language
stringlengths 0
24
| filename
stringlengths 9
214
| code
stringlengths 99
9.93M
|
---|---|---|
SQL | hydra/persistence/sql/migrations/20230606112801000001_remove_flow_indices.mysql.up.sql | DROP INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_flow_multi_query_idx ON hydra_oauth2_flow;
CREATE INDEX hydra_oauth2_flow_previous_consents_idx
ON hydra_oauth2_flow (subject, client_id, nid, consent_skip, consent_error(2), consent_remember); |
SQL | hydra/persistence/sql/migrations/20230606112801000001_remove_flow_indices.up.sql | DROP INDEX hydra_oauth2_flow_login_verifier_idx;
DROP INDEX hydra_oauth2_flow_consent_verifier_idx;
DROP INDEX hydra_oauth2_flow_multi_query_idx;
CREATE INDEX IF NOT EXISTS hydra_oauth2_flow_previous_consents_idx
ON hydra_oauth2_flow (subject, client_id, nid, consent_skip, consent_error, consent_remember); |
SQL | hydra/persistence/sql/migrations/20230809122501000001_add_kratos_session_id.down.sql | ALTER TABLE hydra_oauth2_flow DROP COLUMN identity_provider_session_id;
ALTER TABLE hydra_oauth2_authentication_session DROP COLUMN identity_provider_session_id; |
SQL | hydra/persistence/sql/migrations/20230809122501000001_add_kratos_session_id.up.sql | ALTER TABLE hydra_oauth2_flow ADD COLUMN identity_provider_session_id VARCHAR(40);
ALTER TABLE hydra_oauth2_authentication_session ADD COLUMN identity_provider_session_id VARCHAR(40); |
SQL | hydra/persistence/sql/src/20150101000001_networks/20150101000001000000_networks.cockroach.up.sql | CREATE TABLE "networks" (
"id" UUID NOT NULL,
PRIMARY KEY("id"),
"created_at" timestamp NOT NULL,
"updated_at" timestamp NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (gen_random_uuid(), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/src/20150101000001_networks/20150101000001000000_networks.mysql.up.sql | CREATE TABLE `networks` (
`id` char(36) NOT NULL,
PRIMARY KEY(`id`),
`created_at` DATETIME NOT NULL,
`updated_at` DATETIME NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES ((SELECT LOWER(CONCAT(
HEX(RANDOM_BYTES(4)),
'-', HEX(RANDOM_BYTES(2)),
'-4', SUBSTR(HEX(RANDOM_BYTES(2)), 2, 3),
'-', CONCAT(HEX(FLOOR(ASCII(RANDOM_BYTES(1)) / 64)+8),SUBSTR(HEX(RANDOM_BYTES(2)), 2, 3)),
'-', HEX(RANDOM_BYTES(6))
))), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/src/20150101000001_networks/20150101000001000000_networks.postgres.up.sql | CREATE TABLE "networks" (
"id" UUID NOT NULL,
PRIMARY KEY("id"),
"created_at" timestamp NOT NULL,
"updated_at" timestamp NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (uuid_in(
overlay(
overlay(
md5(random()::text || ':' || clock_timestamp()::text)
placing '4'
from 13
)
placing to_hex(floor(random()*(11-8+1) + 8)::int)::text
from 17
)::cstring
), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/src/20150101000001_networks/20150101000001000000_networks.sqlite.up.sql | CREATE TABLE "networks" (
"id" TEXT PRIMARY KEY,
"created_at" DATETIME NOT NULL,
"updated_at" DATETIME NOT NULL
);
INSERT INTO networks (id, created_at, updated_at) VALUES (lower(
hex(randomblob(4)) ||
'-' || hex(randomblob(2)) ||
'-' || '4' || substr(hex(randomblob(2)), 2) ||
'-' || substr('AB89', 1 + (abs(random()) % 4) , 1) || substr(hex(randomblob(2)), 2) ||
'-' || hex(randomblob(6))
), '2013-10-07 08:23:19', '2013-10-07 08:23:19'); |
SQL | hydra/persistence/sql/src/20211019000001_merge_authentication_request_tables/20211019000001000000_merge_authentication_request_tables.cockroach.up.sql | CREATE TABLE hydra_oauth2_flow
(
login_challenge character varying(40) NOT NULL,
requested_scope text NOT NULL DEFAULT '[]',
login_verifier character varying(40) NOT NULL,
login_csrf character varying(40) NOT NULL,
subject character varying(255) NOT NULL,
request_url text NOT NULL,
login_skip boolean NOT NULL,
client_id character varying(255) NOT NULL,
requested_at timestamp without time zone DEFAULT now() NOT NULL,
login_initialized_at timestamp without time zone NULL DEFAULT NULL,
oidc_context jsonb NOT NULL DEFAULT '{}',
login_session_id character varying(40) NULL,
requested_at_audience text NULL DEFAULT '[]',
state INTEGER NOT NULL,
login_remember boolean NOT NULL DEFAULT false,
login_remember_for integer NOT NULL,
login_error text NULL,
acr text NOT NULL DEFAULT '',
login_authenticated_at timestamp without time zone NULL DEFAULT NULL,
login_was_used boolean NOT NULL DEFAULT false,
forced_subject_identifier character varying(255) NOT NULL DEFAULT ''::character varying,
context jsonb DEFAULT '{}',
amr text DEFAULT '[]',
consent_challenge_id character varying(40) NULL,
consent_skip boolean DEFAULT false NOT NULL,
consent_verifier character varying(40) NULL,
consent_csrf character varying(40) NULL,
granted_scope text NOT NULL DEFAULT '[]',
granted_at_audience text NOT NULL DEFAULT '[]',
consent_remember boolean DEFAULT false NOT NULL,
consent_remember_for integer NULL,
consent_handled_at TIMESTAMP WITHOUT TIME ZONE NULL,
consent_error TEXT NULL,
session_access_token jsonb DEFAULT '{}' NOT NULL,
session_id_token jsonb DEFAULT '{}' NOT NULL,
consent_was_used boolean DEFAULT false NOT NULL,
CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
)
);
--split
INSERT INTO hydra_oauth2_flow (
state,
login_challenge,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
login_initialized_at,
oidc_context,
login_session_id,
requested_at_audience,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at
) SELECT
case
when hydra_oauth2_authentication_request_handled.error IS NOT NULL then 128
when hydra_oauth2_consent_request_handled.error IS NOT NULL then 129
when hydra_oauth2_consent_request_handled.was_used = true then 6
when hydra_oauth2_consent_request_handled.challenge IS NOT NULL then 5
when hydra_oauth2_consent_request.challenge IS NOT NULL then 4
when hydra_oauth2_authentication_request_handled.was_used = true then 3
when hydra_oauth2_authentication_request_handled.challenge IS NOT NULL then 2
else 1
end,
hydra_oauth2_authentication_request.challenge,
hydra_oauth2_authentication_request.requested_scope,
hydra_oauth2_authentication_request.verifier,
hydra_oauth2_authentication_request.csrf,
hydra_oauth2_authentication_request.subject,
hydra_oauth2_authentication_request.request_url,
hydra_oauth2_authentication_request.skip,
hydra_oauth2_authentication_request.client_id,
hydra_oauth2_authentication_request.requested_at,
hydra_oauth2_authentication_request.authenticated_at,
cast(coalesce(hydra_oauth2_authentication_request.oidc_context, '{}') as jsonb),
hydra_oauth2_authentication_request.login_session_id,
hydra_oauth2_authentication_request.requested_at_audience,
coalesce(hydra_oauth2_authentication_request_handled.remember, false),
coalesce(hydra_oauth2_authentication_request_handled.remember_for, 0),
hydra_oauth2_authentication_request_handled.error,
coalesce(hydra_oauth2_authentication_request_handled.acr, ''),
hydra_oauth2_authentication_request_handled.authenticated_at,
coalesce(hydra_oauth2_authentication_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request.forced_subject_identifier, hydra_oauth2_authentication_request_handled.forced_subject_identifier, ''),
cast(coalesce(hydra_oauth2_authentication_request_handled.context, '{}') as jsonb),
coalesce(hydra_oauth2_authentication_request_handled.amr, ''),
hydra_oauth2_consent_request.challenge,
hydra_oauth2_consent_request.verifier,
coalesce(hydra_oauth2_consent_request.skip, false),
hydra_oauth2_consent_request.csrf,
coalesce(hydra_oauth2_consent_request_handled.granted_scope, '[]'),
coalesce(hydra_oauth2_consent_request_handled.remember, false),
coalesce(hydra_oauth2_consent_request_handled.remember_for, 0),
hydra_oauth2_consent_request_handled.error,
cast(coalesce(hydra_oauth2_consent_request_handled.session_access_token, '{}') as jsonb),
cast(coalesce(hydra_oauth2_consent_request_handled.session_id_token, '{}') as jsonb),
coalesce(hydra_oauth2_consent_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request_handled.granted_at_audience, '[]'),
hydra_oauth2_consent_request_handled.handled_at
FROM hydra_oauth2_authentication_request
LEFT JOIN hydra_oauth2_authentication_request_handled
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_authentication_request_handled.challenge
LEFT JOIN hydra_oauth2_consent_request
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_consent_request.login_challenge
LEFT JOIN hydra_oauth2_consent_request_handled
ON hydra_oauth2_consent_request.challenge = hydra_oauth2_consent_request_handled.challenge;
--split
CREATE INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow USING btree (client_id, subject);
CREATE INDEX hydra_oauth2_flow_cid_idx ON hydra_oauth2_flow USING btree (client_id);
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow USING btree (login_session_id);
CREATE INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow USING btree (subject);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_challenge_idx ON hydra_oauth2_flow USING btree (consent_challenge_id);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow USING btree (login_verifier);
CREATE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow USING btree (consent_verifier);
--split
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_pkey PRIMARY KEY (login_challenge);
--split
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_client_id_fk FOREIGN KEY (client_id) REFERENCES hydra_client(id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_login_session_id_fk FOREIGN KEY (login_session_id) REFERENCES hydra_oauth2_authentication_session(id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_access DROP CONSTRAINT hydra_oauth2_access_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_code DROP CONSTRAINT hydra_oauth2_code_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_code ADD CONSTRAINT hydra_oauth2_code_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_oidc DROP CONSTRAINT hydra_oauth2_oidc_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_oidc ADD CONSTRAINT hydra_oauth2_oidc_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_pkce DROP CONSTRAINT hydra_oauth2_pkce_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_refresh DROP CONSTRAINT hydra_oauth2_refresh_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
DROP TABLE hydra_oauth2_consent_request_handled;
--split
DROP TABLE hydra_oauth2_consent_request;
--split
DROP TABLE hydra_oauth2_authentication_request_handled;
--split
DROP TABLE hydra_oauth2_authentication_request; |
SQL | hydra/persistence/sql/src/20211019000001_merge_authentication_request_tables/20211019000001000000_merge_authentication_request_tables.mysql.up.sql | CREATE TABLE hydra_oauth2_flow
(
`login_challenge` varchar(40) NOT NULL,
`requested_scope` text NOT NULL DEFAULT ('[]'),
`login_verifier` varchar(40) NOT NULL,
`login_csrf` varchar(40) NOT NULL,
`subject` varchar(255) NOT NULL,
`request_url` text NOT NULL,
`login_skip` tinyint(1) NOT NULL,
`client_id` varchar(255) NOT NULL,
`requested_at` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP,
`login_initialized_at` timestamp NULL DEFAULT NULL,
`oidc_context` json NOT NULL DEFAULT (('{}')),
`login_session_id` varchar(40) NULL,
`requested_at_audience` text NULL DEFAULT ('[]'),
`state` smallint NOT NULL,
`login_remember` tinyint(1) NOT NULL DEFAULT false,
`login_remember_for` int(11) NOT NULL,
`login_error` text NULL,
`acr` text NOT NULL DEFAULT (''),
`login_authenticated_at` timestamp NULL DEFAULT NULL,
`login_was_used` tinyint(1) NOT NULL DEFAULT false,
`forced_subject_identifier` varchar(255) NOT NULL DEFAULT '',
`context` json NOT NULL DEFAULT ('{}'),
`amr` text NOT NULL DEFAULT ('[]'),
`consent_challenge_id` varchar(40) NULL,
`consent_skip` tinyint(1) NOT NULL DEFAULT 0,
`consent_verifier` varchar(40) NULL,
`consent_csrf` varchar(40) NULL,
`granted_scope` text NOT NULL DEFAULT ('[]'),
`granted_at_audience` text NOT NULL DEFAULT ('[]'),
`consent_remember` tinyint(1) NOT NULL DEFAULT false,
`consent_remember_for` int(11) NULL,
`consent_handled_at` timestamp NULL DEFAULT NULL,
`consent_error` TEXT NULL,
`session_access_token` json DEFAULT ('{}') NOT NULL,
`session_id_token` json DEFAULT ('{}') NOT NULL,
`consent_was_used` tinyint(1),
PRIMARY KEY (`login_challenge`),
UNIQUE KEY `hydra_oauth2_flow_login_verifier_idx` (`login_verifier`),
KEY `hydra_oauth2_flow_cid_idx` (`client_id`),
KEY `hydra_oauth2_flow_sub_idx` (`subject`),
KEY `hydra_oauth2_flow_login_session_id_idx` (`login_session_id`),
CONSTRAINT `hydra_oauth2_flow_client_id_fk` FOREIGN KEY (`client_id`) REFERENCES `hydra_client` (`id`) ON DELETE CASCADE,
CONSTRAINT `hydra_oauth2_flow_login_session_id_fk` FOREIGN KEY (`login_session_id`) REFERENCES `hydra_oauth2_authentication_session` (`id`) ON DELETE CASCADE,
UNIQUE KEY `hydra_oauth2_flow_consent_challenge_idx` (`consent_challenge_id`),
KEY `hydra_oauth2_flow_consent_verifier_idx` (`consent_verifier`),
KEY `hydra_oauth2_flow_client_id_subject_idx` (`client_id`,`subject`)
);
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_chk CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
);
--split
INSERT INTO hydra_oauth2_flow (
state,
login_challenge,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
login_initialized_at,
oidc_context,
login_session_id,
requested_at_audience,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
`consent_challenge_id`,
`consent_verifier`,
`consent_skip`,
`consent_csrf`,
`granted_scope`,
`consent_remember`,
`consent_remember_for`,
`consent_error`,
`session_access_token`,
`session_id_token`,
`consent_was_used`,
`granted_at_audience`,
`consent_handled_at`
) SELECT
case
when hydra_oauth2_authentication_request_handled.error IS NOT NULL then 128
when hydra_oauth2_consent_request_handled.error IS NOT NULL then 129
when hydra_oauth2_consent_request_handled.was_used = true then 6
when hydra_oauth2_consent_request_handled.challenge IS NOT NULL then 5
when hydra_oauth2_consent_request.challenge IS NOT NULL then 4
when hydra_oauth2_authentication_request_handled.was_used = true then 3
when hydra_oauth2_authentication_request_handled.challenge IS NOT NULL then 2
else 1
end,
hydra_oauth2_authentication_request.challenge,
hydra_oauth2_authentication_request.requested_scope,
hydra_oauth2_authentication_request.verifier,
hydra_oauth2_authentication_request.csrf,
hydra_oauth2_authentication_request.subject,
hydra_oauth2_authentication_request.request_url,
hydra_oauth2_authentication_request.skip,
hydra_oauth2_authentication_request.client_id,
hydra_oauth2_authentication_request.requested_at,
hydra_oauth2_authentication_request.authenticated_at,
coalesce(hydra_oauth2_authentication_request.oidc_context, '{}'),
hydra_oauth2_authentication_request.login_session_id,
hydra_oauth2_authentication_request.requested_at_audience,
coalesce(hydra_oauth2_authentication_request_handled.remember, false),
coalesce(hydra_oauth2_authentication_request_handled.remember_for, 0),
hydra_oauth2_authentication_request_handled.error,
coalesce(hydra_oauth2_authentication_request_handled.acr, ''),
hydra_oauth2_authentication_request_handled.authenticated_at,
coalesce(hydra_oauth2_authentication_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request.forced_subject_identifier, hydra_oauth2_authentication_request_handled.forced_subject_identifier, ''),
coalesce(hydra_oauth2_authentication_request_handled.context, '{}'),
coalesce(hydra_oauth2_authentication_request_handled.amr, ''),
hydra_oauth2_consent_request.challenge,
hydra_oauth2_consent_request.verifier,
coalesce(hydra_oauth2_consent_request.skip, false),
hydra_oauth2_consent_request.csrf,
coalesce(hydra_oauth2_consent_request_handled.granted_scope, '[]'),
coalesce(hydra_oauth2_consent_request_handled.remember, false),
coalesce(hydra_oauth2_consent_request_handled.remember_for, 0),
hydra_oauth2_consent_request_handled.error,
coalesce(hydra_oauth2_consent_request_handled.session_access_token, ('{}')),
coalesce(hydra_oauth2_consent_request_handled.session_id_token, ('{}')),
coalesce(hydra_oauth2_consent_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request_handled.granted_at_audience, '[]'),
hydra_oauth2_consent_request_handled.handled_at
FROM hydra_oauth2_authentication_request
LEFT JOIN hydra_oauth2_authentication_request_handled
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_authentication_request_handled.challenge
LEFT JOIN hydra_oauth2_consent_request
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_consent_request.login_challenge
LEFT JOIN hydra_oauth2_consent_request_handled
ON hydra_oauth2_consent_request.challenge = hydra_oauth2_consent_request_handled.challenge;
--split
ALTER TABLE hydra_oauth2_access DROP FOREIGN KEY hydra_oauth2_access_challenge_id_fk;
--split
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_code DROP FOREIGN KEY hydra_oauth2_code_challenge_id_fk;
--split
ALTER TABLE hydra_oauth2_code ADD CONSTRAINT hydra_oauth2_code_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_oidc DROP FOREIGN KEY hydra_oauth2_oidc_challenge_id_fk;
--split
ALTER TABLE hydra_oauth2_oidc ADD CONSTRAINT hydra_oauth2_oidc_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_pkce DROP FOREIGN KEY hydra_oauth2_pkce_challenge_id_fk;
--split
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_refresh DROP FOREIGN KEY hydra_oauth2_refresh_challenge_id_fk;
--split
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
DROP TABLE hydra_oauth2_consent_request_handled;
--split
DROP TABLE hydra_oauth2_consent_request;
--split
DROP TABLE hydra_oauth2_authentication_request_handled;
--split
DROP TABLE hydra_oauth2_authentication_request; |
SQL | hydra/persistence/sql/src/20211019000001_merge_authentication_request_tables/20211019000001000000_merge_authentication_request_tables.postgres.up.sql | CREATE TABLE hydra_oauth2_flow
(
login_challenge character varying(40) NOT NULL,
requested_scope text NOT NULL DEFAULT '[]',
login_verifier character varying(40) NOT NULL,
login_csrf character varying(40) NOT NULL,
subject character varying(255) NOT NULL,
request_url text NOT NULL,
login_skip boolean NOT NULL,
client_id character varying(255) NOT NULL,
requested_at timestamp without time zone DEFAULT now() NOT NULL,
login_initialized_at timestamp without time zone NULL DEFAULT NULL,
oidc_context jsonb NOT NULL DEFAULT '{}',
login_session_id character varying(40) NULL,
requested_at_audience text DEFAULT '[]'::text,
state INTEGER NOT NULL,
login_remember boolean NOT NULL DEFAULT false,
login_remember_for integer NOT NULL,
login_error text NULL,
acr text NOT NULL DEFAULT '',
login_authenticated_at timestamp without time zone NULL DEFAULT NULL,
login_was_used boolean NOT NULL DEFAULT false,
forced_subject_identifier character varying(255) NOT NULL DEFAULT ''::character varying,
context jsonb NOT NULL DEFAULT '{}',
amr text NOT NULL DEFAULT '[]',
consent_challenge_id character varying(40),
consent_skip boolean DEFAULT false NOT NULL,
consent_verifier character varying(40) NULL,
consent_csrf character varying(40) NULL,
granted_scope text NOT NULL DEFAULT '[]',
granted_at_audience text NOT NULL DEFAULT '[]',
consent_remember boolean DEFAULT false NOT NULL,
consent_remember_for INTEGER NULL,
consent_handled_at TIMESTAMP WITHOUT TIME ZONE NULL,
consent_error TEXT NULL,
session_access_token jsonb DEFAULT '{}' NOT NULL,
session_id_token jsonb DEFAULT '{}' NOT NULL,
consent_was_used boolean DEFAULT false NOT NULL,
CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
)
);
--split
INSERT INTO hydra_oauth2_flow (
state,
login_challenge,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
login_initialized_at,
oidc_context,
login_session_id,
requested_at_audience,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at
) SELECT
case
when hydra_oauth2_authentication_request_handled.error IS NOT NULL then 128
when hydra_oauth2_consent_request_handled.error IS NOT NULL then 129
when hydra_oauth2_consent_request_handled.was_used = true then 6
when hydra_oauth2_consent_request_handled.challenge IS NOT NULL then 5
when hydra_oauth2_consent_request.challenge IS NOT NULL then 4
when hydra_oauth2_authentication_request_handled.was_used = true then 3
when hydra_oauth2_authentication_request_handled.challenge IS NOT NULL then 2
else 1
end,
hydra_oauth2_authentication_request.challenge,
hydra_oauth2_authentication_request.requested_scope,
hydra_oauth2_authentication_request.verifier,
hydra_oauth2_authentication_request.csrf,
hydra_oauth2_authentication_request.subject,
hydra_oauth2_authentication_request.request_url,
hydra_oauth2_authentication_request.skip,
hydra_oauth2_authentication_request.client_id,
hydra_oauth2_authentication_request.requested_at,
hydra_oauth2_authentication_request.authenticated_at,
cast(coalesce(hydra_oauth2_authentication_request.oidc_context, '{}') as jsonb),
hydra_oauth2_authentication_request.login_session_id,
hydra_oauth2_authentication_request.requested_at_audience,
coalesce(hydra_oauth2_authentication_request_handled.remember, false),
coalesce(hydra_oauth2_authentication_request_handled.remember_for, 0),
hydra_oauth2_authentication_request_handled.error,
coalesce(hydra_oauth2_authentication_request_handled.acr, ''),
hydra_oauth2_authentication_request_handled.authenticated_at,
coalesce(hydra_oauth2_authentication_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request.forced_subject_identifier, hydra_oauth2_authentication_request_handled.forced_subject_identifier, ''),
cast(coalesce(hydra_oauth2_authentication_request_handled.context, '{}') as jsonb),
coalesce(hydra_oauth2_authentication_request_handled.amr, ''),
hydra_oauth2_consent_request.challenge,
hydra_oauth2_consent_request.verifier,
coalesce(hydra_oauth2_consent_request.skip, false),
hydra_oauth2_consent_request.csrf,
coalesce(hydra_oauth2_consent_request_handled.granted_scope, '[]'),
coalesce(hydra_oauth2_consent_request_handled.remember, false),
coalesce(hydra_oauth2_consent_request_handled.remember_for, 0),
hydra_oauth2_consent_request_handled.error,
cast(coalesce(hydra_oauth2_consent_request_handled.session_access_token, '{}') as jsonb),
cast(coalesce(hydra_oauth2_consent_request_handled.session_id_token, '{}') as jsonb),
coalesce(hydra_oauth2_consent_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request_handled.granted_at_audience, '[]'),
hydra_oauth2_consent_request_handled.handled_at
FROM hydra_oauth2_authentication_request
LEFT JOIN hydra_oauth2_authentication_request_handled
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_authentication_request_handled.challenge
LEFT JOIN hydra_oauth2_consent_request
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_consent_request.login_challenge
LEFT JOIN hydra_oauth2_consent_request_handled
ON hydra_oauth2_consent_request.challenge = hydra_oauth2_consent_request_handled.challenge;
--split
CREATE INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow USING btree (client_id, subject);
CREATE INDEX hydra_oauth2_flow_cid_idx ON hydra_oauth2_flow USING btree (client_id);
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow USING btree (login_session_id);
CREATE INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow USING btree (subject);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_challenge_idx ON hydra_oauth2_flow USING btree (consent_challenge_id);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow USING btree (login_verifier);
CREATE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow USING btree (consent_verifier);
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_pkey PRIMARY KEY (login_challenge);
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_client_id_fk FOREIGN KEY (client_id) REFERENCES hydra_client(id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_login_session_id_fk FOREIGN KEY (login_session_id) REFERENCES hydra_oauth2_authentication_session(id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_access DROP CONSTRAINT hydra_oauth2_access_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_code DROP CONSTRAINT hydra_oauth2_code_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_code ADD CONSTRAINT hydra_oauth2_code_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_oidc DROP CONSTRAINT hydra_oauth2_oidc_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_oidc ADD CONSTRAINT hydra_oauth2_oidc_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_pkce DROP CONSTRAINT hydra_oauth2_pkce_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
ALTER TABLE ONLY hydra_oauth2_refresh DROP CONSTRAINT hydra_oauth2_refresh_challenge_id_fk;
ALTER TABLE ONLY hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_challenge_id_fk FOREIGN KEY (challenge_id) REFERENCES hydra_oauth2_flow(consent_challenge_id) ON DELETE CASCADE;
--split
DROP TABLE hydra_oauth2_consent_request_handled;
--split
DROP TABLE hydra_oauth2_consent_request;
--split
DROP TABLE hydra_oauth2_authentication_request_handled;
--split
DROP TABLE hydra_oauth2_authentication_request; |
SQL | hydra/persistence/sql/src/20211019000001_merge_authentication_request_tables/20211019000001000000_merge_authentication_request_tables.sqlite.up.sql | CREATE TABLE hydra_oauth2_flow
(
login_challenge VARCHAR(40) NOT NULL PRIMARY KEY,
requested_scope TEXT NOT NULL DEFAULT '[]',
login_verifier VARCHAR(40) NOT NULL,
login_csrf VARCHAR(40) NOT NULL,
subject VARCHAR(255) NOT NULL,
request_url TEXT NOT NULL,
login_skip INTEGER NOT NULL,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
login_initialized_at TIMESTAMP NULL DEFAULT NULL,
oidc_context jsonb NOT NULL DEFAULT '{}',
login_session_id VARCHAR(40) NULL REFERENCES hydra_oauth2_authentication_session (id) ON DELETE CASCADE DEFAULT '',
requested_at_audience text NULL DEFAULT '[]',
state INTEGER NOT NULL,
login_remember INTEGER NOT NULL DEFAULT false,
login_remember_for INTEGER NOT NULL,
login_error TEXT NULL,
acr TEXT NOT NULL DEFAULT '',
login_authenticated_at TIMESTAMP NULL DEFAULT NULL,
login_was_used INTEGER NOT NULL DEFAULT false,
forced_subject_identifier VARCHAR(255) NOT NULL DEFAULT '',
context jsonb NOT NULL DEFAULT '{}',
amr text NOT NULL DEFAULT '[]',
consent_challenge_id VARCHAR(40) NULL,
consent_skip INTEGER NOT NULL DEFAULT false,
consent_verifier VARCHAR(40) NULL,
consent_csrf VARCHAR(40) NULL,
granted_scope text NOT NULL DEFAULT '[]',
granted_at_audience text NOT NULL DEFAULT '[]',
consent_remember INTEGER NOT NULL DEFAULT 0,
consent_remember_for INTEGER NULL,
consent_handled_at TIMESTAMP NULL,
consent_was_used INTEGER NOT NULL DEFAULT false,
consent_error TEXT NULL,
session_id_token jsonb NULL DEFAULT '{}',
session_access_token jsonb NULL DEFAULT '{}'
CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
)
);
--split
INSERT INTO hydra_oauth2_flow (
state,
login_challenge,
requested_scope,
login_verifier,
login_csrf,
subject,
request_url,
login_skip,
client_id,
requested_at,
login_initialized_at,
oidc_context,
login_session_id,
requested_at_audience,
login_remember,
login_remember_for,
login_error,
acr,
login_authenticated_at,
login_was_used,
forced_subject_identifier,
context,
amr,
consent_challenge_id,
consent_verifier,
consent_skip,
consent_csrf,
granted_scope,
consent_remember,
consent_remember_for,
consent_error,
session_access_token,
session_id_token,
consent_was_used,
granted_at_audience,
consent_handled_at
) SELECT
case
when hydra_oauth2_authentication_request_handled.error IS NOT NULL then 128
when hydra_oauth2_consent_request_handled.error IS NOT NULL then 129
when hydra_oauth2_consent_request_handled.was_used = true then 6
when hydra_oauth2_consent_request_handled.challenge IS NOT NULL then 5
when hydra_oauth2_consent_request.challenge IS NOT NULL then 4
when hydra_oauth2_authentication_request_handled.was_used = true then 3
when hydra_oauth2_authentication_request_handled.challenge IS NOT NULL then 2
else 1
end,
hydra_oauth2_authentication_request.challenge,
hydra_oauth2_authentication_request.requested_scope,
hydra_oauth2_authentication_request.verifier,
hydra_oauth2_authentication_request.csrf,
hydra_oauth2_authentication_request.subject,
hydra_oauth2_authentication_request.request_url,
hydra_oauth2_authentication_request.skip,
hydra_oauth2_authentication_request.client_id,
hydra_oauth2_authentication_request.requested_at,
hydra_oauth2_authentication_request.authenticated_at,
coalesce(hydra_oauth2_authentication_request.oidc_context, '{}'),
hydra_oauth2_authentication_request.login_session_id,
hydra_oauth2_authentication_request.requested_at_audience,
coalesce(hydra_oauth2_authentication_request_handled.remember, false),
coalesce(hydra_oauth2_authentication_request_handled.remember_for, 0),
hydra_oauth2_authentication_request_handled.error,
coalesce(hydra_oauth2_authentication_request_handled.acr, ''),
hydra_oauth2_authentication_request_handled.authenticated_at,
coalesce(hydra_oauth2_authentication_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request.forced_subject_identifier, hydra_oauth2_authentication_request_handled.forced_subject_identifier, ''),
coalesce(hydra_oauth2_authentication_request_handled.context, '{}'),
coalesce(hydra_oauth2_authentication_request_handled.amr, ''),
hydra_oauth2_consent_request.challenge,
hydra_oauth2_consent_request.verifier,
coalesce(hydra_oauth2_consent_request.skip, false),
hydra_oauth2_consent_request.csrf,
coalesce(hydra_oauth2_consent_request_handled.granted_scope, '[]'),
coalesce(hydra_oauth2_consent_request_handled.remember, false),
coalesce(hydra_oauth2_consent_request_handled.remember_for, 0),
hydra_oauth2_consent_request_handled.error,
coalesce(hydra_oauth2_consent_request_handled.session_access_token, '{}'),
coalesce(hydra_oauth2_consent_request_handled.session_id_token, '{}'),
coalesce(hydra_oauth2_consent_request_handled.was_used, false),
coalesce(hydra_oauth2_consent_request_handled.granted_at_audience, '[]'),
hydra_oauth2_consent_request_handled.handled_at
FROM hydra_oauth2_authentication_request
LEFT JOIN hydra_oauth2_authentication_request_handled
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_authentication_request_handled.challenge
LEFT JOIN hydra_oauth2_consent_request
ON hydra_oauth2_authentication_request.challenge = hydra_oauth2_consent_request.login_challenge
LEFT JOIN hydra_oauth2_consent_request_handled
ON hydra_oauth2_consent_request.challenge = hydra_oauth2_consent_request_handled.challenge;
--split
CREATE INDEX hydra_oauth2_flow_client_id_idx ON hydra_oauth2_flow (client_id);
--split
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow (login_session_id);
--split
CREATE INDEX hydra_oauth2_flow_subject_idx ON hydra_oauth2_flow (subject);
--split
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_challenge_id_idx ON hydra_oauth2_flow (consent_challenge_id);
--split
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow (login_verifier);
--split
CREATE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow (consent_verifier);
--split
DROP TABLE hydra_oauth2_authentication_request;
--split
DROP TABLE hydra_oauth2_authentication_request_handled;
--split
DROP TABLE hydra_oauth2_consent_request;
--split
DROP TABLE hydra_oauth2_consent_request_handled;
--split
DROP TABLE hydra_oauth2_code;
--split
CREATE TABLE hydra_oauth2_code
(
signature VARCHAR(255) NOT NULL,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE
);
--split
CREATE INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code (client_id);
--split
CREATE INDEX hydra_oauth2_code_challenge_id_idx ON hydra_oauth2_code (challenge_id);
--split
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id);
--split
DROP TABLE hydra_oauth2_oidc;
--split
CREATE TABLE hydra_oauth2_oidc
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE
);
--split
CREATE INDEX hydra_oauth2_oidc_client_id_idx ON hydra_oauth2_oidc (client_id);
--split
CREATE INDEX hydra_oauth2_oidc_challenge_id_idx ON hydra_oauth2_oidc (challenge_id);
--split
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id);
--split
DROP TABLE hydra_oauth2_pkce;
--split
CREATE TABLE hydra_oauth2_pkce
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL,
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE
);
--split
CREATE INDEX hydra_oauth2_pkce_client_id_idx ON hydra_oauth2_pkce (client_id);
--split
CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id);
--split
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id);
--split
DROP TABLE "hydra_oauth2_access";
--split
CREATE TABLE IF NOT EXISTS "hydra_oauth2_access"
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE
);
--split
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at);
--split
CREATE INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access (client_id);
--split
CREATE INDEX hydra_oauth2_access_challenge_id_idx ON hydra_oauth2_access (challenge_id);
--split
CREATE INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access (client_id, subject);
--split
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id);
--split
DROP TABLE hydra_oauth2_refresh;
--split
CREATE TABLE hydra_oauth2_refresh
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE
);
--split
CREATE INDEX hydra_oauth2_refresh_client_id_idx ON hydra_oauth2_refresh (client_id);
--split
CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id);
--split
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id, subject);
--split
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id); |
SQL | hydra/persistence/sql/src/20220210000001_nid/20220210000001000000_nid.cockroach.up.sql | -- hydra_client
ALTER TABLE hydra_client ADD COLUMN "nid" UUID;
ALTER TABLE hydra_client ADD CONSTRAINT "hydra_client_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_client SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_client ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_client_id_key CASCADE;
--split
CREATE UNIQUE INDEX hydra_client_id_key ON hydra_client (id ASC, nid ASC);
--split
-- hydra_oauth2_access
ALTER TABLE hydra_oauth2_access ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_access SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_access ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_access_requested_at_idx;
DROP INDEX hydra_oauth2_access_client_id_idx;
DROP INDEX hydra_oauth2_access_challenge_id_idx;
DROP INDEX hydra_oauth2_access_client_id_subject_idx;
DROP INDEX hydra_oauth2_access_request_id_idx;
--split
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at, nid);
CREATE INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access (client_id, nid);
CREATE INDEX hydra_oauth2_access_challenge_id_idx ON hydra_oauth2_access (challenge_id);
CREATE INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access (client_id, subject, nid);
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id, nid);
--split
-- hydra_oauth2_authentication_session
ALTER TABLE hydra_oauth2_authentication_session ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_authentication_session ADD CONSTRAINT hydra_oauth2_authentication_session_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_authentication_session ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_oauth2_authentication_session_subject_idx;
--split
CREATE INDEX hydra_oauth2_authentication_session_subject_idx ON hydra_oauth2_authentication_session (subject ASC, nid ASC);
--split
-- hydra_oauth2_code
ALTER TABLE hydra_oauth2_code ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_code ADD CONSTRAINT "hydra_oauth2_code_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_code SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_code ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_code ADD CONSTRAINT hydra_oauth2_code_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_code_client_id_idx;
DROP INDEX hydra_oauth2_code_challenge_id_idx;
DROP INDEX hydra_oauth2_code_request_id_idx;
--split
CREATE INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code (client_id, nid);
CREATE INDEX hydra_oauth2_code_challenge_id_idx ON hydra_oauth2_code (challenge_id, nid);
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id, nid);
--split
-- hydra_oauth2_flow
ALTER TABLE hydra_oauth2_flow ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT "hydra_oauth2_flow_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_flow SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_flow ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_flow_client_id_subject_idx;
DROP INDEX hydra_oauth2_flow_cid_idx;
DROP INDEX hydra_oauth2_flow_login_session_id_idx;
DROP INDEX hydra_oauth2_flow_sub_idx;
DROP INDEX hydra_oauth2_flow_login_verifier_idx;
DROP INDEX hydra_oauth2_flow_consent_verifier_idx;
--split
CREATE INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow (client_id ASC, nid ASC, subject ASC);
CREATE INDEX hydra_oauth2_flow_cid_idx ON hydra_oauth2_flow (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow (login_session_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow (subject ASC, nid ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow (login_verifier ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow (consent_verifier ASC);
--split
-- hydra_oauth2_jti_blacklist
ALTER TABLE hydra_oauth2_jti_blacklist ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_jti_blacklist ADD CONSTRAINT "hydra_oauth2_jti_blacklist_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_jti_blacklist SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_jti_blacklist ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_oauth2_jti_blacklist_expires_at_idx;
--split
CREATE INDEX hydra_oauth2_jti_blacklist_expires_at_idx ON hydra_oauth2_jti_blacklist (expires_at ASC, nid ASC);
--split
ALTER TABLE hydra_oauth2_jti_blacklist DROP CONSTRAINT "primary";
ALTER TABLE hydra_oauth2_jti_blacklist ADD CONSTRAINT hydra_oauth2_jti_blacklist_pkey PRIMARY KEY (signature ASC, nid ASC);
--split
-- hydra_oauth2_logout_request
ALTER TABLE hydra_oauth2_logout_request ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT hydra_oauth2_logout_request_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_logout_request SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_logout_request ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT hydra_oauth2_logout_request_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_logout_request_client_id_idx;
--split
CREATE INDEX hydra_oauth2_logout_request_client_id_idx ON hydra_oauth2_logout_request (client_id ASC, nid ASC);
--split
-- hydra_oauth2_obfuscated_authentication_session
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT hydra_oauth2_obfuscated_authentication_session_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_obfuscated_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT hydra_oauth2_obfuscated_authentication_session_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session DROP CONSTRAINT "primary";
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT "hydra_oauth2_obfuscated_authentication_session_pkey" PRIMARY KEY (subject ASC, client_id ASC, nid ASC);
--split
DROP INDEX hydra_oauth2_obfuscated_authentication_session_client_id_subject_obfuscated_idx;
--split
CREATE UNIQUE INDEX hydra_oauth2_obfuscated_authentication_session_client_id_subject_obfuscated_idx ON hydra_oauth2_obfuscated_authentication_session (client_id ASC, subject_obfuscated ASC, nid ASC);
--split
-- hydra_oauth2_oidc
ALTER TABLE hydra_oauth2_oidc ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_oidc ADD CONSTRAINT "hydra_oauth2_oidc_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_oidc SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_oidc ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_oidc ADD CONSTRAINT hydra_oauth2_oidc_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_oidc_client_id_idx;
DROP INDEX hydra_oauth2_oidc_challenge_id_idx;
DROP INDEX hydra_oauth2_oidc_request_id_idx;
--split
CREATE INDEX hydra_oauth2_oidc_client_id_idx ON hydra_oauth2_oidc (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_oidc_challenge_id_idx ON hydra_oauth2_oidc (challenge_id ASC);
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id ASC, nid ASC);
--split
-- hydra_oauth2_pkce
ALTER TABLE hydra_oauth2_pkce ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_pkce SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_pkce ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_pkce_client_id_idx;
DROP INDEX hydra_oauth2_pkce_challenge_id_idx;
DROP INDEX hydra_oauth2_pkce_request_id_idx;
--split
CREATE INDEX hydra_oauth2_pkce_client_id_idx ON hydra_oauth2_pkce (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id ASC);
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id ASC, nid ASC);
--split
-- hydra_oauth2_refresh
ALTER TABLE hydra_oauth2_refresh ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_refresh SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_refresh ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_refresh_client_id_idx;
DROP INDEX hydra_oauth2_refresh_challenge_id_idx;
DROP INDEX hydra_oauth2_refresh_client_id_subject_idx;
DROP INDEX hydra_oauth2_refresh_request_id_idx;
--split
CREATE INDEX hydra_oauth2_refresh_client_id_idx ON hydra_oauth2_refresh (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id ASC);
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id ASC, subject ASC);
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id ASC);
--split
-- hydra_jwk
ALTER TABLE hydra_jwk ADD COLUMN "nid" UUID;
ALTER TABLE hydra_jwk ADD CONSTRAINT hydra_jwk_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_jwk SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_jwk ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_jwk_sid_kid_key CASCADE;
--split
CREATE UNIQUE INDEX hydra_jwk_sid_kid_nid_key ON hydra_jwk (sid ASC, kid ASC, nid ASC);
--split
-- hydra_oauth2_trusted_jwt_bearer_issuer
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD COLUMN "nid" UUID;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issuer_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT fk_key_set_ref_hydra_jwk FOREIGN KEY (key_set, key_id, nid) REFERENCES hydra_jwk(sid, kid, nid) ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_trusted_jwt_bearer_issuer SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_oauth2_trusted_jwt_bearer_issuer_issuer_subject_key_id_key CASCADE;
DROP INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx;
--split
CREATE UNIQUE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_issuer_subject_key_id_key ON hydra_oauth2_trusted_jwt_bearer_issuer (issuer ASC, subject ASC, key_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (expires_at ASC);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_nid_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (id, nid); |
SQL | hydra/persistence/sql/src/20220210000001_nid/20220210000001000000_nid.mysql.up.sql | -- Encode key_id in ascii as a workaround for the 3072-byte index entry size limit[1]
-- This is a breaking change for MySQL key IDs with utf-8 symbols higher than 127
-- [1]: https://dev.mysql.com/doc/refman/8.0/en/innodb-limits.html
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer DROP FOREIGN KEY `hydra_oauth2_trusted_jwt_bearer_issuer_ibfk_1`;
ALTER TABLE hydra_jwk MODIFY `kid` varchar(255) CHARACTER SET 'ascii' NOT NULL;
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer MODIFY `key_id` varchar(255) CHARACTER SET `ascii` NOT NULL;
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT `hydra_oauth2_trusted_jwt_bearer_issuer_ibfk_1` FOREIGN KEY (`key_set`, `key_id`) REFERENCES `hydra_jwk` (`sid`, `kid`) ON DELETE CASCADE;
--split
-- hydra_client
ALTER TABLE `hydra_client` ADD COLUMN `nid` char(36);
ALTER TABLE `hydra_client` ADD CONSTRAINT `hydra_client_nid_fk_idx` FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_client SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_client MODIFY `nid` char(36) NOT NULL;
--split
CREATE UNIQUE INDEX hydra_client_id_key ON hydra_client (id ASC, nid ASC);
--split
-- hydra_oauth2_access
ALTER TABLE hydra_oauth2_access ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_access SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_access MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_access DROP FOREIGN KEY `hydra_oauth2_access_client_id_fk`;
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT `hydra_oauth2_access_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access;
DROP INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access;
--split
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at, nid);
CREATE INDEX hydra_oauth2_access_client_id_subject_nid_idx ON hydra_oauth2_access (client_id, subject, nid);
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id, nid);
--split
-- hydra_oauth2_authentication_session
ALTER TABLE hydra_oauth2_authentication_session ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_authentication_session ADD CONSTRAINT hydra_oauth2_authentication_session_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_authentication_session MODIFY `nid` char(36) NOT NULL;
--split
CREATE INDEX hydra_oauth2_authentication_session_subject_nid_idx ON hydra_oauth2_authentication_session (subject ASC, nid ASC);
--split
-- hydra_oauth2_code
ALTER TABLE `hydra_oauth2_code` ADD COLUMN `nid` char(36);
ALTER TABLE `hydra_oauth2_code` ADD CONSTRAINT `hydra_oauth2_code_nid_fk_idx` FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_code SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_code MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_code DROP FOREIGN KEY `hydra_oauth2_code_client_id_fk`;
ALTER TABLE hydra_oauth2_code ADD CONSTRAINT `hydra_oauth2_code_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code;
--split
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id, nid);
-- hydra_oauth2_flow
ALTER TABLE `hydra_oauth2_flow` ADD COLUMN `nid` char(36);
ALTER TABLE `hydra_oauth2_flow` ADD CONSTRAINT `hydra_oauth2_flow_nid_fk_idx` FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_flow DROP FOREIGN KEY `hydra_oauth2_flow_client_id_fk`;
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT `hydra_oauth2_flow_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_flow SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_flow MODIFY `nid` char(36) NOT NULL;
--split
DROP INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow;
-- DROP INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow;
--split
CREATE INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow (client_id ASC, nid ASC, subject ASC);
-- CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow (login_session_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow (subject ASC, nid ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow (login_verifier ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow (consent_verifier ASC);
-- hydra_oauth2_jti_blacklist
--split
ALTER TABLE `hydra_oauth2_jti_blacklist` ADD COLUMN `nid` char(36);
ALTER TABLE `hydra_oauth2_jti_blacklist` ADD CONSTRAINT `hydra_oauth2_jti_blacklist_nid_fk_idx` FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_jti_blacklist SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_jti_blacklist MODIFY `nid` char(36) NOT NULL;
--split
DROP INDEX hydra_oauth2_jti_blacklist_expiry ON hydra_oauth2_jti_blacklist;
--split
CREATE INDEX hydra_oauth2_jti_blacklist_expiry ON hydra_oauth2_jti_blacklist (expires_at ASC, nid ASC);
--split
ALTER TABLE hydra_oauth2_jti_blacklist DROP PRIMARY KEY, ADD PRIMARY KEY (signature, nid);
--split
-- hydra_oauth2_logout_request
ALTER TABLE hydra_oauth2_logout_request ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT hydra_oauth2_logout_request_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_logout_request DROP FOREIGN KEY `hydra_oauth2_logout_request_client_id_fk`;
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT `hydra_oauth2_logout_request_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_logout_request SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_logout_request MODIFY `nid` char(36) NOT NULL;
--split
-- hydra_oauth2_obfuscated_authentication_session
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT hydra_oauth2_obfuscated_authentication_session_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session DROP FOREIGN KEY `hydra_oauth2_obfuscated_authentication_session_client_id_fk`;
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT `hydra_oauth2_obfuscated_authentication_session_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_obfuscated_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_obfuscated_authentication_session MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session DROP PRIMARY KEY, ADD PRIMARY KEY (subject, client_id, nid);
--split
CREATE UNIQUE INDEX hydra_oauth2_obfuscated_authentication_session_so_nid_idx ON hydra_oauth2_obfuscated_authentication_session (client_id ASC, subject_obfuscated ASC, nid ASC);
--split
-- hydra_oauth2_oidc
ALTER TABLE `hydra_oauth2_oidc` ADD COLUMN `nid` char(36);
ALTER TABLE `hydra_oauth2_oidc` ADD CONSTRAINT `hydra_oauth2_oidc_nid_fk_idx` FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_oidc SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_oidc MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_oidc DROP FOREIGN KEY `hydra_oauth2_oidc_client_id_fk`;
ALTER TABLE hydra_oauth2_oidc ADD CONSTRAINT `hydra_oauth2_oidc_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc;
--split
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id ASC, nid ASC);
--split
-- hydra_oauth2_pkce
ALTER TABLE hydra_oauth2_pkce ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_pkce SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_pkce MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_pkce DROP FOREIGN KEY `hydra_oauth2_pkce_client_id_fk`;
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT `hydra_oauth2_pkce_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
-- DROP INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce;
DROP INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce;
--split
-- CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id ASC);
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id ASC, nid ASC);
--split
-- hydra_oauth2_refresh
ALTER TABLE hydra_oauth2_refresh ADD COLUMN `nid` char(36);
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_refresh SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_refresh MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_refresh DROP FOREIGN KEY `hydra_oauth2_refresh_client_id_fk`;
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT `hydra_oauth2_refresh_client_id_fk` FOREIGN KEY (`client_id`, `nid`) REFERENCES `hydra_client` (`id`, `nid`) ON DELETE CASCADE;
--split
-- DROP INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh;
DROP INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh;
DROP INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh;
--split
-- CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id ASC);
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id ASC, subject ASC);
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id ASC);
-- hydra_jwk
ALTER TABLE hydra_jwk ADD COLUMN `nid` char(36);
ALTER TABLE hydra_jwk ADD CONSTRAINT hydra_jwk_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_jwk SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_jwk MODIFY `nid` char(36) NOT NULL;
--split
CREATE UNIQUE INDEX hydra_jwk_sid_kid_nid_key ON hydra_jwk (sid ASC, kid ASC, nid ASC);
--split
-- hydra_oauth2_trusted_jwt_bearer_issuer
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD COLUMN `nid` char(36);
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issuer_nid_fk_idx FOREIGN KEY (`nid`) REFERENCES `networks` (`id`) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_trusted_jwt_bearer_issuer SET nid = (SELECT id FROM networks LIMIT 1);
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer MODIFY `nid` char(36) NOT NULL;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer DROP FOREIGN KEY `hydra_oauth2_trusted_jwt_bearer_issuer_ibfk_1`;
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT `hydra_oauth2_trusted_jwt_bearer_issuer_ibfk_1` FOREIGN KEY (`key_set`, `key_id`, `nid`) REFERENCES `hydra_jwk` (`sid`, `kid`, `nid`) ON DELETE CASCADE;
--split
DROP INDEX issuer ON hydra_oauth2_trusted_jwt_bearer_issuer;
DROP INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer;
--split
CREATE UNIQUE INDEX issuer ON hydra_oauth2_trusted_jwt_bearer_issuer (issuer, subject, key_id, nid);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (expires_at ASC);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_nid_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (id, nid);
--split
DROP INDEX hydra_jwk_idx_id_uq ON hydra_jwk;
DROP INDEX hydra_client_idx_id_uq ON hydra_client;
DROP INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access;
-- DROP INDEX hydra_oauth2_authentication_session_subject_idx ON hydra_oauth2_authentication_session;
DROP INDEX hydra_oauth2_flow_cid_idx ON hydra_oauth2_flow;
DROP INDEX hydra_oauth2_obfuscated_authentication_session_so_idx ON hydra_oauth2_obfuscated_authentication_session;
DROP INDEX hydra_oauth2_logout_request_client_id_idx ON hydra_oauth2_logout_request;
