chore: adjustments to comments for things found while implementing Storage
This commit is contained in:
parent
98851d4ca6
commit
0d721d937e
4 changed files with 10 additions and 2 deletions
|
@ -248,6 +248,8 @@ func WithClientKey(path string) Option {
|
|||
}
|
||||
|
||||
// WithJWTProfile creates a signer used for the JWT Profile Client Authentication on the token endpoint
|
||||
// When creating the signer, be sure to include the KeyID in the SigningKey.
|
||||
// See client.NewSignerFromPrivateKeyByte for an example.
|
||||
func WithJWTProfile(signerFromKey SignerFromKey) Option {
|
||||
return func(rp *relyingParty) error {
|
||||
signer, err := signerFromKey()
|
||||
|
|
|
@ -70,6 +70,8 @@ func (a *AccessTokenRequest) SetClientSecret(clientSecret string) {
|
|||
a.ClientSecret = clientSecret
|
||||
}
|
||||
|
||||
// RefreshTokenRequest is not useful for making refresh requests because the
|
||||
// grant_type is not included explicitly but rather implied.
|
||||
type RefreshTokenRequest struct {
|
||||
RefreshToken string `schema:"refresh_token"`
|
||||
Scopes SpaceDelimitedArray `schema:"scope"`
|
||||
|
|
|
@ -133,7 +133,8 @@ type endpoints struct {
|
|||
//This does not include login. Login is handled with a redirect that includes the
|
||||
//request ID. The redirect for logins is specified per-client by Client.LoginURL().
|
||||
//Successful logins should mark the request as authorized and redirect back to to
|
||||
//op.AuthCallbackURL(provider) which is probably /callback.
|
||||
//op.AuthCallbackURL(provider) which is probably /callback. On the redirect back
|
||||
// to the AuthCallbackURL, the request id should be passed as the "id" parameter.
|
||||
func NewOpenIDProvider(ctx context.Context, config *Config, storage Storage, opOpts ...Option) (OpenIDProvider, error) {
|
||||
err := ValidateIssuer(config.Issuer)
|
||||
if err != nil {
|
||||
|
|
|
@ -56,7 +56,10 @@ type OPStorage interface {
|
|||
SetUserinfoFromToken(ctx context.Context, userinfo oidc.UserInfoSetter, tokenID, subject, origin string) error
|
||||
SetIntrospectionFromToken(ctx context.Context, userinfo oidc.IntrospectionResponse, tokenID, subject, clientID string) error
|
||||
GetPrivateClaimsFromScopes(ctx context.Context, userID, clientID string, scopes []string) (map[string]interface{}, error)
|
||||
GetKeyByIDAndUserID(ctx context.Context, keyID, userID string) (*jose.JSONWebKey, error)
|
||||
|
||||
// GetKeyByIDAndUserID is mis-named. It does not pass userID. Instead
|
||||
// it passes the clientID.
|
||||
GetKeyByIDAndUserID(ctx context.Context, keyID, clientID string) (*jose.JSONWebKey, error)
|
||||
ValidateJWTProfileScopes(ctx context.Context, userID string, scopes []string) ([]string, error)
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue