ORY Fosite - Security-first OAuth2 framework

Build Status Coverage Status Go Report Card

The security first OAuth2 & OpenID Connect framework for Go. Built simple, powerful and extensible. This library implements peer-reviewed IETF RFC6749, counterfeits weaknesses covered in peer-reviewed IETF RFC6819 and countermeasures various database attack scenarios, keeping your application safe when that hacker penetrates or leaks your database. OpenID Connect is implemented according to OpenID Connect Core 1.0 incorporating errata set 1 and includes all flows: code, implicit, hybrid.

This library considered and implemented:

OAuth2 and OpenID Connect are difficult protocols. If you want quick wins, we strongly encourage you to look at Hydra. Hydra is a secure, high performance, cloud native OAuth2 and OpenID Connect service that integrates with every authentication method imaginable and is built on top of Fosite.

Table of Contents


Fosite was written because our OAuth2 and OpenID Connect service Hydra required a secure and extensible OAuth2 library. We had to realize that nothing matching our requirements was out there, so we decided to build it ourselves.

API Stability

The core public API is almost stable as most changes will only touch the inner workings.

We strongly encourage vendoring fosite using dep or comparable tools.


The example does not have nice visuals but it should give you an idea of what you can do with Fosite and a few lines of code.

Authorize Code Grant

You can run this minimalistic example by doing

go get
cd $GOPATH/src/
dep ensure
go install

There should be a server listening on localhost:3846. You can check out the example's source code here.

A word on quality

We tried to set up as many tests as possible and test for as many cases covered in the RFCs as possible. But we are only human. Please, feel free to add tests for the various cases defined in the OAuth2 RFCs 6749 and 6819 or any other cases that improve the tests.

Everyone writing an RFC conform test that breaks with the current implementation, will receive a place in the Hall of Fame!

A word on security

Please be aware that Fosite only secures parts your server side security. You still need to secure your apps and clients, keep your tokens safe, prevent CSRF attacks, ensure database security, use valid and strong TLS certificates and much more. If you need any help or advice feel free to contact our security staff through our website!

We have given the various specifications, especially OAuth 2.0 Threat Model and Security Considerations, a very close look and included everything we thought was in the scope of this framework. Here is a complete list of things we implemented in Fosite:

Additionally, we added these safeguards:

  • Enforcing random states: Without a random-looking state or OpenID Connect nonce the request will fail.
  • Advanced Token Validation: Tokens are layouted as <key>.<signature> where <signature> is created using HMAC-SHA256 using a global secret. This is what a token can look like: /tgBeUhWlAT8tM8Bhmnx+Amf8rOYOUhrDi3pGzmjP7c=.BiV/Yhma+5moTP46anxMT6cWW8gz5R5vpC9RbpwSDdM=

Sections below Section 5 that are not covered in the list above should be reviewed by you. If you think that a specific section should be something that is covered in Fosite, feel free to create an issue. Please be aware that OpenID Connect requires specific knowledge of the identity provider, which is why Fosite only implements core requirements and most things must be implemented by you (for example prompt, max_age, ui_locales, id_token_hint, user authentication, session management, ...).

It is strongly encouraged to use the handlers shipped with Fosite as they follow the specs and are well tested.

A word on extensibility

Fosite is extensible ... because OAuth2 is an extensible and flexible framework. Fosite let's you register custom token and authorize endpoint handlers with the security that the requests have been validated against the OAuth2 specs beforehand. You can easily extend Fosite's capabilities. For example, if you want to provide OpenID Connect on top of your OAuth2 stack, that's no problem. Or custom assertions, what ever you like and as long as it is secure. ;)


Go 1.11+ must be installed on your system and it is required that you have set up your GOPATH environment variable.

go get -u

We recommend to use dep to mitigate compatibility breaks that come with new api versions.


There is an API documentation available at


Fosite has three strategies for matching scopes. You can replace the default scope strategy if you need a custom one by implementing fosite.ScopeStrategy.

Using the composer, setting a strategy is easy:

import ""

var config = &compose.Config{
    ScopeStrategy: fosite.HierarchicScopeStrategy,

Note: To issue refresh tokens with any of the grants, you need to include the offline scope in the OAuth2 request. This can be modified by the RefreshTokenScopes compose configuration. When set to an empty array, all grants will issue refresh tokens.


This is the default strategy, and the safest one. It is best explained by looking at some examples:

  • users.* matches
  • users.* matches
  • matches
  • users does not match
  •* does not match
  • users.*.* does not match
  • users.*.* matches
  • users.*.* matches
  •* matches
  •* matches
  • users.write.* does not match
  • users.*.bar matches
  • users.*.bar does not

To request users.*, a client must have exactly users.* as granted scope.


This strategy is searching only for exact matches. It returns true iff the scope is granted.


This strategy is deprecated, use it with care. Again, it is best explained by looking at some examples:

  • users matches users
  • users matches
  • users matches
  • matches
  • matches
  • does not match users.write
  • does not match users.write.own


Instantiating fosite by hand can be painful. Therefore we created a few convenience helpers available through the compose package. It is strongly encouraged to use these well tested composers.

In this very basic example, we will instantiate fosite with all OpenID Connect and OAuth2 handlers enabled. Please refer to the example app for more details.

This little code snippet sets up a full-blown OAuth2 and OpenID Connect example.

import ""
import ""
import ""

// This is the example storage that contains:
// * an OAuth2 Client with id "my-client" and secret "foobar" capable of all oauth2 and open id connect grant and response types.
// * a User for the resource owner password credentials grant type with username "peter" and password "secret".
// You will most likely replace this with your own logic once you set up a real world application.
var storage = storage.NewExampleStore()

// This secret is being used to sign access and refresh tokens as well as
// authorization codes. It must be exactly 32 bytes long.
var secret = []byte("my super secret signing password")

privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
if err != nil {
  panic("unable to create private key")

// check the api docs of compose.Config for further configuration options
var config = &compose.Config {
  	AccessTokenLifespan: time.Minute * 30,
  	// ...

var oauth2Provider = compose.ComposeAllEnabled(config, storage, secret, privateKey)

// The authorize endpoint is usually at "".
func authorizeHandlerFunc(rw http.ResponseWriter, req *http.Request) {
	// This context will be passed to all methods. It doesn't fulfill a real purpose in the standard library but could be used
	// to abort database lookups or similar things.
	ctx := req.Context()

	// Let's create an AuthorizeRequest object!
	// It will analyze the request and extract important information like scopes, response type and others.
	ar, err := oauth2Provider.NewAuthorizeRequest(ctx, req)
	if err != nil {
		oauth2Provider.WriteAuthorizeError(rw, ar, err)

	// Normally, this would be the place where you would check if the user is logged in and gives his consent.
	// We're simplifying things and just checking if the request includes a valid username and password
	if req.Form.Get("username") != "peter" {
		rw.Header().Set("Content-Type", "text/html;charset=UTF-8")
		rw.Write([]byte(`<h1>Login page</h1>`))
			<p>Howdy! This is the log in page. For this example, it is enough to supply the username.</p>
			<form method="post">
				<input type="text" name="username" /> <small>try peter</small><br>
				<input type="submit">

	// Now that the user is authorized, we set up a session. When validating / looking up tokens, we additionally get
	// the session. You can store anything you want in it.

	// The session will be persisted by the store and made available when e.g. validating tokens or handling token endpoint requests.
	// The default OAuth2 and OpenID Connect handlers require the session to implement a few methods. Apart from that, the
	// session struct can be anything you want it to be.
	mySessionData := &fosite.DefaultSession{
		Username: req.Form.Get("username"),

	// It's also wise to check the requested scopes, e.g.:
	// if authorizeRequest.GetScopes().Has("admin") {
	//     http.Error(rw, "you're not allowed to do that", http.StatusForbidden)
	//     return
	// }

	// Now we need to get a response. This is the place where the AuthorizeEndpointHandlers kick in and start processing the request.
	// NewAuthorizeResponse is capable of running multiple response type handlers which in turn enables this library
	// to support open id connect.
	response, err := oauth2Provider.NewAuthorizeResponse(ctx, ar, mySessionData)
	if err != nil {
		oauth2Provider.WriteAuthorizeError(rw, ar, err)

	// Awesome, now we redirect back to the client redirect uri and pass along an authorize code
	oauth2Provider.WriteAuthorizeResponse(rw, ar, response)

// The token endpoint is usually at ""
func tokenHandlerFunc(rw http.ResponseWriter, req *http.Request) {
	ctx := req.Context()

	// Create an empty session object that will be passed to storage implementation to populate (unmarshal) the session into.
	// By passing an empty session object as a "prototype" to the store, the store can use the underlying type to unmarshal the value into it.
	// For an example of storage implementation that takes advantage of that, see SQL Store (fosite_store_sql.go) from ory/Hydra project.
	mySessionData := new(fosite.DefaultSession)

	// This will create an access request object and iterate through the registered TokenEndpointHandlers to validate the request.
	accessRequest, err := oauth2Provider.NewAccessRequest(ctx, req, mySessionData)
	if err != nil {
		oauth2Provider.WriteAccessError(rw, accessRequest, err)

	if mySessionData.Username == "super-admin-guy" {
		// do something...

	// Next we create a response for the access request. Again, we iterate through the TokenEndpointHandlers
	// and aggregate the result in response.
	response, err := oauth2Provider.NewAccessResponse(ctx, accessRequest)
	if err != nil {
		oauth2Provider.WriteAccessError(rw, accessRequest, err)

	// All done, send the response.
	oauth2Provider.WriteAccessResponse(rw, accessRequest, response)

	// The client has a valid access token now

func someResourceProviderHandlerFunc(rw http.ResponseWriter, req *http.Request) {
	ctx := req.Context()
	requiredScope := "blogposts.create"

	_, ar, err := oauth2Provider.IntrospectToken(ctx, fosite.AccessTokenFromRequest(req), fosite.AccessToken, new(fosite.DefaultSession), requiredScope)
	if err != nil {
		// ...

	// If no error occurred the token + scope is valid and you have access to:
	// ar.GetClient().GetID(), ar.GetGrantedScopes(), ar.GetScopes(), ar.GetSession().UserID, ar.GetRequestedAt(), ...

Code Examples

Fosite provides integration tests as well as a http server example:

  • Fosite ships with an example app that runs in your browser: Example app.
  • If you want to check out how to enable specific handlers, check out the integration tests.

If you have working examples yourself, please share them with us!

Example Storage Implementation

Fosite does not ship a storage implementation. This is intended, because requirements vary with every environment. You can find a reference implementation at storage/memory.go. This storage fulfills requirements from all OAuth2 and OpenID Connect handlers.