DROP INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code;
DROP INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access; |
SQL | hydra/persistence/sql/src/20220210000001_nid/20220210000001000000_nid.postgres.up.sql | -- hydra_client
ALTER TABLE hydra_client ADD COLUMN nid UUID;
ALTER TABLE hydra_client ADD CONSTRAINT hydra_client_nid_fk_idx FOREIGN KEY (nid) REFERENCES networks (id) ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_client SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_client ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_client_idx_id_uq CASCADE;
--split
CREATE UNIQUE INDEX hydra_client_idx_id_uq ON hydra_client (id ASC, nid ASC);
--split
-- hydra_oauth2_access
ALTER TABLE hydra_oauth2_access ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_access SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_access ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_access ADD CONSTRAINT hydra_oauth2_access_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_access_requested_at_idx;
DROP INDEX hydra_oauth2_access_client_id_idx;
DROP INDEX hydra_oauth2_access_challenge_id_idx;
DROP INDEX hydra_oauth2_access_client_id_subject_idx;
DROP INDEX hydra_oauth2_access_request_id_idx;
--split
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at, nid);
CREATE INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access (client_id, nid);
CREATE INDEX hydra_oauth2_access_challenge_id_idx ON hydra_oauth2_access (challenge_id);
CREATE INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access (client_id, subject, nid);
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id, nid);
--split
-- hydra_oauth2_authentication_session
ALTER TABLE hydra_oauth2_authentication_session ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_authentication_session ADD CONSTRAINT hydra_oauth2_authentication_session_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_authentication_session ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_oauth2_authentication_session_sub_idx;
--split
CREATE INDEX hydra_oauth2_authentication_session_sub_idx ON hydra_oauth2_authentication_session (subject ASC, nid ASC);
--split
-- hydra_oauth2_code
ALTER TABLE "hydra_oauth2_code" ADD COLUMN "nid" UUID;
ALTER TABLE "hydra_oauth2_code" ADD CONSTRAINT "hydra_oauth2_code_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_code SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_code ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_code ADD CONSTRAINT hydra_oauth2_code_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_code_client_id_idx;
DROP INDEX hydra_oauth2_code_challenge_id_idx;
DROP INDEX hydra_oauth2_code_request_id_idx;
--split
CREATE INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code (client_id, nid);
CREATE INDEX hydra_oauth2_code_challenge_id_idx ON hydra_oauth2_code (challenge_id, nid);
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id, nid);
--split
-- hydra_oauth2_flow
ALTER TABLE "hydra_oauth2_flow" ADD COLUMN "nid" UUID;
ALTER TABLE "hydra_oauth2_flow" ADD CONSTRAINT "hydra_oauth2_flow_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_flow SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_flow ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_flow_client_id_subject_idx;
DROP INDEX hydra_oauth2_flow_cid_idx;
DROP INDEX hydra_oauth2_flow_login_session_id_idx;
DROP INDEX hydra_oauth2_flow_sub_idx;
DROP INDEX hydra_oauth2_flow_login_verifier_idx;
DROP INDEX hydra_oauth2_flow_consent_verifier_idx;
--split
CREATE INDEX hydra_oauth2_flow_client_id_subject_idx ON hydra_oauth2_flow (client_id ASC, nid ASC, subject ASC);
CREATE INDEX hydra_oauth2_flow_cid_idx ON hydra_oauth2_flow (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow (login_session_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_flow_sub_idx ON hydra_oauth2_flow (subject ASC, nid ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow (login_verifier ASC);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow (consent_verifier ASC);
--split
-- hydra_oauth2_jti_blacklist
--split
ALTER TABLE "hydra_oauth2_jti_blacklist" ADD COLUMN "nid" UUID;
ALTER TABLE "hydra_oauth2_jti_blacklist" ADD CONSTRAINT "hydra_oauth2_jti_blacklist_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_jti_blacklist SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_jti_blacklist ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_oauth2_jti_blacklist_expiry;
--split
CREATE INDEX hydra_oauth2_jti_blacklist_expires_at_idx ON hydra_oauth2_jti_blacklist USING btree (expires_at ASC, nid ASC);
--split
ALTER TABLE hydra_oauth2_jti_blacklist DROP CONSTRAINT "hydra_oauth2_jti_blacklist_pkey";
ALTER TABLE hydra_oauth2_jti_blacklist ADD PRIMARY KEY (signature, nid);
--split
-- hydra_oauth2_logout_request
ALTER TABLE hydra_oauth2_logout_request ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT hydra_oauth2_logout_request_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_logout_request SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_logout_request ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_logout_request ADD CONSTRAINT hydra_oauth2_logout_request_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_logout_request_client_id_idx;
--split
CREATE INDEX hydra_oauth2_logout_request_client_id_idx ON hydra_oauth2_logout_request (client_id ASC, nid ASC);
--split
-- hydra_oauth2_obfuscated_authentication_session
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT hydra_oauth2_obfuscated_authentication_session_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_obfuscated_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD CONSTRAINT hydra_oauth2_obfuscated_authentication_session_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_obfuscated_authentication_session DROP CONSTRAINT "hydra_oauth2_obfuscated_authentication_session_pkey";
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD PRIMARY KEY (subject, client_id, nid);
--split
DROP INDEX hydra_oauth2_obfuscated_authentication_session_so_idx;
--split
CREATE UNIQUE INDEX hydra_oauth2_obfuscated_authentication_session_so_idx ON hydra_oauth2_obfuscated_authentication_session USING btree (client_id ASC, subject_obfuscated ASC, nid ASC);
--split
-- hydra_oauth2_oidc
ALTER TABLE "hydra_oauth2_oidc" ADD COLUMN "nid" UUID;
ALTER TABLE "hydra_oauth2_oidc" ADD CONSTRAINT "hydra_oauth2_oidc_nid_fk_idx" FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_oidc SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_oidc ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_oidc ADD CONSTRAINT hydra_oauth2_oidc_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_oidc_client_id_idx;
DROP INDEX hydra_oauth2_oidc_challenge_id_idx;
DROP INDEX hydra_oauth2_oidc_request_id_idx;
--split
CREATE INDEX hydra_oauth2_oidc_client_id_idx ON hydra_oauth2_oidc (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_oidc_challenge_id_idx ON hydra_oauth2_oidc (challenge_id ASC);
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id ASC, nid ASC);
--split
-- hydra_oauth2_pkce
ALTER TABLE hydra_oauth2_pkce ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_pkce SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_pkce ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_pkce ADD CONSTRAINT hydra_oauth2_pkce_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_pkce_client_id_idx;
DROP INDEX hydra_oauth2_pkce_challenge_id_idx;
DROP INDEX hydra_oauth2_pkce_request_id_idx;
--split
CREATE INDEX hydra_oauth2_pkce_client_id_idx ON hydra_oauth2_pkce (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id ASC);
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id ASC, nid ASC);
--split
-- hydra_oauth2_refresh
ALTER TABLE hydra_oauth2_refresh ADD COLUMN "nid" UUID;
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_refresh SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_refresh ALTER nid SET NOT NULL;
--split
ALTER TABLE hydra_oauth2_refresh ADD CONSTRAINT hydra_oauth2_refresh_client_id_fk FOREIGN KEY (client_id, nid) REFERENCES hydra_client(id, nid) ON DELETE CASCADE;
--split
DROP INDEX hydra_oauth2_refresh_client_id_idx;
DROP INDEX hydra_oauth2_refresh_challenge_id_idx;
DROP INDEX hydra_oauth2_refresh_client_id_subject_idx;
DROP INDEX hydra_oauth2_refresh_request_id_idx;
--split
CREATE INDEX hydra_oauth2_refresh_client_id_idx ON hydra_oauth2_refresh (client_id ASC, nid ASC);
CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id ASC);
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id ASC, subject ASC);
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id ASC);
--split
-- hydra_jwk
ALTER TABLE hydra_jwk ADD COLUMN "nid" UUID;
ALTER TABLE hydra_jwk ADD CONSTRAINT hydra_jwk_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
UPDATE hydra_jwk SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_jwk ALTER nid SET NOT NULL;
--split
CREATE UNIQUE INDEX hydra_jwk_sid_kid_nid_key ON hydra_jwk (sid ASC, kid ASC, nid ASC);
--split
-- hydra_oauth2_trusted_jwt_bearer_issuer
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD COLUMN "nid" UUID;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issuer_nid_fk_idx FOREIGN KEY ("nid") REFERENCES "networks" ("id") ON UPDATE RESTRICT ON DELETE CASCADE;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer DROP CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issue_issuer_subject_key_id_key;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issue_issuer_subject_key_id_key UNIQUE (issuer, subject, key_id, nid);
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer DROP CONSTRAINT IF EXISTS hydra_oauth2_trusted_jwt_bearer_issuer_key_set_fkey;
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer DROP CONSTRAINT IF EXISTS hydra_oauth2_trusted_jwt_bearer_issuer_key_set_key_id_fkey;
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD CONSTRAINT hydra_oauth2_trusted_jwt_bearer_issuer_key_set_fkey FOREIGN KEY (key_set, key_id, nid) REFERENCES hydra_jwk(sid, kid, nid) ON DELETE CASCADE;
--split
UPDATE hydra_oauth2_trusted_jwt_bearer_issuer SET nid = (SELECT id FROM networks LIMIT 1);
--split
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ALTER nid SET NOT NULL;
--split
DROP INDEX hydra_jwk_idx_id_uq;
DROP INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx;
--split
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (expires_at ASC);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_nid_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (id, nid); |
SQL | hydra/persistence/sql/src/20220210000001_nid/20220210000001000000_nid.sqlite.up.sql | -- hydra_oauth2_jti_blacklist
ALTER TABLE hydra_oauth2_jti_blacklist ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_jti_blacklist SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_jti_blacklist_tmp" (
signature VARCHAR(64) NOT NULL,
expires_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
nid CHAR(36) NOT NULL,
CHECK (nid != '00000000-0000-0000-0000-000000000000'),
PRIMARY KEY (signature, nid)
);
INSERT INTO "_hydra_oauth2_jti_blacklist_tmp" (signature, expires_at, nid) SELECT signature, expires_at, nid FROM "hydra_oauth2_jti_blacklist";
DROP TABLE "hydra_oauth2_jti_blacklist";
ALTER TABLE "_hydra_oauth2_jti_blacklist_tmp" RENAME TO "hydra_oauth2_jti_blacklist";
UPDATE hydra_oauth2_jti_blacklist SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_jti_blacklist_expires_at_idx ON hydra_oauth2_jti_blacklist (expires_at, nid);
-- hydra_oauth2_logout_request
ALTER TABLE hydra_oauth2_logout_request ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_logout_request SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_logout_request_tmp" (
challenge VARCHAR(36) NOT NULL PRIMARY KEY,
verifier VARCHAR(36) NOT NULL,
subject VARCHAR(255) NOT NULL,
sid VARCHAR(36) NOT NULL,
client_id VARCHAR(255) NULL,
nid CHAR(36) NOT NULL,
request_url TEXT NOT NULL,
redir_url TEXT NOT NULL,
was_used INTEGER NOT NULL DEFAULT false,
accepted INTEGER NOT NULL DEFAULT false,
rejected INTEGER NOT NULL DEFAULT false,
rp_initiated INTEGER NOT NULL DEFAULT false,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE,
UNIQUE (verifier)
);
INSERT INTO "_hydra_oauth2_logout_request_tmp" (challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated, nid) SELECT challenge, verifier, subject, sid, client_id, request_url, redir_url, was_used, accepted, rejected, rp_initiated, nid FROM "hydra_oauth2_logout_request";
DROP TABLE "hydra_oauth2_logout_request";
ALTER TABLE "_hydra_oauth2_logout_request_tmp" RENAME TO "hydra_oauth2_logout_request";
UPDATE hydra_oauth2_logout_request SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_logout_request_client_id_idx ON hydra_oauth2_logout_request (client_id, nid);
-- hydra_oauth2_obfuscated_authentication_session
ALTER TABLE hydra_oauth2_obfuscated_authentication_session ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_obfuscated_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_obfuscated_authentication_session_tmp" (
subject VARCHAR(255) NOT NULL,
client_id VARCHAR(255) NOT NULL,
subject_obfuscated VARCHAR(255) NOT NULL,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE,
PRIMARY KEY (subject, client_id, nid)
);
INSERT INTO "_hydra_oauth2_obfuscated_authentication_session_tmp" (subject, client_id, subject_obfuscated, nid) SELECT subject, client_id, subject_obfuscated, nid FROM "hydra_oauth2_obfuscated_authentication_session";
DROP TABLE "hydra_oauth2_obfuscated_authentication_session";
ALTER TABLE "_hydra_oauth2_obfuscated_authentication_session_tmp" RENAME TO "hydra_oauth2_obfuscated_authentication_session";
UPDATE hydra_oauth2_obfuscated_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
CREATE UNIQUE INDEX hydra_oauth2_obfuscated_authentication_session_client_id_subject_obfuscated_idx ON hydra_oauth2_obfuscated_authentication_session (client_id, subject_obfuscated, nid);
-- hydra_oauth2_authentication_session
ALTER TABLE hydra_oauth2_authentication_session ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_authentication_session_tmp" (
id VARCHAR(40) NOT NULL PRIMARY KEY,
authenticated_at TIMESTAMP NULL,
subject VARCHAR(255) NOT NULL,
nid CHAR(36) NOT NULL,
remember INTEGER NOT NULL DEFAULT false,
CHECK (nid != '00000000-0000-0000-0000-000000000000')
);
INSERT INTO "_hydra_oauth2_authentication_session_tmp" (id, authenticated_at, subject, remember, nid) SELECT id, authenticated_at, subject, remember, nid FROM "hydra_oauth2_authentication_session";
DROP TABLE "hydra_oauth2_authentication_session";
ALTER TABLE "_hydra_oauth2_authentication_session_tmp" RENAME TO "hydra_oauth2_authentication_session";
UPDATE hydra_oauth2_authentication_session SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_authentication_session_subject_idx ON hydra_oauth2_authentication_session (subject, nid);
-- hydra_client
ALTER TABLE hydra_client ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_client SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_client_tmp" (
id VARCHAR(255) NOT NULL,
client_name TEXT NOT NULL,
client_secret TEXT NOT NULL,
redirect_uris TEXT NOT NULL,
grant_types TEXT NOT NULL,
response_types TEXT NOT NULL,
scope TEXT NOT NULL,
owner TEXT NOT NULL,
policy_uri TEXT NOT NULL,
tos_uri TEXT NOT NULL,
client_uri TEXT NOT NULL,
logo_uri TEXT NOT NULL,
contacts TEXT NOT NULL,
client_secret_expires_at INTEGER NOT NULL DEFAULT 0,
sector_identifier_uri TEXT NOT NULL,
jwks TEXT NOT NULL,
jwks_uri TEXT NOT NULL,
request_uris TEXT NOT NULL,
token_endpoint_auth_method VARCHAR(25) NOT NULL DEFAULT '',
request_object_signing_alg VARCHAR(10) NOT NULL DEFAULT '',
userinfo_signed_response_alg VARCHAR(10) NOT NULL DEFAULT '',
subject_type VARCHAR(15) NOT NULL DEFAULT '',
allowed_cors_origins TEXT NOT NULL,
pk_deprecated INTEGER NULL DEFAULT NULL,
pk TEXT PRIMARY KEY,
audience TEXT NOT NULL,
created_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
updated_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
frontchannel_logout_uri TEXT NOT NULL DEFAULT '',
frontchannel_logout_session_required INTEGER NOT NULL DEFAULT false,
post_logout_redirect_uris TEXT NOT NULL DEFAULT '',
backchannel_logout_uri TEXT NOT NULL DEFAULT '',
backchannel_logout_session_required INTEGER NOT NULL DEFAULT false,
metadata TEXT NOT NULL DEFAULT '{}',
token_endpoint_auth_signing_alg VARCHAR(10) NOT NULL DEFAULT '',
registration_access_token_signature VARCHAR(128) NOT NULL DEFAULT '',
authorization_code_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
authorization_code_grant_id_token_lifespan BIGINT NULL DEFAULT NULL,
authorization_code_grant_refresh_token_lifespan BIGINT NULL DEFAULT NULL,
client_credentials_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
implicit_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
implicit_grant_id_token_lifespan BIGINT NULL DEFAULT NULL,
jwt_bearer_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
password_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
password_grant_refresh_token_lifespan BIGINT NULL DEFAULT NULL,
refresh_token_grant_id_token_lifespan BIGINT NULL DEFAULT NULL,
refresh_token_grant_access_token_lifespan BIGINT NULL DEFAULT NULL,
refresh_token_grant_refresh_token_lifespan BIGINT NULL DEFAULT NULL,
nid CHAR(36) NOT NULL
);
INSERT INTO "_hydra_client_tmp" (
id,
client_name,
client_secret,
redirect_uris,
grant_types,
response_types,
scope,
owner,
policy_uri,
tos_uri,
client_uri,
logo_uri,
contacts,
client_secret_expires_at,
sector_identifier_uri,
jwks,
jwks_uri,
request_uris,
token_endpoint_auth_method,
request_object_signing_alg,
userinfo_signed_response_alg,
subject_type,
allowed_cors_origins,
pk_deprecated,
pk,
audience,
created_at,
updated_at,
frontchannel_logout_uri,
frontchannel_logout_session_required,
post_logout_redirect_uris,
backchannel_logout_uri,
backchannel_logout_session_required,
metadata,
token_endpoint_auth_signing_alg,
registration_access_token_signature,
authorization_code_grant_access_token_lifespan,
authorization_code_grant_id_token_lifespan,
authorization_code_grant_refresh_token_lifespan,
client_credentials_grant_access_token_lifespan,
implicit_grant_access_token_lifespan,
implicit_grant_id_token_lifespan,
jwt_bearer_grant_access_token_lifespan,
password_grant_access_token_lifespan,
password_grant_refresh_token_lifespan,
refresh_token_grant_id_token_lifespan,
refresh_token_grant_access_token_lifespan,
refresh_token_grant_refresh_token_lifespan,
nid
) SELECT
id,
client_name,
client_secret,
redirect_uris,
grant_types,
response_types,
scope,
owner,
policy_uri,
tos_uri,
client_uri,
logo_uri,
contacts,
client_secret_expires_at,
sector_identifier_uri,
jwks,
jwks_uri,
request_uris,
token_endpoint_auth_method,
request_object_signing_alg,
userinfo_signed_response_alg,
subject_type,
allowed_cors_origins,
pk_deprecated,
pk,
audience,
created_at,
updated_at,
frontchannel_logout_uri,
frontchannel_logout_session_required,
post_logout_redirect_uris,
backchannel_logout_uri,
backchannel_logout_session_required,
metadata,
token_endpoint_auth_signing_alg,
registration_access_token_signature,
authorization_code_grant_access_token_lifespan,
authorization_code_grant_id_token_lifespan,
authorization_code_grant_refresh_token_lifespan,
client_credentials_grant_access_token_lifespan,
implicit_grant_access_token_lifespan,
implicit_grant_id_token_lifespan,
jwt_bearer_grant_access_token_lifespan,
password_grant_access_token_lifespan,
password_grant_refresh_token_lifespan,
refresh_token_grant_id_token_lifespan,
refresh_token_grant_access_token_lifespan,
refresh_token_grant_refresh_token_lifespan,
nid
FROM "hydra_client";
DROP TABLE "hydra_client";
ALTER TABLE "_hydra_client_tmp" RENAME TO "hydra_client";
UPDATE hydra_client SET nid = (SELECT id FROM networks LIMIT 1);
CREATE UNIQUE INDEX hydra_client_id_nid_uq_idx ON hydra_client (id, nid);
CREATE INDEX hydra_client_id_nid_idx ON hydra_client (id, nid);
-- hydra_oauth2_flow
ALTER TABLE hydra_oauth2_flow ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_flow SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_flow_tmp" (
login_challenge VARCHAR(40) NOT NULL PRIMARY KEY,
nid CHAR(36) NOT NULL,
requested_scope TEXT NOT NULL,
login_verifier VARCHAR(40) NOT NULL,
login_csrf VARCHAR(40) NOT NULL,
subject VARCHAR(255) NOT NULL,
request_url TEXT NOT NULL,
login_skip INTEGER NOT NULL,
client_id VARCHAR(255) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
oidc_context TEXT NOT NULL,
login_session_id VARCHAR(40) NULL REFERENCES hydra_oauth2_authentication_session (id) ON DELETE SET NULL,
requested_at_audience TEXT NULL DEFAULT '',
login_initialized_at TIMESTAMP NULL,
state INTEGER NOT NULL,
login_remember INTEGER NULL,
login_remember_for INTEGER NULL,
login_error TEXT NULL,
acr TEXT NULL,
login_authenticated_at TIMESTAMP NULL,
login_was_used INTEGER NULL,
forced_subject_identifier VARCHAR(255) NULL DEFAULT '',
context TEXT NULL DEFAULT '{}',
amr TEXT NULL DEFAULT '',
consent_challenge_id VARCHAR(40) NULL,
consent_skip INTEGER NULL DEFAULT false,
consent_verifier VARCHAR(40) NULL,
consent_csrf VARCHAR(40) NULL,
granted_scope TEXT NULL,
granted_at_audience TEXT NULL DEFAULT '',
consent_remember INTEGER NULL DEFAULT 0,
consent_remember_for INTEGER NULL,
consent_handled_at TIMESTAMP NULL,
consent_was_used INTEGER NOT NULL DEFAULT false,
consent_error TEXT NULL,
session_id_token TEXT NULL DEFAULT '{}',
session_access_token TEXT NULL DEFAULT '{}',
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE,
CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
)
);
INSERT INTO "_hydra_oauth2_flow_tmp" (login_challenge, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_skip, consent_verifier, consent_csrf, granted_scope, granted_at_audience, consent_remember, consent_remember_for, consent_handled_at, consent_was_used, consent_error, session_id_token, session_access_token, nid) SELECT login_challenge, requested_scope, login_verifier, login_csrf, subject, request_url, login_skip, client_id, requested_at, oidc_context, login_session_id, requested_at_audience, login_initialized_at, state, login_remember, login_remember_for, login_error, acr, login_authenticated_at, login_was_used, forced_subject_identifier, context, amr, consent_challenge_id, consent_skip, consent_verifier, consent_csrf, granted_scope, granted_at_audience, consent_remember, consent_remember_for, consent_handled_at, consent_was_used, consent_error, session_id_token, session_access_token, nid FROM "hydra_oauth2_flow";
DROP TABLE "hydra_oauth2_flow";
ALTER TABLE "_hydra_oauth2_flow_tmp" RENAME TO "hydra_oauth2_flow";
UPDATE hydra_oauth2_flow SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_flow_client_id_idx ON hydra_oauth2_flow (client_id, nid);
CREATE INDEX hydra_oauth2_flow_login_session_id_idx ON hydra_oauth2_flow (login_session_id);
CREATE INDEX hydra_oauth2_flow_subject_idx ON hydra_oauth2_flow (subject, nid);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_challenge_id_idx ON hydra_oauth2_flow (consent_challenge_id);
CREATE UNIQUE INDEX hydra_oauth2_flow_login_verifier_idx ON hydra_oauth2_flow (login_verifier);
CREATE UNIQUE INDEX hydra_oauth2_flow_consent_verifier_idx ON hydra_oauth2_flow (consent_verifier);
-- hydra_oauth2_code
ALTER TABLE hydra_oauth2_code ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_code SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_code_tmp" (
signature VARCHAR(255) NOT NULL,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_code_tmp" (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) SELECT signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid FROM "hydra_oauth2_code";
DROP TABLE "hydra_oauth2_code";
ALTER TABLE "_hydra_oauth2_code_tmp" RENAME TO "hydra_oauth2_code";
UPDATE hydra_oauth2_code SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code (client_id, nid);
CREATE INDEX hydra_oauth2_code_challenge_id_idx ON hydra_oauth2_code (challenge_id, nid);
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id, nid);
-- hydra_oauth2_oidc
ALTER TABLE hydra_oauth2_oidc ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_oidc SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_oidc_tmp" (
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_oidc_tmp" (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) SELECT signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid FROM "hydra_oauth2_oidc";
DROP TABLE "hydra_oauth2_oidc";
ALTER TABLE "_hydra_oauth2_oidc_tmp" RENAME TO "hydra_oauth2_oidc";
UPDATE hydra_oauth2_oidc SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_oidc_client_id_idx ON hydra_oauth2_oidc (client_id, nid);
CREATE INDEX hydra_oauth2_oidc_challenge_id_idx ON hydra_oauth2_oidc (challenge_id, nid);
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id, nid);
-- hydra_oauth2_pkce
ALTER TABLE hydra_oauth2_pkce ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_pkce SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_pkce_tmp" (
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL,
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_pkce_tmp" (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) SELECT signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid FROM "hydra_oauth2_pkce";
DROP TABLE "hydra_oauth2_pkce";
ALTER TABLE "_hydra_oauth2_pkce_tmp" RENAME TO "hydra_oauth2_pkce";
UPDATE hydra_oauth2_pkce SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_pkce_client_id_idx ON hydra_oauth2_pkce (client_id, nid);
CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id, nid);
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id, nid);
-- hydra_oauth2_access
ALTER TABLE hydra_oauth2_access ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_access SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_access_tmp" (
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_access_tmp" (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) SELECT signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid FROM "hydra_oauth2_access";
DROP TABLE "hydra_oauth2_access";
ALTER TABLE "_hydra_oauth2_access_tmp" RENAME TO "hydra_oauth2_access";
UPDATE hydra_oauth2_access SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at, nid);
CREATE INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access (client_id, nid);
CREATE INDEX hydra_oauth2_access_challenge_id_idx ON hydra_oauth2_access (challenge_id, nid);
CREATE INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access (client_id, subject, nid);
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id, nid);
-- hydra_oauth2_refresh
ALTER TABLE hydra_oauth2_refresh ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_refresh SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_refresh_tmp" (
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_flow (consent_challenge_id) ON DELETE CASCADE,
nid CHAR(36) NOT NULL,
FOREIGN KEY (client_id, nid) REFERENCES hydra_client (id, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_refresh_tmp" (signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid) SELECT signature, request_id, requested_at, client_id, scope, granted_scope, form_data, session_data, subject, active, requested_audience, granted_audience, challenge_id, nid FROM "hydra_oauth2_refresh";
DROP TABLE "hydra_oauth2_refresh";
ALTER TABLE "_hydra_oauth2_refresh_tmp" RENAME TO "hydra_oauth2_refresh";
UPDATE hydra_oauth2_refresh SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_refresh_client_id_idx ON hydra_oauth2_refresh (client_id, nid);
CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id, nid);
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id, subject, nid);
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id, nid);
-- hydra_oauth2_trusted_jwt_bearer_issuer
ALTER TABLE hydra_oauth2_trusted_jwt_bearer_issuer ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_oauth2_trusted_jwt_bearer_issuer SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_oauth2_trusted_jwt_bearer_issuer_tmp" (
id VARCHAR(36) PRIMARY KEY,
issuer VARCHAR(255) NOT NULL,
subject VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
key_set varchar(255) NOT NULL,
key_id varchar(255) NOT NULL,
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP NOT NULL,
expires_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP NOT NULL,
nid CHAR(36) NOT NULL,
UNIQUE (issuer, subject, key_id, nid),
FOREIGN KEY (key_set, key_id, nid) REFERENCES hydra_jwk (sid, kid, nid) ON DELETE CASCADE
);
INSERT INTO "_hydra_oauth2_trusted_jwt_bearer_issuer_tmp" (id, issuer, subject, scope, key_set, key_id, created_at, expires_at, nid) SELECT id, issuer, subject, scope, key_set, key_id, created_at, expires_at, nid FROM "hydra_oauth2_trusted_jwt_bearer_issuer";
DROP TABLE "hydra_oauth2_trusted_jwt_bearer_issuer";
ALTER TABLE "_hydra_oauth2_trusted_jwt_bearer_issuer_tmp" RENAME TO "hydra_oauth2_trusted_jwt_bearer_issuer";
UPDATE hydra_oauth2_trusted_jwt_bearer_issuer SET nid = (SELECT id FROM networks LIMIT 1);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (expires_at);
-- hydra_jwk
ALTER TABLE hydra_jwk ADD COLUMN nid CHAR(36) NULL REFERENCES networks(id) ON DELETE CASCADE ON UPDATE RESTRICT;
UPDATE hydra_jwk SET nid = (SELECT id FROM networks LIMIT 1);
CREATE TABLE "_hydra_jwk_tmp" (
sid VARCHAR(255) NOT NULL,
kid VARCHAR(255) NOT NULL,
nid CHAR(36) NOT NULL,
version INTEGER DEFAULT 0 NOT NULL,
keydata TEXT NOT NULL,
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP NOT NULL,
pk TEXT PRIMARY KEY,
pk_deprecated INTEGER NULL DEFAULT NULL,
CHECK (nid != '00000000-0000-0000-0000-000000000000')
);
INSERT INTO "_hydra_jwk_tmp" (sid, kid, version, keydata, created_at, pk, pk_deprecated, nid) SELECT sid, kid, version, keydata, created_at, pk, pk_deprecated, nid FROM "hydra_jwk";
DROP TABLE "hydra_jwk";
ALTER TABLE "_hydra_jwk_tmp" RENAME TO "hydra_jwk";
UPDATE hydra_jwk SET nid = (SELECT id FROM networks LIMIT 1);
CREATE UNIQUE INDEX hydra_jwk_sid_kid_nid_key ON hydra_jwk (sid, kid, nid); |
SQL | hydra/persistence/sql/src/20220513000001_string_slice_json/20220513000001000000_string_slice_json.cockroach.up.sql | ALTER TABLE hydra_client ADD COLUMN redirect_uris_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN grant_types_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN response_types_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN audience_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN allowed_cors_origins_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN contacts_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN request_uris_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN post_logout_redirect_uris_json jsonb DEFAULT '[]' NOT NULL;
--split
UPDATE hydra_client SET redirect_uris_json = cast('["' || REPLACE(redirect_uris,'|','","') || '"]' as jsonb) WHERE redirect_uris <> '';
UPDATE hydra_client SET grant_types_json = cast('["' || REPLACE(grant_types,'|','","') || '"]' as jsonb) WHERE grant_types <> '';
UPDATE hydra_client SET response_types_json = cast('["' || REPLACE(response_types,'|','","') || '"]' as jsonb) WHERE response_types <> '';
UPDATE hydra_client SET audience_json = cast('["' || REPLACE(audience,'|','","') || '"]' as jsonb) WHERE audience <> '';
UPDATE hydra_client SET allowed_cors_origins_json = cast('["' || REPLACE(allowed_cors_origins,'|','","') || '"]' as jsonb) WHERE allowed_cors_origins <> '';
UPDATE hydra_client SET contacts_json = cast('["' || REPLACE(contacts,'|','","') || '"]' as jsonb) WHERE contacts <> '';
UPDATE hydra_client SET request_uris_json = cast('["' || REPLACE(request_uris,'|','","') || '"]' as jsonb) WHERE request_uris <> '';
UPDATE hydra_client SET post_logout_redirect_uris_json = cast('["' || REPLACE(post_logout_redirect_uris,'|','","') || '"]' as jsonb) WHERE post_logout_redirect_uris <> '';
--split
ALTER TABLE hydra_client ALTER COLUMN redirect_uris_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN grant_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN response_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN audience_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN allowed_cors_origins_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN contacts_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN request_uris_json DROP DEFAULT;
-- hydra_client/post_logout_redirect_uris_json is meant to have a default
--split
ALTER TABLE hydra_client DROP COLUMN redirect_uris;
ALTER TABLE hydra_client DROP COLUMN grant_types;
ALTER TABLE hydra_client DROP COLUMN response_types;
ALTER TABLE hydra_client DROP COLUMN audience;
ALTER TABLE hydra_client DROP COLUMN allowed_cors_origins;
ALTER TABLE hydra_client DROP COLUMN contacts;
ALTER TABLE hydra_client DROP COLUMN request_uris;
ALTER TABLE hydra_client DROP COLUMN post_logout_redirect_uris;
--split
ALTER TABLE hydra_client RENAME COLUMN redirect_uris_json TO redirect_uris;
ALTER TABLE hydra_client RENAME COLUMN grant_types_json TO grant_types;
ALTER TABLE hydra_client RENAME COLUMN response_types_json TO response_types;
ALTER TABLE hydra_client RENAME COLUMN audience_json TO audience;
ALTER TABLE hydra_client RENAME COLUMN allowed_cors_origins_json TO allowed_cors_origins;
ALTER TABLE hydra_client RENAME COLUMN contacts_json TO contacts;
ALTER TABLE hydra_client RENAME COLUMN request_uris_json TO request_uris;
ALTER TABLE hydra_client RENAME COLUMN post_logout_redirect_uris_json TO post_logout_redirect_uris;
--split
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_scope_json jsonb NOT NULL DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_at_audience_json jsonb DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN amr_json jsonb DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_scope_json jsonb;
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_at_audience_json jsonb DEFAULT '[]';
--split
UPDATE hydra_oauth2_flow SET requested_scope = '[]' WHERE requested_scope = '';
UPDATE hydra_oauth2_flow SET requested_at_audience = '[]' WHERE requested_at_audience = '';
UPDATE hydra_oauth2_flow SET amr = '[]' WHERE amr = '';
UPDATE hydra_oauth2_flow SET granted_scope = '[]' WHERE granted_scope = '';
UPDATE hydra_oauth2_flow SET granted_at_audience = '[]' WHERE granted_at_audience = '';
--split
UPDATE hydra_oauth2_flow SET requested_scope_json = cast('["' || REPLACE(requested_scope,'|','","') || '"]' as jsonb) WHERE requested_scope <> '[]';
UPDATE hydra_oauth2_flow SET requested_at_audience_json = cast('["' || REPLACE(requested_at_audience,'|','","') || '"]' as jsonb) WHERE requested_at_audience <> '[]';
UPDATE hydra_oauth2_flow SET amr_json = cast('["' || REPLACE(amr,'|','","') || '"]' as jsonb) WHERE amr <> '[]';
UPDATE hydra_oauth2_flow SET granted_scope_json = cast('["' || REPLACE(granted_scope,'|','","') || '"]' as jsonb) WHERE granted_scope <> '[]';
UPDATE hydra_oauth2_flow SET granted_at_audience_json = cast('["' || REPLACE(granted_at_audience,'|','","') || '"]' as jsonb) WHERE granted_at_audience <> '[]';
--split
ALTER TABLE hydra_oauth2_flow ALTER COLUMN requested_scope_json DROP DEFAULT;
--split
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_at_audience;
ALTER TABLE hydra_oauth2_flow DROP COLUMN amr;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_at_audience;
--split
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_scope_json TO requested_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_at_audience_json TO requested_at_audience;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN amr_json TO amr;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_scope_json TO granted_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_at_audience_json TO granted_at_audience;
-- scripts/db-diff.sh can be used in code review to verify that the constraint hasn't changed; we need to recreate it due to the dropped and re-added columns
ALTER TABLE hydra_oauth2_flow ADD CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
) |
SQL | hydra/persistence/sql/src/20220513000001_string_slice_json/20220513000001000000_string_slice_json.mysql.up.sql | ALTER TABLE hydra_client ADD COLUMN redirect_uris_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN grant_types_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN response_types_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN audience_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN allowed_cors_origins_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN contacts_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN request_uris_json json DEFAULT ('[]') NOT NULL;
ALTER TABLE hydra_client ADD COLUMN post_logout_redirect_uris_json json DEFAULT ('[]') NOT NULL;
--split
UPDATE hydra_client SET redirect_uris_json = cast(concat('["' , REPLACE(redirect_uris,'|','","') , '"]') as json) WHERE redirect_uris <> '';
UPDATE hydra_client SET grant_types_json = cast(concat('["' , REPLACE(grant_types,'|','","') , '"]') as json) WHERE grant_types <> '';
UPDATE hydra_client SET response_types_json = cast(concat('["' , REPLACE(response_types,'|','","') , '"]') as json) WHERE response_types <> '';
UPDATE hydra_client SET audience_json = cast(concat('["' , REPLACE(audience,'|','","') , '"]') as json) WHERE audience <> '';
UPDATE hydra_client SET allowed_cors_origins_json = cast(concat('["' , REPLACE(allowed_cors_origins,'|','","') , '"]') as json) WHERE allowed_cors_origins <> '';
UPDATE hydra_client SET contacts_json = cast(concat('["' , REPLACE(contacts,'|','","') , '"]') as json) WHERE contacts <> '';
UPDATE hydra_client SET request_uris_json = cast(concat('["' , REPLACE(request_uris,'|','","') , '"]') as json) WHERE request_uris <> '';
UPDATE hydra_client SET post_logout_redirect_uris_json = cast(concat('["' , REPLACE(post_logout_redirect_uris,'|','","') , '"]') as json) WHERE post_logout_redirect_uris <> '';
--split
ALTER TABLE hydra_client ALTER COLUMN redirect_uris_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN grant_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN response_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN audience_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN allowed_cors_origins_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN contacts_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN request_uris_json DROP DEFAULT;
-- hydra_client/post_logout_redirect_uris_json is meant to have a default
--split
ALTER TABLE hydra_client DROP COLUMN redirect_uris;
ALTER TABLE hydra_client DROP COLUMN grant_types;
ALTER TABLE hydra_client DROP COLUMN response_types;
ALTER TABLE hydra_client DROP COLUMN audience;
ALTER TABLE hydra_client DROP COLUMN allowed_cors_origins;
ALTER TABLE hydra_client DROP COLUMN contacts;
ALTER TABLE hydra_client DROP COLUMN request_uris;
ALTER TABLE hydra_client DROP COLUMN post_logout_redirect_uris;
--split
ALTER TABLE hydra_client RENAME COLUMN redirect_uris_json TO redirect_uris;
ALTER TABLE hydra_client RENAME COLUMN grant_types_json TO grant_types;
ALTER TABLE hydra_client RENAME COLUMN response_types_json TO response_types;
ALTER TABLE hydra_client RENAME COLUMN audience_json TO audience;
ALTER TABLE hydra_client RENAME COLUMN allowed_cors_origins_json TO allowed_cors_origins;
ALTER TABLE hydra_client RENAME COLUMN contacts_json TO contacts;
ALTER TABLE hydra_client RENAME COLUMN request_uris_json TO request_uris;
ALTER TABLE hydra_client RENAME COLUMN post_logout_redirect_uris_json TO post_logout_redirect_uris;
--split
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_scope_json json NOT NULL DEFAULT ('[]');
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_at_audience_json json DEFAULT ('[]');
ALTER TABLE hydra_oauth2_flow ADD COLUMN amr_json json DEFAULT ('[]');
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_scope_json json;
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_at_audience_json json DEFAULT ('[]');
--split
UPDATE hydra_oauth2_flow SET requested_scope = ('[]') WHERE requested_scope = '';
UPDATE hydra_oauth2_flow SET requested_at_audience = ('[]') WHERE requested_at_audience = '';
UPDATE hydra_oauth2_flow SET amr = ('[]') WHERE amr = '';
UPDATE hydra_oauth2_flow SET granted_scope = ('[]') WHERE granted_scope = '';
UPDATE hydra_oauth2_flow SET granted_at_audience = ('[]') WHERE granted_at_audience = '';
--split
UPDATE hydra_oauth2_flow SET requested_scope_json = cast(concat('["' , REPLACE(requested_scope,'|','","') , '"]') as json) WHERE requested_scope <> ('[]');
UPDATE hydra_oauth2_flow SET requested_at_audience_json = cast( concat('["' , REPLACE(requested_at_audience,'|','","') , '"]') as json) WHERE requested_at_audience <> ('[]');
UPDATE hydra_oauth2_flow SET amr_json = cast( concat('["' , REPLACE(amr,'|','","') , '"]') as json) WHERE amr <> ('[]');
UPDATE hydra_oauth2_flow SET granted_scope_json = cast(concat('["' , REPLACE(granted_scope,'|','","') , '"]') as json) WHERE granted_scope <> ('[]');
UPDATE hydra_oauth2_flow SET granted_at_audience_json = cast(concat('["' , REPLACE(granted_at_audience,'|','","') , '"]') as json) WHERE granted_at_audience <> ('[]');
--split
ALTER TABLE hydra_oauth2_flow ALTER COLUMN requested_scope_json DROP DEFAULT;
--split
ALTER TABLE hydra_oauth2_flow DROP CONSTRAINT hydra_oauth2_flow_chk;
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_at_audience;
ALTER TABLE hydra_oauth2_flow DROP COLUMN amr;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_at_audience;
--split
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_scope_json TO requested_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_at_audience_json TO requested_at_audience;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN amr_json TO amr;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_scope_json TO granted_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_at_audience_json TO granted_at_audience;
-- scripts/db-diff.sh can be used in code review to verify that the constraint hasn't changed; we need to recreate it due to the dropped and re-added columns
ALTER TABLE hydra_oauth2_flow ADD CONSTRAINT hydra_oauth2_flow_chk CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
) |
SQL | hydra/persistence/sql/src/20220513000001_string_slice_json/20220513000001000000_string_slice_json.postgres.up.sql | ALTER TABLE hydra_client ADD COLUMN redirect_uris_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN grant_types_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN response_types_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN audience_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN allowed_cors_origins_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN contacts_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN request_uris_json jsonb DEFAULT '[]' NOT NULL;
ALTER TABLE hydra_client ADD COLUMN post_logout_redirect_uris_json jsonb DEFAULT '[]' NOT NULL;
--split
UPDATE hydra_client SET redirect_uris = '[]' WHERE redirect_uris = '';
UPDATE hydra_client SET grant_types = '[]' WHERE grant_types = '';
UPDATE hydra_client SET response_types = '[]' WHERE response_types = '';
UPDATE hydra_client SET audience = '[]' WHERE audience = '';
UPDATE hydra_client SET allowed_cors_origins = '[]' WHERE allowed_cors_origins = '';
UPDATE hydra_client SET contacts = '[]' WHERE contacts = '';
UPDATE hydra_client SET request_uris = '[]' WHERE request_uris = '';
UPDATE hydra_client SET post_logout_redirect_uris = '[]' WHERE post_logout_redirect_uris = '';
--split
UPDATE hydra_client SET redirect_uris_json = cast('["' || REPLACE(redirect_uris,'|','","') || '"]' as jsonb) WHERE redirect_uris <> '[]';
UPDATE hydra_client SET grant_types_json = cast('["' || REPLACE(grant_types,'|','","') || '"]' as jsonb) WHERE grant_types <> '[]';
UPDATE hydra_client SET response_types_json = cast('["' || REPLACE(response_types,'|','","') || '"]' as jsonb) WHERE response_types <> '[]';
UPDATE hydra_client SET audience_json = cast('["' || REPLACE(audience,'|','","') || '"]' as jsonb) WHERE audience <> '[]';
UPDATE hydra_client SET allowed_cors_origins_json = cast('["' || REPLACE(allowed_cors_origins,'|','","') || '"]' as jsonb) WHERE allowed_cors_origins <> '[]';
UPDATE hydra_client SET contacts_json = cast('["' || REPLACE(contacts,'|','","') || '"]' as jsonb) WHERE contacts <> '[]';
UPDATE hydra_client SET request_uris_json = cast('["' || REPLACE(request_uris,'|','","') || '"]' as jsonb) WHERE request_uris <> '[]';
UPDATE hydra_client SET post_logout_redirect_uris_json = cast('["' || REPLACE(post_logout_redirect_uris,'|','","') || '"]' as jsonb) WHERE post_logout_redirect_uris <> '[]';
--split
ALTER TABLE hydra_client ALTER COLUMN redirect_uris_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN grant_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN response_types_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN audience_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN allowed_cors_origins_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN contacts_json DROP DEFAULT;
ALTER TABLE hydra_client ALTER COLUMN request_uris_json DROP DEFAULT;
-- hydra_client/post_logout_redirect_uris_json is meant to have a default
--split
ALTER TABLE hydra_client DROP COLUMN redirect_uris;
ALTER TABLE hydra_client DROP COLUMN grant_types;
ALTER TABLE hydra_client DROP COLUMN response_types;
ALTER TABLE hydra_client DROP COLUMN audience;
ALTER TABLE hydra_client DROP COLUMN allowed_cors_origins;
ALTER TABLE hydra_client DROP COLUMN contacts;
ALTER TABLE hydra_client DROP COLUMN request_uris;
ALTER TABLE hydra_client DROP COLUMN post_logout_redirect_uris;
ALTER TABLE hydra_client RENAME COLUMN redirect_uris_json TO redirect_uris;
ALTER TABLE hydra_client RENAME COLUMN grant_types_json TO grant_types;
ALTER TABLE hydra_client RENAME COLUMN response_types_json TO response_types;
ALTER TABLE hydra_client RENAME COLUMN audience_json TO audience;
ALTER TABLE hydra_client RENAME COLUMN allowed_cors_origins_json TO allowed_cors_origins;
ALTER TABLE hydra_client RENAME COLUMN contacts_json TO contacts;
ALTER TABLE hydra_client RENAME COLUMN request_uris_json TO request_uris;
ALTER TABLE hydra_client RENAME COLUMN post_logout_redirect_uris_json TO post_logout_redirect_uris;
--split
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_scope_json jsonb NOT NULL DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN requested_at_audience_json jsonb DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN amr_json jsonb DEFAULT '[]';
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_scope_json jsonb;
ALTER TABLE hydra_oauth2_flow ADD COLUMN granted_at_audience_json jsonb DEFAULT '[]';
--split
UPDATE hydra_oauth2_flow SET requested_scope = '[]' WHERE requested_scope = '';
UPDATE hydra_oauth2_flow SET requested_at_audience = '[]' WHERE requested_at_audience = '';
UPDATE hydra_oauth2_flow SET amr = '[]' WHERE amr = '';
UPDATE hydra_oauth2_flow SET granted_scope = '[]' WHERE granted_scope = '';
UPDATE hydra_oauth2_flow SET granted_at_audience = '[]' WHERE granted_at_audience = '';
--split
UPDATE hydra_oauth2_flow SET requested_scope_json = cast('["' || REPLACE(requested_scope,'|','","') || '"]' as jsonb) WHERE requested_scope <> '[]';
UPDATE hydra_oauth2_flow SET requested_at_audience_json = cast('["' || REPLACE(requested_at_audience,'|','","') || '"]' as jsonb) WHERE requested_at_audience <> '[]';
UPDATE hydra_oauth2_flow SET amr_json = cast('["' || REPLACE(amr,'|','","') || '"]' as jsonb) WHERE amr <> '[]';
UPDATE hydra_oauth2_flow SET granted_scope_json = cast('["' || REPLACE(granted_scope,'|','","') || '"]' as jsonb) WHERE granted_scope <> '[]';
UPDATE hydra_oauth2_flow SET granted_at_audience_json = cast('["' || REPLACE(granted_at_audience,'|','","') || '"]' as jsonb) WHERE granted_at_audience <> '[]';
--split
ALTER TABLE hydra_oauth2_flow ALTER COLUMN requested_scope_json DROP DEFAULT;
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN requested_at_audience;
ALTER TABLE hydra_oauth2_flow DROP COLUMN amr;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_scope;
ALTER TABLE hydra_oauth2_flow DROP COLUMN granted_at_audience;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_scope_json TO requested_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN requested_at_audience_json TO requested_at_audience;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN amr_json TO amr;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_scope_json TO granted_scope;
ALTER TABLE hydra_oauth2_flow RENAME COLUMN granted_at_audience_json TO granted_at_audience;
-- scripts/db-diff.sh can be used in code review to verify that the constraint hasn't changed; we need to recreate it due to the dropped and re-added columns
ALTER TABLE hydra_oauth2_flow ADD CHECK (
state = 128 OR
state = 129 OR
state = 1 OR
(state = 2 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 3 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL
)) OR
(state = 4 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 5 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL
)) OR
(state = 6 AND (
login_remember IS NOT NULL AND
login_remember_for IS NOT NULL AND
login_error IS NOT NULL AND
acr IS NOT NULL AND
login_was_used IS NOT NULL AND
context IS NOT NULL AND
amr IS NOT NULL AND
consent_challenge_id IS NOT NULL AND
consent_verifier IS NOT NULL AND
consent_skip IS NOT NULL AND
consent_csrf IS NOT NULL AND
granted_scope IS NOT NULL AND
consent_remember IS NOT NULL AND
consent_remember_for IS NOT NULL AND
consent_error IS NOT NULL AND
session_access_token IS NOT NULL AND
session_id_token IS NOT NULL AND
consent_was_used IS NOT NULL
))
) |
SQL | hydra/persistence/sql/src/20220513000001_string_slice_json/20220513000001000000_string_slice_json.sqlite.up.sql | UPDATE hydra_client SET redirect_uris = '[]' WHERE redirect_uris = '';
UPDATE hydra_client SET grant_types = '[]' WHERE grant_types = '';
UPDATE hydra_client SET response_types = '[]' WHERE response_types = '';
UPDATE hydra_client SET audience = '[]' WHERE audience = '';
UPDATE hydra_client SET allowed_cors_origins = '[]' WHERE allowed_cors_origins = '';
UPDATE hydra_client SET contacts = '[]' WHERE contacts = '';
UPDATE hydra_client SET request_uris = '[]' WHERE request_uris = '';
UPDATE hydra_client SET post_logout_redirect_uris = '[]' WHERE post_logout_redirect_uris = '';
--split
UPDATE hydra_client SET redirect_uris = '["' || REPLACE(redirect_uris,'|','","') || '"]' WHERE redirect_uris <> '[]';
UPDATE hydra_client SET grant_types = '["' || REPLACE(grant_types,'|','","') || '"]' WHERE grant_types <> '[]';
UPDATE hydra_client SET response_types = '["' || REPLACE(response_types,'|','","') || '"]' WHERE response_types <> '[]';
UPDATE hydra_client SET audience = '["' || REPLACE(audience,'|','","') || '"]' WHERE audience <> '[]';
UPDATE hydra_client SET allowed_cors_origins = '["' || REPLACE(allowed_cors_origins,'|','","') || '"]' WHERE allowed_cors_origins <> '[]';
UPDATE hydra_client SET contacts = '["' || REPLACE(contacts,'|','","') || '"]' WHERE contacts <> '[]';
UPDATE hydra_client SET request_uris = '["' || REPLACE(request_uris,'|','","') || '"]' WHERE request_uris <> '[]';
UPDATE hydra_client SET post_logout_redirect_uris = '["' || REPLACE(post_logout_redirect_uris,'|','","') || '"]' WHERE post_logout_redirect_uris <> '[]';
--split
UPDATE hydra_oauth2_flow SET requested_scope = '[]' WHERE requested_scope = '';
UPDATE hydra_oauth2_flow SET requested_at_audience = '[]' WHERE requested_at_audience = '';
UPDATE hydra_oauth2_flow SET amr = '[]' WHERE amr = '';
UPDATE hydra_oauth2_flow SET granted_scope = '[]' WHERE granted_scope = '';
UPDATE hydra_oauth2_flow SET granted_at_audience = '[]' WHERE granted_at_audience = '';
--split
UPDATE hydra_oauth2_flow SET requested_scope = '["' || REPLACE(requested_scope,'|','","') || '"]' WHERE requested_scope <> '[]';
UPDATE hydra_oauth2_flow SET requested_at_audience = '["' || REPLACE(requested_at_audience,'|','","') || '"]' WHERE requested_at_audience <> '[]';
UPDATE hydra_oauth2_flow SET amr = '["' || REPLACE(amr,'|','","') || '"]' WHERE amr <> '[]';
UPDATE hydra_oauth2_flow SET granted_scope = '["' || REPLACE(granted_scope,'|','","') || '"]' WHERE granted_scope <> '[]';
UPDATE hydra_oauth2_flow SET granted_at_audience = '["' || REPLACE(granted_at_audience,'|','","') || '"]' WHERE granted_at_audience <> '[]'; |
Shell Script | hydra/script/render-schemas.sh | #!/bin/sh
set -euxo pipefail
ory_x_version="$(go list -f '{{.Version}}' -m github.com/ory/x)"
sed "s!ory://tracing-config!https://raw.githubusercontent.com/ory/x/$ory_x_version/otelx/config.schema.json!g;" spec/config.json > .schema/config.schema.json
git commit --author="ory-bot <[email protected]>" -m "autogen: render config schema" .schema/config.schema.json || true |
Shell Script | hydra/scripts/5min-tutorial.sh | #!/bin/bash
DB=${DB:-postgres}
TRACING=${TRACING:-false}
PROMETHEUS=${PROMETHEUS:-false}
DC="docker-compose -f quickstart.yml"
if [[ $DB == "mysql" ]]; then
DC+=" -f quickstart-mysql.yml"
fi
if [[ $DB == "postgres" ]]; then
DC+=" -f quickstart-postgres.yml"
fi
if [[ $TRACING == true ]]; then
DC+=" -f quickstart-tracing.yml"
fi
if [[ $PROMETHEUS == true ]]; then
DC+=" -f quickstart-prometheus.yml"
fi
DC+=" up --build"
