createAuthorizer method
Adds a new Authorizer resource to an existing RestApi resource.
May throw BadRequestException. May throw UnauthorizedException. May throw NotFoundException. May throw LimitExceededException. May throw TooManyRequestsException.
Parameter name
:
Required
The name of the authorizer.
Parameter restApiId
:
Required
The string identifier of the associated RestApi.
Parameter type
:
Required
The authorizer type. Valid values are TOKEN
for a
Lambda function using a single authorization token submitted in a custom
header, REQUEST
for a Lambda function using incoming request
parameters, and COGNITO_USER_POOLS
for using an Amazon
Cognito user pool.
Parameter authType
:
Optional customer-defined field, used in OpenAPI imports and exports
without functional impact.
Parameter authorizerCredentials
:
Specifies the required credentials as an IAM role for API Gateway to
invoke the authorizer. To specify an IAM role for API Gateway to assume,
use the role's Amazon Resource Name (ARN). To use resource-based
permissions on the Lambda function, specify null.
Parameter authorizerResultTtlInSeconds
:
The TTL in seconds of cached authorizer results. If it equals 0,
authorization caching is disabled. If it is greater than 0, API Gateway
will cache authorizer responses. If this field is not set, the default
value is 300. The maximum value is 3600, or 1 hour.
Parameter authorizerUri
:
Specifies the authorizer's Uniform Resource Identifier (URI). For
TOKEN
or REQUEST
authorizers, this must be a
well-formed Lambda function URI, for example,
arn:aws:apigateway:us-west-2:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-2:{account_id}:function:{lambda_function_name}/invocations
.
In general, the URI has this form
arn:aws:apigateway:{region}:lambda:path/{service_api}
, where
{region}
is the same as the region hosting the Lambda
function, path
indicates that the remaining substring in the
URI should be treated as the path to the resource, including the initial
/
. For Lambda functions, this is usually of the form
/2015-03-31/functions/
.FunctionARN
/invocations
Parameter identitySource
:
The identity source for which authorization is requested.
- For a
TOKEN
orCOGNITO_USER_POOLS
authorizer, this is required and specifies the request header mapping expression for the custom header holding the authorization token submitted by the client. For example, if the token header name isAuth
, the header mapping expression ismethod.request.header.Auth
. - For the
REQUEST
authorizer, this is required when authorization caching is enabled. The value is a comma-separated string of one or more mapping expressions of the specified request parameters. For example, if anAuth
header, aName
query string parameter are defined as identity sources, this value ismethod.request.header.Auth, method.request.querystring.Name
. These parameters will be used to derive the authorization caching key and to perform runtime validation of theREQUEST
authorizer by verifying all of the identity-related request parameters are present, not null and non-empty. Only when this is true does the authorizer invoke the authorizer Lambda function, otherwise, it returns a 401 Unauthorized response without calling the Lambda function. The valid value is a string of comma-separated mapping expressions of the specified request parameters. When the authorization caching is not enabled, this property is optional.
Parameter identityValidationExpression
:
A validation expression for the incoming identity token. For
TOKEN
authorizers, this value is a regular expression. For
COGNITO_USER_POOLS
authorizers, API Gateway will match the
aud
field of the incoming token from the client against the
specified regular expression. It will invoke the authorizer's Lambda
function when there is a match. Otherwise, it will return a 401
Unauthorized response without calling the Lambda function. The validation
expression does not apply to the REQUEST
authorizer.
Parameter providerARNs
:
A list of the Amazon Cognito user pool ARNs for the
COGNITO_USER_POOLS
authorizer. Each element is of this
format:
arn:aws:cognito-idp:{region}:{account_id}:userpool/{user_pool_id}
.
For a TOKEN
or REQUEST
authorizer, this is not
defined.
Implementation
Future<Authorizer> createAuthorizer({
required String name,
required String restApiId,
required AuthorizerType type,
String? authType,
String? authorizerCredentials,
int? authorizerResultTtlInSeconds,
String? authorizerUri,
String? identitySource,
String? identityValidationExpression,
List<String>? providerARNs,
}) async {
ArgumentError.checkNotNull(name, 'name');
ArgumentError.checkNotNull(restApiId, 'restApiId');
ArgumentError.checkNotNull(type, 'type');
final $payload = <String, dynamic>{
'name': name,
'type': type.toValue(),
if (authType != null) 'authType': authType,
if (authorizerCredentials != null)
'authorizerCredentials': authorizerCredentials,
if (authorizerResultTtlInSeconds != null)
'authorizerResultTtlInSeconds': authorizerResultTtlInSeconds,
if (authorizerUri != null) 'authorizerUri': authorizerUri,
if (identitySource != null) 'identitySource': identitySource,
if (identityValidationExpression != null)
'identityValidationExpression': identityValidationExpression,
if (providerARNs != null) 'providerARNs': providerARNs,
};
final response = await _protocol.send(
payload: $payload,
method: 'POST',
requestUri: '/restapis/${Uri.encodeComponent(restApiId)}/authorizers',
exceptionFnMap: _exceptionFns,
);
return Authorizer.fromJson(response);
}