Struct kanidmd_lib::idm::server::IdmServerProxyWriteTransaction
source · pub struct IdmServerProxyWriteTransaction<'a> {
pub qs_write: QueryServerWriteTransaction<'a>,
/* private fields */
}
Fields§
§qs_write: QueryServerWriteTransaction<'a>
Implementations§
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn account_destroy_session_token( &mut self, dte: &DestroySessionTokenEvent ) -> Result<(), OperationError>
pub fn service_account_into_person( &mut self, ident: &Identity, target_uuid: Uuid ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn init_credential_update_intent( &mut self, event: &InitCredentialUpdateIntentEvent, ct: Duration ) -> Result<CredentialUpdateIntentToken, OperationError>
pub fn exchange_intent_credential_update( &mut self, token: CredentialUpdateIntentToken, current_time: Duration ) -> Result<(CredentialUpdateSessionToken, CredentialUpdateSessionStatus), OperationError>
pub fn init_credential_update( &mut self, event: &InitCredentialUpdateEvent, ct: Duration ) -> Result<(CredentialUpdateSessionToken, CredentialUpdateSessionStatus), OperationError>
pub fn expire_credential_update_sessions(&mut self, ct: Duration)
pub fn commit_credential_update( &mut self, cust: &CredentialUpdateSessionToken, ct: Duration ) -> Result<(), OperationError>
pub fn cancel_credential_update( &mut self, cust: &CredentialUpdateSessionToken, ct: Duration ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn oauth2_token_revoke( &mut self, client_authz: &str, revoke_req: &TokenRevokeRequest, ct: Duration ) -> Result<(), Oauth2Error>
pub fn check_oauth2_token_exchange( &mut self, client_authz: Option<&str>, token_req: &AccessTokenRequest, ct: Duration ) -> Result<AccessTokenResponse, Oauth2Error>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn scim_sync_generate_token( &mut self, gte: &GenerateScimSyncTokenEvent, ct: Duration ) -> Result<String, OperationError>
pub fn sync_account_destroy_token( &mut self, ident: &Identity, target: Uuid, _ct: Duration ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn scim_sync_finalise( &mut self, sfe: &ScimSyncFinaliseEvent ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn scim_sync_terminate( &mut self, ste: &ScimSyncTerminateEvent ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn scim_sync_apply( &mut self, sse: &ScimSyncUpdateEvent, changes: &ScimSyncRequest, _ct: Duration ) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn get_origin(&self) -> &Url
pub fn set_unix_account_password( &mut self, pce: &UnixPasswordChangeEvent ) -> Result<(), OperationError>
pub fn recover_account( &mut self, name: &str, cleartext: Option<&str> ) -> Result<String, OperationError>
pub fn generate_account_password( &mut self, gpe: &GeneratePasswordEvent ) -> Result<String, OperationError>
pub fn regenerate_radius_secret( &mut self, rrse: &RegenerateRadiusSecretEvent ) -> Result<String, OperationError>
pub fn process_delayedaction( &mut self, da: DelayedAction, _ct: Duration ) -> Result<(), OperationError>
pub fn commit(self) -> Result<(), OperationError>
source§impl<'a> IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerProxyWriteTransaction<'a>
pub fn service_account_generate_api_token( &mut self, gte: &GenerateApiTokenEvent, ct: Duration ) -> Result<String, OperationError>
pub fn service_account_destroy_api_token( &mut self, dte: &DestroyApiTokenEvent ) -> Result<(), OperationError>
Trait Implementations§
source§impl<'a> IdmServerTransaction<'a> for IdmServerProxyWriteTransaction<'a>
impl<'a> IdmServerTransaction<'a> for IdmServerProxyWriteTransaction<'a>
type QsTransactionType = QueryServerWriteTransaction<'a>
fn get_qs_txn(&mut self) -> &mut Self::QsTransactionType
fn get_uat_validator_txn(&self) -> &JwsValidator
source§fn validate_and_parse_token_to_ident(
&mut self,
token: Option<&str>,
ct: Duration
) -> Result<Identity, OperationError>
fn validate_and_parse_token_to_ident( &mut self, token: Option<&str>, ct: Duration ) -> Result<Identity, OperationError>
This is the preferred method to transform and securely verify a token into
an identity that can be used for operations and access enforcement. This
function is aware of the various classes of tokens that may exist, and can
appropriately check them. Read more
fn validate_and_parse_token_to_uat( &mut self, token: Option<&str>, ct: Duration ) -> Result<UserAuthToken, OperationError>
fn validate_and_parse_token_to_token( &mut self, token: Option<&str>, ct: Duration ) -> Result<Token, OperationError>
fn validate_and_parse_uat( &self, token: Option<&str>, ct: Duration ) -> Result<UserAuthToken, OperationError>
fn check_oauth2_account_uuid_valid( &mut self, uuid: Uuid, session_id: Uuid, parent_session_id: Uuid, iat: i64, ct: Duration ) -> Result<Option<Arc<Entry<EntrySealed, EntryCommitted>>>, OperationError>
source§fn process_uat_to_identity(
&mut self,
uat: &UserAuthToken,
ct: Duration
) -> Result<Identity, OperationError>
fn process_uat_to_identity( &mut self, uat: &UserAuthToken, ct: Duration ) -> Result<Identity, OperationError>
For any event/operation to proceed, we need to attach an identity to the
event for security and access processing. When that event is externally
triggered via one of our various api layers, we process some type of
account token into this identity. In the current server this is the
UserAuthToken. For a UserAuthToken to be provided it MUST have been
cryptographically verified meaning it is now a trusted source of
data that we previously issued. Read more