Documentation ¶
Index ¶
- func RegisterConnector(connector *Connector)
- func WireConnectors(group *flags.Group)
- func WireTeamConnectors(group *flags.Group)
- type AuthFlags
- type AuthTeamFlags
- type BitbucketCloudFlags
- type BitbucketCloudTeamFlags
- type CFFlags
- type CFTeamFlags
- type Config
- type Connector
- type GithubFlags
- type GithubTeamFlags
- type GitlabFlags
- type GitlabTeamFlags
- type LDAPFlags
- type LDAPTeamFlags
- type MicrosoftFlags
- type MicrosoftTeamFlags
- type OAuthFlags
- type OAuthTeamFlags
- type OIDCFlags
- type OIDCTeamFlags
- type TeamConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func RegisterConnector ¶
func RegisterConnector(connector *Connector)
func WireConnectors ¶
func WireTeamConnectors ¶
Types ¶
type AuthFlags ¶
type AuthFlags struct { SecureCookies bool `long:"cookie-secure" description:"Force sending secure flag on http cookies"` Expiration time.Duration `` /* 135-byte string literal not displayed */ SigningKey *flag.PrivateKey `long:"session-signing-key" required:"true" description:"File containing an RSA private key, used to sign auth tokens."` LocalUsers map[string]string `` /* 204-byte string literal not displayed */ Clients map[string]string `long:"add-client" description:"List of client_id:client_secret combinations" value-name:"CLIENT_ID:CLIENT_SECRET"` }
type AuthTeamFlags ¶
type BitbucketCloudFlags ¶
type BitbucketCloudFlags struct { ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` }
func (*BitbucketCloudFlags) Name ¶
func (flag *BitbucketCloudFlags) Name() string
func (*BitbucketCloudFlags) Serialize ¶
func (flag *BitbucketCloudFlags) Serialize(redirectURI string) ([]byte, error)
func (*BitbucketCloudFlags) Validate ¶
func (flag *BitbucketCloudFlags) Validate() error
type BitbucketCloudTeamFlags ¶
type BitbucketCloudTeamFlags struct { Users []string `long:"user" description:"A whitelisted Bitbucket Cloud user" value-name:"USERNAME"` Teams []string `long:"team" description:"A whitelisted Bitbucket Cloud team" value-name:"TEAM_NAME"` }
func (*BitbucketCloudTeamFlags) GetGroups ¶
func (flag *BitbucketCloudTeamFlags) GetGroups() []string
func (*BitbucketCloudTeamFlags) GetUsers ¶
func (flag *BitbucketCloudTeamFlags) GetUsers() []string
type CFFlags ¶
type CFFlags struct { ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` APIURL string `` /* 167-byte string literal not displayed */ CACerts []flag.File `long:"ca-cert" description:"CA Certificate"` InsecureSkipVerify bool `long:"skip-ssl-validation" description:"Skip SSL validation"` }
type CFTeamFlags ¶
type CFTeamFlags struct { Users []string `long:"user" description:"A whitelisted CloudFoundry user" value-name:"USERNAME"` Orgs []string `long:"org" description:"A whitelisted CloudFoundry org" value-name:"ORG_NAME"` Spaces []string `` /* 141-byte string literal not displayed */ SpacesAll []string `` /* 166-byte string literal not displayed */ SpacesDeveloper []string `` /* 190-byte string literal not displayed */ SpacesAuditor []string `` /* 184-byte string literal not displayed */ SpacesManager []string `` /* 184-byte string literal not displayed */ SpaceGuids []string `long:"space-guid" description:"A whitelisted CloudFoundry space guid" value-name:"SPACE_GUID" mapstructure:"space_guids"` SpaceGuidsLegacy []string `mapstructure:"spaceguids"` }
func (*CFTeamFlags) GetGroups ¶
func (flag *CFTeamFlags) GetGroups() []string
func (*CFTeamFlags) GetUsers ¶
func (flag *CFTeamFlags) GetUsers() []string
type Connector ¶
type Connector struct {
// contains filtered or unexported fields
}
func GetConnectors ¶
func GetConnectors() []*Connector
type GithubFlags ¶
type GithubFlags struct { ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` Host string `long:"host" description:"Hostname of GitHub Enterprise deployment (No scheme, No trailing slash)"` CACert flag.File `long:"ca-cert" description:"CA certificate of GitHub Enterprise deployment"` }
func (*GithubFlags) Name ¶
func (flag *GithubFlags) Name() string
