OK
{- "items": [
- {
- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
], - "response_metadata": {
- "prev_cursor": "string",
- "next_cursor": "string",
- "total": 0
}
}
Returns the newly created role.
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
]
}
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
{- "name": "string",
- "description": "string"
}
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
A request body containing a filter expression. This enables searching for items matching arbitrarily complex conditions. The list of attributes which can be used in filter expressions is available in the x-filterable vendor extension.
Note: All keywords are case-insensitive
Operator | Description | Example |
---|---|---|
CONTAINS | Substring or membership testing for string and list attributes respectively. | field3 CONTAINS 'foobar', field4 CONTAINS TRUE |
IN | Tests if field is a member of a list literal. List can contain a maximum of 100 values | field2 IN ['Goku', 'Vegeta'] |
GE | Tests if a field is greater than or equal to a literal value | field1 GE 1.2e-2 |
GT | Tests if a field is greater than a literal value | field1 GT 1.2e-2 |
LE | Tests if a field is less than or equal to a literal value | field1 LE 9000 |
LT | Tests if a field is less than a literal value | field1 LT 9.02 |
NE | Tests if a field is not equal to a literal value | field1 NE 42 |
EQ | Tests if a field is equal to a literal value | field1 EQ 42 |
The SEARCH operator filters for items which have any filterable
attribute that contains the input string as a substring, comparison
is done case-insensitively. This is not restricted to attributes with
string values. Specifically SEARCH '12'
would match an item with an
attribute with an integer value of 123
.
Ordered by precedence.
Operator | Description | Example |
---|---|---|
NOT | Logical NOT (Right associative) | NOT field1 LE 9000 |
AND | Logical AND (Left Associative) | field1 GT 9000 AND field2 EQ 'Goku' |
OR | Logical OR (Left Associative) | field1 GT 9000 OR field2 EQ 'Goku' |
Parenthesis ()
can be used to override operator precedence.
For example: NOT (field1 LT 1234 AND field2 CONTAINS 'foo')
Literal | Description | Examples |
---|---|---|
Nil | Represents the absence of a value | nil, Nil, nIl, NIL |
Boolean | true/false boolean | true, false, True, False, TRUE, FALSE |
Number | Signed integer and floating point numbers. Also supports scientific notation. | 0, 1, -1, 1.2, 0.35, 1.2e-2, -1.2e+2 |
String | Single or double quoted | "foo", "bar", "foo bar", 'foo', 'bar', 'foo bar' |
Datetime | Formatted according to RFC3339 | 2018-04-27T18:39:26.397237+00:00 |
List | Comma-separated literals wrapped in square brackets | [0], [0, 1], ['foo', "bar"] |
OK
An example of a nested Object comparison testing that at least one repository has a version which is equal to 19.0.0.
{- "filter_expression": "repositories CONTAINS {version eq '19.0.0'}"
}
{- "items": [
- {
- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
], - "response_metadata": {
- "prev_cursor": "string",
- "next_cursor": "string",
- "total": 0
}
}
{- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
]
}
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
{- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
]
}
{- "name": "string",
- "description": "string",
- "permission_objects": [
- {
- "object_type": "VDB",
- "permissions": [
- "CREATE"
]
}
], - "immutable": false,
- "tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "id": "string",
- "system_role": true
}
OK
{- "accounts": [
- {
- "id": 0,
- "first_name": "string",
- "last_name": "string",
- "email": "string",
- "access_groups": [
- {
- "id": "string",
- "name": "string",
- "permissions": [
- "string"
]
}
]
}
]
}
OK
{- "items": [
- {
- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
], - "response_metadata": {
- "prev_cursor": "string",
- "next_cursor": "string",
- "total": 0
}
}
Returns the newly created access group.
{- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
A request body containing a filter expression. This enables searching for items matching arbitrarily complex conditions. The list of attributes which can be used in filter expressions is available in the x-filterable vendor extension.
