Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var OpenIdConnectVerify = &ast.Builtin{ Name: "io.openid.verify", Decl: types.NewFunction( types.Args( types.S, types.NewArray(nil, types.S), ), types.NewArray([]types.Type{ types.B, types.NewObject(nil, types.NewDynamicProperty(types.A, types.A)), }, nil), ), }
Verifies an openId connect token and decodes the claims if it is valid.
Functions ¶
func CreateOrGetVerifier ¶
Types ¶
type OpaOidcPlugin ¶
type OpaOidcPlugin struct {
// contains filtered or unexported fields
}
func (*OpaOidcPlugin) Reconfigure ¶
func (p *OpaOidcPlugin) Reconfigure(ctx context.Context, config interface{})
func (*OpaOidcPlugin) Stop ¶
func (p *OpaOidcPlugin) Stop(ctx context.Context)
type TrustedIdProviderManager ¶
type TrustedIdProviderManager interface { // On nil error, IDToken contains the parsed jwt token iff there exist // at least one trusted identity provider in this managed set of IdP's // that successfully validated this token. Else, (if not valid or not // trusted or an error is encountered), a non-nil error returned and // IDToken is nil. VerifyToken(token *string) (*oidc.IDToken, error) }
May be used to manage an token verification against an entire collection of trusted IdP's.
type TrustedIdProviderManagerImpl ¶
type TrustedIdProviderManagerImpl struct {
// contains filtered or unexported fields
}
Private struct to implement interface, TrustedIdProviderManager. We use a sync map to safely manage a collection of trusted issuers and their verifiers.
func GetTrustedIdentityProviderManager ¶
func GetTrustedIdentityProviderManager(trustedIdentityProviders []*string) (*TrustedIdProviderManagerImpl, error)
func (*TrustedIdProviderManagerImpl) VerifyToken ¶
func (idpm *TrustedIdProviderManagerImpl) VerifyToken(token *string) (*oidc.IDToken, error)
Click to show internal directories.
Click to hide internal directories.