Extensible handlers

OAuth2 is a framework. Fosite mimics this behaviour by enabling you to replace existing or create new OAuth2 handlers. Of course, fosite ships handlers for all OAuth2 and OpenID Connect flows.

This section is missing documentation and we welcome any contributions in that direction.

JWT Introspection

Please note that when using the OAuth2StatelessJWTIntrospectionFactory access token revocation is not possible.


You need git and golang installed on your system.

go get -d
cd $GOPATH/src/
git status
git remote add myfork <url-to-your-fork>
go test ./...

Simple, right? Now you are ready to go! Make sure to run go test ./... often, detecting problems with your code rather sooner than later. Please read [] before creating pull requests and issues.

Refresh mock objects

Run ./ in fosite's root directory or run the contents of [] in a shell.

Hall of Fame

This place is reserved for the fearless bug hunters, reviewers and contributors (alphabetical order).

Find out more about the author of Fosite and Hydra, and the Ory Company.

Expand ▾ Collapse ▴




View Source
const (
	ResponseModeDefault  = ResponseModeType("")
	ResponseModeFormPost = ResponseModeType("form_post")
	ResponseModeQuery    = ResponseModeType("query")
	ResponseModeFragment = ResponseModeType("fragment")
View Source
const (
	AccessToken   TokenType = "access_token"
	RefreshToken  TokenType = "refresh_token"
	AuthorizeCode TokenType = "authorize_code"
	IDToken       TokenType = "id_token"

	BearerAccessToken string = "bearer"
View Source
const DefaultBCryptWorkFactor = 12
View Source
const MinParameterEntropy = 8


View Source
var (
	// ErrInvalidatedAuthorizeCode is an error indicating that an authorization code has been
	// used previously.
	ErrInvalidatedAuthorizeCode = errors.New("Authorization code has ben invalidated")
	// ErrSerializationFailure is an error indicating that the transactional capable storage could not guarantee
	// consistency of Update & Delete operations on the same rows between multiple sessions.
	ErrSerializationFailure = errors.New("The request could not be completed due to concurrent access")
	ErrUnknownRequest       = &RFC6749Error{
		ErrorField:       errUnknownErrorName,
		DescriptionField: "The handler is not responsible for this request.",
		CodeField:        http.StatusBadRequest,
	ErrRequestForbidden = &RFC6749Error{
		ErrorField:       errRequestForbidden,
		DescriptionField: "The request is not allowed.",
		HintField:        "You are not allowed to perform this action.",
		CodeField:        http.StatusForbidden,
	ErrInvalidRequest = &RFC6749Error{
		ErrorField:       errInvalidRequestName,
		DescriptionField: "The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed.",
		HintField:        "Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.",
		CodeField:        http.StatusBadRequest,
	ErrUnauthorizedClient = &RFC6749Error{
		ErrorField:       errUnauthorizedClientName,
		DescriptionField: "The client is not authorized to request a token using this method.",
		HintField:        "Make sure that client id and secret are correctly specified and that the client exists.",
		CodeField:        http.StatusBadRequest,
	ErrAccessDenied = &RFC6749Error{
		ErrorField:       errAccessDeniedName,
		DescriptionField: "The resource owner or authorization server denied the request.",
		HintField:        "Make sure that the request you are making is valid. Maybe the credential or request parameters you are using are limited in scope or otherwise restricted.",
		CodeField:        http.StatusForbidden,
	ErrUnsupportedResponseType = &RFC6749Error{
		ErrorField:       errUnsupportedResponseTypeName,
		DescriptionField: "The authorization server does not support obtaining a token using this method.",
		CodeField:        http.StatusBadRequest,
	ErrUnsupportedResponseMode = &RFC6749Error{
		ErrorField:       errUnsupportedResponseModeName,
		DescriptionField: "The authorization server does not support obtaining a response using this response mode.",
		CodeField:        http.StatusBadRequest,
	ErrInvalidScope = &RFC6749Error{
		ErrorField:       errInvalidScopeName,
		DescriptionField: "The requested scope is invalid, unknown, or malformed.",
		CodeField:        http.StatusBadRequest,
	ErrServerError = &RFC6749Error{
		ErrorField:       errServerErrorName,
		DescriptionField: "The authorization server encountered an unexpected condition that prevented it from fulfilling the request.",
		CodeField:        http.StatusInternalServerError,
	ErrTemporarilyUnavailable = &RFC6749Error{
		ErrorField:       errTemporarilyUnavailableName,
		DescriptionField: "The authorization server is currently unable to handle the request due to a temporary overloading or maintenance of the server.",
		CodeField:        http.StatusServiceUnavailable,
	ErrUnsupportedGrantType = &RFC6749Error{
		ErrorField:       errUnsupportedGrantTypeName,
		DescriptionField: "The authorization grant type is not supported by the authorization server.",
		CodeField:        http.StatusBadRequest,
	ErrInvalidGrant = &RFC6749Error{
		ErrorField:       errInvalidGrantName,
		DescriptionField: "The provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client.",
		CodeField:        http.StatusBadRequest,
	ErrInvalidClient = &RFC6749Error{
		ErrorField:       errInvalidClientName,
		DescriptionField: "Client authentication failed (e.g., unknown client, no client authentication included, or unsupported authentication method).",
		CodeField:        http.StatusUnauthorized,
	ErrInvalidState = &RFC6749Error{
		ErrorField:       errInvalidStateName,
		DescriptionField: "The state is missing or does not have enough characters and is therefore considered too weak.",
		CodeField:        http.StatusBadRequest,
	ErrMisconfiguration = &RFC6749Error{
		ErrorField:       errMisconfigurationName,
		DescriptionField: "The request failed because of an internal error that is probably caused by misconfiguration.",
		CodeField:        http.StatusInternalServerError,
	ErrInsufficientEntropy = &RFC6749Error{
		ErrorField:       errInsufficientEntropyName,
		DescriptionField: "The request used a security parameter (e.g., anti-replay, anti-csrf) with insufficient entropy.",
		CodeField:        http.StatusBadRequest,
	ErrNotFound = &RFC6749Error{
		ErrorField:       errNotFoundName,
		DescriptionField: "Could not find the requested resource(s).",
		CodeField:        http.StatusNotFound,
	ErrRequestUnauthorized = &RFC6749Error{
		ErrorField:       errRequestUnauthorizedName,
		DescriptionField: "The request could not be authorized.",
		HintField:        "Check that you provided valid credentials in the right format.",
		CodeField:        http.StatusUnauthorized,
	ErrTokenSignatureMismatch = &RFC6749Error{
		ErrorField:       errTokenSignatureMismatchName,
		DescriptionField: "Token signature mismatch.",
		HintField:        "Check that you provided  a valid token in the right format.",
		CodeField:        http.StatusBadRequest,
	ErrInvalidTokenFormat = &RFC6749Error{
		ErrorField:       errInvalidTokenFormatName,
		DescriptionField: "Invalid token format.",
		HintField:        "Check that you provided a valid token in the right format.",
		CodeField:        http.StatusBadRequest,
	ErrTokenExpired = &RFC6749Error{
		ErrorField:       errTokenExpiredName,
		DescriptionField: "Token expired.",
		HintField:        "The token expired.",
		CodeField:        http.StatusUnauthorized,
	ErrScopeNotGranted = &RFC6749Error{
		ErrorField:       errScopeNotGrantedName,
		DescriptionField: "The token was not granted the requested scope.",
		HintField:        "The resource owner did not grant the requested scope.",
		CodeField:        http.StatusForbidden,
	ErrTokenClaim = &RFC6749Error{
		ErrorField:       errTokenClaimName,
		DescriptionField: "The token failed validation due to a claim mismatch.",
		HintField:        "One or more token claims failed validation.",
		CodeField:        http.StatusUnauthorized,
	ErrInactiveToken = &RFC6749Error{
		ErrorField:       errTokenInactiveName,
		DescriptionField: "Token is inactive because it is malformed, expired or otherwise invalid.",
		HintField:        "Token validation failed.",
		CodeField:        http.StatusUnauthorized,
	ErrLoginRequired = &RFC6749Error{
		ErrorField:       errLoginRequired,
		DescriptionField: "The Authorization Server requires End-User authentication.",
		CodeField:        http.StatusBadRequest,
	ErrInteractionRequired = &RFC6749Error{
		DescriptionField: "The Authorization Server requires End-User interaction of some form to proceed.",
		ErrorField:       errInteractionRequired,
		CodeField:        http.StatusBadRequest,
	ErrConsentRequired = &RFC6749Error{
		DescriptionField: "The Authorization Server requires End-User consent.",
		ErrorField:       errConsentRequired,
		CodeField:        http.StatusBadRequest,
	ErrRequestNotSupported = &RFC6749Error{
		DescriptionField: "The OP does not support use of the request parameter.",
		ErrorField:       errRequestNotSupportedName,
		CodeField:        http.StatusBadRequest,
	ErrRequestURINotSupported = &RFC6749Error{
		DescriptionField: "The OP does not support use of the request_uri parameter.",
		ErrorField:       errRequestURINotSupportedName,
		CodeField:        http.StatusBadRequest,
	ErrRegistrationNotSupported = &RFC6749Error{
		DescriptionField: "The OP does not support use of the registration parameter.",
		ErrorField:       errRegistrationNotSupportedName,
		CodeField:        http.StatusBadRequest,
	ErrInvalidRequestURI = &RFC6749Error{
		DescriptionField: "The request_uri in the Authorization Request returns an error or contains invalid data.",
		ErrorField:       errInvalidRequestURI,
		CodeField:        http.StatusBadRequest,
	ErrInvalidRequestObject = &RFC6749Error{
		DescriptionField: "The request parameter contains an invalid Request Object.",
		ErrorField:       errInvalidRequestObject,
		CodeField:        http.StatusBadRequest,
	ErrJTIKnown = &RFC6749Error{
		DescriptionField: "The jti was already used.",
		ErrorField:       errJTIKnownName,
		CodeField:        http.StatusBadRequest,
View Source
var FormPostDefaultTemplate = template.Must(template.New("form_post").Parse(`<html>
      <title>Submit This Form</title>
   <body onload="javascript:document.forms[0].submit()">
      <form method="post" action="{{ .RedirURL }}">
         {{ range $key,$value := .Parameters }}
            {{ range $parameter:= $value}}
		      <input type="hidden" name="{{$key}}" value="{{$parameter}}"/>
         {{ end }}


func AccessTokenFromRequest

func AccessTokenFromRequest(req *http.Request) string

func DefaultAudienceMatchingStrategy

func DefaultAudienceMatchingStrategy(haystack []string, needle []string) error

func EscapeJSONString

func EscapeJSONString(str string) string

    EscapeJSONString does a poor man's JSON encoding. Useful when we do not want to use full JSON encoding because we just had an error doing the JSON encoding. The characters that MUST be escaped: quotation mark, reverse solidus, and the control characters (U+0000 through U+001F). See:

    func ExactAudienceMatchingStrategy

    func ExactAudienceMatchingStrategy(haystack []string, needle []string) error

      ExactAudienceMatchingStrategy does not assume that audiences are URIs, but compares strings as-is and does matching with exact string comparison. It requires that all strings in "needle" are present in "haystack". Use this strategy when your audience values are not URIs (e.g., you use client IDs for audience and they are UUIDs or random strings).

