Home
last modified time | relevance | path

Searched full:principal (Results 1 – 25 of 2867) sorted by relevance

12345678910>>...115

/aosp_15_r20/external/grpc-grpc/src/core/lib/security/authorization/
H A Drbac_policy.cc281 // Principal
284 Rbac::Principal Rbac::Principal::MakeAndPrincipal( in MakeAndPrincipal()
285 std::vector<std::unique_ptr<Principal>> principals) { in MakeAndPrincipal()
286 Principal principal; in MakeAndPrincipal() local
287 principal.type = Principal::RuleType::kAnd; in MakeAndPrincipal()
288 principal.principals = std::move(principals); in MakeAndPrincipal()
289 return principal; in MakeAndPrincipal()
292 Rbac::Principal Rbac::Principal::MakeOrPrincipal( in MakeOrPrincipal()
293 std::vector<std::unique_ptr<Principal>> principals) { in MakeOrPrincipal()
294 Principal principal; in MakeOrPrincipal() local
[all …]
H A Drbac_policy.h111 struct Principal { struct
126 static Principal MakeAndPrincipal(
127 std::vector<std::unique_ptr<Principal>> principals);
128 static Principal MakeOrPrincipal(
129 std::vector<std::unique_ptr<Principal>> principals);
130 static Principal MakeNotPrincipal(Principal principal);
131 static Principal MakeAnyPrincipal();
132 static Principal MakeAuthenticatedPrincipal(
134 static Principal MakeSourceIpPrincipal(CidrRange ip);
135 static Principal MakeDirectRemoteIpPrincipal(CidrRange ip);
[all …]
H A Dmatchers.cc80 Rbac::Principal principal) { in Create() argument
81 switch (principal.type) { in Create()
82 case Rbac::Principal::RuleType::kAnd: { in Create()
84 matchers.reserve(principal.principals.size()); in Create()
85 for (const auto& id : principal.principals) { in Create()
90 case Rbac::Principal::RuleType::kOr: { in Create()
92 matchers.reserve(principal.principals.size()); in Create()
93 for (const auto& id : principal.principals) { in Create()
98 case Rbac::Principal::RuleType::kNot: in Create()
100 AuthorizationMatcher::Create(std::move(*principal.principals[0]))); in Create()
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/src/core/lib/security/authorization/
Drbac_policy.cc283 // Principal
286 Rbac::Principal Rbac::Principal::MakeAndPrincipal( in MakeAndPrincipal()
287 std::vector<std::unique_ptr<Principal>> principals) { in MakeAndPrincipal()
288 Principal principal; in MakeAndPrincipal() local
289 principal.type = Principal::RuleType::kAnd; in MakeAndPrincipal()
290 principal.principals = std::move(principals); in MakeAndPrincipal()
291 return principal; in MakeAndPrincipal()
294 Rbac::Principal Rbac::Principal::MakeOrPrincipal( in MakeOrPrincipal()
295 std::vector<std::unique_ptr<Principal>> principals) { in MakeOrPrincipal()
296 Principal principal; in MakeOrPrincipal() local
[all …]
Drbac_policy.h111 struct Principal { struct
126 static Principal MakeAndPrincipal(
127 std::vector<std::unique_ptr<Principal>> principals);
128 static Principal MakeOrPrincipal(
129 std::vector<std::unique_ptr<Principal>> principals);
130 static Principal MakeNotPrincipal(Principal principal);
131 static Principal MakeAnyPrincipal();
132 static Principal MakeAuthenticatedPrincipal(
134 static Principal MakeSourceIpPrincipal(CidrRange ip);
135 static Principal MakeDirectRemoteIpPrincipal(CidrRange ip);
[all …]
/aosp_15_r20/external/googleapis/google/cloud/policytroubleshooter/iam/v3beta/
H A Dtroubleshooter.proto43 // Checks whether a principal has a specific permission for a specific
44 // resource, and explains why the principal does or doesn't have that
55 // Whether IAM allow policies gives the principal the permission.
60 // The allow policy gives the principal the permission.
63 // The allow policy doesn't give the principal the permission.
