service/verifiedpermissions/api_op_IsAuthorizedWithToken.go (147 lines of code) (raw):
// Code generated by smithy-go-codegen DO NOT EDIT.
package verifiedpermissions
import (
"context"
"fmt"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/service/verifiedpermissions/types"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
)
// Makes an authorization decision about a service request described in the
// parameters. The principal in this request comes from an external identity source
// in the form of an identity token formatted as a [JSON web token (JWT)]. The information in the
// parameters can also define additional context that Verified Permissions can
// include in the evaluation. The request is evaluated against all matching
// policies in the specified policy store. The result of the decision is either
// Allow or Deny , along with a list of the policies that resulted in the decision.
//
// Verified Permissions validates each token that is specified in a request by
// checking its expiration date and its signature.
//
// Tokens from an identity source user continue to be usable until they expire.
// Token revocation and resource deletion have no effect on the validity of a token
// in your policy store
//
// [JSON web token (JWT)]: https://wikipedia.org/wiki/JSON_Web_Token
func (c *Client) IsAuthorizedWithToken(ctx context.Context, params *IsAuthorizedWithTokenInput, optFns ...func(*Options)) (*IsAuthorizedWithTokenOutput, error) {
if params == nil {
params = &IsAuthorizedWithTokenInput{}
}
result, metadata, err := c.invokeOperation(ctx, "IsAuthorizedWithToken", params, optFns, c.addOperationIsAuthorizedWithTokenMiddlewares)
if err != nil {
return nil, err
}
out := result.(*IsAuthorizedWithTokenOutput)
out.ResultMetadata = metadata
return out, nil
}
type IsAuthorizedWithTokenInput struct {
// Specifies the ID of the policy store. Policies in this policy store will be
// used to make an authorization decision for the input.
//
// This member is required.
PolicyStoreId *string
// Specifies an access token for the principal to be authorized. This token is
// provided to you by the identity provider (IdP) associated with the specified
// identity source. You must specify either an accessToken , an identityToken , or
// both.
//
// Must be an access token. Verified Permissions returns an error if the token_use
// claim in the submitted token isn't access .
AccessToken *string
// Specifies the requested action to be authorized. Is the specified principal
// authorized to perform this action on the specified resource.
Action *types.ActionIdentifier
// Specifies additional context that can be used to make more granular
// authorization decisions.
Context types.ContextDefinition
// (Optional) Specifies the list of resources and their associated attributes that
// Verified Permissions can examine when evaluating the policies. These additional
// entities and their attributes can be referenced and checked by conditional
// elements in the policies in the specified policy store.
//
// You can't include principals in this parameter, only resource and action
// entities. This parameter can't include any entities of a type that matches the
// user or group entity types that you defined in your identity source.
//
// - The IsAuthorizedWithToken operation takes principal attributes from only the
// identityToken or accessToken passed to the operation.
//
// - For action entities, you can include only their Identifier and EntityType .
Entities types.EntitiesDefinition
// Specifies an identity token for the principal to be authorized. This token is
// provided to you by the identity provider (IdP) associated with the specified
// identity source. You must specify either an accessToken , an identityToken , or
// both.
//
// Must be an ID token. Verified Permissions returns an error if the token_use
// claim in the submitted token isn't id .
IdentityToken *string
// Specifies the resource for which the authorization decision is made. For
// example, is the principal allowed to perform the action on the resource?
Resource *types.EntityIdentifier
noSmithyDocumentSerde
}
type IsAuthorizedWithTokenOutput struct {
// An authorization decision that indicates if the authorization request should be
// allowed or denied.
//
// This member is required.
Decision types.Decision
// The list of determining policies used to make the authorization decision. For
// example, if there are multiple matching policies, where at least one is a forbid
// policy, then because forbid always overrides permit the forbid policies are the
// determining policies. If all matching policies are permit policies, then those
// policies are the determining policies. When no policies match and the response
// is the default DENY, there are no determining policies.
//
// This member is required.
DeterminingPolicies []types.DeterminingPolicyItem
// Errors that occurred while making an authorization decision. For example, a
// policy references an entity or entity attribute that does not exist in the
// slice.
//
// This member is required.
Errors []types.EvaluationErrorItem
// The identifier of the principal in the ID or access token.
Principal *types.EntityIdentifier
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
noSmithyDocumentSerde
}
func (c *Client) addOperationIsAuthorizedWithTokenMiddlewares(stack *middleware.Stack, options Options) (err error) {
if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
return err
}
err = stack.Serialize.Add(&awsAwsjson10_serializeOpIsAuthorizedWithToken{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsAwsjson10_deserializeOpIsAuthorizedWithToken{}, middleware.After)
if err != nil {
return err
}
if err := addProtocolFinalizerMiddlewares(stack, options, "IsAuthorizedWithToken"); err != nil {
return fmt.Errorf("add protocol finalizers: %v", err)
}
if err = addlegacyEndpointContextSetter(stack, options); err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = addClientRequestID(stack); err != nil {
return err
}
if err = addComputeContentLength(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = addComputePayloadSHA256(stack); err != nil {
return err
}
if err = addRetry(stack, options); err != nil {
return err
}
if err = addRawResponseToMetadata(stack); err != nil {
return err
}
if err = addRecordResponseTiming(stack); err != nil {
return err
}
if err = addSpanRetryLoop(stack, options); err != nil {
return err
}
if err = addClientUserAgent(stack, options); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
return err
}
if err = addTimeOffsetBuild(stack, c); err != nil {
return err
}
if err = addUserAgentRetryMode(stack, options); err != nil {
return err
}
if err = addCredentialSource(stack, options); err != nil {
return err
}
if err = addOpIsAuthorizedWithTokenValidationMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opIsAuthorizedWithToken(options.Region), middleware.Before); err != nil {
return err
}
if err = addRecursionDetection(stack); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
if err = addDisableHTTPSMiddleware(stack, options); err != nil {
return err
}
if err = addSpanInitializeStart(stack); err != nil {
return err
}
if err = addSpanInitializeEnd(stack); err != nil {
return err
}
if err = addSpanBuildRequestStart(stack); err != nil {
return err
}
if err = addSpanBuildRequestEnd(stack); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opIsAuthorizedWithToken(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
OperationName: "IsAuthorizedWithToken",
}
}