ory-keto-client 0.0.0.alpha40
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/Gemfile +9 -0
- data/README.md +115 -0
- data/Rakefile +10 -0
- data/docs/AddOryAccessControlPolicyRoleMembers.md +21 -0
- data/docs/AddOryAccessControlPolicyRoleMembersBody.md +17 -0
- data/docs/AddOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
- data/docs/AddOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
- data/docs/AddOryAccessControlPolicyRoleMembersOK.md +17 -0
- data/docs/AuthorizationResult.md +17 -0
- data/docs/DeleteOryAccessControlPolicy.md +19 -0
- data/docs/DeleteOryAccessControlPolicyInternalServerError.md +17 -0
- data/docs/DeleteOryAccessControlPolicyInternalServerErrorBody.md +27 -0
- data/docs/DeleteOryAccessControlPolicyRole.md +19 -0
- data/docs/DeleteOryAccessControlPolicyRoleInternalServerError.md +17 -0
- data/docs/DeleteOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
- data/docs/DoOryAccessControlPoliciesAllow.md +19 -0
- data/docs/DoOryAccessControlPoliciesAllowForbidden.md +17 -0
- data/docs/DoOryAccessControlPoliciesAllowInternalServerError.md +17 -0
- data/docs/DoOryAccessControlPoliciesAllowInternalServerErrorBody.md +27 -0
- data/docs/DoOryAccessControlPoliciesAllowOK.md +17 -0
- data/docs/EnginesApi.md +579 -0
- data/docs/GetOryAccessControlPolicy.md +19 -0
- data/docs/GetOryAccessControlPolicyInternalServerError.md +17 -0
- data/docs/GetOryAccessControlPolicyInternalServerErrorBody.md +27 -0
- data/docs/GetOryAccessControlPolicyNotFound.md +17 -0
- data/docs/GetOryAccessControlPolicyNotFoundBody.md +27 -0
- data/docs/GetOryAccessControlPolicyOK.md +17 -0
- data/docs/GetOryAccessControlPolicyRole.md +19 -0
- data/docs/GetOryAccessControlPolicyRoleInternalServerError.md +17 -0
- data/docs/GetOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
- data/docs/GetOryAccessControlPolicyRoleNotFound.md +17 -0
- data/docs/GetOryAccessControlPolicyRoleNotFoundBody.md +27 -0
- data/docs/GetOryAccessControlPolicyRoleOK.md +17 -0
- data/docs/HealthApi.md +96 -0
- data/docs/HealthNotReadyStatus.md +17 -0
- data/docs/HealthStatus.md +17 -0
- data/docs/InlineResponse500.md +27 -0
- data/docs/Input.md +23 -0
- data/docs/IsInstanceAliveInternalServerError.md +17 -0
- data/docs/IsInstanceAliveInternalServerErrorBody.md +27 -0
- data/docs/IsInstanceAliveOK.md +17 -0
- data/docs/ListOryAccessControlPolicies.md +21 -0
- data/docs/ListOryAccessControlPoliciesInternalServerError.md +17 -0
- data/docs/ListOryAccessControlPoliciesInternalServerErrorBody.md +27 -0
- data/docs/ListOryAccessControlPoliciesOK.md +17 -0
- data/docs/ListOryAccessControlPolicyRoles.md +21 -0
- data/docs/ListOryAccessControlPolicyRolesInternalServerError.md +17 -0
- data/docs/ListOryAccessControlPolicyRolesInternalServerErrorBody.md +27 -0
- data/docs/ListOryAccessControlPolicyRolesOK.md +17 -0
- data/docs/OryAccessControlPolicies.md +17 -0
- data/docs/OryAccessControlPolicy.md +29 -0
- data/docs/OryAccessControlPolicyAllowedInput.md +23 -0
- data/docs/OryAccessControlPolicyRole.md +19 -0
- data/docs/OryAccessControlPolicyRoles.md +17 -0
- data/docs/Policy.md +29 -0
- data/docs/RemoveOryAccessControlPolicyRoleMembers.md +21 -0
- data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
- data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
- data/docs/Role.md +19 -0
- data/docs/SwaggerHealthStatus.md +17 -0
- data/docs/SwaggerNotReadyStatus.md +17 -0
- data/docs/SwaggerVersion.md +17 -0
- data/docs/UpsertOryAccessControlPolicy.md +19 -0
- data/docs/UpsertOryAccessControlPolicyInternalServerError.md +17 -0
- data/docs/UpsertOryAccessControlPolicyInternalServerErrorBody.md +27 -0
- data/docs/UpsertOryAccessControlPolicyOK.md +17 -0
- data/docs/UpsertOryAccessControlPolicyRole.md +19 -0
- data/docs/UpsertOryAccessControlPolicyRoleInternalServerError.md +17 -0
- data/docs/UpsertOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
- data/docs/UpsertOryAccessControlPolicyRoleOK.md +17 -0
- data/docs/Version.md +17 -0
- data/docs/VersionApi.md +52 -0
- data/lib/ory-keto-client.rb +51 -0
- data/lib/ory-keto-client/api/engines_api.rb +778 -0
- data/lib/ory-keto-client/api/health_api.rb +134 -0
- data/lib/ory-keto-client/api/version_api.rb +78 -0
- data/lib/ory-keto-client/api_client.rb +387 -0
- data/lib/ory-keto-client/api_error.rb +57 -0
- data/lib/ory-keto-client/configuration.rb +241 -0
