Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type Config ¶
type Config struct { ExternalHostURL string KMSRegistry kmsRegistry CryptoJWTSigner cryptoJWTSigner DynamicWellKnownStore dynamicWellKnownStore }
type DynamicWellKnownStore ¶ added in v1.12.0
type DynamicWellKnownStore dynamicWellKnownStore
type JWTWellKnownOpenIDIssuerConfigurationClaims ¶
type JWTWellKnownOpenIDIssuerConfigurationClaims struct { *jwt.Claims *issuer.WellKnownOpenIDIssuerConfiguration }
JWTWellKnownOpenIDIssuerConfigurationClaims is JWT Claims extension by WellKnownOpenIDIssuerConfiguration.
type Service ¶
type Service struct {
// contains filtered or unexported fields
}
func NewService ¶
func (*Service) AddDynamicConfiguration ¶ added in v1.12.0
func (s *Service) AddDynamicConfiguration( ctx context.Context, profileID string, id string, credSupported *profileapi.CredentialsConfigurationSupported, ) error
func (*Service) GetOpenIDCredentialIssuerConfig ¶
func (s *Service) GetOpenIDCredentialIssuerConfig( issuerProfile *profileapi.Issuer) (*issuer.WellKnownOpenIDIssuerConfiguration, string, error)
GetOpenIDCredentialIssuerConfig returns issuer.WellKnownOpenIDIssuerConfiguration object, and it's JWT signed representation, if this feature is enabled for specific profile.
# Note, that if the Credential Issuer wants to enforce use of signed metadata, it omits the respective metadata parameters from the unsigned part of the Credential Issuer metadata. In this case, HTTP response should be:
{ "signed_metadata": "jwt_representation" }
Used for creating GET .well-known/openid-credential-issuer VCS IDP response.
Click to show internal directories.
Click to hide internal directories.