ory-keto-client 0.0.0.alpha40

Sign up to get free protection for your applications and to get access to all the features.
Files changed (221) hide show
  1. checksums.yaml +7 -0
  2. data/Gemfile +9 -0
  3. data/README.md +115 -0
  4. data/Rakefile +10 -0
  5. data/docs/AddOryAccessControlPolicyRoleMembers.md +21 -0
  6. data/docs/AddOryAccessControlPolicyRoleMembersBody.md +17 -0
  7. data/docs/AddOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
  8. data/docs/AddOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
  9. data/docs/AddOryAccessControlPolicyRoleMembersOK.md +17 -0
  10. data/docs/AuthorizationResult.md +17 -0
  11. data/docs/DeleteOryAccessControlPolicy.md +19 -0
  12. data/docs/DeleteOryAccessControlPolicyInternalServerError.md +17 -0
  13. data/docs/DeleteOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  14. data/docs/DeleteOryAccessControlPolicyRole.md +19 -0
  15. data/docs/DeleteOryAccessControlPolicyRoleInternalServerError.md +17 -0
  16. data/docs/DeleteOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  17. data/docs/DoOryAccessControlPoliciesAllow.md +19 -0
  18. data/docs/DoOryAccessControlPoliciesAllowForbidden.md +17 -0
  19. data/docs/DoOryAccessControlPoliciesAllowInternalServerError.md +17 -0
  20. data/docs/DoOryAccessControlPoliciesAllowInternalServerErrorBody.md +27 -0
  21. data/docs/DoOryAccessControlPoliciesAllowOK.md +17 -0
  22. data/docs/EnginesApi.md +579 -0
  23. data/docs/GetOryAccessControlPolicy.md +19 -0
  24. data/docs/GetOryAccessControlPolicyInternalServerError.md +17 -0
  25. data/docs/GetOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  26. data/docs/GetOryAccessControlPolicyNotFound.md +17 -0
  27. data/docs/GetOryAccessControlPolicyNotFoundBody.md +27 -0
  28. data/docs/GetOryAccessControlPolicyOK.md +17 -0
  29. data/docs/GetOryAccessControlPolicyRole.md +19 -0
  30. data/docs/GetOryAccessControlPolicyRoleInternalServerError.md +17 -0
  31. data/docs/GetOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  32. data/docs/GetOryAccessControlPolicyRoleNotFound.md +17 -0
  33. data/docs/GetOryAccessControlPolicyRoleNotFoundBody.md +27 -0
  34. data/docs/GetOryAccessControlPolicyRoleOK.md +17 -0
  35. data/docs/HealthApi.md +96 -0
  36. data/docs/HealthNotReadyStatus.md +17 -0
  37. data/docs/HealthStatus.md +17 -0
  38. data/docs/InlineResponse500.md +27 -0
  39. data/docs/Input.md +23 -0
  40. data/docs/IsInstanceAliveInternalServerError.md +17 -0
  41. data/docs/IsInstanceAliveInternalServerErrorBody.md +27 -0
  42. data/docs/IsInstanceAliveOK.md +17 -0
  43. data/docs/ListOryAccessControlPolicies.md +21 -0
  44. data/docs/ListOryAccessControlPoliciesInternalServerError.md +17 -0
  45. data/docs/ListOryAccessControlPoliciesInternalServerErrorBody.md +27 -0
  46. data/docs/ListOryAccessControlPoliciesOK.md +17 -0
  47. data/docs/ListOryAccessControlPolicyRoles.md +21 -0
  48. data/docs/ListOryAccessControlPolicyRolesInternalServerError.md +17 -0
  49. data/docs/ListOryAccessControlPolicyRolesInternalServerErrorBody.md +27 -0
  50. data/docs/ListOryAccessControlPolicyRolesOK.md +17 -0
  51. data/docs/OryAccessControlPolicies.md +17 -0
  52. data/docs/OryAccessControlPolicy.md +29 -0
  53. data/docs/OryAccessControlPolicyAllowedInput.md +23 -0
  54. data/docs/OryAccessControlPolicyRole.md +19 -0
  55. data/docs/OryAccessControlPolicyRoles.md +17 -0
  56. data/docs/Policy.md +29 -0
  57. data/docs/RemoveOryAccessControlPolicyRoleMembers.md +21 -0
  58. data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
  59. data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
  60. data/docs/Role.md +19 -0
  61. data/docs/SwaggerHealthStatus.md +17 -0
  62. data/docs/SwaggerNotReadyStatus.md +17 -0
  63. data/docs/SwaggerVersion.md +17 -0
  64. data/docs/UpsertOryAccessControlPolicy.md +19 -0
  65. data/docs/UpsertOryAccessControlPolicyInternalServerError.md +17 -0
  66. data/docs/UpsertOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  67. data/docs/UpsertOryAccessControlPolicyOK.md +17 -0
  68. data/docs/UpsertOryAccessControlPolicyRole.md +19 -0
  69. data/docs/UpsertOryAccessControlPolicyRoleInternalServerError.md +17 -0
  70. data/docs/UpsertOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  71. data/docs/UpsertOryAccessControlPolicyRoleOK.md +17 -0
  72. data/docs/Version.md +17 -0
  73. data/docs/VersionApi.md +52 -0
  74. data/lib/ory-keto-client.rb +51 -0
  75. data/lib/ory-keto-client/api/engines_api.rb +778 -0
  76. data/lib/ory-keto-client/api/health_api.rb +134 -0
  77. data/lib/ory-keto-client/api/version_api.rb +78 -0
  78. data/lib/ory-keto-client/api_client.rb +387 -0