- data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members.rb +237 -0
- data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_body.rb +209 -0
- data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_ok.rb +207 -0
- data/lib/ory-keto-client/models/authorization_result.rb +212 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy.rb +228 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy_role.rb +228 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/do_ory_access_control_policies_allow.rb +222 -0
- data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_forbidden.rb +207 -0
- data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_ok.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy.rb +228 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found_body.rb +260 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_ok.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role.rb +228 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found.rb +207 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found_body.rb +260 -0
- data/lib/ory-keto-client/models/get_ory_access_control_policy_role_ok.rb +207 -0
- data/lib/ory-keto-client/models/health_not_ready_status.rb +209 -0
- data/lib/ory-keto-client/models/health_status.rb +207 -0
- data/lib/ory-keto-client/models/inline_response500.rb +253 -0
- data/lib/ory-keto-client/models/input.rb +239 -0
- data/lib/ory-keto-client/models/is_instance_alive_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/is_instance_alive_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/is_instance_alive_ok.rb +207 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policies.rb +233 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policies_ok.rb +210 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policy_roles.rb +233 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_ok.rb +210 -0
- data/lib/ory-keto-client/models/ory_access_control_policies.rb +209 -0
- data/lib/ory-keto-client/models/ory_access_control_policy.rb +273 -0
- data/lib/ory-keto-client/models/ory_access_control_policy_allowed_input.rb +237 -0
- data/lib/ory-keto-client/models/ory_access_control_policy_role.rb +220 -0
- data/lib/ory-keto-client/models/ory_access_control_policy_roles.rb +209 -0
- data/lib/ory-keto-client/models/policy.rb +275 -0
- data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members.rb +243 -0
- data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/role.rb +220 -0
- data/lib/ory-keto-client/models/swagger_health_status.rb +208 -0
- data/lib/ory-keto-client/models/swagger_not_ready_status.rb +210 -0
- data/lib/ory-keto-client/models/swagger_version.rb +208 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy.rb +222 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_ok.rb +207 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role.rb +222 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error.rb +207 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
- data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_ok.rb +207 -0
- data/lib/ory-keto-client/models/version.rb +207 -0
- data/lib/ory-keto-client/version.rb +15 -0
- data/ory-keto-client.gemspec +39 -0
- data/spec/api/engines_api_spec.rb +182 -0
- data/spec/api/health_api_spec.rb +57 -0
- data/spec/api/version_api_spec.rb +46 -0
- data/spec/api_client_spec.rb +226 -0
- data/spec/configuration_spec.rb +42 -0
- data/spec/models/add_ory_access_control_policy_role_members_body_spec.rb +41 -0
- data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
- data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
- data/spec/models/add_ory_access_control_policy_role_members_ok_spec.rb +41 -0
- data/spec/models/add_ory_access_control_policy_role_members_spec.rb +53 -0
- data/spec/models/authorization_result_spec.rb +41 -0
- data/spec/models/delete_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
- data/spec/models/delete_ory_access_control_policy_internal_server_error_spec.rb +41 -0
- data/spec/models/delete_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
- data/spec/models/delete_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
- data/spec/models/delete_ory_access_control_policy_role_spec.rb +47 -0
- data/spec/models/delete_ory_access_control_policy_spec.rb +47 -0
- data/spec/models/do_ory_access_control_policies_allow_forbidden_spec.rb +41 -0
