Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var Authorize = actualAuthorize
We do this to bypass needing actual OIDC tokens for unit testing.
Functions ¶
This section is empty.
Types ¶
type Issuer ¶
type Issuer interface { // Match checks if this issuer can authenticate tokens from a given issuer URL Match(ctx context.Context, url string) bool // Authenticate ID token and return Principal on success. The ID token's signature // is verified in the call -- invalid signature must result in an error. Authenticate(ctx context.Context, token string, opts ...config.InsecureOIDCConfigOption) (Principal, error) }
type IssuerPool ¶
type IssuerPool []Issuer
func (IssuerPool) Authenticate ¶
func (p IssuerPool) Authenticate(ctx context.Context, token string, opts ...config.InsecureOIDCConfigOption) (Principal, error)
type Principal ¶
type Principal interface { // Name is the email or subject of OIDC ID token. This value must match the // value signed in the proof of private key possession challenge. Name(ctx context.Context) string // Embed all SubjectAltName and custom x509 extension information into // certificate. Embed(ctx context.Context, cert *x509.Certificate) error }
Click to show internal directories.
Click to hide internal directories.