PermissionValidator

Struct PermissionValidator 

Source
pub struct PermissionValidator {
    Roles: Arc<RwLock<HashMap<String, Role>>>,
    Permissions: Arc<RwLock<HashMap<String, Permission>>>,
    OperationPermissions: HashMap<String, Vec<String>>,
    ValidationTimeoutMillis: u64,
}
Expand description

Permission validator for IPC operations

Fields§

§Roles: Arc<RwLock<HashMap<String, Role>>>

Role definitions indexed by role name

§Permissions: Arc<RwLock<HashMap<String, Permission>>>

Permission definitions indexed by permission name

§OperationPermissions: HashMap<String, Vec<String>>

Operation to permission mapping

§ValidationTimeoutMillis: u64

Maximum time allowed for permission validation (milliseconds)

Implementations§

Source§

impl PermissionValidator

Source

pub fn New(ValidationTimeoutMillis: u64) -> Self

Create a new permission validator

§Parameters
  • ValidationTimeoutMillis: Maximum timeout for validation in milliseconds
§Returns

New PermissionValidator instance

Source

fn BuildOperationMapping() -> HashMap<String, Vec<String>>

Build operation to permission mapping

§Returns

HashMap mapping operation names to required permission strings

Source

pub fn CreateSecurityContext( UserId: String, Roles: Vec<String>, IpAddress: String, DirectPermissions: Vec<String>, ) -> SecurityContext

Create security context from message data

§Parameters
  • UserId: User identifier for the request
  • Roles: User’s assigned roles (defaults to [“user”] if empty)
  • IpAddress: Origin IP address
  • DirectPermissions: Direct user permissions (optional)
§Returns

New SecurityContext instance

Source

pub async fn ValidatePermission( &self, Operation: &str, Context: &SecurityContext, ) -> Result<(), String>

Validate permission for an operation with security context

§Parameters
  • Operation: The operation being performed
  • Context: Security context containing user info and roles
§Returns

Ok(()) if permission granted, Err with message if denied

§Security Notes
  • All operations require explicit permission grant (default deny)
  • Validation is performed server-side only
  • IP address can be used for additional restrictions
  • Timestamp can be used for time-based restrictions
Source

async fn ValidatePermissionInternal( &self, Operation: &str, Context: &SecurityContext, ) -> Result<(), String>

Internal validation logic (without timeout wrapper)

§Parameters
  • Operation: The operation being performed
  • Context: Security context
§Returns

Ok(()) if permission granted, Err with message if denied

Source

async fn AggregateUserPermissions( &self, Context: &SecurityContext, ) -> Result<Vec<String>, String>

Aggregate all permissions for a user from roles and direct permissions

§Parameters
  • Context: Security context containing roles and direct permissions
§Returns

Vector of all permission strings available to the user

Source

pub async fn RegisterRole(&self, Role: Role) -> Result<(), String>

Register a role definition

§Parameters
  • Role: Role definition to register
§Returns

Result indicating success or error

Source

pub async fn RegisterPermission( &self, Permission: Permission, ) -> Result<(), String>

Register a permission definition

§Parameters
  • Permission: Permission definition to register

/// Returns Result indicating success or error

Source

pub async fn GetRolePermissions(&self, RoleName: &str) -> Vec<String>

Get all permissions for a specific role

§Parameters
  • RoleName: Name of the role to query
§Returns

Vector of permission strings for the role, empty if role not found

Source

pub async fn HasPermission( &self, Context: &SecurityContext, PermissionName: &str, ) -> bool

Check if a user has a specific permission

§Parameters
  • Context: Security context for the user
  • PermissionName: Permission name to check

/// Returns true if user has permission, false otherwise

Source

pub async fn InitializeDefaults(&self) -> Result<(), String>

Initialize default roles and permissions

§Returns

Result indicating success or error

§Default Roles
  • user: Read-only access to files, config, storage
  • developer: Read/write access to files and storage
  • admin: Full access including system operations

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
§

impl<T> Downcast for T
where T: Any,

§

fn into_any(self: Box<T>) -> Box<dyn Any>

Convert Box<dyn Trait> (where Trait: Downcast) to Box<dyn Any>. Box<dyn Any> can then be further downcast into Box<ConcreteType> where ConcreteType implements Trait.
§

fn into_any_rc(self: Rc<T>) -> Rc<dyn Any>

Convert Rc<Trait> (where Trait: Downcast) to Rc<Any>. Rc<Any> can then be further downcast into Rc<ConcreteType> where ConcreteType implements Trait.
§

fn as_any(&self) -> &(dyn Any + 'static)

Convert &Trait (where Trait: Downcast) to &Any. This is needed since Rust cannot generate &Any’s vtable from &Trait’s.
§

fn as_any_mut(&mut self) -> &mut (dyn Any + 'static)

Convert &mut Trait (where Trait: Downcast) to &Any. This is needed since Rust cannot generate &mut Any’s vtable from &mut Trait’s.
§

impl<T> DowncastSync for T
where T: Any + Send + Sync,

§

fn into_any_arc(self: Arc<T>) -> Arc<dyn Any + Sync + Send>

Convert Arc<Trait> (where Trait: Downcast) to Arc<Any>. Arc<Any> can then be further downcast into Arc<ConcreteType> where ConcreteType implements Trait.
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

§

impl<T> FutureExt for T

§

fn with_context(self, otel_cx: Context) -> WithContext<Self>

Attaches the provided Context to this type, returning a WithContext wrapper. Read more
§

fn with_current_context(self) -> WithContext<Self>

Attaches the current Context to this type, returning a WithContext wrapper. Read more
§

impl<T> Instrument for T

§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided [Span], returning an Instrumented wrapper. Read more
§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

§

impl<T> IntoRequest<T> for T

§

fn into_request(self) -> Request<T>

Wrap the input message T in a tonic::Request
§

impl<L> LayerExt<L> for L

§

fn named_layer<S>(&self, service: S) -> Layered<<L as Layer<S>>::Service, S>
where L: Layer<S>,

Applies the layer to a service and wraps it in [Layered].
§

impl<T> Pointable for T

§

const ALIGN: usize

The alignment of pointer.
§

type Init = T

The type for initializers.
§

unsafe fn init(init: <T as Pointable>::Init) -> usize

Initializes a with the given initializer. Read more
§

unsafe fn deref<'a>(ptr: usize) -> &'a T

Dereferences the given pointer. Read more
§

unsafe fn deref_mut<'a>(ptr: usize) -> &'a mut T

Mutably dereferences the given pointer. Read more
§

unsafe fn drop(ptr: usize)

Drops the object pointed to by the given pointer. Read more
§

impl<T> PolicyExt for T
where T: ?Sized,

§

fn and<P, B, E>(self, other: P) -> And<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns [Action::Follow] only if self and other return Action::Follow. Read more
§

fn or<P, B, E>(self, other: P) -> Or<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns [Action::Follow] if either self or other returns Action::Follow. Read more
Source§

impl<T> Same for T

Source§

type Output = T

Should always be Self
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

§

fn vzip(self) -> V

§

impl<T> WithSubscriber for T

§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a [WithDispatch] wrapper. Read more
Source§

impl<T> AutoreleaseSafe for T
where T: ?Sized,