language
stringlengths 0
24
| filename
stringlengths 9
214
| code
stringlengths 99
9.93M
|
---|---|---|
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0003.json | {
"ID": "sig-0003",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0003",
"ConsentChallenge": {
"String": "",
"Valid": false
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0003",
"GrantedScope": "granted_scope-0003",
"RequestedAudience": "",
"GrantedAudience": "",
"Form": "form_data-0003",
"Subject": "subject-0003",
"Active": true,
"Session": "c2Vzc2lvbi0wMDAz",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0004.json | {
"ID": "sig-0004",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0004",
"ConsentChallenge": {
"String": "",
"Valid": false
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0004",
"GrantedScope": "granted_scope-0004",
"RequestedAudience": "",
"GrantedAudience": "",
"Form": "form_data-0004",
"Subject": "subject-0004",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA0",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0005.json | {
"ID": "sig-0005",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0005",
"ConsentChallenge": {
"String": "",
"Valid": false
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0005",
"GrantedScope": "granted_scope-0005",
"RequestedAudience": "",
"GrantedAudience": "",
"Form": "form_data-0005",
"Subject": "subject-0005",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA1",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0006.json | {
"ID": "sig-0006",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0006",
"ConsentChallenge": {
"String": "",
"Valid": false
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0006",
"GrantedScope": "granted_scope-0006",
"RequestedAudience": "",
"GrantedAudience": "",
"Form": "form_data-0006",
"Subject": "subject-0006",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA2",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0007.json | {
"ID": "sig-0007",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0007",
"ConsentChallenge": {
"String": "",
"Valid": false
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0007",
"GrantedScope": "granted_scope-0007",
"RequestedAudience": "requested_audience-0007",
"GrantedAudience": "granted_audience-0007",
"Form": "form_data-0007",
"Subject": "subject-0007",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA3",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0008.json | {
"ID": "sig-0008",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0008",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0008",
"GrantedScope": "granted_scope-0008",
"RequestedAudience": "requested_audience-0008",
"GrantedAudience": "granted_audience-0008",
"Form": "form_data-0008",
"Subject": "subject-0008",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA4",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0009.json | {
"ID": "sig-0009",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0009",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0009",
"GrantedScope": "granted_scope-0009",
"RequestedAudience": "requested_audience-0009",
"GrantedAudience": "granted_audience-0009",
"Form": "form_data-0009",
"Subject": "subject-0009",
"Active": false,
"Session": "c2Vzc2lvbi0wMDA5",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0010.json | {
"ID": "sig-0010",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0010",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0010",
"GrantedScope": "granted_scope-0010",
"RequestedAudience": "requested_audience-0010",
"GrantedAudience": "granted_audience-0010",
"Form": "form_data-0010",
"Subject": "subject-0010",
"Active": false,
"Session": "c2Vzc2lvbi0wMDEw",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-0011.json | {
"ID": "sig-0011",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-0011",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0011",
"GrantedScope": "granted_scope-0011",
"RequestedAudience": "requested_audience-0011",
"GrantedAudience": "granted_audience-0011",
"Form": "form_data-0011",
"Subject": "subject-0011",
"Active": false,
"Session": "c2Vzc2lvbi0wMDEx",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-20201110104000-01.json | {
"ID": "sig-20201110104000-01",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-20201110104000",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0011",
"GrantedScope": "granted_scope-0011",
"RequestedAudience": "requested_audience-0011",
"GrantedAudience": "granted_audience-0011",
"Form": "form_data-0011",
"Subject": "subject-0011",
"Active": false,
"Session": "c2Vzc2lvbi0wMDEx",
"Table": ""
} |
JSON | hydra/persistence/sql/migratest/fixtures/hydra_oauth2_refresh/sig-20201110104000.json | {
"ID": "sig-20201110104000",
"NID": "00000000-0000-0000-0000-000000000000",
"Request": "req-20201110104000",
"ConsentChallenge": {
"String": "challenge-0014",
"Valid": true
},
"RequestedAt": "0001-01-01T00:00:00Z",
"Client": "",
"Scopes": "scope-0011",
"GrantedScope": "granted_scope-0011",
"RequestedAudience": "requested_audience-0011",
"GrantedAudience": "granted_audience-0011",
"Form": "form_data-0011",
"Subject": "subject-0011",
"Active": false,
"Session": "c2Vzc2lvbi0wMDEx",
"Table": ""
} |
SQL | hydra/persistence/sql/migratest/testdata/20150101000001_testdata.sql | -- INSERT INTO networks (id, created_at, updated_at) VALUES ('24704dcb-0ab9-4bfa-a84c-405932ae53fe', '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000001_testdata.sql | INSERT INTO hydra_client (id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, public) VALUES ('client-0001', 'Client 0001', 'secret-0001', 'http://redirect/0001_1', 'grant-0001_1', 'response-0001_1', 'scope-0001', 'owner-0001', 'http://policy/0001', 'http://tos/0001', 'http://client/0001', 'http://logo/0001', 'contact-0001_1', true); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000002_testdata.sql | INSERT INTO hydra_client (id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, public, client_secret_expires_at) VALUES ('client-0002', 'Client 0002', 'secret-0002', 'http://redirect/0002_1', 'grant-0002_1', 'response-0002_1', 'scope-0002', 'owner-0002', 'http://policy/0002', 'http://tos/0002', 'http://client/0002', 'http://logo/0002', 'contact-0002_1', true, 0); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000003_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, public, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg)
VALUES
('client-0003', 'Client 0003', 'secret-0003', 'http://redirect/0003_1', 'grant-0003_1', 'response-0003_1', 'scope-0003', 'owner-0003', 'http://policy/0003', 'http://tos/0003', 'http://client/0003', 'http://logo/0003', 'contact-0003_1', true, 0, NULL, NULL, NULL, 'http://request/0003_1', 'token_auth-0003', 'r_alg-0003', 'u_alg-0003'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000004_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, public, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg)
VALUES
('client-0004', 'Client 0004', 'secret-0004', 'http://redirect/0004_1', 'grant-0004_1', 'response-0004_1', 'scope-0004', 'owner-0004', 'http://policy/0004', 'http://tos/0004', 'http://client/0004', 'http://logo/0004', 'contact-0004_1', true, 0, 'http://sector_id/0004', '', 'http://jwks/0004', 'http://request/0004_1', 'token_auth-0004', 'r_alg-0004', 'u_alg-0004'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000005_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg)
VALUES
('client-0005', 'Client 0005', 'secret-0005', 'http://redirect/0005_1', 'grant-0005_1', 'response-0005_1', 'scope-0005', 'owner-0005', 'http://policy/0005', 'http://tos/0005', 'http://client/0005', 'http://logo/0005', 'contact-0005_1', 0, 'http://sector_id/0005', '', 'http://jwks/0005', 'http://request/0005_1', 'token_auth-0005', 'r_alg-0005', 'u_alg-0005'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000006_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type)
VALUES
('client-0006', 'Client 0006', 'secret-0006', 'http://redirect/0006_1', 'grant-0006_1', 'response-0006_1', 'scope-0006', 'owner-0006', 'http://policy/0006', 'http://tos/0006', 'http://client/0006', 'http://logo/0006', 'contact-0006_1', 0, 'http://sector_id/0006', '', 'http://jwks/0006', 'http://request/0006_1', 'token_auth-0006', 'r_alg-0006', 'u_alg-0006', 'subject-0006'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000007_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins)
VALUES
('client-0007', 'Client 0007', 'secret-0007', 'http://redirect/0007_1', 'grant-0007_1', 'response-0007_1', 'scope-0007', 'owner-0007', 'http://policy/0007', 'http://tos/0007', 'http://client/0007', 'http://logo/0007', 'contact-0007_1', 0, 'http://sector_id/0007', '', 'http://jwks/0007', 'http://request/0007_1', 'token_auth-0007', 'r_alg-0007', 'u_alg-0007', 'subject-0007', NULL); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000008_testdata.sql | INSERT INTO hydra_client
(id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins)
VALUES
('client-0008', 'Client 0008', 'secret-0008', 'http://redirect/0008_1', 'grant-0008_1', 'response-0008_1', 'scope-0008', 'owner-0008', 'http://policy/0008', 'http://tos/0008', 'http://client/0008', 'http://logo/0008', 'contact-0008_1', 0, 'http://sector_id/0008', '', 'http://jwks/0008', 'http://request/0008_1', 'token_auth-0008', 'r_alg-0008', 'u_alg-0008', 'subject-0008', 'http://cors/0008_1'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000009_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins)
VALUES
(0009, 'client-0009', 'Client 0009', 'secret-0009', 'http://redirect/0009_1', 'grant-0009_1', 'response-0009_1', 'scope-0009', 'owner-0009', 'http://policy/0009', 'http://tos/0009', 'http://client/0009', 'http://logo/0009', 'contact-0009_1', 0, 'http://sector_id/0009', '', 'http://jwks/0009', 'http://request/0009_1', 'token_auth-0009', 'r_alg-0009', 'u_alg-0009', 'subject-0009', 'http://cors/0009_1'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000010_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience)
VALUES
(0010, 'client-0010', 'Client 0010', 'secret-0010', 'http://redirect/0010_1', 'grant-0010_1', 'response-0010_1', 'scope-0010', 'owner-0010', 'http://policy/0010', 'http://tos/0010', 'http://client/0010', 'http://logo/0010', 'contact-0010_1', 0, 'http://sector_id/0010', '', 'http://jwks/0010', 'http://request/0010_1', 'token_auth-0010', 'r_alg-0010', 'u_alg-0010', 'subject-0010', 'http://cors/0010_1', NULL); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000011_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience)
VALUES
(0011, 'client-0011', 'Client 0011', 'secret-0011', 'http://redirect/0011_1', 'grant-0011_1', 'response-0011_1', 'scope-0011', 'owner-0011', 'http://policy/0011', 'http://tos/0011', 'http://client/0011', 'http://logo/0011', 'contact-0011_1', 0, 'http://sector_id/0011', '', 'http://jwks/0011', 'http://request/0011_1', 'token_auth-0011', 'r_alg-0011', 'u_alg-0011', 'subject-0011', 'http://cors/0011_1', 'autdience-0011_1'); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000012_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience, created_at, updated_at)
VALUES
(0012, 'client-0012', 'Client 0012', 'secret-0012', 'http://redirect/0012_1', 'grant-0012_1', 'response-0012_1', 'scope-0012', 'owner-0012', 'http://policy/0012', 'http://tos/0012', 'http://client/0012', 'http://logo/0012', 'contact-0012_1', 0, 'http://sector_id/0012', '', 'http://jwks/0012', 'http://request/0012_1', 'token_auth-0012', 'r_alg-0012', 'u_alg-0012', 'subject-0012', 'http://cors/0012_1', 'autdience-0012_1', now(), now()); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000013_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required)
VALUES
(0013, 'client-0013', 'Client 0013', 'secret-0013', 'http://redirect/0013_1', 'grant-0013_1', 'response-0013_1', 'scope-0013', 'owner-0013', 'http://policy/0013', 'http://tos/0013', 'http://client/0013', 'http://logo/0013', 'contact-0013_1', 0, 'http://sector_id/0013', '', 'http://jwks/0013', 'http://request/0013_1', 'token_auth-0013', 'r_alg-0013', 'u_alg-0013', 'subject-0013', 'http://cors/0013_1', 'autdience-0013_1', now(), now(), 'http://front_logout/0013', true, 'http://post_redirect/0013_1', 'http://back_logout/0013', true); |
SQL | hydra/persistence/sql/migratest/testdata/20190100000014_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata)
VALUES
(0014, 'client-0014', 'Client 0014', 'secret-0014', 'http://redirect/0014_1', 'grant-0014_1', 'response-0014_1', 'scope-0014', 'owner-0014', 'http://policy/0014', 'http://tos/0014', 'http://client/0014', 'http://logo/0014', 'contact-0014_1', 0, 'http://sector_id/0014', '', 'http://jwks/0014', 'http://request/0014_1', 'token_auth-0014', 'r_alg-0014', 'u_alg-0014', 'subject-0014', 'http://cors/0014_1', 'autdience-0014_1', now(), now(), 'http://front_logout/0014', true, 'http://post_redirect/0014_1', 'http://back_logout/0014', true, '{"migration": "0014"}'); |
SQL | hydra/persistence/sql/migratest/testdata/20190200000002_testdata.sql | INSERT INTO hydra_jwk
(sid, kid, version, keydata, created_at)
VALUES
('sid-0002', 'kid-0002', 2, 'key-0002', now()); |
SQL | hydra/persistence/sql/migratest/testdata/20190200000003_testdata.sql | INSERT INTO hydra_jwk
(sid, kid, version, keydata, created_at)
VALUES
('sid-0003', 'kid-0003', 3, 'key-0003', now()); |
SQL | hydra/persistence/sql/migratest/testdata/20190200000004_testdata.sql | INSERT INTO hydra_jwk
(sid, kid, version, keydata, created_at, pk)
VALUES
('sid-0004', 'kid-0004', 4, 'key-0004', now(), 4); |
SQL | hydra/persistence/sql/migratest/testdata/20190300000001_testdata.sql | -- The contents of this file were moved into 20190300000003_testdata.sql due to
-- conflicting requirements:
--
-- 1. The test cases whose data used to be in this file (used to) require the
-- ability to load a consent challenge with NULL login_challenge (the column is
-- added in migration 20190300000003).
--
-- 2. Hydra 2.x requires login_challenge not to be NULL. ***The 2.x migrations
-- delete consent challenges with NULL login_challenge.***
--
-- Instead of completely removing the test cases in this file, we decided to populate
-- the login_challenge column and move the test cases into 20190300000003. |
SQL | hydra/persistence/sql/migratest/testdata/20190300000002_testdata.sql | -- The contents of this file were moved into 20190300000003_testdata.sql due to
-- conflicting requirements:
--
-- 1. The test cases whose data used to be in this file (used to) require the
-- ability to load a consent challenge with NULL login_challenge (the column is
-- added in migration 20190300000003).