- data/spec/models/do_ory_access_control_policies_allow_internal_server_error_body_spec.rb +71 -0
- data/spec/models/do_ory_access_control_policies_allow_internal_server_error_spec.rb +41 -0
- data/spec/models/do_ory_access_control_policies_allow_ok_spec.rb +41 -0
- data/spec/models/do_ory_access_control_policies_allow_spec.rb +47 -0
- data/spec/models/get_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
- data/spec/models/get_ory_access_control_policy_internal_server_error_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_not_found_body_spec.rb +71 -0
- data/spec/models/get_ory_access_control_policy_not_found_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_ok_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
- data/spec/models/get_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_role_not_found_body_spec.rb +71 -0
- data/spec/models/get_ory_access_control_policy_role_not_found_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_role_ok_spec.rb +41 -0
- data/spec/models/get_ory_access_control_policy_role_spec.rb +47 -0
- data/spec/models/get_ory_access_control_policy_spec.rb +47 -0
- data/spec/models/health_not_ready_status_spec.rb +41 -0
- data/spec/models/health_status_spec.rb +41 -0
- data/spec/models/inline_response500_spec.rb +71 -0
- data/spec/models/input_spec.rb +59 -0
- data/spec/models/is_instance_alive_internal_server_error_body_spec.rb +71 -0
- data/spec/models/is_instance_alive_internal_server_error_spec.rb +41 -0
- data/spec/models/is_instance_alive_ok_spec.rb +41 -0
- data/spec/models/list_ory_access_control_policies_internal_server_error_body_spec.rb +71 -0
- data/spec/models/list_ory_access_control_policies_internal_server_error_spec.rb +41 -0
- data/spec/models/list_ory_access_control_policies_ok_spec.rb +41 -0
- data/spec/models/list_ory_access_control_policies_spec.rb +53 -0
- data/spec/models/list_ory_access_control_policy_roles_internal_server_error_body_spec.rb +71 -0
- data/spec/models/list_ory_access_control_policy_roles_internal_server_error_spec.rb +41 -0
- data/spec/models/list_ory_access_control_policy_roles_ok_spec.rb +41 -0
- data/spec/models/list_ory_access_control_policy_roles_spec.rb +53 -0
- data/spec/models/ory_access_control_policies_spec.rb +41 -0
- data/spec/models/ory_access_control_policy_allowed_input_spec.rb +59 -0
- data/spec/models/ory_access_control_policy_role_spec.rb +47 -0
- data/spec/models/ory_access_control_policy_roles_spec.rb +41 -0
- data/spec/models/ory_access_control_policy_spec.rb +77 -0
- data/spec/models/policy_spec.rb +77 -0
- data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
- data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
- data/spec/models/remove_ory_access_control_policy_role_members_spec.rb +53 -0
- data/spec/models/role_spec.rb +47 -0
- data/spec/models/swagger_health_status_spec.rb +41 -0
- data/spec/models/swagger_not_ready_status_spec.rb +41 -0
- data/spec/models/swagger_version_spec.rb +41 -0
- data/spec/models/upsert_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
- data/spec/models/upsert_ory_access_control_policy_internal_server_error_spec.rb +41 -0
- data/spec/models/upsert_ory_access_control_policy_ok_spec.rb +41 -0
- data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
- data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
- data/spec/models/upsert_ory_access_control_policy_role_ok_spec.rb +41 -0
- data/spec/models/upsert_ory_access_control_policy_role_spec.rb +47 -0
- data/spec/models/upsert_ory_access_control_policy_spec.rb +47 -0
- data/spec/models/version_spec.rb +41 -0
- data/spec/spec_helper.rb +111 -0
- metadata +396 -0
@@ -0,0 +1,17 @@
|
|
1
|
+
# OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
Name | Type | Description | Notes
|
6
|
+
------------ | ------------- | ------------- | -------------
|
7
|
+
**payload** | [**DoOryAccessControlPoliciesAllowInternalServerErrorBody**](DoOryAccessControlPoliciesAllowInternalServerErrorBody.md) | | [optional]
|
8
|
+
|
9
|
+
## Code Sample
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'OryHydraClient'
|
13
|
+
|
14
|
+
instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError.new(payload: null)
|
15
|
+
```
|
16
|
+
|
17
|
+
|
@@ -0,0 +1,27 @@
|
|
1
|
+
# OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
Name | Type | Description | Notes
|
6
|
+
------------ | ------------- | ------------- | -------------
|
7
|
+
**code** | **Integer** | code | [optional]
|
8
|
+
**details** | **Array<Hash<String, Object>>** | details | [optional]
|
9
|
+
**message** | **String** | message | [optional]
|
10
|
+
**reason** | **String** | reason | [optional]
|
11
|
+
**request** | **String** | request | [optional]
|
12
|
+
**status** | **String** | status | [optional]
|
13
|
+
|
14
|
+
## Code Sample
|
15
|
+
|
16
|
+
```ruby
|
17
|
+
require 'OryHydraClient'
|
18
|
+
|
19
|
+
instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody.new(code: null,
|
20
|
+
details: null,
|
21
|
+
message: null,
|
22
|
+
reason: null,
|
23
|
+
request: null,
|
24
|
+
status: null)
|
25
|
+
```
|
26
|
+
|
27
|
+
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# OryHydraClient::DoOryAccessControlPoliciesAllowOK
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
Name | Type | Description | Notes
|
6
|
+
------------ | ------------- | ------------- | -------------
|
7
|
+
**payload** | [**AuthorizationResult**](AuthorizationResult.md) | | [optional]
|
8
|
+
|
9
|
+
## Code Sample
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'OryHydraClient'
|
13
|
+
|
14
|
+
instance = OryHydraClient::DoOryAccessControlPoliciesAllowOK.new(payload: null)
|
15
|
+
```
|
16
|
+
|
17
|
+
|
data/docs/EnginesApi.md
ADDED
@@ -0,0 +1,579 @@
|
|
1
|
+
# OryHydraClient::EnginesApi
|
2
|
+
|
3
|
+
All URIs are relative to *http://localhost*
|
4
|
+
|
5
|
+
Method | HTTP request | Description
|
6
|
+
------------- | ------------- | -------------
|
7
|
+
[**add_ory_access_control_policy_role_members**](EnginesApi.md#add_ory_access_control_policy_role_members) | **PUT** /engines/acp/ory/{flavor}/roles/{id}/members | Add a member to an ORY Access Control Policy Role
|
8
|
+
[**delete_ory_access_control_policy**](EnginesApi.md#delete_ory_access_control_policy) | **DELETE** /engines/acp/ory/{flavor}/policies/{id} |
|
9
|
+
[**delete_ory_access_control_policy_role**](EnginesApi.md#delete_ory_access_control_policy_role) | **DELETE** /engines/acp/ory/{flavor}/roles/{id} | Delete an ORY Access Control Policy Role
|
10
|
+
[**do_ory_access_control_policies_allow**](EnginesApi.md#do_ory_access_control_policies_allow) | **POST** /engines/acp/ory/{flavor}/allowed | Check if a request is allowed
|
11
|
+
[**get_ory_access_control_policy**](EnginesApi.md#get_ory_access_control_policy) | **GET** /engines/acp/ory/{flavor}/policies/{id} |
|
12
|
+
[**get_ory_access_control_policy_role**](EnginesApi.md#get_ory_access_control_policy_role) | **GET** /engines/acp/ory/{flavor}/roles/{id} | Get an ORY Access Control Policy Role
|
13
|
+
[**list_ory_access_control_policies**](EnginesApi.md#list_ory_access_control_policies) | **GET** /engines/acp/ory/{flavor}/policies |
|
14
|
+
[**list_ory_access_control_policy_roles**](EnginesApi.md#list_ory_access_control_policy_roles) | **GET** /engines/acp/ory/{flavor}/roles | List ORY Access Control Policy Roles
|
15
|
+
[**remove_ory_access_control_policy_role_members**](EnginesApi.md#remove_ory_access_control_policy_role_members) | **DELETE** /engines/acp/ory/{flavor}/roles/{id}/members/{member} | Remove a member from an ORY Access Control Policy Role
|
16
|
+
[**upsert_ory_access_control_policy**](EnginesApi.md#upsert_ory_access_control_policy) | **PUT** /engines/acp/ory/{flavor}/policies |
|
17
|
+
[**upsert_ory_access_control_policy_role**](EnginesApi.md#upsert_ory_access_control_policy_role) | **PUT** /engines/acp/ory/{flavor}/roles | Upsert an ORY Access Control Policy Role
|
18
|
+
|
19
|
+
|
20
|
+
|
21
|
+
## add_ory_access_control_policy_role_members
|
22
|
+
|
23
|
+
> OryAccessControlPolicyRole add_ory_access_control_policy_role_members(flavor, id, opts)
|
24
|
+
|
25
|
+
Add a member to an ORY Access Control Policy Role
|
26
|
+
|
27
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
28
|
+
|
29
|
+
### Example
|
30
|
+
|
31
|
+
```ruby
|
32
|
+
# load the gem
|
33
|
+
require 'ory-keto-client'
|
34
|
+
|
35
|
+
api_instance = OryHydraClient::EnginesApi.new
|
36
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
37
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
38
|
+
opts = {
|
39
|
+
body: OryHydraClient::AddOryAccessControlPolicyRoleMembersBody.new # AddOryAccessControlPolicyRoleMembersBody |
|
40
|
+
}
|
41
|
+
|
42
|
+
begin
|
43
|
+
#Add a member to an ORY Access Control Policy Role
|
44
|
+
result = api_instance.add_ory_access_control_policy_role_members(flavor, id, opts)
|
45
|
+
p result
|
46
|
+
rescue OryHydraClient::ApiError => e
|
47
|
+
puts "Exception when calling EnginesApi->add_ory_access_control_policy_role_members: #{e}"
|
48
|
+
end
|
49
|
+
```
|
50
|
+
|
51
|
+
### Parameters
|
52
|
+
|
53
|
+
|
54
|
+
Name | Type | Description | Notes
|
55
|
+
------------- | ------------- | ------------- | -------------
|
56
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
57
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
58
|
+
**body** | [**AddOryAccessControlPolicyRoleMembersBody**](AddOryAccessControlPolicyRoleMembersBody.md)| | [optional]
|
59
|
+
|
60
|
+
### Return type
|
61
|
+
|
62
|
+
[**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
|
63
|
+
|
64
|
+
### Authorization
|
65
|
+
|
66
|
+
No authorization required
|
67
|
+
|
68
|
+
### HTTP request headers
|
69
|
+
|
70
|
+
- **Content-Type**: application/json
|
71
|
+
- **Accept**: application/json
|
72
|
+
|
73
|
+
|
74
|
+
## delete_ory_access_control_policy
|
75
|
+
|
76
|
+
> delete_ory_access_control_policy(flavor, id)
|
77
|
+
|
78
|
+
|
79
|
+
|
80
|
+
Delete an ORY Access Control Policy
|
81
|
+
|
82
|
+
### Example
|
83
|
+
|
84
|
+
```ruby
|
85
|
+
# load the gem
|
86
|
+
require 'ory-keto-client'
|
87
|
+
|
88
|
+
api_instance = OryHydraClient::EnginesApi.new
|
89
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
90
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
91
|
+
|
92
|
+
begin
|
93
|
+
api_instance.delete_ory_access_control_policy(flavor, id)
|
94
|
+
rescue OryHydraClient::ApiError => e
|
95
|
+
puts "Exception when calling EnginesApi->delete_ory_access_control_policy: #{e}"
|
96
|
+
end
|
97
|
+
```
|
98
|
+
|
99
|
+
### Parameters
|
100
|
+
|
101
|
+
|
102
|
+
Name | Type | Description | Notes
|
103
|
+
------------- | ------------- | ------------- | -------------
|
104
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
105
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
106
|
+
|
107
|
+
### Return type
|
108
|
+
|
109
|
+
nil (empty response body)
|
110
|
+
|
111
|
+
### Authorization
|
112
|
+
|
113
|
+
No authorization required
|
114
|
+
|
115
|
+
### HTTP request headers
|
116
|
+
|
117
|
+
- **Content-Type**: Not defined
|
118
|
+
- **Accept**: application/json
|
119
|
+
|
120
|
+
|
121
|
+
## delete_ory_access_control_policy_role
|
122
|
+
|
123
|
+
> delete_ory_access_control_policy_role(flavor, id)
|
124
|
+
|
125
|
+
Delete an ORY Access Control Policy Role
|
126
|
+
|
127
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
128
|
+
|
129
|
+
### Example
|
130
|
+
|
131
|
+
```ruby
|
132
|
+
# load the gem
|
133
|
+
require 'ory-keto-client'
|
134
|
+
|
135
|
+
api_instance = OryHydraClient::EnginesApi.new
|
136
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
137
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
138
|
+
|
139
|
+
begin
|
140
|
+
#Delete an ORY Access Control Policy Role
|
141
|
+
api_instance.delete_ory_access_control_policy_role(flavor, id)
|
142
|
+
rescue OryHydraClient::ApiError => e
|
143
|
+
puts "Exception when calling EnginesApi->delete_ory_access_control_policy_role: #{e}"
|
144
|
+
end
|
145
|
+
```
|
146
|
+
|
147
|
+
### Parameters
|
148
|
+
|
149
|
+
|
150
|
+
Name | Type | Description | Notes
|
151
|
+
------------- | ------------- | ------------- | -------------
|
152
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
153
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
154
|
+
|
155
|
+
### Return type
|
156
|
+
|
157
|
+
nil (empty response body)
|
158
|
+
|
159
|
+
### Authorization
|
160
|
+
|
161
|
+
No authorization required
|
162
|
+
|
163
|
+
### HTTP request headers
|
164
|
+
|
165
|
+
- **Content-Type**: Not defined
|
166
|
+
- **Accept**: application/json
|
167
|
+
|
168
|
+
|
169
|
+
## do_ory_access_control_policies_allow
|
170
|
+
|
171
|
+
> AuthorizationResult do_ory_access_control_policies_allow(flavor, opts)
|
172
|
+
|
173
|
+
Check if a request is allowed
|
174
|
+
|
175
|
+
Use this endpoint to check if a request is allowed or not. If the request is allowed, a 200 response with `{\"allowed\":\"true\"}` will be sent. If the request is denied, a 403 response with `{\"allowed\":\"false\"}` will be sent instead.
|
176
|
+
|
177
|
+
### Example
|
178
|
+
|
179
|
+
```ruby
|
180
|
+
# load the gem
|
181
|
+
require 'ory-keto-client'
|
182
|
+
|
183
|
+
api_instance = OryHydraClient::EnginesApi.new
|
184
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
185
|
+
opts = {
|
186
|
+
body: OryHydraClient::OryAccessControlPolicyAllowedInput.new # OryAccessControlPolicyAllowedInput |
|
187
|
+
}
|
188
|
+
|
189
|
+
begin
|
190
|
+
#Check if a request is allowed
|
191
|
+
result = api_instance.do_ory_access_control_policies_allow(flavor, opts)
|
192
|
+
p result
|
193
|
+
rescue OryHydraClient::ApiError => e
|
194
|
+
puts "Exception when calling EnginesApi->do_ory_access_control_policies_allow: #{e}"
|
195
|
+
end
|
196
|
+
```
|
197
|
+
|
198
|
+
### Parameters
|
199
|
+
|
200
|
+
|
201
|
+
Name | Type | Description | Notes
|
202
|
+
------------- | ------------- | ------------- | -------------
|
203
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
204
|
+
**body** | [**OryAccessControlPolicyAllowedInput**](OryAccessControlPolicyAllowedInput.md)| | [optional]
|
205
|
+
|
206
|
+
### Return type
|
207
|
+
|
208
|
+
[**AuthorizationResult**](AuthorizationResult.md)
|
209
|
+
|
210
|
+
### Authorization
|
211
|
+
|
212
|
+
No authorization required
|
213
|
+
|
214
|
+
### HTTP request headers
|
215
|
+
|
216
|
+
- **Content-Type**: application/json
|
217
|
+
- **Accept**: application/json
|
218
|
+
|
219
|
+
|
220
|
+
## get_ory_access_control_policy
|
221
|
+
|
222
|
+
> OryAccessControlPolicy get_ory_access_control_policy(flavor, id)
|
223
|
+
|
224
|
+
|
225
|
+
|
226
|
+
Get an ORY Access Control Policy
|
227
|
+
|
228
|
+
### Example
|
229
|
+
|
230
|
+
```ruby
|
231
|
+
# load the gem
|
232
|
+
require 'ory-keto-client'
|
233
|
+
|
234
|
+
api_instance = OryHydraClient::EnginesApi.new
|
235
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
236
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
237
|
+
|
238
|
+
begin
|
239
|
+
result = api_instance.get_ory_access_control_policy(flavor, id)
|
240
|
+
p result
|
241
|
+
rescue OryHydraClient::ApiError => e
|
242
|
+
puts "Exception when calling EnginesApi->get_ory_access_control_policy: #{e}"
|
243
|
+
end
|
244
|
+
```
|
245
|
+
|
246
|
+
### Parameters
|
247
|
+
|
248
|
+
|
249
|
+
Name | Type | Description | Notes
|
250
|
+
------------- | ------------- | ------------- | -------------
|
251
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
252
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
253
|
+
|
254
|
+
### Return type
|
255
|
+
|
256
|
+
[**OryAccessControlPolicy**](OryAccessControlPolicy.md)
|
257
|
+
|
258
|
+
### Authorization
|
259
|
+
|
260
|
+
No authorization required
|
261
|
+
|
262
|
+
### HTTP request headers
|
263
|
+
|
264
|
+
- **Content-Type**: Not defined
|
265
|
+
- **Accept**: application/json
|
266
|
+
|
267
|
+
|
268
|
+
## get_ory_access_control_policy_role
|
269
|
+
|
270
|
+
> OryAccessControlPolicyRole get_ory_access_control_policy_role(flavor, id)
|
271
|
+
|
272
|
+
Get an ORY Access Control Policy Role
|
273
|
+
|
274
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
275
|
+
|
276
|
+
### Example
|
277
|
+
|
278
|
+
```ruby
|
279
|
+
# load the gem
|
280
|
+
require 'ory-keto-client'
|
281
|
+
|
282
|
+
api_instance = OryHydraClient::EnginesApi.new
|
283
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
284
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
285
|
+
|
286
|
+
begin
|
287
|
+
#Get an ORY Access Control Policy Role
|
288
|
+
result = api_instance.get_ory_access_control_policy_role(flavor, id)
|
289
|
+
p result
|
290
|
+
rescue OryHydraClient::ApiError => e
|
291
|
+
puts "Exception when calling EnginesApi->get_ory_access_control_policy_role: #{e}"
|
292
|
+
end
|
293
|
+
```
|
294
|
+
|
295
|
+
### Parameters
|
296
|
+
|
297
|
+
|
298
|
+
Name | Type | Description | Notes
|
299
|
+
------------- | ------------- | ------------- | -------------
|
300
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
301
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
302
|
+
|
303
|
+
### Return type
|
304
|
+
|
305
|
+
[**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
|
306
|
+
|
307
|
+
### Authorization
|
308
|
+
|
309
|
+
No authorization required
|
310
|
+
|
311
|
+
### HTTP request headers
|
312
|
+
|
313
|
+
- **Content-Type**: Not defined
|
314
|
+
- **Accept**: application/json
|
315
|
+
|
316
|
+
|
317
|
+
## list_ory_access_control_policies
|
318
|
+
|
319
|
+
> Array<OryAccessControlPolicy> list_ory_access_control_policies(flavor, opts)
|
320
|
+
|
321
|
+
|
322
|
+
|
323
|
+
List ORY Access Control Policies
|
324
|
+
|
325
|
+
### Example
|
326
|
+
|
327
|
+
```ruby
|
328
|
+
# load the gem
|
329
|
+
require 'ory-keto-client'
|
330
|
+
|
331
|
+
api_instance = OryHydraClient::EnginesApi.new
|
332
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
|
333
|
+
opts = {
|
334
|
+
limit: 56, # Integer | The maximum amount of policies returned.
|
335
|
+
offset: 56, # Integer | The offset from where to start looking.
|
336
|
+
subject: 'subject_example', # String | The subject for whom the policies are to be listed.
|
337
|
+
resource: 'resource_example', # String | The resource for which the policies are to be listed.
|
338
|
+
action: 'action_example' # String | The action for which policies are to be listed.