      func ExactScopeStrategy

      func ExactScopeStrategy(haystack []string, needle string) bool

      func GetAudiences

      func GetAudiences(form url.Values) []string

        GetAudiences allows audiences to be provided as repeated "audience" form parameter, or as a space-delimited "audience" form parameter if it is not repeated. RFC 8693 in section 2.1 specifies that multiple audience values should be multiple query parameters, while RFC 6749 says that that request parameter must not be included more than once (and thus why we use space-delimited value). This function tries to satisfy both. If "audience" form parameter is repeated, we do not split the value by space.

        func GetPostFormHTMLTemplate

        func GetPostFormHTMLTemplate(f Fosite) *template.Template

        func HierarchicScopeStrategy

        func HierarchicScopeStrategy(haystack []string, needle string) bool

        func IsLocalhost

        func IsLocalhost(redirectURI *url.URL) bool

        func IsRedirectURISecure

        func IsRedirectURISecure(redirectURI *url.URL) bool

        func IsRedirectURISecureStrict

        func IsRedirectURISecureStrict(redirectURI *url.URL) bool

          IsRedirectURISecureStrict is stricter than IsRedirectURISecure and it does not allow custom-scheme URLs because they can be hijacked for native apps. Use claimed HTTPS redirects instead. See discussion in

          func IsValidRedirectURI

          func IsValidRedirectURI(redirectURI *url.URL) bool

            IsValidRedirectURI validates a redirect_uri as specified in:


            * The redirection endpoint URI MUST be an absolute URI as defined by [RFC3986] Section 4.3.
            * The endpoint URI MUST NOT include a fragment component.


            absolute-URI  = scheme ":" hier-part [ "?" query ]


            func MatchRedirectURIWithClientRedirectURIs

            func MatchRedirectURIWithClientRedirectURIs(rawurl string, client Client) (*url.URL, error)

              MatchRedirectURIWithClientRedirectURIs if the given uri is a registered redirect uri. Does not perform uri validation.

              Considered specifications *

              If multiple redirection URIs have been registered, if only part of
              the redirection URI has been registered, or if no redirection URI has
              been registered, the client MUST include a redirection URI with the
              authorization request using the "redirect_uri" request parameter.
              When a redirection URI is included in an authorization request, the
              authorization server MUST compare and match the value received
              against at least one of the registered redirection URIs (or URI
              components) as defined in [RFC3986] Section 6, if any redirection
              URIs were registered.  If the client registration included the full
              redirection URI, the authorization server MUST compare the two URIs
              using simple string comparison as defined in [RFC3986] Section 6.2.1.


              * The authorization server may also enforce the usage and validation
                of pre-registered redirect URIs (see Section  This will
                allow for early recognition of authorization "code" disclosure to
                counterfeit clients.
              * The attacker will need to use another redirect URI for its
                authorization process rather than the target web site because it
                needs to intercept the flow.  So, if the authorization server
                associates the authorization "code" with the redirect URI of a
                particular end-user authorization and validates this redirect URI
                with the redirect URI passed to the token's endpoint, such an
                attack is detected (see Section

              func NewContext

              func NewContext() context.Context

              func RemoveEmpty

              func RemoveEmpty(args []string) (ret []string)

              func StringInSlice

              func StringInSlice(needle string, haystack []string) bool

                StringInSlice returns true if needle exists in haystack

                func URLSetFragment

                func URLSetFragment(source *url.URL, fragment url.Values)

                func WildcardScopeStrategy

                func WildcardScopeStrategy(matchers []string, needle string) bool

                func WriteAuthorizeFormPostResponse

                func WriteAuthorizeFormPostResponse(redirectURL string, parameters url.Values, template *template.Template, rw io.Writer)


                type AccessRequest

                type AccessRequest struct {
                	GrantTypes       Arguments `json:"grantTypes" gorethink:"grantTypes"`
                	HandledGrantType Arguments `json:"handledGrantType" gorethink:"handledGrantType"`

                func NewAccessRequest

                func NewAccessRequest(session Session) *AccessRequest

                func (*AccessRequest) GetGrantTypes

                func (a *AccessRequest) GetGrantTypes() Arguments

                type AccessRequester

                type AccessRequester interface {
                	// GetGrantType returns the requests grant type.
                	GetGrantTypes() (grantTypes Arguments)

                  AccessRequester is a token endpoint's request context.

                  type AccessResponder

                  type AccessResponder interface {
                  	// SetExtra sets a key value pair for the access response.
                  	SetExtra(key string, value interface{})
                  	// GetExtra returns a key's value.
                  	GetExtra(key string) interface{}
                  	SetScopes(scopes Arguments)
                  	// SetAccessToken sets the responses mandatory access token.
                  	SetAccessToken(token string)
                  	// SetTokenType set's the responses mandatory token type
                  	SetTokenType(tokenType string)
                  	// SetAccessToken returns the responses access token.
                  	GetAccessToken() (token string)
                  	// GetTokenType returns the responses token type.
                  	GetTokenType() (token string)
                  	// ToMap converts the response to a map.
                  	ToMap() map[string]interface{}

                    AccessResponder is a token endpoint's response.

                    type AccessResponse

                    type AccessResponse struct {
                    	Extra       map[string]interface{}
                    	AccessToken string
                    	TokenType   string

                    func NewAccessResponse

                    func NewAccessResponse() *AccessResponse

                    func (*AccessResponse) GetAccessToken

                    func (a *AccessResponse) GetAccessToken() string

                    func (*AccessResponse) GetExtra

                    func (a *AccessResponse) GetExtra(key string) interface{}

                    func (*AccessResponse) GetTokenType

                    func (a *AccessResponse) GetTokenType() string

                    func (*AccessResponse) SetAccessToken

                    func (a *AccessResponse) SetAccessToken(token string)

                    func (*AccessResponse) SetExpiresIn

                    func (a *AccessResponse) SetExpiresIn(expiresIn time.Duration)

                    func (*AccessResponse) SetExtra

                    func (a *AccessResponse) SetExtra(key string, value interface{})

                    func (*AccessResponse) SetScopes

                    func (a *AccessResponse) SetScopes(scopes Arguments)

                    func (*AccessResponse) SetTokenType

                    func (a *AccessResponse) SetTokenType(name string)

                    func (*AccessResponse) ToMap

                    func (a *AccessResponse) ToMap() map[string]interface{}

                    type Arguments

                    type Arguments []string

                    func (Arguments) Exact

                    func (r Arguments) Exact(name string) bool

                      Deprecated: Use ExactOne, Matches or MatchesExact

                      func (Arguments) ExactOne

                      func (r Arguments) ExactOne(name string) bool

                        ExactOne checks, by string case, that a single argument equals the provided string.

                        func (Arguments) Has

                        func (r Arguments) Has(items ...string) bool

                          Has checks, in a case-insensitive manner, that all of the items provided exists in arguments.

                          func (Arguments) HasOneOf

                          func (r Arguments) HasOneOf(items ...string) bool

                            HasOneOf checks, in a case-insensitive manner, that one of the items provided exists in arguments.

                            func (Arguments) Matches

                            func (r Arguments) Matches(items ...string) bool

                              Matches performs an case-insensitive, out-of-order check that the items provided exist and equal all of the args in arguments. Note: - Providing a list that includes duplicate string-case items will return not


                              func (Arguments) MatchesExact

                              func (r Arguments) MatchesExact(items ...string) bool

                                MatchesExact checks, by order and string case, that the items provided equal those in arguments.

                                type AudienceMatchingStrategy

                                type AudienceMatchingStrategy func(haystack []string, needle []string) error

                                type AuthorizeEndpointHandler

                                type AuthorizeEndpointHandler interface {
                                	// HandleAuthorizeRequest handles an authorize endpoint request. To extend the handler's capabilities, the http request
                                	// is passed along, if further information retrieval is required. If the handler feels that he is not responsible for
                                	// the authorize request, he must return nil and NOT modify session nor responder neither requester.
                                	// The following spec is a good example of what HandleAuthorizeRequest should do.
                                	// *
                                	//   response_type REQUIRED.
                                	//   The value MUST be one of "code" for requesting an
                                	//   authorization code as described by Section 4.1.1, "token" for
                                	//   requesting an access token (implicit grant) as described by
                                	//   Section 4.2.1, or a registered extension value as described by Section 8.4.
                                	HandleAuthorizeEndpointRequest(ctx context.Context, requester AuthorizeRequester, responder AuthorizeResponder) error

                                type AuthorizeEndpointHandlers

                                type AuthorizeEndpointHandlers []AuthorizeEndpointHandler

                                  AuthorizeEndpointHandlers is a list of AuthorizeEndpointHandler

                                  func (*AuthorizeEndpointHandlers) Append

                                    Append adds an AuthorizeEndpointHandler to this list. Ignores duplicates based on reflect.TypeOf.

                                    type AuthorizeRequest

                                    type AuthorizeRequest struct {
                                    	ResponseTypes        Arguments        `json:"responseTypes" gorethink:"responseTypes"`
                                    	RedirectURI          *url.URL         `json:"redirectUri" gorethink:"redirectUri"`
                                    	State                string           `json:"state" gorethink:"state"`
                                    	HandledResponseTypes Arguments        `json:"handledResponseTypes" gorethink:"handledResponseTypes"`
                                    	ResponseMode         ResponseModeType `json:"ResponseModes" gorethink:"ResponseModes"`
                                    	DefaultResponseMode  ResponseModeType `json:"DefaultResponseMode" gorethink:"DefaultResponseMode"`

                                      AuthorizeRequest is an implementation of AuthorizeRequester

                                      func NewAuthorizeRequest

                                      func NewAuthorizeRequest() *AuthorizeRequest

                                      func (*AuthorizeRequest) DidHandleAllResponseTypes

                                      func (d *AuthorizeRequest) DidHandleAllResponseTypes() bool

                                      func (*AuthorizeRequest) GetDefaultResponseMode

                                      func (d *AuthorizeRequest) GetDefaultResponseMode() ResponseModeType

                                      func (*AuthorizeRequest) GetRedirectURI

                                      func (d *AuthorizeRequest) GetRedirectURI() *url.URL

                                      func (*AuthorizeRequest) GetResponseMode

                                      func (d *AuthorizeRequest) GetResponseMode() ResponseModeType

                                      func (*AuthorizeRequest) GetResponseTypes

                                      func (d *AuthorizeRequest) GetResponseTypes() Arguments

                                      func (*AuthorizeRequest) GetState

                                      func (d *AuthorizeRequest) GetState() string

                                      func (*AuthorizeRequest) IsRedirectURIValid

                                      func (d *AuthorizeRequest) IsRedirectURIValid() bool

                                      func (*AuthorizeRequest) SetDefaultResponseMode

                                      func (d *AuthorizeRequest) SetDefaultResponseMode(defaultResponseMode ResponseModeType)

                                      func (*AuthorizeRequest) SetResponseTypeHandled

                                      func (d *AuthorizeRequest) SetResponseTypeHandled(name string)

                                      type AuthorizeRequester

                                      type AuthorizeRequester interface {
                                      	// GetResponseTypes returns the requested response types
                                      	GetResponseTypes() (responseTypes Arguments)
                                      	// SetResponseTypeHandled marks a response_type (e.g. token or code) as handled indicating that the response type
                                      	// is supported.
                                      	SetResponseTypeHandled(responseType string)
                                      	// DidHandleAllResponseTypes returns if all requested response types have been handled correctly
                                      	DidHandleAllResponseTypes() (didHandle bool)
                                      	// GetRedirectURI returns the requested redirect URI
                                      	GetRedirectURI() (redirectURL *url.URL)
                                      	// IsRedirectURIValid returns false if the redirect is not rfc-conform (i.e. missing client, not on white list,
                                      	// or malformed)
                                      	IsRedirectURIValid() (isValid bool)
                                      	// GetState returns the request's state.
                                      	GetState() (state string)
                                      	// GetResponseMode returns response_mode of the authorization request
                                      	GetResponseMode() ResponseModeType
                                      	// SetDefaultResponseMode sets default response mode for a response type in a flow
                                      	SetDefaultResponseMode(responseMode ResponseModeType)
                                      	// GetDefaultResponseMode gets default response mode for a response type in a flow
                                      	GetDefaultResponseMode() ResponseModeType

                                        AuthorizeRequester is an authorize endpoint's request context.

                                        type AuthorizeResponder

                                        type AuthorizeResponder interface {
                                        	// GetCode returns the response's authorize code if set.
                                        	GetCode() string
                                        	// GetHeader returns the response's header
                                        	GetHeader() (header http.Header)
                                        	// AddHeader adds an header key value pair to the response
                                        	AddHeader(key, value string)
                                        	// GetParameters returns the response's parameters
                                        	GetParameters() (query url.Values)
                                        	// AddParameter adds key value pair to the response
                                        	AddParameter(key, value string)

                                          AuthorizeResponder is an authorization endpoint's response.

                                          type AuthorizeResponse

                                          type AuthorizeResponse struct {
                                          	Header     http.Header
                                          	Parameters url.Values
                                          	// contains filtered or unexported fields

                                            AuthorizeResponse is an implementation of AuthorizeResponder

                                            func NewAuthorizeResponse

                                            func NewAuthorizeResponse() *AuthorizeResponse

                                            func (*AuthorizeResponse) AddHeader

                                            func (a *AuthorizeResponse) AddHeader(key, value string)

                                            func (*AuthorizeResponse) AddParameter

                                            func (a *AuthorizeResponse) AddParameter(key, value string)

                                            func (*AuthorizeResponse) GetCode

                                            func (a *AuthorizeResponse) GetCode() string

                                            func (*AuthorizeResponse) GetHeader

                                            func (a *AuthorizeResponse) GetHeader() http.Header

                                            func (*AuthorizeResponse) GetParameters

                                            func (a *AuthorizeResponse) GetParameters() url.Values

                                            type BCrypt

                                            type BCrypt struct {
                                            	WorkFactor int

                                              BCrypt implements the Hasher interface by using BCrypt.

                                              func (*BCrypt) Compare

                                              func (b *BCrypt) Compare(ctx context.Context, hash, data []byte) error

                                              func (*BCrypt) Hash

                                              func (b *BCrypt) Hash(ctx context.Context, data []byte) ([]byte, error)

                                              type Client

                                              type Client interface {
                                              	// GetID returns the client ID.
                                              	GetID() string
                                              	// GetHashedSecret returns the hashed secret as it is stored in the store.
                                              	GetHashedSecret() []byte
                                              	// GetRedirectURIs returns the client's allowed redirect URIs.
                                              	GetRedirectURIs() []string
                                              	// GetGrantTypes returns the client's allowed grant types.
                                              	GetGrantTypes() Arguments
                                              	// GetResponseTypes returns the client's allowed response types.
                                              	// All allowed combinations of response types have to be listed, each combination having
                                              	// response types of the combination separated by a space.
                                              	GetResponseTypes() Arguments
                                              	// GetScopes returns the scopes this client is allowed to request.
                                              	GetScopes() Arguments
                                              	// IsPublic returns true, if this client is marked as public.
                                              	IsPublic() bool
                                              	// GetAudience returns the allowed audience(s) for this client.
                                              	GetAudience() Arguments

                                                Client represents a client or an app.

                                                type ClientAuthenticationStrategy

                                                type ClientAuthenticationStrategy func(context.Context, *http.Request, url.Values) (Client, error)

                                                  ClientAuthenticationStrategy provides a method signature for authenticating a client request

                                                  type ClientManager

                                                  type ClientManager interface {
                                                  	// GetClient loads the client by its ID or returns an error
                                                  	// if the client does not exist or another error occurred.
                                                  	GetClient(ctx context.Context, id string) (Client, error)
                                                  	// ClientAssertionJWTValid returns an error if the JTI is
                                                  	// known or the DB check failed and nil if the JTI is not known.
                                                  	ClientAssertionJWTValid(ctx context.Context, jti string) error
                                                  	// SetClientAssertionJWT marks a JTI as known for the given
                                                  	// expiry time. Before inserting the new JTI, it will clean
                                                  	// up any existing JTIs that have expired as those tokens can
                                                  	// not be replayed due to the expiry.
                                                  	SetClientAssertionJWT(ctx context.Context, jti string, exp time.Time) error

                                                    ClientManager defines the (persistent) manager interface for clients.

                                                    type DefaultClient

                                                    type DefaultClient struct {
                                                    	ID            string   `json:"id"`
                                                    	Secret        []byte   `json:"client_secret,omitempty"`
                                                    	RedirectURIs  []string `json:"redirect_uris"`
                                                    	GrantTypes    []string `json:"grant_types"`
                                                    	ResponseTypes []string `json:"response_types"`
                                                    	Scopes        []string `json:"scopes"`
                                                    	Audience      []string `json:"audience"`
                                                    	Public        bool     `json:"public"`

                                                      DefaultClient is a simple default implementation of the Client interface.

                                                      func (*DefaultClient) GetAudience

                                                      func (c *DefaultClient) GetAudience() Arguments

                                                      func (*DefaultClient) GetGrantTypes

                                                      func (c *DefaultClient) GetGrantTypes() Arguments

                                                      func (*DefaultClient) GetHashedSecret

                                                      func (c *DefaultClient) GetHashedSecret() []byte

                                                      func (*DefaultClient) GetID

                                                      func (c *DefaultClient) GetID() string

                                                      func (*DefaultClient) GetRedirectURIs

                                                      func (c *DefaultClient) GetRedirectURIs() []string

                                                      func (*DefaultClient) GetResponseTypes

                                                      func (c *DefaultClient) GetResponseTypes() Arguments

                                                      func (*DefaultClient) GetScopes

                                                      func (c *DefaultClient) GetScopes() Arguments

                                                      func (*DefaultClient) IsPublic

                                                      func (c *DefaultClient) IsPublic() bool

                                                      type DefaultJWKSFetcherStrategy

                                                      type DefaultJWKSFetcherStrategy struct {
                                                      	// contains filtered or unexported fields

                                                      func (*DefaultJWKSFetcherStrategy) Resolve

                                                      func (s *DefaultJWKSFetcherStrategy) Resolve(location string, forceRefresh bool) (*jose.JSONWebKeySet, error)

                                                      type DefaultOpenIDConnectClient

                                                      type DefaultOpenIDConnectClient struct {
                                                      	JSONWebKeysURI                    string              `json:"jwks_uri"`
                                                      	JSONWebKeys                       *jose.JSONWebKeySet `json:"jwks"`
                                                      	TokenEndpointAuthMethod           string              `json:"token_endpoint_auth_method"`
                                                      	RequestURIs                       []string            `json:"request_uris"`
                                                      	RequestObjectSigningAlgorithm     string              `json:"request_object_signing_alg"`
                                                      	TokenEndpointAuthSigningAlgorithm string              `json:"token_endpoint_auth_signing_alg"`

                                                      func (*DefaultOpenIDConnectClient) GetJSONWebKeys

                                                      func (c *DefaultOpenIDConnectClient) GetJSONWebKeys() *jose.JSONWebKeySet

                                                      func (*DefaultOpenIDConnectClient) GetJSONWebKeysURI

                                                      func (c *DefaultOpenIDConnectClient) GetJSONWebKeysURI() string

                                                      func (*DefaultOpenIDConnectClient) GetRequestObjectSigningAlgorithm

                                                      func (c *DefaultOpenIDConnectClient) GetRequestObjectSigningAlgorithm() string

                                                      func (*DefaultOpenIDConnectClient) GetRequestURIs

                                                      func (c *DefaultOpenIDConnectClient) GetRequestURIs() []string

                                                      func (*DefaultOpenIDConnectClient) GetTokenEndpointAuthMethod

                                                      func (c *DefaultOpenIDConnectClient) GetTokenEndpointAuthMethod() string

                                                      func (*DefaultOpenIDConnectClient) GetTokenEndpointAuthSigningAlgorithm

                                                      func (c *DefaultOpenIDConnectClient) GetTokenEndpointAuthSigningAlgorithm() string

                                                      type DefaultResponseModeClient

                                                      type DefaultResponseModeClient struct {
                                                      	ResponseModes []ResponseModeType `json:"response_modes"`

                                                      func (*DefaultResponseModeClient) GetResponseModes

                                                      func (c *DefaultResponseModeClient) GetResponseModes() []ResponseModeType

                                                      type DefaultSession

                                                      type DefaultSession struct {
                                                      	ExpiresAt map[TokenType]time.Time
                                                      	Username  string
                                                      	Subject   string

                                                        DefaultSession is a default implementation of the session interface.

                                                        func (*DefaultSession) Clone

                                                        func (s *DefaultSession) Clone() Session

                                                        func (*DefaultSession) GetExpiresAt

                                                        func (s *DefaultSession) GetExpiresAt(key TokenType) time.Time

                                                        func (*DefaultSession) GetSubject

                                                        func (s *DefaultSession) GetSubject() string

                                                        func (*DefaultSession) GetUsername

                                                        func (s *DefaultSession) GetUsername() string

                                                        func (*DefaultSession) SetExpiresAt

                                                        func (s *DefaultSession) SetExpiresAt(key TokenType, exp time.Time)

                                                        func (*DefaultSession) SetSubject

                                                        func (s *DefaultSession) SetSubject(subject string)

                                                        type Fosite

                                                        type Fosite struct {
                                                        	Store                      Storage
                                                        	AuthorizeEndpointHandlers  AuthorizeEndpointHandlers
                                                        	TokenEndpointHandlers      TokenEndpointHandlers
                                                        	TokenIntrospectionHandlers TokenIntrospectionHandlers
                                                        	RevocationHandlers         RevocationHandlers
                                                        	Hasher                     Hasher
                                                        	ScopeStrategy              ScopeStrategy
                                                        	AudienceMatchingStrategy   AudienceMatchingStrategy
                                                        	JWKSFetcherStrategy        JWKSFetcherStrategy
                                                        	HTTPClient                 *http.Client
                                                        	UseLegacyErrorFormat       bool
                                                        	// TokenURL is the the URL of the Authorization Server's Token Endpoint.
                                                        	TokenURL string
                                                        	// SendDebugMessagesToClients if set to true, includes error debug messages in response payloads. Be aware that sensitive
                                                        	// data may be exposed, depending on your implementation of Fosite. Such sensitive data might include database error
                                                        	// codes or other information. Proceed with caution!
                                                        	SendDebugMessagesToClients bool
                                                        	// MinParameterEntropy controls the minimum size of state and nonce parameters. Defaults to fosite.MinParameterEntropy.
                                                        	MinParameterEntropy int
                                                        	// FormPostHTMLTemplate sets html template for rendering the authorization response when the request has response_mode=form_post. Defaults to fosite.FormPostDefaultTemplate
                                                        	FormPostHTMLTemplate *template.Template
                                                        	// ClientAuthenticationStrategy provides an extension point to plug a strategy to authenticate clients
                                                        	ClientAuthenticationStrategy ClientAuthenticationStrategy

                                                          Fosite implements OAuth2Provider.

                                                          func (*Fosite) AuthenticateClient

                                                          func (f *Fosite) AuthenticateClient(ctx context.Context, r *http.Request, form url.Values) (Client, error)

                                                            AuthenticateClient authenticates client requests using the configured strategy `Fosite.ClientAuthenticationStrategy`, if nil it uses `Fosite.DefaultClientAuthenticationStrategy`

                                                            func (*Fosite) DefaultClientAuthenticationStrategy

                                                            func (f *Fosite) DefaultClientAuthenticationStrategy(ctx context.Context, r *http.Request, form url.Values) (Client, error)

                                                              DefaultClientAuthenticationStrategy provides the fosite's default client authentication strategy, HTTP Basic Authentication and JWT Bearer

                                                              func (*Fosite) GetMinParameterEntropy

                                                              func (f *Fosite) GetMinParameterEntropy() int

                                                                GetMinParameterEntropy returns MinParameterEntropy if set. Defaults to fosite.MinParameterEntropy.

                                                                func (*Fosite) IntrospectToken

                                                                func (f *Fosite) IntrospectToken(ctx context.Context, token string, tokenUse TokenUse, session Session, scopes ...string) (TokenUse, AccessRequester, error)

                                                                func (*Fosite) NewAccessRequest

                                                                func (f *Fosite) NewAccessRequest(ctx context.Context, r *http.Request, session Session) (AccessRequester, error)

                                                                  Implements *

                                                                  Clients in possession of a client password MAY use the HTTP Basic
                                                                  authentication scheme as defined in [RFC2617] to authenticate with
                                                                  the authorization server.  The client identifier is encoded using the
                                                                  "application/x-www-form-urlencoded" encoding algorithm per
                                                                  Appendix B, and the encoded value is used as the username; the client
                                                                  password is encoded using the same algorithm and used as the
                                                                  password.  The authorization server MUST support the HTTP Basic
                                                                  authentication scheme for authenticating clients that were issued a
                                                                  client password.
                                                                  Including the client credentials in the request-body using the two
                                                                  parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
                                                                  to directly utilize the HTTP Basic authentication scheme (or other
                                                                  password-based HTTP authentication schemes).  The parameters can only
                                                                  be transmitted in the request-body and MUST NOT be included in the
                                                                  request URI.
                                                                  - Confidential clients or other clients issued client credentials MUST
                                                                  authenticate with the authorization server as described in
                                                                  Section 2.3 when making requests to the token endpoint.
                                                                  - If the client type is confidential or the client was issued client
                                                                  credentials (or assigned other authentication requirements), the
                                                                  client MUST authenticate with the authorization server as described
                                                                  in Section 3.2.1.

                                                                  func (*Fosite) NewAccessResponse

                                                                  func (f *Fosite) NewAccessResponse(ctx context.Context, requester AccessRequester) (AccessResponder, error)

                                                                  func (*Fosite) NewAuthorizeRequest

                                                                  func (f *Fosite) NewAuthorizeRequest(ctx context.Context, r *http.Request) (AuthorizeRequester, error)

                                                                  func (*Fosite) NewAuthorizeResponse

                                                                  func (f *Fosite) NewAuthorizeResponse(ctx context.Context, ar AuthorizeRequester, session Session) (AuthorizeResponder, error)

                                                                  func (*Fosite) NewIntrospectionRequest

                                                                  func (f *Fosite) NewIntrospectionRequest(ctx context.Context, r *http.Request, session Session) (IntrospectionResponder, error)

                                                                    NewIntrospectionRequest initiates token introspection as defined in

                                                                    The protected resource calls the introspection endpoint using an HTTP POST [RFC7231] request with parameters sent as "application/x-www-form-urlencoded" data as defined in [W3C.REC-html5-20141028]. The protected resource sends a parameter representing the token along with optional parameters representing additional context that is known by the protected resource to aid the authorization server in its response.

                                                                    * token REQUIRED. The string value of the token. For access tokens, this is the "access_token" value returned from the token endpoint defined in OAuth 2.0 [RFC6749], Section 5.1. For refresh tokens, this is the "refresh_token" value returned from the token endpoint as defined in OAuth 2.0 [RFC6749], Section 5.1. Other token types are outside the scope of this specification.

                                                                    * token_type_hint OPTIONAL. A hint about the type of the token submitted for introspection. The protected resource MAY pass this parameter to help the authorization server optimize the token lookup. If the server is unable to locate the token using the given hint, it MUST extend its search across all of its supported token types. An authorization server MAY ignore this parameter, particularly if it is able to detect the token type automatically. Values for this field are defined in the "OAuth Token Type Hints" registry defined in OAuth Token Revocation [RFC7009].

                                                                    The introspection endpoint MAY accept other OPTIONAL parameters to provide further context to the query. For instance, an authorization server may desire to know the IP address of the client accessing the protected resource to determine if the correct client is likely to be presenting the token. The definition of this or any other parameters are outside the scope of this specification, to be defined by service documentation or extensions to this specification. If the authorization server is unable to determine the state of the token without additional information, it SHOULD return an introspection response indicating the token is not active as described in Section 2.2.

                                                                    To prevent token scanning attacks, the endpoint MUST also require some form of authorization to access this endpoint, such as client authentication as described in OAuth 2.0 [RFC6749] or a separate OAuth 2.0 access token such as the bearer token described in OAuth 2.0 Bearer Token Usage [RFC6750]. The methods of managing and validating these authentication credentials are out of scope of this specification.

                                                                    For example, the following shows a protected resource calling the token introspection endpoint to query about an OAuth 2.0 bearer token. The protected resource is using a separate OAuth 2.0 bearer token to authorize this call.

                                                                    The following is a non-normative example request:

                                                                    POST /introspect HTTP/1.1
                                                                    Accept: application/json
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Authorization: Bearer 23410913-abewfq.123483

                                                                    In this example, the protected resource uses a client identifier and client secret to authenticate itself to the introspection endpoint. The protected resource also sends a token type hint indicating that it is inquiring about an access token.

                                                                    The following is a non-normative example request:

                                                                    POST /introspect HTTP/1.1
                                                                    Accept: application/json
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Authorization: Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW

                                                                    func (*Fosite) NewRevocationRequest

                                                                    func (f *Fosite) NewRevocationRequest(ctx context.Context, r *http.Request) error

                                                                      NewRevocationRequest handles incoming token revocation requests and validates various parameters as specified in:

                                                                      The authorization server first validates the client credentials (in case of a confidential client) and then verifies whether the token was issued to the client making the revocation request. If this validation fails, the request is refused and the client is informed of the error by the authorization server as described below.

                                                                      In the next step, the authorization server invalidates the token. The invalidation takes place immediately, and the token cannot be used again after the revocation.

                                                                      * An invalid token type hint value is ignored by the authorization server and does not influence the revocation response.

                                                                      func (*Fosite) ParseResponseMode

                                                                      func (f *Fosite) ParseResponseMode(r *http.Request, request *AuthorizeRequest) error

                                                                      func (*Fosite) WriteAccessError

                                                                      func (f *Fosite) WriteAccessError(rw http.ResponseWriter, _ AccessRequester, err error)

                                                                      func (*Fosite) WriteAccessResponse

                                                                      func (f *Fosite) WriteAccessResponse(rw http.ResponseWriter, requester AccessRequester, responder AccessResponder)

                                                                      func (*Fosite) WriteAuthorizeError

                                                                      func (f *Fosite) WriteAuthorizeError(rw http.ResponseWriter, ar AuthorizeRequester, err error)

                                                                      func (*Fosite) WriteAuthorizeResponse

                                                                      func (f *Fosite) WriteAuthorizeResponse(rw http.ResponseWriter, ar AuthorizeRequester, resp AuthorizeResponder)

                                                                      func (*Fosite) WriteIntrospectionError

                                                                      func (f *Fosite) WriteIntrospectionError(rw http.ResponseWriter, err error)

                                                                        WriteIntrospectionError responds with token metadata discovered by token introspection as defined in

                                                                        If the protected resource uses OAuth 2.0 client credentials to authenticate to the introspection endpoint and its credentials are invalid, the authorization server responds with an HTTP 401 (Unauthorized) as described in Section 5.2 of OAuth 2.0 [RFC6749].

                                                                        If the protected resource uses an OAuth 2.0 bearer token to authorize its call to the introspection endpoint and the token used for authorization does not contain sufficient privileges or is otherwise invalid for this request, the authorization server responds with an HTTP 401 code as described in Section 3 of OAuth 2.0 Bearer Token Usage [RFC6750].

                                                                        Note that a properly formed and authorized query for an inactive or otherwise invalid token (or a token the protected resource is not allowed to know about) is not considered an error response by this specification. In these cases, the authorization server MUST instead respond with an introspection response with the "active" field set to "false" as described in Section 2.2.

                                                                        func (*Fosite) WriteIntrospectionResponse

                                                                        func (f *Fosite) WriteIntrospectionResponse(rw http.ResponseWriter, r IntrospectionResponder)

                                                                          WriteIntrospectionResponse responds with an error if token introspection failed as defined in

                                                                          The server responds with a JSON object [RFC7159] in "application/ json" format with the following top-level members.

                                                                          * active REQUIRED. Boolean indicator of whether or not the presented token is currently active. The specifics of a token's "active" state will vary depending on the implementation of the authorization server and the information it keeps about its tokens, but a "true" value return for the "active" property will generally indicate that a given token has been issued by this authorization server, has not been revoked by the resource owner, and is within its given time window of validity (e.g., after its issuance time and before its expiration time). See Section 4 for information on implementation of such checks.

                                                                          * scope OPTIONAL. A JSON string containing a space-separated list of scopes associated with this token, in the format described in Section 3.3 of OAuth 2.0 [RFC6749].

                                                                          * client_id OPTIONAL. Client identifier for the OAuth 2.0 client that requested this token.

                                                                          * username OPTIONAL. Human-readable identifier for the resource owner who authorized this token.

                                                                          * token_type OPTIONAL. Type of the token as defined in Section 5.1 of OAuth 2.0 [RFC6749].

                                                                          * exp OPTIONAL. Integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token will expire, as defined in JWT [RFC7519].

                                                                          * iat OPTIONAL. Integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token was originally issued, as defined in JWT [RFC7519].

                                                                          * nbf OPTIONAL. Integer timestamp, measured in the number of seconds since January 1 1970 UTC, indicating when this token is not to be used before, as defined in JWT [RFC7519].

                                                                          * sub OPTIONAL. Subject of the token, as defined in JWT [RFC7519]. Usually a machine-readable identifier of the resource owner who authorized this token.

                                                                          * aud OPTIONAL. Service-specific string identifier or list of string identifiers representing the intended audience for this token, as defined in JWT [RFC7519].

                                                                          * iss OPTIONAL. String representing the issuer of this token, as defined in JWT [RFC7519].

                                                                          * jti OPTIONAL. String identifier for the token, as defined in JWT [RFC7519].

                                                                          Specific implementations MAY extend this structure with their own service-specific response names as top-level members of this JSON object. Response names intended to be used across domains MUST be registered in the "OAuth Token Introspection Response" registry defined in Section 3.1.

                                                                          The authorization server MAY respond differently to different protected resources making the same request. For instance, an authorization server MAY limit which scopes from a given token are returned for each protected resource to prevent a protected resource from learning more about the larger network than is necessary for its operation.

                                                                          The response MAY be cached by the protected resource to improve performance and reduce load on the introspection endpoint, but at the cost of liveness of the information used by the protected resource to make authorization decisions. See Section 4 for more information regarding the trade off when the response is cached.

                                                                          For example, the following response contains a set of information about an active token:

                                                                          The following is a non-normative example response:

                                                                          HTTP/1.1 200 OK
                                                                          Content-Type: application/json
                                                                            "active": true,
                                                                            "client_id": "l238j323ds-23ij4",
                                                                            "username": "jdoe",
                                                                            "scope": "read write dolphin",
                                                                            "sub": "Z5O3upPC88QrAjx00dis",
                                                                            "aud": "",
                                                                            "iss": "",
                                                                            "exp": 1419356238,
                                                                            "iat": 1419350238,
                                                                            "extension_field": "twenty-seven"

                                                                          If the introspection call is properly authorized but the token is not active, does not exist on this server, or the protected resource is not allowed to introspect this particular token, then the authorization server MUST return an introspection response with the "active" field set to "false". Note that to avoid disclosing too much of the authorization server's state to a third party, the authorization server SHOULD NOT include any additional information about an inactive token, including why the token is inactive.

                                                                          The following is a non-normative example response for a token that has been revoked or is otherwise invalid:

                                                                          HTTP/1.1 200 OK
                                                                          Content-Type: application/json
                                                                            "active": false

                                                                          func (*Fosite) WriteRevocationResponse

                                                                          func (f *Fosite) WriteRevocationResponse(rw http.ResponseWriter, err error)

                                                                            WriteRevocationResponse writes a token revocation response as specified in:

                                                                            The authorization server responds with HTTP status code 200 if the token has been revoked successfully or if the client submitted an invalid token.

                                                                            Note: invalid tokens do not cause an error response since the client cannot handle such an error in a reasonable way. Moreover, the purpose of the revocation request, invalidating the particular token, is already achieved.

                                                                            type Hasher

                                                                            type Hasher interface {
                                                                            	// Compare compares data with a hash and returns an error
                                                                            	// if the two do not match.
                                                                            	Compare(ctx context.Context, hash, data []byte) error
                                                                            	// Hash creates a hash from data or returns an error.
                                                                            	Hash(ctx context.Context, data []byte) ([]byte, error)

                                                                              Hasher defines how a oauth2-compatible hasher should look like.

                                                                              type IntrospectionResponder

                                                                              type IntrospectionResponder interface {
                                                                              	// IsActive returns true if the introspected token is active and false otherwise.
                                                                              	IsActive() bool
                                                                              	// AccessRequester returns nil when IsActive() is false and the original access request object otherwise.
                                                                              	GetAccessRequester() AccessRequester
                                                                              	// GetTokenUse optionally returns the type of the token that was introspected. This could be "access_token", "refresh_token",
                                                                              	// or if the type can not be determined an empty string.
                                                                              	GetTokenUse() TokenUse
                                                                              	//GetAccessTokenType optionally returns the type of the access token that was introspected. This could be "bearer", "mac",
                                                                              	// or empty string if the type of the token is refresh token.
                                                                              	GetAccessTokenType() string

                                                                                IntrospectionResponder is the response object that will be returned when token introspection was successful, for example when the client is allowed to perform token introspection. Refer to for more details.

                                                                                type IntrospectionResponse

                                                                                type IntrospectionResponse struct {
                                                                                	Active          bool            `json:"active"`
                                                                                	AccessRequester AccessRequester `json:"extra"`
                                                                                	TokenUse        TokenUse        `json:"token_use,omitempty"`
                                                                                	AccessTokenType string          `json:"token_type,omitempty"`

                                                                                func (*IntrospectionResponse) GetAccessRequester

                                                                                func (r *IntrospectionResponse) GetAccessRequester() AccessRequester

                                                                                func (*IntrospectionResponse) GetAccessTokenType

                                                                                func (r *IntrospectionResponse) GetAccessTokenType() string

                                                                                func (*IntrospectionResponse) GetTokenUse

                                                                                func (r *IntrospectionResponse) GetTokenUse() TokenUse

                                                                                func (*IntrospectionResponse) IsActive

                                                                                func (r *IntrospectionResponse) IsActive() bool

                                                                                type JWKSFetcherStrategy

                                                                                type JWKSFetcherStrategy interface {
                                                                                	// Resolve returns the JSON Web Key Set, or an error if something went wrong. The forceRefresh, if true, forces
                                                                                	// the strategy to fetch the keys from the remote. If forceRefresh is false, the strategy may use a caching strategy
                                                                                	// to fetch the key.
                                                                                	Resolve(location string, forceRefresh bool) (*jose.JSONWebKeySet, error)

                                                                                  JWKSFetcherStrategy is a strategy which pulls (optionally caches) JSON Web Key Sets from a location, typically a client's jwks_uri.

