18 Commits

Author SHA1 Message Date
lordwelch
ae5f06816f Give the http server its own Mux
This prevents issues with registering the same path twice
2020-08-07 14:15:21 -07:00
lordwelch
dd6ec82cba Detach the command to open the url so the http server can start 2020-08-07 14:11:33 -07:00
lordwelch
81f4ab46c7 go vet: fix error handling issues 2020-08-07 14:07:23 -07:00
adrienperonnet
6b4cfa3d05 Shutdown server after two minutes of inactivity 2019-04-26 23:09:41 +12:00
adrienperonnet
44a6d7756d cleaner import 2019-04-26 23:09:41 +12:00
adrienperonnet
d89e7abfb4 fix case 2019-04-26 23:09:33 +12:00
adrienperonnet
00ec3b1ad5 Fix error in logic handling 2019-04-26 23:03:46 +12:00
adrienperonnet
a801ac49c7 Add TODO to drop prividges to avoid escalation 2019-04-26 23:01:21 +12:00
adrienperonnet
45d95c2619 Pass by value when possible & refresh can be private
ProviderConfig not modified and not large so can be on stack
2019-04-26 22:33:15 +12:00
adrienperonnet
143f5deb99 Empty slice declaration via literal 2019-04-26 22:23:02 +12:00
Jeremy Stott
f8a7c0986f Added TOML cofiguration file support
* configuration file located at ~/.aws-oidc/config
 * sets default parameters, but can still be overridden on the cli
 * named AuthProviders are accessible via the auth [name] command
Renamed exec command to auth. Upgraded auth command to take defaults from the config file.
Added new command exec, that puts the temporary credentials as environment variables in the specified command
Automatically append URL to end of auth command if not specified
2019-04-24 15:34:01 +12:00
Jeremy Stott
c548dcfd72 Fixed refresh token and storing in keychain.
Beginning to list roles given a clientid.
2019-04-20 23:12:20 +12:00
adrienperonnet
3c2e58c93e Store the whole oauth2 token content in keychain 2019-04-18 15:36:38 +12:00
Jeremy Stott
6622205179 Switch back to using AssumeRoleWithWebIdentity 2019-04-18 13:49:16 +12:00
Jeremy Stott
a9043f91bc Switch to localhost for testing 2019-04-17 09:53:59 +12:00
Jeremy Stott
33731ab51e Updated to use AWS cognito, including retrieivng credentials with get-credentials-for-identity. 2019-04-16 22:15:37 +12:00
Jeremy Stott
0235ceaa79 Add groups claim 2019-04-15 23:36:11 +12:00
Jeremy Stott
653521ed9f aws-oidc working with google and onelogin openid connect. 2019-04-11 00:08:13 +12:00