Documentation
¶
Index ¶
- Variables
- func NewAuditLogPersister(init []models.AuditLog) persistence.AuditLogPersister
- func NewAuditLogger() auditlog.Logger
- func NewEmailPersister(init []models.Email) persistence.EmailPersister
- func NewIdentityPersister(init []models.Identity) persistence.IdentityPersister
- func NewJwkPersister(init []models.Jwk) persistence.JwkPersister
- func NewPasscodePersister(init []models.Passcode) persistence.PasscodePersister
- func NewPasswordCredentialPersister(init []models.PasswordCredential) persistence.PasswordCredentialPersister
- func NewPersister(user []models.User, passcodes []models.Passcode, jwks []models.Jwk, ...) persistence.Persister
- func NewPrimaryEmailPersister(init []models.PrimaryEmail) persistence.PrimaryEmailPersister
- func NewTokenPersister(init []models.Token) persistence.TokenPersister
- func NewUserPersister(init []models.User) persistence.UserPersister
- func NewWebauthnCredentialPersister(init []models.WebauthnCredential) persistence.WebauthnCredentialPersister
- func NewWebauthnSessionDataPersister(init []models.WebauthnSessionData) persistence.WebauthnSessionDataPersister
- func PurgeDB(db *TestDB) error
- type JwkManager
- type Suite
- type TestDB
Constants ¶
This section is empty.
Variables ¶
View Source
var DefaultConfig = config.Config{ Webauthn: config.WebauthnSettings{ RelyingParty: config.RelyingParty{ Id: "localhost", DisplayName: "Test Relying Party", Icon: "", Origins: []string{"http://localhost:8080", "http://localhost:8888"}, }, Timeout: 60000, UserVerification: "preferred", }, Secrets: config.Secrets{ Keys: []string{"abcdefghijklmnop"}, }, Passcode: config.Passcode{ Smtp: config.SMTP{ Host: "localhost", Port: "2500", }, Email: config.Email{ FromAddress: "test@hanko.io", FromName: "Hanko Test", }, TTL: 300, }, Session: config.Session{ Lifespan: "1h", Cookie: config.Cookie{ SameSite: "none", }, }, Service: config.Service{ Name: "Test", }, Account: config.Account{ AllowSignup: true, AllowDeletion: false, }, }
View Source
var UnknownDialectError = errors.New("unknown dialect")
Functions ¶
func NewAuditLogPersister ¶
func NewAuditLogPersister(init []models.AuditLog) persistence.AuditLogPersister
func NewAuditLogger ¶
func NewAuditLogger() auditlog.Logger
func NewEmailPersister ¶
func NewEmailPersister(init []models.Email) persistence.EmailPersister
func NewIdentityPersister ¶ added in v0.5.0
func NewIdentityPersister(init []models.Identity) persistence.IdentityPersister
func NewJwkPersister ¶
func NewJwkPersister(init []models.Jwk) persistence.JwkPersister
func NewPasscodePersister ¶
func NewPasscodePersister(init []models.Passcode) persistence.PasscodePersister
func NewPasswordCredentialPersister ¶
func NewPasswordCredentialPersister(init []models.PasswordCredential) persistence.PasswordCredentialPersister
func NewPersister ¶
func NewPersister(user []models.User, passcodes []models.Passcode, jwks []models.Jwk, credentials []models.WebauthnCredential, sessionData []models.WebauthnSessionData, passwords []models.PasswordCredential, auditLogs []models.AuditLog, emails []models.Email, primaryEmails []models.PrimaryEmail, identities []models.Identity, tokens []models.Token) persistence.Persister
func NewPrimaryEmailPersister ¶
func NewPrimaryEmailPersister(init []models.PrimaryEmail) persistence.PrimaryEmailPersister
func NewTokenPersister ¶ added in v0.6.0
func NewTokenPersister(init []models.Token) persistence.TokenPersister
func NewUserPersister ¶
func NewUserPersister(init []models.User) persistence.UserPersister
func NewWebauthnCredentialPersister ¶
func NewWebauthnCredentialPersister(init []models.WebauthnCredential) persistence.WebauthnCredentialPersister
func NewWebauthnSessionDataPersister ¶
func NewWebauthnSessionDataPersister(init []models.WebauthnSessionData) persistence.WebauthnSessionDataPersister
Types ¶
type JwkManager ¶ added in v0.5.0
type JwkManager struct{}
func (JwkManager) GenerateKey ¶ added in v0.5.0
func (m JwkManager) GenerateKey() (jwk.Key, error)
func (JwkManager) GetPublicKeys ¶ added in v0.5.0
func (m JwkManager) GetPublicKeys() (jwk.Set, error)
func (JwkManager) GetSigningKey ¶ added in v0.5.0
func (m JwkManager) GetSigningKey() (jwk.Key, error)
type Suite ¶ added in v0.6.0
type Suite struct { suite.Suite Storage persistence.Storage DB *TestDB EmailServer *smtpmock.Server Name string // used for database docker container name, so that tests can run in parallel WithEmailServer bool }
func (*Suite) LoadFixtures ¶ added in v0.6.0
LoadFixtures loads predefined data from the path in the database.
func (*Suite) SetupSuite ¶ added in v0.6.0
func (s *Suite) SetupSuite()
func (*Suite) TearDownSuite ¶ added in v0.6.0
func (s *Suite) TearDownSuite()
func (*Suite) TearDownTest ¶ added in v0.6.0
func (s *Suite) TearDownTest()
Source Files
¶
- audit_log_persister.go
- audit_logger.go
- config.go
- database.go
- email_persister.go
- identity_persister.go
- jwk_manager.go
- jwk_persister.go
- passcode_persister.go
- password_credential_persister.go
- persister.go
- primary_email_persister.go
- suite.go
- token_persister.go
- user_persister.go
- webauthn_credential_persister.go
- webauthn_session_data_persister.go
Click to show internal directories.
Click to hide internal directories.