                                                                                  func NewDefaultJWKSFetcherStrategy

                                                                                  func NewDefaultJWKSFetcherStrategy() JWKSFetcherStrategy

                                                                                  type OAuth2Provider

                                                                                  type OAuth2Provider interface {
                                                                                  	// NewAuthorizeRequest returns an AuthorizeRequest.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// *
                                                                                  	//	 Extension response types MAY contain a space-delimited (%x20) list of
                                                                                  	//	 values, where the order of values does not matter (e.g., response
                                                                                  	//	 type "a b" is the same as "b a").  The meaning of such composite
                                                                                  	//	 response types is defined by their respective specifications.
                                                                                  	// *
                                                                                  	//   The redirection endpoint URI MUST be an absolute URI as defined by
                                                                                  	//   [RFC3986] Section 4.3.  The endpoint URI MAY include an
                                                                                  	//   "application/x-www-form-urlencoded" formatted (per Appendix B) query
                                                                                  	//   component ([RFC3986] Section 3.4), which MUST be retained when adding
                                                                                  	//   additional query parameters.  The endpoint URI MUST NOT include a
                                                                                  	//   fragment component.
                                                                                  	// * (everything MUST be implemented)
                                                                                  	NewAuthorizeRequest(ctx context.Context, req *http.Request) (AuthorizeRequester, error)
                                                                                  	// NewAuthorizeResponse iterates through all response type handlers and returns their result or
                                                                                  	// ErrUnsupportedResponseType if none of the handler's were able to handle it.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// *
                                                                                  	//	 Extension response types MAY contain a space-delimited (%x20) list of
                                                                                  	//	 values, where the order of values does not matter (e.g., response
                                                                                  	//	 type "a b" is the same as "b a").  The meaning of such composite
                                                                                  	//	 response types is defined by their respective specifications.
                                                                                  	//	 If an authorization request is missing the "response_type" parameter,
                                                                                  	//	 or if the response type is not understood, the authorization server
                                                                                  	//	 MUST return an error response as described in Section
                                                                                  	NewAuthorizeResponse(ctx context.Context, requester AuthorizeRequester, session Session) (AuthorizeResponder, error)
                                                                                  	// WriteAuthorizeError returns the error codes to the redirection endpoint or shows the error to the user, if no valid
                                                                                  	// redirect uri was given. Implements rfc6749#section-
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// *
                                                                                  	//   The redirection endpoint URI MUST be an absolute URI as defined by
                                                                                  	//   [RFC3986] Section 4.3.  The endpoint URI MAY include an
                                                                                  	//   "application/x-www-form-urlencoded" formatted (per Appendix B) query
                                                                                  	//   component ([RFC3986] Section 3.4), which MUST be retained when adding
                                                                                  	//   additional query parameters.  The endpoint URI MUST NOT include a
                                                                                  	//   fragment component.
                                                                                  	// * (everything)
                                                                                  	// * (everything MUST be implemented)
                                                                                  	WriteAuthorizeError(rw http.ResponseWriter, requester AuthorizeRequester, err error)
                                                                                  	// WriteAuthorizeResponse persists the AuthorizeSession in the store and redirects the user agent to the provided
                                                                                  	// redirect url or returns an error if storage failed.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// *
                                                                                  	//   After completing its interaction with the resource owner, the
                                                                                  	//   authorization server directs the resource owner's user-agent back to
                                                                                  	//   the client.  The authorization server redirects the user-agent to the
                                                                                  	//   client's redirection endpoint previously established with the
                                                                                  	//   authorization server during the client registration process or when
                                                                                  	//   making the authorization request.
                                                                                  	// * (everything MUST be implemented)
                                                                                  	WriteAuthorizeResponse(rw http.ResponseWriter, requester AuthorizeRequester, responder AuthorizeResponder)
                                                                                  	// NewAccessRequest creates a new access request object and validates
                                                                                  	// various parameters.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// * (everything)
                                                                                  	// * (everything)
                                                                                  	// Furthermore the registered handlers should implement their specs accordingly.
                                                                                  	NewAccessRequest(ctx context.Context, req *http.Request, session Session) (AccessRequester, error)
                                                                                  	// NewAccessResponse creates a new access response and validates that access_token and token_type are set.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	NewAccessResponse(ctx context.Context, requester AccessRequester) (AccessResponder, error)
                                                                                  	// WriteAccessError writes an access request error response.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	// * (everything)
                                                                                  	WriteAccessError(rw http.ResponseWriter, requester AccessRequester, err error)
                                                                                  	// WriteAccessResponse writes the access response.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	WriteAccessResponse(rw http.ResponseWriter, requester AccessRequester, responder AccessResponder)
                                                                                  	// NewRevocationRequest handles incoming token revocation requests and validates various parameters.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	NewRevocationRequest(ctx context.Context, r *http.Request) error
                                                                                  	// WriteRevocationResponse writes the revoke response.
                                                                                  	// The following specs must be considered in any implementation of this method:
                                                                                  	WriteRevocationResponse(rw http.ResponseWriter, err error)
                                                                                  	// IntrospectToken returns token metadata, if the token is valid. Tokens generated by the authorization endpoint,
                                                                                  	// such as the authorization code, can not be introspected.
                                                                                  	IntrospectToken(ctx context.Context, token string, tokenUse TokenUse, session Session, scope ...string) (TokenUse, AccessRequester, error)
                                                                                  	// NewIntrospectionRequest initiates token introspection as defined in
                                                                                  	NewIntrospectionRequest(ctx context.Context, r *http.Request, session Session) (IntrospectionResponder, error)
                                                                                  	// WriteIntrospectionError responds with an error if token introspection failed as defined in
                                                                                  	WriteIntrospectionError(rw http.ResponseWriter, err error)
                                                                                  	// WriteIntrospectionResponse responds with token metadata discovered by token introspection as defined in
                                                                                  	WriteIntrospectionResponse(rw http.ResponseWriter, r IntrospectionResponder)

                                                                                    OAuth2Provider is an interface that enables you to write OAuth2 handlers with only a few lines of code. Check fosite.Fosite for an implementation of this interface.

                                                                                    type OpenIDConnectClient

                                                                                    type OpenIDConnectClient interface {
                                                                                    	// GetRequestURIs is an array of request_uri values that are pre-registered by the RP for use at the OP. Servers MAY
                                                                                    	// cache the contents of the files referenced by these URIs and not retrieve them at the time they are used in a request.
                                                                                    	// OPs can require that request_uri values used be pre-registered with the require_request_uri_registration
                                                                                    	// discovery parameter.
                                                                                    	GetRequestURIs() []string
                                                                                    	// GetJSONWebKeys returns the JSON Web Key Set containing the public keys used by the client to authenticate.
                                                                                    	GetJSONWebKeys() *jose.JSONWebKeySet
                                                                                    	// GetJSONWebKeys returns the URL for lookup of JSON Web Key Set containing the
                                                                                    	// public keys used by the client to authenticate.
                                                                                    	GetJSONWebKeysURI() string
                                                                                    	// JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP.
                                                                                    	// All Request Objects from this Client MUST be rejected, if not signed with this algorithm.
                                                                                    	GetRequestObjectSigningAlgorithm() string
                                                                                    	// Requested Client Authentication method for the Token Endpoint. The options are client_secret_post,
                                                                                    	// client_secret_basic, client_secret_jwt, private_key_jwt, and none.
                                                                                    	GetTokenEndpointAuthMethod() string
                                                                                    	// JWS [JWS] alg algorithm [JWA] that MUST be used for signing the JWT [JWT] used to authenticate the
                                                                                    	// Client at the Token Endpoint for the private_key_jwt and client_secret_jwt authentication methods.
                                                                                    	GetTokenEndpointAuthSigningAlgorithm() string

                                                                                      OpenIDConnectClient represents a client capable of performing OpenID Connect requests.

                                                                                      type RFC6749Error

                                                                                      type RFC6749Error struct {
                                                                                      	ErrorField       string
                                                                                      	DescriptionField string
                                                                                      	HintField        string
                                                                                      	CodeField        int
                                                                                      	DebugField       string
                                                                                      	// contains filtered or unexported fields

                                                                                      func ErrorToRFC6749Error

                                                                                      func ErrorToRFC6749Error(err error) *RFC6749Error

                                                                                      func (*RFC6749Error) Cause

                                                                                      func (e *RFC6749Error) Cause() error

                                                                                      func (*RFC6749Error) Debug

                                                                                      func (e *RFC6749Error) Debug() string

                                                                                      func (RFC6749Error) Error

                                                                                      func (e RFC6749Error) Error() string

                                                                                      func (*RFC6749Error) GetDescription

                                                                                      func (e *RFC6749Error) GetDescription() string

                                                                                        GetDescription returns a more description description, combined with hint and debug (when available).

                                                                                        func (RFC6749Error) Is

                                                                                        func (e RFC6749Error) Is(err error) bool

                                                                                        func (RFC6749Error) MarshalJSON

                                                                                        func (e RFC6749Error) MarshalJSON() ([]byte, error)

                                                                                        func (*RFC6749Error) Reason

                                                                                        func (e *RFC6749Error) Reason() string

                                                                                        func (*RFC6749Error) RequestID

                                                                                        func (e *RFC6749Error) RequestID() string

                                                                                        func (*RFC6749Error) Sanitize

                                                                                        func (e *RFC6749Error) Sanitize() *RFC6749Error

                                                                                          Sanitize strips the debug field

                                                                                          Deprecated: Use WithExposeDebug instead.

                                                                                          func (*RFC6749Error) StackTrace

                                                                                          func (e *RFC6749Error) StackTrace() (trace errors.StackTrace)

                                                                                            StackTrace returns the error's stack trace.

                                                                                            func (*RFC6749Error) Status

                                                                                            func (e *RFC6749Error) Status() string

                                                                                            func (*RFC6749Error) StatusCode

                                                                                            func (e *RFC6749Error) StatusCode() int

                                                                                            func (*RFC6749Error) ToValues

                                                                                            func (e *RFC6749Error) ToValues() url.Values

                                                                                            func (*RFC6749Error) UnmarshalJSON

                                                                                            func (e *RFC6749Error) UnmarshalJSON(b []byte) error

                                                                                            func (RFC6749Error) Unwrap

                                                                                            func (e RFC6749Error) Unwrap() error

                                                                                            func (*RFC6749Error) WithDebug

                                                                                            func (e *RFC6749Error) WithDebug(debug string) *RFC6749Error

                                                                                            func (*RFC6749Error) WithDebugf

                                                                                            func (e *RFC6749Error) WithDebugf(debug string, args ...interface{}) *RFC6749Error

                                                                                            func (*RFC6749Error) WithDescription

                                                                                            func (e *RFC6749Error) WithDescription(description string) *RFC6749Error

                                                                                            func (*RFC6749Error) WithExposeDebug

                                                                                            func (e *RFC6749Error) WithExposeDebug(exposeDebug bool) *RFC6749Error

                                                                                              WithExposeDebug if set to true exposes debug messages

                                                                                              func (*RFC6749Error) WithHint

                                                                                              func (e *RFC6749Error) WithHint(hint string) *RFC6749Error

                                                                                              func (*RFC6749Error) WithHintf

                                                                                              func (e *RFC6749Error) WithHintf(hint string, args ...interface{}) *RFC6749Error

                                                                                              func (RFC6749Error) WithLegacyFormat

                                                                                              func (e RFC6749Error) WithLegacyFormat(useLegacyFormat bool) *RFC6749Error

                                                                                              func (*RFC6749Error) WithTrace

                                                                                              func (e *RFC6749Error) WithTrace(err error) *RFC6749Error

                                                                                              func (RFC6749Error) WithWrap

                                                                                              func (e RFC6749Error) WithWrap(cause error) *RFC6749Error

                                                                                              func (*RFC6749Error) Wrap

                                                                                              func (e *RFC6749Error) Wrap(err error)

                                                                                              type RFC6749ErrorJson

                                                                                              type RFC6749ErrorJson struct {
                                                                                              	Name        string `json:"error"`
                                                                                              	Description string `json:"error_description"`
                                                                                              	Hint        string `json:"error_hint,omitempty"`
                                                                                              	Code        int    `json:"status_code,omitempty"`
                                                                                              	Debug       string `json:"error_debug,omitempty"`

                                                                                                RFC6749ErrorJson is a helper struct for JSON encoding/decoding of RFC6749Error.

                                                                                                type Request

                                                                                                type Request struct {
                                                                                                	ID                string     `json:"id" gorethink:"id"`
                                                                                                	RequestedAt       time.Time  `json:"requestedAt" gorethink:"requestedAt"`
                                                                                                	Client            Client     `json:"client" gorethink:"client"`
                                                                                                	RequestedScope    Arguments  `json:"scopes" gorethink:"scopes"`
                                                                                                	GrantedScope      Arguments  `json:"grantedScopes" gorethink:"grantedScopes"`
                                                                                                	Form              url.Values `json:"form" gorethink:"form"`
                                                                                                	Session           Session    `json:"session" gorethink:"session"`
                                                                                                	RequestedAudience Arguments  `json:"requestedAudience"`
                                                                                                	GrantedAudience   Arguments  `json:"grantedAudience"`

                                                                                                  Request is an implementation of Requester

                                                                                                  func NewRequest

                                                                                                  func NewRequest() *Request

                                                                                                  func (*Request) AppendRequestedAudience

                                                                                                  func (a *Request) AppendRequestedAudience(audience string)

                                                                                                  func (*Request) AppendRequestedScope

                                                                                                  func (a *Request) AppendRequestedScope(scope string)

                                                                                                  func (*Request) GetClient

                                                                                                  func (a *Request) GetClient() Client

                                                                                                  func (*Request) GetGrantedAudience

                                                                                                  func (a *Request) GetGrantedAudience() Arguments

                                                                                                  func (*Request) GetGrantedScopes

                                                                                                  func (a *Request) GetGrantedScopes() Arguments

                                                                                                  func (*Request) GetID

                                                                                                  func (a *Request) GetID() string

                                                                                                  func (*Request) GetRequestForm

                                                                                                  func (a *Request) GetRequestForm() url.Values

                                                                                                  func (*Request) GetRequestedAt

                                                                                                  func (a *Request) GetRequestedAt() time.Time

                                                                                                  func (*Request) GetRequestedAudience

                                                                                                  func (a *Request) GetRequestedAudience() (audience Arguments)

                                                                                                  func (*Request) GetRequestedScopes

                                                                                                  func (a *Request) GetRequestedScopes() Arguments

                                                                                                  func (*Request) GetSession

                                                                                                  func (a *Request) GetSession() Session

                                                                                                  func (*Request) GrantAudience

                                                                                                  func (a *Request) GrantAudience(audience string)

                                                                                                  func (*Request) GrantScope

                                                                                                  func (a *Request) GrantScope(scope string)

                                                                                                  func (*Request) Merge

                                                                                                  func (a *Request) Merge(request Requester)

                                                                                                  func (*Request) Sanitize

                                                                                                  func (a *Request) Sanitize(allowedParameters []string) Requester

                                                                                                  func (*Request) SetID

                                                                                                  func (a *Request) SetID(id string)

                                                                                                  func (*Request) SetRequestedAudience

                                                                                                  func (a *Request) SetRequestedAudience(s Arguments)

                                                                                                  func (*Request) SetRequestedScopes

                                                                                                  func (a *Request) SetRequestedScopes(s Arguments)

                                                                                                  func (*Request) SetSession

                                                                                                  func (a *Request) SetSession(session Session)

                                                                                                  type Requester

                                                                                                  type Requester interface {
                                                                                                  	// SetID sets the unique identifier.
                                                                                                  	SetID(id string)
                                                                                                  	// GetID returns a unique identifier.
                                                                                                  	GetID() string
                                                                                                  	// GetRequestedAt returns the time the request was created.
                                                                                                  	GetRequestedAt() (requestedAt time.Time)
                                                                                                  	// GetClient returns the request's client.
                                                                                                  	GetClient() (client Client)
                                                                                                  	// GetRequestedScopes returns the request's scopes.
                                                                                                  	GetRequestedScopes() (scopes Arguments)
                                                                                                  	// GetRequestedAudience returns the requested audiences for this request.
                                                                                                  	GetRequestedAudience() (audience Arguments)
                                                                                                  	// SetRequestedScopes sets the request's scopes.
                                                                                                  	SetRequestedScopes(scopes Arguments)
                                                                                                  	// SetRequestedAudience sets the requested audience.
                                                                                                  	SetRequestedAudience(audience Arguments)
                                                                                                  	// AppendRequestedScope appends a scope to the request.
                                                                                                  	AppendRequestedScope(scope string)
                                                                                                  	// GetGrantScopes returns all granted scopes.
                                                                                                  	GetGrantedScopes() (grantedScopes Arguments)
                                                                                                  	// GetGrantedAudience returns all granted audiences.
                                                                                                  	GetGrantedAudience() (grantedAudience Arguments)
                                                                                                  	// GrantScope marks a request's scope as granted.
                                                                                                  	GrantScope(scope string)
                                                                                                  	// GrantAudience marks a request's audience as granted.
                                                                                                  	GrantAudience(audience string)
                                                                                                  	// GetSession returns a pointer to the request's session or nil if none is set.
                                                                                                  	GetSession() (session Session)
                                                                                                  	// SetSession sets the request's session pointer.
                                                                                                  	SetSession(session Session)
                                                                                                  	// GetRequestForm returns the request's form input.
                                                                                                  	GetRequestForm() url.Values
                                                                                                  	// Merge merges the argument into the method receiver.
                                                                                                  	Merge(requester Requester)
                                                                                                  	// Sanitize returns a sanitized clone of the request which can be used for storage.
                                                                                                  	Sanitize(allowedParameters []string) Requester

                                                                                                    Requester is an abstract interface for handling requests in Fosite.

                                                                                                    type ResponseModeClient

                                                                                                    type ResponseModeClient interface {
                                                                                                    	// GetResponseMode returns the response modes that client is allowed to send
                                                                                                    	GetResponseModes() []ResponseModeType

                                                                                                      ResponseModeClient represents a client capable of handling response_mode

                                                                                                      type ResponseModeType

                                                                                                      type ResponseModeType string

                                                                                                      type RevocationHandler

                                                                                                      type RevocationHandler interface {
                                                                                                      	// RevokeToken handles access and refresh token revocation.
                                                                                                      	RevokeToken(ctx context.Context, token string, tokenType TokenType, client Client) error

                                                                                                        RevocationHandler is the interface that allows token revocation for an OAuth2.0 provider.

                                                                                                        RevokeToken is invoked after a new token revocation request is parsed.

                                                                                               If the particular token is a refresh token and the authorization server supports the revocation of access tokens, then the authorization server SHOULD also invalidate all access tokens based on the same authorization grant (see Implementation Note). If the token passed to the request is an access token, the server MAY revoke the respective refresh token as well.

                                                                                                        type RevocationHandlers

                                                                                                        type RevocationHandlers []RevocationHandler

                                                                                                          RevocationHandlers is a list of RevocationHandler

                                                                                                          func (*RevocationHandlers) Append

                                                                                                            Append adds an RevocationHandler to this list. Ignores duplicates based on reflect.TypeOf.

                                                                                                            type ScopeStrategy

                                                                                                            type ScopeStrategy func(haystack []string, needle string) bool

                                                                                                              ScopeStrategy is a strategy for matching scopes.

                                                                                                              type Session

                                                                                                              type Session interface {
                                                                                                              	// SetExpiresAt sets the expiration time of a token.
                                                                                                              	//  session.SetExpiresAt(fosite.AccessToken, time.Now().UTC().Add(time.Hour))
                                                                                                              	SetExpiresAt(key TokenType, exp time.Time)
                                                                                                              	// GetExpiresAt returns the expiration time of a token if set, or time.IsZero() if not.
                                                                                                              	//  session.GetExpiresAt(fosite.AccessToken)
                                                                                                              	GetExpiresAt(key TokenType) time.Time
                                                                                                              	// GetUsername returns the username, if set. This is optional and only used during token introspection.
                                                                                                              	GetUsername() string
                                                                                                              	// GetSubject returns the subject, if set. This is optional and only used during token introspection.
                                                                                                              	GetSubject() string
                                                                                                              	// Clone clones the session.
                                                                                                              	Clone() Session

                                                                                                                Session is an interface that is used to store session data between OAuth2 requests. It can be used to look up when a session expires or what the subject's name was.

                                                                                                                type Storage

                                                                                                                type Storage interface {

                                                                                                                  Storage defines fosite's minimal storage interface.

                                                                                                                  type TokenEndpointHandler

                                                                                                                  type TokenEndpointHandler interface {
                                                                                                                  	// PopulateTokenEndpointResponse is responsible for setting return values and should only be executed if
                                                                                                                  	// the handler's HandleTokenEndpointRequest did not return ErrUnknownRequest.
                                                                                                                  	PopulateTokenEndpointResponse(ctx context.Context, requester AccessRequester, responder AccessResponder) error
                                                                                                                  	// HandleTokenEndpointRequest handles an authorize request. If the handler is not responsible for handling
                                                                                                                  	// the request, this method should return ErrUnknownRequest and otherwise handle the request.
                                                                                                                  	HandleTokenEndpointRequest(ctx context.Context, requester AccessRequester) error
                                                                                                                  	// CanSkipClientAuth indicates if client authentication can be skipped. By default it MUST be false, unless you are
                                                                                                                  	// implementing extension grant type, which allows unauthenticated client. CanSkipClientAuth must be called
                                                                                                                  	// before HandleTokenEndpointRequest to decide, if AccessRequester will contain authenticated client.
                                                                                                                  	CanSkipClientAuth(requester AccessRequester) bool
                                                                                                                  	// CanHandleRequest indicates, if TokenEndpointHandler can handle this request or not. If true,
                                                                                                                  	// HandleTokenEndpointRequest can be called.
                                                                                                                  	CanHandleTokenEndpointRequest(requester AccessRequester) bool

                                                                                                                  type TokenEndpointHandlers

                                                                                                                  type TokenEndpointHandlers []TokenEndpointHandler

                                                                                                                    TokenEndpointHandlers is a list of TokenEndpointHandler

                                                                                                                    func (*TokenEndpointHandlers) Append

                                                                                                                      Append adds an TokenEndpointHandler to this list. Ignores duplicates based on reflect.TypeOf.

                                                                                                                      type TokenIntrospectionHandlers

                                                                                                                      type TokenIntrospectionHandlers []TokenIntrospector

                                                                                                                        TokenIntrospectionHandlers is a list of TokenValidator

                                                                                                                        func (*TokenIntrospectionHandlers) Append

                                                                                                                          Append adds an AccessTokenValidator to this list. Ignores duplicates based on reflect.TypeOf.

                                                                                                                          type TokenIntrospector

                                                                                                                          type TokenIntrospector interface {
                                                                                                                          	IntrospectToken(ctx context.Context, token string, tokenUse TokenUse, accessRequest AccessRequester, scopes []string) (TokenUse, error)

                                                                                                                          type TokenType

                                                                                                                          type TokenType string

                                                                                                                          type TokenUse

                                                                                                                          type TokenUse = TokenType


                                                                                                                          Path Synopsis
                                                                                                                          Package internal is a generated GoMock package.
                                                                                                                          Package internal is a generated GoMock package.