Note: All keywords are case-insensitive
Operator | Description | Example |
---|---|---|
CONTAINS | Substring or membership testing for string and list attributes respectively. | field3 CONTAINS 'foobar', field4 CONTAINS TRUE |
IN | Tests if field is a member of a list literal. List can contain a maximum of 100 values | field2 IN ['Goku', 'Vegeta'] |
GE | Tests if a field is greater than or equal to a literal value | field1 GE 1.2e-2 |
GT | Tests if a field is greater than a literal value | field1 GT 1.2e-2 |
LE | Tests if a field is less than or equal to a literal value | field1 LE 9000 |
LT | Tests if a field is less than a literal value | field1 LT 9.02 |
NE | Tests if a field is not equal to a literal value | field1 NE 42 |
EQ | Tests if a field is equal to a literal value | field1 EQ 42 |
The SEARCH operator filters for items which have any filterable
attribute that contains the input string as a substring, comparison
is done case-insensitively. This is not restricted to attributes with
string values. Specifically SEARCH '12'
would match an item with an
attribute with an integer value of 123
.
Ordered by precedence.
Operator | Description | Example |
---|---|---|
NOT | Logical NOT (Right associative) | NOT field1 LE 9000 |
AND | Logical AND (Left Associative) | field1 GT 9000 AND field2 EQ 'Goku' |
OR | Logical OR (Left Associative) | field1 GT 9000 OR field2 EQ 'Goku' |
Parenthesis ()
can be used to override operator precedence.
For example: NOT (field1 LT 1234 AND field2 CONTAINS 'foo')
Literal | Description | Examples |
---|---|---|
Nil | Represents the absence of a value | nil, Nil, nIl, NIL |
Boolean | true/false boolean | true, false, True, False, TRUE, FALSE |
Number | Signed integer and floating point numbers. Also supports scientific notation. | 0, 1, -1, 1.2, 0.35, 1.2e-2, -1.2e+2 |
String | Single or double quoted | "foo", "bar", "foo bar", 'foo', 'bar', 'foo bar' |
Datetime | Formatted according to RFC3339 | 2018-04-27T18:39:26.397237+00:00 |
List | Comma-separated literals wrapped in square brackets | [0], [0, 1], ['foo', "bar"] |
OK
An example of a nested Object comparison testing that at least one repository has a version which is equal to 19.0.0.
{- "filter_expression": "repositories CONTAINS {version eq '19.0.0'}"
}
{- "items": [
- {
- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
], - "response_metadata": {
- "prev_cursor": "string",
- "next_cursor": "string",
- "total": 0
}
}
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "name": "string"
}
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "account_ids": [
- 0
]
}
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
The updated Access group.
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "scopes": [
- {
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
{- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
The updated Access group.
{- "id": "string",
- "name": "string",
- "single_account": true,
- "account_ids": [
- 0
], - "tagged_account_ids": [
- 0
], - "account_tags": [
- {
- "key": "key-1",
- "value": "value-1"
}
], - "scopes": [
- {
- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
]
}
Access group scope to update.
The updated access group scope.
{- "name": "string",
- "scope_type": "SCOPED"
}
{- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
Add objects to the access group scope.
required | Array of objects (ScopedObjectItem) [ 1 .. 1000 ] items unique An array of scoped objects |
Created
{- "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
]
}
{- "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
]
}
The parameters to delete scope objects
required | Array of objects (ScopedObjectItem) [ 1 .. 1000 ] items unique List of scoped objects to be deleted |
Created
Delete all objects for given scope - No request body required
{ }
{- "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
]
}
Add always allowed permissions for given object type.
required | Array of objects (AlwaysAllowedPermission) [ 1 .. 1000 ] items unique An array of always allowed permissions |
The access group scope.
{- "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
{- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
Remove always allowed permissions for given object type.
required | Array of objects (AlwaysAllowedPermission) [ 1 .. 1000 ] items unique An array of always allowed permissions |
The access group scope.
{- "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}
{- "id": "string",
- "name": "string",
- "role_id": "string",
- "scope_type": "SCOPED",
- "object_tags": [
- {
- "key": "key-1",
- "value": "value-1",
- "object_type": "VDB",
- "permission": "READ"
}
], - "objects": [
- {
- "object_id": "1-VDB-OBJECT-ID",
- "object_type": "VDB",
- "permission": "READ"
}
], - "always_allowed_permissions": [
- {
- "object_type": "VDB",
- "permission": "READ"
}
]
}