skycmd

package
v6.4.2 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 17, 2020 License: Apache-2.0 Imports: 21 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func RegisterConnector

func RegisterConnector(connector *Connector)

func WireConnectors

func WireConnectors(group *flags.Group)

func WireTeamConnectors

func WireTeamConnectors(group *flags.Group)

Types

type AuthFlags

type AuthFlags struct {
	SecureCookies bool              `long:"cookie-secure" description:"Force sending secure flag on http cookies"`
	Expiration    time.Duration     `` /* 135-byte string literal not displayed */
	SigningKey    *flag.PrivateKey  `long:"session-signing-key" required:"true" description:"File containing an RSA private key, used to sign auth tokens."`
	LocalUsers    map[string]string `` /* 204-byte string literal not displayed */
	Clients       map[string]string `long:"add-client" description:"List of client_id:client_secret combinations" value-name:"CLIENT_ID:CLIENT_SECRET"`
}

type AuthTeamFlags

type AuthTeamFlags struct {
	LocalUsers []string  `` /* 169-byte string literal not displayed */
	Config     flag.File `short:"c" long:"config" description:"Configuration file for specifying team params"`
}

func (*AuthTeamFlags) Format

func (flag *AuthTeamFlags) Format() (atc.TeamAuth, error)

type BitbucketCloudFlags

type BitbucketCloudFlags struct {
	ClientID     string `long:"client-id" description:"(Required) Client id"`
	ClientSecret string `long:"client-secret" description:"(Required) Client secret"`
}

func (*BitbucketCloudFlags) Name

func (flag *BitbucketCloudFlags) Name() string

func (*BitbucketCloudFlags) Serialize

func (flag *BitbucketCloudFlags) Serialize(redirectURI string) ([]byte, error)

func (*BitbucketCloudFlags) Validate

func (flag *BitbucketCloudFlags) Validate() error

type BitbucketCloudTeamFlags

type BitbucketCloudTeamFlags struct {
	Users []string `long:"user" description:"A whitelisted Bitbucket Cloud user" value-name:"USERNAME"`
	Teams []string `long:"team" description:"A whitelisted Bitbucket Cloud team" value-name:"TEAM_NAME"`
}

func (*BitbucketCloudTeamFlags) GetGroups

func (flag *BitbucketCloudTeamFlags) GetGroups() []string

func (*BitbucketCloudTeamFlags) GetUsers

func (flag *BitbucketCloudTeamFlags) GetUsers() []string

type CFFlags

type CFFlags struct {
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	APIURL             string      `` /* 167-byte string literal not displayed */
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*CFFlags) Name

func (flag *CFFlags) Name() string

func (*CFFlags) Serialize

func (flag *CFFlags) Serialize(redirectURI string) ([]byte, error)

func (*CFFlags) Validate

func (flag *CFFlags) Validate() error

type CFTeamFlags

type CFTeamFlags struct {
	Users            []string `long:"user" description:"A whitelisted CloudFoundry user" value-name:"USERNAME"`
	Orgs             []string `long:"org" description:"A whitelisted CloudFoundry org" value-name:"ORG_NAME"`
	Spaces           []string `` /* 141-byte string literal not displayed */
	SpacesAll        []string `` /* 166-byte string literal not displayed */
	SpacesDeveloper  []string `` /* 190-byte string literal not displayed */
	SpacesAuditor    []string `` /* 184-byte string literal not displayed */
	SpacesManager    []string `` /* 184-byte string literal not displayed */
	SpaceGuids       []string `long:"space-guid" description:"A whitelisted CloudFoundry space guid" value-name:"SPACE_GUID" mapstructure:"space_guids"`
	SpaceGuidsLegacy []string `mapstructure:"spaceguids"`
}

func (*CFTeamFlags) GetGroups

func (flag *CFTeamFlags) GetGroups() []string

func (*CFTeamFlags) GetUsers

func (flag *CFTeamFlags) GetUsers() []string

type Config

type Config interface {
	Name() string
	Serialize(redirectURI string) ([]byte, error)
}

type Connector

type Connector struct {
	// contains filtered or unexported fields
}

func GetConnectors

func GetConnectors() []*Connector

func (*Connector) ID

func (con *Connector) ID() string

func (*Connector) Name

func (con *Connector) Name() string

func (*Connector) Serialize

func (con *Connector) Serialize(redirectURI string) ([]byte, error)

