#[non_exhaustive]pub struct AccessTokenScopeInput { /* private fields */ }Expand description
Scope of an access token.
Note: The final set of permitted operations is the union of ops
and the operations permitted by op_group_perms. Also, the
final set must not be empty.
Implementations§
Source§impl AccessTokenScopeInput
impl AccessTokenScopeInput
Sourcepub fn from_ops(ops: impl IntoIterator<Item = Operation>) -> Self
pub fn from_ops(ops: impl IntoIterator<Item = Operation>) -> Self
Create a new AccessTokenScopeInput with the given permitted operations.
Sourcepub fn from_op_group_perms(op_group_perms: OperationGroupPermissions) -> Self
pub fn from_op_group_perms(op_group_perms: OperationGroupPermissions) -> Self
Create a new AccessTokenScopeInput with the given operation group permissions.
Examples found in repository?
examples/issue_access_token.rs (lines 22-24)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}More examples
examples/docs_account_and_basins.rs (lines 74-77)
17async fn main() -> Result<(), Box<dyn std::error::Error>> {
18 let token = std::env::var("S2_ACCESS_TOKEN")?;
19 let basin_name: BasinName = std::env::var("S2_BASIN")?.parse()?;
20
21 let client = S2::new(S2Config::new(token))?;
22
23 // ANCHOR: basin-operations
24 // List basins
25 let basins = client.list_basins(ListBasinsInput::new()).await?;
26
27 // Create a basin
28 client
29 .create_basin(CreateBasinInput::new("my-events".parse()?))
30 .await?;
31
32 // Get configuration
33 let config = client.get_basin_config("my-events".parse()?).await?;
34
35 // Delete
36 client
37 .delete_basin(DeleteBasinInput::new("my-events".parse()?))
38 .await?;
39 // ANCHOR_END: basin-operations
40 println!("Basins: {:?}, config: {:?}", basins, config);
41
42 let basin = client.basin(basin_name);
43
44 // ANCHOR: stream-operations
45 // List streams
46 let streams = basin
47 .list_streams(ListStreamsInput::new().with_prefix("user-".parse()?))
48 .await?;
49
50 // Create a stream
51 basin
52 .create_stream(CreateStreamInput::new("user-actions".parse()?))
53 .await?;
54
55 // Get configuration
56 let config = basin.get_stream_config("user-actions".parse()?).await?;
57
58 // Delete
59 basin
60 .delete_stream(DeleteStreamInput::new("user-actions".parse()?))
61 .await?;
62 // ANCHOR_END: stream-operations
63 println!("Streams: {:?}, config: {:?}", streams, config);
64
65 // ANCHOR: access-token-basic
66 // List tokens (returns metadata, not the secret)
67 let tokens = client.list_access_tokens(Default::default()).await?;
68
69 // Issue a token scoped to streams under "users/1234/"
70 let result = client
71 .issue_access_token(
72 IssueAccessTokenInput::new(
73 "user-1234-rw-token".parse()?,
74 AccessTokenScopeInput::from_op_group_perms(
75 OperationGroupPermissions::new()
76 .with_stream(ReadWritePermissions::read_write()),
77 )
78 .with_basins(BasinMatcher::Prefix("".parse()?)) // all basins
79 .with_streams(StreamMatcher::Prefix("users/1234/".parse()?)),
80 )
81 .with_expires_at("2027-01-01T00:00:00Z".parse()?),
82 )
83 .await?;
84
85 // Revoke a token
86 client
87 .revoke_access_token("user-1234-rw-token".parse()?)
88 .await?;
89 // ANCHOR_END: access-token-basic
90 println!("Tokens: {:?}, issued: {:?}", tokens, result);
91
92 // ANCHOR: access-token-restricted
93 client
94 .issue_access_token(IssueAccessTokenInput::new(
95 "restricted-token".parse()?,
96 AccessTokenScopeInput::from_op_group_perms(
97 OperationGroupPermissions::new().with_stream(ReadWritePermissions::read_only()),
98 )
99 .with_basins(BasinMatcher::Exact("production".parse()?))
100 .with_streams(StreamMatcher::Prefix("logs/".parse()?)),
101 ))
102 .await?;
103 // ANCHOR_END: access-token-restricted
104
105 // Pagination example - not executed by default
106 if false {
107 // ANCHOR: pagination
108 // Iterate through all streams with automatic pagination
109 let mut stream = basin.list_all_streams(ListAllStreamsInput::new());
110 while let Some(info) = stream.next().await {
111 let info = info?;
112 println!("{}", info.name);
113 }
114 // ANCHOR_END: pagination
115 }
116
117 Ok(())
118}Sourcepub fn with_ops(self, ops: impl IntoIterator<Item = Operation>) -> Self
pub fn with_ops(self, ops: impl IntoIterator<Item = Operation>) -> Self
Set the permitted operations.
Examples found in repository?
examples/issue_access_token.rs (line 25)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}Sourcepub fn with_op_group_perms(
self,
op_group_perms: OperationGroupPermissions,
) -> Self
pub fn with_op_group_perms( self, op_group_perms: OperationGroupPermissions, ) -> Self
Set the access permissions at the operation group level.
Sourcepub fn with_basins(self, basins: BasinMatcher) -> Self
pub fn with_basins(self, basins: BasinMatcher) -> Self
Set the permitted basins.
Defaults to no basins.
Examples found in repository?
examples/issue_access_token.rs (line 27)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}More examples
examples/docs_account_and_basins.rs (line 78)
17async fn main() -> Result<(), Box<dyn std::error::Error>> {
18 let token = std::env::var("S2_ACCESS_TOKEN")?;
19 let basin_name: BasinName = std::env::var("S2_BASIN")?.parse()?;
20
21 let client = S2::new(S2Config::new(token))?;
22
23 // ANCHOR: basin-operations
24 // List basins
25 let basins = client.list_basins(ListBasinsInput::new()).await?;
26
27 // Create a basin
28 client
29 .create_basin(CreateBasinInput::new("my-events".parse()?))
30 .await?;
31
32 // Get configuration
33 let config = client.get_basin_config("my-events".parse()?).await?;
34
35 // Delete
36 client
37 .delete_basin(DeleteBasinInput::new("my-events".parse()?))
38 .await?;
39 // ANCHOR_END: basin-operations
40 println!("Basins: {:?}, config: {:?}", basins, config);
41
42 let basin = client.basin(basin_name);
43
44 // ANCHOR: stream-operations
45 // List streams
46 let streams = basin
47 .list_streams(ListStreamsInput::new().with_prefix("user-".parse()?))
48 .await?;
49
50 // Create a stream
51 basin
52 .create_stream(CreateStreamInput::new("user-actions".parse()?))
53 .await?;
54
55 // Get configuration
56 let config = basin.get_stream_config("user-actions".parse()?).await?;
57
58 // Delete
59 basin
60 .delete_stream(DeleteStreamInput::new("user-actions".parse()?))
61 .await?;
62 // ANCHOR_END: stream-operations
63 println!("Streams: {:?}, config: {:?}", streams, config);
64
65 // ANCHOR: access-token-basic
66 // List tokens (returns metadata, not the secret)
67 let tokens = client.list_access_tokens(Default::default()).await?;
68
69 // Issue a token scoped to streams under "users/1234/"
70 let result = client
71 .issue_access_token(
72 IssueAccessTokenInput::new(
73 "user-1234-rw-token".parse()?,
74 AccessTokenScopeInput::from_op_group_perms(
75 OperationGroupPermissions::new()
76 .with_stream(ReadWritePermissions::read_write()),
77 )
78 .with_basins(BasinMatcher::Prefix("".parse()?)) // all basins
79 .with_streams(StreamMatcher::Prefix("users/1234/".parse()?)),
80 )
81 .with_expires_at("2027-01-01T00:00:00Z".parse()?),
82 )
83 .await?;
84
85 // Revoke a token
86 client
87 .revoke_access_token("user-1234-rw-token".parse()?)
88 .await?;
89 // ANCHOR_END: access-token-basic
90 println!("Tokens: {:?}, issued: {:?}", tokens, result);
91
92 // ANCHOR: access-token-restricted
93 client
94 .issue_access_token(IssueAccessTokenInput::new(
95 "restricted-token".parse()?,
96 AccessTokenScopeInput::from_op_group_perms(
97 OperationGroupPermissions::new().with_stream(ReadWritePermissions::read_only()),
98 )
99 .with_basins(BasinMatcher::Exact("production".parse()?))
100 .with_streams(StreamMatcher::Prefix("logs/".parse()?)),
101 ))
102 .await?;
103 // ANCHOR_END: access-token-restricted
104
105 // Pagination example - not executed by default
106 if false {
107 // ANCHOR: pagination
108 // Iterate through all streams with automatic pagination
109 let mut stream = basin.list_all_streams(ListAllStreamsInput::new());
110 while let Some(info) = stream.next().await {
111 let info = info?;
112 println!("{}", info.name);
113 }
114 // ANCHOR_END: pagination
115 }
116
117 Ok(())
118}Sourcepub fn with_streams(self, streams: StreamMatcher) -> Self
pub fn with_streams(self, streams: StreamMatcher) -> Self
Set the permitted streams.
Defaults to no streams.
