Versions in this module Expand all Collapse all v1 v1.0.2 May 13, 2022 Changes in this version + const ClaimName + const ClaimPrefix + const ClaimUserinfo + const ClientID + const ClientSecret + const ConfigURL + const EnvIdentityOpenIDClaimName + const EnvIdentityOpenIDClaimPrefix + const EnvIdentityOpenIDClaimUserInfo + const EnvIdentityOpenIDClientID + const EnvIdentityOpenIDClientSecret + const EnvIdentityOpenIDKeyCloakAdminURL + const EnvIdentityOpenIDKeyCloakRealm + const EnvIdentityOpenIDRedirectURI + const EnvIdentityOpenIDRedirectURIDynamic + const EnvIdentityOpenIDRolePolicy + const EnvIdentityOpenIDScopes + const EnvIdentityOpenIDURL + const EnvIdentityOpenIDVendor + const JwksURL + const KeyCloakAdminURL + const KeyCloakRealm + const RedirectURI + const RedirectURIDynamic + const RolePolicy + const Scopes + const Vendor + var DefaultKVS = config.KVS + var ErrTokenExpired = errors.New("token expired") + var Help = config.HelpKVS + var SigningMethodES3256 *jwt.SigningMethodECDSA + var SigningMethodES3384 *jwt.SigningMethodECDSA + var SigningMethodES3512 *jwt.SigningMethodECDSA + var SigningMethodRS3256 *jwt.SigningMethodRSA + var SigningMethodRS3384 *jwt.SigningMethodRSA + var SigningMethodRS3512 *jwt.SigningMethodRSA + func Enabled(kvs config.KVS) bool + func GetDefaultExpiration(dsecs string) (time.Duration, error) + type Config struct + ClaimName string + ClaimPrefix string + ClaimUserinfo bool + ClientID string + ClientSecret string + DiscoveryDoc DiscoveryDoc + Enabled bool + JWKS struct{ ... } + RedirectURI string + RedirectURIDynamic bool + RolePolicy string + URL *xnet.URL + func LookupConfig(kvs config.KVS, transport *http.Transport, closeRespFn func(io.ReadCloser), ...) (c Config, err error) + func (Config) ID() ID + func (r *Config) GetSettings() madmin.OpenIDSettings + func (r *Config) InitializeKeycloakProvider(adminURL, realm string) error + func (r *Config) PopulatePublicKey() error + func (r *Config) UnmarshalJSON(data []byte) error + func (r *Config) UserInfo(accessToken string) (map[string]interface{}, error) + func (r *Config) Validate(token, accessToken, dsecs string) (map[string]interface{}, error) + func (r Config) GetRoleInfo() (arn.ARN, string, bool) + func (r Config) InitializeProvider(kvs config.KVS) error + func (r Config) LookupUser(userid string) (provider.User, error) + func (r Config) ProviderEnabled() bool + type DiscoveryDoc struct + AuthEndpoint string + ClaimsSupported []string + CodeChallengeMethodsSupported []string + IDTokenSigningAlgValuesSupported []string + Issuer string + JwksURI string + ResponseTypesSupported []string + RevocationEndpoint string + ScopesSupported []string + SubjectTypesSupported []string + TokenEndpoint string + TokenEndpointAuthMethods []string + UserInfoEndpoint string + type ID string + type JWKS struct + Alg string + Crv string + D string + E string + K string + Keys []*JWKS + Kid string + Kty string + N string + Use string + X string + Y string + func (key *JWKS) DecodePublicKey() (crypto.PublicKey, error) + type Validator interface + ID func() ID + Validate func(idToken, accessToken, duration string) (map[string]interface{}, error) + type Validators struct + func NewValidators() *Validators + func (list *Validators) Add(provider Validator) error + func (list *Validators) Get(id ID) (p Validator, err error) + func (list *Validators) List() []ID