialize()
Initialize registers the create-new-token-endpoint
type SharedSecretAuthenticator ¶
type SharedSecretAuthenticator struct {}
SharedSecretAuthenticator is a base type of authenticators which operate on shared secrets like passwords and tokens.
func (*SharedSecretAuthenticator) AuthMethod ¶
func (s *SharedSecretAuthenticator) AuthMethod() string
AuthMethod returns a string representing the type of the authenticator
func (*SharedSecretAuthenticator) FetchAndFilterAuthRoles ¶
func (s *SharedSecretAuthenticator) FetchAndFilterAuthRoles(authid string) (*wamp.Welcome, error)
FetchAndFilterAuthRoles tries to fetch authroles for a previously authenticated client based on its authid using the configured UpstreamGetAuthRolesFunc