-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(sdk): Allow custom KAO array templates (#307)
- Adds the ability to share and split DEKs - Reconstructs keys using share ids This will allow opening of files with multi-kas splits. Step 1 of #314 While I'm here I also: 1. Lets platform-xtest job run in parallel with other e2e tests 2. Updates config for platform-roundtrip job, since the `provision fixture keycloak` needs a new config file 3. Adds a new phony make target to simplify development, you can now `make cli` to get the cli without having to guess the version number 4. Adds a `prettier ignore` directive so `make format` no longer formats the generated protocol buffer code 5. Updates the fetching of KAS public keys to happen during encrypt, not during client creation. This makes more sense now that we don't know at client start time which kases will actually be involved in the encrypt step --- Co-authored-by: Patrick Bacon-Blaber <pbacon-blaber@virtru.com>
- Loading branch information
1 parent
6d01eff
commit fd1b386
Showing
20 changed files
with
350 additions
and
146 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
baseUrl: &baseUrl http://localhost:8888 | ||
serverBaseUrl: &serverBaseUrl http://localhost:8080 | ||
customAudMapper: &customAudMapper | ||
name: audience-mapper | ||
protocol: openid-connect | ||
protocolMapper: oidc-audience-mapper | ||
config: | ||
included.custom.audience: *serverBaseUrl | ||
access.token.claim: "true" | ||
id.token.claim: "true" | ||
realms: | ||
- realm_repepresentation: | ||
realm: opentdf | ||
enabled: true | ||
custom_realm_roles: | ||
- name: opentdf-org-admin | ||
- name: opentdf-admin | ||
- name: opentdf-standard | ||
custom_client_roles: | ||
tdf-entity-resolution: | ||
- name: entity-resolution-test-role | ||
custom_groups: | ||
- name: mygroup | ||
attributes: | ||
mygroupattribute: | ||
- mygroupvalue | ||
clients: | ||
- client: | ||
clientID: opentdf | ||
enabled: true | ||
name: opentdf | ||
serviceAccountsEnabled: true | ||
clientAuthenticatorType: client-secret | ||
secret: secret | ||
protocolMappers: | ||
- *customAudMapper | ||
sa_realm_roles: | ||
- opentdf-org-admin | ||
- client: | ||
clientID: opentdf-sdk | ||
enabled: true | ||
name: opentdf-sdk | ||
serviceAccountsEnabled: true | ||
clientAuthenticatorType: client-secret | ||
secret: secret | ||
protocolMappers: | ||
- *customAudMapper | ||
sa_realm_roles: | ||
- opentdf-standard | ||
- client: | ||
clientID: tdf-entity-resolution | ||
enabled: true | ||
name: tdf-entity-resolution | ||
serviceAccountsEnabled: true | ||
clientAuthenticatorType: client-secret | ||
secret: secret | ||
protocolMappers: | ||
- *customAudMapper | ||
sa_client_roles: | ||
realm-management: | ||
- view-clients | ||
- query-clients | ||
- view-users | ||
- query-users | ||
- client: | ||
clientID: tdf-authorization-svc | ||
enabled: true | ||
name: tdf-authorization-svc | ||
serviceAccountsEnabled: true | ||
clientAuthenticatorType: client-secret | ||
secret: secret | ||
protocolMappers: | ||
- *customAudMapper | ||
- client: | ||
clientID: opentdf-public | ||
enabled: true | ||
name: opentdf-public | ||
serviceAccountsEnabled: false | ||
publicClient: true | ||
redirectUris: | ||
- 'http://localhost:9000/*' # otdfctl CLI tool | ||
protocolMappers: | ||
- *customAudMapper | ||
users: | ||
- username: sample-user | ||
enabled: true | ||
firstName: sample | ||
lastName: user | ||
email: sampleuser@sample.com | ||
credentials: | ||
- value: testuser123 | ||
type: password | ||
attributes: | ||
superhero_name: | ||
- thor | ||
superhero_group: | ||
- avengers | ||
groups: | ||
- mygroup | ||
realmRoles: | ||
- opentdf-org-admin | ||
clientRoles: | ||
realm-management: | ||
- view-clients | ||
- query-clients | ||
- view-users | ||
- query-users | ||
tdf-entity-resolution: | ||
- entity-resolution-test-role | ||
token_exchanges: | ||
- start_client: opentdf | ||
target_client: opentdf-sdk | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
/src/platform |
Oops, something went wrong.