--
-- 2. Hydra 2.x requires login_challenge not to be NULL. ***The 2.x migrations
-- delete consent challenges with NULL login_challenge.***
--
-- Instead of completely removing the test cases in this file, we decided to populate
-- the login_challenge column and move the test cases into 20190300000003. |
SQL | hydra/persistence/sql/migratest/testdata/20190300000003_testdata.sql | -- 20190300000001_testdata.sql (see 20190300000001_testdata.sql for an explanation)
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_consent_request (challenge, login_challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context)
SELECT 'challenge-0001', 'challenge-0001', 'verifier-0001', hydra_client.id, 'subject-0001', 'http://request/0001', true, 'requested_scope-0001_1', 'csrf-0001', now(), now(), '{"display": "display-0001"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context)
SELECT 'challenge-0001', 'verifier-0001', hydra_client.id, 'subject-0001', 'http://request/0001', true, 'requested_scope-0001_1', 'csrf-0001', now(), now(), '{"display": "display-0001"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0001', now(), 'subject-0001');
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used)
VALUES
('challenge-0001', 'granted_scope-0001_1', true, 0001, '{}', now(), '{"session_access_token-0001": "0001"}', '{"session_id_token-0001": "0001"}', now(), true);
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used)
VALUES
('challenge-0001', 'subject-0001', true, 0001, '{}', 'acr-0001', now(), now(), true);
-- EOF 20190300000001_testdata.sql
-- 20190300000002_testdata.sql (see 20190300000002_testdata.sql for an explanation)
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_consent_request (challenge, login_challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier)
SELECT 'challenge-0002', 'challenge-0002', 'verifier-0002', hydra_client.id, 'subject-0002', 'http://request/0002', true, 'requested_scope-0002_1', 'csrf-0002', now(), now(), '{"display": "display-0002"}', 'force_subject_id-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context)
SELECT 'challenge-0002', 'verifier-0002', hydra_client.id, 'subject-0002', 'http://request/0002', true, 'requested_scope-0002_1', 'csrf-0002', now(), now(), '{"display": "display-0002"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0002', now(), 'subject-0002');
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used)
VALUES
('challenge-0002', 'granted_scope-0002_1', true, 0002, '{}', now(), '{"session_access_token-0002": "0002"}', '{"session_id_token-0002": "0002"}', now(), true);
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0002', 'subject-0002', true, 0002, '{}', 'acr-0002', now(), now(), true, 'force_subject_id-0002');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0002', 'subject_obfuscated-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
-- EOF 20190300000002_testdata.sql
INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0003', now(), 'subject-0003');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, login_session_id)
SELECT 'challenge-0003', 'verifier-0003', hydra_client.id, 'subject-0003', 'http://request/0003', true, 'requested_scope-0003_1', 'csrf-0003', now(), now(), '{"display": "display-0003"}', 'auth_session-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge)
SELECT 'challenge-0003', 'verifier-0003', hydra_client.id, 'subject-0003', 'http://request/0003', true, 'requested_scope-0003_1', 'csrf-0003', now(), now(), '{"display": "display-0003"}', 'force_subject_id-0003', 'auth_session-0003', 'challenge-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used)
VALUES
('challenge-0003', 'granted_scope-0003_1', true, 0003, '{}', now(), '{"session_access_token-0003": "0003"}', '{"session_id_token-0003": "0003"}', now(), true);
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0003', 'subject-0003', true, 0003, '{}', 'acr-0003', now(), now(), true, 'force_subject_id-0003');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0003', 'subject_obfuscated-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000004_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0004', now(), 'subject-0004');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0004', 'verifier-0004', hydra_client.id, 'subject-0004', 'http://request/0004', true, 'requested_scope-0004_1', 'csrf-0004', now(), now(), '{"display": "display-0004"}', 'requested_audience-0004_1', 'auth_session-0004'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience)
SELECT 'challenge-0004', 'verifier-0004', hydra_client.id, 'subject-0004', 'http://request/0004', true, 'requested_scope-0004_1', 'csrf-0004', now(), now(), '{"display": "display-0004"}', 'force_subject_id-0004', 'auth_session-0004', 'challenge-0004', 'requested_audience-0004_1'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0004', 'granted_scope-0004_1', true, 0004, '{}', now(), '{"session_access_token-0004": "0004"}', '{"session_id_token-0004": "0004"}', now(), true, 'granted_audience-0004_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0004', 'subject-0004', true, 0004, '{}', 'acr-0004', now(), now(), true, 'force_subject_id-0004');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0004', 'subject_obfuscated-0004'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000005_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0005', now(), 'subject-0005');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0005', 'verifier-0005', hydra_client.id, 'subject-0005', 'http://request/0005', true, 'requested_scope-0005_1', 'csrf-0005', now(), now(), '{"display": "display-0005"}', 'requested_audience-0005_1', 'auth_session-0005'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience)
SELECT 'challenge-0005', 'verifier-0005', hydra_client.id, 'subject-0005', 'http://request/0005', true, 'requested_scope-0005_1', 'csrf-0005', now(), now(), '{"display": "display-0005"}', 'force_subject_id-0005', 'auth_session-0005', 'challenge-0005', 'requested_audience-0005_1'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0005', 'granted_scope-0005_1', true, 0005, '{}', now(), '{"session_access_token-0005": "0005"}', '{"session_id_token-0005": "0005"}', now(), true, 'granted_audience-0005_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0005', 'subject-0005', true, 0005, '{}', 'acr-0005', now(), now(), true, 'force_subject_id-0005');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0005', 'subject_obfuscated-0005'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000006_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0006', now(), 'subject-0006');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0006', 'verifier-0006', hydra_client.id, 'subject-0006', 'http://request/0006', true, 'requested_scope-0006_1', 'csrf-0006', now(), now(), '{"display": "display-0006"}', 'requested_audience-0006_1', 'auth_session-0006'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr)
SELECT 'challenge-0006', 'verifier-0006', hydra_client.id, 'subject-0006', 'http://request/0006', true, 'requested_scope-0006_1', 'csrf-0006', now(), now(), '{"display": "display-0006"}', 'force_subject_id-0006', 'auth_session-0006', 'challenge-0006', 'requested_audience-0006_1', 'acr-0006'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0006', 'granted_scope-0006_1', true, 0006, '{}', now(), '{"session_access_token-0006": "0006"}', '{"session_id_token-0006": "0006"}', now(), true, 'granted_audience-0006_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0006', 'subject-0006', true, 0006, '{}', 'acr-0006', now(), now(), true, 'force_subject_id-0006');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0006', 'subject_obfuscated-0006'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000007_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0007', now(), 'subject-0007');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0007', 'verifier-0007', hydra_client.id, 'subject-0007', 'http://request/0007', true, 'requested_scope-0007_1', 'csrf-0007', now(), now(), '{"display": "display-0007"}', 'requested_audience-0007_1', 'auth_session-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr)
SELECT 'challenge-0007', 'verifier-0007', hydra_client.id, 'subject-0007', 'http://request/0007', true, 'requested_scope-0007_1', 'csrf-0007', now(), now(), '{"display": "display-0007"}', 'force_subject_id-0007', 'auth_session-0007', 'challenge-0007', 'requested_audience-0007_1', 'acr-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0007', 'granted_scope-0007_1', true, 0007, '{}', now(), '{"session_access_token-0007": "0007"}', '{"session_id_token-0007": "0007"}', now(), true, 'granted_audience-0007_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier)
VALUES
('challenge-0007', 'subject-0007', true, 0007, '{}', 'acr-0007', now(), now(), true, 'force_subject_id-0007');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0007', 'subject_obfuscated-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000008_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0008', now(), 'subject-0008');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0008', 'verifier-0008', hydra_client.id, 'subject-0008', 'http://request/0008', true, 'requested_scope-0008_1', 'csrf-0008', now(), now(), '{"display": "display-0008"}', 'requested_audience-0008_1', 'auth_session-0008'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0008', 'verifier-0008', hydra_client.id, 'subject-0008', 'http://request/0008', true, 'requested_scope-0008_1', 'csrf-0008', now(), now(), '{"display": "display-0008"}', 'force_subject_id-0008', 'auth_session-0008', 'challenge-0008', 'requested_audience-0008_1', 'acr-0008', '{"context": "0008"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0008', 'granted_scope-0008_1', true, 0008, '{}', now(), '{"session_access_token-0008": "0008"}', '{"session_id_token-0008": "0008"}', now(), true, 'granted_audience-0008_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0008', 'subject-0008', true, 0008, '{}', 'acr-0008', now(), now(), true, 'force_subject_id-0008', '{"context": "0008"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0008', 'subject_obfuscated-0008'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000009_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0009', now(), 'subject-0009');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0009', 'verifier-0009', hydra_client.id, 'subject-0009', 'http://request/0009', true, 'requested_scope-0009_1', 'csrf-0009', now(), now(), '{"display": "display-0009"}', 'requested_audience-0009_1', 'auth_session-0009'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0009', 'verifier-0009', hydra_client.id, 'subject-0009', 'http://request/0009', true, 'requested_scope-0009_1', 'csrf-0009', now(), now(), '{"display": "display-0009"}', 'force_subject_id-0009', 'auth_session-0009', 'challenge-0009', 'requested_audience-0009_1', 'acr-0009', '{"context": "0009"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0009', 'granted_scope-0009_1', true, 0009, '{}', now(), '{"session_access_token-0009": "0009"}', '{"session_id_token-0009": "0009"}', now(), true, 'granted_audience-0009_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0009', 'subject-0009', true, 0009, '{}', 'acr-0009', now(), now(), true, 'force_subject_id-0009', '{"context": "0009"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0009', 'subject_obfuscated-0009'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0009', 'verifier-0009', 'subject-0009', 'session_id-0009', hydra_client.id, 'http://request/0009', 'http://post_logout/0009', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000010_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject)
VALUES
('auth_session-0010', now(), 'subject-0010');
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0010', 'verifier-0010', hydra_client.id, 'subject-0010', 'http://request/0010', true, 'requested_scope-0010_1', 'csrf-0010', now(), now(), '{"display": "display-0010"}', 'requested_audience-0010_1', 'auth_session-0010'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0010', 'verifier-0010', hydra_client.id, 'subject-0010', 'http://request/0010', true, 'requested_scope-0010_1', 'csrf-0010', now(), now(), '{"display": "display-0010"}', 'force_subject_id-0010', 'auth_session-0010', 'challenge-0010', 'requested_audience-0010_1', 'acr-0010', '{"context": "0010"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0010', 'granted_scope-0010_1', true, 0010, '{}', now(), '{"session_access_token-0010": "0010"}', '{"session_id_token-0010": "0010"}', now(), true, 'granted_audience-0010_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0010', 'subject-0010', true, 0010, '{}', 'acr-0010', now(), now(), true, 'force_subject_id-0010', '{"context": "0010"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0010', 'subject_obfuscated-0010'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0010', 'verifier-0010', 'subject-0010', 'session_id-0010', hydra_client.id, 'http://request/0010', 'http://post_logout/0010', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000011_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject, remember)
VALUES
('auth_session-0011', now(), 'subject-0011', false);
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0011', 'verifier-0011', hydra_client.id, 'subject-0011', 'http://request/0011', true, 'requested_scope-0011_1', 'csrf-0011', now(), now(), '{"display": "display-0011"}', 'requested_audience-0011_1', 'auth_session-0011'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0011', 'verifier-0011', hydra_client.id, 'subject-0011', 'http://request/0011', true, 'requested_scope-0011_1', 'csrf-0011', now(), now(), '{"display": "display-0011"}', 'force_subject_id-0011', 'auth_session-0011', 'challenge-0011', 'requested_audience-0011_1', 'acr-0011', '{"context": "0011"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0011', 'granted_scope-0011_1', true, 0011, '{}', now(), '{"session_access_token-0011": "0011"}', '{"session_id_token-0011": "0011"}', now(), true, 'granted_audience-0011_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0011', 'subject-0011', true, 0011, '{}', 'acr-0011', now(), now(), true, 'force_subject_id-0011', '{"context": "0011"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0011', 'subject_obfuscated-0011'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0011', 'verifier-0011', 'subject-0011', 'session_id-0011', hydra_client.id, 'http://request/0011', 'http://post_logout/0011', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000012_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject, remember)
VALUES
('auth_session-0012', now(), 'subject-0012', false);
