)]}'
{"manifests/federation/openidc.pp":[{"author":{"_account_id":3153,"name":"Emilien Macchi","email":"emilien@redhat.com","username":"emilienm"},"change_message_id":"30c909e3f1e0fd378665ac3798c7d3219c307fe3","unresolved":false,"context_lines":[{"line_number":64,"context_line":"#"},{"line_number":65,"context_line":"# [*openidc_introspection_endpoint*]"},{"line_number":66,"context_line":"#  (Required if oauth is enabled and configured for introspection)"},{"line_number":67,"context_line":"#  OAuth introspection endpoint url."},{"line_number":68,"context_line":"#"},{"line_number":69,"context_line":"# [*openidc_verify_jwks_uri*]"},{"line_number":70,"context_line":"#  (Required if oauth is enabled and configured for JWKS based validation)"}],"source_content_type":"text/x-puppet","patch_set":3,"id":"1fa4df85_ffa92323","line":67,"updated":"2020-03-09 14:56:00.000000000","message":"Defaults to undef","commit_id":"780b1cab1739b0fdf4ac35d7fe884750d8531c59"},{"author":{"_account_id":3153,"name":"Emilien Macchi","email":"emilien@redhat.com","username":"emilienm"},"change_message_id":"30c909e3f1e0fd378665ac3798c7d3219c307fe3","unresolved":false,"context_lines":[{"line_number":69,"context_line":"# [*openidc_verify_jwks_uri*]"},{"line_number":70,"context_line":"#  (Required if oauth is enabled and configured for JWKS based validation)"},{"line_number":71,"context_line":"#  The JWKS URL on which the Identity Provider"},{"line_number":72,"context_line":"#  publishes the keys used to sign its JWT access tokens."},{"line_number":73,"context_line":"#"},{"line_number":74,"context_line":"# [*openidc_verify_method*]"},{"line_number":75,"context_line":"#  (Optional) The method used to verify OAuth tokens."}],"source_content_type":"text/x-puppet","patch_set":3,"id":"1fa4df85_1fa51f47","line":72,"updated":"2020-03-09 14:56:00.000000000","message":"Defaults to undef","commit_id":"780b1cab1739b0fdf4ac35d7fe884750d8531c59"}]}
