ory-keto-client 0.0.0.alpha40

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (221) hide show
  1. checksums.yaml +7 -0
  2. data/Gemfile +9 -0
  3. data/README.md +115 -0
  4. data/Rakefile +10 -0
  5. data/docs/AddOryAccessControlPolicyRoleMembers.md +21 -0
  6. data/docs/AddOryAccessControlPolicyRoleMembersBody.md +17 -0
  7. data/docs/AddOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
  8. data/docs/AddOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
  9. data/docs/AddOryAccessControlPolicyRoleMembersOK.md +17 -0
  10. data/docs/AuthorizationResult.md +17 -0
  11. data/docs/DeleteOryAccessControlPolicy.md +19 -0
  12. data/docs/DeleteOryAccessControlPolicyInternalServerError.md +17 -0
  13. data/docs/DeleteOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  14. data/docs/DeleteOryAccessControlPolicyRole.md +19 -0
  15. data/docs/DeleteOryAccessControlPolicyRoleInternalServerError.md +17 -0
  16. data/docs/DeleteOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  17. data/docs/DoOryAccessControlPoliciesAllow.md +19 -0
  18. data/docs/DoOryAccessControlPoliciesAllowForbidden.md +17 -0
  19. data/docs/DoOryAccessControlPoliciesAllowInternalServerError.md +17 -0
  20. data/docs/DoOryAccessControlPoliciesAllowInternalServerErrorBody.md +27 -0
  21. data/docs/DoOryAccessControlPoliciesAllowOK.md +17 -0
  22. data/docs/EnginesApi.md +579 -0
  23. data/docs/GetOryAccessControlPolicy.md +19 -0
  24. data/docs/GetOryAccessControlPolicyInternalServerError.md +17 -0
  25. data/docs/GetOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  26. data/docs/GetOryAccessControlPolicyNotFound.md +17 -0
  27. data/docs/GetOryAccessControlPolicyNotFoundBody.md +27 -0
  28. data/docs/GetOryAccessControlPolicyOK.md +17 -0
  29. data/docs/GetOryAccessControlPolicyRole.md +19 -0
  30. data/docs/GetOryAccessControlPolicyRoleInternalServerError.md +17 -0
  31. data/docs/GetOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  32. data/docs/GetOryAccessControlPolicyRoleNotFound.md +17 -0
  33. data/docs/GetOryAccessControlPolicyRoleNotFoundBody.md +27 -0
  34. data/docs/GetOryAccessControlPolicyRoleOK.md +17 -0
  35. data/docs/HealthApi.md +96 -0
  36. data/docs/HealthNotReadyStatus.md +17 -0
  37. data/docs/HealthStatus.md +17 -0
  38. data/docs/InlineResponse500.md +27 -0
  39. data/docs/Input.md +23 -0
  40. data/docs/IsInstanceAliveInternalServerError.md +17 -0
  41. data/docs/IsInstanceAliveInternalServerErrorBody.md +27 -0
  42. data/docs/IsInstanceAliveOK.md +17 -0
  43. data/docs/ListOryAccessControlPolicies.md +21 -0
  44. data/docs/ListOryAccessControlPoliciesInternalServerError.md +17 -0
  45. data/docs/ListOryAccessControlPoliciesInternalServerErrorBody.md +27 -0
  46. data/docs/ListOryAccessControlPoliciesOK.md +17 -0
  47. data/docs/ListOryAccessControlPolicyRoles.md +21 -0
  48. data/docs/ListOryAccessControlPolicyRolesInternalServerError.md +17 -0
  49. data/docs/ListOryAccessControlPolicyRolesInternalServerErrorBody.md +27 -0
  50. data/docs/ListOryAccessControlPolicyRolesOK.md +17 -0
  51. data/docs/OryAccessControlPolicies.md +17 -0
  52. data/docs/OryAccessControlPolicy.md +29 -0
  53. data/docs/OryAccessControlPolicyAllowedInput.md +23 -0
  54. data/docs/OryAccessControlPolicyRole.md +19 -0
  55. data/docs/OryAccessControlPolicyRoles.md +17 -0
  56. data/docs/Policy.md +29 -0
  57. data/docs/RemoveOryAccessControlPolicyRoleMembers.md +21 -0
  58. data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerError.md +17 -0
  59. data/docs/RemoveOryAccessControlPolicyRoleMembersInternalServerErrorBody.md +27 -0
  60. data/docs/Role.md +19 -0
  61. data/docs/SwaggerHealthStatus.md +17 -0
  62. data/docs/SwaggerNotReadyStatus.md +17 -0
  63. data/docs/SwaggerVersion.md +17 -0
  64. data/docs/UpsertOryAccessControlPolicy.md +19 -0
  65. data/docs/UpsertOryAccessControlPolicyInternalServerError.md +17 -0
  66. data/docs/UpsertOryAccessControlPolicyInternalServerErrorBody.md +27 -0
  67. data/docs/UpsertOryAccessControlPolicyOK.md +17 -0
  68. data/docs/UpsertOryAccessControlPolicyRole.md +19 -0
  69. data/docs/UpsertOryAccessControlPolicyRoleInternalServerError.md +17 -0
  70. data/docs/UpsertOryAccessControlPolicyRoleInternalServerErrorBody.md +27 -0
  71. data/docs/UpsertOryAccessControlPolicyRoleOK.md +17 -0
  72. data/docs/Version.md +17 -0
  73. data/docs/VersionApi.md +52 -0
  74. data/lib/ory-keto-client.rb +51 -0
  75. data/lib/ory-keto-client/api/engines_api.rb +778 -0
  76. data/lib/ory-keto-client/api/health_api.rb +134 -0
  77. data/lib/ory-keto-client/api/version_api.rb +78 -0
  78. data/lib/ory-keto-client/api_client.rb +387 -0
  79. data/lib/ory-keto-client/api_error.rb +57 -0
  80. data/lib/ory-keto-client/configuration.rb +241 -0