type GithubFlags

type GithubFlags struct {
	ClientID     string    `long:"client-id" description:"(Required) Client id"`
	ClientSecret string    `long:"client-secret" description:"(Required) Client secret"`
	Host         string    `long:"host" description:"Hostname of GitHub Enterprise deployment (No scheme, No trailing slash)"`
	CACert       flag.File `long:"ca-cert" description:"CA certificate of GitHub Enterprise deployment"`
}

func (*GithubFlags) Name

func (flag *GithubFlags) Name() string

func (*GithubFlags) Serialize

func (flag *GithubFlags) Serialize(redirectURI string) ([]byte, error)

func (*GithubFlags) Validate

func (flag *GithubFlags) Validate() error

type GithubTeamFlags

type GithubTeamFlags struct {
	Users []string `long:"user" description:"A whitelisted GitHub user" value-name:"USERNAME"`
	Orgs  []string `long:"org" description:"A whitelisted GitHub org" value-name:"ORG_NAME"`
	Teams []string `long:"team" description:"A whitelisted GitHub team" value-name:"ORG_NAME:TEAM_NAME"`
}

func (*GithubTeamFlags) GetGroups

func (flag *GithubTeamFlags) GetGroups() []string

func (*GithubTeamFlags) GetUsers

func (flag *GithubTeamFlags) GetUsers() []string

type GitlabFlags

type GitlabFlags struct {
	ClientID     string `long:"client-id" description:"(Required) Client id"`
	ClientSecret string `long:"client-secret" description:"(Required) Client secret"`
	Host         string `long:"host" description:"Hostname of Gitlab Enterprise deployment (Include scheme, No trailing slash)"`
}

func (*GitlabFlags) Name

func (flag *GitlabFlags) Name() string

func (*GitlabFlags) Serialize

func (flag *GitlabFlags) Serialize(redirectURI string) ([]byte, error)

func (*GitlabFlags) Validate

func (flag *GitlabFlags) Validate() error

type GitlabTeamFlags

type GitlabTeamFlags struct {
	Users  []string `long:"user" description:"A whitelisted GitLab user" value-name:"USERNAME"`
	Groups []string `long:"group" description:"A whitelisted GitLab group" value-name:"GROUP_NAME"`
}

func (*GitlabTeamFlags) GetGroups

func (flag *GitlabTeamFlags) GetGroups() []string

func (*GitlabTeamFlags) GetUsers

func (flag *GitlabTeamFlags) GetUsers() []string

type LDAPFlags

type LDAPFlags struct {
	DisplayName        string    `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	Host               string    `` /* 170-byte string literal not displayed */
	BindDN             string    `long:"bind-dn" description:"(Required) Bind DN for searching LDAP users and groups. Typically this is a read-only user."`
	BindPW             string    `long:"bind-pw" description:"(Required) Bind Password for the user specified by 'bind-dn'"`
	InsecureNoSSL      bool      `long:"insecure-no-ssl" description:"Required if LDAP host does not use TLS."`
	InsecureSkipVerify bool      `long:"insecure-skip-verify" description:"Skip certificate verification"`
	StartTLS           bool      `long:"start-tls" description:"Start on insecure port, then negotiate TLS"`
	CACert             flag.File `long:"ca-cert" description:"CA certificate"`

	UserSearch struct {
		BaseDN    string `long:"user-search-base-dn" description:"BaseDN to start the search from. For example 'cn=users,dc=example,dc=com'"`
		Filter    string `` /* 129-byte string literal not displayed */
		Username  string `` /* 176-byte string literal not displayed */
		Scope     string `` /* 140-byte string literal not displayed */
		IDAttr    string `long:"user-search-id-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'uid'."`
		EmailAttr string `long:"user-search-email-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'mail'."`
		NameAttr  string `long:"user-search-name-attr" description:"A mapping of attributes on the user entry to claims."`
	}

	GroupSearch struct {
		BaseDN    string `long:"group-search-base-dn" description:"BaseDN to start the search from. For example 'cn=groups,dc=example,dc=com'"`
		Filter    string `` /* 134-byte string literal not displayed */
		Scope     string `` /* 141-byte string literal not displayed */
		UserAttr  string `` /* 217-byte string literal not displayed */
		GroupAttr string `` /* 218-byte string literal not displayed */
		NameAttr  string `long:"group-search-name-attr" description:"The attribute of the group that represents its name."`
	}
}

func (*LDAPFlags) Name

func (flag *LDAPFlags) Name() string

func (*LDAPFlags) Serialize

func (flag *LDAPFlags) Serialize(redirectURI string) ([]byte, error)