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0012', 'verifier-0012', hydra_client.id, 'subject-0012', 'http://request/0012', true, 'requested_scope-0012_1', 'csrf-0012', now(), now(), '{"display": "display-0012"}', 'requested_audience-0012_1', 'auth_session-0012'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0012', 'verifier-0012', hydra_client.id, 'subject-0012', 'http://request/0012', true, 'requested_scope-0012_1', 'csrf-0012', now(), now(), '{"display": "display-0012"}', 'force_subject_id-0012', 'auth_session-0012', 'challenge-0012', 'requested_audience-0012_1', 'acr-0012', '{"context": "0012"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0012', 'granted_scope-0012_1', true, 0012, '{}', now(), '{"session_access_token-0012": "0012"}', '{"session_id_token-0012": "0012"}', now(), true, 'granted_audience-0012_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0012', 'subject-0012', true, 0012, '{}', 'acr-0012', now(), now(), true, 'force_subject_id-0012', '{"context": "0012"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0012', 'subject_obfuscated-0012'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0012', 'verifier-0012', 'subject-0012', 'session_id-0012', hydra_client.id, 'http://request/0012', 'http://post_logout/0012', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000013_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject, remember)
VALUES
('auth_session-0013', now(), 'subject-0013', false);
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0013', 'verifier-0013', hydra_client.id, 'subject-0013', 'http://request/0013', true, 'requested_scope-0013_1', 'csrf-0013', now(), now(), '{"display": "display-0013"}', 'requested_audience-0013_1', 'auth_session-0013'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0013', 'verifier-0013', hydra_client.id, 'subject-0013', 'http://request/0013', true, 'requested_scope-0013_1', 'csrf-0013', now(), now(), '{"display": "display-0013"}', 'force_subject_id-0013', 'auth_session-0013', 'challenge-0013', 'requested_audience-0013_1', 'acr-0013', '{"context": "0013"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience)
VALUES
('challenge-0013', 'granted_scope-0013_1', true, 0013, '{}', now(), '{"session_access_token-0013": "0013"}', '{"session_id_token-0013": "0013"}', now(), true, 'granted_audience-0013_1');
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0013', 'subject-0013', true, 0013, '{}', 'acr-0013', now(), now(), true, 'force_subject_id-0013', '{"context": "0013"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0013', 'subject_obfuscated-0013'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0013', 'verifier-0013', 'subject-0013', 'session_id-0013', hydra_client.id, 'http://request/0013', 'http://post_logout/0013', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190300000014_testdata.sql | INSERT INTO hydra_oauth2_authentication_session
(id, authenticated_at, subject, remember)
VALUES
('auth_session-0014', now(), 'subject-0014', false);
-- using the most lately added client as a foreign key
INSERT INTO hydra_oauth2_authentication_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, requested_at_audience, login_session_id)
SELECT 'challenge-0014', 'verifier-0014', hydra_client.id, 'subject-0014', 'http://request/0014', true, 'requested_scope-0014_1', 'csrf-0014', now(), now(), '{"display": "display-0014"}', 'requested_audience-0014_1', 'auth_session-0014'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request (challenge, verifier, client_id, subject, request_url, skip, requested_scope, csrf, authenticated_at, requested_at, oidc_context, forced_subject_identifier, login_session_id, login_challenge, requested_at_audience, acr, context)
SELECT 'challenge-0014', 'verifier-0014', hydra_client.id, 'subject-0014', 'http://request/0014', true, 'requested_scope-0014_1', 'csrf-0014', now(), now(), '{"display": "display-0014"}', 'force_subject_id-0014', 'auth_session-0014', 'challenge-0014', 'requested_audience-0014_1', 'acr-0014', '{"context": "0014"}'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_consent_request_handled
(challenge, granted_scope, remember, remember_for, error, requested_at, session_access_token, session_id_token, authenticated_at, was_used, granted_at_audience, handled_at)
VALUES
('challenge-0014', 'granted_scope-0014_1', true, 0014, '{}', now(), '{"session_access_token-0014": "0014"}', '{"session_id_token-0014": "0014"}', now(), true, 'granted_audience-0014_1', now());
INSERT INTO hydra_oauth2_authentication_request_handled
(challenge, subject, remember, remember_for, error, acr, requested_at, authenticated_at, was_used, forced_subject_identifier, context)
VALUES
('challenge-0014', 'subject-0014', true, 0014, '{}', 'acr-0014', now(), now(), true, 'force_subject_id-0014', '{"context": "0014"}');
INSERT INTO hydra_oauth2_obfuscated_authentication_session (client_id, subject, subject_obfuscated)
SELECT hydra_client.id, 'subject-0014', 'subject_obfuscated-0014'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated)
SELECT 'challenge-0014', 'verifier-0014', 'subject-0014', 'session_id-0014', hydra_client.id, 'http://request/0014', 'http://post_logout/0014', true, true, false, true
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000001_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data)
SELECT 'sig-0001', 'req-0001', now(), hydra_client.id, 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data)
SELECT 'sig-0001', 'req-0001', now(), hydra_client.id, 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data)
SELECT 'sig-0001', 'req-0001', now(), hydra_client.id, 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data)
SELECT 'sig-0001', 'req-0001', now(), hydra_client.id, 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000002_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0002', 'req-0002', now(), hydra_client.id, 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0002', 'req-0002', now(), hydra_client.id, 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0002', 'req-0002', now(), hydra_client.id, 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0002', 'req-0002', now(), hydra_client.id, 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000003_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0003', 'req-0003', now(), hydra_client.id, 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0003', 'req-0003', now(), hydra_client.id, 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0003', 'req-0003', now(), hydra_client.id, 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0003', 'req-0003', now(), hydra_client.id, 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject)
SELECT 'sig-0003', 'req-0003', now(), hydra_client.id, 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000004_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0004', 'req-0004', now(), hydra_client.id, 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0004', 'req-0004', now(), hydra_client.id, 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0004', 'req-0004', now(), hydra_client.id, 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0004', 'req-0004', now(), hydra_client.id, 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0004', 'req-0004', now(), hydra_client.id, 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000005_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0005', 'req-0005', now(), hydra_client.id, 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0005', 'req-0005', now(), hydra_client.id, 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0005', 'req-0005', now(), hydra_client.id, 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0005', 'req-0005', now(), hydra_client.id, 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0005', 'req-0005', now(), hydra_client.id, 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000006_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0006', 'req-0006', now(), hydra_client.id, 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0006', 'req-0006', now(), hydra_client.id, 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0006', 'req-0006', now(), hydra_client.id, 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0006', 'req-0006', now(), hydra_client.id, 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active)
SELECT 'sig-0006', 'req-0006', now(), hydra_client.id, 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000007_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience)
SELECT 'sig-0007', 'req-0007', now(), hydra_client.id, 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience)
SELECT 'sig-0007', 'req-0007', now(), hydra_client.id, 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience)
SELECT 'sig-0007', 'req-0007', now(), hydra_client.id, 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience)
SELECT 'sig-0007', 'req-0007', now(), hydra_client.id, 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience)
SELECT 'sig-0007', 'req-0007', now(), hydra_client.id, 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007'
FROM hydra_client
ORDER BY hydra_client.pk DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000008_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0008', 'req-0008', now(), hc.id, 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0008', 'req-0008', now(), hc.id, 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0008', 'req-0008', now(), hc.id, 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0008', 'req-0008', now(), hc.id, 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0008', 'req-0008', now(), hc.id, 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000009_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0009', 'req-0009', now(), hc.id, 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0009', 'req-0009', now(), hc.id, 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0009', 'req-0009', now(), hc.id, 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0009', 'req-0009', now(), hc.id, 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0009', 'req-0009', now(), hc.id, 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000010_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0010', 'req-0010', now(), hc.id, 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0010', 'req-0010', now(), hc.id, 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0010', 'req-0010', now(), hc.id, 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0010', 'req-0010', now(), hc.id, 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0010', 'req-0010', now(), hc.id, 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20190400000011_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0011', 'req-0011', now(), hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0011', 'req-0011', now(), hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0011', 'req-0011', now(), hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0011', 'req-0011', now(), hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-0011', 'req-0011', now(), hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_jti_blacklist
(signature, expires_at)
VALUES
('sig-0011', now()) |
SQL | hydra/persistence/sql/migratest/testdata/20200527215732_testdata.sql | INSERT INTO hydra_client
(pk, id, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg)
VALUES
(2005, 'client-2005', 'Client 2005', 'secret-2005', 'http://redirect/2005_1', 'grant-2005_1', 'response-2005_1', 'scope-2005', 'owner-2005', 'http://policy/2005', 'http://tos/2005', 'http://client/2005', 'http://logo/2005', 'contact-2005_1', 0, 'http://sector_id/2005', '', 'http://jwks/2005', 'http://request/2005_1', 'token_auth-2005', 'r_alg-2005', 'u_alg-2005', 'subject-2005', 'http://cors/2005_1', 'autdience-2005_1', now(), now(), 'http://front_logout/2005', true, 'http://post_redirect/2005_1', 'http://back_logout/2005', true, '{"migration": "2005"}', ''); |
SQL | hydra/persistence/sql/migratest/testdata/20201110104000_testdata.sql | INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
-- insert another batch with different sig but same id
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000-01', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000-01', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000-01', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000-01', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1;
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id)
SELECT 'sig-20201110104000-01', 'req-20201110104000', CURRENT_TIMESTAMP, hc.id, 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', crh.challenge
FROM hydra_client hc, hydra_oauth2_consent_request_handled crh
ORDER BY hc.pk, crh.challenge DESC
LIMIT 1; |
SQL | hydra/persistence/sql/migratest/testdata/20210928175900_testdata.sql | INSERT INTO hydra_client
(
pk,
id,
client_name,
client_secret,
redirect_uris,
grant_types,
response_types,
scope,
owner,
policy_uri,
tos_uri,
client_uri,
logo_uri,
contacts,
client_secret_expires_at,
sector_identifier_uri,
jwks,
jwks_uri,
request_uris,
token_endpoint_auth_method,
request_object_signing_alg,
userinfo_signed_response_alg,
subject_type,
allowed_cors_origins,
audience,
created_at,
updated_at,
frontchannel_logout_uri,
frontchannel_logout_session_required,
post_logout_redirect_uris,
backchannel_logout_uri,
backchannel_logout_session_required,
metadata,
token_endpoint_auth_signing_alg,
authorization_code_grant_access_token_lifespan,
authorization_code_grant_id_token_lifespan,
authorization_code_grant_refresh_token_lifespan,
client_credentials_grant_access_token_lifespan,
implicit_grant_access_token_lifespan,
implicit_grant_id_token_lifespan,
jwt_bearer_grant_access_token_lifespan,
password_grant_access_token_lifespan,
password_grant_refresh_token_lifespan,
refresh_token_grant_id_token_lifespan,
refresh_token_grant_access_token_lifespan,
refresh_token_grant_refresh_token_lifespan
)
VALUES
(
0015,
'client-0015',
'Client 0015',
'secret-0015',
'http://redirect/0015_1',
'grant-0015_1',
'response-0015_1',
'scope-0015',
'owner-0015',
'http://policy/0015',
'http://tos/0015',
'http://client/0015',
'http://logo/0015',
'contact-0015_1',
0,
'http://sector_id/0015',
'',
'http://jwks/0015',
'http://request/0015_1',
'token_auth-0015',
'r_alg-0015',
'u_alg-0015',
'subject-0015',
'http://cors/0015_1',
'autdience-0015_1',
CURRENT_TIMESTAMP,
CURRENT_TIMESTAMP,
'http://front_logout/0015',
true,
'http://post_redirect/0015_1',
'http://back_logout/0015',
true,
'{"migration": "0015"}',
'',
151000000000,
152000000000,
153000000000,
154000000000,
155000000000,
156000000000,
157000000000,
158000000000,
159000000000,
160000000000,
161000000000,
162000000000
); |
SQL | hydra/persistence/sql/migratest/testdata/20211004110001_testdata.sql | INSERT INTO hydra_client
(
pk,
pk_deprecated,
id,
client_name,
client_secret,
redirect_uris,
grant_types,
response_types,
scope,
owner,
policy_uri,
tos_uri,
client_uri,
logo_uri,
contacts,
client_secret_expires_at,
sector_identifier_uri,
jwks,
jwks_uri,
request_uris,
token_endpoint_auth_method,
request_object_signing_alg,
userinfo_signed_response_alg,
subject_type,
allowed_cors_origins,
audience,
created_at,
updated_at,
frontchannel_logout_uri,
frontchannel_logout_session_required,
post_logout_redirect_uris,
backchannel_logout_uri,
backchannel_logout_session_required,