  81. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members.rb +237 -0
  82. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_body.rb +209 -0
  83. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
  84. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
  85. data/lib/ory-keto-client/models/add_ory_access_control_policy_role_members_ok.rb +207 -0
  86. data/lib/ory-keto-client/models/authorization_result.rb +212 -0
  87. data/lib/ory-keto-client/models/delete_ory_access_control_policy.rb +228 -0
  88. data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error.rb +207 -0
  89. data/lib/ory-keto-client/models/delete_ory_access_control_policy_internal_server_error_body.rb +260 -0
  90. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role.rb +228 -0
  91. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error.rb +207 -0
  92. data/lib/ory-keto-client/models/delete_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  93. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow.rb +222 -0
  94. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_forbidden.rb +207 -0
  95. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error.rb +207 -0
  96. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_internal_server_error_body.rb +260 -0
  97. data/lib/ory-keto-client/models/do_ory_access_control_policies_allow_ok.rb +207 -0
  98. data/lib/ory-keto-client/models/get_ory_access_control_policy.rb +228 -0
  99. data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error.rb +207 -0
  100. data/lib/ory-keto-client/models/get_ory_access_control_policy_internal_server_error_body.rb +260 -0
  101. data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found.rb +207 -0
  102. data/lib/ory-keto-client/models/get_ory_access_control_policy_not_found_body.rb +260 -0
  103. data/lib/ory-keto-client/models/get_ory_access_control_policy_ok.rb +207 -0
  104. data/lib/ory-keto-client/models/get_ory_access_control_policy_role.rb +228 -0
  105. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error.rb +207 -0
  106. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  107. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found.rb +207 -0
  108. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_not_found_body.rb +260 -0
  109. data/lib/ory-keto-client/models/get_ory_access_control_policy_role_ok.rb +207 -0
  110. data/lib/ory-keto-client/models/health_not_ready_status.rb +209 -0
  111. data/lib/ory-keto-client/models/health_status.rb +207 -0
  112. data/lib/ory-keto-client/models/inline_response500.rb +253 -0
  113. data/lib/ory-keto-client/models/input.rb +239 -0
  114. data/lib/ory-keto-client/models/is_instance_alive_internal_server_error.rb +207 -0
  115. data/lib/ory-keto-client/models/is_instance_alive_internal_server_error_body.rb +260 -0
  116. data/lib/ory-keto-client/models/is_instance_alive_ok.rb +207 -0
  117. data/lib/ory-keto-client/models/list_ory_access_control_policies.rb +233 -0
  118. data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error.rb +207 -0
  119. data/lib/ory-keto-client/models/list_ory_access_control_policies_internal_server_error_body.rb +260 -0
  120. data/lib/ory-keto-client/models/list_ory_access_control_policies_ok.rb +210 -0
  121. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles.rb +233 -0
  122. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error.rb +207 -0
  123. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_internal_server_error_body.rb +260 -0
  124. data/lib/ory-keto-client/models/list_ory_access_control_policy_roles_ok.rb +210 -0
  125. data/lib/ory-keto-client/models/ory_access_control_policies.rb +209 -0
  126. data/lib/ory-keto-client/models/ory_access_control_policy.rb +273 -0
  127. data/lib/ory-keto-client/models/ory_access_control_policy_allowed_input.rb +237 -0
  128. data/lib/ory-keto-client/models/ory_access_control_policy_role.rb +220 -0
  129. data/lib/ory-keto-client/models/ory_access_control_policy_roles.rb +209 -0
  130. data/lib/ory-keto-client/models/policy.rb +275 -0
  131. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members.rb +243 -0
  132. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error.rb +207 -0
  133. data/lib/ory-keto-client/models/remove_ory_access_control_policy_role_members_internal_server_error_body.rb +260 -0
  134. data/lib/ory-keto-client/models/role.rb +220 -0
  135. data/lib/ory-keto-client/models/swagger_health_status.rb +208 -0
  136. data/lib/ory-keto-client/models/swagger_not_ready_status.rb +210 -0
  137. data/lib/ory-keto-client/models/swagger_version.rb +208 -0
  138. data/lib/ory-keto-client/models/upsert_ory_access_control_policy.rb +222 -0
  139. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error.rb +207 -0
