mirror of
https://github.com/zitadel/oidc.git
synced 2026-02-05 10:08:35 -06:00
Add a `op.WithCrypto` `op.Option` that allows developers to specify their custom `op.Crypto` implementations during setup. If the `op.Option` is used, it will override `op.Config.CryptoKey`. Closes https://github.com/zitadel/oidc/issues/736. ### Definition of Ready - [x] I am happy with the code - [x] Short description of the feature/issue is added in the pr description - [x] PR is linked to the corresponding user story - [ ] Acceptance criteria are met - [ ] All open todos and follow ups are defined in a new ticket and justified - [ ] Deviations from the acceptance criteria and design are agreed with the PO and documented. - [x] No debug or dead code - [ ] My code has no repetitions - [ ] Critical parts are tested automatically - [ ] Where possible E2E tests are implemented - [x] Documentation/examples are up-to-date - [ ] All non-functional requirements are met - [ ] Functionality of the acceptance criteria is checked manually on the dev system. --------- Signed-off-by: mqf20 <mingqingfoo@gmail.com> Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
67 lines
1.7 KiB
Go
67 lines
1.7 KiB
Go
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"log/slog"
|
|
"net/http"
|
|
"os"
|
|
|
|
"github.com/zitadel/oidc/v3/example/server/config"
|
|
"github.com/zitadel/oidc/v3/example/server/exampleop"
|
|
"github.com/zitadel/oidc/v3/example/server/storage"
|
|
)
|
|
|
|
func getUserStore(cfg *config.Config) (storage.UserStore, error) {
|
|
if cfg.UsersFile == "" {
|
|
return storage.NewUserStore(fmt.Sprintf("http://localhost:%s/", cfg.Port)), nil
|
|
}
|
|
return storage.StoreFromFile(cfg.UsersFile)
|
|
}
|
|
|
|
func main() {
|
|
cfg := config.FromEnvVars(&config.Config{Port: "9998"})
|
|
logger := slog.New(
|
|
slog.NewTextHandler(os.Stderr, &slog.HandlerOptions{
|
|
AddSource: true,
|
|
Level: slog.LevelDebug,
|
|
}),
|
|
)
|
|
|
|
//which gives us the issuer: http://localhost:9998/
|
|
issuer := fmt.Sprintf("http://localhost:%s/", cfg.Port)
|
|
|
|
storage.RegisterClients(
|
|
storage.NativeClient("native", cfg.RedirectURI...),
|
|
storage.WebClient("web", "secret", cfg.RedirectURI...),
|
|
storage.WebClient("api", "secret", cfg.RedirectURI...),
|
|
)
|
|
|
|
// the OpenIDProvider interface needs a Storage interface handling various checks and state manipulations
|
|
// this might be the layer for accessing your database
|
|
// in this example it will be handled in-memory
|
|
store, err := getUserStore(cfg)
|
|
if err != nil {
|
|
logger.Error("cannot create UserStore", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
stor := storage.NewStorage(store)
|
|
router := exampleop.SetupServer(
|
|
issuer,
|
|
stor,
|
|
logger,
|
|
false,
|
|
//op.WithCrypto(newMyCrypto(sha256.Sum256([]byte("test")), logger)),
|
|
)
|
|
|
|
server := &http.Server{
|
|
Addr: ":" + cfg.Port,
|
|
Handler: router,
|
|
}
|
|
logger.Info("server listening, press ctrl+c to stop", "addr", issuer)
|
|
if server.ListenAndServe() != http.ErrServerClosed {
|
|
logger.Error("server terminated", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
}
|