Package config is a generated protocol buffer package.

The `opa` adapter exposes an [Open Policy Agent]( engine that provides sophisticated access control mechanisms.

This adapter supports the [authorization template](

It is generated from these files:


It has these top-level messages:




This section is empty.


var (
	ErrInvalidLengthConfig = fmt.Errorf("proto: negative length found during unmarshaling")
	ErrIntOverflowConfig   = fmt.Errorf("proto: integer overflow")


This section is empty.


type Params

type Params struct {
	// List of OPA policies
	Policy []string `protobuf:"bytes,1,rep,name=policy" json:"policy,omitempty"`
	// Query method to check.
	// Format: data.<package name>.<method name>
	CheckMethod string `protobuf:"bytes,2,opt,name=check_method,json=checkMethod,proto3" json:"check_method,omitempty"`
	// Close the client request when adapter has a issue.
	// If failClose is set to true and there is a runtime error,
	// instead of disabling the adapter, close the client request
	FailClose bool `protobuf:"varint,3,opt,name=fail_close,json=failClose,proto3" json:"fail_close,omitempty"`

Configuration format for the `opa` adapter.

Example configuration: ```yaml policy:

- |+
  package mixerauthz
  policy = [
      "rule": {
        "verbs": [
        "users": [

  default allow = false

  allow = true {
    rule = policy[_].rule
    input.subject.user = rule.users[_]
    input.action.method = rule.verbs[_]

checkMethod: "data.mixerauthz.allow" failClose: true ```

func (*Params) Descriptor

func (*Params) Descriptor() ([]byte, []int)

func (*Params) Marshal

func (m *Params) Marshal() (dAtA []byte, err error)

func (*Params) MarshalTo

func (m *Params) MarshalTo(dAtA []byte) (int, error)

func (*Params) ProtoMessage

func (*Params) ProtoMessage()

func (*Params) Reset

func (m *Params) Reset()

func (*Params) Size

func (m *Params) Size() (n int)

func (*Params) String

func (this *Params) String() string

func (*Params) Unmarshal

func (m *Params) Unmarshal(dAtA []byte) error

Source Files