  140. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_internal_server_error_body.rb +260 -0
  141. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_ok.rb +207 -0
  142. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role.rb +222 -0
  143. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error.rb +207 -0
  144. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_internal_server_error_body.rb +260 -0
  145. data/lib/ory-keto-client/models/upsert_ory_access_control_policy_role_ok.rb +207 -0
  146. data/lib/ory-keto-client/models/version.rb +207 -0
  147. data/lib/ory-keto-client/version.rb +15 -0
  148. data/ory-keto-client.gemspec +39 -0
  149. data/spec/api/engines_api_spec.rb +182 -0
  150. data/spec/api/health_api_spec.rb +57 -0
  151. data/spec/api/version_api_spec.rb +46 -0
  152. data/spec/api_client_spec.rb +226 -0
  153. data/spec/configuration_spec.rb +42 -0
  154. data/spec/models/add_ory_access_control_policy_role_members_body_spec.rb +41 -0
  155. data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
  156. data/spec/models/add_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
  157. data/spec/models/add_ory_access_control_policy_role_members_ok_spec.rb +41 -0
  158. data/spec/models/add_ory_access_control_policy_role_members_spec.rb +53 -0
  159. data/spec/models/authorization_result_spec.rb +41 -0
  160. data/spec/models/delete_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  161. data/spec/models/delete_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  162. data/spec/models/delete_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  163. data/spec/models/delete_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  164. data/spec/models/delete_ory_access_control_policy_role_spec.rb +47 -0
  165. data/spec/models/delete_ory_access_control_policy_spec.rb +47 -0
  166. data/spec/models/do_ory_access_control_policies_allow_forbidden_spec.rb +41 -0
  167. data/spec/models/do_ory_access_control_policies_allow_internal_server_error_body_spec.rb +71 -0
  168. data/spec/models/do_ory_access_control_policies_allow_internal_server_error_spec.rb +41 -0
  169. data/spec/models/do_ory_access_control_policies_allow_ok_spec.rb +41 -0
  170. data/spec/models/do_ory_access_control_policies_allow_spec.rb +47 -0
  171. data/spec/models/get_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  172. data/spec/models/get_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  173. data/spec/models/get_ory_access_control_policy_not_found_body_spec.rb +71 -0
  174. data/spec/models/get_ory_access_control_policy_not_found_spec.rb +41 -0
  175. data/spec/models/get_ory_access_control_policy_ok_spec.rb +41 -0
  176. data/spec/models/get_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  177. data/spec/models/get_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  178. data/spec/models/get_ory_access_control_policy_role_not_found_body_spec.rb +71 -0
  179. data/spec/models/get_ory_access_control_policy_role_not_found_spec.rb +41 -0
  180. data/spec/models/get_ory_access_control_policy_role_ok_spec.rb +41 -0
  181. data/spec/models/get_ory_access_control_policy_role_spec.rb +47 -0
  182. data/spec/models/get_ory_access_control_policy_spec.rb +47 -0
  183. data/spec/models/health_not_ready_status_spec.rb +41 -0
  184. data/spec/models/health_status_spec.rb +41 -0
  185. data/spec/models/inline_response500_spec.rb +71 -0
  186. data/spec/models/input_spec.rb +59 -0
  187. data/spec/models/is_instance_alive_internal_server_error_body_spec.rb +71 -0
  188. data/spec/models/is_instance_alive_internal_server_error_spec.rb +41 -0
  189. data/spec/models/is_instance_alive_ok_spec.rb +41 -0
  190. data/spec/models/list_ory_access_control_policies_internal_server_error_body_spec.rb +71 -0
  191. data/spec/models/list_ory_access_control_policies_internal_server_error_spec.rb +41 -0
  192. data/spec/models/list_ory_access_control_policies_ok_spec.rb +41 -0
  193. data/spec/models/list_ory_access_control_policies_spec.rb +53 -0
  194. data/spec/models/list_ory_access_control_policy_roles_internal_server_error_body_spec.rb +71 -0
  195. data/spec/models/list_ory_access_control_policy_roles_internal_server_error_spec.rb +41 -0
  196. data/spec/models/list_ory_access_control_policy_roles_ok_spec.rb +41 -0
  197. data/spec/models/list_ory_access_control_policy_roles_spec.rb +53 -0
  198. data/spec/models/ory_access_control_policies_spec.rb +41 -0
  199. data/spec/models/ory_access_control_policy_allowed_input_spec.rb +59 -0
  200. data/spec/models/ory_access_control_policy_role_spec.rb +47 -0
  201. data/spec/models/ory_access_control_policy_roles_spec.rb +41 -0
  202. data/spec/models/ory_access_control_policy_spec.rb +77 -0
  203. data/spec/models/policy_spec.rb +77 -0