|
339
|
+
}
|
340
|
+
|
341
|
+
begin
|
342
|
+
result = api_instance.list_ory_access_control_policies(flavor, opts)
|
343
|
+
p result
|
344
|
+
rescue OryHydraClient::ApiError => e
|
345
|
+
puts "Exception when calling EnginesApi->list_ory_access_control_policies: #{e}"
|
346
|
+
end
|
347
|
+
```
|
348
|
+
|
349
|
+
### Parameters
|
350
|
+
|
351
|
+
|
352
|
+
Name | Type | Description | Notes
|
353
|
+
------------- | ------------- | ------------- | -------------
|
354
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
|
355
|
+
**limit** | **Integer**| The maximum amount of policies returned. | [optional]
|
356
|
+
**offset** | **Integer**| The offset from where to start looking. | [optional]
|
357
|
+
**subject** | **String**| The subject for whom the policies are to be listed. | [optional]
|
358
|
+
**resource** | **String**| The resource for which the policies are to be listed. | [optional]
|
359
|
+
**action** | **String**| The action for which policies are to be listed. | [optional]
|
360
|
+
|
361
|
+
### Return type
|
362
|
+
|
363
|
+
[**Array<OryAccessControlPolicy>**](OryAccessControlPolicy.md)
|
364
|
+
|
365
|
+
### Authorization
|
366
|
+
|
367
|
+
No authorization required
|
368
|
+
|
369
|
+
### HTTP request headers
|
370
|
+
|
371
|
+
- **Content-Type**: Not defined
|
372
|
+
- **Accept**: application/json
|
373
|
+
|
374
|
+
|
375
|
+
## list_ory_access_control_policy_roles
|
376
|
+
|
377
|
+
> Array<OryAccessControlPolicyRole> list_ory_access_control_policy_roles(flavor, opts)
|
378
|
+
|
379
|
+
List ORY Access Control Policy Roles
|
380
|
+
|
381
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
382
|
+
|
383
|
+
### Example
|
384
|
+
|
385
|
+
```ruby
|
386
|
+
# load the gem
|
387
|
+
require 'ory-keto-client'
|
388
|
+
|
389
|
+
api_instance = OryHydraClient::EnginesApi.new
|
390
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
|
391
|
+
opts = {
|
392
|
+
limit: 56, # Integer | The maximum amount of policies returned.
|
393
|
+
offset: 56, # Integer | The offset from where to start looking.
|
394
|
+
member: 'member_example' # String | The member for which the roles are to be listed.
|
395
|
+
}
|
396
|
+
|
397
|
+
begin
|
398
|
+
#List ORY Access Control Policy Roles
|
399
|
+
result = api_instance.list_ory_access_control_policy_roles(flavor, opts)
|
400
|
+
p result
|
401
|
+
rescue OryHydraClient::ApiError => e
|
402
|
+
puts "Exception when calling EnginesApi->list_ory_access_control_policy_roles: #{e}"
|
403
|
+
end
|
404
|
+
```
|
405
|
+
|
406
|
+
### Parameters
|
407
|
+
|
408
|
+
|
409
|
+
Name | Type | Description | Notes
|
410
|
+
------------- | ------------- | ------------- | -------------
|
411
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
|
412
|
+
**limit** | **Integer**| The maximum amount of policies returned. | [optional]
|
413
|
+
**offset** | **Integer**| The offset from where to start looking. | [optional]
|
414
|
+
**member** | **String**| The member for which the roles are to be listed. | [optional]
|
415
|
+
|
416
|
+
### Return type
|
417
|
+
|
418
|
+
[**Array<OryAccessControlPolicyRole>**](OryAccessControlPolicyRole.md)
|
419
|
+
|
420
|
+
### Authorization
|
421
|
+
|
422
|
+
No authorization required
|
423
|
+
|
424
|
+
### HTTP request headers
|
425
|
+
|
426
|
+
- **Content-Type**: Not defined
|
427
|
+
- **Accept**: application/json
|
428
|
+
|
429
|
+
|
430
|
+
## remove_ory_access_control_policy_role_members
|
431
|
+
|
432
|
+
> remove_ory_access_control_policy_role_members(flavor, id, member)
|
433
|
+
|
434
|
+
Remove a member from an ORY Access Control Policy Role
|
435
|
+
|
436
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
437
|
+
|
438
|
+
### Example
|
439
|
+
|
440
|
+
```ruby
|
441
|
+
# load the gem
|
442
|
+
require 'ory-keto-client'
|
443
|
+
|
444
|
+
api_instance = OryHydraClient::EnginesApi.new
|
445
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
446
|
+
id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
|
447
|
+
member = 'member_example' # String | The member to be removed.