66 // The allow policy gives the principal the permission if a condition
73 // that Policy Troubleshooter needs to evaluate the principal's access.
77 // Whether IAM deny policies deny the principal the permission.
82 // The deny policy denies the principal the permission.
85 // The deny policy doesn't deny the principal the permission.
[all …]
/aosp_15_r20/external/googleapis/google/cloud/policytroubleshooter/iam/v3/
H A Dtroubleshooter.proto46 // Checks whether a principal has a specific permission for a specific
47 // resource, and explains why the principal does or doesn't have that
58 // Whether IAM allow policies gives the principal the permission.
63 // The allow policy gives the principal the permission.
66 // The allow policy doesn't give the principal the permission.
69 // The allow policy gives the principal the permission if a condition
76 // that Policy Troubleshooter needs to evaluate the principal's access.
80 // Whether IAM deny policies deny the principal the permission.
85 // The deny policy denies the principal the permission.
88 // The deny policy doesn't deny the principal the permission.
[all …]
/aosp_15_r20/external/aws-sdk-java-v2/test/test-utils/src/test/java/software/amazon/awssdk/core/auth/policy/
H A DPolicyTest.java27 import software.amazon.awssdk.core.auth.policy.Principal.Service;
28 import software.amazon.awssdk.core.auth.policy.Principal.WebIdentityProvider;
46 .withPrincipals(new Principal("accountId1"), in testPrincipals()
47 new Principal("accountId2")) in testPrincipals()
58 assertTrue(statement.has("Principal")); in testPrincipals()
62 JsonNode users = statement.get("Principal").get("AWS"); in testPrincipals()
70 .withPrincipals(new Principal(Principal.Service.AmazonEC2), in testPrincipals()
71 … new Principal(Principal.Service.AmazonElasticTranscoder)) in testPrincipals()
80 assertTrue(statement.has("Principal")); in testPrincipals()
84 JsonNode services = statement.get("Principal").get("Service"); in testPrincipals()
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/java/security/acl/
DAcl.java29 import java.security.Principal;
38 * set of permissions associated with a particular principal. (A
39 * principal represents an entity such as an individual user or a
42 * granted to the associated principal. If negative, the permissions
47 * <ul> <li>Each principal can have at most one positive ACL entry and
49 * entries are not allowed for any principal. Each entry specifies
53 * <li>If there is no entry for a particular principal, then the
54 * principal is considered to have a null (empty) permission set.
56 * <li>If there is a positive entry that grants a principal a
58 * principal the same permission, the result is as though the
[all …]
DGroup.java29 import java.security.Principal;
32 * This interface is used to represent a group of principals. (A principal
35 * Note that Group extends Principal. Thus, either a Principal or a Group can
36 * be passed as an argument to methods containing a Principal parameter. For
37 * example, you can add either a Principal or a Group to a Group object by
39 * Principal or Group.
49 public interface Group extends Principal {
54 * @param user the principal to add to this group.
57 * false if the principal was already a member.
59 public boolean addMember(Principal user); in addMember()
[all …]
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/10/libcore/ojluni/src/main/java/java/security/acl/
DAcl.java29 import java.security.Principal;
38 * set of permissions associated with a particular principal. (A
39 * principal represents an entity such as an individual user or a
42 * granted to the associated principal. If negative, the permissions
47 * <ul> <li>Each principal can have at most one positive ACL entry and
49 * entries are not allowed for any principal. Each entry specifies
53 * <li>If there is no entry for a particular principal, then the
54 * principal is considered to have a null (empty) permission set.
56 * <li>If there is a positive entry that grants a principal a
58 * principal the same permission, the result is as though the
[all …]
DGroup.java29 import java.security.Principal;
32 * This interface is used to represent a group of principals. (A principal
35 * Note that Group extends Principal. Thus, either a Principal or a Group can
36 * be passed as an argument to methods containing a Principal parameter. For
37 * example, you can add either a Principal or a Group to a Group object by
39 * Principal or Group.
49 public interface Group extends Principal {
54 * @param user the principal to add to this group.
57 * false if the principal was already a member.
