Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/coreos/go-oidc
A Go OpenID Connect client.
https://github.com/coreos/go-oidc
golang
Last synced: 11 days ago
JSON representation
A Go OpenID Connect client.
- Host: GitHub
- URL: https://github.com/coreos/go-oidc
- Owner: coreos
- License: apache-2.0
- Created: 2015-06-29T23:06:33.000Z (over 9 years ago)
- Default Branch: v3
- Last Pushed: 2024-07-08T17:10:32.000Z (4 months ago)
- Last Synced: 2024-10-18T15:18:44.062Z (21 days ago)
- Topics: golang
- Language: Go
- Homepage:
- Size: 307 KB
- Stars: 1,948
- Watchers: 40
- Forks: 394
- Open Issues: 37
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: code-of-conduct.md
Awesome Lists containing this project
- awesome-ccamel - coreos/go-oidc - A Go OpenID Connect client. (Go)
README
# go-oidc
[![Go Reference](https://pkg.go.dev/badge/github.com/coreos/go-oidc/v3/oidc.svg)](https://pkg.go.dev/github.com/coreos/go-oidc/v3/oidc)
![github.com/coreos/go-oidc/v3](https://github.com/coreos/go-oidc/workflows/test/badge.svg?branch=v3)## Updates from v2 to v3
There were two breaking changes made to the v3 branch. The import path has changed from:
```
github.com/coreos/go-oidc
```to:
```
github.com/coreos/go-oidc/v3/oidc
```And the return type of `NewRemoteKeySet()` is now `*RemoteKeySet` instead of an interface ([#262](https://github.com/coreos/go-oidc/pull/262)).
## OpenID Connect support for Go
This package enables OpenID Connect support for the [golang.org/x/oauth2](https://godoc.org/golang.org/x/oauth2) package.
```go
provider, err := oidc.NewProvider(ctx, "https://accounts.google.com")
if err != nil {
// handle error
}// Configure an OpenID Connect aware OAuth2 client.
oauth2Config := oauth2.Config{
ClientID: clientID,
ClientSecret: clientSecret,
RedirectURL: redirectURL,// Discovery returns the OAuth2 endpoints.
Endpoint: provider.Endpoint(),// "openid" is a required scope for OpenID Connect flows.
Scopes: []string{oidc.ScopeOpenID, "profile", "email"},
}
```OAuth2 redirects are unchanged.
```go
func handleRedirect(w http.ResponseWriter, r *http.Request) {
http.Redirect(w, r, oauth2Config.AuthCodeURL(state), http.StatusFound)
}
```The on responses, the provider can be used to verify ID Tokens.
```go
var verifier = provider.Verifier(&oidc.Config{ClientID: clientID})func handleOAuth2Callback(w http.ResponseWriter, r *http.Request) {
// Verify state and errors.oauth2Token, err := oauth2Config.Exchange(ctx, r.URL.Query().Get("code"))
if err != nil {
// handle error
}// Extract the ID Token from OAuth2 token.
rawIDToken, ok := oauth2Token.Extra("id_token").(string)
if !ok {
// handle missing token
}// Parse and verify ID Token payload.
idToken, err := verifier.Verify(ctx, rawIDToken)
if err != nil {
// handle error
}// Extract custom claims
var claims struct {
Email string `json:"email"`
Verified bool `json:"email_verified"`
}
if err := idToken.Claims(&claims); err != nil {
// handle error
}
}
```