#[non_exhaustive]pub struct OperationGroupPermissions {
pub account: Option<ReadWritePermissions>,
pub basin: Option<ReadWritePermissions>,
pub stream: Option<ReadWritePermissions>,
}Expand description
Permissions at the operation group level.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.account: Option<ReadWritePermissions>Account-level access permissions.
Defaults to None.
basin: Option<ReadWritePermissions>Basin-level access permissions.
Defaults to None.
stream: Option<ReadWritePermissions>Stream-level access permissions.
Defaults to None.
Implementations§
Source§impl OperationGroupPermissions
impl OperationGroupPermissions
Sourcepub fn new() -> Self
pub fn new() -> Self
Create a new OperationGroupPermissions with default values.
Examples found in repository?
examples/issue_access_token.rs (line 23)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}More examples
examples/docs_account_and_basins.rs (line 75)
17async fn main() -> Result<(), Box<dyn std::error::Error>> {
18 let token = std::env::var("S2_ACCESS_TOKEN")?;
19 let basin_name: BasinName = std::env::var("S2_BASIN")?.parse()?;
20
21 let client = S2::new(S2Config::new(token))?;
22
23 // ANCHOR: basin-operations
24 // List basins
25 let basins = client.list_basins(ListBasinsInput::new()).await?;
26
27 // Create a basin
28 client
29 .create_basin(CreateBasinInput::new("my-events".parse()?))
30 .await?;
31
32 // Get configuration
33 let config = client.get_basin_config("my-events".parse()?).await?;
34
35 // Delete
36 client
37 .delete_basin(DeleteBasinInput::new("my-events".parse()?))
38 .await?;
39 // ANCHOR_END: basin-operations
40 println!("Basins: {:?}, config: {:?}", basins, config);
41
42 let basin = client.basin(basin_name);
43
44 // ANCHOR: stream-operations
45 // List streams
46 let streams = basin
47 .list_streams(ListStreamsInput::new().with_prefix("user-".parse()?))
48 .await?;
49
50 // Create a stream
51 basin
52 .create_stream(CreateStreamInput::new("user-actions".parse()?))
53 .await?;
54
55 // Get configuration
56 let config = basin.get_stream_config("user-actions".parse()?).await?;
57
58 // Delete
59 basin
60 .delete_stream(DeleteStreamInput::new("user-actions".parse()?))
61 .await?;
62 // ANCHOR_END: stream-operations
63 println!("Streams: {:?}, config: {:?}", streams, config);
64
65 // ANCHOR: access-token-basic
66 // List tokens (returns metadata, not the secret)
67 let tokens = client.list_access_tokens(Default::default()).await?;
68
69 // Issue a token scoped to streams under "users/1234/"
70 let result = client
71 .issue_access_token(
72 IssueAccessTokenInput::new(
73 "user-1234-rw-token".parse()?,
74 AccessTokenScopeInput::from_op_group_perms(
75 OperationGroupPermissions::new()
76 .with_stream(ReadWritePermissions::read_write()),
77 )
78 .with_basins(BasinMatcher::Prefix("".parse()?)) // all basins
79 .with_streams(StreamMatcher::Prefix("users/1234/".parse()?)),
80 )
81 .with_expires_at("2027-01-01T00:00:00Z".parse()?),
82 )
83 .await?;
84
85 // Revoke a token
86 client
87 .revoke_access_token("user-1234-rw-token".parse()?)
88 .await?;
89 // ANCHOR_END: access-token-basic
90 println!("Tokens: {:?}, issued: {:?}", tokens, result);
91
92 // ANCHOR: access-token-restricted
93 client
94 .issue_access_token(IssueAccessTokenInput::new(
95 "restricted-token".parse()?,
96 AccessTokenScopeInput::from_op_group_perms(
97 OperationGroupPermissions::new().with_stream(ReadWritePermissions::read_only()),
98 )
99 .with_basins(BasinMatcher::Exact("production".parse()?))
100 .with_streams(StreamMatcher::Prefix("logs/".parse()?)),
101 ))
102 .await?;
103 // ANCHOR_END: access-token-restricted
104
105 // Pagination example - not executed by default
106 if false {
107 // ANCHOR: pagination
108 // Iterate through all streams with automatic pagination
109 let mut stream = basin.list_all_streams(ListAllStreamsInput::new());
110 while let Some(info) = stream.next().await {
111 let info = info?;
112 println!("{}", info.name);
113 }
114 // ANCHOR_END: pagination
115 }
116
117 Ok(())
118}Sourcepub fn read_only_all() -> Self
pub fn read_only_all() -> Self
Create read-only permissions for all groups.
Sourcepub fn write_only_all() -> Self
pub fn write_only_all() -> Self
Create write-only permissions for all groups.
Sourcepub fn read_write_all() -> Self
pub fn read_write_all() -> Self
Create read-write permissions for all groups.
Sourcepub fn with_account(self, account: ReadWritePermissions) -> Self
pub fn with_account(self, account: ReadWritePermissions) -> Self
Set account-level access permissions.
Examples found in repository?
examples/issue_access_token.rs (line 23)
10async fn main() -> Result<(), Box<dyn std::error::Error>> {
11 let access_token =
12 std::env::var("S2_ACCESS_TOKEN").map_err(|_| "S2_ACCESS_TOKEN env var not set")?;
13 let basin_name: BasinName = std::env::var("S2_BASIN")
14 .map_err(|_| "S2_BASIN env var not set")?
15 .parse()?;
16
17 let config = S2Config::new(access_token);
18 let s2 = S2::new(config)?;
19
20 let input = IssueAccessTokenInput::new(
21 "ro-token".parse()?,
22 AccessTokenScopeInput::from_op_group_perms(
23 OperationGroupPermissions::new().with_account(ReadWritePermissions::read_only()),
24 )
25 .with_ops([Operation::CreateStream])
26 .with_streams(StreamMatcher::Prefix("audit".parse()?))
27 .with_basins(BasinMatcher::Exact(basin_name)),
28 );
29 let issued_token = s2.issue_access_token(input).await?;
30 println!("Issued access token: {issued_token}");
31
32 Ok(())
33}Sourcepub fn with_basin(self, basin: ReadWritePermissions) -> Self
pub fn with_basin(self, basin: ReadWritePermissions) -> Self
Set basin-level access permissions.
Sourcepub fn with_stream(self, stream: ReadWritePermissions) -> Self
pub fn with_stream(self, stream: ReadWritePermissions) -> Self
Set stream-level access permissions.
Examples found in repository?
examples/docs_account_and_basins.rs (line 76)
17async fn main() -> Result<(), Box<dyn std::error::Error>> {
18 let token = std::env::var("S2_ACCESS_TOKEN")?;
19 let basin_name: BasinName = std::env::var("S2_BASIN")?.parse()?;
20
21 let client = S2::new(S2Config::new(token))?;
22
23 // ANCHOR: basin-operations
24 // List basins
25 let basins = client.list_basins(ListBasinsInput::new()).await?;
26
27 // Create a basin
28 client
29 .create_basin(CreateBasinInput::new("my-events".parse()?))
30 .await?;
31
32 // Get configuration
33 let config = client.get_basin_config("my-events".parse()?).await?;
34
35 // Delete
36 client
37 .delete_basin(DeleteBasinInput::new("my-events".parse()?))
38 .await?;
39 // ANCHOR_END: basin-operations
40 println!("Basins: {:?}, config: {:?}", basins, config);
41
42 let basin = client.basin(basin_name);
43
44 // ANCHOR: stream-operations
45 // List streams
46 let streams = basin
47 .list_streams(ListStreamsInput::new().with_prefix("user-".parse()?))
48 .await?;
49
50 // Create a stream
51 basin
52 .create_stream(CreateStreamInput::new("user-actions".parse()?))
53 .await?;
54
55 // Get configuration
56 let config = basin.get_stream_config("user-actions".parse()?).await?;
57
58 // Delete
59 basin
60 .delete_stream(DeleteStreamInput::new("user-actions".parse()?))
61 .await?;
62 // ANCHOR_END: stream-operations
63 println!("Streams: {:?}, config: {:?}", streams, config);
64
65 // ANCHOR: access-token-basic
66 // List tokens (returns metadata, not the secret)
67 let tokens = client.list_access_tokens(Default::default()).await?;
68
69 // Issue a token scoped to streams under "users/1234/"
70 let result = client
71 .issue_access_token(
72 IssueAccessTokenInput::new(
73 "user-1234-rw-token".parse()?,
74 AccessTokenScopeInput::from_op_group_perms(
75 OperationGroupPermissions::new()
76 .with_stream(ReadWritePermissions::read_write()),
77 )
78 .with_basins(BasinMatcher::Prefix("".parse()?)) // all basins
79 .with_streams(StreamMatcher::Prefix("users/1234/".parse()?)),
80 )
81 .with_expires_at("2027-01-01T00:00:00Z".parse()?),
82 )
83 .await?;
84
85 // Revoke a token
86 client
87 .revoke_access_token("user-1234-rw-token".parse()?)
88 .await?;
89 // ANCHOR_END: access-token-basic
90 println!("Tokens: {:?}, issued: {:?}", tokens, result);
91
92 // ANCHOR: access-token-restricted
93 client
94 .issue_access_token(IssueAccessTokenInput::new(
95 "restricted-token".parse()?,
96 AccessTokenScopeInput::from_op_group_perms(
97 OperationGroupPermissions::new().with_stream(ReadWritePermissions::read_only()),
98 )
99 .with_basins(BasinMatcher::Exact("production".parse()?))
100 .with_streams(StreamMatcher::Prefix("logs/".parse()?)),
101 ))
102 .await?;
103 // ANCHOR_END: access-token-restricted
104
105 // Pagination example - not executed by default
106 if false {
107 // ANCHOR: pagination
108 // Iterate through all streams with automatic pagination
109 let mut stream = basin.list_all_streams(ListAllStreamsInput::new());
110 while let Some(info) = stream.next().await {
111 let info = info?;
112 println!("{}", info.name);
113 }
114 // ANCHOR_END: pagination
115 }
116
117 Ok(())
118}Trait Implementations§
Source§impl Clone for OperationGroupPermissions
impl Clone for OperationGroupPermissions
Source§fn clone(&self) -> OperationGroupPermissions
fn clone(&self) -> OperationGroupPermissions
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source. Read moreSource§impl Debug for OperationGroupPermissions
impl Debug for OperationGroupPermissions
Source§impl Default for OperationGroupPermissions
impl Default for OperationGroupPermissions
Source§fn default() -> OperationGroupPermissions
fn default() -> OperationGroupPermissions
Returns the “default value” for a type. Read more
Source§impl From<OperationGroupPermissions> for PermittedOperationGroups
impl From<OperationGroupPermissions> for PermittedOperationGroups
Source§fn from(value: OperationGroupPermissions) -> Self
fn from(value: OperationGroupPermissions) -> Self
Converts to this type from the input type.
Source§impl From<PermittedOperationGroups> for OperationGroupPermissions
impl From<PermittedOperationGroups> for OperationGroupPermissions
Source§fn from(value: PermittedOperationGroups) -> Self
fn from(value: PermittedOperationGroups) -> Self
Converts to this type from the input type.
Auto Trait Implementations§
impl Freeze for OperationGroupPermissions
impl RefUnwindSafe for OperationGroupPermissions
impl Send for OperationGroupPermissions
impl Sync for OperationGroupPermissions
impl Unpin for OperationGroupPermissions
impl UnwindSafe for OperationGroupPermissions
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
Converts
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
Converts
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read more