Documentation ¶
Index ¶
- Variables
- func IssueAPIToken(appTokens istructs.IAppTokens, duration time.Duration, roles []appdef.QName, ...) (token string, err error)
- func NewDefaultAuthenticator(subjectRolesGetter SubjectGetterFunc, ...) iauthnz.IAuthenticator
- func NewDefaultAuthorizer() iauthnz.IAuthorizer
- type ACElem
- type ACL
- type ACPolicyType
- type IsDeviceAllowedFunc
- type IsDeviceAllowedFuncs
- type PatternType
- type SubjectGetterFunc
Constants ¶
This section is empty.
Variables ¶
View Source
var ( ErrPersonalAccessTokenOnSystemRole = errors.New("personal access token on a system role") ErrPersonalAccessTokenOnNullWSID = errors.New("personal access token on null WSID") )
View Source
var TestIsDeviceAllowedFuncs = IsDeviceAllowedFuncs{ istructs.AppQName_test1_app1: func(as istructs.IAppStructs, requestWSID istructs.WSID, deviceProfileWSID istructs.WSID) (ok bool, err error) { return true, nil }, }
Functions ¶
func IssueAPIToken ¶
func NewDefaultAuthenticator ¶
func NewDefaultAuthenticator(subjectRolesGetter SubjectGetterFunc, isDeviceAllowedFuncs IsDeviceAllowedFuncs) iauthnz.IAuthenticator
func NewDefaultAuthorizer ¶
func NewDefaultAuthorizer() iauthnz.IAuthorizer
Types ¶
type ACPolicyType ¶
type ACPolicyType int
const ( ACPolicy_Deny ACPolicyType = iota ACPolicy_Allow )
type IsDeviceAllowedFunc ¶
type IsDeviceAllowedFuncs ¶
type IsDeviceAllowedFuncs map[istructs.AppQName]IsDeviceAllowedFunc
type PatternType ¶
type PatternType struct {
// contains filtered or unexported fields
}
Source Files ¶
Click to show internal directories.
Click to hide internal directories.