Versions in this module Expand all Collapse all v0 v0.3.4 Aug 12, 2022 v0.3.3 Jun 8, 2022 v0.3.2 May 11, 2022 v0.3.1 Apr 25, 2022 v0.3.0 Apr 15, 2022 v0.2.6 Aug 26, 2022 v0.2.5 May 11, 2022 v0.2.4 Mar 29, 2022 v0.2.3 Mar 29, 2022 v0.2.2 Mar 29, 2022 v0.2.1 Mar 29, 2022 v0.2.0 Mar 23, 2022 v0.1.1 Mar 29, 2022 v0.1.0 Mar 21, 2022 Changes in this version + const ClaimName + const ClaimPrefix + const ClaimUserinfo + const ClientID + const ClientSecret + const ConfigURL + const EnvIdentityOpenIDClaimName + const EnvIdentityOpenIDClaimPrefix + const EnvIdentityOpenIDClaimUserInfo + const EnvIdentityOpenIDClientID + const EnvIdentityOpenIDClientSecret + const EnvIdentityOpenIDKeyCloakAdminURL + const EnvIdentityOpenIDKeyCloakRealm + const EnvIdentityOpenIDRedirectURI + const EnvIdentityOpenIDRedirectURIDynamic + const EnvIdentityOpenIDRolePolicy + const EnvIdentityOpenIDScopes + const EnvIdentityOpenIDURL + const EnvIdentityOpenIDVendor + const JwksURL + const KeyCloakAdminURL + const KeyCloakRealm + const RedirectURI + const RedirectURIDynamic + const RolePolicy + const Scopes + const Vendor + var DefaultKVS = config.KVS + var ErrTokenExpired = errors.New("token expired") + var Help = config.HelpKVS + var SigningMethodES3256 *jwt.SigningMethodECDSA + var SigningMethodES3384 *jwt.SigningMethodECDSA + var SigningMethodES3512 *jwt.SigningMethodECDSA + var SigningMethodRS3256 *jwt.SigningMethodRSA + var SigningMethodRS3384 *jwt.SigningMethodRSA + var SigningMethodRS3512 *jwt.SigningMethodRSA + func Enabled(kvs config.KVS) bool + func GetDefaultExpiration(dsecs string) (time.Duration, error) + type Config struct + ClaimName string + ClaimPrefix string + ClaimUserinfo bool + ClientID string + ClientSecret string + DiscoveryDoc DiscoveryDoc + Enabled bool + JWKS struct{ ... } + RedirectURI string + RedirectURIDynamic bool + RolePolicy string + URL *xnet.URL + func LookupConfig(kvs config.KVS, transport *http.Transport, closeRespFn func(io.ReadCloser), ...) (c Config, err error) + func (Config) ID() ID + func (r *Config) GetSettings() madmin.OpenIDSettings + func (r *Config) InitializeKeycloakProvider(adminURL, realm string) error + func (r *Config) InitializeProvider(kvs config.KVS) error + func (r *Config) PopulatePublicKey() error + func (r *Config) UnmarshalJSON(data []byte) error + func (r *Config) UserInfo(accessToken string) (map[string]interface{}, error) + func (r *Config) Validate(token, accessToken, dsecs string) (map[string]interface{}, error) + func (r Config) GetRoleInfo() (arn.ARN, string, bool) + func (r Config) LookupUser(userid string) (provider.User, error) + func (r Config) ProviderEnabled() bool + type DiscoveryDoc struct + AuthEndpoint string + ClaimsSupported []string + CodeChallengeMethodsSupported []string + IDTokenSigningAlgValuesSupported []string + Issuer string + JwksURI string + ResponseTypesSupported []string + RevocationEndpoint string + ScopesSupported []string + SubjectTypesSupported []string + TokenEndpoint string + TokenEndpointAuthMethods []string + UserInfoEndpoint string + type ID string + type JWKS struct + Alg string + Crv string + D string + E string + K string + Keys []*JWKS + Kid string + Kty string + N string + Use string + X string + Y string + func (key *JWKS) DecodePublicKey() (crypto.PublicKey, error) + type Validator interface + ID func() ID + Validate func(idToken, accessToken, duration string) (map[string]interface{}, error) + type Validators struct + func NewValidators() *Validators + func (list *Validators) Add(provider Validator) error + func (list *Validators) Get(id ID) (p Validator, err error) + func (list *Validators) List() []ID