metadata,
token_endpoint_auth_signing_alg
)
VALUES
('08f4a4b7-6601-4fd7-bb7f-29ec0681b86d',
0,
'client-20',
'Client 20',
'secret-20',
'http://redirect/20_1',
'grant-20_1',
'response-20_1',
'scope-20',
'owner-20',
'http://policy/20',
'http://tos/20',
'http://client/20',
'http://logo/20',
'contact-20_1',
0,
'http://sector_id/20',
'',
'http://jwks/20',
'http://request/20_1',
'token_auth-20',
'r_alg-20',
'u_alg-20',
'subject-20',
'http://cors/20_1',
'autdience-20_1',
CURRENT_TIMESTAMP,
CURRENT_TIMESTAMP,
'http://front_logout/20',
true,
'http://post_redirect/20_1',
'http://back_logout/20',
true,
'{"migration": "20"}',
''
); |
SQL | hydra/persistence/sql/migratest/testdata/20211011000001_testdata.sql | INSERT INTO hydra_jwk
(sid, kid, version, keydata, created_at, pk)
VALUES
('sid-0005', 'kid-0005', 4, 'key-0005', CURRENT_TIMESTAMP, '94075738-c3e7-41bc-a7a5-89aece609c39'); |
SQL | hydra/persistence/sql/migratest/testdata/20211226155900_testdata.sql | INSERT INTO hydra_jwk (pk, sid, kid, version, keydata, created_at) VALUES ('e18d8447-3ec2-42d9-a3ad-e7cca8aa81f0', 'sid-0008', 'kid-0008', 2, 'key-0002', CURRENT_TIMESTAMP);
INSERT INTO hydra_oauth2_trusted_jwt_bearer_issuer (id, issuer, subject, scope, key_set, key_id)
VALUES ('30e51720-4a88-48ca-8243-de7d8f461674', 'some-issuer', 'some-subject', 'some-scope', 'sid-0008', 'kid-0008'); |
SQL | hydra/persistence/sql/migratest/testdata/20220210000001_testdata.cockroach.sql | INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0001', (SELECT id FROM networks LIMIT 1), 'Client 0001', 'secret-0001', 'http://redirect/0001_1', 'grant-0001_1', 'response-0001_1', 'scope-0001', 'owner-0001', 'http://policy/0001', 'http://tos/0001', 'http://client/0001', 'http://logo/0001', 'contact-0001_1', 0, '', '', '', '', 'none', '', '', '', '', 1, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '4db0bba3-ff30-4e6d-a7eb-a08a9b0d4d0f', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0002', (SELECT id FROM networks LIMIT 1), 'Client 0002', 'secret-0002', 'http://redirect/0002_1', 'grant-0002_1', 'response-0002_1', 'scope-0002', 'owner-0002', 'http://policy/0002', 'http://tos/0002', 'http://client/0002', 'http://logo/0002', 'contact-0002_1', 0, '', '', '', '', 'none', '', '', '', '', 2, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'f24d3183-8b4f-40fa-a1a0-c5dd2aa9fabb', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0003', (SELECT id FROM networks LIMIT 1), 'Client 0003', 'secret-0003', 'http://redirect/0003_1', 'grant-0003_1', 'response-0003_1', 'scope-0003', 'owner-0003', 'http://policy/0003', 'http://tos/0003', 'http://client/0003', 'http://logo/0003', 'contact-0003_1', 0, '', '', '', '', 'none', 'r_alg-0003', 'u_alg-0003', '', '', 3, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '15dc61a0-cff0-452f-aacf-860bc79dbfe1', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0004', (SELECT id FROM networks LIMIT 1), 'Client 0004', 'secret-0004', 'http://redirect/0004_1', 'grant-0004_1', 'response-0004_1', 'scope-0004', 'owner-0004', 'http://policy/0004', 'http://tos/0004', 'http://client/0004', 'http://logo/0004', 'contact-0004_1', 0, 'http://sector_id/0004', '', 'http://jwks/0004', 'http://request/0004_1', 'none', 'r_alg-0004', 'u_alg-0004', '', '', 4, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '277dd36c-1d88-4883-a9bb-c332e7dd390f', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0005', (SELECT id FROM networks LIMIT 1), 'Client 0005', 'secret-0005', 'http://redirect/0005_1', 'grant-0005_1', 'response-0005_1', 'scope-0005', 'owner-0005', 'http://policy/0005', 'http://tos/0005', 'http://client/0005', 'http://logo/0005', 'contact-0005_1', 0, 'http://sector_id/0005', '', 'http://jwks/0005', 'http://request/0005_1', 'token_auth-0005', 'r_alg-0005', 'u_alg-0005', '', '', 5, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '604510c7-390d-4751-95bf-3be3a3bfb065', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0006', (SELECT id FROM networks LIMIT 1), 'Client 0006', 'secret-0006', 'http://redirect/0006_1', 'grant-0006_1', 'response-0006_1', 'scope-0006', 'owner-0006', 'http://policy/0006', 'http://tos/0006', 'http://client/0006', 'http://logo/0006', 'contact-0006_1', 0, 'http://sector_id/0006', '', 'http://jwks/0006', 'http://request/0006_1', 'token_auth-0006', 'r_alg-0006', 'u_alg-0006', 'subject-0006', '', 6, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '44de31b8-38cd-4873-93c9-a0e532427f0a', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0007', (SELECT id FROM networks LIMIT 1), 'Client 0007', 'secret-0007', 'http://redirect/0007_1', 'grant-0007_1', 'response-0007_1', 'scope-0007', 'owner-0007', 'http://policy/0007', 'http://tos/0007', 'http://client/0007', 'http://logo/0007', 'contact-0007_1', 0, 'http://sector_id/0007', '', 'http://jwks/0007', 'http://request/0007_1', 'token_auth-0007', 'r_alg-0007', 'u_alg-0007', 'subject-0007', '', 7, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '704488ca-c654-4e39-9f32-702a48f7ad40', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0008', (SELECT id FROM networks LIMIT 1), 'Client 0008', 'secret-0008', 'http://redirect/0008_1', 'grant-0008_1', 'response-0008_1', 'scope-0008', 'owner-0008', 'http://policy/0008', 'http://tos/0008', 'http://client/0008', 'http://logo/0008', 'contact-0008_1', 0, 'http://sector_id/0008', '', 'http://jwks/0008', 'http://request/0008_1', 'token_auth-0008', 'r_alg-0008', 'u_alg-0008', 'subject-0008', 'http://cors/0008_1', 8, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'e64adc34-cdc7-4aeb-a1a0-d387af2d23e7', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0009', (SELECT id FROM networks LIMIT 1), 'Client 0009', 'secret-0009', 'http://redirect/0009_1', 'grant-0009_1', 'response-0009_1', 'scope-0009', 'owner-0009', 'http://policy/0009', 'http://tos/0009', 'http://client/0009', 'http://logo/0009', 'contact-0009_1', 0, 'http://sector_id/0009', '', 'http://jwks/0009', 'http://request/0009_1', 'token_auth-0009', 'r_alg-0009', 'u_alg-0009', 'subject-0009', 'http://cors/0009_1', 9, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '99c1528a-4ac4-46e2-a6e4-e09d0306fd7b', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0010', (SELECT id FROM networks LIMIT 1), 'Client 0010', 'secret-0010', 'http://redirect/0010_1', 'grant-0010_1', 'response-0010_1', 'scope-0010', 'owner-0010', 'http://policy/0010', 'http://tos/0010', 'http://client/0010', 'http://logo/0010', 'contact-0010_1', 0, 'http://sector_id/0010', '', 'http://jwks/0010', 'http://request/0010_1', 'token_auth-0010', 'r_alg-0010', 'u_alg-0010', 'subject-0010', 'http://cors/0010_1', 10, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'ebda0ac9-0afd-4532-aec6-72c7bbd9e0dc', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0011', (SELECT id FROM networks LIMIT 1), 'Client 0011', 'secret-0011', 'http://redirect/0011_1', 'grant-0011_1', 'response-0011_1', 'scope-0011', 'owner-0011', 'http://policy/0011', 'http://tos/0011', 'http://client/0011', 'http://logo/0011', 'contact-0011_1', 0, 'http://sector_id/0011', '', 'http://jwks/0011', 'http://request/0011_1', 'token_auth-0011', 'r_alg-0011', 'u_alg-0011', 'subject-0011', 'http://cors/0011_1', 11, 'autdience-0011_1', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '93311fb4-f5a6-4510-95dc-06cd0cfaa03b', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0012', (SELECT id FROM networks LIMIT 1), 'Client 0012', 'secret-0012', 'http://redirect/0012_1', 'grant-0012_1', 'response-0012_1', 'scope-0012', 'owner-0012', 'http://policy/0012', 'http://tos/0012', 'http://client/0012', 'http://logo/0012', 'contact-0012_1', 0, 'http://sector_id/0012', '', 'http://jwks/0012', 'http://request/0012_1', 'token_auth-0012', 'r_alg-0012', 'u_alg-0012', 'subject-0012', 'http://cors/0012_1', 12, 'autdience-0012_1', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'e7206da5-155b-4194-9536-caa54442a470', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0013', (SELECT id FROM networks LIMIT 1), 'Client 0013', 'secret-0013', 'http://redirect/0013_1', 'grant-0013_1', 'response-0013_1', 'scope-0013', 'owner-0013', 'http://policy/0013', 'http://tos/0013', 'http://client/0013', 'http://logo/0013', 'contact-0013_1', 0, 'http://sector_id/0013', '', 'http://jwks/0013', 'http://request/0013_1', 'token_auth-0013', 'r_alg-0013', 'u_alg-0013', 'subject-0013', 'http://cors/0013_1', 13, 'autdience-0013_1', '2022-02-15 22:20:20.969385', '2022-02-15 22:20:20.969385', 'http://front_logout/0013', true, 'http://post_redirect/0013_1', 'http://back_logout/0013', true, '{}', '', '0f309b7d-61d5-495f-bdfa-4836edcbb26d', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0014', (SELECT id FROM networks LIMIT 1), 'Client 0014', 'secret-0014', 'http://redirect/0014_1', 'grant-0014_1', 'response-0014_1', 'scope-0014', 'owner-0014', 'http://policy/0014', 'http://tos/0014', 'http://client/0014', 'http://logo/0014', 'contact-0014_1', 0, 'http://sector_id/0014', '', 'http://jwks/0014', 'http://request/0014_1', 'token_auth-0014', 'r_alg-0014', 'u_alg-0014', 'subject-0014', 'http://cors/0014_1', 14, 'autdience-0014_1', '2022-02-15 22:20:21.13937', '2022-02-15 22:20:21.13937', 'http://front_logout/0014', true, 'http://post_redirect/0014_1', 'http://back_logout/0014', true, '{"migration": "0014"}', '', '928e8098-c3b5-499b-af29-938bb55462e9', '');
-- INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-2005', (SELECT id FROM networks LIMIT 1), 'Client 2005', 'secret-2005', 'http://redirect/2005_1', 'grant-2005_1', 'response-2005_1', 'scope-2005', 'owner-2005', 'http://policy/2005', 'http://tos/2005', 'http://client/2005', 'http://logo/2005', 'contact-2005_1', 0, 'http://sector_id/2005', '', 'http://jwks/2005', 'http://request/2005_1', 'token_auth-2005', 'r_alg-2005', 'u_alg-2005', 'subject-2005', 'http://cors/2005_1', 2005, 'autdience-2005_1', '2022-02-15 22:20:22.882985', '2022-02-15 22:20:22.882985', 'http://front_logout/2005', true, 'http://post_redirect/2005_1', 'http://back_logout/2005', true, '{"migration": "2005"}', '', 'afaabbc2-def3-4663-a6e0-6eb08efd6904', '');
-- INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-20', (SELECT id FROM networks LIMIT 1), 'Client 20', 'secret-20', 'http://redirect/20_1', 'grant-20_1', 'response-20_1', 'scope-20', 'owner-20', 'http://policy/20', 'http://tos/20', 'http://client/20', 'http://logo/20', 'contact-20_1', 0, 'http://sector_id/20', '', 'http://jwks/20', 'http://request/20_1', 'token_auth-20', 'r_alg-20', 'u_alg-20', 'subject-20', 'http://cors/20_1', 0, 'autdience-20_1', '2022-02-15 22:20:23.004598', '2022-02-15 22:20:23.004598', 'http://front_logout/20', true, 'http://post_redirect/20_1', 'http://back_logout/20', true, '{"migration": "20"}', '', '08f4a4b7-6601-4fd7-bb7f-29ec0681b86d', '');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0001', 'kid-0001', (SELECT id FROM networks LIMIT 1), 1, 'key-0001', '2022-02-15 22:20:21.166613', 1, '593ff81f-a21e-4d29-b276-bdce7b5a33df');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0002', 'kid-0002', (SELECT id FROM networks LIMIT 1), 2, 'key-0002', '2022-02-15 22:20:21.166613', 2, '609b0140-8d03-4d1b-aef1-91b86da5e6be');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0003', 'kid-0003', (SELECT id FROM networks LIMIT 1), 3, 'key-0003', '2022-02-15 22:20:21.195915', 3, 'edd5c644-c3fe-43ce-9e80-9acd1f310ecc');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0004', 'kid-0004', (SELECT id FROM networks LIMIT 1), 4, 'key-0004', '2022-02-15 22:20:21.202612', 4, 'a6e7382c-6e30-4553-a67f-4d9bf32118b4');
-- INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0005', 'kid-0005', (SELECT id FROM networks LIMIT 1), 4, 'key-0005', '2022-02-15 22:20:23.042296', 4, '94075738-c3e7-41bc-a7a5-89aece609c39');
-- INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0008', 'kid-0008', (SELECT id FROM networks LIMIT 1), 2, 'key-0002', '2022-02-15 22:20:23.197118', 5, 'e18d8447-3ec2-42d9-a3ad-e7cca8aa81f0');
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0001', CURRENT_TIMESTAMP, 'subject-0001', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0002', CURRENT_TIMESTAMP, 'subject-0002', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0003', CURRENT_TIMESTAMP, 'subject-0003', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0004', CURRENT_TIMESTAMP, 'subject-0004', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0005', CURRENT_TIMESTAMP, 'subject-0005', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0006', CURRENT_TIMESTAMP, 'subject-0006', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0007', CURRENT_TIMESTAMP, 'subject-0007', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0008', CURRENT_TIMESTAMP, 'subject-0008', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0009', CURRENT_TIMESTAMP, 'subject-0009', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0010', CURRENT_TIMESTAMP, 'subject-0010', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0011', CURRENT_TIMESTAMP, 'subject-0011', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0012', CURRENT_TIMESTAMP, 'subject-0012', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0013', CURRENT_TIMESTAMP, 'subject-0013', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0014', CURRENT_TIMESTAMP, 'subject-0014', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0003', (SELECT id FROM networks LIMIT 1), 'requested_scope-0003_1', 'verifier-0003', 'csrf-0003', 'subject-0003', 'http://request/0003', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0003"}', 'auth_session-0003', '', CURRENT_TIMESTAMP, 128, true, 3, '{}', 'acr-0003', CURRENT_TIMESTAMP, true, 'force_subject_id-0003', '{}', '', 'challenge-0003', 'verifier-0003', true, 'csrf-0003', 'granted_scope-0003_1', true, 3, '{}', '{"session_access_token-0003": "0003"}', '{"session_id_token-0003": "0003"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0004', (SELECT id FROM networks LIMIT 1), 'requested_scope-0004_1', 'verifier-0004', 'csrf-0004', 'subject-0004', 'http://request/0004', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0004"}', 'auth_session-0004', 'requested_audience-0004_1', CURRENT_TIMESTAMP, 128, true, 4, '{}', 'acr-0004', CURRENT_TIMESTAMP, true, 'force_subject_id-0004', '{}', '', 'challenge-0004', 'verifier-0004', true, 'csrf-0004', 'granted_scope-0004_1', true, 4, '{}', '{"session_access_token-0004": "0004"}', '{"session_id_token-0004": "0004"}', true, 'granted_audience-0004_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0005', (SELECT id FROM networks LIMIT 1), 'requested_scope-0005_1', 'verifier-0005', 'csrf-0005', 'subject-0005', 'http://request/0005', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0005"}', 'auth_session-0005', 'requested_audience-0005_1', CURRENT_TIMESTAMP, 128, true, 5, '{}', 'acr-0005', CURRENT_TIMESTAMP, true, 'force_subject_id-0005', '{}', '', 'challenge-0005', 'verifier-0005', true, 'csrf-0005', 'granted_scope-0005_1', true, 5, '{}', '{"session_access_token-0005": "0005"}', '{"session_id_token-0005": "0005"}', true, 