func (*GithubFlags) Serialize ¶
func (flag *GithubFlags) Serialize(redirectURI string) ([]byte, error)
func (*GithubFlags) Validate ¶
func (flag *GithubFlags) Validate() error
type GithubTeamFlags ¶
type GithubTeamFlags struct { Users []string `long:"user" description:"A whitelisted GitHub user" value-name:"USERNAME"` Orgs []string `long:"org" description:"A whitelisted GitHub org" value-name:"ORG_NAME"` Teams []string `long:"team" description:"A whitelisted GitHub team" value-name:"ORG_NAME:TEAM_NAME"` }
func (*GithubTeamFlags) GetGroups ¶
func (flag *GithubTeamFlags) GetGroups() []string
func (*GithubTeamFlags) GetUsers ¶
func (flag *GithubTeamFlags) GetUsers() []string
type GitlabFlags ¶
type GitlabFlags struct { ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` Host string `long:"host" description:"Hostname of Gitlab Enterprise deployment (Include scheme, No trailing slash)"` }
func (*GitlabFlags) Name ¶
func (flag *GitlabFlags) Name() string
func (*GitlabFlags) Serialize ¶
func (flag *GitlabFlags) Serialize(redirectURI string) ([]byte, error)
func (*GitlabFlags) Validate ¶
func (flag *GitlabFlags) Validate() error
type GitlabTeamFlags ¶
type GitlabTeamFlags struct { Users []string `long:"user" description:"A whitelisted GitLab user" value-name:"USERNAME"` Groups []string `long:"group" description:"A whitelisted GitLab group" value-name:"GROUP_NAME"` }
func (*GitlabTeamFlags) GetGroups ¶
func (flag *GitlabTeamFlags) GetGroups() []string
func (*GitlabTeamFlags) GetUsers ¶
func (flag *GitlabTeamFlags) GetUsers() []string
type LDAPFlags ¶
type LDAPFlags struct { DisplayName string `long:"display-name" description:"The auth provider name displayed to users on the login page"` Host string `` /* 170-byte string literal not displayed */ BindDN string `long:"bind-dn" description:"(Required) Bind DN for searching LDAP users and groups. Typically this is a read-only user."` BindPW string `long:"bind-pw" description:"(Required) Bind Password for the user specified by 'bind-dn'"` InsecureNoSSL bool `long:"insecure-no-ssl" description:"Required if LDAP host does not use TLS."` InsecureSkipVerify bool `long:"insecure-skip-verify" description:"Skip certificate verification"` StartTLS bool `long:"start-tls" description:"Start on insecure port, then negotiate TLS"` CACert flag.File `long:"ca-cert" description:"CA certificate"` UserSearch struct { BaseDN string `long:"user-search-base-dn" description:"BaseDN to start the search from. For example 'cn=users,dc=example,dc=com'"` Filter string `` /* 129-byte string literal not displayed */ Username string `` /* 176-byte string literal not displayed */ Scope string `` /* 140-byte string literal not displayed */ IDAttr string `long:"user-search-id-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'uid'."` EmailAttr string `long:"user-search-email-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'mail'."` NameAttr string `long:"user-search-name-attr" description:"A mapping of attributes on the user entry to claims."` } GroupSearch struct { BaseDN string `long:"group-search-base-dn" description:"BaseDN to start the search from. For example 'cn=groups,dc=example,dc=com'"` Filter string `` /* 134-byte string literal not displayed */ Scope string `` /* 141-byte string literal not displayed */ UserAttr string `` /* 217-byte string literal not displayed */ GroupAttr string `` /* 218-byte string literal not displayed */ NameAttr string `long:"group-search-name-attr" description:"The attribute of the group that represents its name."` } }
type LDAPTeamFlags ¶
type LDAPTeamFlags struct { Users []string `json:"users" long:"user" description:"A whitelisted LDAP user" value-name:"USERNAME"` Groups []string `json:"groups" long:"group" description:"A whitelisted LDAP group" value-name:"GROUP_NAME"` }
func (*LDAPTeamFlags) GetGroups ¶
func (flag *LDAPTeamFlags) GetGroups() []string
func (*LDAPTeamFlags) GetUsers ¶
func (flag *LDAPTeamFlags) GetUsers() []string
type MicrosoftFlags ¶