Examples found in repository?
examples/issue_access_token.rs (line 26)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}More examples
examples/docs_account_and_basins.rs (line 79)
17async fn main() -> Result<(), Box<dyn std::error::Error>> {
18 let token = std::env::var("S2_ACCESS_TOKEN")?;
19 let basin_name: BasinName = std::env::var("S2_BASIN")?.parse()?;
20
21 let client = S2::new(S2Config::new(token))?;
22
23 // ANCHOR: basin-operations
24 // List basins
25 let basins = client.list_basins(ListBasinsInput::new()).await?;
26
27 // Create a basin
28 client
29 .create_basin(CreateBasinInput::new("my-events".parse()?))
30 .await?;
31
32 // Get configuration
33 let config = client.get_basin_config("my-events".parse()?).await?;
34
35 // Delete
36 client
37 .delete_basin(DeleteBasinInput::new("my-events".parse()?))
38 .await?;
39 // ANCHOR_END: basin-operations
40 println!("Basins: {:?}, config: {:?}", basins, config);
41
42 let basin = client.basin(basin_name);
43
44 // ANCHOR: stream-operations
45 // List streams
46 let streams = basin
47 .list_streams(ListStreamsInput::new().with_prefix("user-".parse()?))
48 .await?;
49
50 // Create a stream
51 basin
52 .create_stream(CreateStreamInput::new("user-actions".parse()?))
53 .await?;
54
55 // Get configuration
56 let config = basin.get_stream_config("user-actions".parse()?).await?;
57
58 // Delete
59 basin
60 .delete_stream(DeleteStreamInput::new("user-actions".parse()?))
61 .await?;
62 // ANCHOR_END: stream-operations
63 println!("Streams: {:?}, config: {:?}", streams, config);
64
65 // ANCHOR: access-token-basic
66 // List tokens (returns metadata, not the secret)
67 let tokens = client.list_access_tokens(Default::default()).await?;
68
69 // Issue a token scoped to streams under "users/1234/"
70 let result = client
71 .issue_access_token(
72 IssueAccessTokenInput::new(
73 "user-1234-rw-token".parse()?,
74 AccessTokenScopeInput::from_op_group_perms(
75 OperationGroupPermissions::new()
76 .with_stream(ReadWritePermissions::read_write()),
77 )
78 .with_basins(BasinMatcher::Prefix("".parse()?)) // all basins
79 .with_streams(StreamMatcher::Prefix("users/1234/".parse()?)),
80 )
81 .with_expires_at("2027-01-01T00:00:00Z".parse()?),
82 )
83 .await?;
84
85 // Revoke a token
86 client
87 .revoke_access_token("user-1234-rw-token".parse()?)
88 .await?;
89 // ANCHOR_END: access-token-basic
90 println!("Tokens: {:?}, issued: {:?}", tokens, result);
91
92 // ANCHOR: access-token-restricted
93 client
94 .issue_access_token(IssueAccessTokenInput::new(
95 "restricted-token".parse()?,
96 AccessTokenScopeInput::from_op_group_perms(
97 OperationGroupPermissions::new().with_stream(ReadWritePermissions::read_only()),
98 )
99 .with_basins(BasinMatcher::Exact("production".parse()?))
100 .with_streams(StreamMatcher::Prefix("logs/".parse()?)),
101 ))
102 .await?;
103 // ANCHOR_END: access-token-restricted
104
105 // Pagination example - not executed by default
106 if false {
107 // ANCHOR: pagination
108 // Iterate through all streams with automatic pagination
109 let mut stream = basin.list_all_streams(ListAllStreamsInput::new());
110 while let Some(info) = stream.next().await {
111 let info = info?;
112 println!("{}", info.name);
113 }
114 // ANCHOR_END: pagination
115 }
116
117 Ok(())
118}Sourcepub fn with_access_tokens(self, access_tokens: AccessTokenMatcher) -> Self
pub fn with_access_tokens(self, access_tokens: AccessTokenMatcher) -> Self
Set the permitted access tokens.
Defaults to no access tokens.
Trait Implementations§
Source§impl Clone for AccessTokenScopeInput
impl Clone for AccessTokenScopeInput
Source§fn clone(&self) -> AccessTokenScopeInput
fn clone(&self) -> AccessTokenScopeInput
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source. Read moreSource§impl Debug for AccessTokenScopeInput
impl Debug for AccessTokenScopeInput
Source§impl From<AccessTokenScopeInput> for AccessTokenScope
impl From<AccessTokenScopeInput> for AccessTokenScope
Source§fn from(value: AccessTokenScopeInput) -> Self
fn from(value: AccessTokenScopeInput) -> Self
Converts to this type from the input type.
Auto Trait Implementations§
impl Freeze for AccessTokenScopeInput
impl RefUnwindSafe for AccessTokenScopeInput
impl Send for AccessTokenScopeInput
impl Sync for AccessTokenScopeInput
impl Unpin for AccessTokenScopeInput
impl UnwindSafe for AccessTokenScopeInput
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
Converts
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
Converts
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read more