$DC |
Shell Script | hydra/scripts/db-diff.sh | #!/bin/bash
set -o nounset
set -o errexit
set -o pipefail
# This script is used to generate and compare the Hydra DDL at different
# versions. This is useful when reviewing changes and troubleshooting
# migrations.
#
# Side effects:
# - Creates a directory at ./output/sql and stores the generated SQL
#
# Arguments:
# $1 - database type (e.g. postgres, mysql, sqlite)
# $2 - commit hash or branch name of the earlier version
# $3 - commit hash or branch name of the later version
#
# Example output: (the script prints the command instead of executing it)
# 'git diff --no-index ./output/sql/f5864b39.sqlite.dump.sql ./output/sql/master.sqlite.dump.sql'
#
# Usage
# ./scripts/db-diff.sh sqlite master 649f56cc
# ./scripts/db-diff.sh postgres HEAD~1 HEAD
if [ "$#" -ne 3 ]; then
echo "Usage: $0 <sqlite|postgres|cockroach|mysql> <commit-ish> <commit-ish>"
exit 1
fi
# Exports:
# - DB_DIALECT
# - DB_USER
# - DB_PASSWORD
# - DB_HOST
# - DB_PORT
# - DB_NAME
function hydra::util::parse-connection-url {
local -r url=$1
if [[ "${url}" =~ ^(.*)://([^:]*):?(.*)@\(?(.*):([0-9]*)\)?/([^?]*) ]]; then
export DB_DIALECT="${BASH_REMATCH[1]}"
export DB_USER="${BASH_REMATCH[2]}"
export DB_PASSWORD="${BASH_REMATCH[3]}"
export DB_HOST="${BASH_REMATCH[4]}"
export DB_PORT="${BASH_REMATCH[5]}"
export DB_DB="${BASH_REMATCH[6]}"
else
echo "Failed to parse URL"
exit 1
fi
}
function hydra::util::ensure-sqlite {
if ! sqlite3 --version > /dev/null 2>&1; then
echo 'Error: sqlite3 is not installed' >&2
exit 1
fi
}
function hydra::util::ensure-pg_dump {
if ! pg_dump --version > /dev/null 2>&1; then
echo 'Error: pg_dump is not installed' >&2
exit 1
fi
}
function hydra::util::ensure-mysqldump {
if ! mysqldump --version > /dev/null 2>&1; then
echo 'Error: mysqldump is not installed' >&2
exit 1
fi
}
function dump_pg {
if test -z $TEST_DATABASE_POSTGRESQL; then
echo 'Error: TEST_DATABASE_POSTGRESQL is not set; try running "source scripts/test-env.sh"' >&2
exit 1
fi
hydra::util::ensure-pg_dump
make test-resetdb >/dev/null 2>&1
sleep 4
go run . migrate sql "$TEST_DATABASE_POSTGRESQL" --yes >&2 || true
sleep 1
pg_dump -s "$TEST_DATABASE_POSTGRESQL" | sed '/^--/d'
}
function dump_cockroach {
if test -z $TEST_DATABASE_COCKROACHDB; then
echo 'Error: TEST_DATABASE_COCKROACHDB is not set; try running "source scripts/test-env.sh"' >&2
exit 1
fi
make test-resetdb >/dev/null 2>&1
sleep 4
go run . migrate sql "$TEST_DATABASE_COCKROACHDB" --yes > /dev/null || true
hydra::util::parse-connection-url "${TEST_DATABASE_COCKROACHDB}"
docker run --rm --net=host -it cockroachdb/cockroach:v20.2.6 dump --dump-all --dump-mode=schema --insecure --user="${DB_USER}" --host="${DB_HOST}" --port="${DB_PORT}"
}
function dump_sqlite {
if test -z $SQLITE_PATH; then
SQLITE_PATH="$(mktemp -d)/temp.sqlite"
fi
hydra::util::ensure-sqlite
rm "$SQLITE_PATH" > /dev/null 2>&1 || true
go run -tags sqlite,json1 . migrate sql "sqlite://$SQLITE_PATH?_fk=true" --yes > /dev/null 2>&1 || true
echo '.dump' | sqlite3 "$SQLITE_PATH"
}
function dump_mysql {
if test -z $TEST_DATABASE_MYSQL; then
echo 'Error: TEST_DATABASE_MYSQL is not set; try running "source scripts/test-env.sh"' >&2
exit 1
fi
hydra::util::ensure-mysqldump
make test-resetdb >/dev/null 2>&1
sleep 10
go run . migrate sql "$TEST_DATABASE_MYSQL" --yes > /dev/null || true
hydra::util::parse-connection-url "${TEST_DATABASE_MYSQL}"
mysqldump --user="$DB_USER" --password="$DB_PASSWORD" --host="$DB_HOST" --port="$DB_PORT" "$DB_DB" --no-data
}
if ! git diff-index --quiet HEAD --; then
echo 'Error: working tree is dirty' >&2
exit 1
fi
case $1 in
postgres)
DUMP_CMD=dump_pg
;;
cockroach)
DUMP_CMD=dump_cockroach
;;
sqlite)
DUMP_CMD=dump_sqlite
;;
mysql)
DUMP_CMD=dump_mysql
;;
*)
echo 'Error: unknown database type' >&2
exit 1
;;
esac
DIALECT=$1
COMMIT_FROM=$(git rev-parse "$2")
COMMIT_TO=$(git rev-parse "$3")
DDL_FROM="./output/sql/$COMMIT_FROM.$DIALECT.dump.sql"
DDL_TO="./output/sql/$COMMIT_TO.$DIALECT.dump.sql"
mkdir -p ./output/sql/
set -x
# shellcheck disable=SC2064
if git symbolic-ref --quiet HEAD; then
trap "git checkout -q $(git symbolic-ref HEAD); git symbolic-ref HEAD $(git symbolic-ref HEAD)" EXIT
else
trap "git checkout $(git rev-parse HEAD)" EXIT
fi
git checkout "$COMMIT_FROM" >/dev/null 2>&1
$DUMP_CMD > "$DDL_FROM"
git checkout "$COMMIT_TO" >/dev/null 2>&1
$DUMP_CMD > "$DDL_TO"
set +x
echo '+--------------------------'
echo '|'
echo '| Use the following command to print the diff:'
echo '| git diff --no-index '"$DDL_FROM"' '"$DDL_TO"
echo '|'
echo '+--------------------------'
set -x |
Shell Script | hydra/scripts/db-placeholders.sh | #!/bin/bash
set -Eeuo pipefail
# This script generates down migrations templates and is part of the
# SQL migration pipeline.
for f in $(find . -name "*.up.sql"); do
base=$(basename $f)
dir=$(dirname $f)
migra_name=$(echo $base | sed -e "s/\..*\.up\.sql//" | sed -e "s/\.up\.sql//")
echo $migra_name
if compgen -G "$dir/$migra_name*.down.sql" > /dev/null; then
echo "Down migration exists"
else
echo "Down migration does not exist"
touch $dir/$migra_name.down.sql
fi
done |
Shell Script | hydra/scripts/render-schemas.sh | #!/bin/sh
set -euxo pipefail
ory_x_version="$(go list -f '{{.Version}}' -m github.com/ory/x)"
sed "s!ory://tracing-config!https://raw.githubusercontent.com/ory/x/$ory_x_version/otelx/config.schema.json!g;" spec/config.json > .schema/config.schema.json
git commit --author="ory-bot <[email protected]>" -m "autogen: render config schema" .schema/config.schema.json || true |
Shell Script | hydra/scripts/run-bench.sh | #!/bin/bash
set -Eeuxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/.."
numReqs=10000
numParallel=100
cat > BENCHMARKS.md << EOF
---
id: hydra
title: ORY Hydra
---
In this document you will find benchmark results for different endpoints of ORY Hydra. All benchmarks are executed
using [rakyll/hey](https://github.com/rakyll/hey). Please note that these benchmarks run against the in-memory storage
adapter of ORY Hydra. These benchmarks represent what performance you would get with a zero-overhead database implementation.
We do not include benchmarks against databases (e.g. MySQL, PostgreSQL or CockroachDB) as the performance greatly differs between
deployments (e.g. request latency, database configuration) and tweaking individual things may greatly improve performance.
We believe, for that reason, that benchmark results for these database adapters are difficult to generalize and potentially
deceiving. They are thus not included.
This file is updated on every push to master. It thus represents the benchmark data for the latest version.
All benchmarks run 10.000 requests in total, with 100 concurrent requests. All benchmarks run on Circle-CI with a
["2 CPU cores and 4GB RAM"](https://support.circleci.com/hc/en-us/articles/360000489307-Why-do-my-tests-take-longer-to-run-on-CircleCI-than-locally-)
configuration.
## BCrypt
Ory Hydra can use PBKDF2 and BCrypt to obfuscate secrets of OAuth 2.0 Clients. When using flows such as the OAuth 2.0
Client Credentials Grant, Ory Hydra validates the client credentials using PBKDF2 or BCrypt which causes (by design)
CPU load. CPU load and performance depend on the hashing cost.
For the default PBKDF2 hasher, we use 25.000 rounds per default. For these benchmarks, 10.000 iterations using
\`OAUTH2_HASHERS_PBKDF2_ITERATIONS=10000\`. The lower the iterations, the faster the hashing.
For BCrypt, set the cost using the environment variable \`OAUTH2_HASHERS_BCRYPT_COST\`. The lower the cost (minimum is
6), the faster the hashing. The higher the cost, the slower.
EOF
killall hydra || true
OAUTH2_HASHERS_PBKDF2_ITERATIONS=10000 SERVE_TLS_ENABLED=false SERVE_PUBLIC_PORT=9000 SERVE_ADMIN_PORT=9001 ISSUER_URL=http://localhost:9000 DSN=memory hydra serve all --dev --sqa-opt-out > hydra.log 2>&1 &
while ! echo exit | nc 127.0.0.1 9000; do sleep 1; done
while ! echo exit | nc 127.0.0.1 9001; do sleep 1; done
sleep 1
echo "Creating benchmark client"
client=$(hydra create client \
-g client_credentials \
--scope foo \
--format json \
--endpoint http://localhost:9001)
echo $client
# Parse the JSON response using jq to get the client ID and client secret:
clientId=$(echo $client | jq -r '.client_id')
clientSecret=$(echo $client | jq -r '.client_secret')
echo "Generating initial access tokens for token introspection benchmark"
introToken=$(hydra perform client-credentials --format json --endpoint http://localhost:9000 --client-id $clientId --client-secret $clientSecret | jq -r '.access_token')
cat >> BENCHMARKS.md << EOF
## OAuth 2.0
This section contains various benchmarks against OAuth 2.0 endpoints
### Token Introspection
\`\`\`
EOF
hey -n $numReqs -c $numParallel -m POST \
-a "$clientId:$clientSecret" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "token=$introToken" \
http://localhost:9001/oauth2/introspect 2>&1 \
| tee -a BENCHMARKS.md
cat >> BENCHMARKS.md << EOF
\`\`\`
### Client Credentials Grant
This endpoint uses [BCrypt](#bcrypt).
\`\`\`
EOF
hey -n $numReqs -c $numParallel -m POST \
-a "$clientId:$clientSecret" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials" \
http://localhost:9000/oauth2/token 2>&1 \
| tee -a BENCHMARKS.md
# shellcheck disable=SC2006
cat >> BENCHMARKS.md << EOF
\`\`\`
## OAuth 2.0 Client Management
### Creating OAuth 2.0 Clients
This endpoint uses [BCrypt](#bcrypt) and generates IDs and secrets by reading from `/dev/urandom` which negatively impacts
performance. Performance will be better if IDs and secrets are set in the request as opposed to generated by ORY Hydra.
\`\`\`
This test is currently disabled due to issues with /dev/urandom being inaccessible in the CI.
EOF
##hey -n $numReqs -c $numParallel -m POST \
# -H "Content-Type: application/json" \
# -d '{}' \
# http://localhost:9001/clients 2>&1 \
# | tee -a BENCHMARKS.md
cat >> BENCHMARKS.md << EOF
\`\`\`
### Listing OAuth 2.0 Clients
\`\`\`
EOF
hey -n $numReqs -c $numParallel -m GET \
http://localhost:9001/clients 2>&1 \
| tee -a BENCHMARKS.md
cat >> BENCHMARKS.md << EOF
\`\`\`
### Fetching a specific OAuth 2.0 Client
\`\`\`
EOF
hey -n $numReqs -c $numParallel -m GET \
http://localhost:9001/clients/$clientId 2>&1 \
| tee -a BENCHMARKS.md
cat >> BENCHMARKS.md << EOF
\`\`\`
EOF |
Shell Script | hydra/scripts/run-configuration.sh | #!/bin/bash
set -Eeuxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/.."
# shellcheck disable=SC2006
cat > configuration.md << EOF
---
id: configuration
title: Configuration
---
\`\`\`yaml
`cat ./docs/config.yaml`
\`\`\`
EOF |
Shell Script | hydra/scripts/run-gensdk.sh | #!/bin/bash
set -Eeuxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/.."
scripts/run-genswag.sh
rm -rf ./sdk/go/hydra/swagger
rm -rf ./sdk/js/swagger
rm -rf ./sdk/php/swagger
rm -rf ./sdk/java
# curl -O scripts/swagger-codegen-cli-2.2.3.jar http://central.maven.org/maven2/io/swagger/swagger-codegen-cli/2.2.3/swagger-codegen-cli-2.2.3.jar
java -jar scripts/swagger-codegen-cli-2.2.3.jar generate -i ./docs/api.swagger.json -l go -o ./sdk/go/hydra/swagger
java -jar scripts/swagger-codegen-cli-2.2.3.jar generate -i ./docs/api.swagger.json -l javascript -o ./sdk/js/swagger
java -jar scripts/swagger-codegen-cli-2.2.3.jar generate -i ./docs/api.swagger.json -l php -o sdk/php/ \
--invoker-package Hydra\\SDK --git-repo-id swagger --git-user-id ory --additional-properties "packagePath=swagger,description=Client for Hydra"
java -DapiTests=false -DmodelTests=false -jar scripts/swagger-codegen-cli-2.2.3.jar generate \
--input-spec ./docs/api.swagger.json \
--lang java \
--library resttemplate \
--group-id com.github.ory \
--artifact-id hydra-client-resttemplate \
--invoker-package com.github.ory.hydra \
--api-package com.github.ory.hydra.api \
--model-package com.github.ory.hydra.model \
--output ./sdk/java/hydra-client-resttemplate
scripts/run-format.sh
git checkout HEAD -- sdk/go/hydra/swagger/configuration.go
git checkout HEAD -- sdk/go/hydra/swagger/api_client.go
rm -f ./sdk/js/swagger/package.json
rm -rf ./sdk/js/swagger/test
rm -f ./sdk/php/swagger/composer.json ./sdk/php/swagger/phpunit.xml.dist
rm -rf ./sdk/php/swagger/test
npm run prettier |
Shell Script | hydra/scripts/run-genswag.sh | #!/bin/bash
set -Eeuxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/.."
swagger generate spec -m -o ./docs/api.swagger.json |
Shell Script | hydra/scripts/test-env.sh | #!/bin/bash
export TEST_DATABASE_MYSQL='mysql://root:secret@(127.0.0.1:3444)/mysql?parseTime=true&multiStatements=true'
export TEST_DATABASE_POSTGRESQL='postgres://postgres:[email protected]:3445/postgres?sslmode=disable'
export TEST_DATABASE_COCKROACHDB='cockroach://[email protected]:3446/defaultdb?sslmode=disable' |
Go | hydra/spec/api.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package spec
import _ "embed"
//go:embed api.json
var API []byte |
JSON | hydra/spec/api.json | {
"components": {
"responses": {
"emptyResponse": {
"description": "Empty responses are sent when, for example, resources are deleted. The HTTP status code for empty responses is\ntypically 201."
},
"errorOAuth2BadRequest": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "Bad Request Error Response"
},
"errorOAuth2Default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "Default Error Response"
},
"errorOAuth2NotFound": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "Not Found Error Response"
},
"listOAuth2Clients": {
"content": {
"application/json": {
"schema": {
"items": {
"$ref": "#/components/schemas/oAuth2Client"
},
"type": "array"
}
}
},
"description": "Paginated OAuth2 Client List Response"
}
},
"schemas": {
"CreateVerifiableCredentialRequestBody": {
"properties": {
"format": {
"type": "string"
},
"proof": {
"$ref": "#/components/schemas/VerifiableCredentialProof"
},
"types": {
"items": {
"type": "string"
},
"type": "array"
}
},
"title": "CreateVerifiableCredentialRequestBody contains the request body to request a verifiable credential.",
"type": "object"
},
"DefaultError": {},
"JSONRawMessage": {
"title": "JSONRawMessage represents a json.RawMessage that works well with JSON, SQL, and Swagger."
},
"NullBool": {
"nullable": true,
"type": "boolean"
},
"NullDuration": {
"description": "Specify a time duration in milliseconds, seconds, minutes, hours.",
"pattern": "^([0-9]+(ns|us|ms|s|m|h))*$",
"title": "Time duration",
"type": "string"
},
"NullInt": {
"nullable": true,
"type": "integer"
},
"NullString": {
"nullable": true,
"type": "string"
},
"NullTime": {
"format": "date-time",
"nullable": true,
"type": "string"
},
"NullUUID": {
"format": "uuid4",
"nullable": true,
"type": "string"
},
"RFC6749ErrorJson": {
"properties": {
"error": {
"type": "string"
},
"error_debug": {
"type": "string"
},
"error_description": {
"type": "string"
},
"error_hint": {
"type": "string"
},
"status_code": {
"format": "int64",
"type": "integer"
}
},
"title": "RFC6749ErrorJson is a helper struct for JSON encoding/decoding of RFC6749Error.",
"type": "object"
},
"StringSliceJSONFormat": {
"items": {
"type": "string"
},
"title": "StringSliceJSONFormat represents []string{} which is encoded to/from JSON for SQL storage.",
"type": "array"
},
"Time": {
"format": "date-time",
"type": "string"
},
"UUID": {
"format": "uuid4",
"type": "string"
},
"VerifiableCredentialProof": {
"properties": {
"jwt": {
"type": "string"
},
"proof_type": {
"type": "string"
}
},
"title": "VerifiableCredentialProof contains the proof of a verifiable credential.",
"type": "object"
},
"acceptOAuth2ConsentRequest": {
"properties": {
"grant_access_token_audience": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"grant_scope": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"handled_at": {
"$ref": "#/components/schemas/nullTime"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same\nclient asks the same user for the same, or a subset of, scope.",
"type": "boolean"
},
"remember_for": {
"description": "RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered indefinitely.",
"format": "int64",
"type": "integer"
},
"session": {
"$ref": "#/components/schemas/acceptOAuth2ConsentRequestSession"
}
},
"title": "The request payload used to accept a consent request.",
"type": "object"
},
"acceptOAuth2ConsentRequestSession": {
"properties": {
"access_token": {
"description": "AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the\nrefresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection.\nIf only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties\ncan access that endpoint as well, sensitive data from the session might be exposed to them. Use with care!"
},
"id_token": {
"description": "IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable\nby anyone that has access to the ID Challenge. Use with care!"
}
},
"title": "Pass session data to a consent request.",
"type": "object"
},
"acceptOAuth2LoginRequest": {
"properties": {
"acr": {
"description": "ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it\nto express that, for example, a user authenticated using two factor authentication.",
"type": "string"
},
"amr": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"context": {
"$ref": "#/components/schemas/JSONRawMessage"
},
"extend_session_lifespan": {
"description": "Extend OAuth2 authentication session lifespan\n\nIf set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously.\n\nThis value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`.",
"type": "boolean"
},
"force_subject_identifier": {
"description": "ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the\n(Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID\nConnect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client.\n\nPlease note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the\nsub claim in the OAuth 2.0 Introspection.\n\nPer default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself\nyou can use this field. Please note that setting this field has no effect if `pairwise` is not configured in\nORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's\nconfiguration).\n\nPlease also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies\nthat you have to compute this value on every authentication process (probably depending on the client ID or some\nother unique value).\n\nIf you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.",
"type": "string"
},
"identity_provider_session_id": {
"description": "IdentityProviderSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store\na cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she\nwill not be asked to log in again.",
"type": "boolean"
},
"remember_for": {
"description": "RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered for the duration of the browser session (using a session cookie).",
"format": "int64",
"type": "integer"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated.",
"type": "string"
}
},
"required": [
"subject"
],
"title": "HandledLoginRequest is the request payload used to accept a login request.",
"type": "object"
},
"createJsonWebKeySet": {
"description": "Create JSON Web Key Set Request Body",
"properties": {
"alg": {
"description": "JSON Web Key Algorithm\n\nThe algorithm to be used for creating the key. Supports `RS256`, `ES256`, `ES512`, `HS512`, and `HS256`.",
"type": "string"
},
"kid": {
"description": "JSON Web Key ID\n\nThe Key ID of the key to be created.",
"type": "string"
},
"use": {
"description": "JSON Web Key Use\n\nThe \"use\" (public key use) parameter identifies the intended use of\nthe public key. The \"use\" parameter is employed to indicate whether\na public key is used for encrypting data or verifying the signature\non data. Valid values are \"enc\" and \"sig\".",
"type": "string"
}
},
"required": [
"alg",
"use",
"kid"
],
"type": "object"
},
"credentialSupportedDraft00": {
"description": "Includes information about the supported verifiable credentials.",
"properties": {
"cryptographic_binding_methods_supported": {
"description": "OpenID Connect Verifiable Credentials Cryptographic Binding Methods Supported\n\nContains a list of cryptographic binding methods supported for signing the proof.",
"items": {
"type": "string"
},
"type": "array"
},
"cryptographic_suites_supported": {
"description": "OpenID Connect Verifiable Credentials Cryptographic Suites Supported\n\nContains a list of cryptographic suites methods supported for signing the proof.",
"items": {
"type": "string"
},
"type": "array"
},
"format": {
"description": "OpenID Connect Verifiable Credentials Format\n\nContains the format that is supported by this authorization server.",
"type": "string"
},
"types": {
"description": "OpenID Connect Verifiable Credentials Types\n\nContains the types of verifiable credentials supported.",
"items": {
"type": "string"
},
"type": "array"
}
},
"title": "Verifiable Credentials Metadata (Draft 00)",
"type": "object"
},
"errorOAuth2": {
"description": "Error",
"properties": {
"error": {
"description": "Error",
"type": "string"
},
"error_debug": {
"description": "Error Debug Information\n\nOnly available in dev mode.",
"type": "string"
},
"error_description": {
"description": "Error Description",
"type": "string"
},
"error_hint": {
"description": "Error Hint\n\nHelps the user identify the error cause.",
"example": "The redirect URL is not allowed.",
"type": "string"
},
"status_code": {
"description": "HTTP Status Code",
"example": 401,
"format": "int64",
"type": "integer"
}
},
"type": "object"
},
"genericError": {
"properties": {
"code": {
"description": "The status code",
"example": 404,
"format": "int64",
"type": "integer"
},
"debug": {
"description": "Debug information\n\nThis field is often not exposed to protect against leaking\nsensitive information.",
"example": "SQL field \"foo\" is not a bool.",
"type": "string"
},
"details": {
"description": "Further error details"
},
"id": {
"description": "The error ID\n\nUseful when trying to identify various errors in application logic.",
"type": "string"
},
"message": {
"description": "Error message\n\nThe error's message.",
"example": "The resource could not be found",
"type": "string"
},
"reason": {
"description": "A human-readable reason for the error",
"example": "User with ID 1234 does not exist.",
"type": "string"
},
"request": {
"description": "The request ID\n\nThe request ID is often exposed internally in order to trace\nerrors across service architectures. This is often a UUID.",
"example": "d7ef54b1-ec15-46e6-bccb-524b82c035e6",
"type": "string"
},
"status": {
"description": "The status description",
"example": "Not Found",
"type": "string"
}
},
"required": [
"message"
],
"type": "object"
},
"healthNotReadyStatus": {
"properties": {
"errors": {
"additionalProperties": {
"type": "string"
},
"description": "Errors contains a list of errors that caused the not ready status.",
"type": "object"
}
},
"type": "object"
},
"healthStatus": {
"properties": {
"status": {
"description": "Status always contains \"ok\".",
"type": "string"
}
},
"type": "object"
},
"introspectedOAuth2Token": {
"description": "Introspection contains an access token's session data as specified by\n[IETF RFC 7662](https://tools.ietf.org/html/rfc7662)",
"properties": {
"active": {
"description": "Active is a boolean indicator of whether or not the presented token\nis currently active. The specifics of a token's \"active\" state\nwill vary depending on the implementation of the authorization\nserver and the information it keeps about its tokens, but a \"true\"\nvalue return for the \"active\" property will generally indicate\nthat a given token has been issued by this authorization server,\nhas not been revoked by the resource owner, and is within its\ngiven time window of validity (e.g., after its issuance time and\nbefore its expiration time).",
"type": "boolean"
},
"aud": {
"description": "Audience contains a list of the token's intended audiences.",
"items": {
"type": "string"
},
"type": "array"
},
"client_id": {
"description": "ID is aclient identifier for the OAuth 2.0 client that\nrequested this token.",
"type": "string"
},
"exp": {
"description": "Expires at is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token will expire.",
"format": "int64",
"type": "integer"
},
"ext": {
"additionalProperties": {},
"description": "Extra is arbitrary data set by the session.",
"type": "object"
},
"iat": {
"description": "Issued at is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token was\noriginally issued.",
"format": "int64",
"type": "integer"
},
"iss": {
"description": "IssuerURL is a string representing the issuer of this token",
"type": "string"
},
"nbf": {
"description": "NotBefore is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token is not to be\nused before.",
"format": "int64",
"type": "integer"
},
"obfuscated_subject": {
"description": "ObfuscatedSubject is set when the subject identifier algorithm was set to \"pairwise\" during authorization.\nIt is the `sub` value of the ID Token that was issued.",
"type": "string"
},
"scope": {
"description": "Scope is a JSON string containing a space-separated list of\nscopes associated with this token.",
"type": "string"
},
"sub": {
"description": "Subject of the token, as defined in JWT [RFC7519].\nUsually a machine-readable identifier of the resource owner who\nauthorized this token.",
"type": "string"
},
"token_type": {
"description": "TokenType is the introspected token's type, typically `Bearer`.",
"type": "string"
},
"token_use": {
"description": "TokenUse is the introspected token's use, for example `access_token` or `refresh_token`.",
"type": "string"
},
"username": {
"description": "Username is a human-readable identifier for the resource owner who\nauthorized this token.",
"type": "string"
}
},
"required": [
"active"
],
"type": "object"
},
"jsonPatch": {
"description": "A JSONPatch document as defined by RFC 6902",
"properties": {
"from": {
"description": "This field is used together with operation \"move\" and uses JSON Pointer notation.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"example": "/name",
"type": "string"
},
"op": {
"description": "The operation to be performed. One of \"add\", \"remove\", \"replace\", \"move\", \"copy\", or \"test\".",
"example": "replace",
"type": "string"
},
"path": {
"description": "The path to the target path. Uses JSON pointer notation.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"example": "/name",
"type": "string"
},
"value": {
"description": "The value to be used within the operations.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"example": "foobar"
}
},
"required": [
"op",
"path"
],
"type": "object"
},
"jsonPatchDocument": {
"description": "A JSONPatchDocument request",
"items": {
"$ref": "#/components/schemas/jsonPatch"
},
"type": "array"
},
"jsonWebKey": {
"properties": {
"alg": {
"description": "The \"alg\" (algorithm) parameter identifies the algorithm intended for\nuse with the key. The values used should either be registered in the\nIANA \"JSON Web Signature and Encryption Algorithms\" registry\nestablished by [JWA] or be a value that contains a Collision-\nResistant Name.",
"example": "RS256",
"type": "string"
},
"crv": {
"example": "P-256",
"type": "string"
},
"d": {
"example": "T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE",
"type": "string"
},
"dp": {
"example": "G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0",
"type": "string"
},
"dq": {
"example": "s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk",
"type": "string"
},
"e": {
"example": "AQAB",
"type": "string"
},
"k": {
"example": "GawgguFyGrWKav7AX4VKUg",
"type": "string"
},
"kid": {
"description": "The \"kid\" (key ID) parameter is used to match a specific key. This\nis used, for instance, to choose among a set of keys within a JWK Set\nduring key rollover. The structure of the \"kid\" value is\nunspecified. When \"kid\" values are used within a JWK Set, different\nkeys within the JWK Set SHOULD use distinct \"kid\" values. (One\nexample in which different keys might use the same \"kid\" value is if\nthey have different \"kty\" (key type) values but are considered to be\nequivalent alternatives by the application using them.) The \"kid\"\nvalue is a case-sensitive string.",
"example": "1603dfe0af8f4596",
"type": "string"
},
"kty": {
"description": "The \"kty\" (key type) parameter identifies the cryptographic algorithm\nfamily used with the key, such as \"RSA\" or \"EC\". \"kty\" values should\neither be registered in the IANA \"JSON Web Key Types\" registry\nestablished by [JWA] or be a value that contains a Collision-\nResistant Name. The \"kty\" value is a case-sensitive string.",
"example": "RSA",
"type": "string"
},
"n": {
"example": "vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0",
"type": "string"
},
"p": {
"example": "6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ",
"type": "string"
},
"q": {
"example": "0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ",
"type": "string"
},
"qi": {
"example": "GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU",
"type": "string"
},
"use": {
"description": "Use (\"public key use\") identifies the intended use of\nthe public key. The \"use\" parameter is employed to indicate whether\na public key is used for encrypting data or verifying the signature\non data. Values are commonly \"sig\" (signature) or \"enc\" (encryption).",
"example": "sig",
"type": "string"
},
"x": {
"example": "f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU",
"type": "string"
},
"x5c": {
"description": "The \"x5c\" (X.509 certificate chain) parameter contains a chain of one\nor more PKIX certificates [RFC5280]. The certificate chain is\nrepresented as a JSON array of certificate value strings. Each\nstring in the array is a base64-encoded (Section 4 of [RFC4648] --\nnot base64url-encoded) DER [ITU.X690.1994] PKIX certificate value.\nThe PKIX certificate containing the key value MUST be the first\ncertificate.",
"items": {
"type": "string"
},
"type": "array"
},
"y": {
"example": "x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0",
"type": "string"
}
},
"required": [
"use",
"kty",
"kid",
"alg"
],
"type": "object"
},
"jsonWebKeySet": {
"description": "JSON Web Key Set",
"properties": {
"keys": {
"description": "List of JSON Web Keys\n\nThe value of the \"keys\" parameter is an array of JSON Web Key (JWK)\nvalues. By default, the order of the JWK values within the array does\nnot imply an order of preference among them, although applications\nof JWK Sets can choose to assign a meaning to the order for their\npurposes, if desired.",
"items": {
"$ref": "#/components/schemas/jsonWebKey"
},
"type": "array"
}
},
"type": "object"
},
"nullDuration": {
"nullable": true,
"pattern": "^[0-9]+(ns|us|ms|s|m|h)$",
"type": "string"
},
"nullInt64": {
"nullable": true,
"type": "integer"
},
"nullTime": {
"format": "date-time",
"title": "NullTime implements sql.NullTime functionality.",
"type": "string"
},
"oAuth2Client": {
"description": "OAuth 2.0 Clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"properties": {
"access_token_strategy": {
"description": "OAuth 2.0 Access Token Strategy\n\nAccessTokenStrategy is the strategy used to generate access tokens.\nValid options are `jwt` and `opaque`. `jwt` is a bad idea, see https://www.ory.sh/docs/hydra/advanced#json-web-tokens\nSetting the stragegy here overrides the global setting in `strategies.access_token`.",
"type": "string"
},
"allowed_cors_origins": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"audience": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"authorization_code_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"authorization_code_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"authorization_code_grant_refresh_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"backchannel_logout_session_required": {
"description": "OpenID Connect Back-Channel Logout Session Required\n\nBoolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout\nToken to identify the RP session with the OP when the backchannel_logout_uri is used.\nIf omitted, the default value is false.",
"type": "boolean"
},
"backchannel_logout_uri": {
"description": "OpenID Connect Back-Channel Logout URI\n\nRP URL that will cause the RP to log itself out when sent a Logout Token by the OP.",
"type": "string"
},
"client_credentials_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"client_id": {
"description": "OAuth 2.0 Client ID\n\nThe ID is autogenerated and immutable.",
"type": "string"
},
"client_name": {
"description": "OAuth 2.0 Client Name\n\nThe human-readable name of the client to be presented to the\nend-user during authorization.",
"type": "string"
},
"client_secret": {
"description": "OAuth 2.0 Client Secret\n\nThe secret will be included in the create request as cleartext, and then\nnever again. The secret is kept in hashed format and is not recoverable once lost.",
"type": "string"
},
"client_secret_expires_at": {
"description": "OAuth 2.0 Client Secret Expires At\n\nThe field is currently not supported and its value is always 0.",
"format": "int64",
"type": "integer"
},
"client_uri": {
"description": "OAuth 2.0 Client URI\n\nClientURI is a URL string of a web page providing information about the client.\nIf present, the server SHOULD display this URL to the end-user in\na clickable fashion.",
"type": "string"
},
"contacts": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"created_at": {
"description": "OAuth 2.0 Client Creation Date\n\nCreatedAt returns the timestamp of the client's creation.",
"format": "date-time",
"type": "string"
},
"frontchannel_logout_session_required": {
"description": "OpenID Connect Front-Channel Logout Session Required\n\nBoolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be\nincluded to identify the RP session with the OP when the frontchannel_logout_uri is used.\nIf omitted, the default value is false.",
"type": "boolean"
},
"frontchannel_logout_uri": {
"description": "OpenID Connect Front-Channel Logout URI\n\nRP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query\nparameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the\nrequest and to determine which of the potentially multiple sessions is to be logged out; if either is\nincluded, both MUST be.",
"type": "string"
},
"grant_types": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"implicit_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"implicit_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"jwks": {
"description": "OAuth 2.0 Client JSON Web Key Set\n\nClient's JSON Web Key Set [JWK] document, passed by value. The semantics of the jwks parameter are the same as\nthe jwks_uri parameter, other than that the JWK Set is passed by value, rather than by reference. This parameter\nis intended only to be used by Clients that, for some reason, are unable to use the jwks_uri parameter, for\ninstance, by native applications that might not have a location to host the contents of the JWK Set. If a Client\ncan use jwks_uri, it MUST NOT use jwks. One significant downside of jwks is that it does not enable key rotation\n(which jwks_uri does, as described in Section 10 of OpenID Connect Core 1.0 [OpenID.Core]). The jwks_uri and jwks\nparameters MUST NOT be used together."