59 public boolean addMember(Principal user); in addMember()
[all …]
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/acl/
H A DAcl.java29 import java.security.Principal;
38 * set of permissions associated with a particular principal. (A
39 * principal represents an entity such as an individual user or a
42 * granted to the associated principal. If negative, the permissions
47 * <ul> <li>Each principal can have at most one positive ACL entry and
49 * entries are not allowed for any principal. Each entry specifies
53 * <li>If there is no entry for a particular principal, then the
54 * principal is considered to have a null (empty) permission set.
56 * <li>If there is a positive entry that grants a principal a
58 * principal the same permission, the result is as though the
[all …]
H A DGroup.java29 import java.security.Principal;
32 * This interface is used to represent a group of principals. (A principal
35 * Note that Group extends Principal. Thus, either a Principal or a Group can
36 * be passed as an argument to methods containing a Principal parameter. For
37 * example, you can add either a Principal or a Group to a Group object by
39 * Principal or Group.
49 public interface Group extends Principal {
54 * @param user the principal to add to this group.
57 * false if the principal was already a member.
59 public boolean addMember(Principal user); in addMember()
[all …]
/aosp_15_r20/external/aws-sdk-java-v2/test/test-utils/src/main/java/software/amazon/awssdk/core/auth/policy/
H A DPrincipal.java19 * A principal is an AWS account or AWS web service, which is being allowed or denied access to a
20 * resource through an access control policy. The principal is a property of the
23 * The principal is A in the statement
26 * In an access control policy statement, you can set the principal to all
27 * authenticated AWS users through the {@link Principal#ALL_USERS} member. This
32 public class Principal { class
35 * Principal instance that includes all users, including anonymous users.
41 public static final Principal ALL_USERS = new Principal("AWS", "*");
44 * Principal instance that includes all AWS web services.
46 public static final Principal ALL_SERVICES = new Principal("Service", "*");
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/src/core/ext/filters/rbac/
Drbac_service_config_parser.cc141 // Principal: a matcher for client identity
142 struct Principal { struct
145 std::vector<Principal> ids;
162 std::unique_ptr<Rbac::Principal> principal; member
164 Principal() = default;
165 Principal(const Principal&) = delete;
166 Principal& operator=(const Principal&) = delete;
167 Principal(Principal&&) = default;
168 Principal& operator=(Principal&&) = default;
170 static std::vector<std::unique_ptr<Rbac::Principal>>
[all …]
/aosp_15_r20/external/grpc-grpc/src/core/ext/filters/rbac/
H A Drbac_service_config_parser.cc141 // Principal: a matcher for client identity
142 struct Principal { struct
145 std::vector<Principal> ids;
162 std::unique_ptr<Rbac::Principal> principal; member
164 Principal() = default;
165 Principal(const Principal&) = delete;
166 Principal& operator=(const Principal&) = delete;
167 Principal(Principal&&) = default;
168 Principal& operator=(Principal&&) = default;
170 static std::vector<std::unique_ptr<Rbac::Principal>>
[all …]
/aosp_15_r20/external/googleapis/google/cloud/policysimulator/v1/
H A Dexplanations.proto32 // Whether a principal has a permission for a resource.
37 // The principal has the permission.
40 // The principal does not have the permission.
43 // The principal has the permission only if a condition expression evaluates
54 // or whether a binding includes a specific principal, contributes to an overall
69 // Information about the principal, resource, and permission to check.
71 // Required. The principal whose access you want to check, in the form of
72 // the email address that represents that principal. For example,
76 // The principal must be a Google Account or a service account. Other types of
78 string principal = 1 [(google.api.field_behavior) = REQUIRED]; field
[all …]
/aosp_15_r20/external/googleapis/google/cloud/policytroubleshooter/v1/
H A Dexplanations.proto28 // Information about the principal, resource, and permission to check.
30 // Required. The principal whose access you want to check, in the form of
31 // the email address that represents that principal. For example,
35 // The principal must be a Google Account or a service account. Other types of
37 string principal = 1 [(google.api.field_behavior) = REQUIRED]; field
46 // Required. The IAM permission to check for the specified principal and
61 // specified principal for the specified resource.
