1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
//! # adk-auth
//!
//! Access control and authentication for ADK-Rust.
//!
//! ## Overview
//!
//! This crate provides enterprise-grade access control:
//!
//! - [`Permission`] - Tool and agent permissions
//! - [`Role`] - Role with allow/deny rules
//! - [`AccessControl`] - Permission checking
//! - [`ScopeGuard`] - Declarative scope-based tool authorization
//! - [`AuditSink`] - Audit logging trait
//!
//! ## Features
//!
//! - `sso` - Enable SSO/OAuth/OIDC support
//! - `auth-bridge` - Enable JWT request context extraction for `adk-server`
//! - `aws-secrets` - Enable AWS Secrets Manager provider
//! - `azure-keyvault` - Enable Azure Key Vault provider
//! - `gcp-secrets` - Enable GCP Secret Manager provider
//!
//! ## Quick Start
//!
//! ```rust,ignore
//! use adk_auth::{Permission, Role, AccessControl};
//!
//! let admin = Role::new("admin")
//! .allow(Permission::AllTools)
//! .allow(Permission::AllAgents);
//!
//! let user = Role::new("user")
//! .allow(Permission::Tool("search".into()))
//! .deny(Permission::Tool("code_exec".into()));
//!
//! let ac = AccessControl::builder()
//! .role(admin)
//! .role(user)
//! .assign("alice@example.com", "admin")
//! .build()?;
//!
//! ac.check("alice@example.com", &Permission::AllTools)?;
//! ```
// SSO module (feature-gated)
// Cloud secret manager integration
pub use ;
pub use ;
pub use ;
pub use ;
pub use Permission;
pub use Role;
pub use ;
pub use ;