  204. data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_body_spec.rb +71 -0
  205. data/spec/models/remove_ory_access_control_policy_role_members_internal_server_error_spec.rb +41 -0
  206. data/spec/models/remove_ory_access_control_policy_role_members_spec.rb +53 -0
  207. data/spec/models/role_spec.rb +47 -0
  208. data/spec/models/swagger_health_status_spec.rb +41 -0
  209. data/spec/models/swagger_not_ready_status_spec.rb +41 -0
  210. data/spec/models/swagger_version_spec.rb +41 -0
  211. data/spec/models/upsert_ory_access_control_policy_internal_server_error_body_spec.rb +71 -0
  212. data/spec/models/upsert_ory_access_control_policy_internal_server_error_spec.rb +41 -0
  213. data/spec/models/upsert_ory_access_control_policy_ok_spec.rb +41 -0
  214. data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_body_spec.rb +71 -0
  215. data/spec/models/upsert_ory_access_control_policy_role_internal_server_error_spec.rb +41 -0
  216. data/spec/models/upsert_ory_access_control_policy_role_ok_spec.rb +41 -0
  217. data/spec/models/upsert_ory_access_control_policy_role_spec.rb +47 -0
  218. data/spec/models/upsert_ory_access_control_policy_spec.rb +47 -0
  219. data/spec/models/version_spec.rb +41 -0
  220. data/spec/spec_helper.rb +111 -0
  221. metadata +396 -0
@@ -0,0 +1,17 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **payload** | [**DoOryAccessControlPoliciesAllowInternalServerErrorBody**](DoOryAccessControlPoliciesAllowInternalServerErrorBody.md) | | [optional]
8
+
9
+ ## Code Sample
10
+
11
+ ```ruby
12
+ require 'OryHydraClient'
13
+
14
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerError.new(payload: null)
15
+ ```
16
+
17
+
@@ -0,0 +1,27 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **code** | **Integer** | code | [optional]
8
+ **details** | **Array<Hash<String, Object>>** | details | [optional]
9
+ **message** | **String** | message | [optional]
10
+ **reason** | **String** | reason | [optional]
11
+ **request** | **String** | request | [optional]
12
+ **status** | **String** | status | [optional]
13
+
14
+ ## Code Sample
15
+
16
+ ```ruby
17
+ require 'OryHydraClient'
18
+
19
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowInternalServerErrorBody.new(code: null,
20
+ details: null,
21
+ message: null,
22
+ reason: null,
23
+ request: null,
24
+ status: null)
25
+ ```
26
+
27
+
@@ -0,0 +1,17 @@
1
+ # OryHydraClient::DoOryAccessControlPoliciesAllowOK
2
+
3
+ ## Properties
4
+
5
+ Name | Type | Description | Notes
6
+ ------------ | ------------- | ------------- | -------------
7
+ **payload** | [**AuthorizationResult**](AuthorizationResult.md) | | [optional]
8
+
9
+ ## Code Sample
10
+
11
+ ```ruby
12
+ require 'OryHydraClient'
13
+
14
+ instance = OryHydraClient::DoOryAccessControlPoliciesAllowOK.new(payload: null)
15
+ ```
16
+
17
+
@@ -0,0 +1,579 @@
1
+ # OryHydraClient::EnginesApi
2
+
3
+ All URIs are relative to *http://localhost*
4
+
5
+ Method | HTTP request | Description
6
+ ------------- | ------------- | -------------
7
+ [**add_ory_access_control_policy_role_members**](EnginesApi.md#add_ory_access_control_policy_role_members) | **PUT** /engines/acp/ory/{flavor}/roles/{id}/members | Add a member to an ORY Access Control Policy Role
8
+ [**delete_ory_access_control_policy**](EnginesApi.md#delete_ory_access_control_policy) | **DELETE** /engines/acp/ory/{flavor}/policies/{id} |
9
+ [**delete_ory_access_control_policy_role**](EnginesApi.md#delete_ory_access_control_policy_role) | **DELETE** /engines/acp/ory/{flavor}/roles/{id} | Delete an ORY Access Control Policy Role
10
+ [**do_ory_access_control_policies_allow**](EnginesApi.md#do_ory_access_control_policies_allow) | **POST** /engines/acp/ory/{flavor}/allowed | Check if a request is allowed
11
+ [**get_ory_access_control_policy**](EnginesApi.md#get_ory_access_control_policy) | **GET** /engines/acp/ory/{flavor}/policies/{id} |
12
+ [**get_ory_access_control_policy_role**](EnginesApi.md#get_ory_access_control_policy_role) | **GET** /engines/acp/ory/{flavor}/roles/{id} | Get an ORY Access Control Policy Role
13
+ [**list_ory_access_control_policies**](EnginesApi.md#list_ory_access_control_policies) | **GET** /engines/acp/ory/{flavor}/policies |
14
+ [**list_ory_access_control_policy_roles**](EnginesApi.md#list_ory_access_control_policy_roles) | **GET** /engines/acp/ory/{flavor}/roles | List ORY Access Control Policy Roles
15
+ [**remove_ory_access_control_policy_role_members**](EnginesApi.md#remove_ory_access_control_policy_role_members) | **DELETE** /engines/acp/ory/{flavor}/roles/{id}/members/{member} | Remove a member from an ORY Access Control Policy Role
16
+ [**upsert_ory_access_control_policy**](EnginesApi.md#upsert_ory_access_control_policy) | **PUT** /engines/acp/ory/{flavor}/policies |
17
+ [**upsert_ory_access_control_policy_role**](EnginesApi.md#upsert_ory_access_control_policy_role) | **PUT** /engines/acp/ory/{flavor}/roles | Upsert an ORY Access Control Policy Role
18
+
19
+
20
+
21
+ ## add_ory_access_control_policy_role_members
22
+
23
+ > OryAccessControlPolicyRole add_ory_access_control_policy_role_members(flavor, id, opts)
24
+
25
+ Add a member to an ORY Access Control Policy Role
26
+
27
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
28
+
29
+ ### Example
30
+
31
+ ```ruby
32
+ # load the gem
33
+ require 'ory-keto-client'
34
+
35
+ api_instance = OryHydraClient::EnginesApi.new
36
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
37
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
38
+ opts = {
39
+ body: OryHydraClient::AddOryAccessControlPolicyRoleMembersBody.new # AddOryAccessControlPolicyRoleMembersBody |
40
+ }
41
+
42
+ begin
43
+ #Add a member to an ORY Access Control Policy Role
44
+ result = api_instance.add_ory_access_control_policy_role_members(flavor, id, opts)
45
+ p result
46
+ rescue OryHydraClient::ApiError => e
47
+ puts "Exception when calling EnginesApi->add_ory_access_control_policy_role_members: #{e}"
48
+ end
49
+ ```
50
+
51
+ ### Parameters
52
+
53
+
54
+ Name | Type | Description | Notes
55
+ ------------- | ------------- | ------------- | -------------
56
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
57
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
58
+ **body** | [**AddOryAccessControlPolicyRoleMembersBody**](AddOryAccessControlPolicyRoleMembersBody.md)| | [optional]
59
+
60
+ ### Return type
61
+
62
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
63
+
64
+ ### Authorization
65
+
66
+ No authorization required
67
+
68
+ ### HTTP request headers
69
+
70
+ - **Content-Type**: application/json
71
+ - **Accept**: application/json
72
+
73
+
74
+ ## delete_ory_access_control_policy
75
+
76
+ > delete_ory_access_control_policy(flavor, id)
77
+
78
+
79
+
80
+ Delete an ORY Access Control Policy
81
+
82
+ ### Example
83
+
84
+ ```ruby
85
+ # load the gem
86
+ require 'ory-keto-client'
87
+
88
+ api_instance = OryHydraClient::EnginesApi.new
89
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
90
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
91
+
92
+ begin
93
+ api_instance.delete_ory_access_control_policy(flavor, id)
94
+ rescue OryHydraClient::ApiError => e
95
+ puts "Exception when calling EnginesApi->delete_ory_access_control_policy: #{e}"
96
+ end
97
+ ```
98
+
99
+ ### Parameters
100
+
101
+
102
+ Name | Type | Description | Notes
103
+ ------------- | ------------- | ------------- | -------------
104
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
105
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
106
+
107
+ ### Return type
108
+
109
+ nil (empty response body)
110
+
111
+ ### Authorization
112
+
113
+ No authorization required
114
+
115
+ ### HTTP request headers
116
+
117
+ - **Content-Type**: Not defined
118
+ - **Accept**: application/json
119
+
120
+
121
+ ## delete_ory_access_control_policy_role
122
+
123
+ > delete_ory_access_control_policy_role(flavor, id)
124
+
125
+ Delete an ORY Access Control Policy Role
126
+
127
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
128
+
129
+ ### Example
130
+
131
+ ```ruby
132
+ # load the gem
133
+ require 'ory-keto-client'
134
+
135
+ api_instance = OryHydraClient::EnginesApi.new
136
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
137
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
138
+
139
+ begin
140
+ #Delete an ORY Access Control Policy Role
141
+ api_instance.delete_ory_access_control_policy_role(flavor, id)
142
+ rescue OryHydraClient::ApiError => e
143
+ puts "Exception when calling EnginesApi->delete_ory_access_control_policy_role: #{e}"
144
+ end
145
+ ```
146
+
147
+ ### Parameters
148
+
149
+
150
+ Name | Type | Description | Notes
151
+ ------------- | ------------- | ------------- | -------------
152
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
153
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
154
+
155
+ ### Return type
156
+
157
+ nil (empty response body)
158
+
159
+ ### Authorization
160
+
161
+ No authorization required
162
+
163
+ ### HTTP request headers
164
+
165
+ - **Content-Type**: Not defined
166
+ - **Accept**: application/json
167
+
168
+
169
+ ## do_ory_access_control_policies_allow
170
+
171
+ > AuthorizationResult do_ory_access_control_policies_allow(flavor, opts)
172
+
173
+ Check if a request is allowed
174
+
175
+ Use this endpoint to check if a request is allowed or not. If the request is allowed, a 200 response with `{\"allowed\":\"true\"}` will be sent. If the request is denied, a 403 response with `{\"allowed\":\"false\"}` will be sent instead.
