summaryrefslogtreecommitdiff
path: root/vendor/hyper/src/ext/informational.rs
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2025-07-15 16:37:08 -0600
committermo khan <mo@mokhan.ca>2025-07-17 16:30:22 -0600
commit45df4d0d9b577fecee798d672695fe24ff57fb1b (patch)
tree1b99bf645035b58e0d6db08c7a83521f41f7a75b /vendor/hyper/src/ext/informational.rs
parentf94f79608393d4ab127db63cc41668445ef6b243 (diff)
feat: migrate from Cedar to SpiceDB authorization system
This is a major architectural change that replaces the Cedar policy-based authorization system with SpiceDB's relation-based authorization. Key changes: - Migrate from Rust to Go implementation - Replace Cedar policies with SpiceDB schema and relationships - Switch from envoy `ext_authz` with Cedar to SpiceDB permission checks - Update build system and dependencies for Go ecosystem - Maintain Envoy integration for external authorization This change enables more flexible permission modeling through SpiceDB's Google Zanzibar inspired relation-based system, supporting complex hierarchical permissions that were difficult to express in Cedar. Breaking change: Existing Cedar policies and Rust-based configuration will no longer work and need to be migrated to SpiceDB schema.
Diffstat (limited to 'vendor/hyper/src/ext/informational.rs')
-rw-r--r--vendor/hyper/src/ext/informational.rs86
1 files changed, 0 insertions, 86 deletions
diff --git a/vendor/hyper/src/ext/informational.rs b/vendor/hyper/src/ext/informational.rs
deleted file mode 100644
index e728580f..00000000
--- a/vendor/hyper/src/ext/informational.rs
+++ /dev/null
@@ -1,86 +0,0 @@
-use std::sync::Arc;
-
-#[derive(Clone)]
-pub(crate) struct OnInformational(Arc<dyn OnInformationalCallback + Send + Sync>);
-
-/// Add a callback for 1xx informational responses.
-///
-/// # Example
-///
-/// ```
-/// # let some_body = ();
-/// let mut req = hyper::Request::new(some_body);
-///
-/// hyper::ext::on_informational(&mut req, |res| {
-/// println!("informational: {:?}", res.status());
-/// });
-///
-/// // send request on a client connection...
-/// ```
-pub fn on_informational<B, F>(req: &mut http::Request<B>, callback: F)
-where
- F: Fn(Response<'_>) + Send + Sync + 'static,
-{
- on_informational_raw(req, OnInformationalClosure(callback));
-}
-
-pub(crate) fn on_informational_raw<B, C>(req: &mut http::Request<B>, callback: C)
-where
- C: OnInformationalCallback + Send + Sync + 'static,
-{
- req.extensions_mut()
- .insert(OnInformational(Arc::new(callback)));
-}
-
-// Sealed, not actually nameable bounds
-pub(crate) trait OnInformationalCallback {
- fn on_informational(&self, res: http::Response<()>);
-}
-
-impl OnInformational {
- pub(crate) fn call(&self, res: http::Response<()>) {
- self.0.on_informational(res);
- }
-}
-
-struct OnInformationalClosure<F>(F);
-
-impl<F> OnInformationalCallback for OnInformationalClosure<F>
-where
- F: Fn(Response<'_>) + Send + Sync + 'static,
-{
- fn on_informational(&self, res: http::Response<()>) {
- let res = Response(&res);
- (self.0)(res);
- }
-}
-
-// A facade over http::Response.
-//
-// It purposefully hides being able to move the response out of the closure,
-// while also not being able to expect it to be a reference `&Response`.
-// (Otherwise, a closure can be written as `|res: &_|`, and then be broken if
-// we make the closure take ownership.)
-//
-// With the type not being nameable, we could change from being a facade to
-// being either a real reference, or moving the http::Response into the closure,
-// in a backwards-compatible change in the future.
-#[derive(Debug)]
-pub struct Response<'a>(&'a http::Response<()>);
-
-impl Response<'_> {
- #[inline]
- pub fn status(&self) -> http::StatusCode {
- self.0.status()
- }
-
- #[inline]
- pub fn version(&self) -> http::Version {
- self.0.version()
- }
-
- #[inline]
- pub fn headers(&self) -> &http::HeaderMap {
- self.0.headers()
- }
-}