Documentation
¶
Index ¶
- Constants
- Variables
- func ApplyJSONPatch(p json.RawMessage, object interface{}, denyPaths ...string) error
- func CleanSQL(t *testing.T, db *sqlx.DB)
- func CleanSQLPop(t *testing.T, c *pop.Connection)
- func ErrorEnhancer(r *http.Request, err error) interface{}
- func GenerateSecret(length int) ([]byte, error)
- func HashByteSecret(secret []byte) []byte
- func HashStringSecret(secret string) []byte
- func IsRedirectURISecure(rc redirectConfiguration) func(redirectURI *url.URL) bool
- func LogAudit(r *http.Request, message interface{}, logger *logrusx.Logger)
- func LogError(r *http.Request, err error, logger *logrusx.Logger)
- func MatchesRange(r *http.Request, ranges []string) error
- func RejectInsecureRequests(reg tlsRegistry, c tlsConfig) negroni.HandlerFunc
- func UrlRoot(u *url.URL) *url.URL
- type BCrypt
- type FositeStorer
- type JoseJSONWebKeySet
- type RegistryCookieStore
- type RegistryLogger
- type RegistryWriter
- type RouterAdmin
- type RouterPublic
- type TracingProvider
Constants ¶
View Source
const ( OpenIDConnectKeyName = "hydra.openid.id-token" OAuth2JWTKeyName = "hydra.jwt.access-token" )
Variables ¶
View Source
var ( ErrNotFound = &fosite.RFC6749Error{ CodeField: http.StatusNotFound, ErrorField: http.StatusText(http.StatusNotFound), DescriptionField: "Unable to located the requested resource", } ErrConflict = &fosite.RFC6749Error{ CodeField: http.StatusConflict, ErrorField: http.StatusText(http.StatusConflict), DescriptionField: "Unable to process the requested resource because of conflict in the current state", } )
Functions ¶
func ApplyJSONPatch ¶
func ApplyJSONPatch(p json.RawMessage, object interface{}, denyPaths ...string) error
func CleanSQLPop ¶
func ErrorEnhancer ¶
func GenerateSecret ¶
func HashByteSecret ¶
HashByteSecret hashes the secret for consumption by the AEAD encryption algorithm which expects exactly 32 bytes.
The system secret is being hashed to always match exactly the 32 bytes required by AEAD, even if the secret is long or shorter.
func HashStringSecret ¶
HashStringSecret hashes the secret for consumption by the AEAD encryption algorithm which expects exactly 32 bytes.
The system secret is being hashed to always match exactly the 32 bytes required by AEAD, even if the secret is long or shorter.
func IsRedirectURISecure ¶
func RejectInsecureRequests ¶
func RejectInsecureRequests(reg tlsRegistry, c tlsConfig) negroni.HandlerFunc
Types ¶
type BCrypt ¶
type BCrypt struct {
// contains filtered or unexported fields
}
BCrypt implements a BCrypt hasher.
type FositeStorer ¶
type FositeStorer interface { fosite.Storage oauth2.CoreStorage openid.OpenIDConnectRequestStorage pkce.PKCERequestStorage RevokeRefreshToken(ctx context.Context, requestID string) error RevokeAccessToken(ctx context.Context, requestID string) error // flush the access token requests from the database. // no data will be deleted after the 'notAfter' timeframe. FlushInactiveAccessTokens(ctx context.Context, notAfter time.Time, limit int, batchSize int) error // flush the login requests from the database. // this will address the database long-term growth issues discussed in https://github.com/ory/hydra/issues/1574. // no data will be deleted after the 'notAfter' timeframe. FlushInactiveLoginConsentRequests(ctx context.Context, notAfter time.Time, limit int, batchSize int) error DeleteAccessTokens(ctx context.Context, clientID string) error FlushInactiveRefreshTokens(ctx context.Context, notAfter time.Time, limit int, batchSize int) error }
type JoseJSONWebKeySet ¶
type JoseJSONWebKeySet struct { // swagger:ignore *jose.JSONWebKeySet }
swagger:type JSONWebKeySet
func (*JoseJSONWebKeySet) Scan ¶
func (n *JoseJSONWebKeySet) Scan(value interface{}) error
type RegistryCookieStore ¶
type RegistryLogger ¶
type RegistryWriter ¶
type RouterAdmin ¶
type RouterAdmin struct {
*httprouter.Router
}
func NewRouterAdmin ¶
func NewRouterAdmin() *RouterAdmin
func (*RouterAdmin) RouterPublic ¶
func (r *RouterAdmin) RouterPublic() *RouterPublic
type RouterPublic ¶
type RouterPublic struct {
*httprouter.Router
}
func NewRouterPublic ¶
func NewRouterPublic() *RouterPublic
func (*RouterPublic) RouterAdmin ¶
func (r *RouterPublic) RouterAdmin() *RouterAdmin
Source Files
¶
Click to show internal directories.
Click to hide internal directories.