ContainerImage.Pinniped/internal/oidc
Andrew Keesler 83e0934864
Add logging in dynamic OIDC ECDSA strategy
I'm worried that these errors are going to be really burried from the user, so
add some log statements to try to make them a tiny bit more observable.

Also follow some of our error message convetions by using lowercase error
messages.

Signed-off-by: Andrew Keesler <akeesler@vmware.com>
2020-12-04 09:05:39 -05:00
..
auth Merge remote-tracking branch 'upstream/main' into token-endpoint 2020-12-04 08:58:18 -05:00
callback Add a redirectURI parameter to ExchangeAuthcodeAndValidateTokens() method. 2020-12-02 15:55:33 -06:00
csrftoken WIP for saving authorize endpoint state into upstream state param 2020-11-10 17:58:00 -08:00
discovery Our ID token signing algorithm is ES256, not RS256 2020-12-03 07:46:07 -05:00
jwks WIP: start to wire signing key into token handler 2020-12-03 15:37:25 -05:00
oidctestutil Add a redirectURI parameter to ExchangeAuthcodeAndValidateTokens() method. 2020-12-02 15:55:33 -06:00
provider Passing signing key through to the token endpoint 2020-12-03 17:16:08 -08:00
token WIP: start to wire signing key into token handler 2020-12-03 15:37:25 -05:00
dynamic_open_id_connect_ecdsa_strategy_test.go Add logging in dynamic OIDC ECDSA strategy 2020-12-04 09:05:39 -05:00
dynamic_open_id_connect_ecdsa_strategy.go Add logging in dynamic OIDC ECDSA strategy 2020-12-04 09:05:39 -05:00
kube_storage.go Add pkce and openidconnect storage 2020-12-01 17:18:32 -08:00
nullstorage_test.go WIP: get linting and unit tests passing after token endpoint first draft 2020-12-02 11:16:02 -05:00
nullstorage.go WIP towards using k8s fosite storage in the supervisor's callback endpoint 2020-12-01 11:01:42 -08:00
oidc.go Passing signing key through to the token endpoint 2020-12-03 17:16:08 -08:00