'granted_audience-0005_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0006', (SELECT id FROM networks LIMIT 1), 'requested_scope-0006_1', 'verifier-0006', 'csrf-0006', 'subject-0006', 'http://request/0006', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0006"}', 'auth_session-0006', 'requested_audience-0006_1', CURRENT_TIMESTAMP, 128, true, 6, '{}', 'acr-0006', CURRENT_TIMESTAMP, true, 'force_subject_id-0006', '{}', '', 'challenge-0006', 'verifier-0006', true, 'csrf-0006', 'granted_scope-0006_1', true, 6, '{}', '{"session_access_token-0006": "0006"}', '{"session_id_token-0006": "0006"}', true, 'granted_audience-0006_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0001', (SELECT id FROM networks LIMIT 1), 'requested_scope-0001_1', 'verifier-0001', 'csrf-0001', 'subject-0001', 'http://request/0001', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0001"}', NULL, '', CURRENT_TIMESTAMP, 128, true, 1, '{}', 'acr-0001', CURRENT_TIMESTAMP, true, '', '{}', '', 'challenge-0001', 'verifier-0001', true, 'csrf-0001', 'granted_scope-0001_1', true, 1, '{}', '{"session_access_token-0001": "0001"}', '{"session_id_token-0001": "0001"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0002', (SELECT id FROM networks LIMIT 1), 'requested_scope-0002_1', 'verifier-0002', 'csrf-0002', 'subject-0002', 'http://request/0002', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0002"}', NULL, '', CURRENT_TIMESTAMP, 128, true, 2, '{}', 'acr-0002', CURRENT_TIMESTAMP, true, 'force_subject_id-0002', '{}', '', 'challenge-0002', 'verifier-0002', true, 'csrf-0002', 'granted_scope-0002_1', true, 2, '{}', '{"session_access_token-0002": "0002"}', '{"session_id_token-0002": "0002"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0007', (SELECT id FROM networks LIMIT 1), 'requested_scope-0007_1', 'verifier-0007', 'csrf-0007', 'subject-0007', 'http://request/0007', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0007"}', 'auth_session-0007', 'requested_audience-0007_1', CURRENT_TIMESTAMP, 128, true, 7, '{}', 'acr-0007', CURRENT_TIMESTAMP, true, 'force_subject_id-0007', '{}', '', 'challenge-0007', 'verifier-0007', true, 'csrf-0007', 'granted_scope-0007_1', true, 7, '{}', '{"session_access_token-0007": "0007"}', '{"session_id_token-0007": "0007"}', true, 'granted_audience-0007_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0008', (SELECT id FROM networks LIMIT 1), 'requested_scope-0008_1', 'verifier-0008', 'csrf-0008', 'subject-0008', 'http://request/0008', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0008"}', 'auth_session-0008', 'requested_audience-0008_1', CURRENT_TIMESTAMP, 128, true, 8, '{}', 'acr-0008', CURRENT_TIMESTAMP, true, 'force_subject_id-0008', '{"context": "0008"}', '', 'challenge-0008', 'verifier-0008', true, 'csrf-0008', 'granted_scope-0008_1', true, 8, '{}', '{"session_access_token-0008": "0008"}', '{"session_id_token-0008": "0008"}', true, 'granted_audience-0008_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0009', (SELECT id FROM networks LIMIT 1), 'requested_scope-0009_1', 'verifier-0009', 'csrf-0009', 'subject-0009', 'http://request/0009', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0009"}', 'auth_session-0009', 'requested_audience-0009_1', CURRENT_TIMESTAMP, 128, true, 9, '{}', 'acr-0009', CURRENT_TIMESTAMP, true, 'force_subject_id-0009', '{"context": "0009"}', '', 'challenge-0009', 'verifier-0009', true, 'csrf-0009', 'granted_scope-0009_1', true, 9, '{}', '{"session_access_token-0009": "0009"}', '{"session_id_token-0009": "0009"}', true, 'granted_audience-0009_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0010', (SELECT id FROM networks LIMIT 1), 'requested_scope-0010_1', 'verifier-0010', 'csrf-0010', 'subject-0010', 'http://request/0010', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0010"}', 'auth_session-0010', 'requested_audience-0010_1', CURRENT_TIMESTAMP, 128, true, 10, '{}', 'acr-0010', CURRENT_TIMESTAMP, true, 'force_subject_id-0010', '{"context": "0010"}', '', 'challenge-0010', 'verifier-0010', true, 'csrf-0010', 'granted_scope-0010_1', true, 10, '{}', '{"session_access_token-0010": "0010"}', '{"session_id_token-0010": "0010"}', true, 'granted_audience-0010_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0011', (SELECT id FROM networks LIMIT 1), 'requested_scope-0011_1', 'verifier-0011', 'csrf-0011', 'subject-0011', 'http://request/0011', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0011"}', 'auth_session-0011', 'requested_audience-0011_1', CURRENT_TIMESTAMP, 128, true, 11, '{}', 'acr-0011', CURRENT_TIMESTAMP, true, 'force_subject_id-0011', '{"context": "0011"}', '', 'challenge-0011', 'verifier-0011', true, 'csrf-0011', 'granted_scope-0011_1', true, 11, '{}', '{"session_access_token-0011": "0011"}', '{"session_id_token-0011": "0011"}', true, 'granted_audience-0011_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0012', (SELECT id FROM networks LIMIT 1), 'requested_scope-0012_1', 'verifier-0012', 'csrf-0012', 'subject-0012', 'http://request/0012', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0012"}', 'auth_session-0012', 'requested_audience-0012_1', CURRENT_TIMESTAMP, 128, true, 12, '{}', 'acr-0012', CURRENT_TIMESTAMP, true, 'force_subject_id-0012', '{"context": "0012"}', '', 'challenge-0012', 'verifier-0012', true, 'csrf-0012', 'granted_scope-0012_1', true, 12, '{}', '{"session_access_token-0012": "0012"}', '{"session_id_token-0012": "0012"}', true, 'granted_audience-0012_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0013', (SELECT id FROM networks LIMIT 1), 'requested_scope-0013_1', 'verifier-0013', 'csrf-0013', 'subject-0013', 'http://request/0013', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0013"}', 'auth_session-0013', 'requested_audience-0013_1', CURRENT_TIMESTAMP, 128, true, 13, '{}', 'acr-0013', CURRENT_TIMESTAMP, true, 'force_subject_id-0013', '{"context": "0013"}', '', 'challenge-0013', 'verifier-0013', true, 'csrf-0013', 'granted_scope-0013_1', true, 13, '{}', '{"session_access_token-0013": "0013"}', '{"session_id_token-0013": "0013"}', true, 'granted_audience-0013_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0014', (SELECT id FROM networks LIMIT 1), 'requested_scope-0014_1', 'verifier-0014', 'csrf-0014', 'subject-0014', 'http://request/0014', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0014"}', 'auth_session-0014', 'requested_audience-0014_1', CURRENT_TIMESTAMP, 128, true, 14, '{}', 'acr-0014', CURRENT_TIMESTAMP, true, 'force_subject_id-0014', '{"context": "0014"}', '', 'challenge-0014', 'verifier-0014', true, 'csrf-0014', 'granted_scope-0014_1', true, 14, '{}', '{"session_access_token-0014": "0014"}', '{"session_id_token-0014": "0014"}', true, 'granted_audience-0014_1', CURRENT_TIMESTAMP);
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0002', 'client-0014', 'subject_obfuscated-0002', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0003', 'client-0014', 'subject_obfuscated-0003', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0004', 'client-0014', 'subject_obfuscated-0004', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0005', 'client-0014', 'subject_obfuscated-0005', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0006', 'client-0014', 'subject_obfuscated-0006', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0007', 'client-0014', 'subject_obfuscated-0007', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0008', 'client-0014', 'subject_obfuscated-0008', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0009', 'client-0014', 'subject_obfuscated-0009', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0010', 'client-0014', 'subject_obfuscated-0010', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0011', 'client-0014', 'subject_obfuscated-0011', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0012', 'client-0014', 'subject_obfuscated-0012', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0013', 'client-0014', 'subject_obfuscated-0013', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0014', 'client-0014', 'subject_obfuscated-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0009', 'verifier-0009', 'subject-0009', 'session_id-0009', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0009', 'http://post_logout/0009', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0010', 'verifier-0010', 'subject-0010', 'session_id-0010', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0010', 'http://post_logout/0010', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0011', 'verifier-0011', 'subject-0011', 'session_id-0011', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0011', 'http://post_logout/0011', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0012', 'verifier-0012', 'subject-0012', 'session_id-0012', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0012', 'http://post_logout/0012', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0013', 'verifier-0013', 'subject-0013', 'session_id-0013', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0013', 'http://post_logout/0013', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0014', 'verifier-0014', 'subject-0014', 'session_id-0014', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0014', 'http://post_logout/0014', true, true, false, true);
-- INSERT INTO hydra_oauth2_jti_blacklist (signature, expires_at, nid) VALUES ('sig-0011', '2022-02-15 22:20:22.816314', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1)); |
SQL | hydra/persistence/sql/migratest/testdata/20220210000001_testdata.sqlite3.sql | INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0001', (SELECT id FROM networks LIMIT 1), 'Client 0001', 'secret-0001', 'http://redirect/0001_1', 'grant-0001_1', 'response-0001_1', 'scope-0001', 'owner-0001', 'http://policy/0001', 'http://tos/0001', 'http://client/0001', 'http://logo/0001', 'contact-0001_1', 0, '', '', '', '', 'none', '', '', '', '', 1, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '4db0bba3-ff30-4e6d-a7eb-a08a9b0d4d0f', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0002', (SELECT id FROM networks LIMIT 1), 'Client 0002', 'secret-0002', 'http://redirect/0002_1', 'grant-0002_1', 'response-0002_1', 'scope-0002', 'owner-0002', 'http://policy/0002', 'http://tos/0002', 'http://client/0002', 'http://logo/0002', 'contact-0002_1', 0, '', '', '', '', 'none', '', '', '', '', 2, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'f24d3183-8b4f-40fa-a1a0-c5dd2aa9fabb', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0003', (SELECT id FROM networks LIMIT 1), 'Client 0003', 'secret-0003', 'http://redirect/0003_1', 'grant-0003_1', 'response-0003_1', 'scope-0003', 'owner-0003', 'http://policy/0003', 'http://tos/0003', 'http://client/0003', 'http://logo/0003', 'contact-0003_1', 0, '', '', '', '', 'none', 'r_alg-0003', 'u_alg-0003', '', '', 3, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '15dc61a0-cff0-452f-aacf-860bc79dbfe1', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0004', (SELECT id FROM networks LIMIT 1), 'Client 0004', 'secret-0004', 'http://redirect/0004_1', 'grant-0004_1', 'response-0004_1', 'scope-0004', 'owner-0004', 'http://policy/0004', 'http://tos/0004', 'http://client/0004', 'http://logo/0004', 'contact-0004_1', 0, 'http://sector_id/0004', '', 'http://jwks/0004', 'http://request/0004_1', 'none', 'r_alg-0004', 'u_alg-0004', '', '', 4, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '277dd36c-1d88-4883-a9bb-c332e7dd390f', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0005', (SELECT id FROM networks LIMIT 1), 'Client 0005', 'secret-0005', 'http://redirect/0005_1', 'grant-0005_1', 'response-0005_1', 'scope-0005', 'owner-0005', 'http://policy/0005', 'http://tos/0005', 'http://client/0005', 'http://logo/0005', 'contact-0005_1', 0, 'http://sector_id/0005', '', 'http://jwks/0005', 'http://request/0005_1', 'token_auth-0005', 'r_alg-0005', 'u_alg-0005', '', '', 5, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '604510c7-390d-4751-95bf-3be3a3bfb065', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0006', (SELECT id FROM networks LIMIT 1), 'Client 0006', 'secret-0006', 'http://redirect/0006_1', 'grant-0006_1', 'response-0006_1', 'scope-0006', 'owner-0006', 'http://policy/0006', 'http://tos/0006', 'http://client/0006', 'http://logo/0006', 'contact-0006_1', 0, 'http://sector_id/0006', '', 'http://jwks/0006', 'http://request/0006_1', 'token_auth-0006', 'r_alg-0006', 'u_alg-0006', 'subject-0006', '', 6, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '44de31b8-38cd-4873-93c9-a0e532427f0a', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0007', (SELECT id FROM networks LIMIT 1), 'Client 0007', 'secret-0007', 'http://redirect/0007_1', 'grant-0007_1', 'response-0007_1', 'scope-0007', 'owner-0007', 'http://policy/0007', 'http://tos/0007', 'http://client/0007', 'http://logo/0007', 'contact-0007_1', 0, 'http://sector_id/0007', '', 'http://jwks/0007', 'http://request/0007_1', 'token_auth-0007', 'r_alg-0007', 'u_alg-0007', 'subject-0007', '', 7, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '704488ca-c654-4e39-9f32-702a48f7ad40', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0008', (SELECT id FROM networks LIMIT 1), 'Client 0008', 'secret-0008', 'http://redirect/0008_1', 'grant-0008_1', 'response-0008_1', 'scope-0008', 'owner-0008', 'http://policy/0008', 'http://tos/0008', 'http://client/0008', 'http://logo/0008', 'contact-0008_1', 0, 'http://sector_id/0008', '', 'http://jwks/0008', 'http://request/0008_1', 'token_auth-0008', 'r_alg-0008', 'u_alg-0008', 'subject-0008', 'http://cors/0008_1', 8, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'e64adc34-cdc7-4aeb-a1a0-d387af2d23e7', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0009', (SELECT id FROM networks LIMIT 1), 'Client 0009', 'secret-0009', 'http://redirect/0009_1', 'grant-0009_1', 'response-0009_1', 'scope-0009', 'owner-0009', 'http://policy/0009', 'http://tos/0009', 'http://client/0009', 'http://logo/0009', 'contact-0009_1', 0, 'http://sector_id/0009', '', 'http://jwks/0009', 'http://request/0009_1', 'token_auth-0009', 'r_alg-0009', 'u_alg-0009', 'subject-0009', 'http://cors/0009_1', 9, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '99c1528a-4ac4-46e2-a6e4-e09d0306fd7b', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0010', (SELECT id FROM networks LIMIT 1), 'Client 0010', 'secret-0010', 'http://redirect/0010_1', 'grant-0010_1', 'response-0010_1', 'scope-0010', 'owner-0010', 'http://policy/0010', 'http://tos/0010', 'http://client/0010', 'http://logo/0010', 'contact-0010_1', 0, 'http://sector_id/0010', '', 'http://jwks/0010', 'http://request/0010_1', 'token_auth-0010', 'r_alg-0010', 'u_alg-0010', 'subject-0010', 'http://cors/0010_1', 10, '', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'ebda0ac9-0afd-4532-aec6-72c7bbd9e0dc', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0011', (SELECT id FROM networks LIMIT 1), 'Client 0011', 'secret-0011', 