Versions in this module Expand all Collapse all v0 v0.0.2 Sep 3, 2020 GO-2022-0272 GO-2022-0272: Directory traversal in github.com/kataras/iris and github.com/kataras/iris/v12 v0.0.1 Aug 12, 2020 GO-2022-0272 GO-2022-0272: Directory traversal in github.com/kataras/iris and github.com/kataras/iris/v12 Changes in this version + const A128CBCHS256 + const A128GCM + const A128GCMKW + const A128KW + const A192CBCHS384 + const A192GCM + const A192GCMKW + const A192KW + const A256CBCHS512 + const A256GCM + const A256GCMKW + const A256KW + const ClaimsContextKey + const DIRECT + const DefaultEncFilename + const DefaultSignFilename + const ECDHES + const ECDHESA128KW + const ECDHESA192KW + const ECDHESA256KW + const ED25519 + const ES256 + const ES384 + const ES512 + const EdDSA + const HS256 + const HS384 + const HS512 + const PBES2HS256A128KW + const PBES2HS384A192KW + const PBES2HS512A256KW + const PS256 + const PS384 + const PS512 + const RS256 + const RS384 + const RS512 + const RSA15 + const RSAOAEP + const RSAOAEP256 + var ErrExpired = errors.New("token is expired (exp)") + var ErrInvalidKey = errors.New("key is not of type *rsa.PrivateKey") + var ErrIssuedInTheFuture = errors.New("token issued in the future (iat)") + var ErrMissing = errors.New("token is missing") + var ErrNotPEM = errors.New("key must be PEM encoded") + var ErrNotValidYet = errors.New("token not valid yet (nbf)") + var NewNumericDate = jwt.NewNumericDate + func FromHeader(ctx *context.Context) string + func FromQuery(ctx *context.Context) string + func Get(ctx *context.Context) (interface{}, error) + func IsValidated(ctx *context.Context) bool + func LoadRSA(fname string, bits int) (key *rsa.PrivateKey, err error) + func ParseRSAPrivateKey(key, password []byte) (*rsa.PrivateKey, error) + func ReadClaims(ctx *context.Context, claimsPtr interface{}) error + type Audience = jwt.Audience + type Claims = jwt.Claims + func Expiry(maxAge time.Duration, claims Claims) Claims + type ContentEncryption = jose.ContentEncryption + type JWT struct + DecriptionKey interface{} + Encrypter jose.Encrypter + Extractors []TokenExtractor + MaxAge time.Duration + Signer jose.Signer + VerificationKey interface{} + func HMAC(maxAge time.Duration, keys ...string) *JWT + func New(maxAge time.Duration, alg SignatureAlgorithm, key interface{}) (*JWT, error) + func RSA(maxAge time.Duration, filenames ...string) *JWT + func (j *JWT) Expiry(claims Claims) Claims + func (j *JWT) Token(claims interface{}) (string, error) + func (j *JWT) Verify(ctx *context.Context) + func (j *JWT) VerifyToken(ctx *context.Context, claimsPtr interface{}) error + func (j *JWT) WithEncryption(contentEncryption ContentEncryption, alg KeyAlgorithm, key interface{}) error + func (j *JWT) WriteToken(ctx *context.Context, claims interface{}) error + type KeyAlgorithm = jose.KeyAlgorithm + type NumericDate = jwt.NumericDate + type SignatureAlgorithm = jose.SignatureAlgorithm + type TokenExtractor func(*context.Context) string + func FromJSON(jsonKey string) TokenExtractor Other modules containing this package github.com/kataras/iris/v12