Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for initializeProvider (0.25 sec)

  1. internal/config/identity/openid/providercfg.go

    		RolePolicy:         getCfgVal(RolePolicy),
    	}
    }
    
    const (
    	keyCloakVendor = "keycloak"
    )
    
    // initializeProvider initializes if any additional vendor specific information
    // was provided, initialization will return an error initial login fails.
    func (p *providerCfg) initializeProvider(cfgGet func(string) string, transport http.RoundTripper) error {
    	vendor := cfgGet(Vendor)
    	if vendor == "" {
    		return nil
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  2. internal/config/identity/openid/jwt_test.go

    	cfgGet := func(param string) string {
    		return testKvs.Get(param)
    	}
    
    	if testConfig.provider != nil {
    		t.Errorf("Empty config cannot have any provider!")
    	}
    
    	if err := testConfig.initializeProvider(cfgGet, http.DefaultTransport); err != nil {
    		t.Error(err)
    	}
    
    	if testConfig.provider == nil {
    		t.Errorf("keycloak provider must be initialized!")
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. internal/config/identity/openid/openid.go

    			}
    
    			c.roleArnPolicyMap[p.roleArn] = p.RolePolicy
    		} else if p.ClaimName == "" {
    			return c, config.Errorf("A role policy or claim name must be specified")
    		}
    
    		if err = p.initializeProvider(getCfgVal, c.transport); err != nil {
    			return c, err
    		}
    
    		arnKey := p.roleArn
    		if p.RolePolicy == "" {
    			arnKey = DummyRoleARN
    			// Ensure that at most one JWT policy claim based provider may be
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 10 20:16:44 UTC 2024
    - 16.6K bytes
    - Viewed (0)
Back to top