'http://redirect/0011_1', 'grant-0011_1', 'response-0011_1', 'scope-0011', 'owner-0011', 'http://policy/0011', 'http://tos/0011', 'http://client/0011', 'http://logo/0011', 'contact-0011_1', 0, 'http://sector_id/0011', '', 'http://jwks/0011', 'http://request/0011_1', 'token_auth-0011', 'r_alg-0011', 'u_alg-0011', 'subject-0011', 'http://cors/0011_1', 11, 'autdience-0011_1', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', '93311fb4-f5a6-4510-95dc-06cd0cfaa03b', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0012', (SELECT id FROM networks LIMIT 1), 'Client 0012', 'secret-0012', 'http://redirect/0012_1', 'grant-0012_1', 'response-0012_1', 'scope-0012', 'owner-0012', 'http://policy/0012', 'http://tos/0012', 'http://client/0012', 'http://logo/0012', 'contact-0012_1', 0, 'http://sector_id/0012', '', 'http://jwks/0012', 'http://request/0012_1', 'token_auth-0012', 'r_alg-0012', 'u_alg-0012', 'subject-0012', 'http://cors/0012_1', 12, 'autdience-0012_1', '2022-02-15 22:20:20.911379', '2022-02-15 22:20:20.911379', '', false, '', '', false, '{}', '', 'e7206da5-155b-4194-9536-caa54442a470', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0013', (SELECT id FROM networks LIMIT 1), 'Client 0013', 'secret-0013', 'http://redirect/0013_1', 'grant-0013_1', 'response-0013_1', 'scope-0013', 'owner-0013', 'http://policy/0013', 'http://tos/0013', 'http://client/0013', 'http://logo/0013', 'contact-0013_1', 0, 'http://sector_id/0013', '', 'http://jwks/0013', 'http://request/0013_1', 'token_auth-0013', 'r_alg-0013', 'u_alg-0013', 'subject-0013', 'http://cors/0013_1', 13, 'autdience-0013_1', '2022-02-15 22:20:20.969385', '2022-02-15 22:20:20.969385', 'http://front_logout/0013', true, 'http://post_redirect/0013_1', 'http://back_logout/0013', true, '{}', '', '0f309b7d-61d5-495f-bdfa-4836edcbb26d', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-0014', (SELECT id FROM networks LIMIT 1), 'Client 0014', 'secret-0014', 'http://redirect/0014_1', 'grant-0014_1', 'response-0014_1', 'scope-0014', 'owner-0014', 'http://policy/0014', 'http://tos/0014', 'http://client/0014', 'http://logo/0014', 'contact-0014_1', 0, 'http://sector_id/0014', '', 'http://jwks/0014', 'http://request/0014_1', 'token_auth-0014', 'r_alg-0014', 'u_alg-0014', 'subject-0014', 'http://cors/0014_1', 14, 'autdience-0014_1', '2022-02-15 22:20:21.13937', '2022-02-15 22:20:21.13937', 'http://front_logout/0014', true, 'http://post_redirect/0014_1', 'http://back_logout/0014', true, '{"migration": "0014"}', '', '928e8098-c3b5-499b-af29-938bb55462e9', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-2005', (SELECT id FROM networks LIMIT 1), 'Client 2005', 'secret-2005', 'http://redirect/2005_1', 'grant-2005_1', 'response-2005_1', 'scope-2005', 'owner-2005', 'http://policy/2005', 'http://tos/2005', 'http://client/2005', 'http://logo/2005', 'contact-2005_1', 0, 'http://sector_id/2005', '', 'http://jwks/2005', 'http://request/2005_1', 'token_auth-2005', 'r_alg-2005', 'u_alg-2005', 'subject-2005', 'http://cors/2005_1', 2005, 'autdience-2005_1', '2022-02-15 22:20:22.882985', '2022-02-15 22:20:22.882985', 'http://front_logout/2005', true, 'http://post_redirect/2005_1', 'http://back_logout/2005', true, '{"migration": "2005"}', '', 'afaabbc2-def3-4663-a6e0-6eb08efd6904', '');
INSERT INTO hydra_client (id, nid, client_name, client_secret, redirect_uris, grant_types, response_types, scope, owner, policy_uri, tos_uri, client_uri, logo_uri, contacts, client_secret_expires_at, sector_identifier_uri, jwks, jwks_uri, request_uris, token_endpoint_auth_method, request_object_signing_alg, userinfo_signed_response_alg, subject_type, allowed_cors_origins, pk_deprecated, audience, created_at, updated_at, frontchannel_logout_uri, frontchannel_logout_session_required, post_logout_redirect_uris, backchannel_logout_uri, backchannel_logout_session_required, metadata, token_endpoint_auth_signing_alg, pk, registration_access_token_signature) VALUES ('client-20', (SELECT id FROM networks LIMIT 1), 'Client 20', 'secret-20', 'http://redirect/20_1', 'grant-20_1', 'response-20_1', 'scope-20', 'owner-20', 'http://policy/20', 'http://tos/20', 'http://client/20', 'http://logo/20', 'contact-20_1', 0, 'http://sector_id/20', '', 'http://jwks/20', 'http://request/20_1', 'token_auth-20', 'r_alg-20', 'u_alg-20', 'subject-20', 'http://cors/20_1', 0, 'autdience-20_1', '2022-02-15 22:20:23.004598', '2022-02-15 22:20:23.004598', 'http://front_logout/20', true, 'http://post_redirect/20_1', 'http://back_logout/20', true, '{"migration": "20"}', '', '08f4a4b7-6601-4fd7-bb7f-29ec0681b86d', '');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0001', 'kid-0001', (SELECT id FROM networks LIMIT 1), 1, 'key-0001', '2022-02-15 22:20:21.166613', 1, '593ff81f-a21e-4d29-b276-bdce7b5a33df');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0002', 'kid-0002', (SELECT id FROM networks LIMIT 1), 2, 'key-0002', '2022-02-15 22:20:21.166613', 2, '609b0140-8d03-4d1b-aef1-91b86da5e6be');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0003', 'kid-0003', (SELECT id FROM networks LIMIT 1), 3, 'key-0003', '2022-02-15 22:20:21.195915', 3, 'edd5c644-c3fe-43ce-9e80-9acd1f310ecc');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0004', 'kid-0004', (SELECT id FROM networks LIMIT 1), 4, 'key-0004', '2022-02-15 22:20:21.202612', 4, 'a6e7382c-6e30-4553-a67f-4d9bf32118b4');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0005', 'kid-0005', (SELECT id FROM networks LIMIT 1), 4, 'key-0005', '2022-02-15 22:20:23.042296', 4, '94075738-c3e7-41bc-a7a5-89aece609c39');
INSERT INTO hydra_jwk (sid, kid, nid, version, keydata, created_at, pk_deprecated, pk) VALUES ('sid-0008', 'kid-0008', (SELECT id FROM networks LIMIT 1), 2, 'key-0002', '2022-02-15 22:20:23.197118', 5, 'e18d8447-3ec2-42d9-a3ad-e7cca8aa81f0');
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0003', (SELECT id FROM networks LIMIT 1), 'requested_scope-0003_1', 'verifier-0003', 'csrf-0003', 'subject-0003', 'http://request/0003', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0003"}', 'auth_session-0003', '', CURRENT_TIMESTAMP, 128, true, 3, '{}', 'acr-0003', CURRENT_TIMESTAMP, true, 'force_subject_id-0003', '{}', '', 'challenge-0003', 'verifier-0003', true, 'csrf-0003', 'granted_scope-0003_1', true, 3, '{}', '{"session_access_token-0003": "0003"}', '{"session_id_token-0003": "0003"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0004', (SELECT id FROM networks LIMIT 1), 'requested_scope-0004_1', 'verifier-0004', 'csrf-0004', 'subject-0004', 'http://request/0004', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0004"}', 'auth_session-0004', 'requested_audience-0004_1', CURRENT_TIMESTAMP, 128, true, 4, '{}', 'acr-0004', CURRENT_TIMESTAMP, true, 'force_subject_id-0004', '{}', '', 'challenge-0004', 'verifier-0004', true, 'csrf-0004', 'granted_scope-0004_1', true, 4, '{}', '{"session_access_token-0004": "0004"}', '{"session_id_token-0004": "0004"}', true, 'granted_audience-0004_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0005', (SELECT id FROM networks LIMIT 1), 'requested_scope-0005_1', 'verifier-0005', 'csrf-0005', 'subject-0005', 'http://request/0005', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0005"}', 'auth_session-0005', 'requested_audience-0005_1', CURRENT_TIMESTAMP, 128, true, 5, '{}', 'acr-0005', CURRENT_TIMESTAMP, true, 'force_subject_id-0005', '{}', '', 'challenge-0005', 'verifier-0005', true, 'csrf-0005', 'granted_scope-0005_1', true, 5, '{}', '{"session_access_token-0005": "0005"}', '{"session_id_token-0005": "0005"}', true, 'granted_audience-0005_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0006', (SELECT id FROM networks LIMIT 1), 'requested_scope-0006_1', 'verifier-0006', 'csrf-0006', 'subject-0006', 'http://request/0006', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0006"}', 'auth_session-0006', 'requested_audience-0006_1', CURRENT_TIMESTAMP, 128, true, 6, '{}', 'acr-0006', CURRENT_TIMESTAMP, true, 'force_subject_id-0006', '{}', '', 'challenge-0006', 'verifier-0006', true, 'csrf-0006', 'granted_scope-0006_1', true, 6, '{}', '{"session_access_token-0006": "0006"}', '{"session_id_token-0006": "0006"}', true, 'granted_audience-0006_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0001', (SELECT id FROM networks LIMIT 1), 'requested_scope-0001_1', 'verifier-0001', 'csrf-0001', 'subject-0001', 'http://request/0001', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0001"}', NULL, '', CURRENT_TIMESTAMP, 128, true, 1, '{}', 'acr-0001', CURRENT_TIMESTAMP, true, '', '{}', '', 'challenge-0001', 'verifier-0001', true, 'csrf-0001', 'granted_scope-0001_1', true, 1, '{}', '{"session_access_token-0001": "0001"}', '{"session_id_token-0001": "0001"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0002', (SELECT id FROM networks LIMIT 1), 'requested_scope-0002_1', 'verifier-0002', 'csrf-0002', 'subject-0002', 'http://request/0002', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0002"}', NULL, '', CURRENT_TIMESTAMP, 128, true, 2, '{}', 'acr-0002', CURRENT_TIMESTAMP, true, 'force_subject_id-0002', '{}', '', 'challenge-0002', 'verifier-0002', true, 'csrf-0002', 'granted_scope-0002_1', true, 2, '{}', '{"session_access_token-0002": "0002"}', '{"session_id_token-0002": "0002"}', true, '', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0007', (SELECT id FROM networks LIMIT 1), 'requested_scope-0007_1', 'verifier-0007', 'csrf-0007', 'subject-0007', 'http://request/0007', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0007"}', 'auth_session-0007', 'requested_audience-0007_1', CURRENT_TIMESTAMP, 128, true, 7, '{}', 'acr-0007', CURRENT_TIMESTAMP, true, 'force_subject_id-0007', '{}', '', 'challenge-0007', 'verifier-0007', true, 'csrf-0007', 'granted_scope-0007_1', true, 7, '{}', '{"session_access_token-0007": "0007"}', '{"session_id_token-0007": "0007"}', true, 'granted_audience-0007_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0008', (SELECT id FROM networks LIMIT 1), 'requested_scope-0008_1', 'verifier-0008', 'csrf-0008', 'subject-0008', 'http://request/0008', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0008"}', 'auth_session-0008', 'requested_audience-0008_1', CURRENT_TIMESTAMP, 128, true, 8, '{}', 'acr-0008', CURRENT_TIMESTAMP, true, 'force_subject_id-0008', '{"context": "0008"}', '', 'challenge-0008', 'verifier-0008', true, 'csrf-0008', 'granted_scope-0008_1', true, 8, '{}', '{"session_access_token-0008": "0008"}', '{"session_id_token-0008": "0008"}', true, 'granted_audience-0008_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0009', (SELECT id FROM networks LIMIT 1), 'requested_scope-0009_1', 'verifier-0009', 'csrf-0009', 'subject-0009', 'http://request/0009', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0009"}', 'auth_session-0009', 'requested_audience-0009_1', CURRENT_TIMESTAMP, 128, true, 9, '{}', 'acr-0009', CURRENT_TIMESTAMP, true, 'force_subject_id-0009', '{"context": "0009"}', '', 'challenge-0009', 'verifier-0009', true, 'csrf-0009', 'granted_scope-0009_1', true, 9, '{}', '{"session_access_token-0009": "0009"}', '{"session_id_token-0009": "0009"}', true, 'granted_audience-0009_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0010', (SELECT id FROM networks LIMIT 1), 'requested_scope-0010_1', 'verifier-0010', 'csrf-0010', 'subject-0010', 'http://request/0010', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0010"}', 'auth_session-0010', 'requested_audience-0010_1', CURRENT_TIMESTAMP, 128, true, 10, '{}', 'acr-0010', CURRENT_TIMESTAMP, true, 'force_subject_id-0010', '{"context": "0010"}', '', 'challenge-0010', 'verifier-0010', true, 'csrf-0010', 'granted_scope-0010_1', true, 10, '{}', '{"session_access_token-0010": "0010"}', '{"session_id_token-0010": "0010"}', true, 'granted_audience-0010_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0011', (SELECT id FROM networks LIMIT 1), 'requested_scope-0011_1', 'verifier-0011', 'csrf-0011', 'subject-0011', 'http://request/0011', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0011"}', 'auth_session-0011', 'requested_audience-0011_1', CURRENT_TIMESTAMP, 128, true, 11, '{}', 'acr-0011', CURRENT_TIMESTAMP, true, 'force_subject_id-0011', '{"context": "0011"}', '', 'challenge-0011', 'verifier-0011', true, 'csrf-0011', 'granted_scope-0011_1', true, 11, '{}', '{"session_access_token-0011": "0011"}', '{"session_id_token-0011": "0011"}', true, 'granted_audience-0011_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0012', (SELECT id FROM networks LIMIT 1), 'requested_scope-0012_1', 'verifier-0012', 'csrf-0012', 'subject-0012', 'http://request/0012', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0012"}', 'auth_session-0012', 'requested_audience-0012_1', CURRENT_TIMESTAMP, 128, true, 12, '{}', 'acr-0012', CURRENT_TIMESTAMP, true, 'force_subject_id-0012', '{"context": "0012"}', '', 'challenge-0012', 'verifier-0012', true, 'csrf-0012', 'granted_scope-0012_1', true, 12, '{}', '{"session_access_token-0012": "0012"}', '{"session_id_token-0012": "0012"}', true, 'granted_audience-0012_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0013', (SELECT id FROM networks LIMIT 1), 'requested_scope-0013_1', 'verifier-0013', 'csrf-0013', 'subject-0013', 'http://request/0013', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0013"}', 'auth_session-0013', 'requested_audience-0013_1', CURRENT_TIMESTAMP, 128, true, 13, '{}', 'acr-0013', CURRENT_TIMESTAMP, true, 'force_subject_id-0013', '{"context": "0013"}', '', 'challenge-0013', 'verifier-0013', true, 'csrf-0013', 'granted_scope-0013_1', true, 13, '{}', '{"session_access_token-0013": "0013"}', '{"session_id_token-0013": "0013"}', true, 'granted_audience-0013_1', NULL);
INSERT INTO hydra_oauth2_flow (login_challenge, nid, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_verifier, consent_skip, consent_csrf, granted_scope, consent_remember, consent_remember_for, consent_error, session_access_token, session_id_token, consent_was_used, granted_at_audience, consent_handled_at) VALUES ('challenge-0014', (SELECT id FROM networks LIMIT 1), 'requested_scope-0014_1', 'verifier-0014', 'csrf-0014', 'subject-0014', 'http://request/0014', true, 'client-0014', CURRENT_TIMESTAMP, '{"display": "display-0014"}', 'auth_session-0014', 'requested_audience-0014_1', CURRENT_TIMESTAMP, 128, true, 14, '{}', 'acr-0014', CURRENT_TIMESTAMP, true, 'force_subject_id-0014', '{"context": "0014"}', '', 'challenge-0014', 'verifier-0014', true, 'csrf-0014', 'granted_scope-0014_1', true, 14, '{}', '{"session_access_token-0014": "0014"}', '{"session_id_token-0014": "0014"}', true, 'granted_audience-0014_1', CURRENT_TIMESTAMP);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0001', CURRENT_TIMESTAMP, 'subject-0001', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0002', CURRENT_TIMESTAMP, 'subject-0002', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0003', CURRENT_TIMESTAMP, 'subject-0003', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0004', CURRENT_TIMESTAMP, 'subject-0004', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0005', CURRENT_TIMESTAMP, 'subject-0005', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0006', CURRENT_TIMESTAMP, 'subject-0006', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0007', CURRENT_TIMESTAMP, 'subject-0007', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0008', CURRENT_TIMESTAMP, 'subject-0008', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0009', CURRENT_TIMESTAMP, 'subject-0009', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0010', CURRENT_TIMESTAMP, 'subject-0010', (SELECT id FROM networks LIMIT 1), true);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0011', CURRENT_TIMESTAMP, 'subject-0011', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0012', CURRENT_TIMESTAMP, 'subject-0012', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0013', CURRENT_TIMESTAMP, 'subject-0013', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_authentication_session (id, authenticated_at, subject, nid, remember) VALUES ('auth_session-0014', CURRENT_TIMESTAMP, 'subject-0014', (SELECT id FROM networks LIMIT 1), false);
