mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-31 21:28:11 +09:00 
			
		
		
		
	go1.16 (#14783)
This commit is contained in:
		
							
								
								
									
										43
									
								
								vendor/golang.org/x/oauth2/google/doc.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										43
									
								
								vendor/golang.org/x/oauth2/google/doc.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -4,13 +4,16 @@ | ||||
|  | ||||
| // Package google provides support for making OAuth2 authorized and authenticated | ||||
| // HTTP requests to Google APIs. It supports the Web server flow, client-side | ||||
| // credentials, service accounts, Google Compute Engine service accounts, and Google | ||||
| // App Engine service accounts. | ||||
| // credentials, service accounts, Google Compute Engine service accounts, Google | ||||
| // App Engine service accounts and workload identity federation from non-Google | ||||
| // cloud platforms. | ||||
| // | ||||
| // A brief overview of the package follows. For more information, please read | ||||
| // https://developers.google.com/accounts/docs/OAuth2 | ||||
| // and | ||||
| // https://developers.google.com/accounts/docs/application-default-credentials. | ||||
| // For more information on using workload identity federation, refer to | ||||
| // https://cloud.google.com/iam/docs/how-to#using-workload-identity-federation. | ||||
| // | ||||
| // OAuth2 Configs | ||||
| // | ||||
| @@ -19,6 +22,35 @@ | ||||
| // the other by JWTConfigFromJSON. The returned Config can be used to obtain a TokenSource or | ||||
| // create an http.Client. | ||||
| // | ||||
| // Workload Identity Federation | ||||
| // | ||||
| // Using workload identity federation, your application can access Google Cloud | ||||
| // resources from Amazon Web Services (AWS), Microsoft Azure or any identity | ||||
| // provider that supports OpenID Connect (OIDC). | ||||
| // Traditionally, applications running outside Google Cloud have used service | ||||
| // account keys to access Google Cloud resources. Using identity federation, | ||||
| // you can allow your workload to impersonate a service account. | ||||
| // This lets you access Google Cloud resources directly, eliminating the | ||||
| // maintenance and security burden associated with service account keys. | ||||
| // | ||||
| // Follow the detailed instructions on how to configure Workload Identity Federation | ||||
| // in various platforms: | ||||
| // | ||||
| //   Amazon Web Services (AWS): https://cloud.google.com/iam/docs/access-resources-aws | ||||
| //   Microsoft Azure: https://cloud.google.com/iam/docs/access-resources-azure | ||||
| //   OIDC identity provider: https://cloud.google.com/iam/docs/access-resources-oidc | ||||
| // | ||||
| // For OIDC providers, the library can retrieve OIDC tokens either from a | ||||
| // local file location (file-sourced credentials) or from a local server | ||||
| // (URL-sourced credentials). | ||||
| // For file-sourced credentials, a background process needs to be continuously | ||||
| // refreshing the file location with a new OIDC token prior to expiration. | ||||
| // For tokens with one hour lifetimes, the token needs to be updated in the file | ||||
| // every hour. The token can be stored directly as plain text or in JSON format. | ||||
| // For URL-sourced credentials, a local server needs to host a GET endpoint to | ||||
| // return the OIDC token. The response can be in plain text or JSON. | ||||
| // Additional required request headers can also be specified. | ||||
| // | ||||
| // | ||||
| // Credentials | ||||
| // | ||||
| @@ -29,6 +61,13 @@ | ||||
| // FindDefaultCredentials looks in some well-known places for a credentials file, and | ||||
| // will call AppEngineTokenSource or ComputeTokenSource as needed. | ||||
| // | ||||
| // Application Default Credentials also support workload identity federation to | ||||
| // access Google Cloud resources from non-Google Cloud platforms including Amazon | ||||
| // Web Services (AWS), Microsoft Azure or any identity provider that supports | ||||
| // OpenID Connect (OIDC). Workload identity federation is recommended for | ||||
| // non-Google Cloud environments as it avoids the need to download, manage and | ||||
| // store service account private keys locally. | ||||
| // | ||||
| // DefaultClient and DefaultTokenSource are convenience methods. They first call FindDefaultCredentials, | ||||
| // then use the credentials to construct an http.Client or an oauth2.TokenSource. | ||||
| // | ||||
|   | ||||
		Reference in New Issue
	
	Block a user