Common types used by the gRPC, HTTP, and embedded client libraries.
Class |
Description |
---|---|
The outcome of checking a principal's permissions on a set of resources. | |
The outcome of checking a principal's permissions on single resource. | |
A client instance with a pre-specified principal. | |
Error thrown when the Cerbos policy decision point server returns an unsuccessful response. | |
An abstract syntax tree node representing an expression to evaluate. | |
An abstract syntax tree node representing a constant value. | |
An abstract syntax tree node representing a variable whose value was unknown when producing the query plan. | |
Definition of a JSON schema used to validate principal or resource attributes. | |
Error thrown when input fails schema validation, if the Client is configured with onValidationError set to |
Abstract Class |
Description |
---|---|
Base implementation of a client for interacting with the Cerbos policy decision point server. |
Enumeration |
Description |
---|---|
Outcomes of policy decisions. | |
Kind of an attribute referenced by a policy. | |
Kind of a constant referenced by a policy. | |
Kind of a derived role referenced by a policy. | |
Kind of a variable referenced by a policy. | |
Types of query plans. | |
(ALPHA) | |
Status codes returned by the Cerbos policy decision point server. | |
Sources of invalid attributes. |
Function |
Description |
---|---|
Type guard to check if an AuditLogFilter is an AuditLogFilterBetween. | |
Type guard to check if an AuditLogFilter is an AuditLogFilterSince. | |
Type guard to check if an AuditLogFilter is an AuditLogFilterTail. | |
Type guard to check if a DecisionLogEntryMethod is a DecisionLogEntryCheckResources. | |
Type guard to check if a DecisionLogEntryMethod is a DecisionLogEntryPlanResources. | |
Type guard to check if a PlanResourcesOutput is a PlanResourcesConditionalOutput. | |
Type guard to check if a PlanResourcesOutput is a PlanResourcesUnconditionalOutput. | |
Type guard to check if a PlanResourcesResponse is a PlanResourcesConditionalResponse. | |
Type guard to check if a PlanResourcesResponse is a PlanResourcesUnconditionalResponse. | |
Type guard to check if a Policy is a set of DerivedRoles. | |
Type guard to check if a Policy is a set of ExportConstants. | |
Type guard to check if a Policy is a set of ExportVariables. | |
Type guard to check if a Policy is a PrincipalPolicy. | |
Type guard to check if a Policy is a ResourcePolicy. | |
(ALPHA) |
Interface |
Description |
---|---|
An access log entry in the policy decision point's audit log. | |
Input to Client.addOrUpdatePolicies(). | |
Input to Client.addOrUpdateSchemas(). | |
Credentials for the admin API. | |
Match audit log entries captured between two timestamps. | |
Match the audit log entries captured since N seconds ago. | |
Match the last N audit log entries. | |
Details about how a policy decision was reached. | |
Auxiliary data sources that can be referenced in policy conditions. | |
Input to a | |
Output from a | |
The | |
Input to Client.checkResources(). | |
Additional information about how policy decisions were reached. | |
Additional information about how a policy decision was reached. | |
A resource that was checked. | |
A set of expressions that must evaluate to true for a rule to take effect. | |
Constants defined for use in policy conditions. | |
A decision log entry in the policy decision point's audit log. | |
The outcome of a | |
The outcome of a | |
Auxiliary data after decoding the JSON Web Token. | |
Input to Client.deleteSchemas(). | |
The outcome of deleting schemas. | |
The definition of a derived role. | |
A set of derived roles to augment static RBAC roles with contextual data to provide more fine-grained control at runtime. | |
A set of derived roles to augment static RBAC roles with contextual data to provide more fine-grained control at runtime. | |
Input to Client.disablePolicies(). | |
The outcome of disabling policies. | |
Input to Client.enablePolicies(). | |
The outcome of enabling policies. | |
Options for creating an error. | |
A set of exported constants to be reused in other policies. | |
A set of exported constants to be reused in other policies. | |
A set of exported variables to be reused in other policies. | |
A set of exported variables to be reused in other policies. | |
Input to Client.getPolicies(). | |
Fetched policies. | |
Input to Client.getSchemas(). | |
Fetched schemas. | |