|
448
|
+
|
449
|
+
begin
|
450
|
+
#Remove a member from an ORY Access Control Policy Role
|
451
|
+
api_instance.remove_ory_access_control_policy_role_members(flavor, id, member)
|
452
|
+
rescue OryHydraClient::ApiError => e
|
453
|
+
puts "Exception when calling EnginesApi->remove_ory_access_control_policy_role_members: #{e}"
|
454
|
+
end
|
455
|
+
```
|
456
|
+
|
457
|
+
### Parameters
|
458
|
+
|
459
|
+
|
460
|
+
Name | Type | Description | Notes
|
461
|
+
------------- | ------------- | ------------- | -------------
|
462
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
463
|
+
**id** | **String**| The ID of the ORY Access Control Policy Role. |
|
464
|
+
**member** | **String**| The member to be removed. |
|
465
|
+
|
466
|
+
### Return type
|
467
|
+
|
468
|
+
nil (empty response body)
|
469
|
+
|
470
|
+
### Authorization
|
471
|
+
|
472
|
+
No authorization required
|
473
|
+
|
474
|
+
### HTTP request headers
|
475
|
+
|
476
|
+
- **Content-Type**: Not defined
|
477
|
+
- **Accept**: application/json
|
478
|
+
|
479
|
+
|
480
|
+
## upsert_ory_access_control_policy
|
481
|
+
|
482
|
+
> OryAccessControlPolicy upsert_ory_access_control_policy(flavor, opts)
|
483
|
+
|
484
|
+
|
485
|
+
|
486
|
+
Upsert an ORY Access Control Policy
|
487
|
+
|
488
|
+
### Example
|
489
|
+
|
490
|
+
```ruby
|
491
|
+
# load the gem
|
492
|
+
require 'ory-keto-client'
|
493
|
+
|
494
|
+
api_instance = OryHydraClient::EnginesApi.new
|
495
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
496
|
+
opts = {
|
497
|
+
body: OryHydraClient::OryAccessControlPolicy.new # OryAccessControlPolicy |
|
498
|
+
}
|
499
|
+
|
500
|
+
begin
|
501
|
+
result = api_instance.upsert_ory_access_control_policy(flavor, opts)
|
502
|
+
p result
|
503
|
+
rescue OryHydraClient::ApiError => e
|
504
|
+
puts "Exception when calling EnginesApi->upsert_ory_access_control_policy: #{e}"
|
505
|
+
end
|
506
|
+
```
|
507
|
+
|
508
|
+
### Parameters
|
509
|
+
|
510
|
+
|
511
|
+
Name | Type | Description | Notes
|
512
|
+
------------- | ------------- | ------------- | -------------
|
513
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
514
|
+
**body** | [**OryAccessControlPolicy**](OryAccessControlPolicy.md)| | [optional]
|
515
|
+
|
516
|
+
### Return type
|
517
|
+
|
518
|
+
[**OryAccessControlPolicy**](OryAccessControlPolicy.md)
|
519
|
+
|
520
|
+
### Authorization
|
521
|
+
|
522
|
+
No authorization required
|
523
|
+
|
524
|
+
### HTTP request headers
|
525
|
+
|
526
|
+
- **Content-Type**: application/json
|
527
|
+
- **Accept**: application/json
|
528
|
+
|
529
|
+
|
530
|
+
## upsert_ory_access_control_policy_role
|
531
|
+
|
532
|
+
> OryAccessControlPolicyRole upsert_ory_access_control_policy_role(flavor, opts)
|
533
|
+
|
534
|
+
Upsert an ORY Access Control Policy Role
|
535
|
+
|
536
|
+
Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
|
537
|
+
|
538
|
+
### Example
|
539
|
+
|
540
|
+
```ruby
|
541
|
+
# load the gem
|
542
|
+
require 'ory-keto-client'
|
543
|
+
|
544
|
+
api_instance = OryHydraClient::EnginesApi.new
|
545
|
+
flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
|
546
|
+
opts = {
|
547
|
+
body: OryHydraClient::OryAccessControlPolicyRole.new # OryAccessControlPolicyRole |
|
548
|
+
}
|
549
|
+
|
550
|
+
begin
|
551
|
+
#Upsert an ORY Access Control Policy Role
|
552
|
+
result = api_instance.upsert_ory_access_control_policy_role(flavor, opts)
|
553
|
+
p result
|
554
|
+
rescue OryHydraClient::ApiError => e
|
555
|
+
puts "Exception when calling EnginesApi->upsert_ory_access_control_policy_role: #{e}"
|
556
|
+
end
|
557
|
+
```
|
558
|
+
|
559
|
+
### Parameters
|
560
|
+
|
561
|
+
|
562
|
+
Name | Type | Description | Notes
|
563
|
+
------------- | ------------- | ------------- | -------------
|
564
|
+
**flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
|
565
|
+
**body** | [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)| | [optional]
|
566
|
+
|
567
|
+
### Return type
|
568
|
+
|
569
|
+
[**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
|
570
|
+
|
571
|
+
### Authorization
|
572
|
+
|
573
|
+
No authorization required
|
574
|
+
|
575
|
+
### HTTP request headers
|
576
|
+
|
577
|
+
- **Content-Type**: application/json
|
578
|
+
- **Accept**: application/json
|
579
|
+
|