+2
-2
oauth/client.go
oauth/client/client.go
+2
-2
oauth/client.go
oauth/client/client.go
+13
-14
oauth/client_manager/client_manager.go
oauth/client/manager.go
+13
-14
oauth/client_manager/client_manager.go
oauth/client/manager.go
·········jwksCache := cache.NewCache[string, jwk.Key]().WithLRU().WithMaxKeys(500).WithTTL(5 * time.Minute)-metadataCache := cache.NewCache[string, oauth.ClientMetadata]().WithLRU().WithMaxKeys(500).WithTTL(5 * time.Minute)+metadataCache := cache.NewCache[string, Metadata]().WithLRU().WithMaxKeys(500).WithTTL(5 * time.Minute)···-func (cm *ClientManager) GetClient(ctx context.Context, clientId string) (*oauth.Client, error) {···-func (cm *ClientManager) getClientMetadata(ctx context.Context, clientId string) (*oauth.ClientMetadata, error) {+func (cm *Manager) getClientMetadata(ctx context.Context, clientId string) (*Metadata, error) {···-func (cm *ClientManager) getClientJwks(ctx context.Context, clientId, jwksUri string) (jwk.Key, error) {+func (cm *Manager) getClientJwks(ctx context.Context, clientId, jwksUri string) (jwk.Key, error) {······
+2
-2
oauth/client_metadata.go
oauth/client/metadata.go
+2
-2
oauth/client_metadata.go
oauth/client/metadata.go
+10
-12
oauth/dpop/dpop_manager/dpop_manager.go
oauth/dpop/manager.go
+10
-12
oauth/dpop/dpop_manager/dpop_manager.go
oauth/dpop/manager.go
············args.Logger.Warn("nonce secret passed to dpop manager was nil. existing sessions may break. consider saving and restoring your nonce.")···-func (dm *DpopManager) CheckProof(reqMethod, reqUrl string, headers http.Header, accessToken *string) (*dpop.Proof, error) {+func (dm *Manager) CheckProof(reqMethod, reqUrl string, headers http.Header, accessToken *string) (*Proof, error) {······
+1
-1
oauth/dpop/dpop_manager/jti_cache.go
oauth/dpop/jti_cache.go
+1
-1
oauth/dpop/dpop_manager/jti_cache.go
oauth/dpop/jti_cache.go
+3
-3
oauth/dpop/nonce/nonce.go
oauth/dpop/nonce.go
+3
-3
oauth/dpop/nonce/nonce.go
oauth/dpop/nonce.go
······
+3
-26
oauth/provider/client_auth.go
+3
-26
oauth/provider/client_auth.go
······-func (p *Provider) AuthenticateClient(ctx context.Context, req AuthenticateClientRequestBase, proof *dpop.Proof, opts *AuthenticateClientOptions) (*oauth.Client, *ClientAuth, error) {+func (p *Provider) AuthenticateClient(ctx context.Context, req AuthenticateClientRequestBase, proof *dpop.Proof, opts *AuthenticateClientOptions) (*client.Client, *ClientAuth, error) {···-func (p *Provider) Authenticate(_ context.Context, req AuthenticateClientRequestBase, client *oauth.Client) (*ClientAuth, error) {+func (p *Provider) Authenticate(_ context.Context, req AuthenticateClientRequestBase, client *client.Client) (*ClientAuth, error) {
+81
oauth/provider/models.go
+81
oauth/provider/models.go
···+CodeChallengeMethod string `form:"code_challenge_method" json:"code_challenge_method" validate:"required"`
+8
-64
oauth/provider/provider.go
+8
-64
oauth/provider/provider.go
······-CodeChallengeMethod string `form:"code_challenge_method" json:"code_challenge_method" validate:"required"`
+4
-4
server/server.go
+4
-4
server/server.go
······