skycmd

package
v0.0.0-...-30842c3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Sep 14, 2018 License: Apache-2.0 Imports: 14 Imported by: 6

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func RegisterConnector

func RegisterConnector(connector *Connector)

func WireConnectors

func WireConnectors(group *flags.Group)

func WireTeamConnectors

func WireTeamConnectors(group *flags.Group)

Types

type AuthFlags

type AuthFlags struct {
	SecureCookies bool              `long:"cookie-secure" description:"Force sending secure flag on http cookies"`
	Expiration    time.Duration     `` /* 135-byte string literal not displayed */
	SigningKey    *flag.PrivateKey  `long:"session-signing-key" description:"File containing an RSA private key, used to sign auth tokens."`
	LocalUsers    map[string]string `` /* 204-byte string literal not displayed */
}

type AuthTeamFlags

type AuthTeamFlags struct {
	LocalUsers    []string `` /* 176-byte string literal not displayed */
	AllowAllUsers bool     `` /* 222-byte string literal not displayed */
}

func (*AuthTeamFlags) Format

func (self *AuthTeamFlags) Format() (map[string][]string, error)

type CFFlags

type CFFlags struct {
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	APIURL             string      `` /* 167-byte string literal not displayed */
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*CFFlags) Name

func (self *CFFlags) Name() string

func (*CFFlags) Serialize

func (self *CFFlags) Serialize(redirectURI string) ([]byte, error)

func (*CFFlags) Validate

func (self *CFFlags) Validate() error

type CFTeamFlags

type CFTeamFlags struct {
	Users      []string `long:"user" description:"List of whitelisted CloudFoundry users." value-name:"USERNAME"`
	Orgs       []string `long:"org" description:"List of whitelisted CloudFoundry orgs" value-name:"ORG_NAME"`
	Spaces     []string `long:"space" description:"List of whitelisted CloudFoundry spaces" value-name:"ORG_NAME:SPACE_NAME"`
	SpaceGuids []string `long:"space-guid" description:"(Deprecated) List of whitelisted CloudFoundry space guids" value-name:"SPACE_GUID"`
}

func (*CFTeamFlags) GetGroups

func (self *CFTeamFlags) GetGroups() []string

func (*CFTeamFlags) GetUsers

func (self *CFTeamFlags) GetUsers() []string

func (*CFTeamFlags) IsValid

func (self *CFTeamFlags) IsValid() bool

type Config

type Config interface {
	Name() string
	Serialize(redirectURI string) ([]byte, error)
}

type Connector

type Connector struct {
	// contains filtered or unexported fields
}

func GetConnectors

func GetConnectors() []*Connector

func (*Connector) GetTeamGroups

func (self *Connector) GetTeamGroups() []string

func (*Connector) GetTeamUsers

func (self *Connector) GetTeamUsers() []string

func (*Connector) HasTeamConfig

func (self *Connector) HasTeamConfig() bool

func (*Connector) ID

func (self *Connector) ID() string

func (*Connector) Name

func (self *Connector) Name() string

func (*Connector) Serialize

func (self *Connector) Serialize(redirectURI string) ([]byte, error)

type GithubFlags

type GithubFlags struct {
	ClientID     string    `long:"client-id" description:"(Required) Client id"`
	ClientSecret string    `long:"client-secret" description:"(Required) Client secret"`
	Host         string    `long:"host" description:"Hostname of GitHub Enterprise deployment (No scheme, No trailing slash)"`
	CACert       flag.File `long:"ca-cert" description:"CA certificate of GitHub Enterprise deployment"`
}

func (*GithubFlags) Name

func (self *GithubFlags) Name() string

func (*GithubFlags) Serialize

func (self *GithubFlags) Serialize(redirectURI string) ([]byte, error)

func (*GithubFlags) Validate

func (self *GithubFlags) Validate() error

type GithubTeamFlags

type GithubTeamFlags struct {
	Users []string `long:"user" description:"List of whitelisted GitHub users" value-name:"USERNAME"`
	Orgs  []string `long:"org" description:"List of whitelisted GitHub orgs" value-name:"ORG_NAME"`
	Teams []string `long:"team" description:"List of whitelisted GitHub teams" value-name:"ORG_NAME:TEAM_NAME"`
}

func (*GithubTeamFlags) GetGroups

func (self *GithubTeamFlags) GetGroups() []string

func (*GithubTeamFlags) GetUsers

func (self *GithubTeamFlags) GetUsers() []string

func (*GithubTeamFlags) IsValid

func (self *GithubTeamFlags) IsValid() bool

type GitlabFlags

type GitlabFlags struct {
	ClientID     string `long:"client-id" description:"(Required) Client id"`
	ClientSecret string `long:"client-secret" description:"(Required) Client secret"`
	Host         string `long:"host" description:"Hostname of Gitlab Enterprise deployment (Include scheme, No trailing slash)"`
}

func (*GitlabFlags) Name

func (self *GitlabFlags) Name() string

func (*GitlabFlags) Serialize

func (self *GitlabFlags) Serialize(redirectURI string) ([]byte, error)

func (*GitlabFlags) Validate

func (self *GitlabFlags) Validate() error

type GitlabTeamFlags

type GitlabTeamFlags struct {
	Users  []string `long:"user" description:"List of whitelisted GitLab users" value-name:"USERNAME"`
	Groups []string `long:"group" description:"List of whitelisted GitLab groups" value-name:"GROUP_NAME"`
}

func (*GitlabTeamFlags) GetGroups

func (self *GitlabTeamFlags) GetGroups() []string

func (*GitlabTeamFlags) GetUsers

func (self *GitlabTeamFlags) GetUsers() []string

func (*GitlabTeamFlags) IsValid

func (self *GitlabTeamFlags) IsValid() bool

type LDAPFlags

type LDAPFlags struct {
	DisplayName        string    `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	Host               string    `` /* 170-byte string literal not displayed */
	BindDN             string    `long:"bind-dn" description:"(Required) Bind DN for searching LDAP users and groups. Typically this is a read-only user."`
	BindPW             string    `long:"bind-pw" description:"(Required) Bind Password for the user specified by 'bind-dn'"`
	InsecureNoSSL      bool      `long:"insecure-no-ssl" description:"Required if LDAP host does not use TLS."`
	InsecureSkipVerify bool      `long:"insecure-skip-verify" description:"Skip certificate verification"`
	StartTLS           bool      `long:"start-tls" description:"Start on insecure port, then negotiate TLS"`
	CACert             flag.File `long:"ca-cert" description:"CA certificate"`

	UserSearch struct {
		BaseDN    string `long:"user-search-base-dn" description:"BaseDN to start the search from. For example 'cn=users,dc=example,dc=com'"`
		Filter    string `` /* 129-byte string literal not displayed */
		Username  string `` /* 176-byte string literal not displayed */
		Scope     string `` /* 140-byte string literal not displayed */
		IDAttr    string `long:"user-search-id-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'uid'."`
		EmailAttr string `long:"user-search-email-attr" description:"A mapping of attributes on the user entry to claims. Defaults to 'mail'."`
		NameAttr  string `long:"user-search-name-attr" description:"A mapping of attributes on the user entry to claims."`
	}

	GroupSearch struct {
		BaseDN    string `long:"group-search-base-dn" description:"BaseDN to start the search from. For example 'cn=groups,dc=example,dc=com'"`
		Filter    string `` /* 134-byte string literal not displayed */
		Scope     string `` /* 141-byte string literal not displayed */
		UserAttr  string `` /* 217-byte string literal not displayed */
		GroupAttr string `` /* 218-byte string literal not displayed */
		NameAttr  string `long:"group-search-name-attr" description:"The attribute of the group that represents its name."`
	}
}

