CARVIEW |
Select Language
HTTP/2 200
date: Sat, 19 Jul 2025 14:46:44 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
x-robots-tag: none
etag: W/"ae08cf34f77ad9a1d35f7367656284fd"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=fFNbqio7Vx5aQsQkcAV8Sw980qNzIra18Fs5%2FumuXEZtdvFhp7N1VkDhOpvJDTooOu7O0v8rRhj8w9y5oRpb1optUIrZhQKKIb6amtMNu7ph3txP2HNRSyQcYEb%2FugiYEfAVvX6tgblyoJffueMi4rZyexjN%2BjqeXJZoE7%2FfvOyYToc1hoDbB4GSv4KVb3yYl7Rs4s%2BYjencszpfXDD5jApN2LHPY6Jhqzyc3gDh5zUpG1mfUvlDAevos%2FNV5vFErNDr1vUFlraNh%2F1NiFoBdA%3D%3D--0Q1Ru923qqMBbLnQ--mgjLh9bfQnlqiGdskWcoZw%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.381042137.1752936403; Path=/; Domain=github.com; Expires=Sun, 19 Jul 2026 14:46:43 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Sun, 19 Jul 2026 14:46:43 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: C3F6:228B1:876AB0:B0043A:687BAFD3
Authorization · linksmart/go-sec Wiki · GitHub
Skip to content
Navigation Menu
{{ message }}
This repository was archived by the owner on Apr 4, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
Authorization
Farshid Tavakolizadeh edited this page Dec 1, 2020
·
10 revisions
The go-sec authorization package provides simple rule-based authorization to HTTP-based web services. This extends the authentication flows.
The rules are defined in JSON as follows:
{
"enabled": true,
"rules": [
{
"paths": ["string"],
"methods": ["string"],
"users": ["string"],
"groups": ["string"],
"roles": ["string"],
"clients": ["string"],
"denyPathSubstrings": ["string"],
}
]
}
where:
-
enabled
toggles the authorization -
rules
is an allow-list array of rules, each defined by the following parameters:-
paths
is an array of HTTP path prefixes (API endpoints) to which the rule apply -
methods
is an array of HTTP methods to which the rule applies -
users
is an array of users to which the rule apply -
groups
is an array of user groups to which the rule applies -
roles
is an array of user roles to which the rule applies -
clients
is an array of clients to which the rule applies -
denyPathSubstrings
is an array of path substring exceptions for which access is excluded within this rule's scope
-
A request will be authorized if it matches the resource, method, and either of user or group given in a single rule. The authorization is given if any of the rules match (rules do not override each other).
Example
{
"enabled": true,
"rules": [
{
"paths": ["/res"],
"methods": ["GET"],
"users": ["linksmart"],
"groups": ["admin"]
},
{
"paths": ["/res"],
"methods": ["PUT", "DELETE"],
"groups": ["admin"]
},
{
"paths": ["/public"],
"methods": ["GET"],
"groups": ["anonymous"] // this is a special group assigned to unauthenticated users
}
]
}
Given the set of rules in the example above:
- user
linksmart
can performGET
requests on resources with a path starting with/res
- a user from group
admin
can performGET
as well asPUT
andDELETE
requests on resources with a path starting with/res
- an unauthenticated user can perform
GET
requests on resources with a path starting with/public
Clone this wiki locally
You can’t perform that action at this time.