func (*LDAPFlags) Validate

func (flag *LDAPFlags) Validate() error

type LDAPTeamFlags

type LDAPTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"A whitelisted LDAP user" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"A whitelisted LDAP group" value-name:"GROUP_NAME"`
}

func (*LDAPTeamFlags) GetGroups

func (flag *LDAPTeamFlags) GetGroups() []string

func (*LDAPTeamFlags) GetUsers

func (flag *LDAPTeamFlags) GetUsers() []string

type MicrosoftFlags

type MicrosoftFlags struct {
	ClientID           string   `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string   `long:"client-secret" description:"(Required) Client secret"`
	Tenant             string   `long:"tenant" description:"Microsoft Tenant limitation (common, consumers, organizations, tenant name or tenant uuid)"`
	Groups             []string `long:"groups" description:"Allowed Active Directory Groups"`
	OnlySecurityGroups bool     `long:"only-security-groups" description:"Only fetch security groups"`
}

func (*MicrosoftFlags) Name

func (flag *MicrosoftFlags) Name() string

func (*MicrosoftFlags) Serialize

func (flag *MicrosoftFlags) Serialize(redirectURI string) ([]byte, error)

func (*MicrosoftFlags) Validate

func (flag *MicrosoftFlags) Validate() error

type MicrosoftTeamFlags

type MicrosoftTeamFlags struct {
	Users  []string `long:"user" description:"A whitelisted Microsoft user" value-name:"USERNAME"`
	Groups []string `long:"group" description:"A whitelisted Microsoft group" value-name:"GROUP_NAME"`
}

func (*MicrosoftTeamFlags) GetGroups

func (flag *MicrosoftTeamFlags) GetGroups() []string

func (*MicrosoftTeamFlags) GetUsers

func (flag *MicrosoftTeamFlags) GetUsers() []string

type OAuthFlags

type OAuthFlags struct {
	DisplayName        string      `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	AuthURL            string      `long:"auth-url" description:"(Required) Authorization URL"`
	TokenURL           string      `long:"token-url" description:"(Required) Token URL"`
	UserInfoURL        string      `long:"userinfo-url" description:"(Required) UserInfo URL"`
	Scopes             []string    `long:"scope" description:"Any additional scopes that need to be requested during authorization"`
	GroupsKey          string      `` /* 135-byte string literal not displayed */
	UserIDKey          string      `` /* 146-byte string literal not displayed */
	UserNameKey        string      `` /* 156-byte string literal not displayed */
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*OAuthFlags) Name

func (flag *OAuthFlags) Name() string

func (*OAuthFlags) Serialize

func (flag *OAuthFlags) Serialize(redirectURI string) ([]byte, error)

func (*OAuthFlags) Validate

func (flag *OAuthFlags) Validate() error

type OAuthTeamFlags

type OAuthTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"A whitelisted OAuth2 user" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"A whitelisted OAuth2 group" value-name:"GROUP_NAME"`
}

func (*OAuthTeamFlags) GetGroups

func (flag *OAuthTeamFlags) GetGroups() []string

func (*OAuthTeamFlags) GetUsers

func (flag *OAuthTeamFlags) GetUsers() []string

type OIDCFlags

type OIDCFlags struct {
	DisplayName        string      `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	Issuer             string      `` /* 153-byte string literal not displayed */
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	Scopes             []string    `long:"scope" description:"Any additional scopes that need to be requested during authorization"`
	GroupsKey          string      `` /* 135-byte string literal not displayed */
	UserNameKey        string      `` /* 155-byte string literal not displayed */
	HostedDomains      []string    `` /* 140-byte string literal not displayed */
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*OIDCFlags) Name

func (flag *OIDCFlags) Name() string

func (*OIDCFlags) Serialize

func (flag *OIDCFlags) Serialize(redirectURI string) ([]byte, error)

func (*OIDCFlags) Validate

func (flag *OIDCFlags) Validate() error

type OIDCTeamFlags

type OIDCTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"A whitelisted OIDC user" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"A whitelisted OIDC group" value-name:"GROUP_NAME"`
}

func (*OIDCTeamFlags) GetGroups

func (flag *OIDCTeamFlags) GetGroups() []string

func (*OIDCTeamFlags) GetUsers

func (flag *OIDCTeamFlags) GetUsers() []string

type TeamConfig

type TeamConfig interface {
	GetUsers() []string
	GetGroups() []string
}

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL