vaultrs/api/auth/oidc/
responses.rs1use std::collections::HashMap;
2
3use serde::{Deserialize, Serialize};
4
5#[derive(Deserialize, Debug, Serialize)]
8pub struct ReadConfigurationResponse {
9 pub bound_issuer: Option<String>,
10 pub default_role: Option<String>,
11 pub jwks_ca_pem: Option<String>,
12 pub jwt_supported_algs: Option<Vec<String>>,
13 pub jwks_url: Option<String>,
14 pub jwt_validation_pubkeys: Option<Vec<String>>,
15 pub namespace_in_state: Option<bool>,
16 pub oidc_discovery_ca_pem: Option<String>,
17 pub oidc_discovery_url: Option<String>,
18 pub oidc_client_id: Option<String>,
19 pub oidc_client_secret: Option<String>,
20 pub oidc_response_mode: Option<String>,
21 pub oidc_response_types: Option<Vec<String>>,
22 pub provider_config: Option<HashMap<String, String>>,
23}
24
25#[derive(Deserialize, Debug, Serialize)]
28pub struct ReadRoleResponse {
29 pub allowed_redirect_uris: Vec<String>,
30 pub user_claim: String,
31 pub bound_subject: String,
32 pub bound_claims: Option<HashMap<String, String>>,
33 pub bound_claims_type: String,
34 pub bound_audiences: Option<Vec<String>>,
35 pub claim_mappings: Option<HashMap<String, String>>,
36 pub clock_skew_leeway: u64,
37 pub expiration_leeway: u64,
38 pub groups_claim: String,
39 pub max_age: u64,
40 pub not_before_leeway: u64,
41 pub oidc_scopes: Option<Vec<String>>,
42 pub role_type: String,
43 pub token_bound_cidrs: Vec<String>,
44 pub token_explicit_max_ttl: u64,
45 pub token_no_default_policy: bool,
46 pub token_num_uses: u64,
47 pub token_period: u64,
48 pub token_policies: Vec<String>,
49 pub token_ttl: u64,
50 pub token_max_ttl: u64,
51 pub token_type: String,
52 pub verbose_oidc_logging: bool,
53}
54
55#[derive(Deserialize, Debug, Serialize)]
58pub struct ListRolesResponse {
59 pub keys: Vec<String>,
60}
61
62#[derive(Deserialize, Debug, Serialize)]
65pub struct OIDCAuthResponse {
66 pub auth_url: String,
67}