Struct kanidmd_lib::idm::server::IdmServerProxyReadTransaction
source · pub struct IdmServerProxyReadTransaction<'a> {
pub qs_read: QueryServerReadTransaction<'a>,
/* private fields */
}
Expand description
This contains read-only methods, like getting users, groups and other structured content.
Fields§
§qs_read: QueryServerReadTransaction<'a>
Implementations§
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn account_list_user_auth_tokens( &mut self, lte: &ListUserAuthTokenEvent, ) -> Result<Vec<UatStatus>, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn list_applinks( &mut self, ident: &Identity, ) -> Result<Vec<AppLink>, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn handle_identify_user_start( &mut self, _: &IdentifyUserStartEvent, ) -> Result<IdentifyUserResponse, OperationError>
pub fn handle_identify_user_display_code( &mut self, _: &IdentifyUserDisplayCodeEvent, ) -> Result<IdentifyUserResponse, OperationError>
pub fn handle_identify_user_submit_code( &mut self, _: &IdentifyUserSubmitCodeEvent, ) -> Result<IdentifyUserResponse, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn check_oauth2_token_introspect( &mut self, client_auth_info: &ClientAuthInfo, intr_req: &AccessTokenIntrospectRequest, ct: Duration, ) -> Result<AccessTokenIntrospectResponse, Oauth2Error>
pub fn oauth2_openid_userinfo( &mut self, client_id: &str, token: JwsCompact, ct: Duration, ) -> Result<OidcToken, Oauth2Error>
pub fn oauth2_rfc8414_metadata( &self, client_id: &str, ) -> Result<Oauth2Rfc8414MetadataResponse, OperationError>
pub fn oauth2_openid_discovery( &self, client_id: &str, ) -> Result<OidcDiscoveryResponse, OperationError>
pub fn oauth2_openid_publickey( &self, client_id: &str, ) -> Result<JwkKeySet, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn scim_sync_get_state( &mut self, ident: &Identity, ) -> Result<ScimSyncState, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn jws_public_jwk(&mut self, key_id: &str) -> Result<Jwk, OperationError>
pub fn get_radiusauthtoken( &mut self, rate: &RadiusAuthTokenEvent, ct: Duration, ) -> Result<RadiusAuthToken, OperationError>
pub fn get_unixusertoken( &mut self, uute: &UnixUserTokenEvent, ct: Duration, ) -> Result<UnixUserToken, OperationError>
pub fn get_unixgrouptoken( &mut self, uute: &UnixGroupTokenEvent, ) -> Result<UnixGroupToken, OperationError>
pub fn get_credentialstatus( &mut self, cse: &CredentialStatusEvent, ) -> Result<CredentialStatus, OperationError>
pub fn get_backup_codes( &mut self, rbce: &ReadBackupCodeEvent, ) -> Result<BackupCodesView, OperationError>
source§impl<'a> IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerProxyReadTransaction<'a>
pub fn service_account_list_api_token( &mut self, lte: &ListApiTokenEvent, ) -> Result<Vec<ProtoApiToken>, OperationError>
Trait Implementations§
source§impl<'a> IdmServerTransaction<'a> for IdmServerProxyReadTransaction<'a>
impl<'a> IdmServerTransaction<'a> for IdmServerProxyReadTransaction<'a>
type QsTransactionType = QueryServerReadTransaction<'a>
fn get_qs_txn(&mut self) -> &mut Self::QsTransactionType
source§fn validate_client_auth_info_to_ident(
&mut self,
client_auth_info: ClientAuthInfo,
ct: Duration,
) -> Result<Identity, OperationError>
fn validate_client_auth_info_to_ident( &mut self, client_auth_info: ClientAuthInfo, ct: Duration, ) -> Result<Identity, OperationError>
This is the preferred method to transform and securely verify a token into
an identity that can be used for operations and access enforcement. This
function is aware of the various classes of tokens that may exist, and can
appropriately check them. Read more
source§fn validate_client_auth_info_to_uat(
&mut self,
client_auth_info: ClientAuthInfo,
ct: Duration,
) -> Result<UserAuthToken, OperationError>
fn validate_client_auth_info_to_uat( &mut self, client_auth_info: ClientAuthInfo, ct: Duration, ) -> Result<UserAuthToken, OperationError>
This function is not using in authentication flows - it is a reflector of the
current session state to allow a user-auth-token to be presented to the
user via the whoami call.
