Documentation ¶
Index ¶
Constants ¶
View Source
const ( AuthorizeEndpoint = "/authorize" TokenEndpoint = "/oauth/token" WellKnownEndpoint = "/.well-known" OpenIDConfigurationEndpoint = "/openid-configuration" JWKSEndpoint = "/jwks.json" LoginEndpoint = "/u/login" )
Variables ¶
This section is empty.
Functions ¶
Types ¶
type ClaimSet ¶
type ClaimSet struct { Iss string `json:"iss"` // email address of the client_id of the application making the access token request Scope string `json:"scope,omitempty"` // space-delimited list of the permissions the application requests Aud string `json:"aud"` // descriptor of the intended target of the assertion (Optional). Exp int64 `json:"exp"` // the expiration time of the assertion (seconds since Unix epoch) Iat int64 `json:"iat"` // the time the assertion was issued (seconds since Unix epoch) Typ string `json:"typ,omitempty"` // token type (Optional). // Email for which the application is requesting delegated access (Optional). Sub string `json:"sub,omitempty"` // The old name of Sub. Client keeps setting Prn to be // complaint with legacy OAuth 2.0 providers. (Optional) Prn string `json:"prn,omitempty"` // See http://tools.ietf.org/html/draft-jones-json-web-token-10#section-4.3 // This array is marshalled using custom code (see (c *ClaimSet) encode()). PrivateClaims map[string]interface{} `json:"-"` }
type IdentityProvider ¶
type IdentityProvider struct { Issuer string PrivateKey *rsa.PrivateKey // contains filtered or unexported fields }
func NewIdpServer ¶
func NewIdpServer() *IdentityProvider
func (*IdentityProvider) Run ¶
func (idp *IdentityProvider) Run()
func (*IdentityProvider) ServeHTTP ¶
func (idp *IdentityProvider) ServeHTTP(w http.ResponseWriter, r *http.Request)
Click to show internal directories.
Click to hide internal directories.