- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for initializeProvider (0.1 sec)
-
internal/config/identity/openid/providercfg.go
RolePolicy: getCfgVal(RolePolicy), } } const ( keyCloakVendor = "keycloak" ) // initializeProvider initializes if any additional vendor specific information // was provided, initialization will return an error initial login fails. func (p *providerCfg) initializeProvider(cfgGet func(string) string, transport http.RoundTripper) error { vendor := cfgGet(Vendor) if vendor == "" { return nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
cfgGet := func(param string) string { return testKvs.Get(param) } if testConfig.provider != nil { t.Errorf("Empty config cannot have any provider!") } if err := testConfig.initializeProvider(cfgGet, http.DefaultTransport); err != nil { t.Error(err) } if testConfig.provider == nil { t.Errorf("keycloak provider must be initialized!") }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.3K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
} c.roleArnPolicyMap[p.roleArn] = p.RolePolicy } else if p.ClaimName == "" { return c, config.Errorf("A role policy or claim name must be specified") } if err = p.initializeProvider(getCfgVal, c.transport); err != nil { return c, err } arnKey := p.roleArn if p.RolePolicy == "" { arnKey = DummyRoleARN // Ensure that at most one JWT policy claim based provider may be
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0)