- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 202 for provider (0.16 sec)
-
internal/config/identity/openid/provider/provider.go
var ( ErrNotImplemented = errors.New("function not implemented") ErrAccessTokenExpired = errors.New("access_token expired or unauthorized") ) // Provider implements identity provider specific admin operations, such as // looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 2.7K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
switch vendor { case keyCloakVendor: adminURL := cfgGet(KeyCloakAdminURL) realm := cfgGet(KeyCloakRealm) p.provider, err = provider.KeyCloak( provider.WithAdminURL(adminURL), provider.WithOpenIDConfig(provider.DiscoveryDoc(p.DiscoveryDoc)), provider.WithTransport(transport), provider.WithRealm(realm), ) return err default: return fmt.Errorf("Unsupported vendor %s", keyCloakVendor) } }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
if err != nil { t.Fatal(err) } provider := providerCfg{} provider.JWKS.URL = u1 cfg := Config{ Enabled: true, pubKeys: pubKeys, arnProviderCfgsMap: map[arn.ARN]*providerCfg{ DummyRoleARN: &provider, }, ProviderCfgs: map[string]*providerCfg{ "1": &provider, }, } u, err := url.Parse("http://127.0.0.1:8443/?Token=invalid")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.3K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
if ok { user, err := pCfg.provider.LookupUser(userid) if err != nil && err != provider.ErrAccessTokenExpired { return user, err } if err == provider.ErrAccessTokenExpired { if err = pCfg.provider.LoginWithClientID(pCfg.ClientID, pCfg.ClientSecret); err != nil { return user, err } user, err = pCfg.provider.LookupUser(userid) } return user, err }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
cmd/sts-datatypes.go
// ID tokens, this contains the value of the iss field. For OAuth 2.0 id_tokens, // this contains the value of the ProviderId parameter that was passed in the // AssumeRoleWithWebIdentity request. Provider string `xml:",omitempty"` // The unique user identifier that is returned by the identity provider. // This identifier is associated with the Token that was submitted
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 9.9K bytes - Viewed (0) -
cmd/sts-errors.go
HTTPStatusCode: http.StatusBadRequest, }, ErrSTSClientGrantsExpiredToken: { Code: "ExpiredToken", Description: "The client grants that was passed is expired or is not valid. Get a new client grants token from the identity provider and then retry the request.", HTTPStatusCode: http.StatusBadRequest, },
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 5.8K bytes - Viewed (0) -
internal/config/identity/ldap/config.go
Type: "ldap", Name: cfg, Enabled: l.Enabled(), }) } return res, nil } // ErrProviderConfigNotFound - represents a non-existing provider error. var ErrProviderConfigNotFound = errors.New("provider configuration not found") // GetConfigInfo - returns config details for an LDAP configuration. func (l *Config) GetConfigInfo(s config.Config, cfgName string) ([]madmin.IDPCfgInfo, error) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 7.9K bytes - Viewed (2) -
internal/config/identity/openid/help.go
return config.DefaultHelpPostfix(DefaultKVS, key) } Help = config.HelpKVS{ config.HelpKV{ Key: DisplayName, Description: "Friendly display name for this Provider/App" + defaultHelpPostfix(DisplayName), Optional: true, Type: "string", }, config.HelpKV{ Key: ConfigURL,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Jun 23 14:45:27 GMT 2023 - 4.3K bytes - Viewed (0) -
cmd/sts-handlers_test.go
if openIDServer == "" || openIDServer2 == "" { t.Skip("Skipping OpenID test as enough OpenID servers are not provided.") } testApps := testClientApps rolePolicies := []string{ "", // Treated as claim-based provider as no role policy is given. "", // Treated as claim-based provider as no role policy is given. } for i, testCase := range iamTestSuites { t.Run(
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 85.7K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
"k8s.io/apimachinery/pkg/runtime/serializer/json" "k8s.io/apimachinery/pkg/runtime/serializer/versioning" utilruntime "k8s.io/apimachinery/pkg/util/runtime" _ "k8s.io/client-go/plugin/pkg/client/auth" // to avoid 'No Auth Provider found for name "gcp"' "k8s.io/client-go/tools/clientcmd" "k8s.io/client-go/tools/clientcmd/api" "k8s.io/client-go/tools/clientcmd/api/latest" "istio.io/istio/istioctl/pkg/cli" "istio.io/istio/istioctl/pkg/util"
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Oct 11 01:43:17 GMT 2023 - 24K bytes - Viewed (0)