  79. data/lib/ory-keto-client/api_error.rb +57 -0
  80. data/lib/ory-keto-client/configuration.rb +241 -0
  81. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members.rb +237 -0
  82. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_body.rb +209 -0
  83. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
  84. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
  85. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_ok.rb +207 -0
  86. data/lib/ory-keto-client/models/authorization_result.rb +212 -0
  87. data/lib/ory-keto-client/models/delete_ory_access_control_policy.rb +228 -0
  88. data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error.rb +207 -0
  89. data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error_body.rb +260 -0
  90. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role.rb +228 -0
  91. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error.rb +207 -0
  92. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  93. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow.rb +222 -0
  94. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_forbidden.rb +207 -0
  95. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error.rb +207 -0
  96. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error_body.rb +260 -0
  97. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_ok.rb +207 -0
  98. data/lib/ory-keto-client/models/get_ory_access_control_policy.rb +228 -0
  99. data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error.rb +207 -0
  100. data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error_body.rb +260 -0
  101. data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found.rb +207 -0
  102. data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found_body.rb +260 -0
  103. data/lib/ory-keto-client/models/get_ory_access_control_policy_ok.rb +207 -0
  104. data/lib/ory-keto-client/models/get_ory_access_control_policy_role.rb +228 -0
  105. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error.rb +207 -0
  106. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  107. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found.rb +207 -0
  108. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found_body.rb +260 -0
  109. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_ok.rb +207 -0
  110. data/lib/ory-keto-client/models/health_not_ready_status.rb +209 -0
  111. data/lib/ory-keto-client/models/health_status.rb +207 -0
  112. data/lib/ory-keto-client/models/inline_response500.rb +253 -0
  113. data/lib/ory-keto-client/models/input.rb +239 -0
  114. data/lib/ory-keto-client/models/is_instance_alive_internal_server_error.rb +207 -0
  115. data/lib/ory-keto-client/models/is_instance_alive_internal_server_error_body.rb +260 -0
  116. data/lib/ory-keto-client/models/is_instance_alive_ok.rb +207 -0
  117. data/lib/ory-keto-client/models/list_ory_access_control_policies.rb +233 -0
  118. data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error.rb +207 -0
  119. data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error_body.rb +260 -0
  120. data/lib/ory-keto-client/models/list_ory_access_control_policies_ok.rb +210 -0
  121. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles.rb +233 -0
  122. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error.rb +207 -0
  123. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error_body.rb +260 -0
  124. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_ok.rb +210 -0
  125. data/lib/ory-keto-client/models/ory_access_control_policies.rb +209 -0
  126. data/lib/ory-keto-client/models/ory_access_control_policy.rb +273 -0
  127. data/lib/ory-keto-client/models/ory_access_control_policy_allowed_input.rb +237 -0
  128. data/lib/ory-keto-client/models/ory_access_control_policy_role.rb +220 -0
  129. data/lib/ory-keto-client/models/ory_access_control_policy_roles.rb +209 -0
  130. data/lib/ory-keto-client/models/policy.rb +275 -0
  131. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members.rb +243 -0
  132. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
  133. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
  134. data/lib/ory-keto-client/models/role.rb +220 -0
  135. data/lib/ory-keto-client/models/swagger_health_status.rb +208 -0
  136. data/lib/ory-keto-client/models/swagger_not_ready_status.rb +210 -0
  137. data/lib/ory-keto-client/models/swagger_version.rb +208 -0
  138. data/lib/ory-keto-client/models/upsert_ory_access_control_policy.rb +222 -0
  139. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error.rb +207 -0
  140. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error_body.rb +260 -0
  141. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_ok.rb +207 -0
  142. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role.rb +222 -0
  143. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error.rb +207 -0
  144. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  145. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_ok.rb +207 -0
  146. data/lib/ory-keto-client/models/version.rb +207 -0
  147. data/lib/ory-keto-client/version.rb +15 -0
  148. data/ory-keto-client.gemspec +39 -0
  149. data/spec/api/engines_api_spec.rb +182 -0
  150. data/spec/api/health_api_spec.rb +57 -0
  151. data/spec/api/version_api_spec.rb +46 -0
  152. data/spec/api_client_spec.rb +226 -0
  153. data/spec/configuration_spec.rb +42 -0
  154. data/spec/models/add_ory_access_control_policy_role_members_body_spec.rb +41 -0
  155. data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
  156. data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
  157. data/spec/models/add_ory_access_control_policy_role_members_ok_spec.rb +41 -0
  158. data/spec/models/add_ory_access_control_policy_role_members_spec.rb +53 -0
  159. data/spec/models/authorization_result_spec.rb +41 -0
  160. data/spec/models/delete_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  161. data/spec/models/delete_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  162. data/spec/models/delete_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  163. data/spec/models/delete_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  164. data/spec/models/delete_ory_access_control_policy_role_spec.rb +47 -0
  165. data/spec/models/delete_ory_access_control_policy_spec.rb +47 -0
  166. data/spec/models/do_ory_access_control_policies_allow_forbidden_spec.rb +41 -0
  167. data/spec/models/do_ory_access_control_policies_allow_internal_server_error_body_spec.rb +71 -0
  168. data/spec/models/do_ory_access_control_policies_allow_internal_server_error_spec.rb +41 -0
  169. data/spec/models/do_ory_access_control_policies_allow_ok_spec.rb +41 -0
  170. data/spec/models/do_ory_access_control_policies_allow_spec.rb +47 -0
  171. data/spec/models/get_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  172. data/spec/models/get_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  173. data/spec/models/get_ory_access_control_policy_not_found_body_spec.rb +71 -0
  174. data/spec/models/get_ory_access_control_policy_not_found_spec.rb +41 -0
  175. data/spec/models/get_ory_access_control_policy_ok_spec.rb +41 -0
  176. data/spec/models/get_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  177. data/spec/models/get_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  178. data/spec/models/get_ory_access_control_policy_role_not_found_body_spec.rb +71 -0
  179. data/spec/models/get_ory_access_control_policy_role_not_found_spec.rb +41 -0
  180. data/spec/models/get_ory_access_control_policy_role_ok_spec.rb +41 -0
  181. data/spec/models/get_ory_access_control_policy_role_spec.rb +47 -0
  182. data/spec/models/get_ory_access_control_policy_spec.rb +47 -0
  183. data/spec/models/health_not_ready_status_spec.rb +41 -0
  184. data/spec/models/health_status_spec.rb +41 -0
  185. data/spec/models/inline_response500_spec.rb +71 -0
  186. data/spec/models/input_spec.rb +59 -0
  187. data/spec/models/is_instance_alive_internal_server_error_body_spec.rb +71 -0
  188. data/spec/models/is_instance_alive_internal_server_error_spec.rb +41 -0
  189. data/spec/models/is_instance_alive_ok_spec.rb +41 -0
  190. data/spec/models/list_ory_access_control_policies_internal_server_error_body_spec.rb +71 -0
  191. data/spec/models/list_ory_access_control_policies_internal_server_error_spec.rb +41 -0
  192. data/spec/models/list_ory_access_control_policies_ok_spec.rb +41 -0
  193. data/spec/models/list_ory_access_control_policies_spec.rb +53 -0
  194. data/spec/models/list_ory_access_control_policy_roles_internal_server_error_body_spec.rb +71 -0
  195. data/spec/models/list_ory_access_control_policy_roles_internal_server_error_spec.rb +41 -0
  196. data/spec/models/list_ory_access_control_policy_roles_ok_spec.rb +41 -0
  197. data/spec/models/list_ory_access_control_policy_roles_spec.rb +53 -0
  198. data/spec/models/ory_access_control_policies_spec.rb +41 -0
  199. data/spec/models/ory_access_control_policy_allowed_input_spec.rb +59 -0
  200. data/spec/models/ory_access_control_policy_role_spec.rb +47 -0
  201. data/spec/models/ory_access_control_policy_roles_spec.rb +41 -0
  202. data/spec/models/ory_access_control_policy_spec.rb +77 -0
  203. data/spec/models/policy_spec.rb +77 -0
  204. data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
  205. data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
  206. data/spec/models/remove_ory_access_control_policy_role_members_spec.rb +53 -0
  207. data/spec/models/role_spec.rb +47 -0
  208. data/spec/models/swagger_health_status_spec.rb +41 -0
  209. data/spec/models/swagger_not_ready_status_spec.rb +41 -0
  210. data/spec/models/swagger_version_spec.rb +41 -0
  211. data/spec/models/upsert_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  212. data/spec/models/upsert_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  213. data/spec/models/upsert_ory_access_control_policy_ok_spec.rb +41 -0
  214. data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  215. data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  216. data/spec/models/upsert_ory_access_control_policy_role_ok_spec.rb +41 -0
  217. data/spec/models/upsert_ory_access_control_policy_role_spec.rb +47 -0
  218. data/spec/models/upsert_ory_access_control_policy_spec.rb +47 -0
  219. data/spec/models/version_spec.rb +41 -0
  220. data/spec/spec_helper.rb +111 -0
  221. metadata +396 -0
@@ -0,0 +1,17 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **payload** | [**DoOryAccessControlPoliciesAllowInternalServerErrorBody**](DoOryAccessControlPoliciesAllowInternalServerErrorBody.md) | | [optional]
8
+
9
+ ## Code Sample
10
+
11
+ ```ruby
12
+ require 'OryHydraClient'
13
+
14
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError.new(payload: null)
15
+ ```
16
+
17
+
@@ -0,0 +1,27 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **code** | **Integer** | code | [optional]
8
+ **details** | **Array<Hash<String, Object>>** | details | [optional]
9
+ **message** | **String** | message | [optional]
10
+ **reason** | **String** | reason | [optional]
11
+ **request** | **String** | request | [optional]
12
+ **status** | **String** | status | [optional]
13
+
14
+ ## Code Sample
15
+
16
+ ```ruby
17
+ require 'OryHydraClient'
18
+
19
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody.new(code: null,
20
+ details: null,
21
+ message: null,
22
+ reason: null,
23
+ request: null,
24
+ status: null)
25
+ ```
26
+
27
+
@@ -0,0 +1,17 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowOK
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **payload** | [**AuthorizationResult**](AuthorizationResult.md) | | [optional]
8
+
9
+ ## Code Sample
10
+
11
+ ```ruby
12
+ require 'OryHydraClient'
13
+
14
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowOK.new(payload: null)
15
+ ```
16
+
17
+
@@ -0,0 +1,579 @@
1
+ # OryHydraClient::EnginesApi
2
+
3
+ All URIs are relative to *http://localhost*
4
+
5
+ Method | HTTP request | Description
6
+ ------------- | ------------- | -------------
7
+ [**add_ory_access_control_policy_role_members**](EnginesApi.md#add_ory_access_control_policy_role_members) | **PUT** /engines/acp/ory/{flavor}/roles/{id}/members | Add a member to an ORY Access Control Policy Role
8
+ [**delete_ory_access_control_policy**](EnginesApi.md#delete_ory_access_control_policy) | **DELETE** /engines/acp/ory/{flavor}/policies/{id} |
9
+ [**delete_ory_access_control_policy_role**](EnginesApi.md#delete_ory_access_control_policy_role) | **DELETE** /engines/acp/ory/{flavor}/roles/{id} | Delete an ORY Access Control Policy Role
10
+ [**do_ory_access_control_policies_allow**](EnginesApi.md#do_ory_access_control_policies_allow) | **POST** /engines/acp/ory/{flavor}/allowed | Check if a request is allowed
11
+ [**get_ory_access_control_policy**](EnginesApi.md#get_ory_access_control_policy) | **GET** /engines/acp/ory/{flavor}/policies/{id} |
12
+ [**get_ory_access_control_policy_role**](EnginesApi.md#get_ory_access_control_policy_role) | **GET** /engines/acp/ory/{flavor}/roles/{id} | Get an ORY Access Control Policy Role
13
+ [**list_ory_access_control_policies**](EnginesApi.md#list_ory_access_control_policies) | **GET** /engines/acp/ory/{flavor}/policies |
14
+ [**list_ory_access_control_policy_roles**](EnginesApi.md#list_ory_access_control_policy_roles) | **GET** /engines/acp/ory/{flavor}/roles | List ORY Access Control Policy Roles
15
+ [**remove_ory_access_control_policy_role_members**](EnginesApi.md#remove_ory_access_control_policy_role_members) | **DELETE** /engines/acp/ory/{flavor}/roles/{id}/members/{member} | Remove a member from an ORY Access Control Policy Role
16
+ [**upsert_ory_access_control_policy**](EnginesApi.md#upsert_ory_access_control_policy) | **PUT** /engines/acp/ory/{flavor}/policies |
17
+ [**upsert_ory_access_control_policy_role**](EnginesApi.md#upsert_ory_access_control_policy_role) | **PUT** /engines/acp/ory/{flavor}/roles | Upsert an ORY Access Control Policy Role
18
+
19
+
20
+
21
+ ## add_ory_access_control_policy_role_members
22
+
23
+ > OryAccessControlPolicyRole add_ory_access_control_policy_role_members(flavor, id, opts)
24
+
25
+ Add a member to an ORY Access Control Policy Role
26
+
27
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
28
+
29
+ ### Example
30
+
31
+ ```ruby
32
+ # load the gem
33
+ require 'ory-keto-client'
34
+
35
+ api_instance = OryHydraClient::EnginesApi.new
36
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
37
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
38
+ opts = {
39
+ body: OryHydraClient::AddOryAccessControlPolicyRoleMembersBody.new # AddOryAccessControlPolicyRoleMembersBody |
40
+ }
41
+
42
+ begin
43
+ #Add a member to an ORY Access Control Policy Role
44
+ result = api_instance.add_ory_access_control_policy_role_members(flavor, id, opts)
45
+ p result
46
+ rescue OryHydraClient::ApiError => e
47
+ puts "Exception when calling EnginesApi->add_ory_access_control_policy_role_members: #{e}"
48
+ end
49
+ ```
50
+
51
+ ### Parameters
52
+
53
+
54
+ Name | Type | Description | Notes
55
+ ------------- | ------------- | ------------- | -------------
56
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
57
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
58
+ **body** | [**AddOryAccessControlPolicyRoleMembersBody**](AddOryAccessControlPolicyRoleMembersBody.md)| | [optional]
59
+
60
+ ### Return type
61
+
62
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
63
+
64
+ ### Authorization
65
+
66
+ No authorization required
67
+
68
+ ### HTTP request headers
69
+
70
+ - **Content-Type**: application/json
71
+ - **Accept**: application/json
72
+
73
+
74
+ ## delete_ory_access_control_policy
75
+
76
+ > delete_ory_access_control_policy(flavor, id)
77
+
78
+
79
+
80
+ Delete an ORY Access Control Policy
81
+
82
+ ### Example
83
+
84
+ ```ruby
85
+ # load the gem
86
+ require 'ory-keto-client'
87
+
88
+ api_instance = OryHydraClient::EnginesApi.new
89
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
90
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
91
+
92
+ begin
93
+ api_instance.delete_ory_access_control_policy(flavor, id)
94
+ rescue OryHydraClient::ApiError => e
95
+ puts "Exception when calling EnginesApi->delete_ory_access_control_policy: #{e}"
96
+ end
97
+ ```
98
+
99
+ ### Parameters
100
+
101
+
102
+ Name | Type | Description | Notes
103
+ ------------- | ------------- | ------------- | -------------
104
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
105
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
106
+
107
+ ### Return type
108
+
109
+ nil (empty response body)
110
+
111
+ ### Authorization
112
+
113
+ No authorization required
114
+
115
+ ### HTTP request headers
116
+
117
+ - **Content-Type**: Not defined
118
+ - **Accept**: application/json
119
+
120
+
121
+ ## delete_ory_access_control_policy_role
122
+
123
+ > delete_ory_access_control_policy_role(flavor, id)
124
+
125
+ Delete an ORY Access Control Policy Role
126
+
127
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
128
+
129
+ ### Example
130
+
131
+ ```ruby
132
+ # load the gem
133
+ require 'ory-keto-client'
134
+
135
+ api_instance = OryHydraClient::EnginesApi.new
136
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
137
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
138
+
139
+ begin
140
+ #Delete an ORY Access Control Policy Role
141
+ api_instance.delete_ory_access_control_policy_role(flavor, id)
142
+ rescue OryHydraClient::ApiError => e
143
+ puts "Exception when calling EnginesApi->delete_ory_access_control_policy_role: #{e}"
144
+ end
145
+ ```
146
+
147
+ ### Parameters
148
+
149
+
150
+ Name | Type | Description | Notes
151
+ ------------- | ------------- | ------------- | -------------
152
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
153
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
154
+
155
+ ### Return type
156
+
157
+ nil (empty response body)
158
+
159
+ ### Authorization
160
+
161
+ No authorization required
162
+
163
+ ### HTTP request headers
164
+
165
+ - **Content-Type**: Not defined
166
+ - **Accept**: application/json
167
+
168
+
169
+ ## do_ory_access_control_policies_allow
170
+
171
+ > AuthorizationResult do_ory_access_control_policies_allow(flavor, opts)
172
+
173
+ Check if a request is allowed
174
+
175
+ Use this endpoint to check if a request is allowed or not. If the request is allowed, a 200 response with `{\"allowed\":\"true\"}` will be sent. If the request is denied, a 403 response with `{\"allowed\":\"false\"}` will be sent instead.
176
+
177
+ ### Example
178
+
179
+ ```ruby
180
+ # load the gem
181
+ require 'ory-keto-client'
182
+
183
+ api_instance = OryHydraClient::EnginesApi.new
184
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
185
+ opts = {
186
+ body: OryHydraClient::OryAccessControlPolicyAllowedInput.new # OryAccessControlPolicyAllowedInput |
187
+ }
188
+
189
+ begin
190
+ #Check if a request is allowed
191
+ result = api_instance.do_ory_access_control_policies_allow(flavor, opts)
192
+ p result
193
+ rescue OryHydraClient::ApiError => e
194
+ puts "Exception when calling EnginesApi->do_ory_access_control_policies_allow: #{e}"
195
+ end
196
+ ```
197
+
198
+ ### Parameters
199
+
200
+
201
+ Name | Type | Description | Notes
202
+ ------------- | ------------- | ------------- | -------------
203
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
204
+ **body** | [**OryAccessControlPolicyAllowedInput**](OryAccessControlPolicyAllowedInput.md)| | [optional]
205
+
206
+ ### Return type
207
+
208
+ [**AuthorizationResult**](AuthorizationResult.md)
209
+
210
+ ### Authorization
211
+
212
+ No authorization required
213
+
214
+ ### HTTP request headers
215
+
216
+ - **Content-Type**: application/json
217
+ - **Accept**: application/json
218
+
219
+
220
+ ## get_ory_access_control_policy
221
+
222
+ > OryAccessControlPolicy get_ory_access_control_policy(flavor, id)
223
+
224
+
225
+
226
+ Get an ORY Access Control Policy
227
+
228
+ ### Example
229
+
230
+ ```ruby
231
+ # load the gem
232
+ require 'ory-keto-client'
233
+
234
+ api_instance = OryHydraClient::EnginesApi.new
235
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
236
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
237
+
238
+ begin
239
+ result = api_instance.get_ory_access_control_policy(flavor, id)
240
+ p result
241
+ rescue OryHydraClient::ApiError => e
242
+ puts "Exception when calling EnginesApi->get_ory_access_control_policy: #{e}"
243
+ end
244
+ ```
245
+
246
+ ### Parameters
247
+
248
+
249
+ Name | Type | Description | Notes
250
+ ------------- | ------------- | ------------- | -------------
251
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
252
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
253
+
254
+ ### Return type
255
+
256
+ [**OryAccessControlPolicy**](OryAccessControlPolicy.md)
257
+
258
+ ### Authorization
259
+
260
+ No authorization required
261
+
262
+ ### HTTP request headers
263
+
264
+ - **Content-Type**: Not defined
265
+ - **Accept**: application/json
266
+
267
+
268
+ ## get_ory_access_control_policy_role
269
+
270
+ > OryAccessControlPolicyRole get_ory_access_control_policy_role(flavor, id)
271
+
272
+ Get an ORY Access Control Policy Role
273
+
274
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
275
+
276
+ ### Example
277
+
278
+ ```ruby
279
+ # load the gem
280
+ require 'ory-keto-client'
281
+
282
+ api_instance = OryHydraClient::EnginesApi.new
283
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
284
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
285
+
286
+ begin
287
+ #Get an ORY Access Control Policy Role
288
+ result = api_instance.get_ory_access_control_policy_role(flavor, id)
289
+ p result
290
+ rescue OryHydraClient::ApiError => e
291
+ puts "Exception when calling EnginesApi->get_ory_access_control_policy_role: #{e}"
292
+ end
293
+ ```
294
+
295
+ ### Parameters
296
+
297
+
298
+ Name | Type | Description | Notes
299
+ ------------- | ------------- | ------------- | -------------
300
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
301
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
302
+
303
+ ### Return type
304
+
305
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
306
+
307
+ ### Authorization
308
+
309
+ No authorization required
310
+
311
+ ### HTTP request headers
312
+
313
+ - **Content-Type**: Not defined
314
+ - **Accept**: application/json
315
+
316
+
317
+ ## list_ory_access_control_policies
318
+
319
+ > Array<OryAccessControlPolicy> list_ory_access_control_policies(flavor, opts)
320
+
321
+
322
+
323
+ List ORY Access Control Policies
324
+
325
+ ### Example
326
+
327
+ ```ruby
328
+ # load the gem
329
+ require 'ory-keto-client'
330
+
331
+ api_instance = OryHydraClient::EnginesApi.new
332
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
333
+ opts = {
334
+ limit: 56, # Integer | The maximum amount of policies returned.
335
+ offset: 56, # Integer | The offset from where to start looking.
336
+ subject: 'subject_example', # String | The subject for whom the policies are to be listed.
337
+ resource: 'resource_example', # String | The resource for which the policies are to be listed.
338
+ action: 'action_example' # String | The action for which policies are to be listed.
339
+ }
340
+
341
+ begin
342
+ result = api_instance.list_ory_access_control_policies(flavor, opts)
343
+ p result
344
+ rescue OryHydraClient::ApiError => e
345
+ puts "Exception when calling EnginesApi->list_ory_access_control_policies: #{e}"
346
+ end
347
+ ```
348
+
349
+ ### Parameters
350
+
351
+
352
+ Name | Type | Description | Notes
353
+ ------------- | ------------- | ------------- | -------------
354
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
355
+ **limit** | **Integer**| The maximum amount of policies returned. | [optional]
356
+ **offset** | **Integer**| The offset from where to start looking. | [optional]
357
+ **subject** | **String**| The subject for whom the policies are to be listed. | [optional]
358
+ **resource** | **String**| The resource for which the policies are to be listed. | [optional]
359
+ **action** | **String**| The action for which policies are to be listed. | [optional]
360
+
361
+ ### Return type
362
+
363
+ [**Array<OryAccessControlPolicy>**](OryAccessControlPolicy.md)
364
+
365
+ ### Authorization
366
+
367
+ No authorization required
368
+
369
+ ### HTTP request headers
370
+
371
+ - **Content-Type**: Not defined
372
+ - **Accept**: application/json
373
+
374
+
375
+ ## list_ory_access_control_policy_roles
376
+
377
+ > Array<OryAccessControlPolicyRole> list_ory_access_control_policy_roles(flavor, opts)
378
+
379
+ List ORY Access Control Policy Roles
380
+
381
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
382
+
383
+ ### Example
384
+
385
+ ```ruby
386
+ # load the gem
387
+ require 'ory-keto-client'
388
+
389
+ api_instance = OryHydraClient::EnginesApi.new
390
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
391
+ opts = {
392
+ limit: 56, # Integer | The maximum amount of policies returned.
393
+ offset: 56, # Integer | The offset from where to start looking.
394
+ member: 'member_example' # String | The member for which the roles are to be listed.
395
+ }
396
+
397
+ begin
398
+ #List ORY Access Control Policy Roles
399
+ result = api_instance.list_ory_access_control_policy_roles(flavor, opts)
400
+ p result
401
+ rescue OryHydraClient::ApiError => e
402
+ puts "Exception when calling EnginesApi->list_ory_access_control_policy_roles: #{e}"
403
+ end
404
+ ```
405
+
406
+ ### Parameters
407
+
408
+
409
+ Name | Type | Description | Notes
410
+ ------------- | ------------- | ------------- | -------------
411
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
412
+ **limit** | **Integer**| The maximum amount of policies returned. | [optional]
413
+ **offset** | **Integer**| The offset from where to start looking. | [optional]
414
+ **member** | **String**| The member for which the roles are to be listed. | [optional]
415
+
416
+ ### Return type
417
+
418
+ [**Array<OryAccessControlPolicyRole>**](OryAccessControlPolicyRole.md)
419
+
420
+ ### Authorization
421
+
422
+ No authorization required
423
+
424
+ ### HTTP request headers
425
+
426
+ - **Content-Type**: Not defined
427
+ - **Accept**: application/json
428
+
429
+
430
+ ## remove_ory_access_control_policy_role_members
431
+
432
+ > remove_ory_access_control_policy_role_members(flavor, id, member)
433
+
434
+ Remove a member from an ORY Access Control Policy Role
435
+
436
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
437
+
438
+ ### Example
439
+
440
+ ```ruby
441
+ # load the gem
442
+ require 'ory-keto-client'
443
+
444
+ api_instance = OryHydraClient::EnginesApi.new
445
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
446
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
447
+ member = 'member_example' # String | The member to be removed.
448
+
449
+ begin
450
+ #Remove a member from an ORY Access Control Policy Role
451
+ api_instance.remove_ory_access_control_policy_role_members(flavor, id, member)
452
+ rescue OryHydraClient::ApiError => e
453
+ puts "Exception when calling EnginesApi->remove_ory_access_control_policy_role_members: #{e}"
454
+ end
455
+ ```
456
+
457
+ ### Parameters
458
+
459
+
460
+ Name | Type | Description | Notes
461
+ ------------- | ------------- | ------------- | -------------
462
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
463
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
464
+ **member** | **String**| The member to be removed. |
465
+
466
+ ### Return type
467
+
468
+ nil (empty response body)
469
+
470
+ ### Authorization
471
+
472
+ No authorization required
473
+
474
+ ### HTTP request headers
475
+
476
+ - **Content-Type**: Not defined
477
+ - **Accept**: application/json
478
+
479
+
480
+ ## upsert_ory_access_control_policy
481
+
482
+ > OryAccessControlPolicy upsert_ory_access_control_policy(flavor, opts)
483
+
484
+
485
+
486
+ Upsert an ORY Access Control Policy
487
+
488
+ ### Example
489
+
490
+ ```ruby
491
+ # load the gem
492
+ require 'ory-keto-client'
493
+
494
+ api_instance = OryHydraClient::EnginesApi.new
495
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
496
+ opts = {
497
+ body: OryHydraClient::OryAccessControlPolicy.new # OryAccessControlPolicy |
498
+ }
499
+
500
+ begin
501
+ result = api_instance.upsert_ory_access_control_policy(flavor, opts)
502
+ p result
503
+ rescue OryHydraClient::ApiError => e
504
+ puts "Exception when calling EnginesApi->upsert_ory_access_control_policy: #{e}"
505
+ end
506
+ ```
507
+
508
+ ### Parameters
509
+
510
+
511
+ Name | Type | Description | Notes
512
+ ------------- | ------------- | ------------- | -------------
513
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
514
+ **body** | [**OryAccessControlPolicy**](OryAccessControlPolicy.md)| | [optional]
515
+
516
+ ### Return type
517
+
518
+ [**OryAccessControlPolicy**](OryAccessControlPolicy.md)
519
+
520
+ ### Authorization
521
+
522
+ No authorization required
523
+
524
+ ### HTTP request headers
525
+
526
+ - **Content-Type**: application/json
527
+ - **Accept**: application/json
528
+
529
+
530
+ ## upsert_ory_access_control_policy_role
531
+
532
+ > OryAccessControlPolicyRole upsert_ory_access_control_policy_role(flavor, opts)
533
+
534
+ Upsert an ORY Access Control Policy Role
535
+
536
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
537
+
538
+ ### Example
539
+
540
+ ```ruby
541
+ # load the gem
542
+ require 'ory-keto-client'
543
+
544
+ api_instance = OryHydraClient::EnginesApi.new
545
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
546
+ opts = {
547
+ body: OryHydraClient::OryAccessControlPolicyRole.new # OryAccessControlPolicyRole |
548
+ }
549
+
550
+ begin
551
+ #Upsert an ORY Access Control Policy Role
552
+ result = api_instance.upsert_ory_access_control_policy_role(flavor, opts)
553
+ p result
554
+ rescue OryHydraClient::ApiError => e
555
+ puts "Exception when calling EnginesApi->upsert_ory_access_control_policy_role: #{e}"
556
+ end
557
+ ```
558
+
559
+ ### Parameters
560
+
561
+
562
+ Name | Type | Description | Notes
563
+ ------------- | ------------- | ------------- | -------------
564
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
565
+ **body** | [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)| | [optional]
566
+
567
+ ### Return type
568
+
569
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
570
+
571
+ ### Authorization
572
+
573
+ No authorization required
574
+
575
+ ### HTTP request headers
576
+
577
+ - **Content-Type**: application/json
578
+ - **Accept**: application/json
579
+