176
+
177
+ ### Example
178
+
179
+ ```ruby
180
+ # load the gem
181
+ require 'ory-keto-client'
182
+
183
+ api_instance = OryHydraClient::EnginesApi.new
184
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
185
+ opts = {
186
+ body: OryHydraClient::OryAccessControlPolicyAllowedInput.new # OryAccessControlPolicyAllowedInput |
187
+ }
188
+
189
+ begin
190
+ #Check if a request is allowed
191
+ result = api_instance.do_ory_access_control_policies_allow(flavor, opts)
192
+ p result
193
+ rescue OryHydraClient::ApiError => e
194
+ puts "Exception when calling EnginesApi->do_ory_access_control_policies_allow: #{e}"
195
+ end
196
+ ```
197
+
198
+ ### Parameters
199
+
200
+
201
+ Name | Type | Description | Notes
202
+ ------------- | ------------- | ------------- | -------------
203
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
204
+ **body** | [**OryAccessControlPolicyAllowedInput**](OryAccessControlPolicyAllowedInput.md)| | [optional]
205
+
206
+ ### Return type
207
+
208
+ [**AuthorizationResult**](AuthorizationResult.md)
209
+
210
+ ### Authorization
211
+
212
+ No authorization required
213
+
214
+ ### HTTP request headers
215
+
216
+ - **Content-Type**: application/json
217
+ - **Accept**: application/json
218
+
219
+
220
+ ## get_ory_access_control_policy
221
+
222
+ > OryAccessControlPolicy get_ory_access_control_policy(flavor, id)
223
+
224
+
225
+
226
+ Get an ORY Access Control Policy
227
+
228
+ ### Example
229
+
230
+ ```ruby
231
+ # load the gem
232
+ require 'ory-keto-client'
233
+
234
+ api_instance = OryHydraClient::EnginesApi.new
235
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
236
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
237
+
238
+ begin
239
+ result = api_instance.get_ory_access_control_policy(flavor, id)
240
+ p result
241
+ rescue OryHydraClient::ApiError => e
242
+ puts "Exception when calling EnginesApi->get_ory_access_control_policy: #{e}"
243
+ end
244
+ ```
245
+
246
+ ### Parameters
247
+
248
+
249
+ Name | Type | Description | Notes
250
+ ------------- | ------------- | ------------- | -------------
251
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
252
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
253
+
254
+ ### Return type
255
+
256
+ [**OryAccessControlPolicy**](OryAccessControlPolicy.md)
257
+
258
+ ### Authorization
259
+
260
+ No authorization required
261
+
262
+ ### HTTP request headers
263
+
264
+ - **Content-Type**: Not defined
265
+ - **Accept**: application/json
266
+
267
+
268
+ ## get_ory_access_control_policy_role
269
+
270
+ > OryAccessControlPolicyRole get_ory_access_control_policy_role(flavor, id)
271
+
272
+ Get an ORY Access Control Policy Role
273
+
274
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
275
+
276
+ ### Example
277
+
278
+ ```ruby
279
+ # load the gem
280
+ require 'ory-keto-client'
281
+
282
+ api_instance = OryHydraClient::EnginesApi.new
283
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
284
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
285
+
286
+ begin
287
+ #Get an ORY Access Control Policy Role
288
+ result = api_instance.get_ory_access_control_policy_role(flavor, id)
289
+ p result
290
+ rescue OryHydraClient::ApiError => e
291
+ puts "Exception when calling EnginesApi->get_ory_access_control_policy_role: #{e}"
292
+ end
293
+ ```
294
+
295
+ ### Parameters
296
+
297
+
298
+ Name | Type | Description | Notes
299
+ ------------- | ------------- | ------------- | -------------
300
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
301
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
302
+
303
+ ### Return type
304
+
305
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
306
+
307
+ ### Authorization
308
+
309
+ No authorization required
310
+
311
+ ### HTTP request headers
312
+
313
+ - **Content-Type**: Not defined
314
+ - **Accept**: application/json
315
+
316
+
317
+ ## list_ory_access_control_policies
318
+
319
+ > Array<OryAccessControlPolicy> list_ory_access_control_policies(flavor, opts)
320
+
321
+
322
+
323
+ List ORY Access Control Policies
324
+
325
+ ### Example
326
+
327
+ ```ruby
328
+ # load the gem
329
+ require 'ory-keto-client'
330
+
331
+ api_instance = OryHydraClient::EnginesApi.new
332
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
333
+ opts = {
334
+ limit: 56, # Integer | The maximum amount of policies returned.