},
"jwks_uri": {
"description": "OAuth 2.0 Client JSON Web Key Set URL\n\nURL for the Client's JSON Web Key Set [JWK] document. If the Client signs requests to the Server, it contains\nthe signing key(s) the Server uses to validate signatures from the Client. The JWK Set MAY also contain the\nClient's encryption keys(s), which are used by the Server to encrypt responses to the Client. When both signing\nand encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all keys in the referenced\nJWK Set to indicate each key's intended usage. Although some algorithms allow the same key to be used for both\nsignatures and encryption, doing so is NOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used\nto provide X.509 representations of keys provided. When used, the bare key values MUST still be present and MUST\nmatch those in the certificate.",
"type": "string"
},
"jwt_bearer_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"logo_uri": {
"description": "OAuth 2.0 Client Logo URI\n\nA URL string referencing the client's logo.",
"type": "string"
},
"metadata": {
"$ref": "#/components/schemas/JSONRawMessage"
},
"owner": {
"description": "OAuth 2.0 Client Owner\n\nOwner is a string identifying the owner of the OAuth 2.0 Client.",
"type": "string"
},
"policy_uri": {
"description": "OAuth 2.0 Client Policy URI\n\nPolicyURI is a URL string that points to a human-readable privacy policy document\nthat describes how the deployment organization collects, uses,\nretains, and discloses personal data.",
"type": "string"
},
"post_logout_redirect_uris": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"redirect_uris": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"refresh_token_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"refresh_token_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"refresh_token_grant_refresh_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"registration_access_token": {
"description": "OpenID Connect Dynamic Client Registration Access Token\n\nRegistrationAccessToken can be used to update, get, or delete the OAuth2 Client. It is sent when creating a client\nusing Dynamic Client Registration.",
"type": "string"
},
"registration_client_uri": {
"description": "OpenID Connect Dynamic Client Registration URL\n\nRegistrationClientURI is the URL used to update, get, or delete the OAuth2 Client.",
"type": "string"
},
"request_object_signing_alg": {
"description": "OpenID Connect Request Object Signing Algorithm\n\nJWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects\nfrom this Client MUST be rejected, if not signed with this algorithm.",
"type": "string"
},
"request_uris": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"response_types": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"scope": {
"description": "OAuth 2.0 Client Scope\n\nScope is a string containing a space-separated list of scope values (as\ndescribed in Section 3.3 of OAuth 2.0 [RFC6749]) that the client\ncan use when requesting access tokens.",
"example": "scope1 scope-2 scope.3 scope:4",
"type": "string"
},
"sector_identifier_uri": {
"description": "OpenID Connect Sector Identifier URI\n\nURL using the https scheme to be used in calculating Pseudonymous Identifiers by the OP. The URL references a\nfile with a single JSON array of redirect_uri values.",
"type": "string"
},
"skip_consent": {
"description": "SkipConsent skips the consent screen for this client. This field can only\nbe set from the admin API.",
"type": "boolean"
},
"subject_type": {
"description": "OpenID Connect Subject Type\n\nThe `subject_types_supported` Discovery parameter contains a\nlist of the supported subject_type values for this server. Valid types include `pairwise` and `public`.",
"type": "string"
},
"token_endpoint_auth_method": {
"default": "client_secret_basic",
"description": "OAuth 2.0 Token Endpoint Authentication Method\n\nRequested Client Authentication method for the Token Endpoint. The options are:\n\n`client_secret_basic`: (default) Send `client_id` and `client_secret` as `application/x-www-form-urlencoded` encoded in the HTTP Authorization header.\n`client_secret_post`: Send `client_id` and `client_secret` as `application/x-www-form-urlencoded` in the HTTP body.\n`private_key_jwt`: Use JSON Web Tokens to authenticate the client.\n`none`: Used for public clients (native apps, mobile apps) which can not have secrets.",
"type": "string"
},
"token_endpoint_auth_signing_alg": {
"description": "OAuth 2.0 Token Endpoint Signing Algorithm\n\nRequested Client Authentication signing algorithm for the Token Endpoint.",
"type": "string"
},
"tos_uri": {
"description": "OAuth 2.0 Client Terms of Service URI\n\nA URL string pointing to a human-readable terms of service\ndocument for the client that describes a contractual relationship\nbetween the end-user and the client that the end-user accepts when\nauthorizing the client.",
"type": "string"
},
"updated_at": {
"description": "OAuth 2.0 Client Last Update Date\n\nUpdatedAt returns the timestamp of the last update.",
"format": "date-time",
"type": "string"
},
"userinfo_signed_response_alg": {
"description": "OpenID Connect Request Userinfo Signed Response Algorithm\n\nJWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT\n[JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims\nas a UTF-8 encoded JSON object using the application/json content-type.",
"type": "string"
}
},
"title": "OAuth 2.0 Client",
"type": "object"
},
"oAuth2ClientTokenLifespans": {
"description": "Lifespans of different token types issued for this OAuth 2.0 Client.",
"properties": {
"authorization_code_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"authorization_code_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"authorization_code_grant_refresh_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"client_credentials_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"implicit_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"implicit_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"jwt_bearer_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"refresh_token_grant_access_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"refresh_token_grant_id_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
},
"refresh_token_grant_refresh_token_lifespan": {
"$ref": "#/components/schemas/NullDuration"
}
},
"title": "OAuth 2.0 Client Token Lifespans",
"type": "object"
},
"oAuth2ConsentRequest": {
"properties": {
"acr": {
"description": "ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it\nto express that, for example, a user authenticated using two factor authentication.",
"type": "string"
},
"amr": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"challenge": {
"description": "ID is the identifier (\"authorization challenge\") of the consent authorization request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/components/schemas/oAuth2Client"
},
"context": {
"$ref": "#/components/schemas/JSONRawMessage"
},
"login_challenge": {
"description": "LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate\na login and consent request in the login \u0026 consent app.",
"type": "string"
},
"login_session_id": {
"description": "LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)\nthis ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)\nthis will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back-\nchannel logout. It's value can generally be used to associate consecutive login requests by a certain user.",
"type": "string"
},
"oidc_context": {
"$ref": "#/components/schemas/oAuth2ConsentRequestOpenIDConnectContext"
},
"request_url": {
"description": "RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which\ninitiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but\nmight come in handy if you want to deal with additional request parameters.",
"type": "string"
},
"requested_access_token_audience": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"requested_scope": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"skip": {
"description": "Skip, if true, implies that the client has requested the same scopes from the same user previously.\nIf true, you must not ask the user to grant the requested scopes. You must however either allow or deny the\nconsent request using the usual API call.",
"type": "boolean"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope\nrequested by the OAuth 2.0 client.",
"type": "string"
}
},
"required": [
"challenge"
],
"title": "Contains information on an ongoing consent request.",
"type": "object"
},
"oAuth2ConsentRequestOpenIDConnectContext": {
"properties": {
"acr_values": {
"description": "ACRValues is the Authentication AuthorizationContext Class Reference requested in the OAuth 2.0 Authorization request.\nIt is a parameter defined by OpenID Connect and expresses which level of authentication (e.g. 2FA) is required.\n\nOpenID Connect defines it as follows:\n\u003e Requested Authentication AuthorizationContext Class Reference values. Space-separated string that specifies the acr values\nthat the Authorization Server is being requested to use for processing this Authentication Request, with the\nvalues appearing in order of preference. The Authentication AuthorizationContext Class satisfied by the authentication\nperformed is returned as the acr Claim Value, as specified in Section 2. The acr Claim is requested as a\nVoluntary Claim by this parameter.",
"items": {
"type": "string"
},
"type": "array"
},
"display": {
"description": "Display is a string value that specifies how the Authorization Server displays the authentication and consent user interface pages to the End-User.\nThe defined values are:\npage: The Authorization Server SHOULD display the authentication and consent UI consistent with a full User Agent page view. If the display parameter is not specified, this is the default display mode.\npopup: The Authorization Server SHOULD display the authentication and consent UI consistent with a popup User Agent window. The popup User Agent window should be of an appropriate size for a login-focused dialog and should not obscure the entire window that it is popping up over.\ntouch: The Authorization Server SHOULD display the authentication and consent UI consistent with a device that leverages a touch interface.\nwap: The Authorization Server SHOULD display the authentication and consent UI consistent with a \"feature phone\" type display.\n\nThe Authorization Server MAY also attempt to detect the capabilities of the User Agent and present an appropriate display.",
"type": "string"
},
"id_token_hint_claims": {
"additionalProperties": {},
"description": "IDTokenHintClaims are the claims of the ID Token previously issued by the Authorization Server being passed as a hint about the\nEnd-User's current or past authenticated session with the Client.",
"type": "object"
},
"login_hint": {
"description": "LoginHint hints about the login identifier the End-User might use to log in (if necessary).\nThis hint can be used by an RP if it first asks the End-User for their e-mail address (or other identifier)\nand then wants to pass that value as a hint to the discovered authorization service. This value MAY also be a\nphone number in the format specified for the phone_number Claim. The use of this parameter is optional.",
"type": "string"
},
"ui_locales": {
"description": "UILocales is the End-User'id preferred languages and scripts for the user interface, represented as a\nspace-separated list of BCP47 [RFC5646] language tag values, ordered by preference. For instance, the value\n\"fr-CA fr en\" represents a preference for French as spoken in Canada, then French (without a region designation),\nfollowed by English (without a region designation). An error SHOULD NOT result if some or all of the requested\nlocales are not supported by the OpenID Provider.",
"items": {
"type": "string"
},
"type": "array"
}
},
"title": "Contains optional information about the OpenID Connect request.",
"type": "object"
},
"oAuth2ConsentSession": {
"description": "A completed OAuth 2.0 Consent Session.",
"properties": {
"consent_request": {
"$ref": "#/components/schemas/oAuth2ConsentRequest"
},
"expires_at": {
"properties": {
"access_token": {
"format": "date-time",
"type": "string"
},
"authorize_code": {
"format": "date-time",
"type": "string"
},
"id_token": {
"format": "date-time",
"type": "string"
},
"par_context": {
"format": "date-time",
"type": "string"
},
"refresh_token": {
"format": "date-time",
"type": "string"
}
},
"type": "object"
},
"grant_access_token_audience": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"grant_scope": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"handled_at": {
"$ref": "#/components/schemas/nullTime"
},
"remember": {
"description": "Remember Consent\n\nRemember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same\nclient asks the same user for the same, or a subset of, scope.",
"type": "boolean"
},
"remember_for": {
"description": "Remember Consent For\n\nRememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered indefinitely.",
"format": "int64",
"type": "integer"
},
"session": {
"$ref": "#/components/schemas/acceptOAuth2ConsentRequestSession"
}
},
"title": "OAuth 2.0 Consent Session",
"type": "object"
},
"oAuth2ConsentSessions": {
"description": "List of OAuth 2.0 Consent Sessions",
"items": {
"$ref": "#/components/schemas/oAuth2ConsentSession"
},
"type": "array"
},
"oAuth2LoginRequest": {
"properties": {
"challenge": {
"description": "ID is the identifier (\"login challenge\") of the login request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/components/schemas/oAuth2Client"
},
"oidc_context": {
"$ref": "#/components/schemas/oAuth2ConsentRequestOpenIDConnectContext"
},
"request_url": {
"description": "RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which\ninitiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but\nmight come in handy if you want to deal with additional request parameters.",
"type": "string"
},
"requested_access_token_audience": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"requested_scope": {
"$ref": "#/components/schemas/StringSliceJSONFormat"
},
"session_id": {
"description": "SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)\nthis ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)\nthis will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back-\nchannel logout. It's value can generally be used to associate consecutive login requests by a certain user.",
"type": "string"
},
"skip": {
"description": "Skip, if true, implies that the client has requested the same scopes from the same user previously.\nIf true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.\n\nThis feature allows you to update / set session information.",
"type": "boolean"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope\nrequested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type\nwhen accepting the login request, or the request will fail.",
"type": "string"
}
},
"required": [
"challenge",
"requested_scope",
"requested_access_token_audience",
"skip",
"subject",
"client",
"request_url"
],
"title": "Contains information on an ongoing login request.",
"type": "object"
},
"oAuth2LogoutRequest": {
"properties": {
"challenge": {
"description": "Challenge is the identifier (\"logout challenge\") of the logout authentication request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/components/schemas/oAuth2Client"
},
"request_url": {
"description": "RequestURL is the original Logout URL requested.",
"type": "string"
},
"rp_initiated": {
"description": "RPInitiated is set to true if the request was initiated by a Relying Party (RP), also known as an OAuth 2.0 Client.",
"type": "boolean"
},
"sid": {
"description": "SessionID is the login session ID that was requested to log out.",
"type": "string"
},
"subject": {
"description": "Subject is the user for whom the logout was request.",
"type": "string"
}
},
"title": "Contains information about an ongoing logout request.",
"type": "object"
},
"oAuth2RedirectTo": {
"description": "Contains a redirect URL used to complete a login, consent, or logout request.",
"properties": {
"redirect_to": {
"description": "RedirectURL is the URL which you should redirect the user's browser to once the authentication process is completed.",
"type": "string"
}
},
"required": [
"redirect_to"
],
"title": "OAuth 2.0 Redirect Browser To",
"type": "object"
},
"oAuth2TokenExchange": {
"description": "OAuth2 Token Exchange Result",
"properties": {
"access_token": {
"description": "The access token issued by the authorization server.",
"type": "string"
},
"expires_in": {
"description": "The lifetime in seconds of the access token. For\nexample, the value \"3600\" denotes that the access token will\nexpire in one hour from the time the response was generated.",
"format": "int64",
"type": "integer"
},
"id_token": {
"description": "To retrieve a refresh token request the id_token scope.",
"format": "int64",
"type": "integer"
},
"refresh_token": {
"description": "The refresh token, which can be used to obtain new\naccess tokens. To retrieve it add the scope \"offline\" to your access token request.",
"type": "string"
},
"scope": {
"description": "The scope of the access token",
"type": "string"
},
"token_type": {
"description": "The type of the token issued",
"type": "string"
}
},
"type": "object"
},
"oidcConfiguration": {
"description": "Includes links to several endpoints (for example `/oauth2/token`) and exposes information on supported signature algorithms\namong others.",
"properties": {
"authorization_endpoint": {
"description": "OAuth 2.0 Authorization Endpoint URL",
"example": "https://playground.ory.sh/ory-hydra/public/oauth2/auth",
"type": "string"
},
"backchannel_logout_session_supported": {
"description": "OpenID Connect Back-Channel Logout Session Required\n\nBoolean value specifying whether the OP can pass a sid (session ID) Claim in the Logout Token to identify the RP\nsession with the OP. If supported, the sid Claim is also included in ID Tokens issued by the OP",
"type": "boolean"
},
"backchannel_logout_supported": {
"description": "OpenID Connect Back-Channel Logout Supported\n\nBoolean value specifying whether the OP supports back-channel logout, with true indicating support.",
"type": "boolean"
},
"claims_parameter_supported": {
"description": "OpenID Connect Claims Parameter Parameter Supported\n\nBoolean value specifying whether the OP supports use of the claims parameter, with true indicating support.",
"type": "boolean"
},
"claims_supported": {
"description": "OpenID Connect Supported Claims\n\nJSON array containing a list of the Claim Names of the Claims that the OpenID Provider MAY be able to supply\nvalues for. Note that for privacy or other reasons, this might not be an exhaustive list.",
"items": {
"type": "string"
},
"type": "array"
},
"code_challenge_methods_supported": {
"description": "OAuth 2.0 PKCE Supported Code Challenge Methods\n\nJSON array containing a list of Proof Key for Code Exchange (PKCE) [RFC7636] code challenge methods supported\nby this authorization server.",
"items": {
"type": "string"
},
"type": "array"
},
"credentials_endpoint_draft_00": {
"description": "OpenID Connect Verifiable Credentials Endpoint\n\nContains the URL of the Verifiable Credentials Endpoint.",
"type": "string"
},
"credentials_supported_draft_00": {
"description": "OpenID Connect Verifiable Credentials Supported\n\nJSON array containing a list of the Verifiable Credentials supported by this authorization server.",
"items": {
"$ref": "#/components/schemas/credentialSupportedDraft00"
},
"type": "array"
},
"end_session_endpoint": {
"description": "OpenID Connect End-Session Endpoint\n\nURL at the OP to which an RP can perform a redirect to request that the End-User be logged out at the OP.",
"type": "string"
},
"frontchannel_logout_session_supported": {
"description": "OpenID Connect Front-Channel Logout Session Required\n\nBoolean value specifying whether the OP can pass iss (issuer) and sid (session ID) query parameters to identify\nthe RP session with the OP when the frontchannel_logout_uri is used. If supported, the sid Claim is also\nincluded in ID Tokens issued by the OP.",
"type": "boolean"
},
"frontchannel_logout_supported": {
"description": "OpenID Connect Front-Channel Logout Supported\n\nBoolean value specifying whether the OP supports HTTP-based logout, with true indicating support.",
"type": "boolean"
},
"grant_types_supported": {
"description": "OAuth 2.0 Supported Grant Types\n\nJSON array containing a list of the OAuth 2.0 Grant Type values that this OP supports.",
"items": {
"type": "string"
},
"type": "array"
},
"id_token_signed_response_alg": {
"description": "OpenID Connect Default ID Token Signing Algorithms\n\nAlgorithm used to sign OpenID Connect ID Tokens.",
"items": {
"type": "string"
},
"type": "array"
},
"id_token_signing_alg_values_supported": {
"description": "OpenID Connect Supported ID Token Signing Algorithms\n\nJSON array containing a list of the JWS signing algorithms (alg values) supported by the OP for the ID Token\nto encode the Claims in a JWT.",
"items": {
"type": "string"
},
"type": "array"
},
"issuer": {
"description": "OpenID Connect Issuer URL\n\nAn URL using the https scheme with no query or fragment component that the OP asserts as its IssuerURL Identifier.\nIf IssuerURL discovery is supported , this value MUST be identical to the issuer value returned\nby WebFinger. This also MUST be identical to the iss Claim value in ID Tokens issued from this IssuerURL.",
"example": "https://playground.ory.sh/ory-hydra/public/",
"type": "string"
},
"jwks_uri": {
"description": "OpenID Connect Well-Known JSON Web Keys URL\n\nURL of the OP's JSON Web Key Set [JWK] document. This contains the signing key(s) the RP uses to validate\nsignatures from the OP. The JWK Set MAY also contain the Server's encryption key(s), which are used by RPs\nto encrypt requests to the Server. When both signing and encryption keys are made available, a use (Key Use)\nparameter value is REQUIRED for all keys in the referenced JWK Set to indicate each key's intended usage.\nAlthough some algorithms allow the same key to be used for both signatures and encryption, doing so is\nNOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used to provide X.509 representations of\nkeys provided. When used, the bare key values MUST still be present and MUST match those in the certificate.",
"example": "https://{slug}.projects.oryapis.com/.well-known/jwks.json",
"type": "string"
},
"registration_endpoint": {
"description": "OpenID Connect Dynamic Client Registration Endpoint URL",
"example": "https://playground.ory.sh/ory-hydra/admin/client",
"type": "string"
},
"request_object_signing_alg_values_supported": {
"description": "OpenID Connect Supported Request Object Signing Algorithms\n\nJSON array containing a list of the JWS signing algorithms (alg values) supported by the OP for Request Objects,\nwhich are described in Section 6.1 of OpenID Connect Core 1.0 [OpenID.Core]. These algorithms are used both when\nthe Request Object is passed by value (using the request parameter) and when it is passed by reference\n(using the request_uri parameter).",
"items": {
"type": "string"
},
"type": "array"
},
"request_parameter_supported": {
"description": "OpenID Connect Request Parameter Supported\n\nBoolean value specifying whether the OP supports use of the request parameter, with true indicating support.",
"type": "boolean"
},
"request_uri_parameter_supported": {
"description": "OpenID Connect Request URI Parameter Supported\n\nBoolean value specifying whether the OP supports use of the request_uri parameter, with true indicating support.",
"type": "boolean"
},
"require_request_uri_registration": {
"description": "OpenID Connect Requires Request URI Registration\n\nBoolean value specifying whether the OP requires any request_uri values used to be pre-registered\nusing the request_uris registration parameter.",
"type": "boolean"
},
"response_modes_supported": {
"description": "OAuth 2.0 Supported Response Modes\n\nJSON array containing a list of the OAuth 2.0 response_mode values that this OP supports.",
"items": {
"type": "string"
},
"type": "array"
},
"response_types_supported": {
"description": "OAuth 2.0 Supported Response Types\n\nJSON array containing a list of the OAuth 2.0 response_type values that this OP supports. Dynamic OpenID\nProviders MUST support the code, id_token, and the token id_token Response Type values.",
"items": {
"type": "string"
},
"type": "array"
},
"revocation_endpoint": {
"description": "OAuth 2.0 Token Revocation URL\n\nURL of the authorization server's OAuth 2.0 revocation endpoint.",
"type": "string"
},
"scopes_supported": {
"description": "OAuth 2.0 Supported Scope Values\n\nJSON array containing a list of the OAuth 2.0 [RFC6749] scope values that this server supports. The server MUST\nsupport the openid scope value. Servers MAY choose not to advertise some supported scope values even when this parameter is used",
"items": {
"type": "string"
},
"type": "array"
},
"subject_types_supported": {
"description": "OpenID Connect Supported Subject Types\n\nJSON array containing a list of the Subject Identifier types that this OP supports. Valid types include\npairwise and public.",
"items": {
"type": "string"
},
"type": "array"
},
"token_endpoint": {
"description": "OAuth 2.0 Token Endpoint URL",
"example": "https://playground.ory.sh/ory-hydra/public/oauth2/token",
"type": "string"
},
"token_endpoint_auth_methods_supported": {
"description": "OAuth 2.0 Supported Client Authentication Methods\n\nJSON array containing a list of Client Authentication methods supported by this Token Endpoint. The options are\nclient_secret_post, client_secret_basic, client_secret_jwt, and private_key_jwt, as described in Section 9 of OpenID Connect Core 1.0",
"items": {
"type": "string"
},
"type": "array"
},
"userinfo_endpoint": {
"description": "OpenID Connect Userinfo URL\n\nURL of the OP's UserInfo Endpoint.",
"type": "string"
},
"userinfo_signed_response_alg": {
"description": "OpenID Connect User Userinfo Signing Algorithm\n\nAlgorithm used to sign OpenID Connect Userinfo Responses.",
"items": {
"type": "string"
},
"type": "array"
},
"userinfo_signing_alg_values_supported": {
"description": "OpenID Connect Supported Userinfo Signing Algorithm\n\nJSON array containing a list of the JWS [JWS] signing algorithms (alg values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT].",
"items": {
"type": "string"
},
"type": "array"
}
},
"required": [
"issuer",
"authorization_endpoint",
"token_endpoint",
"jwks_uri",
"subject_types_supported",
"response_types_supported",
"id_token_signing_alg_values_supported",
"id_token_signed_response_alg",
"userinfo_signed_response_alg"
],
"title": "OpenID Connect Discovery Metadata",
"type": "object"
},
"oidcUserInfo": {
"description": "OpenID Connect Userinfo",
"properties": {
"birthdate": {
"description": "End-User's birthday, represented as an ISO 8601:2004 [ISO8601‑2004] YYYY-MM-DD format. The year MAY be 0000, indicating that it is omitted. To represent only the year, YYYY format is allowed. Note that depending on the underlying platform's date related function, providing just year can result in varying month and day, so the implementers need to take this factor into account to correctly process the dates.",
"type": "string"
},
"email": {
"description": "End-User's preferred e-mail address. Its value MUST conform to the RFC 5322 [RFC5322] addr-spec syntax. The RP MUST NOT rely upon this value being unique, as discussed in Section 5.7.",
"type": "string"
},
"email_verified": {
"description": "True if the End-User's e-mail address has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this e-mail address was controlled by the End-User at the time the verification was performed. The means by which an e-mail address is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating.",
"type": "boolean"
},
"family_name": {
"description": "Surname(s) or last name(s) of the End-User. Note that in some cultures, people can have multiple family names or no family name; all can be present, with the names being separated by space characters.",
"type": "string"
},
"gender": {
"description": "End-User's gender. Values defined by this specification are female and male. Other values MAY be used when neither of the defined values are applicable.",
"type": "string"
},
"given_name": {
"description": "Given name(s) or first name(s) of the End-User. Note that in some cultures, people can have multiple given names; all can be present, with the names being separated by space characters.",
"type": "string"
},
"locale": {
"description": "End-User's locale, represented as a BCP47 [RFC5646] language tag. This is typically an ISO 639-1 Alpha-2 [ISO639‑1] language code in lowercase and an ISO 3166-1 Alpha-2 [ISO3166‑1] country code in uppercase, separated by a dash. For example, en-US or fr-CA. As a compatibility note, some implementations have used an underscore as the separator rather than a dash, for example, en_US; Relying Parties MAY choose to accept this locale syntax as well.",
"type": "string"
},
"middle_name": {
"description": "Middle name(s) of the End-User. Note that in some cultures, people can have multiple middle names; all can be present, with the names being separated by space characters. Also note that in some cultures, middle names are not used.",
"type": "string"
},
"name": {
"description": "End-User's full name in displayable form including all name parts, possibly including titles and suffixes, ordered according to the End-User's locale and preferences.",
"type": "string"
},
"nickname": {
"description": "Casual name of the End-User that may or may not be the same as the given_name. For instance, a nickname value of Mike might be returned alongside a given_name value of Michael.",
"type": "string"
},
"phone_number": {
"description": "End-User's preferred telephone number. E.164 [E.164] is RECOMMENDED as the format of this Claim, for example, +1 (425) 555-1212 or +56 (2) 687 2400. If the phone number contains an extension, it is RECOMMENDED that the extension be represented using the RFC 3966 [RFC3966] extension syntax, for example, +1 (604) 555-1234;ext=5678.",
"type": "string"
},
"phone_number_verified": {
"description": "True if the End-User's phone number has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this phone number was controlled by the End-User at the time the verification was performed. The means by which a phone number is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating. When true, the phone_number Claim MUST be in E.164 format and any extensions MUST be represented in RFC 3966 format.",
"type": "boolean"
},
"picture": {
"description": "URL of the End-User's profile picture. This URL MUST refer to an image file (for example, a PNG, JPEG, or GIF image file), rather than to a Web page containing an image. Note that this URL SHOULD specifically reference a profile photo of the End-User suitable for displaying when describing the End-User, rather than an arbitrary photo taken by the End-User.",
"type": "string"
},
"preferred_username": {
"description": "Non-unique shorthand name by which the End-User wishes to be referred to at the RP, such as janedoe or j.doe. This value MAY be any valid JSON string including special characters such as @, /, or whitespace.",
"type": "string"
},
"profile": {
"description": "URL of the End-User's profile page. The contents of this Web page SHOULD be about the End-User.",
"type": "string"
},
"sub": {
"description": "Subject - Identifier for the End-User at the IssuerURL.",
"type": "string"
},
"updated_at": {
"description": "Time the End-User's information was last updated. Its value is a JSON number representing the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the date/time.",
"format": "int64",
"type": "integer"
},
"website": {
"description": "URL of the End-User's Web page or blog. This Web page SHOULD contain information published by the End-User or an organization that the End-User is affiliated with.",
"type": "string"
},
"zoneinfo": {
"description": "String from zoneinfo [zoneinfo] time zone database representing the End-User's time zone. For example, Europe/Paris or America/Los_Angeles.",
"type": "string"
}
},
"type": "object"
},
"pagination": {
"properties": {
"page_size": {
"default": 250,
"description": "Items per page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"format": "int64",
"maximum": 1000,
"minimum": 1,
"type": "integer"
},
"page_token": {
"default": "1",
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"minimum": 1,
"type": "string"
}
},
"type": "object"
},
"paginationHeaders": {
"properties": {
"link": {
"description": "The link header contains pagination links.\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).\n\nin: header",
"type": "string"
},
"x-total-count": {
"description": "The total number of clients.\n\nin: header",
"type": "string"
}
},
"type": "object"
},
"rejectOAuth2Request": {
"properties": {
"error": {
"description": "The error should follow the OAuth2 error format (e.g. `invalid_request`, `login_required`).\n\nDefaults to `request_denied`.",
"type": "string"
},
"error_debug": {
"description": "Debug contains information to help resolve the problem as a developer. Usually not exposed\nto the public but only in the server logs.",
"type": "string"
},
"error_description": {
"description": "Description of the error in a human readable format.",
"type": "string"
},
"error_hint": {
"description": "Hint to help resolve the error.",
"type": "string"
},
"status_code": {
"description": "Represents the HTTP status code of the error (e.g. 401 or 403)\n\nDefaults to 400",
"format": "int64",
"type": "integer"
}
},
"title": "The request payload used to accept a login or consent request.",
"type": "object"
},
"tokenPagination": {
"properties": {
"page_size": {
"default": 250,
"description": "Items per page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"format": "int64",
"maximum": 1000,
"minimum": 1,
"type": "integer"
},
"page_token": {
"default": "1",
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"minimum": 1,
"type": "string"
}
},
"type": "object"
},
"tokenPaginationHeaders": {
"properties": {
"link": {
"description": "The link header contains pagination links.\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).\n\nin: header",
"type": "string"
},
"x-total-count": {
"description": "The total number of clients.\n\nin: header",
"type": "string"
}
},
"type": "object"
},
"tokenPaginationRequestParameters": {
"description": "The `Link` HTTP header contains multiple links (`first`, `next`, `last`, `previous`) formatted as:\n`\u003chttps://{project-slug}.projects.oryapis.com/admin/clients?page_size={limit}\u0026page_token={offset}\u003e; rel=\"{page}\"`\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"properties": {
"page_size": {
"default": 250,
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"format": "int64",
"maximum": 500,
"minimum": 1,
"type": "integer"
},
"page_token": {
"default": "1",
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"minimum": 1,
"type": "string"
}
},
"title": "Pagination Request Parameters",
"type": "object"
},
"tokenPaginationResponseHeaders": {
"description": "The `Link` HTTP header contains multiple links (`first`, `next`, `last`, `previous`) formatted as:\n`\u003chttps://{project-slug}.projects.oryapis.com/admin/clients?page_size={limit}\u0026page_token={offset}\u003e; rel=\"{page}\"`\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"properties": {
"link": {
"description": "The Link HTTP Header\n\nThe `Link` header contains a comma-delimited list of links to the following pages:\n\nfirst: The first page of results.\nnext: The next page of results.\nprev: The previous page of results.\nlast: The last page of results.\n\nPages are omitted if they do not exist. For example, if there is no next page, the `next` link is omitted. Examples:\n\n\u003c/clients?page_size=5\u0026page_token=0\u003e; rel=\"first\",\u003c/clients?page_size=5\u0026page_token=15\u003e; rel=\"next\",\u003c/clients?page_size=5\u0026page_token=5\u003e; rel=\"prev\",\u003c/clients?page_size=5\u0026page_token=20\u003e; rel=\"last\"",
"type": "string"
},
"x-total-count": {
"description": "The X-Total-Count HTTP Header\n\nThe `X-Total-Count` header contains the total number of items in the collection.",
"format": "int64",
"type": "integer"
}
},
"title": "Pagination Response Header",
"type": "object"
},
"trustOAuth2JwtGrantIssuer": {
"description": "Trust OAuth2 JWT Bearer Grant Type Issuer Request Body",
"properties": {
"allow_any_subject": {
"description": "The \"allow_any_subject\" indicates that the issuer is allowed to have any principal as the subject of the JWT.",
"type": "boolean"
},
"expires_at": {
"description": "The \"expires_at\" indicates, when grant will expire, so we will reject assertion from \"issuer\" targeting \"subject\".",
"format": "date-time",
"type": "string"
},
"issuer": {
"description": "The \"issuer\" identifies the principal that issued the JWT assertion (same as \"iss\" claim in JWT).",
"example": "https://jwt-idp.example.com",
"type": "string"
},
"jwk": {
"$ref": "#/components/schemas/jsonWebKey"
},
"scope": {
"description": "The \"scope\" contains list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749])",
"example": [
"openid",
"offline"
],
"items": {
"type": "string"
},
"type": "array"
},
"subject": {
"description": "The \"subject\" identifies the principal that is the subject of the JWT.",
"example": "[email protected]",
"type": "string"
}
},
"required": [
"issuer",
"scope",
"jwk",
"expires_at"
],
"type": "object"
},
"trustedOAuth2JwtGrantIssuer": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trust Relationship",
"properties": {
"allow_any_subject": {
"description": "The \"allow_any_subject\" indicates that the issuer is allowed to have any principal as the subject of the JWT.",
"type": "boolean"
},
"created_at": {
"description": "The \"created_at\" indicates, when grant was created.",
"format": "date-time",
"type": "string"
},
"expires_at": {
"description": "The \"expires_at\" indicates, when grant will expire, so we will reject assertion from \"issuer\" targeting \"subject\".",
"format": "date-time",
"type": "string"
},
"id": {
"example": "9edc811f-4e28-453c-9b46-4de65f00217f",
"type": "string"
},
"issuer": {
"description": "The \"issuer\" identifies the principal that issued the JWT assertion (same as \"iss\" claim in JWT).",
"example": "https://jwt-idp.example.com",
"type": "string"
},
"public_key": {
"$ref": "#/components/schemas/trustedOAuth2JwtGrantJsonWebKey"
},
"scope": {
"description": "The \"scope\" contains list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749])",
"example": [
"openid",
"offline"
],
"items": {
"type": "string"
},
"type": "array"
},
"subject": {
"description": "The \"subject\" identifies the principal that is the subject of the JWT.",
"example": "[email protected]",
"type": "string"
}
},
"type": "object"
},
"trustedOAuth2JwtGrantIssuers": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trust Relationships",
"items": {
"$ref": "#/components/schemas/trustedOAuth2JwtGrantIssuer"
},
"type": "array"
},
"trustedOAuth2JwtGrantJsonWebKey": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trusted JSON Web Key",
"properties": {
"kid": {
"description": "The \"key_id\" is key unique identifier (same as kid header in jws/jwt).",
"example": "123e4567-e89b-12d3-a456-426655440000",
"type": "string"
},
"set": {
"description": "The \"set\" is basically a name for a group(set) of keys. Will be the same as \"issuer\" in grant.",
"example": "https://jwt-idp.example.com",
"type": "string"
}
},
"type": "object"
},
"unexpectedError": {
"type": "string"
},
"verifiableCredentialPrimingResponse": {
"properties": {
"c_nonce": {
"type": "string"
},
"c_nonce_expires_in": {
"format": "int64",
"type": "integer"
},
"error": {
"type": "string"
},
"error_debug": {
"type": "string"
},
"error_description": {
"type": "string"
},
"error_hint": {
"type": "string"
},
"format": {
"type": "string"
},
"status_code": {
"format": "int64",
"type": "integer"
}
},
"title": "VerifiableCredentialPrimingResponse contains the nonce to include in the proof-of-possession JWT.",
"type": "object"
},
"verifiableCredentialResponse": {
"properties": {
"credential_draft_00": {
"type": "string"
},
"format": {
"type": "string"
}
},
"title": "VerifiableCredentialResponse contains the verifiable credential.",
"type": "object"
},
"version": {
"properties": {
"version": {
"description": "Version is the service's version.",
"type": "string"
}
},
"type": "object"
}
},
"securitySchemes": {
"basic": {
"scheme": "basic",
"type": "http"
},
"bearer": {
"scheme": "bearer",
"type": "http"
},
"oauth2": {
"flows": {
"authorizationCode": {
"authorizationUrl": "https://hydra.demo.ory.sh/oauth2/auth",
"scopes": {
"offline": "A scope required when requesting refresh tokens (alias for `offline_access`)",
"offline_access": "A scope required when requesting refresh tokens",
"openid": "Request an OpenID Connect ID Token"
},
"tokenUrl": "https://hydra.demo.ory.sh/oauth2/token"
}
},
"type": "oauth2"
}
}
},
"info": {
"contact": {
"email": "[email protected]"
},
"description": "Documentation for all of Ory Hydra's APIs.\n",
"license": {
"name": "Apache 2.0"
},
"title": "Ory Hydra API",
"version": ""
},
"openapi": "3.0.3",
"paths": {
"/.well-known/jwks.json": {
"get": {
"description": "This endpoint returns JSON Web Keys required to verifying OpenID Connect ID Tokens and,\nif enabled, OAuth 2.0 JWT Access Tokens. This endpoint can be used with client libraries like\n[node-jwks-rsa](https://github.com/auth0/node-jwks-rsa) among others.",
"operationId": "discoverJsonWebKeys",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"description": "jsonWebKeySet"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Discover Well-Known JSON Web Keys",
"tags": [
"wellknown"
]
}
},
"/.well-known/openid-configuration": {
"get": {
"description": "A mechanism for an OpenID Connect Relying Party to discover the End-User's OpenID Provider and obtain information needed to interact with it, including its OAuth 2.0 endpoint locations.\n\nPopular libraries for OpenID Connect clients include oidc-client-js (JavaScript), go-oidc (Golang), and others.\nFor a full list of clients go here: https://openid.net/developers/certified/",
"operationId": "discoverOidcConfiguration",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oidcConfiguration"
}
}
},
"description": "oidcConfiguration"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "OpenID Connect Discovery",
"tags": [
"oidc"
]
}
},
"/admin/clients": {
"get": {
"description": "This endpoint lists all clients in the database, and never returns client secrets.\nAs a default it lists the first 100 clients.",
"operationId": "listOAuth2Clients",
"parameters": [
{
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"in": "query",
"name": "page_size",
"schema": {
"default": 250,
"format": "int64",
"maximum": 500,
"minimum": 1,
"type": "integer"
}
},
{
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"in": "query",
"name": "page_token",
"schema": {
"default": "1",
"minimum": 1,
"type": "string"
}
},
{
"description": "The name of the clients to filter by.",
"in": "query",
"name": "client_name",
"schema": {
"type": "string"
}
},
{
"description": "The owner of the clients to filter by.",
"in": "query",
"name": "owner",
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"$ref": "#/components/responses/listOAuth2Clients"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "List OAuth 2.0 Clients",
"tags": [
"oAuth2"
]
},
"post": {
"description": "Create a new OAuth 2.0 client. If you pass `client_secret` the secret is used, otherwise a random secret\nis generated. The secret is echoed in the response. It is not possible to retrieve it later on.",
"operationId": "createOAuth2Client",
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "OAuth 2.0 Client Request Body",
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"201": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"400": {
"$ref": "#/components/responses/errorOAuth2BadRequest"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "Create OAuth 2.0 Client",
"tags": [
"oAuth2"
]
}
},
"/admin/clients/{id}": {
"delete": {
"description": "Delete an existing OAuth 2.0 Client by its ID.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.\n\nMake sure that this endpoint is well protected and only callable by first-party components.",
"operationId": "deleteOAuth2Client",
"parameters": [
{
"description": "The id of the OAuth 2.0 Client.",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Delete OAuth 2.0 Client",
"tags": [
"oAuth2"
]
},
"get": {
"description": "Get an OAuth 2.0 client by its ID. This endpoint never returns the client secret.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"operationId": "getOAuth2Client",
"parameters": [
{
"description": "The id of the OAuth 2.0 Client.",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "Get an OAuth 2.0 Client",
"tags": [
"oAuth2"
]
},
"patch": {
"description": "Patch an existing OAuth 2.0 Client using JSON Patch. If you pass `client_secret`\nthe secret will be updated and returned via the API. This is the\nonly time you will be able to retrieve the client secret, so write it down and keep it safe.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"operationId": "patchOAuth2Client",
"parameters": [
{
"description": "The id of the OAuth 2.0 Client.",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonPatchDocument"
}
}
},
"description": "OAuth 2.0 Client JSON Patch Body",
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"404": {
"$ref": "#/components/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "Patch OAuth 2.0 Client",
"tags": [
"oAuth2"
]
},
"put": {
"description": "Replaces an existing OAuth 2.0 Client with the payload you send. If you pass `client_secret` the secret is used,\notherwise the existing secret is used.\n\nIf set, the secret is echoed in the response. It is not possible to retrieve it later on.\n\nOAuth 2.0 Clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"operationId": "setOAuth2Client",
"parameters": [
{
"description": "OAuth 2.0 Client ID",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "OAuth 2.0 Client Request Body",
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"400": {
"$ref": "#/components/responses/errorOAuth2BadRequest"
},
"404": {
"$ref": "#/components/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "Set OAuth 2.0 Client",
"tags": [
"oAuth2"
]
}
},
"/admin/clients/{id}/lifespans": {
"put": {
"description": "Set lifespans of different token types issued for this OAuth 2.0 client. Does not modify other fields.",
"operationId": "setOAuth2ClientLifespans",
"parameters": [
{
"description": "OAuth 2.0 Client ID",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2ClientTokenLifespans"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Set OAuth2 Client Token Lifespans",
"tags": [
"oAuth2"
]
}
},
"/admin/keys/{set}": {
"delete": {
"description": "Use this endpoint to delete a complete JSON Web Key Set and all the keys in that set.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"operationId": "deleteJsonWebKeySet",
"parameters": [
{
"description": "The JSON Web Key Set",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Delete JSON Web Key Set",
"tags": [
"jwk"
]
},
"get": {
"description": "This endpoint can be used to retrieve JWK Sets stored in ORY Hydra.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"operationId": "getJsonWebKeySet",
"parameters": [
{
"description": "JSON Web Key Set ID",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"description": "jsonWebKeySet"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Retrieve a JSON Web Key Set",
"tags": [
"jwk"
]
},
"post": {
"description": "This endpoint is capable of generating JSON Web Key Sets for you. There a different strategies available, such as symmetric cryptographic keys (HS256, HS512) and asymetric cryptographic keys (RS256, ECDSA). If the specified JSON Web Key Set does not exist, it will be created.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"operationId": "createJsonWebKeySet",
"parameters": [
{
"description": "The JSON Web Key Set ID",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/createJsonWebKeySet"
}
}
},
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"201": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"description": "jsonWebKeySet"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Create JSON Web Key",
"tags": [
"jwk"
]
},
"put": {
"description": "Use this method if you do not want to let Hydra generate the JWKs for you, but instead save your own.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"operationId": "setJsonWebKeySet",
"parameters": [
{
"description": "The JSON Web Key Set ID",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"description": "jsonWebKeySet"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Update a JSON Web Key Set",
"tags": [
"jwk"
]
}
},
"/admin/keys/{set}/{kid}": {
"delete": {
"description": "Use this endpoint to delete a single JSON Web Key.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A\nJWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses\nthis functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens),\nand allows storing user-defined keys as well.",
"operationId": "deleteJsonWebKey",
"parameters": [
{
"description": "The JSON Web Key Set",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
},
{
"description": "The JSON Web Key ID (kid)",
"in": "path",
"name": "kid",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Delete JSON Web Key",
"tags": [
"jwk"
]
},
"get": {
"description": "This endpoint returns a singular JSON Web Key contained in a set. It is identified by the set and the specific key ID (kid).",
"operationId": "getJsonWebKey",
"parameters": [
{
"description": "JSON Web Key Set ID",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
},
{
"description": "JSON Web Key ID",
"in": "path",
"name": "kid",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKeySet"
}
}
},
"description": "jsonWebKeySet"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Get JSON Web Key",
"tags": [
"jwk"
]
},
"put": {
"description": "Use this method if you do not want to let Hydra generate the JWKs for you, but instead save your own.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"operationId": "setJsonWebKey",
"parameters": [
{
"description": "The JSON Web Key Set ID",
"in": "path",
"name": "set",
"required": true,
"schema": {
"type": "string"
}
},
{
"description": "JSON Web Key ID",
"in": "path",
"name": "kid",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKey"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/jsonWebKey"
}
}
},
"description": "jsonWebKey"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Set JSON Web Key",
"tags": [
"jwk"
]
}
},
"/admin/oauth2/auth/requests/consent": {
"get": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"operationId": "getOAuth2ConsentRequest",
"parameters": [
{
"description": "OAuth 2.0 Consent Request Challenge",
"in": "query",
"name": "consent_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2ConsentRequest"
}
}
},
"description": "oAuth2ConsentRequest"
},
"410": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Get OAuth 2.0 Consent Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/consent/accept": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThis endpoint tells Ory that the subject has authorized the OAuth 2.0 client to access resources on his/her behalf.\nThe consent provider includes additional information, such as session data for access and ID tokens, and if the\nconsent request should be used as basis for future requests.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"operationId": "acceptOAuth2ConsentRequest",
"parameters": [
{
"description": "OAuth 2.0 Consent Request Challenge",
"in": "query",
"name": "consent_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/acceptOAuth2ConsentRequest"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Accept OAuth 2.0 Consent Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/consent/reject": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThis endpoint tells Ory that the subject has not authorized the OAuth 2.0 client to access resources on his/her behalf.\nThe consent provider must include a reason why the consent was not granted.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"operationId": "rejectOAuth2ConsentRequest",
"parameters": [
{
"description": "OAuth 2.0 Consent Request Challenge",
"in": "query",
"name": "consent_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/rejectOAuth2Request"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Reject OAuth 2.0 Consent Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/login": {
"get": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nPer default, the login provider is Ory itself. You may use a different login provider which needs to be a web-app\nyou write and host, and it must be able to authenticate (\"show the subject a login screen\")\na subject (in OAuth2 the proper name for subject is \"resource owner\").\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.",
"operationId": "getOAuth2LoginRequest",
"parameters": [
{
"description": "OAuth 2.0 Login Request Challenge",
"in": "query",
"name": "login_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2LoginRequest"
}
}
},
"description": "oAuth2LoginRequest"
},
"410": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Get OAuth 2.0 Login Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/login/accept": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.\n\nThis endpoint tells Ory that the subject has successfully authenticated and includes additional information such as\nthe subject's ID and if Ory should remember the subject's subject agent for future authentication attempts by setting\na cookie.\n\nThe response contains a redirect URL which the login provider should redirect the user-agent to.",
"operationId": "acceptOAuth2LoginRequest",
"parameters": [
{
"description": "OAuth 2.0 Login Request Challenge",
"in": "query",
"name": "login_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/acceptOAuth2LoginRequest"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Accept OAuth 2.0 Login Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/login/reject": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.\n\nThis endpoint tells Ory that the subject has not authenticated and includes a reason why the authentication\nwas denied.\n\nThe response contains a redirect URL which the login provider should redirect the user-agent to.",
"operationId": "rejectOAuth2LoginRequest",
"parameters": [
{
"description": "OAuth 2.0 Login Request Challenge",
"in": "query",
"name": "login_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/rejectOAuth2Request"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Reject OAuth 2.0 Login Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/logout": {
"get": {
"description": "Use this endpoint to fetch an Ory OAuth 2.0 logout request.",
"operationId": "getOAuth2LogoutRequest",
"parameters": [
{
"in": "query",
"name": "logout_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2LogoutRequest"
}
}
},
"description": "oAuth2LogoutRequest"
},
"410": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Get OAuth 2.0 Session Logout Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/logout/accept": {
"put": {
"description": "When a user or an application requests Ory OAuth 2.0 to remove the session state of a subject, this endpoint is used to confirm that logout request.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.",
"operationId": "acceptOAuth2LogoutRequest",
"parameters": [
{
"description": "OAuth 2.0 Logout Request Challenge",
"in": "query",
"name": "logout_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2RedirectTo"
}
}
},
"description": "oAuth2RedirectTo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Accept OAuth 2.0 Session Logout Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/requests/logout/reject": {
"put": {
"description": "When a user or an application requests Ory OAuth 2.0 to remove the session state of a subject, this endpoint is used to deny that logout request.\nNo HTTP request body is required.\n\nThe response is empty as the logout provider has to chose what action to perform next.",
"operationId": "rejectOAuth2LogoutRequest",
"parameters": [
{
"in": "query",
"name": "logout_challenge",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Reject OAuth 2.0 Session Logout Request",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/sessions/consent": {
"delete": {
"description": "This endpoint revokes a subject's granted consent sessions and invalidates all\nassociated OAuth 2.0 Access Tokens. You may also only revoke sessions for a specific OAuth 2.0 Client ID.",
"operationId": "revokeOAuth2ConsentSessions",
"parameters": [
{
"description": "OAuth 2.0 Consent Subject\n\nThe subject whose consent sessions should be deleted.",
"in": "query",
"name": "subject",
"required": true,
"schema": {
"type": "string"
}
},
{
"description": "OAuth 2.0 Client ID\n\nIf set, deletes only those consent sessions that have been granted to the specified OAuth 2.0 Client ID.",
"in": "query",
"name": "client",
"schema": {
"type": "string"
}
},
{
"description": "Revoke All Consent Sessions\n\nIf set to `true` deletes all consent sessions by the Subject that have been granted.",
"in": "query",
"name": "all",
"schema": {
"type": "boolean"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Revoke OAuth 2.0 Consent Sessions of a Subject",
"tags": [
"oAuth2"
]
},
"get": {
"description": "This endpoint lists all subject's granted consent sessions, including client and granted scope.\nIf the subject is unknown or has not granted any consent sessions yet, the endpoint returns an\nempty JSON array with status code 200 OK.",
"operationId": "listOAuth2ConsentSessions",
"parameters": [
{
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"in": "query",
"name": "page_size",
"schema": {
"default": 250,
"format": "int64",
"maximum": 500,
"minimum": 1,
"type": "integer"
}
},
{
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"in": "query",
"name": "page_token",
"schema": {
"default": "1",
"minimum": 1,
"type": "string"
}
},
{
"description": "The subject to list the consent sessions for.",
"in": "query",
"name": "subject",
"required": true,
"schema": {
"type": "string"
}
},
{
"description": "The login session id to list the consent sessions for.",
"in": "query",
"name": "login_session_id",
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2ConsentSessions"
}
}
},
"description": "oAuth2ConsentSessions"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "List OAuth 2.0 Consent Sessions of a Subject",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/auth/sessions/login": {
"delete": {
"description": "This endpoint invalidates authentication sessions. After revoking the authentication session(s), the subject\nhas to re-authenticate at the Ory OAuth2 Provider. This endpoint does not invalidate any tokens.\n\nIf you send the subject in a query param, all authentication sessions that belong to that subject are revoked.\nNo OpennID Connect Front- or Back-channel logout is performed in this case.\n\nAlternatively, you can send a SessionID via `sid` query param, in which case, only the session that is connected\nto that SessionID is revoked. OpenID Connect Back-channel logout is performed in this case.",
"operationId": "revokeOAuth2LoginSessions",
"parameters": [
{
"description": "OAuth 2.0 Subject\n\nThe subject to revoke authentication sessions for.",
"in": "query",
"name": "subject",
"schema": {
"type": "string"
}
},
{
"description": "OAuth 2.0 Subject\n\nThe subject to revoke authentication sessions for.",
"in": "query",
"name": "sid",
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Revokes OAuth 2.0 Login Sessions by either a Subject or a SessionID",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/introspect": {
"post": {
"description": "The introspection endpoint allows to check if a token (both refresh and access) is active or not. An active token\nis neither expired nor revoked. If a token is active, additional information on the token will be included. You can\nset additional data for a token by setting `session.access_token` during the consent flow.",
"operationId": "introspectOAuth2Token",
"requestBody": {
"content": {
"application/x-www-form-urlencoded": {
"schema": {
"properties": {
"scope": {
"description": "An optional, space separated list of required scopes. If the access token was not granted one of the\nscopes, the result of active will be false.",
"type": "string",
"x-formData-name": "scope"
},
"token": {
"description": "The string value of the token. For access tokens, this\nis the \"access_token\" value returned from the token endpoint\ndefined in OAuth 2.0. For refresh tokens, this is the \"refresh_token\"\nvalue returned.",
"required": [
"token"
],
"type": "string",
"x-formData-name": "token"
}
},
"required": [
"token"
],
"type": "object"
}
}
}
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/introspectedOAuth2Token"
}
}
},
"description": "introspectedOAuth2Token"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Introspect OAuth2 Access and Refresh Tokens",
"tags": [
"oAuth2"
]
}
},
"/admin/oauth2/tokens": {
"delete": {
"description": "This endpoint deletes OAuth2 access tokens issued to an OAuth 2.0 Client from the database.",
"operationId": "deleteOAuth2Token",
"parameters": [
{
"description": "OAuth 2.0 Client ID",
"in": "query",
"name": "client_id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Delete OAuth 2.0 Access Tokens from specific OAuth 2.0 Client",
"tags": [
"oAuth2"
]
}
},
"/admin/trust/grants/jwt-bearer/issuers": {
"get": {
"description": "Use this endpoint to list all trusted JWT Bearer Grant Type Issuers.",
"operationId": "listTrustedOAuth2JwtGrantIssuers",
"parameters": [
{
"in": "query",
"name": "MaxItems",
"schema": {
"format": "int64",
"type": "integer"
}
},
{
"in": "query",
"name": "DefaultItems",
"schema": {
"format": "int64",
"type": "integer"
}
},
{
"description": "If optional \"issuer\" is supplied, only jwt-bearer grants with this issuer will be returned.",
"in": "query",
"name": "issuer",
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/trustedOAuth2JwtGrantIssuers"
}
}
},
"description": "trustedOAuth2JwtGrantIssuers"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "List Trusted OAuth2 JWT Bearer Grant Type Issuers",
"tags": [
"oAuth2"
]
},
"post": {
"description": "Use this endpoint to establish a trust relationship for a JWT issuer\nto perform JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication\nand Authorization Grants [RFC7523](https://datatracker.ietf.org/doc/html/rfc7523).",
"operationId": "trustOAuth2JwtGrantIssuer",
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/trustOAuth2JwtGrantIssuer"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"201": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/trustedOAuth2JwtGrantIssuer"
}
}
},
"description": "trustedOAuth2JwtGrantIssuer"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Trust OAuth2 JWT Bearer Grant Type Issuer",
"tags": [
"oAuth2"
]
}
},
"/admin/trust/grants/jwt-bearer/issuers/{id}": {
"delete": {
"description": "Use this endpoint to delete trusted JWT Bearer Grant Type Issuer. The ID is the one returned when you\ncreated the trust relationship.\n\nOnce deleted, the associated issuer will no longer be able to perform the JSON Web Token (JWT) Profile\nfor OAuth 2.0 Client Authentication and Authorization Grant.",
"operationId": "deleteTrustedOAuth2JwtGrantIssuer",
"parameters": [
{
"description": "The id of the desired grant",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Delete Trusted OAuth2 JWT Bearer Grant Type Issuer",
"tags": [
"oAuth2"
]
},
"get": {
"description": "Use this endpoint to get a trusted JWT Bearer Grant Type Issuer. The ID is the one returned when you\ncreated the trust relationship.",
"operationId": "getTrustedOAuth2JwtGrantIssuer",
"parameters": [
{
"description": "The id of the desired grant",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/trustedOAuth2JwtGrantIssuer"
}
}
},
"description": "trustedOAuth2JwtGrantIssuer"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Get Trusted OAuth2 JWT Bearer Grant Type Issuer",
"tags": [
"oAuth2"
]
}
},
"/credentials": {
"post": {
"description": "This endpoint creates a verifiable credential that attests that the user\nauthenticated with the provided access token owns a certain public/private key\npair.\n\nMore information can be found at\nhttps://openid.net/specs/openid-connect-userinfo-vc-1_0.html.",
"operationId": "createVerifiableCredential",
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/CreateVerifiableCredentialRequestBody"
}
}
},
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/verifiableCredentialResponse"
}
}
},
"description": "verifiableCredentialResponse"
},
"400": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/verifiableCredentialPrimingResponse"
}
}
},
"description": "verifiableCredentialPrimingResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "Issues a Verifiable Credential",
"tags": [
"oidc"
]
}
},
"/health/alive": {
"get": {
"description": "This endpoint returns a HTTP 200 status code when Ory Hydra is accepting incoming\nHTTP requests. This status does currently not include checks whether the database connection is working.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.\n\nBe aware that if you are running multiple nodes of this service, the health status will never\nrefer to the cluster state, only to a single instance.",
"operationId": "isAlive",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/healthStatus"
}
}
},
"description": "Ory Hydra is ready to accept connections."
},
"500": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"summary": "Check HTTP Server Status",
"tags": [
"metadata"
]
}
},
"/health/ready": {
"get": {
"description": "This endpoint returns a HTTP 200 status code when Ory Hydra is up running and the environment dependencies (e.g.\nthe database) are responsive as well.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.\n\nBe aware that if you are running multiple nodes of Ory Hydra, the health status will never\nrefer to the cluster state, only to a single instance.",
"operationId": "isReady",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"properties": {
"status": {
"description": "Always \"ok\".",
"type": "string"
}
},
"type": "object"
}
}
},
"description": "Ory Hydra is ready to accept requests."
},
"503": {
"content": {
"application/json": {
"schema": {
"properties": {
"errors": {
"additionalProperties": {
"type": "string"
},
"description": "Errors contains a list of errors that caused the not ready status.",
"type": "object"
}
},
"type": "object"
}
}
},
"description": "Ory Kratos is not yet ready to accept requests."
}
},
"summary": "Check HTTP Server and Database Status",
"tags": [
"metadata"
]
}
},
"/oauth2/auth": {
"get": {
"description": "Use open source libraries to perform OAuth 2.0 and OpenID Connect\navailable for any programming language. You can find a list of libraries at https://oauth.net/code/\n\nThe Ory SDK is not yet able to this endpoint properly.",
"operationId": "oAuth2Authorize",
"responses": {
"302": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"summary": "OAuth 2.0 Authorize Endpoint",
"tags": [
"oAuth2"
]
}
},
"/oauth2/register": {
"post": {
"description": "This endpoint behaves like the administrative counterpart (`createOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol. This feature needs to be enabled in the configuration. This endpoint\nis disabled by default. It can be enabled by an administrator.\n\nPlease note that using this endpoint you are not able to choose the `client_secret` nor the `client_id` as those\nvalues will be server generated when specifying `token_endpoint_auth_method` as `client_secret_basic` or\n`client_secret_post`.\n\nThe `client_secret` will be returned in the response and you will not be able to retrieve it later on.\nWrite the secret down and keep it somewhere safe.",
"operationId": "createOidcDynamicClient",
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "Dynamic Client Registration Request Body",
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"201": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"400": {
"$ref": "#/components/responses/errorOAuth2BadRequest"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"summary": "Register OAuth2 Client using OpenID Dynamic Client Registration",
"tags": [
"oidc"
]
}
},
"/oauth2/register/{id}": {
"delete": {
"description": "This endpoint behaves like the administrative counterpart (`deleteOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol. This feature needs to be enabled in the configuration. This endpoint\nis disabled by default. It can be enabled by an administrator.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"operationId": "deleteOidcDynamicClient",
"parameters": [
{
"description": "The id of the OAuth 2.0 Client.",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"204": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/genericError"
}
}
},
"description": "genericError"
}
},
"security": [
{
"bearer": []
}
],
"summary": "Delete OAuth 2.0 Client using the OpenID Dynamic Client Registration Management Protocol",
"tags": [
"oidc"
]
},
"get": {
"description": "This endpoint behaves like the administrative counterpart (`getOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.",
"operationId": "getOidcDynamicClient",
"parameters": [
{
"description": "The id of the OAuth 2.0 Client.",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"security": [
{
"bearer": []
}
],
"summary": "Get OAuth2 Client using OpenID Dynamic Client Registration",
"tags": [
"oidc"
]
},
"put": {
"description": "This endpoint behaves like the administrative counterpart (`setOAuth2Client`) but is capable of facing the\npublic internet directly to be used by third parties. It implements the OpenID Connect\nDynamic Client Registration Protocol.\n\nThis feature is disabled per default. It can be enabled by a system administrator.\n\nIf you pass `client_secret` the secret is used, otherwise the existing secret is used. If set, the secret is echoed in the response.\nIt is not possible to retrieve it later on.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"operationId": "setOidcDynamicClient",
"parameters": [
{
"description": "OAuth 2.0 Client ID",
"in": "path",
"name": "id",
"required": true,
"schema": {
"type": "string"
}
}
],
"requestBody": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "OAuth 2.0 Client Request Body",
"required": true,
"x-originalParamName": "Body"
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2Client"
}
}
},
"description": "oAuth2Client"
},
"404": {
"$ref": "#/components/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/components/responses/errorOAuth2Default"
}
},
"security": [
{
"bearer": []
}
],
"summary": "Set OAuth2 Client using OpenID Dynamic Client Registration",
"tags": [
"oidc"
]
}
},
"/oauth2/revoke": {
"post": {
"description": "Revoking a token (both access and refresh) means that the tokens will be invalid. A revoked access token can no\nlonger be used to make access requests, and a revoked refresh token can no longer be used to refresh an access token.\nRevoking a refresh token also invalidates the access token that was created with it. A token may only be revoked by\nthe client the token was generated for.",
"operationId": "revokeOAuth2Token",
"requestBody": {
"content": {
"application/x-www-form-urlencoded": {
"schema": {
"properties": {
"client_id": {
"type": "string",
"x-formData-name": "client_id"
},
"client_secret": {
"type": "string",
"x-formData-name": "client_secret"
},
"token": {
"required": [
"token"
],
"type": "string",
"x-formData-name": "token"
}
},
"required": [
"token"
],
"type": "object"
}
}
}
},
"responses": {
"200": {
"$ref": "#/components/responses/emptyResponse"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"security": [
{
"basic": []
},
{
"oauth2": []
}
],
"summary": "Revoke OAuth 2.0 Access or Refresh Token",
"tags": [
"oAuth2"
]
}
},
"/oauth2/sessions/logout": {
"get": {
"description": "This endpoint initiates and completes user logout at the Ory OAuth2 \u0026 OpenID provider and initiates OpenID Connect Front- / Back-channel logout:\n\nhttps://openid.net/specs/openid-connect-frontchannel-1_0.html\nhttps://openid.net/specs/openid-connect-backchannel-1_0.html\n\nBack-channel logout is performed asynchronously and does not affect logout flow.",
"operationId": "revokeOidcSession",
"responses": {
"302": {
"$ref": "#/components/responses/emptyResponse"
}
},
"summary": "OpenID Connect Front- and Back-channel Enabled Logout",
"tags": [
"oidc"
]
}
},
"/oauth2/token": {
"post": {
"description": "Use open source libraries to perform OAuth 2.0 and OpenID Connect\navailable for any programming language. You can find a list of libraries here https://oauth.net/code/\n\nThe Ory SDK is not yet able to this endpoint properly.",
"operationId": "oauth2TokenExchange",
"requestBody": {
"content": {
"application/x-www-form-urlencoded": {
"schema": {
"properties": {
"client_id": {
"type": "string",
"x-formData-name": "client_id"
},
"code": {
"type": "string",
"x-formData-name": "code"
},
"grant_type": {
"required": [
"grant_type"
],
"type": "string",
"x-formData-name": "grant_type"
},
"redirect_uri": {
"type": "string",
"x-formData-name": "redirect_uri"
},
"refresh_token": {
"type": "string",
"x-formData-name": "refresh_token"
}
},
"required": [
"grant_type"
],
"type": "object"
}
}
}
},
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oAuth2TokenExchange"
}
}
},
"description": "oAuth2TokenExchange"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"security": [
{
"basic": []
},
{
"oauth2": []
}
],
"summary": "The OAuth 2.0 Token Endpoint",
"tags": [
"oAuth2"
]
}
},
"/userinfo": {
"get": {
"description": "This endpoint returns the payload of the ID Token, including `session.id_token` values, of\nthe provided OAuth 2.0 Access Token's consent request.\n\nIn the case of authentication error, a WWW-Authenticate header might be set in the response\nwith more information about the error. See [the spec](https://datatracker.ietf.org/doc/html/rfc6750#section-3)\nfor more details about header format.",
"operationId": "getOidcUserInfo",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/oidcUserInfo"
}
}
},
"description": "oidcUserInfo"
},
"default": {
"content": {
"application/json": {
"schema": {
"$ref": "#/components/schemas/errorOAuth2"
}
}
},
"description": "errorOAuth2"
}
},
"security": [
{
"oauth2": []
}
],
"summary": "OpenID Connect Userinfo",
"tags": [
"oidc"
]
}
},
"/version": {
"get": {
"description": "This endpoint returns the version of Ory Hydra.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.\n\nBe aware that if you are running multiple nodes of this service, the version will never\nrefer to the cluster state, only to a single instance.",
"operationId": "getVersion",
"responses": {
"200": {
"content": {
"application/json": {
"schema": {
"properties": {
"version": {
"description": "The version of Ory Hydra.",
"type": "string"
}
},
"type": "object"
}
}
},
"description": "Returns the Ory Hydra version."