func (*LDAPFlags) Name

func (self *LDAPFlags) Name() string

func (*LDAPFlags) Serialize

func (self *LDAPFlags) Serialize(redirectURI string) ([]byte, error)

func (*LDAPFlags) Validate

func (self *LDAPFlags) Validate() error

type LDAPTeamFlags

type LDAPTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"List of whitelisted LDAP users" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"List of whitelisted LDAP groups" value-name:"GROUP_NAME"`
}

func (*LDAPTeamFlags) GetGroups

func (self *LDAPTeamFlags) GetGroups() []string

func (*LDAPTeamFlags) GetUsers

func (self *LDAPTeamFlags) GetUsers() []string

func (*LDAPTeamFlags) IsValid

func (self *LDAPTeamFlags) IsValid() bool

type OAuthFlags

type OAuthFlags struct {
	DisplayName        string      `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	AuthURL            string      `long:"auth-url" description:"(Required) Authorization URL"`
	TokenURL           string      `long:"token-url" description:"(Required) Token URL"`
	UserInfoURL        string      `long:"userinfo-url" description:"UserInfo URL"`
	Scopes             []string    `long:"scope" description:"Any additional scopes that need to be requested during authorization"`
	GroupsKey          string      `long:"groups-key" description:"The groups key indicates which claim to use to map external groups to Concourse teams."`
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*OAuthFlags) Name

func (self *OAuthFlags) Name() string

func (*OAuthFlags) Serialize

func (self *OAuthFlags) Serialize(redirectURI string) ([]byte, error)

func (*OAuthFlags) Validate

func (self *OAuthFlags) Validate() error

type OAuthTeamFlags

type OAuthTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"List of whitelisted OAuth2 users" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"List of whitelisted OAuth2 groups" value-name:"GROUP_NAME"`
}

func (*OAuthTeamFlags) GetGroups

func (self *OAuthTeamFlags) GetGroups() []string

func (*OAuthTeamFlags) GetUsers

func (self *OAuthTeamFlags) GetUsers() []string

func (*OAuthTeamFlags) IsValid

func (self *OAuthTeamFlags) IsValid() bool

type OIDCFlags

type OIDCFlags struct {
	DisplayName        string      `long:"display-name" description:"The auth provider name displayed to users on the login page"`
	Issuer             string      `` /* 153-byte string literal not displayed */
	ClientID           string      `long:"client-id" description:"(Required) Client id"`
	ClientSecret       string      `long:"client-secret" description:"(Required) Client secret"`
	Scopes             []string    `long:"scope" description:"Any additional scopes that need to be requested during authorization"`
	GroupsKey          string      `long:"groups-key" description:"The groups key indicates which claim to use to map external groups to Concourse teams."`
	HostedDomains      []string    `` /* 140-byte string literal not displayed */
	CACerts            []flag.File `long:"ca-cert" description:"CA Certificate"`
	InsecureSkipVerify bool        `long:"skip-ssl-validation" description:"Skip SSL validation"`
}

func (*OIDCFlags) Name

func (self *OIDCFlags) Name() string

func (*OIDCFlags) Serialize

func (self *OIDCFlags) Serialize(redirectURI string) ([]byte, error)

func (*OIDCFlags) Validate

func (self *OIDCFlags) Validate() error

type OIDCTeamFlags

type OIDCTeamFlags struct {
	Users  []string `json:"users" long:"user" description:"List of whitelisted OIDC users" value-name:"USERNAME"`
	Groups []string `json:"groups" long:"group" description:"List of whitelisted OIDC groups" value-name:"GROUP_NAME"`
}

func (*OIDCTeamFlags) GetGroups

func (self *OIDCTeamFlags) GetGroups() []string

func (*OIDCTeamFlags) GetUsers

func (self *OIDCTeamFlags) GetUsers() []string

func (*OIDCTeamFlags) IsValid

func (self *OIDCTeamFlags) IsValid() bool

type TeamConfig

type TeamConfig interface {
	IsValid() bool
	GetUsers() []string
	GetGroups() []string
}

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL