Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type Asset ¶
type Asset struct {
Path string `yaml:"asset" env:"IDP_ASSET_PATH"`
}
Asset defines the available asset configuration.
type Config ¶
type Config struct { *shared.Commons `yaml:"-"` Service Service `yaml:"-"` Tracing *Tracing `yaml:"tracing"` Log *Log `yaml:"log"` Debug Debug `yaml:"debug"` HTTP HTTP `yaml:"http"` Asset Asset `yaml:"asset"` IDP Settings `yaml:"idp"` Ldap Ldap `yaml:"ldap"` Context context.Context `yaml:"-"` }
Config combines all available configuration parts.
type Debug ¶
type Debug struct { Addr string `yaml:"addr" env:"IDP_DEBUG_ADDR"` Token string `yaml:"token" env:"IDP_DEBUG_TOKEN"` Pprof bool `yaml:"pprof" env:"IDP_DEBUG_PPROF"` Zpages bool `yaml:"zpages" env:"IDP_DEBUG_ZPAGES"` }
Debug defines the available debug configuration.
type HTTP ¶
type HTTP struct { Addr string `yaml:"addr" env:"IDP_HTTP_ADDR"` Root string `yaml:"root" env:"IDP_HTTP_ROOT"` Namespace string `yaml:"-"` TLSCert string `yaml:"tls_cert" env:"IDP_TRANSPORT_TLS_CERT"` TLSKey string `yaml:"tls_key" env:"IDP_TRANSPORT_TLS_KEY"` TLS bool `yaml:"tls" env:"IDP_TLS"` }
HTTP defines the available http configuration.
type Ldap ¶
type Ldap struct { URI string `yaml:"uri" env:"LDAP_URI;IDP_LDAP_URI"` BindDN string `yaml:"bind_dn" env:"LDAP_BIND_DN;IDP_LDAP_BIND_DN"` BindPassword string `yaml:"bind_password" env:"LDAP_BIND_PASSWORD;IDP_LDAP_BIND_PASSWORD"` BaseDN string `yaml:"base_dn" env:"LDAP_USER_BASE_DN,IDP_LDAP_BASE_DN"` Scope string `yaml:"scope" env:"LDAP_USER_SCOPE;IDP_LDAP_SCOPE"` LoginAttribute string `yaml:"login_attribute" env:"IDP_LDAP_LOGIN_ATTRIBUTE"` EmailAttribute string `yaml:"email_attribute" env:"LDAP_USER_SCHEMA_MAIL;IDP_LDAP_EMAIL_ATTRIBUTE"` NameAttribute string `yaml:"name_attribute" env:"LDAP_USER_SCHEMA_USERNAME;IDP_LDAP_NAME_ATTRIBUTE"` UUIDAttribute string `yaml:"uuid_attribute" env:"LDAP_USER_SCHEMA_ID;IDP_LDAP_UUID_ATTRIBUTE"` UUIDAttributeType string `yaml:"uuid_attribute_type" env:"IDP_LDAP_UUID_ATTRIBUTE_TYPE"` Filter string `yaml:"filter" env:"LDAP_USER_FILTER;IDP_LDAP_FILTER"` ObjectClass string `yaml:"objectclass" env:"LDAP_USER_OBJECTCLASS;IDP_LDAP_OBJECTCLASS"` }
Ldap defines the available LDAP configuration.
type Log ¶
type Log struct { Level string `yaml:"level" env:"OCIS_LOG_LEVEL;IDP_LOG_LEVEL"` Pretty bool `yaml:"pretty" env:"OCIS_LOG_PRETTY;IDP_LOG_PRETTY"` Color bool `yaml:"color" env:"OCIS_LOG_COLOR;IDP_LOG_COLOR"` File string `yaml:"file" env:"OCIS_LOG_FILE;IDP_LOG_FILE"` }
Log defines the available log configuration.
type Service ¶
type Service struct { Name string `yaml:"-"` PasswordResetURI string `yaml:"password_reset_uri" env:"IDP_PASSWORD_RESET_URI" desc:"The URI where a user can reset their password."` }
Service defines the available service configuration.
type Settings ¶ added in v1.16.0
type Settings struct { Iss string `yaml:"iss" env:"OCIS_URL;IDP_ISS"` IdentityManager string `yaml:"identity_manager" env:"IDP_IDENTITY_MANAGER"` URIBasePath string `yaml:"uri_base_path" env:"IDP_URI_BASE_PATH"` SignInURI string `yaml:"sign_in_uri" env:"IDP_SIGN_IN_URI"` SignedOutURI string `yaml:"signed_out_uri" env:"IDP_SIGN_OUT_URI"` AuthorizationEndpointURI string `yaml:"authorization_endpoint_uri" env:"IDP_ENDPOINT_URI"` EndsessionEndpointURI string `yaml:"end_session_endpoint_uri" env:"IDP_ENDSESSION_ENDPOINT_URI"` Insecure bool `yaml:"insecure" env:"IDP_INSECURE"` TrustedProxy []string `yaml:"trusted_proxy"` //TODO: how to configure this via env? AllowScope []string `yaml:"allow_scope"` // TODO: is this even needed? AllowClientGuests bool `yaml:"allow_client_guests" env:"IDP_ALLOW_CLIENT_GUESTS"` AllowDynamicClientRegistration bool `yaml:"allow_dynamic_client_registration" env:"IDP_ALLOW_DYNAMIC_CLIENT_REGISTRATION"` EncryptionSecretFile string `yaml:"encrypt_secret_file" env:"IDP_ENCRYPTION_SECRET"` Listen string IdentifierClientDisabled bool `yaml:"identifier_client_disabled" env:"IDP_DISABLE_IDENTIFIER_WEBAPP"` IdentifierClientPath string `yaml:"identifier_client_path" env:"IDP_IDENTIFIER_CLIENT_PATH"` IdentifierRegistrationConf string `yaml:"identifier_registration_conf" env:"IDP_IDENTIFIER_REGISTRATION_CONF"` IdentifierScopesConf string `yaml:"identifier_scopes_conf" env:"IDP_IDENTIFIER_SCOPES_CONF"` IdentifierDefaultBannerLogo string IdentifierDefaultSignInPageText string IdentifierDefaultUsernameHintText string IdentifierUILocales []string SigningKid string `yaml:"signing_kid" env:"IDP_SIGNING_KID"` SigningMethod string `yaml:"signing_method" env:"IDP_SIGNING_METHOD"` SigningPrivateKeyFiles []string `yaml:"signing_private_key_files"` // TODO: is this even needed? ValidationKeysPath string `yaml:"validation_keys_path" env:"IDP_VALIDATION_KEYS_PATH"` CookieBackendURI string CookieNames []string AccessTokenDurationSeconds uint64 `yaml:"access_token_duration_seconds" env:"IDP_ACCESS_TOKEN_EXPIRATION"` IDTokenDurationSeconds uint64 `yaml:"id_token_duration_seconds" env:"IDP_ID_TOKEN_EXPIRATION"` RefreshTokenDurationSeconds uint64 `yaml:"refresh_token_duration_seconds" env:"IDP_REFRESH_TOKEN_EXPIRATION"` DyamicClientSecretDurationSeconds uint64 `yaml:"dynamic_client_secret_duration_seconds" env:""` }
type Tracing ¶
type Tracing struct { Enabled bool `yaml:"enabled" env:"OCIS_TRACING_ENABLED;IDP_TRACING_ENABLED"` Type string `yaml:"type" env:"OCIS_TRACING_TYPE;IDP_TRACING_TYPE"` Endpoint string `yaml:"endpoint" env:"OCIS_TRACING_ENDPOINT;IDP_TRACING_ENDPOINT"` Collector string `yaml:"collector" env:"OCIS_TRACING_COLLECTOR;IDP_TRACING_COLLECTOR"` }
Tracing defines the available tracing configuration.
Click to show internal directories.
Click to hide internal directories.