fn validate_and_parse_token_to_token( &mut self, jwsu: &JwsCompact, ct: Duration, ) -> Result<Token, OperationError>
fn check_oauth2_account_uuid_valid( &mut self, uuid: Uuid, session_id: Uuid, parent_session_id: Option<Uuid>, iat: i64, ct: Duration, ) -> Result<Option<Arc<Entry<EntrySealed, EntryCommitted>>>, OperationError>
source§fn process_uat_to_identity(
&mut self,
uat: &UserAuthToken,
ct: Duration,
source: Source,
) -> Result<Identity, OperationError>
fn process_uat_to_identity( &mut self, uat: &UserAuthToken, ct: Duration, source: Source, ) -> Result<Identity, OperationError>
For any event/operation to proceed, we need to attach an identity to the
event for security and access processing. When that event is externally
triggered via one of our various api layers, we process some type of
account token into this identity. In the current server this is the
UserAuthToken. For a UserAuthToken to be provided it MUST have been
cryptographically verified meaning it is now a trusted source of
data that we previously issued. Read more
fn process_apit_to_identity( &mut self, apit: &ApiToken, source: Source, entry: Arc<EntrySealedCommitted>, ct: Duration, ) -> Result<Identity, OperationError>
fn client_cert_info_entry( &mut self, client_cert_info: &ClientCertInfo, ) -> Result<Arc<EntrySealedCommitted>, OperationError>
source§fn client_certificate_to_identity(
&mut self,
client_cert_info: &ClientCertInfo,
ct: Duration,
source: Source,
) -> Result<Identity, OperationError>
fn client_certificate_to_identity( &mut self, client_cert_info: &ClientCertInfo, ct: Duration, source: Source, ) -> Result<Identity, OperationError>
Given a certificate, validate it and discover the associated entry that
the certificate relates to. Currently, this relies on mapping the public
key sha256 to a stored client certificate, which then links to the owner. Read more
fn client_certificate_to_user_auth_token( &mut self, client_cert_info: &ClientCertInfo, ct: Duration, ) -> Result<UserAuthToken, OperationError>
fn process_ldap_uuid_to_identity( &mut self, uuid: &Uuid, ct: Duration, source: Source, ) -> Result<Identity, OperationError>
fn validate_ldap_session( &mut self, session: &LdapSession, source: Source, ct: Duration, ) -> Result<Identity, OperationError>
fn validate_sync_client_auth_info_to_ident( &mut self, client_auth_info: ClientAuthInfo, ct: Duration, ) -> Result<Identity, OperationError>
Auto Trait Implementations§
impl<'a> !Freeze for IdmServerProxyReadTransaction<'a>
impl<'a> !RefUnwindSafe for IdmServerProxyReadTransaction<'a>
impl<'a> Send for IdmServerProxyReadTransaction<'a>
impl<'a> Sync for IdmServerProxyReadTransaction<'a>
impl<'a> Unpin for IdmServerProxyReadTransaction<'a>
impl<'a> !UnwindSafe for IdmServerProxyReadTransaction<'a>
Blanket Implementations§
§impl<'a, T> AsTaggedExplicit<'a> for Twhere
T: 'a,
impl<'a, T> AsTaggedExplicit<'a> for Twhere
T: 'a,
§impl<'a, T> AsTaggedImplicit<'a> for Twhere
T: 'a,
impl<'a, T> AsTaggedImplicit<'a> for Twhere
T: 'a,
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
§impl<T> FutureExt for T
impl<T> FutureExt for T
§fn with_context(self, otel_cx: Context) -> WithContext<Self>
fn with_context(self, otel_cx: Context) -> WithContext<Self>
§fn with_current_context(self) -> WithContext<Self>
fn with_current_context(self) -> WithContext<Self>
§impl<T> Instrument for T
impl<T> Instrument for T
§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
Converts
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
Converts
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§impl<T> IntoRequest<T> for T
impl<T> IntoRequest<T> for T
source§fn into_request(self) -> Request<T>
fn into_request(self) -> Request<T>
Wrap the input message
T
in a tonic::Request