type MicrosoftFlags struct { ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` Tenant string `long:"tenant" description:"Microsoft Tenant limitation (common, consumers, organizations, tenant name or tenant uuid)"` Groups []string `long:"groups" description:"Allowed Active Directory Groups"` OnlySecurityGroups bool `long:"only-security-groups" description:"Only fetch security groups"` }
func (*MicrosoftFlags) Name ¶
func (flag *MicrosoftFlags) Name() string
func (*MicrosoftFlags) Serialize ¶
func (flag *MicrosoftFlags) Serialize(redirectURI string) ([]byte, error)
func (*MicrosoftFlags) Validate ¶
func (flag *MicrosoftFlags) Validate() error
type MicrosoftTeamFlags ¶
type MicrosoftTeamFlags struct { Users []string `long:"user" description:"A whitelisted Microsoft user" value-name:"USERNAME"` Groups []string `long:"group" description:"A whitelisted Microsoft group" value-name:"GROUP_NAME"` }
func (*MicrosoftTeamFlags) GetGroups ¶
func (flag *MicrosoftTeamFlags) GetGroups() []string
func (*MicrosoftTeamFlags) GetUsers ¶
func (flag *MicrosoftTeamFlags) GetUsers() []string
type OAuthFlags ¶
type OAuthFlags struct { DisplayName string `long:"display-name" description:"The auth provider name displayed to users on the login page"` ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` AuthURL string `long:"auth-url" description:"(Required) Authorization URL"` TokenURL string `long:"token-url" description:"(Required) Token URL"` UserInfoURL string `long:"userinfo-url" description:"(Required) UserInfo URL"` Scopes []string `long:"scope" description:"Any additional scopes that need to be requested during authorization"` GroupsKey string `` /* 135-byte string literal not displayed */ UserIDKey string `` /* 146-byte string literal not displayed */ UserNameKey string `` /* 156-byte string literal not displayed */ CACerts []flag.File `long:"ca-cert" description:"CA Certificate"` InsecureSkipVerify bool `long:"skip-ssl-validation" description:"Skip SSL validation"` }
func (*OAuthFlags) Name ¶
func (flag *OAuthFlags) Name() string
func (*OAuthFlags) Serialize ¶
func (flag *OAuthFlags) Serialize(redirectURI string) ([]byte, error)
func (*OAuthFlags) Validate ¶
func (flag *OAuthFlags) Validate() error
type OAuthTeamFlags ¶
type OAuthTeamFlags struct { Users []string `json:"users" long:"user" description:"A whitelisted OAuth2 user" value-name:"USERNAME"` Groups []string `json:"groups" long:"group" description:"A whitelisted OAuth2 group" value-name:"GROUP_NAME"` }
func (*OAuthTeamFlags) GetGroups ¶
func (flag *OAuthTeamFlags) GetGroups() []string
func (*OAuthTeamFlags) GetUsers ¶
func (flag *OAuthTeamFlags) GetUsers() []string
type OIDCFlags ¶
type OIDCFlags struct { DisplayName string `long:"display-name" description:"The auth provider name displayed to users on the login page"` Issuer string `` /* 153-byte string literal not displayed */ ClientID string `long:"client-id" description:"(Required) Client id"` ClientSecret string `long:"client-secret" description:"(Required) Client secret"` Scopes []string `long:"scope" description:"Any additional scopes that need to be requested during authorization"` GroupsKey string `` /* 135-byte string literal not displayed */ UserNameKey string `` /* 155-byte string literal not displayed */ HostedDomains []string `` /* 140-byte string literal not displayed */ CACerts []flag.File `long:"ca-cert" description:"CA Certificate"` InsecureSkipVerify bool `long:"skip-ssl-validation" description:"Skip SSL validation"` }
type OIDCTeamFlags ¶
type OIDCTeamFlags struct { Users []string `json:"users" long:"user" description:"A whitelisted OIDC user" value-name:"USERNAME"` Groups []string `json:"groups" long:"group" description:"A whitelisted OIDC group" value-name:"GROUP_NAME"` }
func (*OIDCTeamFlags) GetGroups ¶
func (flag *OIDCTeamFlags) GetGroups() []string
func (*OIDCTeamFlags) GetUsers ¶
func (flag *OIDCTeamFlags) GetUsers() []string
type TeamConfig ¶
Click to show internal directories.
Click to hide internal directories.