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0002', 'client-0014', 'subject_obfuscated-0002', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0003', 'client-0014', 'subject_obfuscated-0003', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0004', 'client-0014', 'subject_obfuscated-0004', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0005', 'client-0014', 'subject_obfuscated-0005', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0006', 'client-0014', 'subject_obfuscated-0006', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0007', 'client-0014', 'subject_obfuscated-0007', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0008', 'client-0014', 'subject_obfuscated-0008', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0009', 'client-0014', 'subject_obfuscated-0009', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0010', 'client-0014', 'subject_obfuscated-0010', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0011', 'client-0014', 'subject_obfuscated-0011', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0012', 'client-0014', 'subject_obfuscated-0012', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0013', 'client-0014', 'subject_obfuscated-0013', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_obfuscated_authentication_session (subject, client_id, subject_obfuscated, nid) VALUES ('subject-0014', 'client-0014', 'subject_obfuscated-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0009', 'verifier-0009', 'subject-0009', 'session_id-0009', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0009', 'http://post_logout/0009', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0010', 'verifier-0010', 'subject-0010', 'session_id-0010', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0010', 'http://post_logout/0010', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0011', 'verifier-0011', 'subject-0011', 'session_id-0011', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0011', 'http://post_logout/0011', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0012', 'verifier-0012', 'subject-0012', 'session_id-0012', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0012', 'http://post_logout/0012', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0013', 'verifier-0013', 'subject-0013', 'session_id-0013', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0013', 'http://post_logout/0013', true, true, false, true);
INSERT INTO hydra_oauth2_logout_request (challenge, verifier, subject, sid, client_id, nid, request_url, redir_url, was_used, accepted, rejected, rp_initiated) VALUES ('challenge-0014', 'verifier-0014', 'subject-0014', 'session_id-0014', 'client-0014', (SELECT id FROM networks LIMIT 1), 'http://request/0014', 'http://post_logout/0014', true, true, false, true);
INSERT INTO hydra_oauth2_jti_blacklist (signature, expires_at, nid) VALUES ('sig-0011', '2022-02-15 22:20:22.816314', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_access (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_refresh (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_code (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0001', 'req-0001', '2022-02-15 22:20:21.825677', 'client-0014', 'scope-0001', 'granted_scope-0001', 'form_data-0001', 'session-0001', '', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0002', 'req-0002', '2022-02-15 22:20:21.890642', 'client-0014', 'scope-0002', 'granted_scope-0002', 'form_data-0002', 'session-0002', 'subject-0002', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_oidc (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0003', 'req-0003', '2022-02-15 22:20:21.966429', 'client-0014', 'scope-0003', 'granted_scope-0003', 'form_data-0003', 'session-0003', 'subject-0003', true, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0004', 'req-0004', '2022-02-15 22:20:21.985991', 'client-0014', 'scope-0004', 'granted_scope-0004', 'form_data-0004', 'session-0004', 'subject-0004', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0005', 'req-0005', '2022-02-15 22:20:22.073402', 'client-0014', 'scope-0005', 'granted_scope-0005', 'form_data-0005', 'session-0005', 'subject-0005', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0006', 'req-0006', '2022-02-15 22:20:22.09772', 'client-0014', 'scope-0006', 'granted_scope-0006', 'form_data-0006', 'session-0006', 'subject-0006', false, '', '', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0007', 'req-0007', '2022-02-15 22:20:22.110219', 'client-0014', 'scope-0007', 'granted_scope-0007', 'form_data-0007', 'session-0007', 'subject-0007', false, 'requested_audience-0007', 'granted_audience-0007', NULL, (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0008', 'req-0008', '2022-02-15 22:20:22.366046', 'client-0001', 'scope-0008', 'granted_scope-0008', 'form_data-0008', 'session-0008', 'subject-0008', false, 'requested_audience-0008', 'granted_audience-0008', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0009', 'req-0009', '2022-02-15 22:20:22.381518', 'client-0001', 'scope-0009', 'granted_scope-0009', 'form_data-0009', 'session-0009', 'subject-0009', false, 'requested_audience-0009', 'granted_audience-0009', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0010', 'req-0010', '2022-02-15 22:20:22.755881', 'client-0001', 'scope-0010', 'granted_scope-0010', 'form_data-0010', 'session-0010', 'subject-0010', false, 'requested_audience-0010', 'granted_audience-0010', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-0011', 'req-0011', '2022-02-15 22:20:22.816314', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1));
INSERT INTO hydra_oauth2_pkce (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) VALUES ('sig-20201110104000-01', 'req-20201110104000', '2022-02-15 22:20:22.907631', 'client-0001', 'scope-0011', 'granted_scope-0011', 'form_data-0011', 'session-0011', 'subject-0011', false, 'requested_audience-0011', 'granted_audience-0011', 'challenge-0014', (SELECT id FROM networks LIMIT 1)); |
SQL | hydra/persistence/sql/migratest/testdata/20220328111500_testdata.sql | INSERT INTO hydra_jwk (pk_deprecated, pk, sid, kid, nid, version, keydata, created_at) VALUES (9, '98565339-57c7-4bc0-bc3d-53171d60e832', 'sid-0009', 'kid-0009', (SELECT id FROM networks LIMIT 1), 2, 'key-0002', CURRENT_TIMESTAMP);
INSERT INTO hydra_oauth2_trusted_jwt_bearer_issuer (id, nid, issuer, subject, allow_any_subject, scope, key_set, key_id)
VALUES ('30e51720-4a88-48ca-8243-de7d8f461675', (SELECT id FROM networks LIMIT 1), 'some-issuer', 'some-subject', false, 'some-scope', 'sid-0009', 'kid-0009');
INSERT INTO hydra_oauth2_trusted_jwt_bearer_issuer (id, nid, issuer, subject, allow_any_subject, scope, key_set, key_id)
VALUES ('30e51720-4a88-48ca-8243-de7d8f461676', (SELECT id FROM networks LIMIT 1), 'some-issuer', '', true, 'some-scope', 'sid-0009', 'kid-0009'); |
SQL | hydra/persistence/sql/migratest/testdata/20220513000001_testdata.sql | INSERT INTO hydra_client (
id,
nid,
client_name,
client_secret,
redirect_uris,
grant_types,
response_types,
scope,
owner,
policy_uri,
tos_uri,
client_uri,
logo_uri,
contacts,
client_secret_expires_at,
sector_identifier_uri,
jwks,
jwks_uri,
request_uris,
token_endpoint_auth_method,
request_object_signing_alg,
userinfo_signed_response_alg,
subject_type,
allowed_cors_origins,
pk_deprecated,
audience,
created_at,
updated_at,
frontchannel_logout_uri,
frontchannel_logout_session_required,
post_logout_redirect_uris,
backchannel_logout_uri,
backchannel_logout_session_required,
metadata,
token_endpoint_auth_signing_alg,
pk,
registration_access_token_signature)
VALUES (
'client-21',
(SELECT id FROM networks LIMIT 1),
'Client 21',
'secret-21',
'["http://redirect/21_1","http://redirect/21_2"]',
'["grant-21_1","grant-21_2"]',
'["response-21_1","response-21_2"]',
'scope-21',
'owner-21',
'http://policy/21',
'http://tos/21',
'http://client/21',
'http://logo/21',
'["contact-21_1","contact-21_2"]',
0,
'http://sector_id/21',
'',
'http://jwks/21',
'["http://request/21_1","http://request/21_2"]',
'token_auth-21',
'r_alg-21',
'u_alg-21',
'subject-21',
'["http://cors/21_1","http://cors/21_2"]',
0,
'["autdience-21_1","autdience-21_2"]',
'2022-02-15 22:20:23.004598',
'2022-02-15 22:20:23.004598',
'http://front_logout/21',
true,
'["http://post_redirect/21_1","http://post_redirect/21_2"]',
'http://back_logout/21',
true,
'{"migration": "21"}',
'',
'47434cc1-ae2d-4791-83d2-afb46cb84ee3',
''
);
INSERT INTO hydra_oauth2_authentication_session (
id,
nid,
authenticated_at,
subject,
remember
) VALUES (
'auth_session-0015',
(SELECT id FROM networks LIMIT 1),
CURRENT_TIMESTAMP,
'subject-0015',
false
);
INSERT INTO hydra_oauth2_flow (
login_challenge,
nid,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
oidc_context,
login_session_id,
requested_at_audience,
login_initialized_at,
state,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at
) VALUES (
'challenge-0015',
(SELECT id FROM networks LIMIT 1),
'["requested_scope-0015_1","requested_scope-0015_2"]',
'verifier-0015',
'csrf-0015',
'subject-0015',
'http://request/0015',
true,
'client-21',
CURRENT_TIMESTAMP,
'{"display": "display-0015"}',
'auth_session-0015',
'["requested_audience-0015_1","requested_audience-0015_2"]',
CURRENT_TIMESTAMP,
128,
true,
15,
'{}',
'acr-0015',
CURRENT_TIMESTAMP,
true,
'force_subject_id-0015',
'{"context": "0015"}',
'["amr-0015-1","amr-0015-2"]',
'challenge-0015',
'verifier-0015',
true,
'csrf-0015',
'["granted_scope-0015_1","granted_scope-0015_2"]',
true,
15,
'{}',
'{"session_access_token-0015": "0015"}',
'{"session_id_token-0015": "0015"}',
true,
'["granted_audience-0015_1","granted_audience-0015_2"]',
CURRENT_TIMESTAMP
); |
SQL | hydra/persistence/sql/migratest/testdata/20230313112801000001_testdata.sql | INSERT INTO hydra_oauth2_authentication_session (
id,
nid,
authenticated_at,
subject,
remember
) VALUES (
'auth_session-0016',
(SELECT id FROM networks LIMIT 1),
CURRENT_TIMESTAMP,
'subject-0016',
true
);
INSERT INTO hydra_oauth2_flow (
login_challenge,
nid,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
oidc_context,
login_session_id,
requested_at_audience,
login_initialized_at,
state,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at,
login_extend_session_lifespan
) VALUES (
'challenge-0016',
(SELECT id FROM networks LIMIT 1),
'["requested_scope-0016_1","requested_scope-0016_2"]',
'verifier-0016',
'csrf-0016',
'subject-0016',
'http://request/0016',
true,
'client-21',
CURRENT_TIMESTAMP,
'{"display": "display-0016"}',
'auth_session-0016',
'["requested_audience-0016_1","requested_audience-0016_2"]',
CURRENT_TIMESTAMP,
128,
true,
15,
'{}',
'acr-0016',
CURRENT_TIMESTAMP,
true,
'force_subject_id-0016',
'{"context": "0016"}',
'["amr-0016-1","amr-0016-2"]',
'challenge-0016',
'verifier-0016',
true,
'csrf-0016',
'["granted_scope-0016_1","granted_scope-0016_2"]',
true,
15,
'{}',
'{"session_access_token-0016": "0016"}',
'{"session_id_token-0016": "0016"}',
true,
'["granted_audience-0016_1","granted_audience-0016_2"]',
CURRENT_TIMESTAMP,
true
); |
SQL | hydra/persistence/sql/migratest/testdata/20230809122501000001_testdata.sql | INSERT INTO hydra_oauth2_authentication_session (
id,
nid,
authenticated_at,
subject,
remember,
identity_provider_session_id
) VALUES (
'auth_session-0017',
(SELECT id FROM networks LIMIT 1),
CURRENT_TIMESTAMP,
'subject-0017',
true,
'identity_provider_session_id-0017'
);
INSERT INTO hydra_oauth2_flow (
login_challenge,
nid,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
oidc_context,
login_session_id,
requested_at_audience,
login_initialized_at,
state,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at,
login_extend_session_lifespan,
identity_provider_session_id
) VALUES (
'challenge-0017',
(SELECT id FROM networks LIMIT 1),
'["requested_scope-0016_1","requested_scope-0016_2"]',
'verifier-0017',
'csrf-0017',
'subject-0017',
'http://request/0017',
true,
'client-21',
CURRENT_TIMESTAMP,
'{"display": "display-0017"}',
'auth_session-0017',
'["requested_audience-0016_1","requested_audience-0016_2"]',
CURRENT_TIMESTAMP,
128,
true,
15,
'{}',
'acr-0017',
CURRENT_TIMESTAMP,
true,
'force_subject_id-0017',
'{"context": "0017"}',
'["amr-0017-1","amr-0017-2"]',
'challenge-0017',
'verifier-0017',
true,
'csrf-0017',
'["granted_scope-0016_1","granted_scope-0016_2"]',
true,
15,
'{}',
'{"session_access_token-0017": "0017"}',
'{"session_id_token-0017": "0017"}',
true,
'["granted_audience-0016_1","granted_audience-0016_2"]',
CURRENT_TIMESTAMP,
true,
'identity_provider_session_id-0017'
); |
SQL | hydra/persistence/sql/migrations/20150101000001000000_networks.cockroach.up.sql | -- Migration generated by the command below; DO NOT EDIT.
-- hydra:generate hydra migrate gen
CREATE TABLE "networks" (
"id" UUID NOT NULL,
PRIMARY KEY("id"),
"created_at" timestamp NOT NULL,
"updated_at" timestamp NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (gen_random_uuid(), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/migrations/20150101000001000000_networks.down.sql | -- Migration generated by the command below; DO NOT EDIT.
-- hydra:generate hydra migrate gen
-- Down migrations from Hydra 2.x to 1.x are not available. |
SQL | hydra/persistence/sql/migrations/20150101000001000000_networks.mysql.up.sql | -- Migration generated by the command below; DO NOT EDIT.
-- hydra:generate hydra migrate gen
CREATE TABLE `networks` (
`id` char(36) NOT NULL,
PRIMARY KEY(`id`),
`created_at` DATETIME NOT NULL,
`updated_at` DATETIME NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES ((SELECT LOWER(CONCAT(
HEX(RANDOM_BYTES(4)),
'-', HEX(RANDOM_BYTES(2)),
'-4', SUBSTR(HEX(RANDOM_BYTES(2)), 2, 3),
'-', CONCAT(HEX(FLOOR(ASCII(RANDOM_BYTES(1)) / 64)+8),SUBSTR(HEX(RANDOM_BYTES(2)), 2, 3)),
'-', HEX(RANDOM_BYTES(6))
))), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/migrations/20150101000001000000_networks.postgres.up.sql | -- Migration generated by the command below; DO NOT EDIT.