Details of an attribute referenced by a policy. | |
Details of a constant referenced by a policy. | |
Details of a derived role referenced by a policy. | |
Details of a policy in the store. | |
Details of a variable referenced by a policy. | |
Input to Client.inspectPolicies(). | |
Details of policies in the store. | |
A JSON Web Token to use as an auxiliary data source, which will be verified against the Cerbos policy decision point (PDP) server's configured JSON Web Key Sets (JWKS) unless verification is disabled on the server. | |
Input to Client.listAccessLogEntries(). | |
Input to Client.listDecisionLogEntries(). | |
Input to Client.listPolicies(). | |
A list of available policy IDs. | |
A list of available schema IDs. | |
A set of expressions to evaluate in a condition that must all be true. | |
A set of expressions to evaluate in a condition, at least one of which must be true. | |
A set of expressions to evaluate in a boolean match. | |
A single expression to evaluate in a condition. | |
A set of expressions to evaluate in a condition that must all be false. | |
Options for creating a new Client. | |
User-defined output to be produced when evaluating a policy rule. | |
Common Expression Language expressions to evaluate to produce user-defined output from a policy rule. | |
User-defined output from a policy rule evaluation. | |
Details of the client who made a request to the policy decision point server. | |
A query plan for when the specified action is conditionally allowed for the principal on resources matching the input. | |
A query plan for when the specified action is conditionally allowed for the principal on resources matching the input. | |
Input to a | |
Additional information about the query plan. | |
Common fields between different PlanResourcesOutput types. | |
Input to Client.planResources(). | |
Common fields between different PlanResourcesResponse types. | |
A query plan for when the specified action is always allowed or denied for the principal on resources matching the input. | |
A query plan for when the specified action is always allowed or denied for the principal on resources matching the input. | |
Common fields between different Policy types. | |
Metadata describing a policy. | |
A principal (often a user, but potentially another actor like a service account) to authorize. | |
A policy defining overrides for a specific user. | |
A policy defining overrides for a specific user. | |
A rule defining an override for a specific user. | |
An override for a given action for a specific user. | |
Input to Client.reloadStore(). | |
Options for sending a request to the policy decision point. | |
A resource on which to check a principal's permissions. | |
A Resource and list of actions on which to check a principal's permissions. | |
A policy defining rules for actions that can be performed on a given resource. | |
A policy defining rules for actions that can be performed on a given resource. | |
A rule for actions that can be performed on a given resource. | |
(ALPHA) | |
(ALPHA) | |
(ALPHA) | |
A JSON schema used to validate principal or resource attributes. | |
A JSON schema to be used to validate principal or resource attributes. | |
Reference to a schema to be used to validate principal or resource attributes. | |
References to schemas to be used to validate principal and resource attributes. | |
Information about the Cerbos policy decision point (PDP) server. | |
An error that occurred while validating the principal or resource attributes against a schema. | |
Variables defined for use in policy conditions. |
Type Alias |
Description |
---|---|
Criteria to match audit log entries. | |
Input to Client.checkResource(). | |
The outcome of a decision made by the policy decision point server. | |
HTTP headers from which to construct a Headers object. | |
Input to Client.isAllowed(). | |
Expressions to evaluate in a condition. | |
An abstract syntax tree node representing an operand to an expression. | |
Output from a | |
A query plan that can be used to obtain a list of resources on which a principal is allowed to perform a particular action. | |
A policy definition. | |
Partial details of resources to be queried. | |
Search criteria to match a resource in results. | |
Definition of a JSON schema used to validate principal or resource attributes. | |
Metadata about the source of a policy. | |
A callback function to be invoked when input fails schema validation. | |
Any JSON-serializable value. |