63 // This field does _not_ indicate whether the principal actually has the
65 // this policy. To determine whether the principal actually has the
86 // Details about how each binding in the policy affects the principal's
[all …]
/aosp_15_r20/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/auth/x500/
H A DX500PrincipalTest.java281 X500Principal principal = new X500Principal( in test_ConstructorLjava_lang_String() local
283 String name = principal.getName(); in test_ConstructorLjava_lang_String()
306 X500Principal principal = new X500Principal( in test_getNameLjava_lang_String() local
308 String canonical = principal.getName(X500Principal.CANONICAL); in test_getNameLjava_lang_String()
352 X500Principal principal = new X500Principal(is); in testStreamPosition() local
353 String s = principal.toString(); in testStreamPosition()
373 X500Principal principal = new X500Principal(is); in testStreamPosition_0() local
374 String s = principal.toString(); in testStreamPosition_0()
400 X500Principal principal = new X500Principal(is); in testStreamPosition_1() local
402 String s = principal.getName(X500Principal.RFC1779); in testStreamPosition_1()
[all …]
/aosp_15_r20/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/
Dpolicytroubleshooter.v1.json111 …escription": "Checks whether a principal has a specific permission for a specific resource, and ex…
135 "description": "Information about the principal, resource, and permission to check.",
143 …"description": "Required. The IAM permission to check for the specified principal and resource. Fo…
146 "principal": { object
147principal whose access you want to check, in the form of the email address that represents that pr…
154 …"description": "Details about how a binding in a policy affects a principal's ability to use a per…
158principal for the specified resource. This field does _not_ indicate whether the principal actuall…
168 "The principal has the permission.",
169 "The principal does not have the permission.",
170 "The principal has the permission only if a condition expression evaluates to `true`.",
[all …]
/aosp_15_r20/external/sdk-platform-java/java-iam/proto-google-iam-v2/src/main/java/com/google/iam/v2/
H A DDenyRule.java81 * any principal that is on the internet, even if they do not have a Google
83 * * `principal://goog/subject/{email_id}`: A specific Google Account.
85 * example, `principal://goog/subject/alice&#64;example.com`.
86 * * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
88 * `deleted:principal://goog/subject/alice&#64;example.com?uid=1234567890`. If
98 * * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`:
100 …* `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.gservice…
101 …* * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={u…
103 …* `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.…
126 * any principal that is on the internet, even if they do not have a Google
[all …]
H A DDenyRuleOrBuilder.java33 * any principal that is on the internet, even if they do not have a Google
35 * * `principal://goog/subject/{email_id}`: A specific Google Account.
37 * example, `principal://goog/subject/alice&#64;example.com`.
38 * * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
40 * `deleted:principal://goog/subject/alice&#64;example.com?uid=1234567890`. If
50 * * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`:
52 …* `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.gservice…
53 …* * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={u…
55 …* `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.…
76 * any principal that is on the internet, even if they do not have a Google
[all …]
/aosp_15_r20/external/sdk-platform-java/java-iam/proto-google-iam-v2beta/src/main/java/com/google/iam/v2beta/
H A DDenyRule.java83 * any principal that is on the internet, even if they do not have a Google
85 * * `principal://goog/subject/{email_id}`: A specific Google Account.
87 * example, `principal://goog/subject/alice&#64;example.com`.
88 * * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
90 * `deleted:principal://goog/subject/alice&#64;example.com?uid=1234567890`. If
100 * * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`:
102 …* `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.gservice…
103 …* * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={u…
105 …* `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.…
128 * any principal that is on the internet, even if they do not have a Google
[all …]
H A DDenyRuleOrBuilder.java33 * any principal that is on the internet, even if they do not have a Google
35 * * `principal://goog/subject/{email_id}`: A specific Google Account.
37 * example, `principal://goog/subject/alice&#64;example.com`.
38 * * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
40 * `deleted:principal://goog/subject/alice&#64;example.com?uid=1234567890`. If
50 * * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`:
52 …* `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.gservice…
53 …* * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={u…
55 …* `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account&#64;iam.…
76 * any principal that is on the internet, even if they do not have a Google
[all …]

12345678910>>...115