/
jwt_authentication_policy.go
136 lines (109 loc) · 4.76 KB
/
jwt_authentication_policy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// API Gateway API
//
// API for the API Gateway service. Use this API to manage gateways, deployments, and related items.
// For more information, see
// Overview of API Gateway (https://docs.cloud.oracle.com/iaas/Content/APIGateway/Concepts/apigatewayoverview.htm).
//
package apigateway
import (
"encoding/json"
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// JwtAuthenticationPolicy Validate a JWT token present in the header or query parameter. A valid
// policy must specify either tokenHeader or tokenQueryParam.
type JwtAuthenticationPolicy struct {
// A list of parties that could have issued the token.
Issuers []string `mandatory:"true" json:"issuers"`
// The list of intended recipients for the token.
Audiences []string `mandatory:"true" json:"audiences"`
PublicKeys PublicKeySet `mandatory:"true" json:"publicKeys"`
// Whether an unauthenticated user may access the API. Must be "true" to enable ANONYMOUS
// route authorization.
IsAnonymousAccessAllowed *bool `mandatory:"false" json:"isAnonymousAccessAllowed"`
// The name of the header containing the authentication token.
TokenHeader *string `mandatory:"false" json:"tokenHeader"`
// The name of the query parameter containing the authentication token.
TokenQueryParam *string `mandatory:"false" json:"tokenQueryParam"`
// The authentication scheme that is to be used when authenticating
// the token. This must to be provided if "tokenHeader" is specified.
TokenAuthScheme *string `mandatory:"false" json:"tokenAuthScheme"`
// The maximum expected time difference between the system clocks
// of the token issuer and the API Gateway.
MaxClockSkewInSeconds *float32 `mandatory:"false" json:"maxClockSkewInSeconds"`
// A list of claims which should be validated to consider the token valid.
VerifyClaims []JsonWebTokenClaim `mandatory:"false" json:"verifyClaims"`
}
// GetIsAnonymousAccessAllowed returns IsAnonymousAccessAllowed
func (m JwtAuthenticationPolicy) GetIsAnonymousAccessAllowed() *bool {
return m.IsAnonymousAccessAllowed
}
func (m JwtAuthenticationPolicy) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m JwtAuthenticationPolicy) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}
// MarshalJSON marshals to json representation
func (m JwtAuthenticationPolicy) MarshalJSON() (buff []byte, e error) {
type MarshalTypeJwtAuthenticationPolicy JwtAuthenticationPolicy
s := struct {
DiscriminatorParam string `json:"type"`
MarshalTypeJwtAuthenticationPolicy
}{
"JWT_AUTHENTICATION",
(MarshalTypeJwtAuthenticationPolicy)(m),
}
return json.Marshal(&s)
}
// UnmarshalJSON unmarshals from json
func (m *JwtAuthenticationPolicy) UnmarshalJSON(data []byte) (e error) {
model := struct {
IsAnonymousAccessAllowed *bool `json:"isAnonymousAccessAllowed"`
TokenHeader *string `json:"tokenHeader"`
TokenQueryParam *string `json:"tokenQueryParam"`
TokenAuthScheme *string `json:"tokenAuthScheme"`
MaxClockSkewInSeconds *float32 `json:"maxClockSkewInSeconds"`
VerifyClaims []JsonWebTokenClaim `json:"verifyClaims"`
Issuers []string `json:"issuers"`
Audiences []string `json:"audiences"`
PublicKeys publickeyset `json:"publicKeys"`
}{}
e = json.Unmarshal(data, &model)
if e != nil {
return
}
var nn interface{}
m.IsAnonymousAccessAllowed = model.IsAnonymousAccessAllowed
m.TokenHeader = model.TokenHeader
m.TokenQueryParam = model.TokenQueryParam
m.TokenAuthScheme = model.TokenAuthScheme
m.MaxClockSkewInSeconds = model.MaxClockSkewInSeconds
m.VerifyClaims = make([]JsonWebTokenClaim, len(model.VerifyClaims))
copy(m.VerifyClaims, model.VerifyClaims)
m.Issuers = make([]string, len(model.Issuers))
copy(m.Issuers, model.Issuers)
m.Audiences = make([]string, len(model.Audiences))
copy(m.Audiences, model.Audiences)
nn, e = model.PublicKeys.UnmarshalPolymorphicJSON(model.PublicKeys.JsonData)
if e != nil {
return
}
if nn != nil {
m.PublicKeys = nn.(PublicKeySet)
} else {
m.PublicKeys = nil
}
return
}