Documentation ¶
Index ¶
- Variables
- type DefaultSession
- func (s *DefaultSession) Clone() fosite.Session
- func (s *DefaultSession) GetExpiresAt(key fosite.TokenType) time.Time
- func (s *DefaultSession) GetSubject() string
- func (s *DefaultSession) GetUsername() string
- func (s *DefaultSession) IDTokenClaims() *jwt.IDTokenClaims
- func (s *DefaultSession) IDTokenHeaders() *jwt.Headers
- func (s *DefaultSession) SetExpiresAt(key fosite.TokenType, exp time.Time)
- func (s *DefaultSession) SetSubject(subject string)
- type DefaultStrategy
- type IDTokenHandleHelper
- func (i *IDTokenHandleHelper) ComputeHash(ctx context.Context, sess Session, token string) (string, error)
- func (i *IDTokenHandleHelper) GetAccessTokenHash(ctx context.Context, requester fosite.AccessRequester, ...) string
- func (i *IDTokenHandleHelper) IssueExplicitIDToken(ctx context.Context, lifespan time.Duration, ar fosite.Requester, ...) error
- func (i *IDTokenHandleHelper) IssueImplicitIDToken(ctx context.Context, lifespan time.Duration, ar fosite.Requester, ...) error
- type OpenIDConnectExplicitHandler
- func (c *OpenIDConnectExplicitHandler) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool
- func (c *OpenIDConnectExplicitHandler) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool
- func (c *OpenIDConnectExplicitHandler) HandleAuthorizeEndpointRequest(ctx context.Context, ar fosite.AuthorizeRequester, ...) error
- func (c *OpenIDConnectExplicitHandler) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error
- func (c *OpenIDConnectExplicitHandler) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, ...) error
- type OpenIDConnectHybridHandler
- type OpenIDConnectImplicitHandler
- type OpenIDConnectRefreshHandler
- func (c *OpenIDConnectRefreshHandler) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool
- func (c *OpenIDConnectRefreshHandler) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool
- func (c *OpenIDConnectRefreshHandler) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error
- func (c *OpenIDConnectRefreshHandler) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, ...) error
- type OpenIDConnectRequestStorage
- type OpenIDConnectRequestValidator
- type OpenIDConnectTokenStrategy
- type Session
Constants ¶
This section is empty.
Variables ¶
View Source
var (
ErrInvalidSession = errors.New("Session type mismatch")
)
View Source
var ErrNoSessionFound = fosite.ErrNotFound
Functions ¶
This section is empty.
Types ¶
type DefaultSession ¶
type DefaultSession struct { Claims *jwt.IDTokenClaims `json:"id_token_claims"` Headers *jwt.Headers `json:"headers"` ExpiresAt map[fosite.TokenType]time.Time `json:"expires_at"` Username string `json:"username"` Subject string `json:"subject"` }
IDTokenSession is a session container for the id token
func NewDefaultSession ¶
func NewDefaultSession() *DefaultSession
func (*DefaultSession) Clone ¶
func (s *DefaultSession) Clone() fosite.Session
func (*DefaultSession) GetExpiresAt ¶
func (s *DefaultSession) GetExpiresAt(key fosite.TokenType) time.Time
func (*DefaultSession) GetSubject ¶
func (s *DefaultSession) GetSubject() string
func (*DefaultSession) GetUsername ¶
func (s *DefaultSession) GetUsername() string
func (*DefaultSession) IDTokenClaims ¶
func (s *DefaultSession) IDTokenClaims() *jwt.IDTokenClaims
func (*DefaultSession) IDTokenHeaders ¶
func (s *DefaultSession) IDTokenHeaders() *jwt.Headers
func (*DefaultSession) SetExpiresAt ¶
func (s *DefaultSession) SetExpiresAt(key fosite.TokenType, exp time.Time)
func (*DefaultSession) SetSubject ¶
func (s *DefaultSession) SetSubject(subject string)
type DefaultStrategy ¶
type DefaultStrategy struct { jwt.Signer Config interface { fosite.IDTokenIssuerProvider fosite.IDTokenLifespanProvider fosite.MinParameterEntropyProvider } }
func (DefaultStrategy) GenerateIDToken ¶
func (h DefaultStrategy) GenerateIDToken(ctx context.Context, lifespan time.Duration, requester fosite.Requester) (token string, err error)
GenerateIDToken returns a JWT string.
lifespan is ignored if requester.GetSession().IDTokenClaims().ExpiresAt is not zero.
type IDTokenHandleHelper ¶
type IDTokenHandleHelper struct {
IDTokenStrategy OpenIDConnectTokenStrategy
}
func (*IDTokenHandleHelper) ComputeHash ¶
func (i *IDTokenHandleHelper) ComputeHash(ctx context.Context, sess Session, token string) (string, error)
ComputeHash computes the hash using the alg defined in the id_token header
func (*IDTokenHandleHelper) GetAccessTokenHash ¶
func (i *IDTokenHandleHelper) GetAccessTokenHash(ctx context.Context, requester fosite.AccessRequester, responder fosite.AccessResponder) string
func (*IDTokenHandleHelper) IssueExplicitIDToken ¶
func (i *IDTokenHandleHelper) IssueExplicitIDToken(ctx context.Context, lifespan time.Duration, ar fosite.Requester, resp fosite.AccessResponder) error
func (*IDTokenHandleHelper) IssueImplicitIDToken ¶
func (i *IDTokenHandleHelper) IssueImplicitIDToken(ctx context.Context, lifespan time.Duration, ar fosite.Requester, resp fosite.AuthorizeResponder) error
type OpenIDConnectExplicitHandler ¶
type OpenIDConnectExplicitHandler struct { // OpenIDConnectRequestStorage is the storage for open id connect sessions. OpenIDConnectRequestStorage OpenIDConnectRequestStorage OpenIDConnectRequestValidator *OpenIDConnectRequestValidator Config interface { fosite.IDTokenLifespanProvider } *IDTokenHandleHelper }
func (*OpenIDConnectExplicitHandler) CanHandleTokenEndpointRequest ¶
func (c *OpenIDConnectExplicitHandler) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool
func (*OpenIDConnectExplicitHandler) CanSkipClientAuth ¶
func (c *OpenIDConnectExplicitHandler) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool
func (*OpenIDConnectExplicitHandler) HandleAuthorizeEndpointRequest ¶
func (c *OpenIDConnectExplicitHandler) HandleAuthorizeEndpointRequest(ctx context.Context, ar fosite.AuthorizeRequester, resp fosite.AuthorizeResponder) error
func (*OpenIDConnectExplicitHandler) HandleTokenEndpointRequest ¶
func (c *OpenIDConnectExplicitHandler) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error
func (*OpenIDConnectExplicitHandler) PopulateTokenEndpointResponse ¶
func (c *OpenIDConnectExplicitHandler) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, responder fosite.AccessResponder) error
type OpenIDConnectHybridHandler ¶
type OpenIDConnectHybridHandler struct { AuthorizeImplicitGrantTypeHandler *oauth2.AuthorizeImplicitGrantTypeHandler AuthorizeExplicitGrantHandler *oauth2.AuthorizeExplicitGrantHandler IDTokenHandleHelper *IDTokenHandleHelper OpenIDConnectRequestValidator *OpenIDConnectRequestValidator OpenIDConnectRequestStorage OpenIDConnectRequestStorage Enigma *jwt.DefaultSigner Config interface { fosite.IDTokenLifespanProvider fosite.MinParameterEntropyProvider fosite.ScopeStrategyProvider } }
func (*OpenIDConnectHybridHandler) HandleAuthorizeEndpointRequest ¶
func (c *OpenIDConnectHybridHandler) HandleAuthorizeEndpointRequest(ctx context.Context, ar fosite.AuthorizeRequester, resp fosite.AuthorizeResponder) error
type OpenIDConnectImplicitHandler ¶
type OpenIDConnectImplicitHandler struct { *IDTokenHandleHelper AuthorizeImplicitGrantTypeHandler *oauth2.AuthorizeImplicitGrantTypeHandler OpenIDConnectRequestValidator *OpenIDConnectRequestValidator RS256JWTStrategy *jwt.DefaultSigner Config interface { fosite.IDTokenLifespanProvider fosite.MinParameterEntropyProvider fosite.ScopeStrategyProvider } }
func (*OpenIDConnectImplicitHandler) HandleAuthorizeEndpointRequest ¶
func (c *OpenIDConnectImplicitHandler) HandleAuthorizeEndpointRequest(ctx context.Context, ar fosite.AuthorizeRequester, resp fosite.AuthorizeResponder) error
type OpenIDConnectRefreshHandler ¶
type OpenIDConnectRefreshHandler struct { *IDTokenHandleHelper Config interface { fosite.IDTokenLifespanProvider } }
func (*OpenIDConnectRefreshHandler) CanHandleTokenEndpointRequest ¶
func (c *OpenIDConnectRefreshHandler) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool
func (*OpenIDConnectRefreshHandler) CanSkipClientAuth ¶
func (c *OpenIDConnectRefreshHandler) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool
func (*OpenIDConnectRefreshHandler) HandleTokenEndpointRequest ¶
func (c *OpenIDConnectRefreshHandler) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error
func (*OpenIDConnectRefreshHandler) PopulateTokenEndpointResponse ¶
func (c *OpenIDConnectRefreshHandler) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, responder fosite.AccessResponder) error
type OpenIDConnectRequestStorage ¶
type OpenIDConnectRequestStorage interface { // CreateOpenIDConnectSession creates an open id connect session // for a given authorize code. This is relevant for explicit open id connect flow. CreateOpenIDConnectSession(ctx context.Context, authorizeCode string, requester fosite.Requester) error // GetOpenIDConnectSession returns error // - nil if a session was found, // - ErrNoSessionFound if no session was found // - or an arbitrary error if an error occurred. GetOpenIDConnectSession(ctx context.Context, authorizeCode string, requester fosite.Requester) (fosite.Requester, error) // Deprecated: DeleteOpenIDConnectSession is not called from anywhere. // Originally, it should remove an open id connect session from the store. DeleteOpenIDConnectSession(ctx context.Context, authorizeCode string) error }
type OpenIDConnectRequestValidator ¶
type OpenIDConnectRequestValidator struct { Strategy jwt.Signer Config openIDConnectRequestValidatorConfigProvider }
func NewOpenIDConnectRequestValidator ¶
func NewOpenIDConnectRequestValidator(strategy jwt.Signer, config openIDConnectRequestValidatorConfigProvider) *OpenIDConnectRequestValidator
func (*OpenIDConnectRequestValidator) ValidatePrompt ¶
func (v *OpenIDConnectRequestValidator) ValidatePrompt(ctx context.Context, req fosite.AuthorizeRequester) error
type Session ¶
type Session interface { // IDTokenClaims returns a pointer to claims which will be modified in-place by handlers. // Session should store this pointer and return always the same pointer. IDTokenClaims() *jwt.IDTokenClaims // IDTokenHeaders returns a pointer to header values which will be modified in-place by handlers. // Session should store this pointer and return always the same pointer. IDTokenHeaders() *jwt.Headers fosite.Session }
Click to show internal directories.
Click to hide internal directories.