-
-
Notifications
You must be signed in to change notification settings - Fork 39
Expand file tree
/
Copy pathGraphQL.Authorization.approved.txt
More file actions
97 lines (97 loc) · 6.32 KB
/
GraphQL.Authorization.approved.txt
File metadata and controls
97 lines (97 loc) · 6.32 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
namespace GraphQL.Authorization
{
public class AuthenticatedUserRequirement : GraphQL.Authorization.IAuthorizationRequirement
{
public AuthenticatedUserRequirement() { }
public System.Threading.Tasks.Task Authorize(GraphQL.Authorization.AuthorizationContext context) { }
}
public class AuthorizationContext
{
public AuthorizationContext() { }
public System.Collections.Generic.IEnumerable<string> Errors { get; }
public bool HasErrors { get; }
public System.Collections.Generic.IReadOnlyDictionary<string, object>? Inputs { get; set; }
public System.Security.Claims.ClaimsPrincipal? User { get; set; }
public System.Collections.Generic.IDictionary<string, object?>? UserContext { get; set; }
public void ReportError(string error) { }
}
public class AuthorizationEvaluator : GraphQL.Authorization.IAuthorizationEvaluator
{
public AuthorizationEvaluator(GraphQL.Authorization.AuthorizationSettings settings) { }
public System.Threading.Tasks.Task<GraphQL.Authorization.AuthorizationResult> Evaluate(System.Security.Claims.ClaimsPrincipal? principal, System.Collections.Generic.IDictionary<string, object?>? userContext, System.Collections.Generic.IReadOnlyDictionary<string, object>? inputs, System.Collections.Generic.IEnumerable<string>? requiredPolicies) { }
}
public class AuthorizationPolicy : GraphQL.Authorization.IAuthorizationPolicy
{
public AuthorizationPolicy(System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationRequirement> requirements) { }
public System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationRequirement> Requirements { get; }
}
public class AuthorizationPolicyBuilder
{
public AuthorizationPolicyBuilder() { }
public GraphQL.Authorization.AuthorizationPolicyBuilder AddRequirement(GraphQL.Authorization.IAuthorizationRequirement requirement) { }
public GraphQL.Authorization.AuthorizationPolicy Build() { }
public GraphQL.Authorization.AuthorizationPolicyBuilder RequireAuthenticatedUser() { }
public GraphQL.Authorization.AuthorizationPolicyBuilder RequireClaim(string claimType) { }
public GraphQL.Authorization.AuthorizationPolicyBuilder RequireClaim(string claimType, params string[] allowedValues) { }
public GraphQL.Authorization.AuthorizationPolicyBuilder RequireClaim(string claimType, System.Collections.Generic.IEnumerable<string>? allowedValues, System.Collections.Generic.IEnumerable<string>? displayValues) { }
}
public class AuthorizationResult
{
public AuthorizationResult() { }
public System.Collections.Generic.IEnumerable<string>? Errors { get; }
public bool Succeeded { get; }
public static GraphQL.Authorization.AuthorizationResult Fail(System.Collections.Generic.IEnumerable<string> errors) { }
public static GraphQL.Authorization.AuthorizationResult Success() { }
}
public class AuthorizationSettings
{
public AuthorizationSettings() { }
public System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationPolicy> Policies { get; }
public void AddPolicy(string name, GraphQL.Authorization.IAuthorizationPolicy policy) { }
public void AddPolicy(string name, System.Action<GraphQL.Authorization.AuthorizationPolicyBuilder> configure) { }
public System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationPolicy> GetPolicies(System.Collections.Generic.IEnumerable<string> policies) { }
public GraphQL.Authorization.IAuthorizationPolicy? GetPolicy(string name) { }
}
public class AuthorizationValidationRule : GraphQL.Validation.IValidationRule
{
public AuthorizationValidationRule(GraphQL.Authorization.IAuthorizationEvaluator evaluator) { }
public AuthorizationValidationRule(GraphQL.Authorization.IAuthorizationEvaluator evaluator, System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationSkipCondition> skipConditions) { }
public System.Threading.Tasks.ValueTask<GraphQL.Validation.INodeVisitor?> ValidateAsync(GraphQL.Validation.ValidationContext context) { }
}
public class ClaimAuthorizationRequirement : GraphQL.Authorization.IAuthorizationRequirement
{
public ClaimAuthorizationRequirement(string claimType) { }
public ClaimAuthorizationRequirement(string claimType, System.Collections.Generic.IEnumerable<string> allowedValues) { }
public ClaimAuthorizationRequirement(string claimType, params string[] allowedValues) { }
public ClaimAuthorizationRequirement(string claimType, System.Collections.Generic.IEnumerable<string>? allowedValues, System.Collections.Generic.IEnumerable<string>? displayValues) { }
public System.Collections.Generic.IEnumerable<string> AllowedValues { get; }
public string ClaimType { get; }
public System.Collections.Generic.IEnumerable<string>? DisplayValues { get; }
public System.Threading.Tasks.Task Authorize(GraphQL.Authorization.AuthorizationContext context) { }
}
public interface IAuthorizationEvaluator
{
System.Threading.Tasks.Task<GraphQL.Authorization.AuthorizationResult> Evaluate(System.Security.Claims.ClaimsPrincipal? principal, System.Collections.Generic.IDictionary<string, object?>? userContext, System.Collections.Generic.IReadOnlyDictionary<string, object>? inputs, System.Collections.Generic.IEnumerable<string>? requiredPolicies);
}
public interface IAuthorizationPolicy
{
System.Collections.Generic.IEnumerable<GraphQL.Authorization.IAuthorizationRequirement> Requirements { get; }
}
public interface IAuthorizationRequirement
{
System.Threading.Tasks.Task Authorize(GraphQL.Authorization.AuthorizationContext context);
}
public interface IAuthorizationSkipCondition
{
System.Threading.Tasks.ValueTask<bool> ShouldSkip(GraphQL.Validation.ValidationContext context);
}
public interface IProvideClaimsPrincipal
{
System.Security.Claims.ClaimsPrincipal? User { get; }
}
public class IntrospectionSkipCondition : GraphQL.Authorization.IAuthorizationSkipCondition
{
public IntrospectionSkipCondition() { }
public System.Threading.Tasks.ValueTask<bool> ShouldSkip(GraphQL.Validation.ValidationContext context) { }
}
}