ContainerImage.Pinniped/internal/oidc
Andrew Keesler fe2e2bdff1
Our ID token signing algorithm is ES256, not RS256
We are currently using EC keys to sign ID tokens, so we should reflect that in
our OIDC discovery metadata.

Signed-off-by: Andrew Keesler <akeesler@vmware.com>
2020-12-03 07:46:07 -05:00
..
auth WIP: get linting and unit tests passing after token endpoint first draft 2020-12-02 11:16:02 -05:00
csrftoken WIP for saving authorize endpoint state into upstream state param 2020-11-10 17:58:00 -08:00
discovery Our ID token signing algorithm is ES256, not RS256 2020-12-03 07:46:07 -05:00
jwks Implement per-issuer OIDC JWKS endpoint 2020-10-16 17:51:40 -07:00
provider WIP: get linting and unit tests passing after token endpoint first draft 2020-12-02 11:16:02 -05:00
token Added id token verification 2020-12-02 16:55:48 -08:00
nullstorage_test.go WIP: get linting and unit tests passing after token endpoint first draft 2020-12-02 11:16:02 -05:00
nullstorage.go Add NullStorage for the authorize endpoint to use 2020-11-11 14:49:24 -08:00
oidc.go token_handler.go: first draft of token handler, with a bunch of TODOs 2020-12-02 11:14:45 -05:00