335
+ offset: 56, # Integer | The offset from where to start looking.
336
+ subject: 'subject_example', # String | The subject for whom the policies are to be listed.
337
+ resource: 'resource_example', # String | The resource for which the policies are to be listed.
338
+ action: 'action_example' # String | The action for which policies are to be listed.
339
+ }
340
+
341
+ begin
342
+ result = api_instance.list_ory_access_control_policies(flavor, opts)
343
+ p result
344
+ rescue OryHydraClient::ApiError => e
345
+ puts "Exception when calling EnginesApi->list_ory_access_control_policies: #{e}"
346
+ end
347
+ ```
348
+
349
+ ### Parameters
350
+
351
+
352
+ Name | Type | Description | Notes
353
+ ------------- | ------------- | ------------- | -------------
354
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
355
+ **limit** | **Integer**| The maximum amount of policies returned. | [optional]
356
+ **offset** | **Integer**| The offset from where to start looking. | [optional]
357
+ **subject** | **String**| The subject for whom the policies are to be listed. | [optional]
358
+ **resource** | **String**| The resource for which the policies are to be listed. | [optional]
359
+ **action** | **String**| The action for which policies are to be listed. | [optional]
360
+
361
+ ### Return type
362
+
363
+ [**Array<OryAccessControlPolicy>**](OryAccessControlPolicy.md)
364
+
365
+ ### Authorization
366
+
367
+ No authorization required
368
+
369
+ ### HTTP request headers
370
+
371
+ - **Content-Type**: Not defined
372
+ - **Accept**: application/json
373
+
374
+
375
+ ## list_ory_access_control_policy_roles
376
+
377
+ > Array<OryAccessControlPolicyRole> list_ory_access_control_policy_roles(flavor, opts)
378
+
379
+ List ORY Access Control Policy Roles
380
+
381
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
382
+
383
+ ### Example
384
+
385
+ ```ruby
386
+ # load the gem
387
+ require 'ory-keto-client'
388
+
389
+ api_instance = OryHydraClient::EnginesApi.new
390
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\"
391
+ opts = {
392
+ limit: 56, # Integer | The maximum amount of policies returned.
393
+ offset: 56, # Integer | The offset from where to start looking.
394
+ member: 'member_example' # String | The member for which the roles are to be listed.
395
+ }
396
+
397
+ begin
398
+ #List ORY Access Control Policy Roles
399
+ result = api_instance.list_ory_access_control_policy_roles(flavor, opts)
400
+ p result
401
+ rescue OryHydraClient::ApiError => e
402
+ puts "Exception when calling EnginesApi->list_ory_access_control_policy_roles: #{e}"
403
+ end
404
+ ```
405
+
406
+ ### Parameters
407
+
408
+
409
+ Name | Type | Description | Notes
410
+ ------------- | ------------- | ------------- | -------------
411
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\" |
412
+ **limit** | **Integer**| The maximum amount of policies returned. | [optional]
413
+ **offset** | **Integer**| The offset from where to start looking. | [optional]
414
+ **member** | **String**| The member for which the roles are to be listed. | [optional]
415
+
416
+ ### Return type
417
+
418
+ [**Array<OryAccessControlPolicyRole>**](OryAccessControlPolicyRole.md)
419
+
420
+ ### Authorization
421
+
422
+ No authorization required
423
+
424
+ ### HTTP request headers
425
+
426
+ - **Content-Type**: Not defined
427
+ - **Accept**: application/json
428
+
429
+
430
+ ## remove_ory_access_control_policy_role_members
431
+
432
+ > remove_ory_access_control_policy_role_members(flavor, id, member)
433
+
434
+ Remove a member from an ORY Access Control Policy Role
435
+
436
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
437
+
438
+ ### Example
439
+
440
+ ```ruby
441
+ # load the gem
442
+ require 'ory-keto-client'
443
+
444
+ api_instance = OryHydraClient::EnginesApi.new
445
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
446
+ id = 'id_example' # String | The ID of the ORY Access Control Policy Role.
447
+ member = 'member_example' # String | The member to be removed.
448
+
449
+ begin
450
+ #Remove a member from an ORY Access Control Policy Role
451
+ api_instance.remove_ory_access_control_policy_role_members(flavor, id, member)
452
+ rescue OryHydraClient::ApiError => e
453
+ puts "Exception when calling EnginesApi->remove_ory_access_control_policy_role_members: #{e}"
454
+ end
455
+ ```
456
+
457
+ ### Parameters
458
+
459
+
460
+ Name | Type | Description | Notes
461
+ ------------- | ------------- | ------------- | -------------
462
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
463
+ **id** | **String**| The ID of the ORY Access Control Policy Role. |
464
+ **member** | **String**| The member to be removed. |
465
+
466
+ ### Return type
467
+
468
+ nil (empty response body)
469
+
470
+ ### Authorization
471
+
472
+ No authorization required
473
+
474
+ ### HTTP request headers
475
+
476
+ - **Content-Type**: Not defined
477
+ - **Accept**: application/json
478
+
479
+
480
+ ## upsert_ory_access_control_policy
481
+
482
+ > OryAccessControlPolicy upsert_ory_access_control_policy(flavor, opts)
483
+
484
+
485
+
486
+ Upsert an ORY Access Control Policy
487
+
488
+ ### Example
489
+
490
+ ```ruby
491
+ # load the gem
492
+ require 'ory-keto-client'
493
+
494
+ api_instance = OryHydraClient::EnginesApi.new
495
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
496
+ opts = {
497
+ body: OryHydraClient::OryAccessControlPolicy.new # OryAccessControlPolicy |
498
+ }
499
+
500
+ begin
501
+ result = api_instance.upsert_ory_access_control_policy(flavor, opts)
502
+ p result
503
+ rescue OryHydraClient::ApiError => e
504
+ puts "Exception when calling EnginesApi->upsert_ory_access_control_policy: #{e}"
505
+ end
506
+ ```
507
+
508
+ ### Parameters
509
+
510
+
511
+ Name | Type | Description | Notes
512
+ ------------- | ------------- | ------------- | -------------
513
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
514
+ **body** | [**OryAccessControlPolicy**](OryAccessControlPolicy.md)| | [optional]
515
+
516
+ ### Return type
517
+
518
+ [**OryAccessControlPolicy**](OryAccessControlPolicy.md)
519
+
520
+ ### Authorization
521
+
522
+ No authorization required
523
+
524
+ ### HTTP request headers
525
+
526
+ - **Content-Type**: application/json
527
+ - **Accept**: application/json
528
+
529
+
530
+ ## upsert_ory_access_control_policy_role
531
+
532
+ > OryAccessControlPolicyRole upsert_ory_access_control_policy_role(flavor, opts)
533
+
534
+ Upsert an ORY Access Control Policy Role
535
+
536
+ Roles group several subjects into one. Rules can be assigned to ORY Access Control Policy (OACP) by using the Role ID as subject in the OACP.
537
+
538
+ ### Example
539
+
540
+ ```ruby
541
+ # load the gem
542
+ require 'ory-keto-client'
543
+
544
+ api_instance = OryHydraClient::EnginesApi.new
545
+ flavor = 'flavor_example' # String | The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\".
546
+ opts = {
547
+ body: OryHydraClient::OryAccessControlPolicyRole.new # OryAccessControlPolicyRole |
548
+ }
549
+
550
+ begin
551
+ #Upsert an ORY Access Control Policy Role
552
+ result = api_instance.upsert_ory_access_control_policy_role(flavor, opts)
553
+ p result
554
+ rescue OryHydraClient::ApiError => e
555
+ puts "Exception when calling EnginesApi->upsert_ory_access_control_policy_role: #{e}"
556
+ end
557
+ ```
558
+
559
+ ### Parameters
560
+
561
+
562
+ Name | Type | Description | Notes
563
+ ------------- | ------------- | ------------- | -------------
564
+ **flavor** | **String**| The ORY Access Control Policy flavor. Can be \"regex\", \"glob\", and \"exact\". |
565
+ **body** | [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)| | [optional]
566
+
567
+ ### Return type
568
+
569
+ [**OryAccessControlPolicyRole**](OryAccessControlPolicyRole.md)
570
+
571
+ ### Authorization
572
+
573
+ No authorization required
574
+
575
+ ### HTTP request headers
576
+
577
+ - **Content-Type**: application/json
578
+ - **Accept**: application/json
579
+