- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 217 for provider (0.23 sec)
-
internal/config/identity/openid/provider/provider.go
var ( ErrNotImplemented = errors.New("function not implemented") ErrAccessTokenExpired = errors.New("access_token expired or unauthorized") ) // Provider implements identity provider specific admin operations, such as // looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 2.7K bytes - Viewed (0) -
cmd/sts-handlers.go
} writeSuccessResponseXML(w, encodedSuccessResponse) } // AssumeRoleWithWebIdentity - implementation of AWS STS API supporting OAuth2.0 // users from web identity provider such as Facebook, Google, or any OpenID // Connect-compatible identity provider. // // Eg:- // // $ curl https://minio:9000/?Action=AssumeRoleWithWebIdentity&WebIdentityToken=<jwt>
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 18:36:18 GMT 2024 - 34.7K bytes - Viewed (2) -
internal/config/identity/openid/providercfg.go
switch vendor { case keyCloakVendor: adminURL := cfgGet(KeyCloakAdminURL) realm := cfgGet(KeyCloakRealm) p.provider, err = provider.KeyCloak( provider.WithAdminURL(adminURL), provider.WithOpenIDConfig(provider.DiscoveryDoc(p.DiscoveryDoc)), provider.WithTransport(transport), provider.WithRealm(realm), ) return err default: return fmt.Errorf("Unsupported vendor %s", keyCloakVendor) } }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
if err != nil { t.Fatal(err) } provider := providerCfg{} provider.JWKS.URL = u1 cfg := Config{ Enabled: true, pubKeys: pubKeys, arnProviderCfgsMap: map[arn.ARN]*providerCfg{ DummyRoleARN: &provider, }, ProviderCfgs: map[string]*providerCfg{ "1": &provider, }, } u, err := url.Parse("http://127.0.0.1:8443/?Token=invalid")
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.3K bytes - Viewed (0) -
cmd/utils.go
// isMaxPartNumber - Check if part ID is greater than the maximum allowed ID. func isMaxPartID(partID int) bool { return partID > globalMaxPartID } // profilerWrapper is created because pkg/profiler doesn't // provide any API to calculate the profiler file path in the // disk since the name of this latter is randomly generated. type profilerWrapper struct { // Profile recorded at start of benchmark. records map[string][]byte
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Wed Apr 24 04:08:47 GMT 2024 - 31.3K bytes - Viewed (0) -
cmd/admin-handlers-idp-config.go
ctx := r.Context() addOrUpdateIDPHandler(ctx, w, r, true) } // ListIdentityProviderCfg: // // GET <admin-prefix>/idp-cfg/openid -> lists openid provider configs. func (a adminAPIHandlers) ListIdentityProviderCfg(w http.ResponseWriter, r *http.Request) { ctx := r.Context() objectAPI, cred := validateAdminReq(ctx, w, r, policy.ConfigUpdateAdminAction)
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 12.7K bytes - Viewed (0) -
cmd/sts-datatypes.go
// ID tokens, this contains the value of the iss field. For OAuth 2.0 id_tokens, // this contains the value of the ProviderId parameter that was passed in the // AssumeRoleWithWebIdentity request. Provider string `xml:",omitempty"` // The unique user identifier that is returned by the identity provider. // This identifier is associated with the Token that was submitted
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 9.9K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
if ok { user, err := pCfg.provider.LookupUser(userid) if err != nil && err != provider.ErrAccessTokenExpired { return user, err } if err == provider.ErrAccessTokenExpired { if err = pCfg.provider.LoginWithClientID(pCfg.ClientID, pCfg.ClientSecret); err != nil { return user, err } user, err = pCfg.provider.LookupUser(userid) } return user, err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
package provider import ( "encoding/json" "errors" "fmt" "net/http" "net/url" "path" "strings" "sync" ) // Token - parses the output from IDP id_token. type Token struct { AccessToken string `json:"access_token"` Expiry int `json:"expires_in"` } // KeycloakProvider implements Provider interface for KeyCloak Identity Provider.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Apr 29 01:27:09 GMT 2022 - 4.6K bytes - Viewed (0) -
internal/config/identity/ldap/config.go
Type: "ldap", Name: cfg, Enabled: l.Enabled(), }) } return res, nil } // ErrProviderConfigNotFound - represents a non-existing provider error. var ErrProviderConfigNotFound = errors.New("provider configuration not found") // GetConfigInfo - returns config details for an LDAP configuration. func (l *Config) GetConfigInfo(s config.Config, cfgName string) ([]madmin.IDPCfgInfo, error) {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 7.9K bytes - Viewed (2)