controllers

package
v0.0.21 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jun 8, 2022 License: MIT Imports: 17 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

View Source
var (
	// ErrEmptyUserID User ID is an empty string
	ErrEmptyUserID = models.NewOAuthErrorResponse(models.OAuthInvalidClientError, "User ID is nil or empty.")
	// ErrInvalidUser User did not pass the object validation
	ErrInvalidUser = models.NewOAuthErrorResponse(models.OAuthInvalidClientError, "User did not pass validation.")
	// ErrUserNotFound User was not found in the database context
	ErrUserNotFound = models.NewOAuthErrorResponse(models.OAuthInvalidClientError, "User not found.")
	// ErrUserNotRemoved There was an error removing the user from the database context
	ErrUserNotRemoved = models.NewOAuthErrorResponse(models.OAuthInvalidClientError, "DB error, user not removed.")
	// ErrUserAlreadyExists The user already exists in the database
	ErrUserAlreadyExists = models.NewOAuthErrorResponse(models.OAuthInvalidClientError, "User already exists.")

	// ErrEmptyToken No User database context found error response
	ErrEmptyToken = models.NewOAuthErrorResponse(models.OAuthInvalidRequestError, "JWT token is nil or empty.")
	// ErrTokenNotFound No User database context found error response
	ErrTokenNotFound = models.NewOAuthErrorResponse(models.OAuthInvalidRequestError, "JWT token was not found, please check your authorization header or request body.")
	// ErrInvalidToken No User database context found error response
	ErrInvalidToken = models.NewOAuthErrorResponse(models.OAuthInvalidRequestError, "JWT token did not pass validation.")

	// ErrGrantNotSupported No User database context found error response
	ErrGrantNotSupported = models.NewOAuthErrorResponse(models.OAuthUnsupportedGrantType, "Grant is not currently supported by the system.")
)

Functions

This section is empty.

Types

type AuthorizationControllers

type AuthorizationControllers struct {
	Logger  *log.Logger
	Context *execution_context.Context
}

AuthorizationControllers

func NewAuthorizationControllers

func NewAuthorizationControllers(context interfaces.UserContextAdapter) *AuthorizationControllers

func NewDefaultAuthorizationControllers

func NewDefaultAuthorizationControllers() *AuthorizationControllers

func (*AuthorizationControllers) Configuration

func (c *AuthorizationControllers) Configuration() controllers.Controller

Configuration Returns the OpenID Oauth configuration endpoint

func (*AuthorizationControllers) Introspection

func (c *AuthorizationControllers) Introspection() controllers.Controller

Introspection Validates a token in the context returning an openid oauth introspect response

func (*AuthorizationControllers) Jwks

Jwks Returns the public keys for the openid oauth configuration endpoint for validation

func (*AuthorizationControllers) Register

Register Create an user in the tenant

func (*AuthorizationControllers) Revoke

Revoke Revokes a user or a user refresh tenant, when revoking a user this will remove the user from the database deleting it

func (*AuthorizationControllers) Token

Login Generate a token for a valid user

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL