Documentation
¶
Index ¶
Constants ¶
View Source
const ( SessionCookieName string = "__thor_session" SessionCookieNameSSO string = "__thor_sso_session" )
View Source
const DataDir string = "/data/thor"
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Config ¶
type Config struct { TLS *TlsConfig `yaml:"tls"` Vault *VaultConfig `yaml:"vault"` Loki *LokiConfig `yaml:"loki"` Ldap *LdapConfig `yaml:"ldap"` Saml *SamlConfig `yaml:"saml"` Admin *Admin `yaml:"admin"` Agent *Agent `yaml:"agent"` Configured bool `yaml:"configured"` TrustedInbound []string `yaml:"trustedInbound"` AdminOTP *otp.Key `yaml:"-"` // contains filtered or unexported fields }
type LdapConfig ¶
type LdapConfig struct { Server string `yaml:"server"` Port int `yaml:"port"` BindAccount string `yaml:"bindAccount"` Password string `yaml:"password"` BaseDN string `yaml:"baseDn"` FilterDN string `yaml:"filterDn"` }
func (*LdapConfig) Configure ¶
func (ldap *LdapConfig) Configure()
type LokiConfig ¶
type LokiConfig struct { Server string `yaml:"server"` Port int `yaml:"port"` Username string `yaml:"username"` Password string `yaml:"password"` }
func (*LokiConfig) Configure ¶
func (loki *LokiConfig) Configure()
type SamlConfig ¶
type SamlConfig struct { IDPMetadata string `yaml:"idpMetadata"` PrivateKey []byte `yaml:"privateKey"` Certificate []byte `yaml:"certificate"` SamlSP *samlsp.Middleware `yaml:"-"` }
func (*SamlConfig) Configure ¶
func (s *SamlConfig) Configure(hostname string) error
type VaultConfig ¶
type VaultConfig struct { Address string `yaml:"address"` AppRole *struct { RoleId string `yaml:"roleId"` SecretId string `yaml:"secretId"` ResponseWrapped bool `yaml:"wrapped"` InitialisationToken string `yaml:"InitialisationToken"` } `yaml:"appRole,omitempty"` AzureRole *struct { RoleName string `yaml:"role"` } `yaml:"azureRole,omitempty"` AwsRole *struct { RoleName string `yaml:"role"` } `yaml:"awsRole,omitempty"` Namespace string `yaml:"namespace"` SecureTokenPath string `yaml:"securePath"` EncryptionKey string `yaml:"encryptionkey"` PasswordPolicy *Policy `yaml:"passwordPolicy"` // // Replaceable is a list of keys likely to be found under // a given vault path whose value can/should be replaced by // automation. // // This is only relevant to an Ex-Employee search type. Replaceable []string `yaml:"replaceableKeys"` VaultConfig *vault.Config `yaml:"-"` TokenPolicy *Policy `yaml:"-"` }
func (*VaultConfig) Configure ¶
func (c *VaultConfig) Configure()
Click to show internal directories.
Click to hide internal directories.