// overrideCredentials sets the ClientID and ClientSecret from the // config file if they are not blank func overrideCredentials(name string, config *oauth2.Config) { ClientID := fs.ConfigFile.MustValue(name, ConfigClientID) if ClientID != "" { config.ClientID = ClientID } ClientSecret := fs.ConfigFile.MustValue(name, ConfigClientSecret) if ClientSecret != "" { config.ClientSecret = ClientSecret } }
// overrideCredentials sets the ClientID and ClientSecret from the // config file if they are not blank. // If any value is overridden, true is returned. func overrideCredentials(name string, config *oauth2.Config) bool { changed := false ClientID := fs.ConfigFile.MustValue(name, fs.ConfigClientID) if ClientID != "" { config.ClientID = ClientID changed = true } ClientSecret := fs.ConfigFile.MustValue(name, fs.ConfigClientSecret) if ClientSecret != "" { config.ClientSecret = ClientSecret changed = true } return changed }
/** * This creates a new OAuth configuration and synchronizes concurrent access * to that configuration. * This is expected since ServerHTTP run on their own goroutine * @param path is the path to retrieve CA certificates * @param c is the channel to write to * @see #PopulateCertPool(string) */ func OAuthConfigurationManager(clientid, clientsecret, redirecturl, authurl, tokenurl string, c chan *oauth2.Config) { var logger = NewPrefixed("security#OAuthConfigurationManager") oauthConfig := new(oauth2.Config) oauthConfig.ClientID = clientid oauthConfig.ClientSecret = clientsecret oauthConfig.Scopes = []string{"email"} oauthConfig.RedirectURL = redirecturl oauthConfig.Endpoint = oauth2.Endpoint{ AuthURL: authurl, TokenURL: tokenurl, } for { select { case c <- oauthConfig: logger.Finest("Written OAuthconf : %v", oauthConfig) } } }