-- hydra:generate hydra migrate gen
CREATE TABLE "networks" (
"id" UUID NOT NULL,
PRIMARY KEY("id"),
"created_at" timestamp NOT NULL,
"updated_at" timestamp NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (uuid_in(
overlay(
overlay(
md5(random()::text || ':' || clock_timestamp()::text)
placing '4'
from 13
)
placing to_hex(floor(random()*(11-8+1) + 8)::int)::text
from 17
)::cstring
), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/migrations/20150101000001000000_networks.sqlite.up.sql | -- Migration generated by the command below; DO NOT EDIT.
-- hydra:generate hydra migrate gen
CREATE TABLE "networks" (
"id" TEXT PRIMARY KEY,
"created_at" DATETIME NOT NULL,
"updated_at" DATETIME NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (lower(
hex(randomblob(4)) ||
'-' || hex(randomblob(2)) ||
'-' || '4' || substr(hex(randomblob(2)), 2) ||
'-' || substr('AB89', 1 + (abs(random()) % 4) , 1) || substr(hex(randomblob(2)), 2) ||
'-' || hex(randomblob(6))
), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/migrations/20190100000001000000_client.up.sql | CREATE TABLE IF NOT EXISTS hydra_client (
id varchar(255) NOT NULL PRIMARY KEY,
client_name text NOT NULL,
client_secret text NOT NULL,
redirect_uris text NOT NULL,
grant_types text NOT NULL,
response_types text NOT NULL,
scope text NOT NULL,
owner text NOT NULL,
policy_uri text NOT NULL,
tos_uri text NOT NULL,
client_uri text NOT NULL,
logo_uri text NOT NULL,
contacts text NOT NULL,
public boolean NOT NULL
); |
SQL | hydra/persistence/sql/migrations/20190100000003000000_client.down.sql | ALTER TABLE hydra_client DROP COLUMN sector_identifier_uri;
ALTER TABLE hydra_client DROP COLUMN jwks;
ALTER TABLE hydra_client DROP COLUMN jwks_uri;
ALTER TABLE hydra_client DROP COLUMN token_endpoint_auth_method;
ALTER TABLE hydra_client DROP COLUMN request_uris;
ALTER TABLE hydra_client DROP COLUMN request_object_signing_alg;
ALTER TABLE hydra_client DROP COLUMN userinfo_signed_response_alg; |
SQL | hydra/persistence/sql/migrations/20190100000003000000_client.up.sql | ALTER TABLE hydra_client ADD sector_identifier_uri TEXT;
ALTER TABLE hydra_client ADD jwks TEXT;
ALTER TABLE hydra_client ADD jwks_uri TEXT;
ALTER TABLE hydra_client ADD request_uris TEXT;
ALTER TABLE hydra_client ADD token_endpoint_auth_method VARCHAR(25) NOT NULL DEFAULT '';
ALTER TABLE hydra_client ADD request_object_signing_alg VARCHAR(10) NOT NULL DEFAULT '';
ALTER TABLE hydra_client ADD userinfo_signed_response_alg VARCHAR(10) NOT NULL DEFAULT ''; |
SQL | hydra/persistence/sql/migrations/20190100000004000000_client.mysql.down.sql | ALTER TABLE hydra_client MODIFY sector_identifier_uri TEXT;
ALTER TABLE hydra_client MODIFY jwks TEXT;
ALTER TABLE hydra_client MODIFY jwks_uri TEXT;
ALTER TABLE hydra_client MODIFY request_uris TEXT; |
SQL | hydra/persistence/sql/migrations/20190100000004000000_client.mysql.up.sql | UPDATE hydra_client SET sector_identifier_uri='', jwks='', jwks_uri='', request_uris='';
ALTER TABLE hydra_client MODIFY sector_identifier_uri TEXT NOT NULL;
ALTER TABLE hydra_client MODIFY jwks TEXT NOT NULL;
ALTER TABLE hydra_client MODIFY jwks_uri TEXT NOT NULL;
ALTER TABLE hydra_client MODIFY request_uris TEXT NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000004000000_client.postgres.down.sql | ALTER TABLE hydra_client ALTER COLUMN sector_identifier_uri DROP NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN jwks DROP NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN jwks_uri DROP NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN request_uris DROP NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000004000000_client.postgres.up.sql | UPDATE hydra_client SET sector_identifier_uri='', jwks='', jwks_uri='', request_uris='';
ALTER TABLE hydra_client ALTER COLUMN sector_identifier_uri SET NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN jwks SET NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN jwks_uri SET NOT NULL;
ALTER TABLE hydra_client ALTER COLUMN request_uris SET NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000005000000_client.down.sql | ALTER TABLE hydra_client ADD public BOOLEAN NOT NULL DEFAULT FALSE;
UPDATE hydra_client SET public=TRUE WHERE token_endpoint_auth_method='none'; |
SQL | hydra/persistence/sql/migrations/20190100000005000000_client.up.sql | UPDATE hydra_client SET token_endpoint_auth_method='none' WHERE public=TRUE;
ALTER TABLE hydra_client DROP COLUMN public; |
SQL | hydra/persistence/sql/migrations/20190100000008000000_client.mysql.up.sql | UPDATE hydra_client SET allowed_cors_origins='';
ALTER TABLE hydra_client MODIFY allowed_cors_origins TEXT NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000008000000_client.postgres.up.sql | UPDATE hydra_client SET allowed_cors_origins='';
ALTER TABLE hydra_client ALTER COLUMN allowed_cors_origins SET NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000009000000_client.mysql.down.sql | ALTER TABLE hydra_client DROP COLUMN pk;
ALTER TABLE hydra_client DROP INDEX hydra_client_idx_id_uq;
ALTER TABLE hydra_client ADD PRIMARY KEY (id); |
SQL | hydra/persistence/sql/migrations/20190100000009000000_client.mysql.up.sql | ALTER TABLE hydra_client DROP PRIMARY KEY;
CREATE UNIQUE INDEX hydra_client_idx_id_uq ON hydra_client (id);
ALTER TABLE hydra_client ADD pk INT UNSIGNED AUTO_INCREMENT PRIMARY KEY; |
SQL | hydra/persistence/sql/migrations/20190100000009000000_client.postgres.down.sql | ALTER TABLE hydra_client DROP CONSTRAINT hydra_client_pkey;
ALTER TABLE hydra_client DROP COLUMN pk;
DROP INDEX hydra_client_idx_id_uq;
ALTER TABLE hydra_client ADD PRIMARY KEY (id); |
SQL | hydra/persistence/sql/migrations/20190100000009000000_client.postgres.up.sql | ALTER TABLE hydra_client DROP CONSTRAINT hydra_client_pkey;
ALTER TABLE hydra_client ADD pk SERIAL;
ALTER TABLE hydra_client ADD PRIMARY KEY (pk);
CREATE UNIQUE INDEX hydra_client_idx_id_uq ON hydra_client (id); |
SQL | hydra/persistence/sql/migrations/20190100000012000000_client.up.sql | ALTER TABLE hydra_client ADD created_at timestamp NOT NULL DEFAULT now();
ALTER TABLE hydra_client ADD updated_at timestamp NOT NULL DEFAULT now(); |
SQL | hydra/persistence/sql/migrations/20190100000013000000_client.cockroach.up.sql | CREATE TABLE IF NOT EXISTS hydra_client (
id varchar(255) NOT NULL,
client_name text NOT NULL,
client_secret text NOT NULL,
redirect_uris text NOT NULL,
grant_types text NOT NULL,
response_types text NOT NULL,
scope text NOT NULL,
owner text NOT NULL,
policy_uri text NOT NULL,
tos_uri text NOT NULL,
client_uri text NOT NULL,
logo_uri text NOT NULL,
contacts text NOT NULL,
client_secret_expires_at INTEGER NOT NULL DEFAULT 0,
sector_identifier_uri text NOT NULL,
jwks text NOT NULL,
jwks_uri text NOT NULL,
request_uris text NOT NULL,
token_endpoint_auth_method VARCHAR(25) NOT NULL DEFAULT '',
request_object_signing_alg VARCHAR(10) NOT NULL DEFAULT '',
userinfo_signed_response_alg VARCHAR(10) NOT NULL DEFAULT '',
subject_type VARCHAR(15) NOT NULL DEFAULT '',
allowed_cors_origins text NOT NULL,
pk SERIAL,
audience text NOT NULL,
created_at timestamp NOT NULL DEFAULT now(),
updated_at timestamp NOT NULL DEFAULT now(),
frontchannel_logout_uri TEXT NOT NULL DEFAULT '',
frontchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE,
post_logout_redirect_uris TEXT NOT NULL DEFAULT '',
backchannel_logout_uri TEXT NOT NULL DEFAULT '',
backchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE,
UNIQUE (id),
CONSTRAINT "primary" PRIMARY KEY (pk ASC)
); |
SQL | hydra/persistence/sql/migrations/20190100000013000000_client.mysql.down.sql | ALTER TABLE hydra_client DROP COLUMN frontchannel_logout_uri;
ALTER TABLE hydra_client DROP COLUMN frontchannel_logout_session_required;
ALTER TABLE hydra_client DROP COLUMN post_logout_redirect_uris;
ALTER TABLE hydra_client DROP COLUMN backchannel_logout_uri;
ALTER TABLE hydra_client DROP COLUMN backchannel_logout_session_required; |
SQL | hydra/persistence/sql/migrations/20190100000013000000_client.mysql.up.sql | ALTER TABLE hydra_client ADD frontchannel_logout_uri TEXT NULL;
ALTER TABLE hydra_client ADD frontchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE;
ALTER TABLE hydra_client ADD post_logout_redirect_uris TEXT NULL;
ALTER TABLE hydra_client ADD backchannel_logout_uri TEXT NULL;
ALTER TABLE hydra_client ADD backchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE;
UPDATE hydra_client SET frontchannel_logout_uri='',post_logout_redirect_uris='',backchannel_logout_uri='';
ALTER TABLE hydra_client MODIFY frontchannel_logout_uri TEXT NOT NULL;
ALTER TABLE hydra_client MODIFY post_logout_redirect_uris TEXT NOT NULL;
ALTER TABLE hydra_client MODIFY backchannel_logout_uri TEXT NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000013000000_client.postgres.down.sql | ALTER TABLE hydra_client DROP COLUMN frontchannel_logout_uri;
ALTER TABLE hydra_client DROP COLUMN frontchannel_logout_session_required;
ALTER TABLE hydra_client DROP COLUMN post_logout_redirect_uris;
ALTER TABLE hydra_client DROP COLUMN backchannel_logout_uri;
ALTER TABLE hydra_client DROP COLUMN backchannel_logout_session_required; |
SQL | hydra/persistence/sql/migrations/20190100000013000000_client.postgres.up.sql | ALTER TABLE hydra_client ADD frontchannel_logout_uri TEXT NOT NULL DEFAULT '';
ALTER TABLE hydra_client ADD frontchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE;
ALTER TABLE hydra_client ADD post_logout_redirect_uris TEXT NOT NULL DEFAULT '';
ALTER TABLE hydra_client ADD backchannel_logout_uri TEXT NOT NULL DEFAULT '';
ALTER TABLE hydra_client ADD backchannel_logout_session_required BOOL NOT NULL DEFAULT FALSE; |
SQL | hydra/persistence/sql/migrations/20190100000014000000_client.mysql.up.sql | ALTER TABLE hydra_client ADD metadata TEXT NULL;
UPDATE hydra_client SET metadata='{}';
ALTER TABLE hydra_client MODIFY metadata TEXT NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190100000014000000_client.postgres.up.sql | ALTER TABLE hydra_client ADD metadata TEXT NULL;
UPDATE hydra_client SET metadata='{}';
ALTER TABLE hydra_client ALTER COLUMN metadata SET NOT NULL; |
SQL | hydra/persistence/sql/migrations/20190200000001000000_jwk.up.sql | CREATE TABLE IF NOT EXISTS hydra_jwk (
sid varchar(255) NOT NULL,
kid varchar(255) NOT NULL,
version int NOT NULL DEFAULT 0,
keydata text NOT NULL,
PRIMARY KEY (sid, kid)
); |
SQL | hydra/persistence/sql/migrations/20190200000004000000_jwk.cockroach.up.sql | CREATE TABLE IF NOT EXISTS hydra_jwk (
sid varchar(255) NOT NULL,
kid varchar(255) NOT NULL,
version int NOT NULL DEFAULT 0,
keydata text NOT NULL,
created_at TIMESTAMP NOT NULL DEFAULT NOW(),
pk SERIAL,
UNIQUE INDEX (sid, kid),
CONSTRAINT "primary" PRIMARY KEY (pk ASC)
); |
SQL | hydra/persistence/sql/migrations/20190200000004000000_jwk.mysql.down.sql | ALTER TABLE hydra_jwk DROP COLUMN pk;
ALTER TABLE hydra_jwk DROP INDEX hydra_jwk_idx_id_uq;
ALTER TABLE hydra_jwk ADD PRIMARY KEY (sid, kid); |
SQL | hydra/persistence/sql/migrations/20190200000004000000_jwk.mysql.up.sql | ALTER TABLE hydra_jwk DROP PRIMARY KEY;
CREATE UNIQUE INDEX hydra_jwk_idx_id_uq ON hydra_jwk (sid, kid);
ALTER TABLE hydra_jwk ADD pk INT UNSIGNED AUTO_INCREMENT PRIMARY KEY; |
SQL | hydra/persistence/sql/migrations/20190200000004000000_jwk.postgres.down.sql | ALTER TABLE hydra_jwk DROP CONSTRAINT hydra_jwk_pkey;
ALTER TABLE hydra_jwk DROP COLUMN pk;
DROP INDEX hydra_jwk_idx_id_uq;
ALTER TABLE hydra_jwk ADD PRIMARY KEY (sid, kid); |
SQL | hydra/persistence/sql/migrations/20190200000004000000_jwk.postgres.up.sql | ALTER TABLE hydra_jwk DROP CONSTRAINT hydra_jwk_pkey;
ALTER TABLE hydra_jwk ADD pk SERIAL;
ALTER TABLE hydra_jwk ADD PRIMARY KEY (pk);
CREATE UNIQUE INDEX hydra_jwk_idx_id_uq ON hydra_jwk (sid, kid); |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.