}
},
"summary": "Return Running Software Version.",
"tags": [
"metadata"
]
}
}
},
"tags": [
{
"description": "OAuth 2.0",
"name": "oAuth2"
},
{
"description": "OpenID Connect",
"name": "oidc"
},
{
"description": "JSON Web Keys",
"name": "jwk"
},
{
"description": "Well-Known Endpoints",
"name": "wellknown"
},
{
"description": "Service Metadata",
"name": "metadata"
}
],
"x-forwarded-proto": "string",
"x-request-id": "string"
} |
Go | hydra/spec/config.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package spec
import (
"bytes"
_ "embed"
"io"
"github.com/gofrs/uuid"
"github.com/pkg/errors"
"github.com/tidwall/gjson"
"github.com/ory/x/logrusx"
"github.com/ory/x/otelx"
)
//go:embed config.json
var ConfigValidationSchema []byte
var ConfigSchemaID string
func init() {
ConfigSchemaID = gjson.GetBytes(ConfigValidationSchema, "$id").String()
if ConfigSchemaID == "" {
ConfigSchemaID = uuid.Must(uuid.NewV4()).String() + ".json"
}
}
// AddConfigSchema should be used instead of the schema itself to auto-register the dependencies schemas.
func AddConfigSchema(compiler interface {
AddResource(url string, r io.Reader) error
}) error {
if err := otelx.AddConfigSchema(compiler); err != nil {
return err
}
if err := logrusx.AddConfigSchema(compiler); err != nil {
return err
}
return errors.WithStack(compiler.AddResource(ConfigSchemaID, bytes.NewReader(ConfigValidationSchema)))
} |
JSON | hydra/spec/config.json | {
"$id": "https://github.com/ory/hydra/spec/config.json",
"$schema": "http://json-schema.org/draft-07/schema#",
"title": "Ory Hydra Configuration",
"type": "object",
"definitions": {
"http_method": {
"type": "string",
"enum": [
"POST",
"GET",
"PUT",
"PATCH",
"DELETE",
"CONNECT",
"HEAD",
"OPTIONS",
"TRACE"
]
},
"portNumber": {
"description": "The port to listen on.",
"minimum": 1,
"maximum": 65535
},
"socket": {
"type": "object",
"additionalProperties": false,
"description": "Sets the permissions of the unix socket",
"properties": {
"owner": {
"type": "string",
"description": "Owner of unix socket. If empty, the owner will be the user running hydra.",
"default": ""
},
"group": {
"type": "string",
"description": "Group of unix socket. If empty, the group will be the primary group of the user running hydra.",
"default": ""
},
"mode": {
"type": "integer",
"description": "Mode of unix socket in numeric form",
"default": 493,
"minimum": 0,
"maximum": 511
}
}
},
"cors": {
"type": "object",
"additionalProperties": false,
"description": "Configures Cross Origin Resource Sharing for public endpoints.",
"properties": {
"enabled": {
"type": "boolean",
"description": "Sets whether CORS is enabled.",
"default": false
},
"allowed_origins": {
"type": "array",
"description": "A list of origins a cross-domain request can be executed from. If the special * value is present in the list, all origins will be allowed. An origin may contain a wildcard (*) to replace 0 or more characters (i.e.: http://*.domain.com). Only one wildcard can be used per origin.",
"items": {
"type": "string",
"minLength": 1,
"not": {
"type": "string",
"description": "does match all strings that contain two or more (*)",
"pattern": ".*\\*.*\\*.*"
},
"anyOf": [
{
"format": "uri"
},
{
"const": "*"
}
]
},
"uniqueItems": true,
"default": [],
"examples": [
[
"*",
"https://example.com",
"https://*.example.com",
"https://*.foo.example.com"
]
]
},
"allowed_methods": {
"type": "array",
"description": "A list of HTTP methods the user agent is allowed to use with cross-domain requests.",
"default": [
"POST",
"GET",
"PUT",
"PATCH",
"DELETE",
"CONNECT",
"HEAD",
"OPTIONS",
"TRACE"
],
"items": {
"type": "string",
"enum": [
"POST",
"GET",
"PUT",
"PATCH",
"DELETE",
"CONNECT",
"HEAD",
"OPTIONS",
"TRACE"
]
}
},
"allowed_headers": {
"type": "array",
"description": "A list of non simple headers the client is allowed to use with cross-domain requests.",
"default": [
"Accept",
"Content-Type",
"Content-Length",
"Accept-Language",
"Content-Language",
"Authorization"
],
"items": {
"type": "string"
}
},
"exposed_headers": {
"type": "array",
"description": "Sets which headers are safe to expose to the API of a CORS API specification.",
"default": [
"Cache-Control",
"Expires",
"Last-Modified",
"Pragma",
"Content-Length",
"Content-Language",
"Content-Type"
],
"items": {
"type": "string"
}
},
"allow_credentials": {
"type": "boolean",
"description": "Sets whether the request can include user credentials like cookies, HTTP authentication or client side SSL certificates.",
"default": true
},
"max_age": {
"type": "integer",
"description": "Sets how long (in seconds) the results of a preflight request can be cached. If set to 0, every request is preceded by a preflight request.",
"default": 0,
"minimum": 0
},
"debug": {
"type": "boolean",
"description": "Adds additional log output to debug server side CORS issues.",
"default": false
}
}
},
"cidr": {
"description": "CIDR address range.",
"type": "string",
"oneOf": [
{
"pattern": "^(([0-9a-fA-F]{1,4}:){7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8])$"
},
{
"pattern": "^([0-9]{1,3}\\.){3}[0-9]{1,3}/([0-9]|[1-2][0-9]|3[0-2])$"
}
],
"examples": ["127.0.0.1/32"]
},
"pem_file": {
"type": "object",
"oneOf": [
{
"properties": {
"path": {
"type": "string",
"description": "The path to the pem file.",
"examples": ["/path/to/file.pem"]
}
},
"additionalProperties": false,
"required": ["path"]
},
{
"properties": {
"base64": {
"type": "string",
"description": "The base64 encoded string (without padding).",
"contentEncoding": "base64",
"contentMediaType": "application/x-pem-file",
"examples": ["b3J5IGh5ZHJhIGlzIGF3ZXNvbWUK"]
}
},
"additionalProperties": false,
"required": ["base64"]
}
]
},
"duration": {
"type": "string",
"pattern": "^(\\d+(ns|us|ms|s|m|h))+$",
"examples": [
"1h",
"1h5m1s"
]
},
"tls_config": {
"type": "object",
"description": "Configures HTTPS (HTTP over TLS). If configured, the server automatically supports HTTP/2.",
"properties": {
"enabled": {
"type": "boolean",
"description": "Setting enabled to false drops the TLS requirement for the admin endpoint, even if TLS is enabled on the public endpoint."
},
"key": {
"description": "Configures the private key (pem encoded).",
"allOf": [
{
"$ref": "#/definitions/pem_file"
}
]
},
"cert": {
"description": "Configures the public certificate (pem encoded).",
"allOf": [
{
"$ref": "#/definitions/pem_file"
}
]
},
"allow_termination_from": {
"type": "array",
"description": "Whitelist one or multiple CIDR address ranges and allow them to terminate TLS connections. Be aware that the X-Forwarded-Proto header must be set and must never be modifiable by anyone but your proxy / gateway / load balancer. Supports ipv4 and ipv6. Hydra serves http instead of https when this option is set.",
"items": {
"$ref": "#/definitions/cidr"
}
}
}
}
},
"properties": {
"db": {
"type": "object",
"additionalProperties": false,
"description": "Configures the database connection",
"properties": {
"ignore_unknown_table_columns": {
"type": "boolean",
"description": "Ignore scan errors when columns in the SQL result have no fields in the destination struct",
"default": false
}
}
},
"log": {
"type": "object",
"additionalProperties": false,
"description": "Configures the logger",
"properties": {
"level": {
"type": "string",
"description": "Sets the log level.",
"enum": ["panic", "fatal", "error", "warn", "info", "debug", "trace"],
"default": "info"
},
"leak_sensitive_values": {
"type": "boolean",
"description": "Logs sensitive values such as cookie and URL parameter.",
"default": false
},
"redaction_text": {
"type": "string",
"title": "Sensitive log value redaction text",
"description": "Text to use, when redacting sensitive log value."
},
"format": {
"type": "string",
"description": "Sets the log format.",
"enum": ["json", "json_pretty", "text"],
"default": "text"
}
}
},
"serve": {
"type": "object",
"additionalProperties": false,
"description": "Controls the configuration for the http(s) daemon(s).",
"properties": {
"public": {
"type": "object",
"additionalProperties": false,
"description": "Controls the public daemon serving public API endpoints like /oauth2/auth, /oauth2/token, /.well-known/jwks.json",
"properties": {
"port": {
"default": 4444,
"type": "integer",
"allOf": [
{
"$ref": "#/definitions/portNumber"
}
]
},
"host": {
"type": "string",
"description": "The interface or unix socket Ory Hydra should listen and handle public API requests on. Use the prefix `unix:` to specify a path to a unix socket. Leave empty to listen on all interfaces.",
"default": "",
"examples": ["localhost"]
},
"cors": {
"$ref": "#/definitions/cors"
},
"socket": {
"$ref": "#/definitions/socket"
},
"request_log": {
"type": "object",
"additionalProperties": false,
"description": "Access Log configuration for public server.",
"properties": {
"disable_for_health": {
"type": "boolean",
"description": "Disable access log for health endpoints.",
"default": false
}
}
},
"tls": {
"$ref": "#/definitions/tls_config"
}
}
},
"admin": {
"type": "object",
"additionalProperties": false,
"properties": {
"port": {
"default": 4445,
"type": "integer",
"allOf": [
{
"$ref": "#/definitions/portNumber"
}
]
},
"host": {
"type": "string",
"description": "The interface or unix socket Ory Hydra should listen and handle administrative API requests on. Use the prefix `unix:` to specify a path to a unix socket. Leave empty to listen on all interfaces.",
"default": "",
"examples": ["localhost"]
},
"cors": {
"$ref": "#/definitions/cors"
},
"socket": {
"$ref": "#/definitions/socket"
},
"request_log": {
"type": "object",
"additionalProperties": false,
"description": "Access Log configuration for admin server.",
"properties": {
"disable_for_health": {
"type": "boolean",
"description": "Disable access log for health endpoints.",
"default": false
}
}
},
"tls": {
"allOf": [
{
"$ref": "#/definitions/tls_config"
}
]
}
}
},
"tls": {
"$ref": "#/definitions/tls_config"
},
"cookies": {
"type": "object",
"additionalProperties": false,
"properties": {
"same_site_mode": {
"type": "string",
"description": "Specify the SameSite mode that cookies should be sent with.",
"enum": ["Strict", "Lax", "None"],
"default": "None"
},
"same_site_legacy_workaround": {
"type": "boolean",
"description": "Some older browser versions don’t work with SameSite=None. This option enables the workaround defined in https://web.dev/samesite-cookie-recipes/ which essentially stores a second cookie without SameSite as a fallback.",
"default": false,
"examples": [
true
]
},
"domain": {
"title": "HTTP Cookie Domain",
"description": "Sets the cookie domain for session and CSRF cookies. Useful when dealing with subdomains. Use with care!",
"type": "string"
},
"secure": {
"title": "HTTP Cookie Secure Flag in Development Mode",
"description": "Sets the HTTP Cookie secure flag in development mode. HTTP Cookies always have the secure flag in production mode.",
"type": "boolean",
"default": false
},
"names": {
"title": "Cookie Names",
"description": "Sets the session cookie name. Use with care!",
"type": "object",
"properties": {
"login_csrf": {
"type": "string",
"title": "CSRF Cookie Name",
"default": "ory_hydra_login_csrf"
},
"consent_csrf": {
"type": "string",
"title": "CSRF Cookie Name",
"default": "ory_hydra_consent_csrf"
},
"session": {
"type": "string",
"title": "Session Cookie Name",
"default": "ory_hydra_session"
}
}
},
"paths": {
"title": "Cookie Paths",
"description": "Sets the path for which session cookie is scoped. Use with care!",
"type": "object",
"properties": {
"session": {
"type": "string",
"title": "Session Cookie Path",
"default": "/"
}
}
}
}
}
}
},
"dsn": {
"type": "string",
"description": "Sets the data source name. This configures the backend where Ory Hydra persists data. If dsn is `memory`, data will be written to memory and is lost when you restart this instance. Ory Hydra supports popular SQL databases. For more detailed configuration information go to: https://www.ory.sh/docs/hydra/dependencies-environment#sql"
},
"clients": {
"title": "Global outgoing network settings",
"description": "Configure how outgoing network calls behave.",
"type": "object",
"additionalProperties": false,
"properties": {
"http": {
"title": "Global HTTP client configuration",
"description": "Configure how outgoing HTTP calls behave.",
"type": "object",
"additionalProperties": false,
"properties": {
"disallow_private_ip_ranges": {
"title": "Disallow private IP ranges",
"description": "Disallow all outgoing HTTP calls to private IP ranges. This feature can help protect against SSRF attacks.",
"type": "boolean",
"default": false
},
"private_ip_exception_urls": {
"title": "Add exempt URLs to private IP ranges",
"description": "Allows the given URLs to be called despite them being in the private IP range. URLs need to have an exact and case-sensitive match to be excempt.",
"type": "array",
"items": {
"type": "string",
"format": "uri-reference"
},
"default": []
}
}
}
}
},
"hsm": {
"type": "object",
"additionalProperties": false,
"description": "Configures Hardware Security Module.",
"properties": {
"enabled": {
"type": "boolean"
},
"library": {
"type": "string",
"description": "Full path (including file extension) of the HSM vendor PKCS#11 library"
},
"pin": {
"type": "string",
"description": "PIN code for token operations"
},
"slot": {
"type": "integer",
"description": "Slot ID of the token to use (if label is not specified)"
},
"token_label": {
"type": "string",
"description": "Label of the token to use (if slot is not specified). If both slot and label are set, token label takes preference over slot. In this case first slot, that contains this label is used."
},
"key_set_prefix": {
"type": "string",
"description": "Key set prefix can be used in case of multiple Ory Hydra instances need to store keys on the same HSM partition. For example if `hsm.key_set_prefix=app1.` then key set `hydra.openid.id-token` would be generated/requested/deleted on HSM with `CKA_LABEL=app1.hydra.openid.id-token`.",
"default": ""
}
}
},
"webfinger": {
"type": "object",
"additionalProperties": false,
"description": "Configures ./well-known/ settings.",
"properties": {
"jwks": {
"type": "object",
"additionalProperties": false,
"description": "Configures the /.well-known/jwks.json endpoint.",
"properties": {
"broadcast_keys": {
"type": "array",
"description": "A list of JSON Web Keys that should be exposed at that endpoint. This is usually the public key for verifying OpenID Connect ID Tokens. However, you might want to add additional keys here as well.",
"items": {
"type": "string"
},
"default": ["hydra.openid.id-token"],
"examples": ["hydra.jwt.access-token"]
}
}
},
"oidc_discovery": {
"type": "object",
"additionalProperties": false,
"description": "Configures OpenID Connect Discovery (/.well-known/openid-configuration).",
"properties": {
"jwks_url": {
"type": "string",
"description": "Overwrites the JWKS URL",
"format": "uri-reference",
"examples": [
"https://my-service.com/.well-known/jwks.json"
]
},
"token_url": {
"type": "string",
"description": "Overwrites the OAuth2 Token URL",
"format": "uri-reference",
"examples": [
"https://my-service.com/oauth2/token"
]
},
"auth_url": {
"type": "string",
"description": "Overwrites the OAuth2 Auth URL",
"format": "uri-reference",
"examples": [
"https://my-service.com/oauth2/auth"
]
},
"client_registration_url": {
"description": "Sets the OpenID Connect Dynamic Client Registration Endpoint",
"type": "string",
"format": "uri-reference",
"examples": [
"https://my-service.com/clients"
]
},
"supported_claims": {
"type": "array",
"description": "A list of supported claims to be broadcasted. Claim `sub` is always included.",
"items": {
"type": "string"
},
"examples": [["email", "username"]]
},
"supported_scope": {
"type": "array",
"description": "The scope OAuth 2.0 Clients may request. Scope `offline`, `offline_access`, and `openid` are always included.",
"items": {
"type": "string"
},
"examples": [["email", "whatever", "read.photos"]]
},
"userinfo_url": {
"type": "string",
"description": "A URL of the userinfo endpoint to be advertised at the OpenID Connect Discovery endpoint /.well-known/openid-configuration. Defaults to Ory Hydra's userinfo endpoint at /userinfo. Set this value if you want to handle this endpoint yourself.",
"format": "uri-reference",
"examples": [
"https://example.org/my-custom-userinfo-endpoint"
]
}
}
}
}
},
"oidc": {
"type": "object",
"additionalProperties": false,
"description": "Configures OpenID Connect features.",
"properties": {
"subject_identifiers": {
"type": "object",
"additionalProperties": false,
"description": "Configures the Subject Identifier algorithm. For more information please head over to the documentation: https://www.ory.sh/docs/hydra/advanced#subject-identifier-algorithms",
"properties": {
"supported_types": {
"type": "array",
"description": "A list of algorithms to enable.",
"default": ["public"],
"items": {
"type": "string",
"enum": ["public", "pairwise"]
}
},
"pairwise": {
"type": "object",
"additionalProperties": false,
"description": "Configures the pairwise algorithm.",
"properties": {
"salt": {
"type": "string"
}
},
"required": ["salt"]
}
},
"anyOf": [
{
"if": {
"properties": {
"supported_types": {
"contains": {
"const": "pairwise"
}
}
}
},
"then": {
"required": [
"pairwise"
]
}
},
{
"not": {
"required": ["supported_types"]
}
}
],
"examples": [
{
"supported_types": ["public", "pairwise"],
"pairwise": {
"salt": "some-random-salt"
}
}
]
},
"dynamic_client_registration": {
"type": "object",
"additionalProperties": false,
"description": "Configures OpenID Connect Dynamic Client Registration (exposed as admin endpoints /clients/...).",
"properties": {
"enabled": {
"type": "boolean",
"description": "Enable dynamic client registration.",
"default": false
},
"default_scope": {
"type": "array",
"description": "The OpenID Connect Dynamic Client Registration specification has no concept of whitelisting OAuth 2.0 Scope. If you want to expose Dynamic Client Registration, you should set the default scope enabled for newly registered clients. Keep in mind that users can overwrite this default by setting the `scope` key in the registration payload, effectively disabling the concept of whitelisted scopes.",
"items": {
"type": "string"
},
"examples": [["openid", "offline", "offline_access"]]
}
}
}
}
},
"urls": {
"type": "object",
"additionalProperties": false,
"properties": {
"self": {
"type": "object",
"additionalProperties": false,
"properties": {
"issuer": {
"type": "string",
"description": "This value will be used as the `issuer` in access and ID tokens. It must be specified and using HTTPS protocol, unless --dev is set. This should typically be equal to the public value.",
"format": "uri",
"examples": ["https://localhost:4444/"]
},
"public": {
"type": "string",
"description": "This is the base location of the public endpoints of your Ory Hydra installation. This should typically be equal to the issuer value. If left unspecified, it falls back to the issuer value.",
"format": "uri",
"examples": [
"https://localhost:4444/"
]
},
"admin": {
"type": "string",
"description": "This is the base location of the admin endpoints of your Ory Hydra installation.",
"format": "uri",
"examples": [
"https://localhost:4445/"
]
}
}
},
"login": {
"type": "string",
"description": "Sets the OAuth2 Login Endpoint URL of the OAuth2 User Login & Consent flow. Defaults to an internal fallback URL showing an error.",
"format": "uri-reference",
"examples": [
"https://my-login.app/login",
"/ui/login"
]
},
"consent": {
"type": "string",
"description": "Sets the consent endpoint of the User Login & Consent flow. Defaults to an internal fallback URL showing an error.",
"format": "uri-reference",
"examples": [
"https://my-consent.app/consent",
"/ui/consent"
]
},
"logout": {
"type": "string",
"description": "Sets the logout endpoint. Defaults to an internal fallback URL showing an error.",
"format": "uri-reference",
"examples": [
"https://my-logout.app/logout",
"/ui/logout"
]
},
"error": {
"type": "string",
"description": "Sets the error endpoint. The error ui will be shown when an OAuth2 error occurs that which can not be sent back to the client. Defaults to an internal fallback URL showing an error.",
"format": "uri-reference",
"examples": [
"https://my-error.app/error",
"/ui/error"
]
},
"post_logout_redirect": {
"type": "string",
"description": "When a user agent requests to logout, it will be redirected to this url afterwards per default.",
"format": "uri-reference",
"examples": [
"https://my-example.app/logout-successful",
"/ui"
]
},
"identity_provider": {
"type": "object",
"additionalProperties": false,
"properties": {
"url": {
"title": "The admin URL of the ORY Kratos instance.",
"description": "If set, ORY Hydra will use this URL to log out the user in addition to removing the Hydra session.",
"type": "string",
"format": "uri",
"examples": [
"https://kratos.example.com/admin"
]
},
"headers": {
"title": "HTTP Request Headers",
"description": "These headers will be passed in HTTP requests to the Identity Provider.",
"type": "object",
"additionalProperties": {
"type": "string"
},
"examples": [
{
"Authorization": "Bearer some-token"
}
]
}
}
}
}
},
"strategies": {
"type": "object",
"additionalProperties": false,
"properties": {
"scope": {
"type": "string",
"description": "Defines how scopes are matched. For more details have a look at https://github.com/ory/fosite#scopes",
"enum": [
"exact",
"wildcard"
],
"default": "wildcard"
},
"access_token": {
"type": "string",
"description": "Defines access token type. jwt is a bad idea, see https://www.ory.sh/docs/hydra/advanced#json-web-tokens",
"enum": ["opaque", "jwt"],
"default": "opaque"
},
"jwt": {
"type": "object",
"additionalProperties": false,
"properties": {
"scope_claim": {
"type": "string",
"description": "Defines how the scope claim is represented within a JWT access token",
"enum": ["list", "string", "both"],
"default": "list"
}
}
}
}
},
"ttl": {
"type": "object",
"additionalProperties": false,
"description": "Configures time to live.",
"properties": {
"login_consent_request": {
"description": "Configures how long a user login and consent flow may take.",
"default": "30m",
"allOf": [
{
"$ref": "#/definitions/duration"
}
]
},
"access_token": {
"description": "Configures how long access tokens are valid.",
"default": "1h",
"allOf": [
{
"$ref": "#/definitions/duration"
}
]
},
"refresh_token": {
"description": "Configures how long refresh tokens are valid. Set to -1 for refresh tokens to never expire.",
"default": "720h",
"oneOf": [
{
"$ref": "#/definitions/duration"
},
{
"enum": [
"-1",
-1
]
}
]
},
"id_token": {
"description": "Configures how long id tokens are valid.",
"default": "1h",
"allOf": [
{
"$ref": "#/definitions/duration"
}
]
},
"auth_code": {
"description": "Configures how long auth codes are valid.",
"default": "10m",
"allOf": [
{
"$ref": "#/definitions/duration"
}
]
}
}
},
"oauth2": {
"type": "object",
"additionalProperties": false,
"properties": {
"expose_internal_errors": {
"type": "boolean",
"description": "Set this to true if you want to share error debugging information with your OAuth 2.0 clients. Keep in mind that debug information is very valuable when dealing with errors, but might also expose database error codes and similar errors.",
"default": false,
"examples": [true]
},
"session": {
"type": "object",
"properties": {
"encrypt_at_rest": {
"type": "boolean",
"default": true,
"title": "Encrypt OAuth2 Session",
"description": "If set to true (default) Ory Hydra encrypt OAuth2 and OpenID Connect session data using AES-GCM and the system secret before persisting it in the database."
}
}
},
"exclude_not_before_claim": {
"type": "boolean",
"description": "Set to true if you want to exclude claim `nbf (not before)` part of access token.",
"default": false,
"examples": [true]
},
"allowed_top_level_claims": {
"type": "array",
"description": "A list of custom claims which are allowed to be added top level to the Access Token. They cannot override reserved claims.",
"items": {
"type": "string"
},
"examples": [["username", "email", "user_uuid"]]
},
"mirror_top_level_claims": {
"type": "boolean",
"description": "Set to false if you don't want to mirror custom claims under 'ext'",
"default": true,
"examples": [false]
},
"hashers": {
"type": "object",
"additionalProperties": false,
"description": "Configures hashing algorithms. Supports only BCrypt and PBKDF2 at the moment.",
"properties": {
"algorithm": {
"title": "Password hashing algorithm",
"description": "One of the values: pbkdf2, bcrypt.\n\nWarning! This value can not be changed once set as all existing OAuth 2.0 Clients will not be able to sign in any more.",
"type": "string",
"default": "pbkdf2",
"enum": [
"pbkdf2",
"bcrypt"
]
},
"bcrypt": {
"type": "object",
"additionalProperties": false,
"description": "Configures the BCrypt hashing algorithm used for hashing OAuth 2.0 Client Secrets.",
"properties": {
"cost": {
"type": "integer",
"description": "Sets the BCrypt cost. The higher the value, the more CPU time is being used to generate hashes.",
"default": 10,
"minimum": 4,
"maximum": 31
}
}
},
"pbkdf2": {
"type": "object",
"additionalProperties": false,
"description": "Configures the PBKDF2 hashing algorithm used for hashing OAuth 2.0 Client Secrets.",
"properties": {
"iterations": {
"type": "integer",
"description": "Sets the PBKDF2 iterations. The higher the value, the more CPU time is being used to generate hashes.",
"default": 25000,
"minimum": 1
}
}
}
}
},
"pkce": {
"type": "object",
"additionalProperties": false,
"properties": {
"enforced": {
"type": "boolean",
"description": "Sets whether PKCE should be enforced for all clients.",
"examples": [true]
},
"enforced_for_public_clients": {
"type": "boolean",
"description": "Sets whether PKCE should be enforced for public clients.",
"examples": [true]
}
}
},
"client_credentials": {
"type": "object",
"additionalProperties": false,
"properties": {
"default_grant_allowed_scope": {
"type": "boolean",
"description": "Automatically grant authorized OAuth2 Scope in OAuth2 Client Credentials Flow. Each OAuth2 Client is allowed to request a predefined OAuth2 Scope (for example `read write`). If this option is enabled, the full\nscope is automatically granted when performing the OAuth2 Client Credentials flow.\n\nIf disabled, the OAuth2 Client has to request the scope in the OAuth2 request by providing the `scope` query parameter. Setting this option to true is common if you need compatibility with MITREid.",
"examples": [
false
]
}
}
},
"grant": {
"type": "object",
"additionalProperties": false,
"properties": {
"jwt": {
"type": "object",
"additionalProperties": false,
"description": "Authorization Grants using JWT configuration",
"properties": {
"jti_optional": {
"type": "boolean",
"description": "Configures if the JSON Web Token ID (`jti`) claim is required in the JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants (RFC7523). If set to `false`, the `jti` claim is required. Set this value to `true` only after careful consideration.",
"default": false
},
"iat_optional": {
"type": "boolean",
"description": "Configures if the issued at (`iat`) claim is required in the JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants (RFC7523). If set to `false`, the `iat` claim is required. Set this value to `true` only after careful consideration.",
"default": false
},
"max_ttl": {
"description": "Configures what the maximum age of a JWT assertion used in the JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants (RFC7523) can be. This feature uses the `exp` claim and `iat` claim to calculate assertion age. Assertions exceeding the max age will be denied. Useful as a safety measure and recommended to keep below 720h. This governs the `grant.jwt.max_ttl` setting.",
"default": "720h",
"allOf": [
{
"$ref": "#/definitions/duration"
}
]
}
}
}
}
},
"refresh_token_hook": {
"type": "string",
"description": "Sets the refresh token hook endpoint. If set it will be called during token refresh to receive updated token claims.",
"format": "uri",
"examples": ["https://my-example.app/token-refresh-hook"]
},
"token_hook": {
"type": "string",
"description": "Sets the token hook endpoint for all grant types. If set it will be called while providing token to customize claims.",
"format": "uri",
"examples": ["https://my-example.app/token-hook"]
}
}
},
"secrets": {
"type": "object",
"additionalProperties": false,
"description": "The secrets section configures secrets used for encryption and signing of several systems. All secrets can be rotated, for more information on this topic go to: https://www.ory.sh/docs/hydra/advanced#rotation-of-hmac-token-signing-and-database-and-cookie-encryption-keys",
"properties": {
"system": {
"description": "The system secret must be at least 16 characters long. If none is provided, one will be generated. They key is used to encrypt sensitive data using AES-GCM (256 bit) and validate HMAC signatures. The first item in the list is used for signing and encryption. The whole list is used for verifying signatures and decryption.",
"type": "array",
"items": {
"type": "string",
"minLength": 16
},
"examples": [
[
"this-is-the-primary-secret",
"this-is-an-old-secret",
"this-is-another-old-secret"
]
]
},
"cookie": {
"type": "array",
"description": "A secret that is used to encrypt cookie sessions. Defaults to secrets.system. It is recommended to use a separate secret in production. The first item in the list is used for signing and encryption. The whole list is used for verifying signatures and decryption.",
"items": {
"type": "string",
"minLength": 16
},
"examples": [
[
"this-is-the-primary-secret",
"this-is-an-old-secret",
"this-is-another-old-secret"
]
]
}
}
},
"profiling": {
"type": "string",
"description": "Enables profiling if set. For more details on profiling, head over to: https://blog.golang.org/profiling-go-programs",
"enum": ["cpu", "mem"],
"examples": ["cpu"]
},
"tracing": {
"$ref": "ory://tracing-config"
},
"sqa": {
"type": "object",
"additionalProperties": true,
"description": "Software Quality Assurance telemetry configuration section",
"properties": {
"opt_out": {
"type": "boolean",
"description": "Disables anonymized telemetry reports - for more information please visit https://www.ory.sh/docs/ecosystem/sqa",
"default": false,
"examples": [true]
}
},
"examples": [
{
"opt_out": true
}
]
},
"version": {
"type": "string",
"title": "The Hydra version this config is written for.",
"description": "SemVer according to https://semver.org/ prefixed with `v` as in our releases.",
"pattern": "^v(0|[1-9]\\d*)\\.(0|[1-9]\\d*)\\.(0|[1-9]\\d*)(?:-((?:0|[1-9]\\d*|\\d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\\.(?:0|[1-9]\\d*|\\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\\+([0-9a-zA-Z-]+(?:\\.[0-9a-zA-Z-]+)*))?$"
},
"cgroups": {
"type": "object",
"additionalProperties": false,
"description": "Ory Hydra can respect Linux container CPU quota",
"properties": {
"v1": {
"type": "object",
"additionalProperties": false,
"description": "Configures parameters using cgroups v1 hierarchy",
"properties": {
"auto_max_procs_enabled": {
"type": "boolean",
"description": "Set GOMAXPROCS automatically according to cgroups limits",
"default": false,
"examples": [true]
}
}
}
}
},
"dev": {
"type": "boolean",
"title": "Enable development mode",
"description": "If true, disables critical security measures to allow easier local development. Do not use in production.",
"default": false
}
},
"additionalProperties": false
} |
Go | hydra/spec/schemas_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package spec
import (
"context"
"testing"
"github.com/stretchr/testify/require"
"github.com/ory/jsonschema/v3"
)
func TestConfigSchema(t *testing.T) {
c := jsonschema.NewCompiler()
require.NoError(t, AddConfigSchema(c))
_, err := c.Compile(context.Background(), ConfigSchemaID)
require.NoError(t, err)
} |
JSON | hydra/spec/swagger.json | {
"consumes": [
"application/json",
"application/x-www-form-urlencoded"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"swagger": "2.0",
"info": {
"description": "Welcome to the ORY Hydra HTTP API documentation. You will find documentation for all HTTP APIs here.",
"title": "ORY Hydra",
"version": "latest"
},
"basePath": "/",
"paths": {
"/.well-known/jwks.json": {
"get": {
"description": "This endpoint returns JSON Web Keys required to verifying OpenID Connect ID Tokens and,\nif enabled, OAuth 2.0 JWT Access Tokens. This endpoint can be used with client libraries like\n[node-jwks-rsa](https://github.com/auth0/node-jwks-rsa) among others.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"wellknown"
],
"summary": "Discover Well-Known JSON Web Keys",
"operationId": "discoverJsonWebKeys",
"responses": {
"200": {
"description": "jsonWebKeySet",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/.well-known/openid-configuration": {
"get": {
"description": "A mechanism for an OpenID Connect Relying Party to discover the End-User's OpenID Provider and obtain information needed to interact with it, including its OAuth 2.0 endpoint locations.\n\nPopular libraries for OpenID Connect clients include oidc-client-js (JavaScript), go-oidc (Golang), and others.\nFor a full list of clients go here: https://openid.net/developers/certified/",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "OpenID Connect Discovery",
"operationId": "discoverOidcConfiguration",
"responses": {
"200": {
"description": "oidcConfiguration",
"schema": {
"$ref": "#/definitions/oidcConfiguration"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/clients": {
"get": {
"description": "This endpoint lists all clients in the database, and never returns client secrets.\nAs a default it lists the first 100 clients.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "List OAuth 2.0 Clients",
"operationId": "listOAuth2Clients",
"parameters": [
{
"maximum": 500,
"minimum": 1,
"type": "integer",
"format": "int64",
"default": 250,
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"name": "page_size",
"in": "query"
},
{
"minimum": 1,
"type": "string",
"default": "1",
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"name": "page_token",
"in": "query"
},
{
"type": "string",
"description": "The name of the clients to filter by.",
"name": "client_name",
"in": "query"
},
{
"type": "string",
"description": "The owner of the clients to filter by.",
"name": "owner",
"in": "query"
}
],
"responses": {
"200": {
"$ref": "#/responses/listOAuth2Clients"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
},
"post": {
"description": "Create a new OAuth 2.0 client. If you pass `client_secret` the secret is used, otherwise a random secret\nis generated. The secret is echoed in the response. It is not possible to retrieve it later on.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Create OAuth 2.0 Client",
"operationId": "createOAuth2Client",
"parameters": [
{
"description": "OAuth 2.0 Client Request Body",
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
}
],
"responses": {
"201": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"400": {
"$ref": "#/responses/errorOAuth2BadRequest"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
}
},
"/admin/clients/{id}": {
"get": {
"description": "Get an OAuth 2.0 client by its ID. This endpoint never returns the client secret.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Get an OAuth 2.0 Client",
"operationId": "getOAuth2Client",
"parameters": [
{
"type": "string",
"description": "The id of the OAuth 2.0 Client.",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
},
"put": {
"description": "Replaces an existing OAuth 2.0 Client with the payload you send. If you pass `client_secret` the secret is used,\notherwise the existing secret is used.\n\nIf set, the secret is echoed in the response. It is not possible to retrieve it later on.\n\nOAuth 2.0 Clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Set OAuth 2.0 Client",
"operationId": "setOAuth2Client",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Client ID",
"name": "id",
"in": "path",
"required": true
},
{
"description": "OAuth 2.0 Client Request Body",
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"400": {
"$ref": "#/responses/errorOAuth2BadRequest"
},
"404": {
"$ref": "#/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
},
"delete": {
"description": "Delete an existing OAuth 2.0 Client by its ID.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.\n\nMake sure that this endpoint is well protected and only callable by first-party components.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Delete OAuth 2.0 Client",
"operationId": "deleteOAuth2Client",
"parameters": [
{
"type": "string",
"description": "The id of the OAuth 2.0 Client.",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
},
"patch": {
"description": "Patch an existing OAuth 2.0 Client using JSON Patch. If you pass `client_secret`\nthe secret will be updated and returned via the API. This is the\nonly time you will be able to retrieve the client secret, so write it down and keep it safe.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Patch OAuth 2.0 Client",
"operationId": "patchOAuth2Client",
"parameters": [
{
"type": "string",
"description": "The id of the OAuth 2.0 Client.",
"name": "id",
"in": "path",
"required": true
},
{
"description": "OAuth 2.0 Client JSON Patch Body",
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/jsonPatchDocument"
}
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"404": {
"$ref": "#/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
}
},
"/admin/clients/{id}/lifespans": {
"put": {
"description": "Set lifespans of different token types issued for this OAuth 2.0 client. Does not modify other fields.",
"consumes": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Set OAuth2 Client Token Lifespans",
"operationId": "setOAuth2ClientLifespans",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Client ID",
"name": "id",
"in": "path",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/oAuth2ClientTokenLifespans"
}
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
}
},
"/admin/keys/{set}": {
"get": {
"description": "This endpoint can be used to retrieve JWK Sets stored in ORY Hydra.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Retrieve a JSON Web Key Set",
"operationId": "getJsonWebKeySet",
"parameters": [
{
"type": "string",
"description": "JSON Web Key Set ID",
"name": "set",
"in": "path",
"required": true
}
],
"responses": {
"200": {
"description": "jsonWebKeySet",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"put": {
"description": "Use this method if you do not want to let Hydra generate the JWKs for you, but instead save your own.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Update a JSON Web Key Set",
"operationId": "setJsonWebKeySet",
"parameters": [
{
"type": "string",
"description": "The JSON Web Key Set ID",
"name": "set",
"in": "path",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
}
],
"responses": {
"200": {
"description": "jsonWebKeySet",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"post": {
"description": "This endpoint is capable of generating JSON Web Key Sets for you. There a different strategies available, such as symmetric cryptographic keys (HS256, HS512) and asymetric cryptographic keys (RS256, ECDSA). If the specified JSON Web Key Set does not exist, it will be created.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Create JSON Web Key",
"operationId": "createJsonWebKeySet",
"parameters": [
{
"type": "string",
"description": "The JSON Web Key Set ID",
"name": "set",
"in": "path",
"required": true
},
{
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/createJsonWebKeySet"
}
}
],
"responses": {
"201": {
"description": "jsonWebKeySet",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"delete": {
"description": "Use this endpoint to delete a complete JSON Web Key Set and all the keys in that set.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Delete JSON Web Key Set",
"operationId": "deleteJsonWebKeySet",
"parameters": [
{
"type": "string",
"description": "The JSON Web Key Set",
"name": "set",
"in": "path",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/keys/{set}/{kid}": {
"get": {
"description": "This endpoint returns a singular JSON Web Key contained in a set. It is identified by the set and the specific key ID (kid).",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Get JSON Web Key",
"operationId": "getJsonWebKey",
"parameters": [
{
"type": "string",
"description": "JSON Web Key Set ID",
"name": "set",
"in": "path",
"required": true
},
{
"type": "string",
"description": "JSON Web Key ID",
"name": "kid",
"in": "path",
"required": true
}
],
"responses": {
"200": {
"description": "jsonWebKeySet",
"schema": {
"$ref": "#/definitions/jsonWebKeySet"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"put": {
"description": "Use this method if you do not want to let Hydra generate the JWKs for you, but instead save your own.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A JWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses this functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens), and allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Set JSON Web Key",
"operationId": "setJsonWebKey",
"parameters": [
{
"type": "string",
"description": "The JSON Web Key Set ID",
"name": "set",
"in": "path",
"required": true
},
{
"type": "string",
"description": "JSON Web Key ID",
"name": "kid",
"in": "path",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/jsonWebKey"
}
}
],
"responses": {
"200": {
"description": "jsonWebKey",
"schema": {
"$ref": "#/definitions/jsonWebKey"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"delete": {
"description": "Use this endpoint to delete a single JSON Web Key.\n\nA JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. A\nJWK Set is a JSON data structure that represents a set of JWKs. A JSON Web Key is identified by its set and key id. ORY Hydra uses\nthis functionality to store cryptographic keys used for TLS and JSON Web Tokens (such as OpenID Connect ID tokens),\nand allows storing user-defined keys as well.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"jwk"
],
"summary": "Delete JSON Web Key",
"operationId": "deleteJsonWebKey",
"parameters": [
{
"type": "string",
"description": "The JSON Web Key Set",
"name": "set",
"in": "path",
"required": true
},
{
"type": "string",
"description": "The JSON Web Key ID (kid)",
"name": "kid",
"in": "path",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/consent": {
"get": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Get OAuth 2.0 Consent Request",
"operationId": "getOAuth2ConsentRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Consent Request Challenge",
"name": "consent_challenge",
"in": "query",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2ConsentRequest",
"schema": {
"$ref": "#/definitions/oAuth2ConsentRequest"
}
},
"410": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/consent/accept": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThis endpoint tells Ory that the subject has authorized the OAuth 2.0 client to access resources on his/her behalf.\nThe consent provider includes additional information, such as session data for access and ID tokens, and if the\nconsent request should be used as basis for future requests.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Accept OAuth 2.0 Consent Request",
"operationId": "acceptOAuth2ConsentRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Consent Request Challenge",
"name": "consent_challenge",
"in": "query",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/acceptOAuth2ConsentRequest"
}
}
],
"responses": {
"200": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/consent/reject": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell Ory now about it. If the subject authenticated, he/she must now be asked if\nthe OAuth 2.0 Client which initiated the flow should be allowed to access the resources on the subject's behalf.\n\nThe consent challenge is appended to the consent provider's URL to which the subject's user-agent (browser) is redirected to. The consent\nprovider uses that challenge to fetch information on the OAuth2 request and then tells Ory if the subject accepted\nor rejected the request.\n\nThis endpoint tells Ory that the subject has not authorized the OAuth 2.0 client to access resources on his/her behalf.\nThe consent provider must include a reason why the consent was not granted.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.\n\nThe default consent provider is available via the Ory Managed Account Experience. To customize the consent provider, please\nhead over to the OAuth 2.0 documentation.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Reject OAuth 2.0 Consent Request",
"operationId": "rejectOAuth2ConsentRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Consent Request Challenge",
"name": "consent_challenge",
"in": "query",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/rejectOAuth2Request"
}
}
],
"responses": {
"200": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/login": {
"get": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nPer default, the login provider is Ory itself. You may use a different login provider which needs to be a web-app\nyou write and host, and it must be able to authenticate (\"show the subject a login screen\")\na subject (in OAuth2 the proper name for subject is \"resource owner\").\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Get OAuth 2.0 Login Request",
"operationId": "getOAuth2LoginRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Login Request Challenge",
"name": "login_challenge",
"in": "query",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2LoginRequest",
"schema": {
"$ref": "#/definitions/oAuth2LoginRequest"
}
},
"410": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/login/accept": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.\n\nThis endpoint tells Ory that the subject has successfully authenticated and includes additional information such as\nthe subject's ID and if Ory should remember the subject's subject agent for future authentication attempts by setting\na cookie.\n\nThe response contains a redirect URL which the login provider should redirect the user-agent to.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Accept OAuth 2.0 Login Request",
"operationId": "acceptOAuth2LoginRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Login Request Challenge",
"name": "login_challenge",
"in": "query",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/acceptOAuth2LoginRequest"
}
}
],
"responses": {
"200": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/login/reject": {
"put": {
"description": "When an authorization code, hybrid, or implicit OAuth 2.0 Flow is initiated, Ory asks the login provider\nto authenticate the subject and then tell the Ory OAuth2 Service about it.\n\nThe authentication challenge is appended to the login provider URL to which the subject's user-agent (browser) is redirected to. The login\nprovider uses that challenge to fetch information on the OAuth2 request and then accept or reject the requested authentication process.\n\nThis endpoint tells Ory that the subject has not authenticated and includes a reason why the authentication\nwas denied.\n\nThe response contains a redirect URL which the login provider should redirect the user-agent to.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Reject OAuth 2.0 Login Request",
"operationId": "rejectOAuth2LoginRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Login Request Challenge",
"name": "login_challenge",
"in": "query",
"required": true
},
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/rejectOAuth2Request"
}
}
],
"responses": {
"200": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/logout": {
"get": {
"description": "Use this endpoint to fetch an Ory OAuth 2.0 logout request.",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Get OAuth 2.0 Session Logout Request",
"operationId": "getOAuth2LogoutRequest",
"parameters": [
{
"type": "string",
"name": "logout_challenge",
"in": "query",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2LogoutRequest",
"schema": {
"$ref": "#/definitions/oAuth2LogoutRequest"
}
},
"410": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/logout/accept": {
"put": {
"description": "When a user or an application requests Ory OAuth 2.0 to remove the session state of a subject, this endpoint is used to confirm that logout request.\n\nThe response contains a redirect URL which the consent provider should redirect the user-agent to.",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Accept OAuth 2.0 Session Logout Request",
"operationId": "acceptOAuth2LogoutRequest",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Logout Request Challenge",
"name": "logout_challenge",
"in": "query",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2RedirectTo",
"schema": {
"$ref": "#/definitions/oAuth2RedirectTo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/requests/logout/reject": {
"put": {
"description": "When a user or an application requests Ory OAuth 2.0 to remove the session state of a subject, this endpoint is used to deny that logout request.\nNo HTTP request body is required.\n\nThe response is empty as the logout provider has to chose what action to perform next.",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Reject OAuth 2.0 Session Logout Request",
"operationId": "rejectOAuth2LogoutRequest",
"parameters": [
{
"type": "string",
"name": "logout_challenge",
"in": "query",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/sessions/consent": {
"get": {
"description": "This endpoint lists all subject's granted consent sessions, including client and granted scope.\nIf the subject is unknown or has not granted any consent sessions yet, the endpoint returns an\nempty JSON array with status code 200 OK.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "List OAuth 2.0 Consent Sessions of a Subject",
"operationId": "listOAuth2ConsentSessions",
"parameters": [
{
"maximum": 500,
"minimum": 1,
"type": "integer",
"format": "int64",
"default": 250,
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"name": "page_size",
"in": "query"
},
{
"minimum": 1,
"type": "string",
"default": "1",
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"name": "page_token",
"in": "query"
},
{
"type": "string",
"description": "The subject to list the consent sessions for.",
"name": "subject",
"in": "query",
"required": true
},
{
"type": "string",
"description": "The login session id to list the consent sessions for.",
"name": "login_session_id",
"in": "query"
}
],
"responses": {
"200": {
"description": "oAuth2ConsentSessions",
"schema": {
"$ref": "#/definitions/oAuth2ConsentSessions"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
},
"delete": {
"description": "This endpoint revokes a subject's granted consent sessions and invalidates all\nassociated OAuth 2.0 Access Tokens. You may also only revoke sessions for a specific OAuth 2.0 Client ID.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Revoke OAuth 2.0 Consent Sessions of a Subject",
"operationId": "revokeOAuth2ConsentSessions",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Consent Subject\n\nThe subject whose consent sessions should be deleted.",
"name": "subject",
"in": "query",
"required": true
},
{
"type": "string",
"description": "OAuth 2.0 Client ID\n\nIf set, deletes only those consent sessions that have been granted to the specified OAuth 2.0 Client ID.",
"name": "client",
"in": "query"
},
{
"type": "boolean",
"description": "Revoke All Consent Sessions\n\nIf set to `true` deletes all consent sessions by the Subject that have been granted.",
"name": "all",
"in": "query"
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/auth/sessions/login": {
"delete": {
"description": "This endpoint invalidates authentication sessions. After revoking the authentication session(s), the subject\nhas to re-authenticate at the Ory OAuth2 Provider. This endpoint does not invalidate any tokens.\n\nIf you send the subject in a query param, all authentication sessions that belong to that subject are revoked.\nNo OpennID Connect Front- or Back-channel logout is performed in this case.\n\nAlternatively, you can send a SessionID via `sid` query param, in which case, only the session that is connected\nto that SessionID is revoked. OpenID Connect Back-channel logout is performed in this case.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Revokes OAuth 2.0 Login Sessions by either a Subject or a SessionID",
"operationId": "revokeOAuth2LoginSessions",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Subject\n\nThe subject to revoke authentication sessions for.",
"name": "subject",
"in": "query"
},
{
"type": "string",
"description": "OAuth 2.0 Subject\n\nThe subject to revoke authentication sessions for.",
"name": "sid",
"in": "query"
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/introspect": {
"post": {
"description": "The introspection endpoint allows to check if a token (both refresh and access) is active or not. An active token\nis neither expired nor revoked. If a token is active, additional information on the token will be included. You can\nset additional data for a token by setting `session.access_token` during the consent flow.",
"consumes": [
"application/x-www-form-urlencoded"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Introspect OAuth2 Access and Refresh Tokens",
"operationId": "introspectOAuth2Token",
"parameters": [
{
"type": "string",
"description": "The string value of the token. For access tokens, this\nis the \"access_token\" value returned from the token endpoint\ndefined in OAuth 2.0. For refresh tokens, this is the \"refresh_token\"\nvalue returned.",
"name": "token",
"in": "formData",
"required": true
},
{
"type": "string",
"description": "An optional, space separated list of required scopes. If the access token was not granted one of the\nscopes, the result of active will be false.",
"name": "scope",
"in": "formData"
}
],
"responses": {
"200": {
"description": "introspectedOAuth2Token",
"schema": {
"$ref": "#/definitions/introspectedOAuth2Token"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/oauth2/tokens": {
"delete": {
"description": "This endpoint deletes OAuth2 access tokens issued to an OAuth 2.0 Client from the database.",
"consumes": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Delete OAuth 2.0 Access Tokens from specific OAuth 2.0 Client",
"operationId": "deleteOAuth2Token",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Client ID",
"name": "client_id",
"in": "query",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/admin/trust/grants/jwt-bearer/issuers": {
"get": {
"description": "Use this endpoint to list all trusted JWT Bearer Grant Type Issuers.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "List Trusted OAuth2 JWT Bearer Grant Type Issuers",
"operationId": "listTrustedOAuth2JwtGrantIssuers",
"parameters": [
{
"type": "integer",
"format": "int64",
"name": "MaxItems",
"in": "query"
},
{
"type": "integer",
"format": "int64",
"name": "DefaultItems",
"in": "query"
},
{
"type": "string",
"description": "If optional \"issuer\" is supplied, only jwt-bearer grants with this issuer will be returned.",
"name": "issuer",
"in": "query"
}
],
"responses": {
"200": {
"description": "trustedOAuth2JwtGrantIssuers",
"schema": {
"$ref": "#/definitions/trustedOAuth2JwtGrantIssuers"
}
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
},
"post": {
"description": "Use this endpoint to establish a trust relationship for a JWT issuer\nto perform JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication\nand Authorization Grants [RFC7523](https://datatracker.ietf.org/doc/html/rfc7523).",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Trust OAuth2 JWT Bearer Grant Type Issuer",
"operationId": "trustOAuth2JwtGrantIssuer",
"parameters": [
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/trustOAuth2JwtGrantIssuer"
}
}
],
"responses": {
"201": {
"description": "trustedOAuth2JwtGrantIssuer",
"schema": {
"$ref": "#/definitions/trustedOAuth2JwtGrantIssuer"
}
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
}
},
"/admin/trust/grants/jwt-bearer/issuers/{id}": {
"get": {
"description": "Use this endpoint to get a trusted JWT Bearer Grant Type Issuer. The ID is the one returned when you\ncreated the trust relationship.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Get Trusted OAuth2 JWT Bearer Grant Type Issuer",
"operationId": "getTrustedOAuth2JwtGrantIssuer",
"parameters": [
{
"type": "string",
"description": "The id of the desired grant",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"200": {
"description": "trustedOAuth2JwtGrantIssuer",
"schema": {
"$ref": "#/definitions/trustedOAuth2JwtGrantIssuer"
}
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
},
"delete": {
"description": "Use this endpoint to delete trusted JWT Bearer Grant Type Issuer. The ID is the one returned when you\ncreated the trust relationship.\n\nOnce deleted, the associated issuer will no longer be able to perform the JSON Web Token (JWT) Profile\nfor OAuth 2.0 Client Authentication and Authorization Grant.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Delete Trusted OAuth2 JWT Bearer Grant Type Issuer",
"operationId": "deleteTrustedOAuth2JwtGrantIssuer",
"parameters": [
{
"type": "string",
"description": "The id of the desired grant",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
}
},
"/credentials": {
"post": {
"description": "This endpoint creates a verifiable credential that attests that the user\nauthenticated with the provided access token owns a certain public/private key\npair.\n\nMore information can be found at\nhttps://openid.net/specs/openid-connect-userinfo-vc-1_0.html.",
"consumes": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "Issues a Verifiable Credential",
"operationId": "createVerifiableCredential",
"parameters": [
{
"name": "Body",
"in": "body",
"schema": {
"$ref": "#/definitions/CreateVerifiableCredentialRequestBody"
}
}
],
"responses": {
"200": {
"description": "verifiableCredentialResponse",
"schema": {
"$ref": "#/definitions/verifiableCredentialResponse"
}
},
"400": {
"description": "verifiableCredentialPrimingResponse",
"schema": {
"$ref": "#/definitions/verifiableCredentialPrimingResponse"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/health/alive": {
"get": {
"description": "This endpoint returns a 200 status code when the HTTP server is up running.\nThis status does currently not include checks whether the database connection is working.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.\n\nBe aware that if you are running multiple nodes of this service, the health status will never\nrefer to the cluster state, only to a single instance.",
"produces": [
"application/json"
],
"tags": [
"admin"
],
"summary": "Check Alive Status",
"operationId": "isInstanceAlive",
"responses": {
"200": {
"description": "healthStatus",
"schema": {
"$ref": "#/definitions/healthStatus"
}
},
"500": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/health/ready": {
"get": {
"description": "This endpoint returns a 200 status code when the HTTP server is up running and the environment dependencies (e.g.\nthe database) are responsive as well.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.\n\nBe aware that if you are running multiple nodes of this service, the health status will never\nrefer to the cluster state, only to a single instance.",
"produces": [
"application/json"
],
"tags": [
"public"
],
"summary": "Check Readiness Status",
"operationId": "isInstanceReady",
"responses": {
"200": {
"description": "healthStatus",
"schema": {
"$ref": "#/definitions/healthStatus"
}
},
"503": {
"description": "healthNotReadyStatus",
"schema": {
"$ref": "#/definitions/healthNotReadyStatus"
}
}
}
}
},
"/oauth2/auth": {
"get": {
"description": "Use open source libraries to perform OAuth 2.0 and OpenID Connect\navailable for any programming language. You can find a list of libraries at https://oauth.net/code/\n\nThe Ory SDK is not yet able to this endpoint properly.",
"consumes": [
"application/x-www-form-urlencoded"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "OAuth 2.0 Authorize Endpoint",
"operationId": "oAuth2Authorize",
"responses": {
"302": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/oauth2/register": {
"post": {
"description": "This endpoint behaves like the administrative counterpart (`createOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol. This feature needs to be enabled in the configuration. This endpoint\nis disabled by default. It can be enabled by an administrator.\n\nPlease note that using this endpoint you are not able to choose the `client_secret` nor the `client_id` as those\nvalues will be server generated when specifying `token_endpoint_auth_method` as `client_secret_basic` or\n`client_secret_post`.\n\nThe `client_secret` will be returned in the response and you will not be able to retrieve it later on.\nWrite the secret down and keep it somewhere safe.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "Register OAuth2 Client using OpenID Dynamic Client Registration",
"operationId": "createOidcDynamicClient",
"parameters": [
{
"description": "Dynamic Client Registration Request Body",
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
}
],
"responses": {
"201": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"400": {
"$ref": "#/responses/errorOAuth2BadRequest"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
}
},
"/oauth2/register/{id}": {
"get": {
"security": [
{
"bearer": []
}
],
"description": "This endpoint behaves like the administrative counterpart (`getOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "Get OAuth2 Client using OpenID Dynamic Client Registration",
"operationId": "getOidcDynamicClient",
"parameters": [
{
"type": "string",
"description": "The id of the OAuth 2.0 Client.",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
},
"put": {
"security": [
{
"bearer": []
}
],
"description": "This endpoint behaves like the administrative counterpart (`setOAuth2Client`) but is capable of facing the\npublic internet directly to be used by third parties. It implements the OpenID Connect\nDynamic Client Registration Protocol.\n\nThis feature is disabled per default. It can be enabled by a system administrator.\n\nIf you pass `client_secret` the secret is used, otherwise the existing secret is used. If set, the secret is echoed in the response.\nIt is not possible to retrieve it later on.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "Set OAuth2 Client using OpenID Dynamic Client Registration",
"operationId": "setOidcDynamicClient",
"parameters": [
{
"type": "string",
"description": "OAuth 2.0 Client ID",
"name": "id",
"in": "path",
"required": true
},
{
"description": "OAuth 2.0 Client Request Body",
"name": "Body",
"in": "body",
"required": true,
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
}
],
"responses": {
"200": {
"description": "oAuth2Client",
"schema": {
"$ref": "#/definitions/oAuth2Client"
}
},
"404": {
"$ref": "#/responses/errorOAuth2NotFound"
},
"default": {
"$ref": "#/responses/errorOAuth2Default"
}
}
},
"delete": {
"security": [
{
"bearer": []
}
],
"description": "This endpoint behaves like the administrative counterpart (`deleteOAuth2Client`) but is capable of facing the\npublic internet directly and can be used in self-service. It implements the OpenID Connect\nDynamic Client Registration Protocol. This feature needs to be enabled in the configuration. This endpoint\nis disabled by default. It can be enabled by an administrator.\n\nTo use this endpoint, you will need to present the client's authentication credentials. If the OAuth2 Client\nuses the Token Endpoint Authentication Method `client_secret_post`, you need to present the client secret in the URL query.\nIf it uses `client_secret_basic`, present the Client ID and the Client Secret in the Authorization header.\n\nOAuth 2.0 clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "Delete OAuth 2.0 Client using the OpenID Dynamic Client Registration Management Protocol",
"operationId": "deleteOidcDynamicClient",
"parameters": [
{
"type": "string",
"description": "The id of the OAuth 2.0 Client.",
"name": "id",
"in": "path",
"required": true
}
],
"responses": {
"204": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "genericError",
"schema": {
"$ref": "#/definitions/genericError"
}
}
}
}
},
"/oauth2/revoke": {
"post": {
"security": [
{
"basic": []
},
{
"oauth2": []
}
],
"description": "Revoking a token (both access and refresh) means that the tokens will be invalid. A revoked access token can no\nlonger be used to make access requests, and a revoked refresh token can no longer be used to refresh an access token.\nRevoking a refresh token also invalidates the access token that was created with it. A token may only be revoked by\nthe client the token was generated for.",
"consumes": [
"application/x-www-form-urlencoded"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "Revoke OAuth 2.0 Access or Refresh Token",
"operationId": "revokeOAuth2Token",
"parameters": [
{
"type": "string",
"name": "token",
"in": "formData",
"required": true
},
{
"type": "string",
"name": "client_id",
"in": "formData"
},
{
"type": "string",
"name": "client_secret",
"in": "formData"
}
],
"responses": {
"200": {
"$ref": "#/responses/emptyResponse"
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/oauth2/sessions/logout": {
"get": {
"description": "This endpoint initiates and completes user logout at the Ory OAuth2 \u0026 OpenID provider and initiates OpenID Connect Front- / Back-channel logout:\n\nhttps://openid.net/specs/openid-connect-frontchannel-1_0.html\nhttps://openid.net/specs/openid-connect-backchannel-1_0.html\n\nBack-channel logout is performed asynchronously and does not affect logout flow.",
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "OpenID Connect Front- and Back-channel Enabled Logout",
"operationId": "revokeOidcSession",
"responses": {
"302": {
"$ref": "#/responses/emptyResponse"
}
}
}
},
"/oauth2/token": {
"post": {
"security": [
{
"basic": []
},
{
"oauth2": []
}
],
"description": "Use open source libraries to perform OAuth 2.0 and OpenID Connect\navailable for any programming language. You can find a list of libraries here https://oauth.net/code/\n\nThe Ory SDK is not yet able to this endpoint properly.",
"consumes": [
"application/x-www-form-urlencoded"
],
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oAuth2"
],
"summary": "The OAuth 2.0 Token Endpoint",
"operationId": "oauth2TokenExchange",
"parameters": [
{
"type": "string",
"name": "grant_type",
"in": "formData",
"required": true
},
{
"type": "string",
"name": "code",
"in": "formData"
},
{
"type": "string",
"name": "refresh_token",
"in": "formData"
},
{
"type": "string",
"name": "redirect_uri",
"in": "formData"
},
{
"type": "string",
"name": "client_id",
"in": "formData"
}
],
"responses": {
"200": {
"description": "oAuth2TokenExchange",
"schema": {
"$ref": "#/definitions/oAuth2TokenExchange"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/userinfo": {
"get": {
"security": [
{
"oauth2": []
}
],
"description": "This endpoint returns the payload of the ID Token, including `session.id_token` values, of\nthe provided OAuth 2.0 Access Token's consent request.\n\nIn the case of authentication error, a WWW-Authenticate header might be set in the response\nwith more information about the error. See [the spec](https://datatracker.ietf.org/doc/html/rfc6750#section-3)\nfor more details about header format.",
"produces": [
"application/json"
],
"schemes": [
"http",
"https"
],
"tags": [
"oidc"
],
"summary": "OpenID Connect Userinfo",
"operationId": "getOidcUserInfo",
"responses": {
"200": {
"description": "oidcUserInfo",
"schema": {
"$ref": "#/definitions/oidcUserInfo"
}
},
"default": {
"description": "errorOAuth2",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
}
}
}
},
"/version": {
"get": {
"description": "This endpoint returns the service version typically notated using semantic versioning.\n\nIf the service supports TLS Edge Termination, this endpoint does not require the\n`X-Forwarded-Proto` header to be set.",
"produces": [
"application/json"
],
"tags": [
"admin"
],
"summary": "Get Service Version",
"operationId": "getVersion",
"responses": {
"200": {
"description": "version",
"schema": {
"$ref": "#/definitions/version"
}
}
}
}
}
},
"definitions": {
"CreateVerifiableCredentialRequestBody": {
"type": "object",
"title": "CreateVerifiableCredentialRequestBody contains the request body to request a verifiable credential.",
"properties": {
"format": {
"type": "string"
},
"proof": {
"$ref": "#/definitions/VerifiableCredentialProof"
},
"types": {
"type": "array",
"items": {
"type": "string"
}
}
}
},
"DefaultError": {},
"JSONRawMessage": {
"type": "object",
"title": "JSONRawMessage represents a json.RawMessage that works well with JSON, SQL, and Swagger."
},
"NullDuration": {
"description": "TODO delete this type and replace it with ory/x/sqlxx/NullDuration when applying the custom client token TTL patch to Hydra 2.x",
"type": "string",
"title": "NullDuration represents a nullable JSON and SQL compatible time.Duration."
},
"RFC6749ErrorJson": {
"type": "object",
"title": "RFC6749ErrorJson is a helper struct for JSON encoding/decoding of RFC6749Error.",
"properties": {
"error": {
"type": "string"
},
"error_debug": {
"type": "string"
},
"error_description": {
"type": "string"
},
"error_hint": {
"type": "string"
},
"status_code": {
"type": "integer",
"format": "int64"
}
}
},
"StringSliceJSONFormat": {
"type": "array",
"title": "StringSliceJSONFormat represents []string{} which is encoded to/from JSON for SQL storage.",
"items": {
"type": "string"
}
},
"VerifiableCredentialProof": {
"type": "object",
"title": "VerifiableCredentialProof contains the proof of a verifiable credential.",
"properties": {
"jwt": {
"type": "string"
},
"proof_type": {
"type": "string"
}
}
},
"acceptOAuth2ConsentRequest": {
"type": "object",
"title": "The request payload used to accept a consent request.",
"properties": {
"grant_access_token_audience": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"grant_scope": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"handled_at": {
"$ref": "#/definitions/nullTime"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same\nclient asks the same user for the same, or a subset of, scope.",
"type": "boolean"
},
"remember_for": {
"description": "RememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered indefinitely.",
"type": "integer",
"format": "int64"
},
"session": {
"$ref": "#/definitions/acceptOAuth2ConsentRequestSession"
}
}
},
"acceptOAuth2ConsentRequestSession": {
"type": "object",
"title": "Pass session data to a consent request.",
"properties": {
"access_token": {
"description": "AccessToken sets session data for the access and refresh token, as well as any future tokens issued by the\nrefresh grant. Keep in mind that this data will be available to anyone performing OAuth 2.0 Challenge Introspection.\nIf only your services can perform OAuth 2.0 Challenge Introspection, this is usually fine. But if third parties\ncan access that endpoint as well, sensitive data from the session might be exposed to them. Use with care!",
"type": "object",
"additionalProperties": {}
},
"id_token": {
"description": "IDToken sets session data for the OpenID Connect ID token. Keep in mind that the session'id payloads are readable\nby anyone that has access to the ID Challenge. Use with care!",
"type": "object",
"additionalProperties": {}
}
}
},
"acceptOAuth2LoginRequest": {
"type": "object",
"title": "HandledLoginRequest is the request payload used to accept a login request.",
"required": [
"subject"
],
"properties": {
"acr": {
"description": "ACR sets the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it\nto express that, for example, a user authenticated using two factor authentication.",
"type": "string"
},
"amr": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"context": {
"$ref": "#/definitions/JSONRawMessage"
},
"extend_session_lifespan": {
"description": "Extend OAuth2 authentication session lifespan\n\nIf set to `true`, the OAuth2 authentication cookie lifespan is extended. This is for example useful if you want the user to be able to use `prompt=none` continuously.\n\nThis value can only be set to `true` if the user has an authentication, which is the case if the `skip` value is `true`.",
"type": "boolean"
},
"force_subject_identifier": {
"description": "ForceSubjectIdentifier forces the \"pairwise\" user ID of the end-user that authenticated. The \"pairwise\" user ID refers to the\n(Pairwise Identifier Algorithm)[http://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg] of the OpenID\nConnect specification. It allows you to set an obfuscated subject (\"user\") identifier that is unique to the client.\n\nPlease note that this changes the user ID on endpoint /userinfo and sub claim of the ID Token. It does not change the\nsub claim in the OAuth 2.0 Introspection.\n\nPer default, ORY Hydra handles this value with its own algorithm. In case you want to set this yourself\nyou can use this field. Please note that setting this field has no effect if `pairwise` is not configured in\nORY Hydra or the OAuth 2.0 Client does not expect a pairwise identifier (set via `subject_type` key in the client's\nconfiguration).\n\nPlease also be aware that ORY Hydra is unable to properly compute this value during authentication. This implies\nthat you have to compute this value on every authentication process (probably depending on the client ID or some\nother unique value).\n\nIf you fail to compute the proper value, then authentication processes which have id_token_hint set might fail.",
"type": "string"
},
"identity_provider_session_id": {
"description": "IdentityProviderSessionID is the session ID of the end-user that authenticated.\nIf specified, we will use this value to propagate the logout.",
"type": "string"
},
"remember": {
"description": "Remember, if set to true, tells ORY Hydra to remember this user by telling the user agent (browser) to store\na cookie with authentication data. If the same user performs another OAuth 2.0 Authorization Request, he/she\nwill not be asked to log in again.",
"type": "boolean"
},
"remember_for": {
"description": "RememberFor sets how long the authentication should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered for the duration of the browser session (using a session cookie).",
"type": "integer",
"format": "int64"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated.",
"type": "string"
}
}
},
"createJsonWebKeySet": {
"description": "Create JSON Web Key Set Request Body",
"type": "object",
"required": [
"alg",
"use",
"kid"
],
"properties": {
"alg": {
"description": "JSON Web Key Algorithm\n\nThe algorithm to be used for creating the key. Supports `RS256`, `ES256`, `ES512`, `HS512`, and `HS256`.",
"type": "string"
},
"kid": {
"description": "JSON Web Key ID\n\nThe Key ID of the key to be created.",
"type": "string"
},
"use": {
"description": "JSON Web Key Use\n\nThe \"use\" (public key use) parameter identifies the intended use of\nthe public key. The \"use\" parameter is employed to indicate whether\na public key is used for encrypting data or verifying the signature\non data. Valid values are \"enc\" and \"sig\".",
"type": "string"
}
}
},
"credentialSupportedDraft00": {
"description": "Includes information about the supported verifiable credentials.",
"type": "object",
"title": "Verifiable Credentials Metadata (Draft 00)",
"properties": {
"cryptographic_binding_methods_supported": {
"description": "OpenID Connect Verifiable Credentials Cryptographic Binding Methods Supported\n\nContains a list of cryptographic binding methods supported for signing the proof.",
"type": "array",
"items": {
"type": "string"
}
},
"cryptographic_suites_supported": {
"description": "OpenID Connect Verifiable Credentials Cryptographic Suites Supported\n\nContains a list of cryptographic suites methods supported for signing the proof.",
"type": "array",
"items": {
"type": "string"
}
},
"format": {
"description": "OpenID Connect Verifiable Credentials Format\n\nContains the format that is supported by this authorization server.",
"type": "string"
},
"types": {
"description": "OpenID Connect Verifiable Credentials Types\n\nContains the types of verifiable credentials supported.",
"type": "array",
"items": {
"type": "string"
}
}
}
},
"errorOAuth2": {
"description": "Error",
"type": "object",
"properties": {
"error": {
"description": "Error",
"type": "string"
},
"error_debug": {
"description": "Error Debug Information\n\nOnly available in dev mode.",
"type": "string"
},
"error_description": {
"description": "Error Description",
"type": "string"
},
"error_hint": {
"description": "Error Hint\n\nHelps the user identify the error cause.",
"type": "string",
"example": "The redirect URL is not allowed."
},
"status_code": {
"description": "HTTP Status Code",
"type": "integer",
"format": "int64",
"example": 401
}
}
},
"genericError": {
"type": "object",
"required": [
"message"
],
"properties": {
"code": {
"description": "The status code",
"type": "integer",
"format": "int64",
"example": 404
},
"debug": {
"description": "Debug information\n\nThis field is often not exposed to protect against leaking\nsensitive information.",
"type": "string",
"example": "SQL field \"foo\" is not a bool."
},
"details": {
"description": "Further error details",
"type": "object",
"additionalProperties": {}
},
"id": {
"description": "The error ID\n\nUseful when trying to identify various errors in application logic.",
"type": "string"
},
"message": {
"description": "Error message\n\nThe error's message.",
"type": "string",
"example": "The resource could not be found"
},
"reason": {
"description": "A human-readable reason for the error",
"type": "string",
"example": "User with ID 1234 does not exist."
},
"request": {
"description": "The request ID\n\nThe request ID is often exposed internally in order to trace\nerrors across service architectures. This is often a UUID.",
"type": "string",
"example": "d7ef54b1-ec15-46e6-bccb-524b82c035e6"
},
"status": {
"description": "The status description",
"type": "string",
"example": "Not Found"
}
}
},
"healthNotReadyStatus": {
"type": "object",
"properties": {
"errors": {
"description": "Errors contains a list of errors that caused the not ready status.",
"type": "object",
"additionalProperties": {
"type": "string"
}
}
}
},
"healthStatus": {
"type": "object",
"properties": {
"status": {
"description": "Status always contains \"ok\".",
"type": "string"
}
}
},
"introspectedOAuth2Token": {
"description": "Introspection contains an access token's session data as specified by\n[IETF RFC 7662](https://tools.ietf.org/html/rfc7662)",
"type": "object",
"required": [
"active"
],
"properties": {
"active": {
"description": "Active is a boolean indicator of whether or not the presented token\nis currently active. The specifics of a token's \"active\" state\nwill vary depending on the implementation of the authorization\nserver and the information it keeps about its tokens, but a \"true\"\nvalue return for the \"active\" property will generally indicate\nthat a given token has been issued by this authorization server,\nhas not been revoked by the resource owner, and is within its\ngiven time window of validity (e.g., after its issuance time and\nbefore its expiration time).",
"type": "boolean"
},
"aud": {
"description": "Audience contains a list of the token's intended audiences.",
"type": "array",
"items": {
"type": "string"
}
},
"client_id": {
"description": "ID is aclient identifier for the OAuth 2.0 client that\nrequested this token.",
"type": "string"
},
"exp": {
"description": "Expires at is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token will expire.",
"type": "integer",
"format": "int64"
},
"ext": {
"description": "Extra is arbitrary data set by the session.",
"type": "object",
"additionalProperties": {}
},
"iat": {
"description": "Issued at is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token was\noriginally issued.",
"type": "integer",
"format": "int64"
},
"iss": {
"description": "IssuerURL is a string representing the issuer of this token",
"type": "string"
},
"nbf": {
"description": "NotBefore is an integer timestamp, measured in the number of seconds\nsince January 1 1970 UTC, indicating when this token is not to be\nused before.",
"type": "integer",
"format": "int64"
},
"obfuscated_subject": {
"description": "ObfuscatedSubject is set when the subject identifier algorithm was set to \"pairwise\" during authorization.\nIt is the `sub` value of the ID Token that was issued.",
"type": "string"
},
"scope": {
"description": "Scope is a JSON string containing a space-separated list of\nscopes associated with this token.",
"type": "string"
},
"sub": {
"description": "Subject of the token, as defined in JWT [RFC7519].\nUsually a machine-readable identifier of the resource owner who\nauthorized this token.",
"type": "string"
},
"token_type": {
"description": "TokenType is the introspected token's type, typically `Bearer`.",
"type": "string"
},
"token_use": {
"description": "TokenUse is the introspected token's use, for example `access_token` or `refresh_token`.",
"type": "string"
},
"username": {
"description": "Username is a human-readable identifier for the resource owner who\nauthorized this token.",
"type": "string"
}
}
},
"jsonPatch": {
"description": "A JSONPatch document as defined by RFC 6902",
"type": "object",
"required": [
"op",
"path"
],
"properties": {
"from": {
"description": "This field is used together with operation \"move\" and uses JSON Pointer notation.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"type": "string",
"example": "/name"
},
"op": {
"description": "The operation to be performed. One of \"add\", \"remove\", \"replace\", \"move\", \"copy\", or \"test\".",
"type": "string",
"example": "replace"
},
"path": {
"description": "The path to the target path. Uses JSON pointer notation.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"type": "string",
"example": "/name"
},
"value": {
"description": "The value to be used within the operations.\n\nLearn more [about JSON Pointers](https://datatracker.ietf.org/doc/html/rfc6901#section-5).",
"example": "foobar"
}
}
},
"jsonPatchDocument": {
"description": "A JSONPatchDocument request",
"type": "array",
"items": {
"$ref": "#/definitions/jsonPatch"
}
},
"jsonWebKey": {
"type": "object",
"required": [
"use",
"kty",
"kid",
"alg"
],
"properties": {
"alg": {
"description": "The \"alg\" (algorithm) parameter identifies the algorithm intended for\nuse with the key. The values used should either be registered in the\nIANA \"JSON Web Signature and Encryption Algorithms\" registry\nestablished by [JWA] or be a value that contains a Collision-\nResistant Name.",
"type": "string",
"example": "RS256"
},
"crv": {
"type": "string",
"example": "P-256"
},
"d": {
"type": "string",
"example": "T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE"
},
"dp": {
"type": "string",
"example": "G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0"
},
"dq": {
"type": "string",
"example": "s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk"
},
"e": {
"type": "string",
"example": "AQAB"
},
"k": {
"type": "string",
"example": "GawgguFyGrWKav7AX4VKUg"
},
"kid": {
"description": "The \"kid\" (key ID) parameter is used to match a specific key. This\nis used, for instance, to choose among a set of keys within a JWK Set\nduring key rollover. The structure of the \"kid\" value is\nunspecified. When \"kid\" values are used within a JWK Set, different\nkeys within the JWK Set SHOULD use distinct \"kid\" values. (One\nexample in which different keys might use the same \"kid\" value is if\nthey have different \"kty\" (key type) values but are considered to be\nequivalent alternatives by the application using them.) The \"kid\"\nvalue is a case-sensitive string.",
"type": "string",
"example": "1603dfe0af8f4596"
},
"kty": {
"description": "The \"kty\" (key type) parameter identifies the cryptographic algorithm\nfamily used with the key, such as \"RSA\" or \"EC\". \"kty\" values should\neither be registered in the IANA \"JSON Web Key Types\" registry\nestablished by [JWA] or be a value that contains a Collision-\nResistant Name. The \"kty\" value is a case-sensitive string.",
"type": "string",
"example": "RSA"
},
"n": {
"type": "string",
"example": "vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0"
},
"p": {
"type": "string",
"example": "6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ"
},
"q": {
"type": "string",
"example": "0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ"
},
"qi": {
"type": "string",
"example": "GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU"
},
"use": {
"description": "Use (\"public key use\") identifies the intended use of\nthe public key. The \"use\" parameter is employed to indicate whether\na public key is used for encrypting data or verifying the signature\non data. Values are commonly \"sig\" (signature) or \"enc\" (encryption).",
"type": "string",
"example": "sig"
},
"x": {
"type": "string",
"example": "f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU"
},
"x5c": {
"description": "The \"x5c\" (X.509 certificate chain) parameter contains a chain of one\nor more PKIX certificates [RFC5280]. The certificate chain is\nrepresented as a JSON array of certificate value strings. Each\nstring in the array is a base64-encoded (Section 4 of [RFC4648] --\nnot base64url-encoded) DER [ITU.X690.1994] PKIX certificate value.\nThe PKIX certificate containing the key value MUST be the first\ncertificate.",
"type": "array",
"items": {
"type": "string"
}
},
"y": {
"type": "string",
"example": "x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0"
}
}
},
"jsonWebKeySet": {
"description": "JSON Web Key Set",
"type": "object",
"properties": {
"keys": {
"description": "List of JSON Web Keys\n\nThe value of the \"keys\" parameter is an array of JSON Web Key (JWK)\nvalues. By default, the order of the JWK values within the array does\nnot imply an order of preference among them, although applications\nof JWK Sets can choose to assign a meaning to the order for their\npurposes, if desired.",
"type": "array",
"items": {
"$ref": "#/definitions/jsonWebKey"
}
}
}
},
"nullTime": {
"type": "string",
"format": "date-time",
"title": "NullTime implements sql.NullTime functionality."
},
"oAuth2Client": {
"description": "OAuth 2.0 Clients are used to perform OAuth 2.0 and OpenID Connect flows. Usually, OAuth 2.0 clients are\ngenerated for applications which want to consume your OAuth 2.0 or OpenID Connect capabilities.",
"type": "object",
"title": "OAuth 2.0 Client",
"properties": {
"access_token_strategy": {
"description": "OAuth 2.0 Access Token Strategy\n\nAccessTokenStrategy is the strategy used to generate access tokens.\nValid options are `jwt` and `opaque`. `jwt` is a bad idea, see https://www.ory.sh/docs/hydra/advanced#json-web-tokens\nSetting the stragegy here overrides the global setting in `strategies.access_token`.",
"type": "string"
},
"allowed_cors_origins": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"audience": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"authorization_code_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"authorization_code_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"authorization_code_grant_refresh_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"backchannel_logout_session_required": {
"description": "OpenID Connect Back-Channel Logout Session Required\n\nBoolean value specifying whether the RP requires that a sid (session ID) Claim be included in the Logout\nToken to identify the RP session with the OP when the backchannel_logout_uri is used.\nIf omitted, the default value is false.",
"type": "boolean"
},
"backchannel_logout_uri": {
"description": "OpenID Connect Back-Channel Logout URI\n\nRP URL that will cause the RP to log itself out when sent a Logout Token by the OP.",
"type": "string"
},
"client_credentials_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"client_id": {
"description": "OAuth 2.0 Client ID\n\nThe ID is autogenerated and immutable.",
"type": "string"
},
"client_name": {
"description": "OAuth 2.0 Client Name\n\nThe human-readable name of the client to be presented to the\nend-user during authorization.",
"type": "string"
},
"client_secret": {
"description": "OAuth 2.0 Client Secret\n\nThe secret will be included in the create request as cleartext, and then\nnever again. The secret is kept in hashed format and is not recoverable once lost.",
"type": "string"
},
"client_secret_expires_at": {
"description": "OAuth 2.0 Client Secret Expires At\n\nThe field is currently not supported and its value is always 0.",
"type": "integer",
"format": "int64"
},
"client_uri": {
"description": "OAuth 2.0 Client URI\n\nClientURI is a URL string of a web page providing information about the client.\nIf present, the server SHOULD display this URL to the end-user in\na clickable fashion.",
"type": "string"
},
"contacts": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"created_at": {
"description": "OAuth 2.0 Client Creation Date\n\nCreatedAt returns the timestamp of the client's creation.",
"type": "string",
"format": "date-time"
},
"frontchannel_logout_session_required": {
"description": "OpenID Connect Front-Channel Logout Session Required\n\nBoolean value specifying whether the RP requires that iss (issuer) and sid (session ID) query parameters be\nincluded to identify the RP session with the OP when the frontchannel_logout_uri is used.\nIf omitted, the default value is false.",
"type": "boolean"
},
"frontchannel_logout_uri": {
"description": "OpenID Connect Front-Channel Logout URI\n\nRP URL that will cause the RP to log itself out when rendered in an iframe by the OP. An iss (issuer) query\nparameter and a sid (session ID) query parameter MAY be included by the OP to enable the RP to validate the\nrequest and to determine which of the potentially multiple sessions is to be logged out; if either is\nincluded, both MUST be.",
"type": "string"
},
"grant_types": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"implicit_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"implicit_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"jwks": {
"description": "OAuth 2.0 Client JSON Web Key Set\n\nClient's JSON Web Key Set [JWK] document, passed by value. The semantics of the jwks parameter are the same as\nthe jwks_uri parameter, other than that the JWK Set is passed by value, rather than by reference. This parameter\nis intended only to be used by Clients that, for some reason, are unable to use the jwks_uri parameter, for\ninstance, by native applications that might not have a location to host the contents of the JWK Set. If a Client\ncan use jwks_uri, it MUST NOT use jwks. One significant downside of jwks is that it does not enable key rotation\n(which jwks_uri does, as described in Section 10 of OpenID Connect Core 1.0 [OpenID.Core]). The jwks_uri and jwks\nparameters MUST NOT be used together."
},
"jwks_uri": {
"description": "OAuth 2.0 Client JSON Web Key Set URL\n\nURL for the Client's JSON Web Key Set [JWK] document. If the Client signs requests to the Server, it contains\nthe signing key(s) the Server uses to validate signatures from the Client. The JWK Set MAY also contain the\nClient's encryption keys(s), which are used by the Server to encrypt responses to the Client. When both signing\nand encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all keys in the referenced\nJWK Set to indicate each key's intended usage. Although some algorithms allow the same key to be used for both\nsignatures and encryption, doing so is NOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used\nto provide X.509 representations of keys provided. When used, the bare key values MUST still be present and MUST\nmatch those in the certificate.",
"type": "string"
},
"jwt_bearer_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"logo_uri": {
"description": "OAuth 2.0 Client Logo URI\n\nA URL string referencing the client's logo.",
"type": "string"
},
"metadata": {
"$ref": "#/definitions/JSONRawMessage"
},
"owner": {
"description": "OAuth 2.0 Client Owner\n\nOwner is a string identifying the owner of the OAuth 2.0 Client.",
"type": "string"
},
"policy_uri": {
"description": "OAuth 2.0 Client Policy URI\n\nPolicyURI is a URL string that points to a human-readable privacy policy document\nthat describes how the deployment organization collects, uses,\nretains, and discloses personal data.",
"type": "string"
},
"post_logout_redirect_uris": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"redirect_uris": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"refresh_token_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"refresh_token_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"refresh_token_grant_refresh_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"registration_access_token": {
"description": "OpenID Connect Dynamic Client Registration Access Token\n\nRegistrationAccessToken can be used to update, get, or delete the OAuth2 Client. It is sent when creating a client\nusing Dynamic Client Registration.",
"type": "string"
},
"registration_client_uri": {
"description": "OpenID Connect Dynamic Client Registration URL\n\nRegistrationClientURI is the URL used to update, get, or delete the OAuth2 Client.",
"type": "string"
},
"request_object_signing_alg": {
"description": "OpenID Connect Request Object Signing Algorithm\n\nJWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects\nfrom this Client MUST be rejected, if not signed with this algorithm.",
"type": "string"
},
"request_uris": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"response_types": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"scope": {
"description": "OAuth 2.0 Client Scope\n\nScope is a string containing a space-separated list of scope values (as\ndescribed in Section 3.3 of OAuth 2.0 [RFC6749]) that the client\ncan use when requesting access tokens.",
"type": "string",
"example": "scope1 scope-2 scope.3 scope:4"
},
"sector_identifier_uri": {
"description": "OpenID Connect Sector Identifier URI\n\nURL using the https scheme to be used in calculating Pseudonymous Identifiers by the OP. The URL references a\nfile with a single JSON array of redirect_uri values.",
"type": "string"
},
"skip_consent": {
"description": "SkipConsent skips the consent screen for this client. This field can only\nbe set from the admin API.",
"type": "boolean"
},
"subject_type": {
"description": "OpenID Connect Subject Type\n\nThe `subject_types_supported` Discovery parameter contains a\nlist of the supported subject_type values for this server. Valid types include `pairwise` and `public`.",
"type": "string"
},
"token_endpoint_auth_method": {
"description": "OAuth 2.0 Token Endpoint Authentication Method\n\nRequested Client Authentication method for the Token Endpoint. The options are:\n\n`client_secret_basic`: (default) Send `client_id` and `client_secret` as `application/x-www-form-urlencoded` encoded in the HTTP Authorization header.\n`client_secret_post`: Send `client_id` and `client_secret` as `application/x-www-form-urlencoded` in the HTTP body.\n`private_key_jwt`: Use JSON Web Tokens to authenticate the client.\n`none`: Used for public clients (native apps, mobile apps) which can not have secrets.",
"type": "string",
"default": "client_secret_basic"
},
"token_endpoint_auth_signing_alg": {
"description": "OAuth 2.0 Token Endpoint Signing Algorithm\n\nRequested Client Authentication signing algorithm for the Token Endpoint.",
"type": "string"
},
"tos_uri": {
"description": "OAuth 2.0 Client Terms of Service URI\n\nA URL string pointing to a human-readable terms of service\ndocument for the client that describes a contractual relationship\nbetween the end-user and the client that the end-user accepts when\nauthorizing the client.",
"type": "string"
},
"updated_at": {
"description": "OAuth 2.0 Client Last Update Date\n\nUpdatedAt returns the timestamp of the last update.",
"type": "string",
"format": "date-time"
},
"userinfo_signed_response_alg": {
"description": "OpenID Connect Request Userinfo Signed Response Algorithm\n\nJWS alg algorithm [JWA] REQUIRED for signing UserInfo Responses. If this is specified, the response will be JWT\n[JWT] serialized, and signed using JWS. The default, if omitted, is for the UserInfo Response to return the Claims\nas a UTF-8 encoded JSON object using the application/json content-type.",
"type": "string"
}
}
},
"oAuth2ClientTokenLifespans": {
"description": "Lifespans of different token types issued for this OAuth 2.0 Client.",
"type": "object",
"title": "OAuth 2.0 Client Token Lifespans",
"properties": {
"authorization_code_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"authorization_code_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"authorization_code_grant_refresh_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"client_credentials_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"implicit_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"implicit_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"jwt_bearer_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"refresh_token_grant_access_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"refresh_token_grant_id_token_lifespan": {
"$ref": "#/definitions/NullDuration"
},
"refresh_token_grant_refresh_token_lifespan": {
"$ref": "#/definitions/NullDuration"
}
}
},
"oAuth2ConsentRequest": {
"type": "object",
"title": "Contains information on an ongoing consent request.",
"required": [
"challenge"
],
"properties": {
"acr": {
"description": "ACR represents the Authentication AuthorizationContext Class Reference value for this authentication session. You can use it\nto express that, for example, a user authenticated using two factor authentication.",
"type": "string"
},
"amr": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"challenge": {
"description": "ID is the identifier (\"authorization challenge\") of the consent authorization request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/definitions/oAuth2Client"
},
"context": {
"$ref": "#/definitions/JSONRawMessage"
},
"login_challenge": {
"description": "LoginChallenge is the login challenge this consent challenge belongs to. It can be used to associate\na login and consent request in the login \u0026 consent app.",
"type": "string"
},
"login_session_id": {
"description": "LoginSessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)\nthis ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)\nthis will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back-\nchannel logout. It's value can generally be used to associate consecutive login requests by a certain user.",
"type": "string"
},
"oidc_context": {
"$ref": "#/definitions/oAuth2ConsentRequestOpenIDConnectContext"
},
"request_url": {
"description": "RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which\ninitiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but\nmight come in handy if you want to deal with additional request parameters.",
"type": "string"
},
"requested_access_token_audience": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"requested_scope": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"skip": {
"description": "Skip, if true, implies that the client has requested the same scopes from the same user previously.\nIf true, you must not ask the user to grant the requested scopes. You must however either allow or deny the\nconsent request using the usual API call.",
"type": "boolean"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope\nrequested by the OAuth 2.0 client.",
"type": "string"
}
}
},
"oAuth2ConsentRequestOpenIDConnectContext": {
"type": "object",
"title": "Contains optional information about the OpenID Connect request.",
"properties": {
"acr_values": {
"description": "ACRValues is the Authentication AuthorizationContext Class Reference requested in the OAuth 2.0 Authorization request.\nIt is a parameter defined by OpenID Connect and expresses which level of authentication (e.g. 2FA) is required.\n\nOpenID Connect defines it as follows:\n\u003e Requested Authentication AuthorizationContext Class Reference values. Space-separated string that specifies the acr values\nthat the Authorization Server is being requested to use for processing this Authentication Request, with the\nvalues appearing in order of preference. The Authentication AuthorizationContext Class satisfied by the authentication\nperformed is returned as the acr Claim Value, as specified in Section 2. The acr Claim is requested as a\nVoluntary Claim by this parameter.",
"type": "array",
"items": {
"type": "string"
}
},
"display": {
"description": "Display is a string value that specifies how the Authorization Server displays the authentication and consent user interface pages to the End-User.\nThe defined values are:\npage: The Authorization Server SHOULD display the authentication and consent UI consistent with a full User Agent page view. If the display parameter is not specified, this is the default display mode.\npopup: The Authorization Server SHOULD display the authentication and consent UI consistent with a popup User Agent window. The popup User Agent window should be of an appropriate size for a login-focused dialog and should not obscure the entire window that it is popping up over.\ntouch: The Authorization Server SHOULD display the authentication and consent UI consistent with a device that leverages a touch interface.\nwap: The Authorization Server SHOULD display the authentication and consent UI consistent with a \"feature phone\" type display.\n\nThe Authorization Server MAY also attempt to detect the capabilities of the User Agent and present an appropriate display.",
"type": "string"
},
"id_token_hint_claims": {
"description": "IDTokenHintClaims are the claims of the ID Token previously issued by the Authorization Server being passed as a hint about the\nEnd-User's current or past authenticated session with the Client.",
"type": "object",
"additionalProperties": {}
},
"login_hint": {
"description": "LoginHint hints about the login identifier the End-User might use to log in (if necessary).\nThis hint can be used by an RP if it first asks the End-User for their e-mail address (or other identifier)\nand then wants to pass that value as a hint to the discovered authorization service. This value MAY also be a\nphone number in the format specified for the phone_number Claim. The use of this parameter is optional.",
"type": "string"
},
"ui_locales": {
"description": "UILocales is the End-User'id preferred languages and scripts for the user interface, represented as a\nspace-separated list of BCP47 [RFC5646] language tag values, ordered by preference. For instance, the value\n\"fr-CA fr en\" represents a preference for French as spoken in Canada, then French (without a region designation),\nfollowed by English (without a region designation). An error SHOULD NOT result if some or all of the requested\nlocales are not supported by the OpenID Provider.",
"type": "array",
"items": {
"type": "string"
}
}
}
},
"oAuth2ConsentSession": {
"description": "A completed OAuth 2.0 Consent Session.",
"type": "object",
"title": "OAuth 2.0 Consent Session",
"properties": {
"consent_request": {
"$ref": "#/definitions/oAuth2ConsentRequest"
},
"grant_access_token_audience": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"grant_scope": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"handled_at": {
"$ref": "#/definitions/nullTime"
},
"remember": {
"description": "Remember Consent\n\nRemember, if set to true, tells ORY Hydra to remember this consent authorization and reuse it if the same\nclient asks the same user for the same, or a subset of, scope.",
"type": "boolean"
},
"remember_for": {
"description": "Remember Consent For\n\nRememberFor sets how long the consent authorization should be remembered for in seconds. If set to `0`, the\nauthorization will be remembered indefinitely.",
"type": "integer",
"format": "int64"
},
"session": {
"$ref": "#/definitions/acceptOAuth2ConsentRequestSession"
}
}
},
"oAuth2ConsentSessions": {
"description": "List of OAuth 2.0 Consent Sessions",
"type": "array",
"items": {
"$ref": "#/definitions/oAuth2ConsentSession"
}
},
"oAuth2LoginRequest": {
"type": "object",
"title": "Contains information on an ongoing login request.",
"required": [
"challenge",
"requested_scope",
"requested_access_token_audience",
"skip",
"subject",
"client",
"request_url"
],
"properties": {
"challenge": {
"description": "ID is the identifier (\"login challenge\") of the login request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/definitions/oAuth2Client"
},
"oidc_context": {
"$ref": "#/definitions/oAuth2ConsentRequestOpenIDConnectContext"
},
"request_url": {
"description": "RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which\ninitiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but\nmight come in handy if you want to deal with additional request parameters.",
"type": "string"
},
"requested_access_token_audience": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"requested_scope": {
"$ref": "#/definitions/StringSliceJSONFormat"
},
"session_id": {
"description": "SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag)\nthis ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false)\nthis will be a new random value. This value is used as the \"sid\" parameter in the ID Token and in OIDC Front-/Back-\nchannel logout. It's value can generally be used to associate consecutive login requests by a certain user.",
"type": "string"
},
"skip": {
"description": "Skip, if true, implies that the client has requested the same scopes from the same user previously.\nIf true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.\n\nThis feature allows you to update / set session information.",
"type": "boolean"
},
"subject": {
"description": "Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope\nrequested by the OAuth 2.0 client. If this value is set and `skip` is true, you MUST include this subject type\nwhen accepting the login request, or the request will fail.",
"type": "string"
}
}
},
"oAuth2LogoutRequest": {
"type": "object",
"title": "Contains information about an ongoing logout request.",
"properties": {
"challenge": {
"description": "Challenge is the identifier (\"logout challenge\") of the logout authentication request. It is used to\nidentify the session.",
"type": "string"
},
"client": {
"$ref": "#/definitions/oAuth2Client"
},
"request_url": {
"description": "RequestURL is the original Logout URL requested.",
"type": "string"
},
"rp_initiated": {
"description": "RPInitiated is set to true if the request was initiated by a Relying Party (RP), also known as an OAuth 2.0 Client.",
"type": "boolean"
},
"sid": {
"description": "SessionID is the login session ID that was requested to log out.",
"type": "string"
},
"subject": {
"description": "Subject is the user for whom the logout was request.",
"type": "string"
}
}
},
"oAuth2RedirectTo": {
"description": "Contains a redirect URL used to complete a login, consent, or logout request.",
"type": "object",
"title": "OAuth 2.0 Redirect Browser To",
"required": [
"redirect_to"
],
"properties": {
"redirect_to": {
"description": "RedirectURL is the URL which you should redirect the user's browser to once the authentication process is completed.",
"type": "string"
}
}
},
"oAuth2TokenExchange": {
"description": "OAuth2 Token Exchange Result",
"type": "object",
"properties": {
"access_token": {
"description": "The access token issued by the authorization server.",
"type": "string"
},
"expires_in": {
"description": "The lifetime in seconds of the access token. For\nexample, the value \"3600\" denotes that the access token will\nexpire in one hour from the time the response was generated.",
"type": "integer",
"format": "int64"
},
"id_token": {
"description": "To retrieve a refresh token request the id_token scope.",
"type": "integer",
"format": "int64"
},
"refresh_token": {
"description": "The refresh token, which can be used to obtain new\naccess tokens. To retrieve it add the scope \"offline\" to your access token request.",
"type": "string"
},
"scope": {
"description": "The scope of the access token",
"type": "string"
},
"token_type": {
"description": "The type of the token issued",
"type": "string"
}
}
},
"oidcConfiguration": {
"description": "Includes links to several endpoints (for example `/oauth2/token`) and exposes information on supported signature algorithms\namong others.",
"type": "object",
"title": "OpenID Connect Discovery Metadata",
"required": [
"issuer",
"authorization_endpoint",
"token_endpoint",
"jwks_uri",
"subject_types_supported",
"response_types_supported",
"id_token_signing_alg_values_supported",
"id_token_signed_response_alg",
"userinfo_signed_response_alg"
],
"properties": {
"authorization_endpoint": {
"description": "OAuth 2.0 Authorization Endpoint URL",
"type": "string",
"example": "https://playground.ory.sh/ory-hydra/public/oauth2/auth"
},
"backchannel_logout_session_supported": {
"description": "OpenID Connect Back-Channel Logout Session Required\n\nBoolean value specifying whether the OP can pass a sid (session ID) Claim in the Logout Token to identify the RP\nsession with the OP. If supported, the sid Claim is also included in ID Tokens issued by the OP",
"type": "boolean"
},
"backchannel_logout_supported": {
"description": "OpenID Connect Back-Channel Logout Supported\n\nBoolean value specifying whether the OP supports back-channel logout, with true indicating support.",
"type": "boolean"
},
"claims_parameter_supported": {
"description": "OpenID Connect Claims Parameter Parameter Supported\n\nBoolean value specifying whether the OP supports use of the claims parameter, with true indicating support.",
"type": "boolean"
},
"claims_supported": {
"description": "OpenID Connect Supported Claims\n\nJSON array containing a list of the Claim Names of the Claims that the OpenID Provider MAY be able to supply\nvalues for. Note that for privacy or other reasons, this might not be an exhaustive list.",
"type": "array",
"items": {
"type": "string"
}
},
"code_challenge_methods_supported": {
"description": "OAuth 2.0 PKCE Supported Code Challenge Methods\n\nJSON array containing a list of Proof Key for Code Exchange (PKCE) [RFC7636] code challenge methods supported\nby this authorization server.",
"type": "array",
"items": {
"type": "string"
}
},
"credentials_endpoint_draft_00": {
"description": "OpenID Connect Verifiable Credentials Endpoint\n\nContains the URL of the Verifiable Credentials Endpoint.",
"type": "string"
},
"credentials_supported_draft_00": {
"description": "OpenID Connect Verifiable Credentials Supported\n\nJSON array containing a list of the Verifiable Credentials supported by this authorization server.",
"type": "array",
"items": {
"$ref": "#/definitions/credentialSupportedDraft00"
}
},
"end_session_endpoint": {
"description": "OpenID Connect End-Session Endpoint\n\nURL at the OP to which an RP can perform a redirect to request that the End-User be logged out at the OP.",
"type": "string"
},
"frontchannel_logout_session_supported": {
"description": "OpenID Connect Front-Channel Logout Session Required\n\nBoolean value specifying whether the OP can pass iss (issuer) and sid (session ID) query parameters to identify\nthe RP session with the OP when the frontchannel_logout_uri is used. If supported, the sid Claim is also\nincluded in ID Tokens issued by the OP.",
"type": "boolean"
},
"frontchannel_logout_supported": {
"description": "OpenID Connect Front-Channel Logout Supported\n\nBoolean value specifying whether the OP supports HTTP-based logout, with true indicating support.",
"type": "boolean"
},
"grant_types_supported": {
"description": "OAuth 2.0 Supported Grant Types\n\nJSON array containing a list of the OAuth 2.0 Grant Type values that this OP supports.",
"type": "array",
"items": {
"type": "string"
}
},
"id_token_signed_response_alg": {
"description": "OpenID Connect Default ID Token Signing Algorithms\n\nAlgorithm used to sign OpenID Connect ID Tokens.",
"type": "array",
"items": {
"type": "string"
}
},
"id_token_signing_alg_values_supported": {
"description": "OpenID Connect Supported ID Token Signing Algorithms\n\nJSON array containing a list of the JWS signing algorithms (alg values) supported by the OP for the ID Token\nto encode the Claims in a JWT.",
"type": "array",
"items": {
"type": "string"
}
},
"issuer": {
"description": "OpenID Connect Issuer URL\n\nAn URL using the https scheme with no query or fragment component that the OP asserts as its IssuerURL Identifier.\nIf IssuerURL discovery is supported , this value MUST be identical to the issuer value returned\nby WebFinger. This also MUST be identical to the iss Claim value in ID Tokens issued from this IssuerURL.",
"type": "string",
"example": "https://playground.ory.sh/ory-hydra/public/"
},
"jwks_uri": {
"description": "OpenID Connect Well-Known JSON Web Keys URL\n\nURL of the OP's JSON Web Key Set [JWK] document. This contains the signing key(s) the RP uses to validate\nsignatures from the OP. The JWK Set MAY also contain the Server's encryption key(s), which are used by RPs\nto encrypt requests to the Server. When both signing and encryption keys are made available, a use (Key Use)\nparameter value is REQUIRED for all keys in the referenced JWK Set to indicate each key's intended usage.\nAlthough some algorithms allow the same key to be used for both signatures and encryption, doing so is\nNOT RECOMMENDED, as it is less secure. The JWK x5c parameter MAY be used to provide X.509 representations of\nkeys provided. When used, the bare key values MUST still be present and MUST match those in the certificate.",
"type": "string",
"example": "https://{slug}.projects.oryapis.com/.well-known/jwks.json"
},
"registration_endpoint": {
"description": "OpenID Connect Dynamic Client Registration Endpoint URL",
"type": "string",
"example": "https://playground.ory.sh/ory-hydra/admin/client"
},
"request_object_signing_alg_values_supported": {
"description": "OpenID Connect Supported Request Object Signing Algorithms\n\nJSON array containing a list of the JWS signing algorithms (alg values) supported by the OP for Request Objects,\nwhich are described in Section 6.1 of OpenID Connect Core 1.0 [OpenID.Core]. These algorithms are used both when\nthe Request Object is passed by value (using the request parameter) and when it is passed by reference\n(using the request_uri parameter).",
"type": "array",
"items": {
"type": "string"
}
},
"request_parameter_supported": {
"description": "OpenID Connect Request Parameter Supported\n\nBoolean value specifying whether the OP supports use of the request parameter, with true indicating support.",
"type": "boolean"
},
"request_uri_parameter_supported": {
"description": "OpenID Connect Request URI Parameter Supported\n\nBoolean value specifying whether the OP supports use of the request_uri parameter, with true indicating support.",
"type": "boolean"
},
"require_request_uri_registration": {
"description": "OpenID Connect Requires Request URI Registration\n\nBoolean value specifying whether the OP requires any request_uri values used to be pre-registered\nusing the request_uris registration parameter.",
"type": "boolean"
},
"response_modes_supported": {
"description": "OAuth 2.0 Supported Response Modes\n\nJSON array containing a list of the OAuth 2.0 response_mode values that this OP supports.",
"type": "array",
"items": {
"type": "string"
}
},
"response_types_supported": {
"description": "OAuth 2.0 Supported Response Types\n\nJSON array containing a list of the OAuth 2.0 response_type values that this OP supports. Dynamic OpenID\nProviders MUST support the code, id_token, and the token id_token Response Type values.",
"type": "array",
"items": {
"type": "string"
}
},
"revocation_endpoint": {
"description": "OAuth 2.0 Token Revocation URL\n\nURL of the authorization server's OAuth 2.0 revocation endpoint.",
"type": "string"
},
"scopes_supported": {
"description": "OAuth 2.0 Supported Scope Values\n\nJSON array containing a list of the OAuth 2.0 [RFC6749] scope values that this server supports. The server MUST\nsupport the openid scope value. Servers MAY choose not to advertise some supported scope values even when this parameter is used",
"type": "array",
"items": {
"type": "string"
}
},
"subject_types_supported": {
"description": "OpenID Connect Supported Subject Types\n\nJSON array containing a list of the Subject Identifier types that this OP supports. Valid types include\npairwise and public.",
"type": "array",
"items": {
"type": "string"
}
},
"token_endpoint": {
"description": "OAuth 2.0 Token Endpoint URL",
"type": "string",
"example": "https://playground.ory.sh/ory-hydra/public/oauth2/token"
},
"token_endpoint_auth_methods_supported": {
"description": "OAuth 2.0 Supported Client Authentication Methods\n\nJSON array containing a list of Client Authentication methods supported by this Token Endpoint. The options are\nclient_secret_post, client_secret_basic, client_secret_jwt, and private_key_jwt, as described in Section 9 of OpenID Connect Core 1.0",
"type": "array",
"items": {
"type": "string"
}
},
"userinfo_endpoint": {
"description": "OpenID Connect Userinfo URL\n\nURL of the OP's UserInfo Endpoint.",
"type": "string"
},
"userinfo_signed_response_alg": {
"description": "OpenID Connect User Userinfo Signing Algorithm\n\nAlgorithm used to sign OpenID Connect Userinfo Responses.",
"type": "array",
"items": {
"type": "string"
}
},
"userinfo_signing_alg_values_supported": {
"description": "OpenID Connect Supported Userinfo Signing Algorithm\n\nJSON array containing a list of the JWS [JWS] signing algorithms (alg values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT].",
"type": "array",
"items": {
"type": "string"
}
}
}
},
"oidcUserInfo": {
"description": "OpenID Connect Userinfo",
"type": "object",
"properties": {
"birthdate": {
"description": "End-User's birthday, represented as an ISO 8601:2004 [ISO8601‑2004] YYYY-MM-DD format. The year MAY be 0000, indicating that it is omitted. To represent only the year, YYYY format is allowed. Note that depending on the underlying platform's date related function, providing just year can result in varying month and day, so the implementers need to take this factor into account to correctly process the dates.",
"type": "string"
},
"email": {
"description": "End-User's preferred e-mail address. Its value MUST conform to the RFC 5322 [RFC5322] addr-spec syntax. The RP MUST NOT rely upon this value being unique, as discussed in Section 5.7.",
"type": "string"
},
"email_verified": {
"description": "True if the End-User's e-mail address has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this e-mail address was controlled by the End-User at the time the verification was performed. The means by which an e-mail address is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating.",
"type": "boolean"
},
"family_name": {
"description": "Surname(s) or last name(s) of the End-User. Note that in some cultures, people can have multiple family names or no family name; all can be present, with the names being separated by space characters.",
"type": "string"
},
"gender": {
"description": "End-User's gender. Values defined by this specification are female and male. Other values MAY be used when neither of the defined values are applicable.",
"type": "string"
},
"given_name": {
"description": "Given name(s) or first name(s) of the End-User. Note that in some cultures, people can have multiple given names; all can be present, with the names being separated by space characters.",
"type": "string"
},
"locale": {
"description": "End-User's locale, represented as a BCP47 [RFC5646] language tag. This is typically an ISO 639-1 Alpha-2 [ISO639‑1] language code in lowercase and an ISO 3166-1 Alpha-2 [ISO3166‑1] country code in uppercase, separated by a dash. For example, en-US or fr-CA. As a compatibility note, some implementations have used an underscore as the separator rather than a dash, for example, en_US; Relying Parties MAY choose to accept this locale syntax as well.",
"type": "string"
},
"middle_name": {
"description": "Middle name(s) of the End-User. Note that in some cultures, people can have multiple middle names; all can be present, with the names being separated by space characters. Also note that in some cultures, middle names are not used.",
"type": "string"
},
"name": {
"description": "End-User's full name in displayable form including all name parts, possibly including titles and suffixes, ordered according to the End-User's locale and preferences.",
"type": "string"
},
"nickname": {
"description": "Casual name of the End-User that may or may not be the same as the given_name. For instance, a nickname value of Mike might be returned alongside a given_name value of Michael.",
"type": "string"
},
"phone_number": {
"description": "End-User's preferred telephone number. E.164 [E.164] is RECOMMENDED as the format of this Claim, for example, +1 (425) 555-1212 or +56 (2) 687 2400. If the phone number contains an extension, it is RECOMMENDED that the extension be represented using the RFC 3966 [RFC3966] extension syntax, for example, +1 (604) 555-1234;ext=5678.",
"type": "string"
},
"phone_number_verified": {
"description": "True if the End-User's phone number has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this phone number was controlled by the End-User at the time the verification was performed. The means by which a phone number is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating. When true, the phone_number Claim MUST be in E.164 format and any extensions MUST be represented in RFC 3966 format.",
"type": "boolean"
},
"picture": {
"description": "URL of the End-User's profile picture. This URL MUST refer to an image file (for example, a PNG, JPEG, or GIF image file), rather than to a Web page containing an image. Note that this URL SHOULD specifically reference a profile photo of the End-User suitable for displaying when describing the End-User, rather than an arbitrary photo taken by the End-User.",
"type": "string"
},
"preferred_username": {
"description": "Non-unique shorthand name by which the End-User wishes to be referred to at the RP, such as janedoe or j.doe. This value MAY be any valid JSON string including special characters such as @, /, or whitespace.",
"type": "string"
},
"profile": {
"description": "URL of the End-User's profile page. The contents of this Web page SHOULD be about the End-User.",
"type": "string"
},
"sub": {
"description": "Subject - Identifier for the End-User at the IssuerURL.",
"type": "string"
},
"updated_at": {
"description": "Time the End-User's information was last updated. Its value is a JSON number representing the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the date/time.",
"type": "integer",
"format": "int64"
},
"website": {
"description": "URL of the End-User's Web page or blog. This Web page SHOULD contain information published by the End-User or an organization that the End-User is affiliated with.",
"type": "string"
},
"zoneinfo": {
"description": "String from zoneinfo [zoneinfo] time zone database representing the End-User's time zone. For example, Europe/Paris or America/Los_Angeles.",
"type": "string"
}
}
},
"pagination": {
"type": "object",
"properties": {
"page_size": {
"description": "Items per page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "integer",
"format": "int64",
"default": 250,
"maximum": 1000,
"minimum": 1
},
"page_token": {
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "string",
"default": "1",
"minimum": 1
}
}
},
"paginationHeaders": {
"type": "object",
"properties": {
"link": {
"description": "The link header contains pagination links.\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).\n\nin: header",
"type": "string"
},
"x-total-count": {
"description": "The total number of clients.\n\nin: header",
"type": "string"
}
}
},
"rejectOAuth2Request": {
"type": "object",
"title": "The request payload used to accept a login or consent request.",
"properties": {
"error": {
"description": "The error should follow the OAuth2 error format (e.g. `invalid_request`, `login_required`).\n\nDefaults to `request_denied`.",
"type": "string"
},
"error_debug": {
"description": "Debug contains information to help resolve the problem as a developer. Usually not exposed\nto the public but only in the server logs.",
"type": "string"
},
"error_description": {
"description": "Description of the error in a human readable format.",
"type": "string"
},
"error_hint": {
"description": "Hint to help resolve the error.",
"type": "string"
},
"status_code": {
"description": "Represents the HTTP status code of the error (e.g. 401 or 403)\n\nDefaults to 400",
"type": "integer",
"format": "int64"
}
}
},
"tokenPagination": {
"type": "object",
"properties": {
"page_size": {
"description": "Items per page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "integer",
"format": "int64",
"default": 250,
"maximum": 1000,
"minimum": 1
},
"page_token": {
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "string",
"default": "1",
"minimum": 1
}
}
},
"tokenPaginationHeaders": {
"type": "object",
"properties": {
"link": {
"description": "The link header contains pagination links.\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).\n\nin: header",
"type": "string"
},
"x-total-count": {
"description": "The total number of clients.\n\nin: header",
"type": "string"
}
}
},
"tokenPaginationRequestParameters": {
"description": "The `Link` HTTP header contains multiple links (`first`, `next`, `last`, `previous`) formatted as:\n`\u003chttps://{project-slug}.projects.oryapis.com/admin/clients?page_size={limit}\u0026page_token={offset}\u003e; rel=\"{page}\"`\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "object",
"title": "Pagination Request Parameters",
"properties": {
"page_size": {
"description": "Items per Page\n\nThis is the number of items per page to return.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "integer",
"format": "int64",
"default": 250,
"maximum": 500,
"minimum": 1
},
"page_token": {
"description": "Next Page Token\n\nThe next page token.\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "string",
"default": "1",
"minimum": 1
}
}
},
"tokenPaginationResponseHeaders": {
"description": "The `Link` HTTP header contains multiple links (`first`, `next`, `last`, `previous`) formatted as:\n`\u003chttps://{project-slug}.projects.oryapis.com/admin/clients?page_size={limit}\u0026page_token={offset}\u003e; rel=\"{page}\"`\n\nFor details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).",
"type": "object",
"title": "Pagination Response Header",
"properties": {
"link": {
"description": "The Link HTTP Header\n\nThe `Link` header contains a comma-delimited list of links to the following pages:\n\nfirst: The first page of results.\nnext: The next page of results.\nprev: The previous page of results.\nlast: The last page of results.\n\nPages are omitted if they do not exist. For example, if there is no next page, the `next` link is omitted. Examples:\n\n\u003c/clients?page_size=5\u0026page_token=0\u003e; rel=\"first\",\u003c/clients?page_size=5\u0026page_token=15\u003e; rel=\"next\",\u003c/clients?page_size=5\u0026page_token=5\u003e; rel=\"prev\",\u003c/clients?page_size=5\u0026page_token=20\u003e; rel=\"last\"",
"type": "string"
},
"x-total-count": {
"description": "The X-Total-Count HTTP Header\n\nThe `X-Total-Count` header contains the total number of items in the collection.",
"type": "integer",
"format": "int64"
}
}
},
"trustOAuth2JwtGrantIssuer": {
"description": "Trust OAuth2 JWT Bearer Grant Type Issuer Request Body",
"type": "object",
"required": [
"issuer",
"scope",
"jwk",
"expires_at"
],
"properties": {
"allow_any_subject": {
"description": "The \"allow_any_subject\" indicates that the issuer is allowed to have any principal as the subject of the JWT.",
"type": "boolean"
},
"expires_at": {
"description": "The \"expires_at\" indicates, when grant will expire, so we will reject assertion from \"issuer\" targeting \"subject\".",
"type": "string",
"format": "date-time"
},
"issuer": {
"description": "The \"issuer\" identifies the principal that issued the JWT assertion (same as \"iss\" claim in JWT).",
"type": "string",
"example": "https://jwt-idp.example.com"
},
"jwk": {
"$ref": "#/definitions/jsonWebKey"
},
"scope": {
"description": "The \"scope\" contains list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749])",
"type": "array",
"items": {
"type": "string"
},
"example": [
"openid",
"offline"
]
},
"subject": {
"description": "The \"subject\" identifies the principal that is the subject of the JWT.",
"type": "string",
"example": "[email protected]"
}
}
},
"trustedOAuth2JwtGrantIssuer": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trust Relationship",
"type": "object",
"properties": {
"allow_any_subject": {
"description": "The \"allow_any_subject\" indicates that the issuer is allowed to have any principal as the subject of the JWT.",
"type": "boolean"
},
"created_at": {
"description": "The \"created_at\" indicates, when grant was created.",
"type": "string",
"format": "date-time"
},
"expires_at": {
"description": "The \"expires_at\" indicates, when grant will expire, so we will reject assertion from \"issuer\" targeting \"subject\".",
"type": "string",
"format": "date-time"
},
"id": {
"type": "string",
"example": "9edc811f-4e28-453c-9b46-4de65f00217f"
},
"issuer": {
"description": "The \"issuer\" identifies the principal that issued the JWT assertion (same as \"iss\" claim in JWT).",
"type": "string",
"example": "https://jwt-idp.example.com"
},
"public_key": {
"$ref": "#/definitions/trustedOAuth2JwtGrantJsonWebKey"
},
"scope": {
"description": "The \"scope\" contains list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749])",
"type": "array",
"items": {
"type": "string"
},
"example": [
"openid",
"offline"
]
},
"subject": {
"description": "The \"subject\" identifies the principal that is the subject of the JWT.",
"type": "string",
"example": "[email protected]"
}
}
},
"trustedOAuth2JwtGrantIssuers": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trust Relationships",
"type": "array",
"items": {
"$ref": "#/definitions/trustedOAuth2JwtGrantIssuer"
}
},
"trustedOAuth2JwtGrantJsonWebKey": {
"description": "OAuth2 JWT Bearer Grant Type Issuer Trusted JSON Web Key",
"type": "object",
"properties": {
"kid": {
"description": "The \"key_id\" is key unique identifier (same as kid header in jws/jwt).",
"type": "string",
"example": "123e4567-e89b-12d3-a456-426655440000"
},
"set": {
"description": "The \"set\" is basically a name for a group(set) of keys. Will be the same as \"issuer\" in grant.",
"type": "string",
"example": "https://jwt-idp.example.com"
}
}
},
"unexpectedError": {
"type": "string"
},
"verifiableCredentialPrimingResponse": {
"type": "object",
"title": "VerifiableCredentialPrimingResponse contains the nonce to include in the proof-of-possession JWT.",
"properties": {
"c_nonce": {
"type": "string"
},
"c_nonce_expires_in": {
"type": "integer",
"format": "int64"
},
"error": {
"type": "string"
},
"error_debug": {
"type": "string"
},
"error_description": {
"type": "string"
},
"error_hint": {
"type": "string"
},
"format": {
"type": "string"
},
"status_code": {
"type": "integer",
"format": "int64"
}
}
},
"verifiableCredentialResponse": {
"type": "object",
"title": "VerifiableCredentialResponse contains the verifiable credential.",
"properties": {
"credential_draft_00": {
"type": "string"
},
"format": {
"type": "string"
}
}
},
"version": {
"type": "object",
"properties": {
"version": {
"description": "Version is the service's version.",
"type": "string"
}
}
}
,"UUID":{"type": "string", "format": "uuid4"}},
"responses": {
"emptyResponse": {
"description": "Empty responses are sent when, for example, resources are deleted. The HTTP status code for empty responses is\ntypically 201."
},
"errorOAuth2BadRequest": {
"description": "Bad Request Error Response",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
},
"errorOAuth2Default": {
"description": "Default Error Response",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
},
"errorOAuth2NotFound": {
"description": "Not Found Error Response",
"schema": {
"$ref": "#/definitions/errorOAuth2"
}
},
"listOAuth2Clients": {
"description": "Paginated OAuth2 Client List Response",
"schema": {
"type": "array",
"items": {
"$ref": "#/definitions/oAuth2Client"
}
},
"headers": {
"link": {
"type": "string",
"description": "The Link HTTP Header\n\nThe `Link` header contains a comma-delimited list of links to the following pages:\n\nfirst: The first page of results.\nnext: The next page of results.\nprev: The previous page of results.\nlast: The last page of results.\n\nPages are omitted if they do not exist. For example, if there is no next page, the `next` link is omitted. Examples:\n\n\u003c/clients?page_size=5\u0026page_token=0\u003e; rel=\"first\",\u003c/clients?page_size=5\u0026page_token=15\u003e; rel=\"next\",\u003c/clients?page_size=5\u0026page_token=5\u003e; rel=\"prev\",\u003c/clients?page_size=5\u0026page_token=20\u003e; rel=\"last\""
},
"x-total-count": {
"type": "integer",
"format": "int64",
"description": "The X-Total-Count HTTP Header\n\nThe `X-Total-Count` header contains the total number of items in the collection."
}
}
}
},
"securityDefinitions": {
"basic": {
"type": "basic"
},
"bearer": {
"type": "basic"
},
"oauth2": {
"type": "oauth2",
"flow": "accessCode",
"authorizationUrl": "https://hydra.demo.ory.sh/oauth2/auth",
"tokenUrl": "https://hydra.demo.ory.sh/oauth2/token",
"scopes": {
"offline": "A scope required when requesting refresh tokens (alias for `offline_access`)",
"offline_access": "A scope required when requesting refresh tokens",
"openid": "Request an OpenID Connect ID Token"
}
}
},
"x-forwarded-proto": "string",
"x-request-id": "string"
} |
JSON | hydra/test/conformance/config.json | {
"server": {
"discoveryUrl": "https://hydra:4444/.well-known/openid-configuration"
},
"client": {
"client_name": "oidc-conform"
},
"client2": {
"client_name": "oidc-conform-secondary"
},
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
],
"override": {
"oidcc-scope-profile": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "profile"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-scope-email": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "email"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-scope-address": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "address"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-scope-phone": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "phone"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-scope-all": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "phone"],
["click", "id", "address"],
["click", "id", "email"],
["click", "id", "profile"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-ensure-other-scope-order-succeeds": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "email"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-registration-logo-uri": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"match": "http://consent:3000/login*",
"commands": [
[
"wait",
"id",
"login-title",
10,
".*",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-registration-policy-uri": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"match": "http://consent:3000/login*",
"commands": [
[
"wait",
"id",
"login-title",
10,
".*",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-registration-tos-uri": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"match": "http://consent:3000/login*",
"commands": [
[
"wait",
"id",
"login-title",
10,
".*",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-prompt-login": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"match": "http://consent:3000/login*",
"commands": [
[
"wait",
"id",
"login-title",
10,
".*",
"update-image-placeholder-optional"
],
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-prompt-none-logged-in": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-max-age-1": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
[
"wait",
"id",
"login-title",
10,
".*",
"update-image-placeholder-optional"
],
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-max-age-10000": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-id-token-hint": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "remember"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-ensure-registered-redirect-uri": {
"browser": [
{
"comment": "expect an immediate error page",
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Expect redirect uri mismatch error page",
"match": "https://hydra:4444/oauth2/fallbacks/error*",
"commands": [
[
"wait",
"xpath",
"//*",
10,
"The OAuth2 request resulted in an error.",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-refresh-token": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "offline_access"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-refresh-token-rp-key-rotation": {
"browser": [
{
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Login",
"optional": true,
"match": "http://consent:3000/login*",
"commands": [
["text", "id", "email", "[email protected]"],
["text", "id", "password", "foobar"],
["click", "id", "accept"]
]
},
{
"task": "Authorize Client",
"optional": true,
"match": "http://consent:3000/consent*",
"commands": [
["click", "id", "openid"],
["click", "id", "offline_access"],
["click", "id", "accept"]
]
},
{
"task": "Verify Complete",
"match": "https://httpd:8443*"
}
]
}
]
},
"oidcc-ensure-redirect-uri-in-authorization-request": {
"browser": [
{
"comment": "expect an immediate error page",
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Expect redirect uri mismatch error page",
"match": "https://hydra:4444/oauth2/fallbacks/error*",
"commands": [
[
"wait",
"xpath",
"//*",
10,
"The OAuth2 request resulted in an error.",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-redirect-uri-query-mismatch": {
"browser": [
{
"comment": "expect an immediate error page",
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Expect redirect uri mismatch error page",
"match": "https://hydra:4444/oauth2/fallbacks/error*",
"commands": [
[
"wait",
"xpath",
"//*",
10,
"The OAuth2 request resulted in an error.",
"update-image-placeholder"
]
]
}
]
}
]
},
"oidcc-redirect-uri-query-added": {
"browser": [
{
"comment": "expect an immediate error page",
"match": "https://hydra:4444*",
"tasks": [
{
"task": "Expect redirect uri mismatch error page",
"match": "https://hydra:4444/oauth2/fallbacks/error*",
"commands": [
[
"wait",
"xpath",
"//*",
10,
"The OAuth2 request resulted in an error.",
"update-image-placeholder"
]
]
}
]
}
]
}
}
} |
YAML | hydra/test/conformance/docker-compose.yml | version: "3.7"
services:
hydra-migrate:
build:
# When running with `run.sh` the cwd is the project's root.
context: .
dockerfile: ./test/conformance/hydra/Dockerfile
hydra:
build:
# When running with `run.sh` the cwd is the project's root.
context: .
dockerfile: ./test/conformance/hydra/Dockerfile
environment:
ISSUER_URL: https://hydra:4444/
command: serve -c /etc/config/hydra/hydra.yml all
volumes:
- type: bind
source: ./test/conformance/hydra/config
target: /etc/config/hydra
mongodb:
image: mongo:4.2
networks:
- intranet
volumes:
- type: volume
source: mongodb-volume
target: /data/db
read_only: false
restart: unless-stopped
httpd:
image: oryd/hydra-oidc-httpd:latest
# build:
# # When running with `run.sh` the cwd is the project's root.
# context: ./test/conformance
# dockerfile: httpd/Dockerfile
ports:
- "8443:8443"
depends_on:
- server
networks:
- intranet
restart: unless-stopped
server:
image: oryd/hydra-oidc-server:latest
# build:
# # When running with `run.sh` the cwd is the project's root.
# context: ./test/conformance
# dockerfile: Dockerfile
depends_on:
- mongodb
logging:
# limit logs retained on host
driver: "json-file"
options:
max-size: "500k"
max-file: "5"
networks:
- intranet
restart: unless-stopped
deploy:
resources:
limits:
cpus: "1.5"
memory: 2G
reservations:
cpus: "0.5"
memory: 500M
consent:
image: oryd/hydra-login-consent-node:latest
environment:
HYDRA_ADMIN_URL: https://hydra:4445
NODE_TLS_REJECT_UNAUTHORIZED: 0
CONFORMITY_FAKE_CLAIMS: 1
volumes:
mongodb-volume: |
hydra/test/conformance/Dockerfile | FROM maven:3-jdk-11
WORKDIR /usr/src/mymaven
RUN wget https://gitlab.com/openid/conformance-suite/-/archive/release-v4.1.4/conformance-suite-release-v4.1.4.zip && \
unzip conformance-suite-release-v4.1.4.zip -d . && \
rm conformance-suite-release-v4.1.4.zip && \
find conformance-suite-release-v4.1.4 -maxdepth 1 -mindepth 1 -exec mv {} . \; && \
rmdir conformance-suite-release-v4.1.4
RUN mvn -B clean package -DskipTests && \
apt-get update && apt-get install -y \
redir ca-certificates
COPY ssl/ory-conformity.crt /etc/ssl/certs/
COPY ssl/ory-conformity.key /etc/ssl/private/
COPY ssl/ory-conformity.crt /usr/local/share/ca-certificates/
RUN update-ca-certificates
CMD java -Xdebug -Xrunjdwp:transport=dt_socket,address=*:9999,server=y,suspend=n -jar /usr/src/mymaven/target/fapi-test-suite.jar --fintechlabs.base_url=https://httpd:8443 --fintechlabs.devmode=true --fintechlabs.startredir=true |
|
Shell Script | hydra/test/conformance/publish.sh | #!/bin/bash
set -euxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )"
docker build -t oryd/hydra-oidc-server:latest .
docker build -t oryd/hydra-oidc-httpd:latest -f httpd/Dockerfile .
docker push oryd/hydra-oidc-server:latest
docker push oryd/hydra-oidc-httpd:latest |
Shell Script | hydra/test/conformance/purge.sh | #!/bin/bash
set -euxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/../.."
docker-compose -f quickstart.yml -f quickstart-postgres.yml -f test/conformance/docker-compose.yml down -v |
Go | hydra/test/conformance/run_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:build conformity
// +build conformity
package main
import (
"bytes"
"context"
"crypto/tls"
"fmt"
"io"
"math/rand"
"net/http"
"net/url"
"os"
"path/filepath"
"testing"
"time"
backoff "github.com/cenkalti/backoff/v3"
hydrac "github.com/ory/hydra-client-go/v2"
"github.com/ory/x/httpx"
"github.com/ory/x/stringslice"
"github.com/stretchr/testify/require"
"github.com/tidwall/gjson"
"github.com/ory/x/urlx"
)
type status int
const (
statusFailed status = iota
statusRetry
statusRunning
statusSuccess
)
var (
skipWhenShort = []string{"oidcc-test-plan"}
plans = []url.Values{
{"planName": {"oidcc-formpost-implicit-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-formpost-basic-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-formpost-hybrid-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-hybrid-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-implicit-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"code\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"id_token\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"id_token token\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"code id_token\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"code token\"}"}},
{"planName": {"oidcc-dynamic-certification-test-plan"}, "variant": {"{\"response_type\":\"code id_token token\"}"}},
{"planName": {"oidcc-config-certification-test-plan"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"client_secret_basic\",\"response_type\":\"code id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"private_key_jwt\",\"response_type\":\"code id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
/*
See https://gitlab.com/openid/conformance-suite/-/issues/856
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code id_token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code id_token token\",\"response_mode\":\"default\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code id_token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
{"planName": {"oidcc-test-plan"}, "variant": {"{\"client_auth_type\":\"none\",\"response_type\":\"code id_token token\",\"response_mode\":\"form_post\",\"client_registration\":\"dynamic_client\"}"}},
*/
{"planName": {"oidcc-formpost-basic-certification-test-plan"}, "variant": {"{\"server_metadata\":\"discovery\",\"client_registration\":\"dynamic_client\"}"}},
}
server = urlx.ParseOrPanic("https://127.0.0.1:8443")
config, _ = os.ReadFile("./config.json")
httpClient = httpx.NewResilientClient(
httpx.ResilientClientWithMinxRetryWait(time.Second*5),
httpx.ResilientClientWithClient(&http.Client{
Timeout: time.Second * 5,
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
},
}))
workdir string
hydra = hydrac.NewAPIClient(hydrac.NewConfiguration())
)
func init() {
rand.Seed(time.Now().UnixNano())
hydra.GetConfig().HTTPClient = httpClient.HTTPClient
hydra.GetConfig().Servers = hydrac.ServerConfigurations{{URL: "https://127.0.0.1:4445"}}
}
func waitForServices(t *testing.T) {
var conformOk, hydraOk bool
start := time.Now()
for {
server := server.String()
res, err := httpClient.Get(server)
conformOk = err == nil && res.StatusCode == 200
t.Logf("Checking %s (%v): %s (%+v)", server, conformOk, err, res)
server = "https://127.0.0.1:4444/health/ready"
res, err = httpClient.Get(server)
hydraOk = err == nil && res.StatusCode == 200
t.Logf("Checking %s (%v): %s (%+v)", server, hydraOk, err, res)
if conformOk && hydraOk {
break
}
if time.Since(start).Minutes() > 2 {
require.FailNow(t, "Waiting for service exceeded timeout of two minutes.")
}
t.Logf("Waiting for deployments to come alive...")
time.Sleep(time.Second)
}
}
func TestPlans(t *testing.T) {
waitForServices(t)
var err error
workdir, err = filepath.Abs("../../")
require.NoError(t, err)
t.Run("parallel=true", func(t *testing.T) {
for k := range plans {
plan := plans[k]
t.Run(fmt.Sprintf("plan=%s", plan), func(t *testing.T) {
t.Parallel()
createPlan(t, plan, true)
})
}
})
t.Run("parallel=false", func(t *testing.T) {
// Run remaining tests which do not work when parallelism is active
for _, plan := range plans {
t.Run(fmt.Sprintf("plan=%s", plan), func(t *testing.T) {
createPlan(t, plan, false)
})
}
})
}
func makePost(t *testing.T, href string, payload io.Reader, esc int) []byte {
res, err := httpClient.Post(href, "application/json", payload)
require.NoError(t, err)
defer res.Body.Close()
body, err := io.ReadAll(res.Body)
require.NoError(t, err)
require.Equal(t, esc, res.StatusCode, "%s\n%s", href, body)
return body
}
func createPlan(t *testing.T, extra url.Values, isParallel bool) {
planName := extra.Get("planName")
if stringslice.Has(skipWhenShort, planName) && testing.Short() {
t.Skipf("Skipping test plan '%s' because short tests", planName)
return
}
// https://localhost:8443/api/plan?planName=oidcc-formpost-basic-certification-test-plan&variant={"server_metadata":"discovery","client_registration":"dynamic_client"}&variant={"server_metadata":"discovery","client_registration":"dynamic_client"}
//planConfig, err := sjson.SetBytes(config, "alias", uuid.New())
//require.NoError(t, err)
body := makePost(t, urlx.CopyWithQuery(urlx.AppendPaths(server, "/api/plan"), extra).String(),
bytes.NewReader(config),
201)
plan := gjson.GetBytes(body, "id").String()
require.NotEmpty(t, plan)
t.Logf("Created plan: %s", plan)
gjson.GetBytes(body, "modules").ForEach(func(_, v gjson.Result) bool {
module := v.Get("testModule").String()
t.Logf("Running testModule %s for plan %s", module, plan)
t.Run("testModule="+module, func(t *testing.T) {
if isParallel {
t.Parallel()
}
if module == "oidcc-server-rotate-keys" && isParallel {
t.Skipf("Test module 'oidcc-server-rotate-keys' can not run in parallel tests and was skipped...")
return
} else if module != "oidcc-server-rotate-keys" && !isParallel {
t.Skipf("Without paralleism only test module 'oidcc-server-rotate-keys' will be executed.")
return
}
params := url.Values{"test": {module}, "plan": {plan}, "variant": {v.Get("variant").Raw}}
const maxRetries = 5
for retry := 1; retry <= maxRetries; retry++ {
time.Sleep(time.Duration(rand.Intn(5000)) * time.Millisecond)
t.Logf("Creating retry %d/%d testModule %s for plan %s with params: %+v", retry, maxRetries, module, plan, params)
body := makePost(t, urlx.CopyWithQuery(urlx.AppendPaths(server, "/api/runner"), params).String(),
nil, 201)
conf := backoff.NewExponentialBackOff()
conf.MaxElapsedTime = time.Minute * 5
conf.MaxInterval = time.Second * 5
conf.InitialInterval = time.Second
for {
nb := conf.NextBackOff()
if nb == backoff.Stop {
t.Logf("Waited %.2f minutes for a status change for testModule %s for plan %s but received none. Retrying with a fresh test...", conf.MaxElapsedTime.Minutes(), module, plan)
break
}
time.Sleep(nb)
state, passed := checkStatus(t, gjson.GetBytes(body, "id").String())
switch passed {
case statusRetry:
t.Logf("Status from testModule %s for plan %s with params marked the test for retry. Retrying with a fresh test...", module, plan)
break
case statusFailed:
panic("This statement should never be reached")
case statusSuccess:
return
}
switch module {
case "oidcc-server-rotate-keys":
if state == "CONFIGURED" {
t.Logf("Rotating ID Token keys....")
conf := backoff.NewExponentialBackOff()
conf.MaxElapsedTime = time.Minute * 5
conf.MaxInterval = time.Second * 5
conf.InitialInterval = time.Second
var err error
for {
bo := conf.NextBackOff()
require.NotEqual(t, backoff.Stop, bo, "%+v", err)
_, _, err = hydra.JwkApi.CreateJsonWebKeySet(context.Background(), "hydra.openid.id-token").CreateJsonWebKeySet(hydrac.CreateJsonWebKeySet{
Alg: "RS256",
}).Execute()
if err == nil {
break
}
time.Sleep(bo)
}
makePost(t, urlx.AppendPaths(server, "/api/runner/", gjson.GetBytes(body, "id").String()).String(), nil, 200)
}
}
}
}
require.FailNowf(t, "Retries exceeded", "Exceeded maximum retries %d for test %s in plan %s", maxRetries, module, plan)
})
return true
})
}
func checkStatus(t *testing.T, testID string) (string, status) {
res, err := httpClient.Get(urlx.AppendPaths(server, "/api/info", testID).String())
require.NoError(t, err)
defer res.Body.Close()
body, err := io.ReadAll(res.Body)
require.NoError(t, err)
require.Equal(t, 200, res.StatusCode, "%s", body)
state := gjson.GetBytes(body, "status").String()
t.Logf("Got status %s for %s", state, testID)
switch state {
case "INTERRUPTED":
t.Logf("Test was INTERRUPTED: %s", body)
return state, statusRetry
case "FINISHED":
result := gjson.GetBytes(body, "result").String()
t.Logf("Got result %s for %s", result, testID)
if result == "PASSED" || result == "WARNING" || result == "SKIPPED" || result == "REVIEW" {
return state, statusSuccess
} else if result == "FAILED" {
require.FailNowf(t, "Test was FAILED", "Expected status not to be FAILED got: %s", body)
return state, statusFailed
}
require.FailNowf(t, "Test failed with another error", "Unexpected status: %s", body)
return state, statusFailed
case "CONFIGURED":
fallthrough
case "CREATED":
fallthrough
case "RUNNING":
fallthrough
case "WAITING":
return state, statusRunning
}
require.FailNowf(t, "Unexpected state", "Unexpected state: %s", body)
return state, statusFailed
} |
Shell Script | hydra/test/conformance/start.sh | #!/bin/bash
set -euxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )/../.."
# shellcheck disable=SC2086
docker-compose -f quickstart.yml -f quickstart-postgres.yml -f test/conformance/docker-compose.yml up ${1:-} -d --force-recreate --build |
Shell Script | hydra/test/conformance/test.sh | #!/bin/bash
set -euxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )"
go test -tags conformity -test.timeout 60m -failfast "$@" . |
hydra/test/conformance/httpd/Dockerfile | FROM debian:stretch
RUN apt-get update \
&& apt-get install -y apache2 ssl-cert ca-certificates \
&& apt-get clean
RUN \
echo 'Listen 8443' > /etc/apache2/ports.conf \
&& a2enmod headers proxy proxy_ajp proxy_http rewrite ssl \
&& a2dissite 000-default.conf
COPY httpd/server.conf /etc/apache2/sites-enabled
COPY ssl/ory-conformity.crt /etc/ssl/certs/
COPY ssl/ory-conformity.key /etc/ssl/private/
COPY ssl/ory-conformity.crt /usr/local/share/ca-certificates/
RUN update-ca-certificates
ENTRYPOINT ["apachectl", "-DFOREGROUND"] |
|
hydra/test/conformance/httpd/server.conf | <VirtualHost *:8443>
ServerName localhost
ErrorLog /dev/stderr
CustomLog /dev/stdout combined
ProxyPreserveHost on
RewriteEngine on
SSLEngine on
SSLCertificateFile /etc/ssl/certs/ory-conformity.crt
SSLCertificateKeyFile /etc/ssl/private/ory-conformity.key
RequestHeader set X-Ssl-Cipher "%{SSL_CIPHER}s"
RequestHeader set X-Ssl-Protocol "%{SSL_PROTOCOL}s"
ProxyPass "/" "ajp://server:9090/"
# RewriteRule "^/(.*)$" "http://server:8080/$1" [P]
ProxyPassReverse "/" "ajp://server:9090/"
<Location "/">
Require all granted
</Location>
<Location "/test-mtls/">
SSLVerifyClient optional_no_ca
RequestHeader set X-Ssl-Cert "%{SSL_CLIENT_CERT}s"
RequestHeader set X-Ssl-Verify "%{SSL_CLIENT_VERIFY}s"
</Location>
</VirtualHost> |
|
hydra/test/conformance/hydra/Dockerfile | FROM golang:1.20-buster AS builder
RUN apt-get update && \
apt-get install --no-install-recommends -y \
git gcc bash ssl-cert ca-certificates && \
rm -rf /var/lib/apt/lists/*
WORKDIR /go/src/github.com/ory/hydra
RUN mkdir -p ./internal/httpclient
COPY go.mod go.sum ./
COPY internal/httpclient/go.* ./internal/httpclient/
ENV GO111MODULE on
ENV CGO_ENABLED 1
RUN go mod download
COPY . .
RUN go build -tags sqlite,json1 -o /usr/bin/hydra
VOLUME /var/lib/sqlite
# Exposing the ory home directory
VOLUME /home/ory
# Declare the standard ports used by hydra (4444 for public service endpoint, 4445 for admin service endpoint)
EXPOSE 4444 4445
RUN mv test/conformance/ssl/ory-ca.* /etc/ssl/certs/ && \
mv test/conformance/ssl/ory-conformity.crt /etc/ssl/certs/ && \
mv test/conformance/ssl/ory-conformity.key /etc/ssl/private/ && \
update-ca-certificates
ENTRYPOINT ["hydra"]
CMD ["serve"] |
|
YAML | hydra/test/conformance/hydra/config/hydra.yml | serve:
cookies:
same_site_mode: Lax
tls:
enabled: true
cert:
path: /etc/ssl/certs/ory-conformity.crt
key:
path: /etc/ssl/private/ory-conformity.key
log:
level: trace
format: json
urls:
self:
issuer: https://hydra:4444/
consent: http://consent:3000/consent
login: http://consent:3000/login
logout: http://consent:3000/logout
secrets:
system:
- youReallyNeedToChangeThis
oidc:
subject_identifiers:
supported_types:
- pairwise
- public
pairwise:
salt: youReallyNeedToChangeThis
dynamic_client_registration:
enabled: true
default_scope:
- email
- offline_access
- openid
- address
- phone
- profile
oauth2:
hashers:
bcrypt:
cost: 4
session:
encrypt_at_rest: false
# webfinger.oidc_discovery.client_registration_url
webfinger:
oidc_discovery:
supported_claims:
- email
- email_verified
- phone_number
- phone_number_verified
- name
- given_name
- family_name
- website
- zoneinfo
- birthdate
- gender
- profile
- preferred_username
- middle_name
- locale
- picture
- updated_at
- nickname
- address
supported_scope:
- email
- offline_access
- openid
- address
- phone
- profile
userinfo_url: https://hydra:4444/userinfo
token_url: https://hydra:4444/oauth2/token
jwks_url: https://hydra:4444/.well-known/jwks.json
client_registration_url: https://hydra:4445/admin/clients |
Shell Script | hydra/test/conformance/ssl/generate.sh | #!/bin/bash
set -euxo pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )"
subj="/C=GB/ST=London/L=London/O=Global Security/OU=IT Department/CN=ory.sh.local"
openssl genrsa -out ory-ca.key 2048
openssl req -x509 -new -nodes -key ory-ca.key -sha256 -days 4096 -out ory-ca.pem -subj "$subj"
NAME=ory-conformity
openssl genrsa -out $NAME.key 2048
openssl req -new -key $NAME.key -out $NAME.csr -subj "$subj"
cat > $NAME.ext << EOF
authorityKeyIdentifier=keyid,issuer
basicConstraints=CA:FALSE
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = httpd
DNS.2 = hydra
DNS.3 = consent
IP.1 = 127.0.0.1
EOF
openssl x509 -req -in $NAME.csr -CA ory-ca.pem -CAkey ory-ca.key -CAcreateserial \
-out $NAME.crt -days 825 -sha256 -extfile $NAME.ext |
hydra/test/conformance/ssl/ory-ca.key | -----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY----- |
|
hydra/test/conformance/ssl/ory-ca.pem | -----BEGIN CERTIFICATE-----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-----END CERTIFICATE----- |
|
hydra/test/conformance/ssl/ory-conformity.crt | -----BEGIN CERTIFICATE-----
MIID9zCCAt+gAwIBAgIJAN1rcgmZkXW/MA0GCSqGSIb3DQEBCwUAMHgxCzAJBgNV
BAYTAkdCMQ8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkxvbmRvbjEYMBYGA1UE
CgwPR2xvYmFsIFNlY3VyaXR5MRYwFAYDVQQLDA1JVCBEZXBhcnRtZW50MRUwEwYD
VQQDDAxvcnkuc2gubG9jYWwwHhcNMjMwMzAxMTIwMzU5WhcNMjUwNjAzMTIwMzU5
WjB4MQswCQYDVQQGEwJHQjEPMA0GA1UECAwGTG9uZG9uMQ8wDQYDVQQHDAZMb25k
b24xGDAWBgNVBAoMD0dsb2JhbCBTZWN1cml0eTEWMBQGA1UECwwNSVQgRGVwYXJ0
bWVudDEVMBMGA1UEAwwMb3J5LnNoLmxvY2FsMIIBIjANBgkqhkiG9w0BAQEFAAOC
AQ8AMIIBCgKCAQEAiSU7qDfXU85nV4Uu0vgYGfXNxFhc6Ycyui61LfboP+McczJG
2ldHeQn5v4/ptNhjkVa6WyZ2nrgMNO1cJrVsMJvw0U23gocAvD8u/tUbgwH1bzaE
FUXIhOBLMO/DrKXpimAOwDG4fZ3ywScnwOMyliWcV7U9NpdP7631UKWWpoAB/76c
lM+x5lrOFQ0YqXhQSJDwsZz4Ty8nbRj76ljC/asUzoApyLSpsgBz5GamxXqValnJ
GOiWNbZwBFZi145z1EV8wAYge3QtigITanvIfqZLVw5WXt4fAAdG9HmGheHtgxEY
wtEmdifRyN7t2nppa7cxsD8djxSd0c8283SYDQIDAQABo4GDMIGAMB8GA1UdIwQY
MBaAFHhRg61+W901PRJJWdTXs4mwwZrqMAkGA1UdEwQCMAAwCwYDVR0PBAQDAgTw
MCYGA1UdEQQfMB2CBWh0dHBkggVoeWRyYYIHY29uc2VudIcEfwAAATAdBgNVHQ4E
FgQUnmBi20O87lV+h0snFBa87Us2N2UwDQYJKoZIhvcNAQELBQADggEBABnAsWcK
+YKVLHxoPVJ24SHAH4DwBIOZpzoINWIziL3pWYT56yGZSlPbVrYCaPQi0acmaAnI
IsmtunUbgBzRdKhMlO7vj+PvN0fiV/d5quMlpkIvNSxVNJftXkTm8wbruubFVYMQ
LFeoo1PDHYgZbMAyppjEHQDFd8gqMQcB3msX8hAIlklnPjXvGb0PjJ+ZKcg40FMY
WAqmD23zoqyV5gbPgi+gxvZwLvEG8k2Q9H8iLGiBPQQ9jXFmAIz1bor8ZZTAJ3f1
wJKoPYAS5qsR1TU3aFfTWiQ+dHqouLUjHXDQjdjU0LewrWi3+QNNaCcWYz7xxiZS
cYbsRyMuKJ/HhRU=
-----END CERTIFICATE----- |
|
hydra/test/conformance/ssl/ory-conformity.csr | -----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST----- |
|
hydra/test/conformance/ssl/ory-conformity.ext | authorityKeyIdentifier=keyid,issuer
basicConstraints=CA:FALSE
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = httpd
DNS.2 = hydra
DNS.3 = consent
IP.1 = 127.0.0.1 |
|
hydra/test/conformance/ssl/ory-conformity.key | -----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY----- |
|
Markdown | hydra/test/conformance/ssl/README.md | This directory contains SSL certificates required for deploying Ory Hydra, the
OpenID Connect Conformity Test Suite, and other components with SSL
certificates. These certificates are loaded into the Docker Images and are seen
as valid CAs.
To generate a new CA and new SSL certificates, run `./generate.sh` in this
directory. |
hydra/test/e2e/circle-ci.bash | #!/bin/bash
set -euxo pipefail
cd "$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
function catch {
cat ./oauth2-client.e2e.log || true
cat ./login-consent-logout.e2e.log || true
cat ./hydra.e2e.log || true
}
trap catch ERR
killall hydra || true
killall node || true
# Check if any ports that we need are open already
! nc -zv 127.0.0.1 5004
! nc -zv 127.0.0.1 5001
! nc -zv 127.0.0.1 5002
! nc -zv 127.0.0.1 5003
# Install Ory Hydra
export GO111MODULE=on
if [[ ! -d "../../node_modules/" ]]; then
(cd ../..; npm ci)
fi
(cd ../../; go build -tags sqlite,json1 -o test/e2e/hydra . )
# Install oauth2-client
if [[ ! -d "./oauth2-client/node_modules/" ]]; then
(cd oauth2-client; npm ci)
fi
(cd oauth2-client; ADMIN_URL=http://127.0.0.1:5001 PUBLIC_URL=http://127.0.0.1:5004 PORT=5003 npm run start > ../oauth2-client.e2e.log 2>&1 &)
# Install consent app
(cd oauth2-client; PORT=5002 HYDRA_ADMIN_URL=http://127.0.0.1:5001 npm run consent > ../login-consent-logout.e2e.log 2>&1 &)
export URLS_SELF_ISSUER=http://127.0.0.1:5004/
export URLS_CONSENT=http://127.0.0.1:5002/consent
export URLS_LOGIN=http://127.0.0.1:5002/login
export URLS_LOGOUT=http://127.0.0.1:5002/logout
export SECRETS_SYSTEM=youReallyNeedToChangeThis
export OIDC_SUBJECT_IDENTIFIERS_SUPPORTED_TYPES=public,pairwise
export OIDC_SUBJECT_IDENTIFIERS_PAIRWISE_SALT=youReallyNeedToChangeThis
export SERVE_PUBLIC_CORS_ENABLED=true
export SERVE_PUBLIC_CORS_ALLOWED_METHODS=POST,GET,PUT,DELETE
export SERVE_ADMIN_CORS_ENABLED=true
export SERVE_ADMIN_CORS_ALLOWED_METHODS=POST,GET,PUT,DELETE
export LOG_LEVEL=trace
export LOG_FORMAT=json
export OAUTH2_EXPOSE_INTERNAL_ERRORS=1
export SERVE_PUBLIC_PORT=5004
export SERVE_ADMIN_PORT=5001
export LOG_LEAK_SENSITIVE_VALUES=true
export TEST_DATABASE_SQLITE="sqlite://$(mktemp -d -t ci-XXXXXXXXXX)/e2e.sqlite?_fk=true"
export OIDC_DYNAMIC_CLIENT_REGISTRATION_ENABLED=true
export TEST_DATABASE="$TEST_DATABASE_SQLITE"
WATCH=no
for i in "$@"
do
case $i in
memory)
# NOOP default value
;;
postgres)
export TEST_DATABASE="$TEST_DATABASE_POSTGRESQL"
;;
mysql)
export TEST_DATABASE="$TEST_DATABASE_MYSQL"
;;
cockroach)
export TEST_DATABASE="$TEST_DATABASE_COCKROACHDB"
;;
# Additional parameters
--watch)
WATCH=yes
;;
--jwt)
export STRATEGIES_ACCESS_TOKEN=jwt
export OIDC_SUBJECT_IDENTIFIERS_SUPPORTED_TYPES=public
export CYPRESS_jwt_enabled=true
;;
*)
echo $"Invalid param $i"
echo $"Usage: $0 [memory|postgres|mysql|cockroach] [--watch][--jwt]"
exit 1
;;
esac
done
./hydra migrate sql --yes $TEST_DATABASE > ./hydra-migrate.e2e.log 2>&1
DSN=$TEST_DATABASE \
./hydra serve all --dev --sqa-opt-out > ./hydra.e2e.log 2>&1 &
npm run wait-on -- -l -t 300000 \
--interval 1000 -s 1 -d 1000 \
http-get://localhost:5004/health/ready http-get://localhost:5001/health/ready http-get://localhost:5002/ http-get://localhost:5003/oauth2/callback
if [[ $WATCH = "yes" ]]; then
(cd ../..; npm run test:watch)
else
(cd ../..; npm run test)
fi
kill %1 || true # This is oauth2-client
kill %2 || true # This is the login-consent-logout
kill %3 || true # This is the hydra
rm ./oauth2-client.e2e.log
rm ./login-consent-logout.e2e.log
rm ./hydra.e2e.log
exit 0 |
|
YAML | hydra/test/e2e/docker-compose.cockroach.yml | version: "3"
services:
hydra-migrate:
image: oryd/hydra:e2e
environment:
- DSN=cockroach://root@cockroachd:26257/defaultdb?sslmode=disable&max_conns=20&max_idle_conns=4
command: migrate sql -e --yes
restart: on-failure
hydra:
depends_on:
- hydra-migrate
environment:
- DSN=cockroach://root@cockroachd:26257/defaultdb?sslmode=disable&max_conns=20&max_idle_conns=4
cockroachd:
image: cockroachdb/cockroach:v22.1.10
ports:
- "26257:26257"
command: start-single-node --insecure |
YAML | hydra/test/e2e/docker-compose.jwt.yml | ###########################################################################
####### FOR DEMONSTRATION PURPOSES ONLY #######
###########################################################################
# #
# If you have not yet read the tutorial, do so now: #
# https://www.ory.sh/docs/hydra/5min-tutorial #
# #
# This set up is only for demonstration purposes. The login #
# endpoint can only be used if you follow the steps in the tutorial. #
# #
###########################################################################
version: "3"
services:
hydra:
environment:
- STRATEGIES_ACCESS_TOKEN=jwt
- OIDC_SUBJECT_IDENTIFIERS_SUPPORTED_TYPES=public |
YAML | hydra/test/e2e/docker-compose.mysql.yml | version: "3"
services:
hydra-migrate:
image: oryd/hydra:e2e
environment:
- DSN=mysql://root:secret@tcp(mysqld:3306)/mysql?max_conns=20&max_idle_conns=4
command: migrate sql -e --yes
restart: on-failure
hydra:
depends_on:
- hydra-migrate
environment:
- DSN=mysql://root:secret@tcp(mysqld:3306)/mysql?max_conns=20&max_idle_conns=4
mysqld:
image: mysql:8.0.26
platform: linux/amd64
ports:
- "3306:3306"
environment:
- MYSQL_ROOT_PASSWORD=secret |
YAML | hydra/test/e2e/docker-compose.postgres.yml | version: "3"
services:
hydra-migrate:
image: oryd/hydra:e2e
environment:
- DSN=postgres://hydra:secret@postgresd:5432/hydra?sslmode=disable&max_conns=20&max_idle_conns=4
command: migrate sql -e --yes
restart: on-failure
hydra:
depends_on:
- hydra-migrate
environment:
- DSN=postgres://hydra:secret@postgresd:5432/hydra?sslmode=disable&max_conns=20&max_idle_conns=4
postgresd:
image: postgres:11.8
ports:
- "5432:5432"
environment:
- POSTGRES_USER=hydra
- POSTGRES_PASSWORD=secret
- POSTGRES_DB=hydra |
YAML | hydra/test/e2e/docker-compose.yml | version: "3"
services:
hydra:
depends_on:
- jaeger
image: oryd/hydra:e2e
ports:
- "5004:4444" # Public port
- "5001:4445" # Admin port
command: serve all --dev
environment:
- URLS_SELF_ISSUER=http://127_0_0_1:5004/
- URLS_CONSENT=http://127_0_0_1:5002/consent
- URLS_LOGIN=http://127_0_0_1:5002/login
- URLS_LOGOUT=http://127_0_0_1:5002/logout
- DSN=memory
- SECRETS_SYSTEM=youReallyNeedToChangeThis
- OIDC_SUBJECT_IDENTIFIERS_SUPPORTED_TYPES=public,pairwise
- OIDC_SUBJECT_IDENTIFIERS_PAIRWISE_SALT=youReallyNeedToChangeThis
- SERVE_PUBLIC_CORS_ENABLED=true
- SERVE_PUBLIC_CORS_ALLOWED_METHODS=POST,GET,PUT,DELETE
- SERVE_ADMIN_CORS_ENABLED=true
- SERVE_ADMIN_CORS_ALLOWED_METHODS=POST,GET,PUT,DELETE
- LOG_LEVEL=debug
- OAUTH2_EXPOSE_INTERNAL_ERRORS=1
- TRACING_PROVIDER=jaeger
- TRACING_PROVIDER_JAEGER_SAMPLING_SERVER_URL=http://jaeger:5778/sampling
- TRACING_PROVIDER_JAEGER_LOCAL_AGENT_ADDRESS=jaeger:6831
- TRACING_PROVIDER_JAEGER_SAMPLING_TYPE=const
- TRACING_PROVIDER_JAEGER_SAMPLING_VALUE=1
- WEBFINGER_OIDC_DISCOVERY_USERINFO_URL=http://hydra:4444/userinfo
- OIDC_DYNAMIC_CLIENT_REGISTRATION_ENABLED=true
restart: unless-stopped
consent:
environment:
- HYDRA_ADMIN_URL=http://hydra:4445
image: oryd/hydra-login-consent-node:latest
ports:
- "5002:3000"
restart: unless-stopped
client:
environment:
- ADMIN_URL=http://hydra:4445
- PUBLIC_URL=http://hydra:4444
- PORT=5003
build:
context: _/oauth2-client
ports:
- "5003:5003"
restart: unless-stopped
jaeger:
image: jaegertracing/all-in-one:1_7_0
ports:
- "9411:9411" |
SQL | hydra/test/e2e/schema.sql | CREATE TABLE schema_migration (version VARCHAR (48) NOT NULL, version_self INT NOT NULL DEFAULT 0);
CREATE UNIQUE INDEX schema_migration_version_idx ON schema_migration (version);
CREATE INDEX schema_migration_version_self_idx ON schema_migration (version_self);
CREATE TABLE hydra_client
(
id VARCHAR(255) NOT NULL,
client_name TEXT NOT NULL,
client_secret TEXT NOT NULL,
redirect_uris TEXT NOT NULL,
grant_types TEXT NOT NULL,
response_types TEXT NOT NULL,
scope TEXT NOT NULL,
owner TEXT NOT NULL,
policy_uri TEXT NOT NULL,
tos_uri TEXT NOT NULL,
client_uri TEXT NOT NULL,
logo_uri TEXT NOT NULL,
contacts TEXT NOT NULL,
client_secret_expires_at INTEGER NOT NULL DEFAULT 0,
sector_identifier_uri TEXT NOT NULL,
jwks TEXT NOT NULL,
jwks_uri TEXT NOT NULL,
request_uris TEXT NOT NULL,
token_endpoint_auth_method VARCHAR(25) NOT NULL DEFAULT '',
request_object_signing_alg VARCHAR(10) NOT NULL DEFAULT '',
userinfo_signed_response_alg VARCHAR(10) NOT NULL DEFAULT '',
subject_type VARCHAR(15) NOT NULL DEFAULT '',
allowed_cors_origins TEXT NOT NULL,
pk INTEGER PRIMARY KEY,
audience TEXT NOT NULL,
created_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
updated_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
frontchannel_logout_uri TEXT NOT NULL DEFAULT '',
frontchannel_logout_session_required INTEGER NOT NULL DEFAULT false,
post_logout_redirect_uris TEXT NOT NULL DEFAULT '',
backchannel_logout_uri TEXT NOT NULL DEFAULT '',
backchannel_logout_session_required INTEGER NOT NULL DEFAULT false,
metadata TEXT NOT NULL DEFAULT '{}',
token_endpoint_auth_signing_alg VARCHAR(10) NOT NULL DEFAULT ''
, registration_access_token_signature VARCHAR(128) NOT NULL DEFAULT '');
CREATE UNIQUE INDEX hydra_client_id_idx ON hydra_client (id);
CREATE TABLE hydra_jwk
(
sid VARCHAR(255) NOT NULL,
kid VARCHAR(255) NOT NULL,
version INTEGER NOT NULL DEFAULT 0,
keydata TEXT NOT NULL,
created_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
pk INTEGER PRIMARY KEY
);
CREATE UNIQUE INDEX hydra_jwk_sid_kid_key ON hydra_jwk (sid, kid);
CREATE TABLE hydra_oauth2_authentication_request
(
challenge VARCHAR(40) NOT NULL PRIMARY KEY,
requested_scope TEXT NOT NULL,
verifier VARCHAR(40) NOT NULL,
csrf VARCHAR(40) NOT NULL,
subject VARCHAR(255) NOT NULL,
request_url TEXT NOT NULL,
skip INTEGER NOT NULL,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
authenticated_at TIMESTAMP NULL,
oidc_context TEXT NOT NULL,
login_session_id VARCHAR(40) NULL REFERENCES hydra_oauth2_authentication_session (id) ON DELETE CASCADE DEFAULT '',
requested_at_audience TEXT NULL DEFAULT ''
);
CREATE INDEX hydra_oauth2_authentication_request_client_id_idx ON hydra_oauth2_authentication_request (client_id);
CREATE INDEX hydra_oauth2_authentication_request_login_session_id_idx ON hydra_oauth2_authentication_request (login_session_id);
CREATE INDEX hydra_oauth2_authentication_request_subject_idx ON hydra_oauth2_authentication_request (subject);
CREATE UNIQUE INDEX hydra_oauth2_authentication_request_verifier_idx ON hydra_oauth2_authentication_request (verifier);
CREATE TABLE hydra_oauth2_consent_request
(
challenge VARCHAR(40) NOT NULL PRIMARY KEY,
verifier VARCHAR(40) NOT NULL,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
subject VARCHAR(255) NOT NULL,
request_url TEXT NOT NULL,
skip INTEGER NOT NULL,
requested_scope TEXT NOT NULL,
csrf VARCHAR(40) NOT NULL,
authenticated_at TIMESTAMP NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
oidc_context TEXT NOT NULL,
forced_subject_identifier VARCHAR(255) NULL DEFAULT '',
login_session_id VARCHAR(40) NULL REFERENCES hydra_oauth2_authentication_session (id) ON DELETE SET NULL,
login_challenge VARCHAR(40) NULL REFERENCES hydra_oauth2_authentication_request (challenge) ON DELETE SET NULL,
requested_at_audience TEXT NULL DEFAULT '',
acr TEXT NULL DEFAULT '',
context TEXT NOT NULL DEFAULT '{}'
, amr TEXT NOT NULL DEFAULT '');
CREATE INDEX hydra_oauth2_consent_request_client_id_idx ON hydra_oauth2_consent_request (client_id);
CREATE INDEX hydra_oauth2_consent_request_subject_idx ON hydra_oauth2_consent_request (subject);
CREATE INDEX hydra_oauth2_consent_request_login_session_id_idx ON hydra_oauth2_consent_request (login_session_id);
CREATE INDEX hydra_oauth2_consent_request_login_challenge_idx ON hydra_oauth2_consent_request (login_challenge);
CREATE TABLE hydra_oauth2_consent_request_handled
(
challenge VARCHAR(40) NOT NULL PRIMARY KEY REFERENCES hydra_oauth2_consent_request (challenge) ON DELETE CASCADE,
granted_scope TEXT NOT NULL,
remember INTEGER NOT NULL,
remember_for INTEGER NOT NULL,
error TEXT NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
session_access_token TEXT NOT NULL,
session_id_token TEXT NOT NULL,
authenticated_at TIMESTAMP NULL,
was_used INTEGER NOT NULL,
granted_at_audience TEXT NULL DEFAULT '',
handled_at TIMESTAMP NULL
);
CREATE TABLE hydra_oauth2_authentication_request_handled
(
challenge VARCHAR(40) NOT NULL PRIMARY KEY REFERENCES hydra_oauth2_authentication_request (challenge) ON DELETE CASCADE,
subject VARCHAR(255) NOT NULL,
remember INTEGER NOT NULL,
remember_for INTEGER NOT NULL,
error TEXT NOT NULL,
acr TEXT NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
authenticated_at TIMESTAMP NULL,
was_used INTEGER NOT NULL,
forced_subject_identifier VARCHAR(255) NULL DEFAULT '',
context TEXT NOT NULL DEFAULT '{}'
, amr TEXT NOT NULL DEFAULT '');
CREATE TABLE hydra_oauth2_code
(
signature VARCHAR(255) NOT NULL,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_consent_request_handled (challenge) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_code_client_id_idx ON hydra_oauth2_code (client_id);
CREATE INDEX hydra_oauth2_code_challenge_id_idx ON hydra_oauth2_code (challenge_id);
CREATE TABLE hydra_oauth2_jti_blacklist
(
signature VARCHAR(64) NOT NULL PRIMARY KEY,
expires_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP
);
CREATE INDEX hydra_oauth2_jti_blacklist_expires_at_idx ON hydra_oauth2_jti_blacklist (expires_at);
CREATE TABLE hydra_oauth2_logout_request
(
challenge VARCHAR(36) NOT NULL PRIMARY KEY,
verifier VARCHAR(36) NOT NULL,
subject VARCHAR(255) NOT NULL,
sid VARCHAR(36) NOT NULL,
client_id VARCHAR(255) NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
request_url TEXT NOT NULL,
redir_url TEXT NOT NULL,
was_used INTEGER NOT NULL DEFAULT false,
accepted INTEGER NOT NULL DEFAULT false,
rejected INTEGER NOT NULL DEFAULT false,
rp_initiated INTEGER NOT NULL DEFAULT false,
UNIQUE (verifier)
);
CREATE INDEX hydra_oauth2_logout_request_client_id_idx ON hydra_oauth2_logout_request (client_id);
CREATE TABLE hydra_oauth2_obfuscated_authentication_session
(
subject VARCHAR(255) NOT NULL,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
subject_obfuscated VARCHAR(255) NOT NULL,
PRIMARY KEY (subject, client_id)
);
CREATE INDEX hydra_oauth2_obfuscated_authentication_session_client_id_subject_obfuscated_idx ON hydra_oauth2_obfuscated_authentication_session (client_id, subject_obfuscated);
CREATE TABLE hydra_oauth2_oidc
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_consent_request_handled (challenge) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_oidc_client_id_idx ON hydra_oauth2_oidc (client_id);
CREATE INDEX hydra_oauth2_oidc_challenge_id_idx ON hydra_oauth2_oidc (challenge_id);
CREATE TABLE hydra_oauth2_pkce
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL,
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_consent_request_handled (challenge) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_pkce_client_id_idx ON hydra_oauth2_pkce (client_id);
CREATE INDEX hydra_oauth2_pkce_challenge_id_idx ON hydra_oauth2_pkce (challenge_id);
CREATE TABLE IF NOT EXISTS "hydra_oauth2_access"
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_consent_request_handled (challenge) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_access_requested_at_idx ON hydra_oauth2_access (requested_at);
CREATE INDEX hydra_oauth2_access_client_id_idx ON hydra_oauth2_access (client_id);
CREATE INDEX hydra_oauth2_access_challenge_id_idx ON hydra_oauth2_access (challenge_id);
CREATE INDEX hydra_oauth2_access_client_id_subject_idx ON hydra_oauth2_access (client_id, subject);
CREATE TABLE IF NOT EXISTS "hydra_oauth2_refresh"
(
signature VARCHAR(255) NOT NULL PRIMARY KEY,
request_id VARCHAR(40) NOT NULL,
requested_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
client_id VARCHAR(255) NOT NULL REFERENCES hydra_client (id) ON DELETE CASCADE,
scope TEXT NOT NULL,
granted_scope TEXT NOT NULL,
form_data TEXT NOT NULL,
session_data TEXT NOT NULL,
subject VARCHAR(255) NOT NULL DEFAULT '',
active INTEGER NOT NULL DEFAULT true,
requested_audience TEXT NULL DEFAULT '',
granted_audience TEXT NULL DEFAULT '',
challenge_id VARCHAR(40) NULL REFERENCES hydra_oauth2_consent_request_handled (challenge) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_refresh_client_id_idx ON hydra_oauth2_refresh (client_id);
CREATE INDEX hydra_oauth2_refresh_challenge_id_idx ON hydra_oauth2_refresh (challenge_id);
CREATE INDEX hydra_oauth2_refresh_client_id_subject_idx ON hydra_oauth2_refresh (client_id, subject);
CREATE INDEX hydra_oauth2_access_request_id_idx ON hydra_oauth2_access (request_id);
CREATE INDEX hydra_oauth2_refresh_request_id_idx ON hydra_oauth2_refresh (request_id);
CREATE INDEX hydra_oauth2_code_request_id_idx ON hydra_oauth2_code (request_id);
CREATE INDEX hydra_oauth2_oidc_request_id_idx ON hydra_oauth2_oidc (request_id);
CREATE INDEX hydra_oauth2_pkce_request_id_idx ON hydra_oauth2_pkce (request_id);
CREATE TABLE IF NOT EXISTS "hydra_oauth2_authentication_session"
(
id VARCHAR(40) NOT NULL PRIMARY KEY,
authenticated_at TIMESTAMP NULL,
subject VARCHAR(255) NOT NULL,
remember INTEGER NOT NULL DEFAULT false
);
CREATE INDEX hydra_oauth2_authentication_session_subject_idx ON hydra_oauth2_authentication_session (subject);
CREATE TABLE hydra_oauth2_trusted_jwt_bearer_issuer
(
id VARCHAR(36) PRIMARY KEY,
issuer VARCHAR(255) NOT NULL,
subject VARCHAR(255) NOT NULL,
scope TEXT NOT NULL,
key_set varchar(255) NOT NULL,
key_id varchar(255) NOT NULL,
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP NOT NULL,
expires_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP NOT NULL,
UNIQUE (issuer, subject, key_id),
FOREIGN KEY (key_set, key_id) REFERENCES hydra_jwk (sid, kid) ON DELETE CASCADE
);
CREATE INDEX hydra_oauth2_trusted_jwt_bearer_issuer_expires_at_idx ON hydra_oauth2_trusted_jwt_bearer_issuer (expires_at); |
hydra/test/e2e/oauth2-client/Dockerfile | FROM node:10.8-alpine
RUN mkdir -p /usr/src/app
WORKDIR /usr/src/app
COPY . /usr/src/app
RUN npm install --silent; exit 0
ENTRYPOINT npm start
EXPOSE 3000 |
|
JSON | hydra/test/e2e/oauth2-client/package-lock.json | {
"name": "ory-hydra-mock-oauth2-client",
"version": "0.0.0",
"lockfileVersion": 2,
"requires": true,
"packages": {
"": {
"name": "ory-hydra-mock-oauth2-client",
"version": "0.0.0",
"dependencies": {
"body-parser": "^1.20.1",
"dotenv": "^7.0.0",
"express": "^4.18.2",
"express-session": "^1.17.0",
"express-winston": "^3.4.0",
"hydra-login-consent-logout": "2.0.4-pre.2",
"jsonwebtoken": "^8.5.1",
"jwks-rsa": "^2.1.4",
"node-fetch": "^2.6.0",
"node-uuid": "^1.4.8",
"openid-client": "^2.5.0",
"simple-oauth2": "^2.5.2",
"winston": "^3.2.1"
},
"devDependencies": {
"cross-env": "^5.2.1",
"nodemon": "^2.0.22"
}
},
"node_modules/@hapi/address": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/@hapi/address/-/address-2.1.4.tgz",
"integrity": "sha512-QD1PhQk+s31P1ixsX0H0Suoupp3VMXzIVMSwobR3F3MSUO2YCV0B7xqLcUw/Bh8yuvd3LhpyqLQWTNcRmp6IdQ==",
"deprecated": "Moved to 'npm install @sideway/address'"
},
"node_modules/@hapi/bourne": {
"version": "1.3.2",
"resolved": "https://registry.npmjs.org/@hapi/bourne/-/bourne-1.3.2.tgz",
"integrity": "sha512-1dVNHT76Uu5N3eJNTYcvxee+jzX4Z9lfciqRRHCU27ihbUcYi+iSc2iml5Ke1LXe1SyJCLA0+14Jh4tXJgOppA==",
"deprecated": "This version has been deprecated and is no longer supported or maintained"
},
"node_modules/@hapi/hoek": {
"version": "8.5.1",
"resolved": "https://registry.npmjs.org/@hapi/hoek/-/hoek-8.5.1.tgz",
"integrity": "sha512-yN7kbciD87WzLGc5539Tn0sApjyiGHAJgKvG9W8C7O+6c7qmoQMfVs0W4bX17eqz6C78QJqqFrtgdK5EWf6Qow==",
"deprecated": "This version has been deprecated and is no longer supported or maintained"
},
"node_modules/@hapi/joi": {
"version": "15.1.1",
"resolved": "https://registry.npmjs.org/@hapi/joi/-/joi-15.1.1.tgz",
"integrity": "sha512-entf8ZMOK8sc+8YfeOlM8pCfg3b5+WZIKBfUaaJT8UsjAAPjartzxIYm3TIbjvA4u+u++KbcXD38k682nVHDAQ==",
"deprecated": "Switch to 'npm install joi'",
"dependencies": {
"@hapi/address": "2.x.x",
"@hapi/bourne": "1.x.x",
"@hapi/hoek": "8.x.x",
"@hapi/topo": "3.x.x"
}
},
"node_modules/@hapi/topo": {
"version": "3.1.6",
"resolved": "https://registry.npmjs.org/@hapi/topo/-/topo-3.1.6.tgz",
"integrity": "sha512-tAag0jEcjwH+P2quUfipd7liWCNX2F8NvYjQp2wtInsZxnMlypdw0FtAOLxtvvkO+GSRRbmNi8m/5y42PQJYCQ==",
"deprecated": "This version has been deprecated and is no longer supported or maintained",
"dependencies": {
"@hapi/hoek": "^8.3.0"
}
},
"node_modules/@ory/client": {
"version": "0.2.0-alpha.60",
"resolved": "https://registry.npmjs.org/@ory/client/-/client-0.2.0-alpha.60.tgz",
"integrity": "sha512-fGovJ/xIl7dvJJP9/IL4Xu1yiOCy9pvmkfj2xnHZbPrIbL9c9tqVcC3CSlzBq6zJQZMC3XI7VmZ8uEQ+cF4suw==",
"dependencies": {
"axios": "^0.21.4"
}
},
"node_modules/@panva/asn1.js": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/@panva/asn1.js/-/asn1.js-1.0.0.tgz",
"integrity": "sha512-UdkG3mLEqXgnlKsWanWcgb6dOjUzJ+XC5f+aWw30qrtjxeNUSfKX1cd5FBzOaXQumoe9nIqeZUvrRJS03HCCtw==",
"engines": {
"node": ">=10.13.0"
}
},
"node_modules/@sindresorhus/is": {
"version": "0.7.0",
"resolved": "https://registry.npmjs.org/@sindresorhus/is/-/is-0.7.0.tgz",
"integrity": "sha512-ONhaKPIufzzrlNbqtWFFd+jlnemX6lJAgq9ZeiZtS7I1PIf/la7CW4m83rTXRnVnsMbW2k56pGYu7AUFJD9Pow==",
"engines": {
"node": ">=4"
}
},
"node_modules/@types/babel-types": {
"version": "7.0.7",
"resolved": "https://registry.npmjs.org/@types/babel-types/-/babel-types-7.0.7.tgz",
"integrity": "sha512-dBtBbrc+qTHy1WdfHYjBwRln4+LWqASWakLHsWHR2NWHIFkv4W3O070IGoGLEBrJBvct3r0L1BUPuvURi7kYUQ=="
},
"node_modules/@types/babylon": {
"version": "6.16.5",
"resolved": "https://registry.npmjs.org/@types/babylon/-/babylon-6.16.5.tgz",
"integrity": "sha512-xH2e58elpj1X4ynnKp9qSnWlsRTIs6n3tgLGNfwAGHwePw0mulHQllV34n0T25uYSu1k0hRKkWXF890B1yS47w==",
"dependencies": {
"@types/babel-types": "*"
}
},
"node_modules/@types/body-parser": {
"version": "1.19.2",
"resolved": "https://registry.npmjs.org/@types/body-parser/-/body-parser-1.19.2.tgz",
"integrity": "sha512-ALYone6pm6QmwZoAgeyNksccT9Q4AWZQ6PvfwR37GT6r6FWUPguq6sUmNGSMV2Wr761oQoBxwGGa6DR5o1DC9g==",
"dependencies": {
"@types/connect": "*",
"@types/node": "*"
}
},
"node_modules/@types/connect": {
"version": "3.4.35",
"resolved": "https://registry.npmjs.org/@types/connect/-/connect-3.4.35.tgz",
"integrity": "sha512-cdeYyv4KWoEgpBISTxWvqYsVy444DOqehiF3fM3ne10AmJ62RSyNkUnxMJXHQWRQQX2eR94m5y1IZyDwBjV9FQ==",
"dependencies": {
"@types/node": "*"
}
},
"node_modules/@types/cookie-parser": {
"version": "1.4.3",
"resolved": "https://registry.npmjs.org/@types/cookie-parser/-/cookie-parser-1.4.3.tgz",
"integrity": "sha512-CqSKwFwefj4PzZ5n/iwad/bow2hTCh0FlNAeWLtQM3JA/NX/iYagIpWG2cf1bQKQ2c9gU2log5VUCrn7LDOs0w==",
"dependencies": {
"@types/express": "*"
}
},
"node_modules/@types/csurf": {
"version": "1.11.2",
"resolved": "https://registry.npmjs.org/@types/csurf/-/csurf-1.11.2.tgz",
"integrity": "sha512-9bc98EnwmC1S0aSJiA8rWwXtgXtXHHOQOsGHptImxFgqm6CeH+mIOunHRg6+/eg2tlmDMX3tY7XrWxo2M/nUNQ==",
"dependencies": {
"@types/express-serve-static-core": "*"
}
},
"node_modules/@types/express": {
"version": "4.17.13",
"resolved": "https://registry.npmjs.org/@types/express/-/express-4.17.13.tgz",
"integrity": "sha512-6bSZTPaTIACxn48l50SR+axgrqm6qXFIxrdAKaG6PaJk3+zuUr35hBlgT7vOmJcum+OEaIBLtHV/qloEAFITeA==",
"dependencies": {
"@types/body-parser": "*",
"@types/express-serve-static-core": "^4.17.18",
"@types/qs": "*",
"@types/serve-static": "*"
}
},
"node_modules/@types/express-serve-static-core": {
"version": "4.17.28",
"resolved": "https://registry.npmjs.org/@types/express-serve-static-core/-/express-serve-static-core-4.17.28.tgz",
"integrity": "sha512-P1BJAEAW3E2DJUlkgq4tOL3RyMunoWXqbSCygWo5ZIWTjUgN1YnaXWW4VWl/oc8vs/XoYibEGBKP0uZyF4AHig==",
"dependencies": {
"@types/node": "*",
"@types/qs": "*",
"@types/range-parser": "*"
}
},
"node_modules/@types/jsonwebtoken": {
"version": "8.5.8",
"resolved": "https://registry.npmjs.org/@types/jsonwebtoken/-/jsonwebtoken-8.5.8.tgz",
"integrity": "sha512-zm6xBQpFDIDM6o9r6HSgDeIcLy82TKWctCXEPbJJcXb5AKmi5BNNdLXneixK4lplX3PqIVcwLBCGE/kAGnlD4A==",
"dependencies": {
"@types/node": "*"
}
},
"node_modules/@types/mime": {
"version": "1.3.2",
"resolved": "https://registry.npmjs.org/@types/mime/-/mime-1.3.2.tgz",
"integrity": "sha512-YATxVxgRqNH6nHEIsvg6k2Boc1JHI9ZbH5iWFFv/MTkchz3b1ieGDa5T0a9RznNdI0KhVbdbWSN+KWWrQZRxTw=="
},
"node_modules/@types/morgan": {
"version": "1.9.4",
"resolved": "https://registry.npmjs.org/@types/morgan/-/morgan-1.9.4.tgz",
"integrity": "sha512-cXoc4k+6+YAllH3ZHmx4hf7La1dzUk6keTR4bF4b4Sc0mZxU/zK4wO7l+ZzezXm/jkYj/qC+uYGZrarZdIVvyQ==",
"dependencies": {
"@types/node": "*"
}
},
"node_modules/@types/node": {
"version": "17.0.42",
"resolved": "https://registry.npmjs.org/@types/node/-/node-17.0.42.tgz",
"integrity": "sha512-Q5BPGyGKcvQgAMbsr7qEGN/kIPN6zZecYYABeTDBizOsau+2NMdSVTar9UQw21A2+JyA2KRNDYaYrPB0Rpk2oQ=="
},
"node_modules/@types/qs": {
"version": "6.9.7",
"resolved": "https://registry.npmjs.org/@types/qs/-/qs-6.9.7.tgz",
"integrity": "sha512-FGa1F62FT09qcrueBA6qYTrJPVDzah9a+493+o2PCXsesWHIn27G98TsSMs3WPNbZIEj4+VJf6saSFpvD+3Zsw=="
},
"node_modules/@types/range-parser": {
"version": "1.2.4",
"resolved": "https://registry.npmjs.org/@types/range-parser/-/range-parser-1.2.4.tgz",
"integrity": "sha512-EEhsLsD6UsDM1yFhAvy0Cjr6VwmpMWqFBCb9w07wVugF7w9nfajxLuVmngTIpgS6svCnm6Vaw+MZhoDCKnOfsw=="
},
"node_modules/@types/serve-static": {
"version": "1.13.10",
"resolved": "https://registry.npmjs.org/@types/serve-static/-/serve-static-1.13.10.tgz",
"integrity": "sha512-nCkHGI4w7ZgAdNkrEu0bv+4xNV/XDqW+DydknebMOQwkpDGx8G+HTlj7R7ABI8i8nKxVw0wtKPi1D+lPOkh4YQ==",
"dependencies": {
"@types/mime": "^1",
"@types/node": "*"
}
},
"node_modules/@types/url-join": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/@types/url-join/-/url-join-4.0.1.tgz",
"integrity": "sha512-wDXw9LEEUHyV+7UWy7U315nrJGJ7p1BzaCxDpEoLr789Dk1WDVMMlf3iBfbG2F8NdWnYyFbtTxUn2ZNbm1Q4LQ=="
},
"node_modules/abbrev": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/abbrev/-/abbrev-1.1.1.tgz",
"integrity": "sha512-nne9/IiQ/hzIhY6pdDnbBtz7DjPTKrY00P/zvPSm5pOFkl6xuGrGnXn/VtTNNfNtAfZ9/1RtehkszU9qcTii0Q==",
"dev": true
},
"node_modules/accepts": {
"version": "1.3.8",
"resolved": "https://registry.npmjs.org/accepts/-/accepts-1.3.8.tgz",
"integrity": "sha512-PYAthTa2m2VKxuvSD3DPC/Gy+U+sOA1LAuT8mkmRuvw+NACSaeXEQ+NHcVF7rONl6qcaxV3Uuemwawk+7+SJLw==",
"dependencies": {
"mime-types": "~2.1.34",
"negotiator": "0.6.3"
},
"engines": {
"node": ">= 0.6"
}
},
"node_modules/acorn": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-3.3.0.tgz",
"integrity": "sha1-ReN/s56No/JbruP/U2niu18iAXo=",
"bin": {
"acorn": "bin/acorn"
},
"engines": {
"node": ">=0.4.0"
}
},
"node_modules/acorn-globals": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/acorn-globals/-/acorn-globals-3.1.0.tgz",
"integrity": "sha1-/YJw9x+7SZawBPqIDuXUZXOnMb8=",
"dependencies": {
"acorn": "^4.0.4"
}
},
"node_modules/acorn-globals/node_modules/acorn": {
"version": "4.0.13",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-4.0.13.tgz",
"integrity": "sha1-EFSVrlNh1pe9GVyCUZLhrX8lN4c=",
"bin": {
"acorn": "bin/acorn"
},
"engines": {
"node": ">=0.4.0"
}
},
"node_modules/aggregate-error": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/aggregate-error/-/aggregate-error-1.0.0.tgz",
"integrity": "sha1-iINE2tAiCnLjr1CQYRf0h3GSX6w=",
"dependencies": {
"clean-stack": "^1.0.0",
"indent-string": "^3.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/align-text": {
"version": "0.1.4",
"resolved": "https://registry.npmjs.org/align-text/-/align-text-0.1.4.tgz",
"integrity": "sha1-DNkKVhCT810KmSVsIrcGlDP60Rc=",
"dependencies": {
"kind-of": "^3.0.2",
"longest": "^1.0.1",
"repeat-string": "^1.5.2"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/align-text/node_modules/kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
"integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
"dependencies": {
"is-buffer": "^1.1.5"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/ansi-styles": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz",
"integrity": "sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==",
"dependencies": {
"color-convert": "^1.9.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/anymatch": {
"version": "3.1.3",
"resolved": "https://registry.npmjs.org/anymatch/-/anymatch-3.1.3.tgz",
"integrity": "sha512-KMReFUr0B4t+D+OBkjR3KYqvocp2XaSzO55UcB6mgQMd3KbcE+mWTyvVV7D/zsdEbNnV6acZUutkiHQXvTr1Rw==",
"dev": true,
"dependencies": {
"normalize-path": "^3.0.0",
"picomatch": "^2.0.4"
},
"engines": {
"node": ">= 8"
}
},
"node_modules/array-flatten": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/array-flatten/-/array-flatten-1.1.1.tgz",
"integrity": "sha1-ml9pkFGx5wczKPKgCJaLZOopVdI="
},
"node_modules/asap": {
"version": "2.0.6",
"resolved": "https://registry.npmjs.org/asap/-/asap-2.0.6.tgz",
"integrity": "sha1-5QNHYR1+aQlDIIu9r+vLwvuGbUY="
},
"node_modules/async": {
"version": "2.6.4",
"resolved": "https://registry.npmjs.org/async/-/async-2.6.4.tgz",
"integrity": "sha512-mzo5dfJYwAn29PeiJ0zvwTo04zj8HDJj0Mn8TD7sno7q12prdbnasKJHhkm2c1LgrhlJ0teaea8860oxi51mGA==",
"dependencies": {
"lodash": "^4.17.14"
}
},
"node_modules/axios": {
"version": "0.21.4",
"resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz",
"integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==",
"dependencies": {
"follow-redirects": "^1.14.0"
}
},
"node_modules/babel-runtime": {
"version": "6.26.0",
"resolved": "https://registry.npmjs.org/babel-runtime/-/babel-runtime-6.26.0.tgz",
"integrity": "sha1-llxwWGaOgrVde/4E/yM3vItWR/4=",
"dependencies": {
"core-js": "^2.4.0",
"regenerator-runtime": "^0.11.0"
}
},
"node_modules/babel-types": {
"version": "6.26.0",
"resolved": "https://registry.npmjs.org/babel-types/-/babel-types-6.26.0.tgz",
"integrity": "sha1-o7Bz+Uq0nrb6Vc1lInozQ4BjJJc=",
"dependencies": {
"babel-runtime": "^6.26.0",
"esutils": "^2.0.2",
"lodash": "^4.17.4",
"to-fast-properties": "^1.0.3"
}
},
"node_modules/babylon": {
"version": "6.18.0",
"resolved": "https://registry.npmjs.org/babylon/-/babylon-6.18.0.tgz",
"integrity": "sha512-q/UEjfGJ2Cm3oKV71DJz9d25TPnq5rhBVL2Q4fA5wcC3jcrdn7+SssEybFIxwAvvP+YCsCYNKughoF33GxgycQ==",
"bin": {
"babylon": "bin/babylon.js"
}
},
"node_modules/balanced-match": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/balanced-match/-/balanced-match-1.0.0.tgz",
"integrity": "sha1-ibTRmasr7kneFk6gK4nORi1xt2c=",
"dev": true
},
"node_modules/base64-js": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/base64-js/-/base64-js-1.3.1.tgz",
"integrity": "sha512-mLQ4i2QO1ytvGWFWmcngKO//JXAQueZvwEKtjgQFM4jIK0kU+ytMfplL8j+n5mspOfjHwoAg+9yhb7BwAHm36g=="
},
"node_modules/base64url": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/base64url/-/base64url-3.0.1.tgz",
"integrity": "sha512-ir1UPr3dkwexU7FdV8qBBbNDRUhMmIekYMFZfi+C/sLNnRESKPl23nB9b2pltqfOQNnGzsDdId90AEtG5tCx4A==",
"engines": {
"node": ">=6.0.0"
}
},
"node_modules/basic-auth": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/basic-auth/-/basic-auth-2.0.1.tgz",
"integrity": "sha512-NF+epuEdnUYVlGuhaxbbq+dvJttwLnGY+YixlXlME5KpQ5W3CnXA5cVTneY3SPbPDRkcjMbifrwmFYcClgOZeg==",
"dependencies": {
"safe-buffer": "5.1.2"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/binary-extensions": {
"version": "2.2.0",
"resolved": "https://registry.npmjs.org/binary-extensions/-/binary-extensions-2.2.0.tgz",
"integrity": "sha512-jDctJ/IVQbZoJykoeHbhXpOlNBqGNcwXJKJog42E5HDPUwQTSdjCHdihjj0DlnheQ7blbT6dHOafNAiS8ooQKA==",
"dev": true,
"engines": {
"node": ">=8"
}
},
"node_modules/body-parser": {
"version": "1.20.1",
"resolved": "https://registry.npmjs.org/body-parser/-/body-parser-1.20.1.tgz",
"integrity": "sha512-jWi7abTbYwajOytWCQc37VulmWiRae5RyTpaCyDcS5/lMdtwSz5lOpDE67srw/HYe35f1z3fDQw+3txg7gNtWw==",
"dependencies": {
"bytes": "3.1.2",
"content-type": "~1.0.4",
"debug": "2.6.9",
"depd": "2.0.0",
"destroy": "1.2.0",
"http-errors": "2.0.0",
"iconv-lite": "0.4.24",
"on-finished": "2.4.1",
"qs": "6.11.0",
"raw-body": "2.5.1",
"type-is": "~1.6.18",
"unpipe": "1.0.0"
},
"engines": {
"node": ">= 0.8",
"npm": "1.2.8000 || >= 1.4.16"
}
},
"node_modules/body-parser/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/body-parser/node_modules/on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"dependencies": {
"ee-first": "1.1.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/boom": {
"version": "7.3.0",
"resolved": "https://registry.npmjs.org/boom/-/boom-7.3.0.tgz",
"integrity": "sha512-Swpoyi2t5+GhOEGw8rEsKvTxFLIDiiKoUc2gsoV6Lyr43LHBIzch3k2MvYUs8RTROrIkVJ3Al0TkaOGjnb+B6A==",
"deprecated": "This module has moved and is now available at @hapi/boom. Please update your dependencies as this version is no longer maintained an may contain bugs and security issues.",
"dependencies": {
"hoek": "6.x.x"
}
},
"node_modules/bourne": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/bourne/-/bourne-1.1.2.tgz",
"integrity": "sha512-b2dgVkTZhkQirNMohgC00rWfpVqEi9y5tKM1k3JvoNx05ODtfQoPPd4js9CYFQoY0IM8LAmnJulEuWv74zjUOg==",
"deprecated": "This module has moved and is now available at @hapi/bourne. Please update your dependencies as this version is no longer maintained an may contain bugs and security issues."
},
"node_modules/brace-expansion": {
"version": "1.1.11",
"resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz",
"integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==",
"dev": true,
"dependencies": {
"balanced-match": "^1.0.0",
"concat-map": "0.0.1"
}
},
"node_modules/braces": {
"version": "3.0.2",
"resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
"integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
"dev": true,
"dependencies": {
"fill-range": "^7.0.1"
},
"engines": {
"node": ">=8"
}
},
"node_modules/browserify-zlib": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/browserify-zlib/-/browserify-zlib-0.2.0.tgz",
"integrity": "sha512-Z942RysHXmJrhqk88FmKBVq/v5tqmSkDz7p54G/MGyjMnCFFnC79XWNbg+Vta8W6Wb2qtSZTSxIGkJrRpCFEiA==",
"dependencies": {
"pako": "~1.0.5"
}
},
"node_modules/buffer": {
"version": "5.6.0",
"resolved": "https://registry.npmjs.org/buffer/-/buffer-5.6.0.tgz",
"integrity": "sha512-/gDYp/UtU0eA1ys8bOs9J6a+E/KWIY+DZ+Q2WESNUA0jFRsJOc0SNUO6xJ5SGA1xueg3NL65W6s+NY5l9cunuw==",
"dependencies": {
"base64-js": "^1.0.2",
"ieee754": "^1.1.4"
}
},
"node_modules/buffer-equal-constant-time": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/buffer-equal-constant-time/-/buffer-equal-constant-time-1.0.1.tgz",
"integrity": "sha1-+OcRMvf/5uAaXJaXpMbz5I1cyBk="
},
"node_modules/bytes": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/bytes/-/bytes-3.1.2.tgz",
"integrity": "sha512-/Nf7TyzTx6S3yRJObOAV7956r8cr2+Oj8AC5dt8wSP3BQAoeX58NoHyCU8P8zGkNXStjTSi6fzO6F0pBdcYbEg==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/cacheable-request": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/cacheable-request/-/cacheable-request-2.1.4.tgz",
"integrity": "sha1-DYCIAbY0KtM8kd+dC0TcCbkeXD0=",
"dependencies": {
"clone-response": "1.0.2",
"get-stream": "3.0.0",
"http-cache-semantics": "3.8.1",
"keyv": "3.0.0",
"lowercase-keys": "1.0.0",
"normalize-url": "2.0.1",
"responselike": "1.0.2"
}
},
"node_modules/cacheable-request/node_modules/lowercase-keys": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-1.0.0.tgz",
"integrity": "sha1-TjNms55/VFfjXxMkvfb4jQv8cwY=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/call-bind": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/call-bind/-/call-bind-1.0.2.tgz",
"integrity": "sha512-7O+FbCihrB5WGbFYesctwmTKae6rOiIzmz1icreWJ+0aA7LJfuqhEso2T9ncpcFtzMQtzXf2QGGueWJGTYsqrA==",
"dependencies": {
"function-bind": "^1.1.1",
"get-intrinsic": "^1.0.2"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/center-align": {
"version": "0.1.3",
"resolved": "https://registry.npmjs.org/center-align/-/center-align-0.1.3.tgz",
"integrity": "sha1-qg0yYptu6XIgBBHL1EYckHvCt60=",
"dependencies": {
"align-text": "^0.1.3",
"lazy-cache": "^1.0.3"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/chalk": {
"version": "2.4.2",
"resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
"integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
"dependencies": {
"ansi-styles": "^3.2.1",
"escape-string-regexp": "^1.0.5",
"supports-color": "^5.3.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/character-parser": {
"version": "2.2.0",
"resolved": "https://registry.npmjs.org/character-parser/-/character-parser-2.2.0.tgz",
"integrity": "sha1-x84o821LzZdE5f/CxfzeHHMmH8A=",
"dependencies": {
"is-regex": "^1.0.3"
}
},
"node_modules/chokidar": {
"version": "3.5.3",
"resolved": "https://registry.npmjs.org/chokidar/-/chokidar-3.5.3.tgz",
"integrity": "sha512-Dr3sfKRP6oTcjf2JmUmFJfeVMvXBdegxB0iVQ5eb2V10uFJUCAS8OByZdVAyVb8xXNz3GjjTgj9kLWsZTqE6kw==",
"dev": true,
"funding": [
{
"type": "individual",
"url": "https://paulmillr.com/funding/"
}
],
"dependencies": {
"anymatch": "~3.1.2",
"braces": "~3.0.2",
"glob-parent": "~5.1.2",
"is-binary-path": "~2.1.0",
"is-glob": "~4.0.1",
"normalize-path": "~3.0.0",
"readdirp": "~3.6.0"
},
"engines": {
"node": ">= 8.10.0"
},
"optionalDependencies": {
"fsevents": "~2.3.2"
}
},
"node_modules/clean-css": {
"version": "4.2.3",
"resolved": "https://registry.npmjs.org/clean-css/-/clean-css-4.2.3.tgz",
"integrity": "sha512-VcMWDN54ZN/DS+g58HYL5/n4Zrqe8vHJpGA8KdgUXFU4fuP/aHNw8eld9SyEIyabIMJX/0RaY/fplOo5hYLSFA==",
"dependencies": {
"source-map": "~0.6.0"
},
"engines": {
"node": ">= 4.0"
}
},
"node_modules/clean-css/node_modules/source-map": {
"version": "0.6.1",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
"integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/clean-stack": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/clean-stack/-/clean-stack-1.3.0.tgz",
"integrity": "sha1-noIVAa6XmYbEax1m0tQy2y/UrjE=",
"engines": {
"node": ">=4"
}
},
"node_modules/cliui": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/cliui/-/cliui-2.1.0.tgz",
"integrity": "sha1-S0dXYP+AJkx2LDoXGQMukcf+oNE=",
"dependencies": {
"center-align": "^0.1.1",
"right-align": "^0.1.1",
"wordwrap": "0.0.2"
}
},
"node_modules/clone-response": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/clone-response/-/clone-response-1.0.2.tgz",
"integrity": "sha1-0dyXOSAxTfZ/vrlCI7TuNQI56Ws=",
"dependencies": {
"mimic-response": "^1.0.0"
}
},
"node_modules/color": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/color/-/color-3.0.0.tgz",
"integrity": "sha512-jCpd5+s0s0t7p3pHQKpnJ0TpQKKdleP71LWcA0aqiljpiuAkOSUFN/dyH8ZwF0hRmFlrIuRhufds1QyEP9EB+w==",
"dependencies": {
"color-convert": "^1.9.1",
"color-string": "^1.5.2"
}
},
"node_modules/color-convert": {
"version": "1.9.3",
"resolved": "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz",
"integrity": "sha512-QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg==",
"dependencies": {
"color-name": "1.1.3"
}
},
"node_modules/color-name": {
"version": "1.1.3",
"resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz",
"integrity": "sha1-p9BVi9icQveV3UIyj3QIMcpTvCU="
},
"node_modules/color-string": {
"version": "1.5.5",
"resolved": "https://registry.npmjs.org/color-string/-/color-string-1.5.5.tgz",
"integrity": "sha512-jgIoum0OfQfq9Whcfc2z/VhCNcmQjWbey6qBX0vqt7YICflUmBCh9E9CiQD5GSJ+Uehixm3NUwHVhqUAWRivZg==",
"dependencies": {
"color-name": "^1.0.0",
"simple-swizzle": "^0.2.2"
}
},
"node_modules/colornames": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/colornames/-/colornames-1.1.1.tgz",
"integrity": "sha1-+IiQMGhcfE/54qVZ9Qd+t2qBb5Y="
},
"node_modules/colors": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/colors/-/colors-1.3.3.tgz",
"integrity": "sha512-mmGt/1pZqYRjMxB1axhTo16/snVZ5krrKkcmMeVKxzECMMXoCgnvTPp10QgHfcbQZw8Dq2jMNG6je4JlWU0gWg==",
"engines": {
"node": ">=0.1.90"
}
},
"node_modules/colorspace": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/colorspace/-/colorspace-1.1.1.tgz",
"integrity": "sha512-pI3btWyiuz7Ken0BWh9Elzsmv2bM9AhA7psXib4anUXy/orfZ/E0MbQwhSOG/9L8hLlalqrU0UhOuqxW1YjmVw==",
"dependencies": {
"color": "3.0.x",
"text-hex": "1.0.x"
}
},
"node_modules/concat-map": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/concat-map/-/concat-map-0.0.1.tgz",
"integrity": "sha1-2Klr13/Wjfd5OnMDajug1UBdR3s=",
"dev": true
},
"node_modules/constantinople": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/constantinople/-/constantinople-3.1.2.tgz",
"integrity": "sha512-yePcBqEFhLOqSBtwYOGGS1exHo/s1xjekXiinh4itpNQGCu4KA1euPh1fg07N2wMITZXQkBz75Ntdt1ctGZouw==",
"dependencies": {
"@types/babel-types": "^7.0.0",
"@types/babylon": "^6.16.2",
"babel-types": "^6.26.0",
"babylon": "^6.18.0"
}
},
"node_modules/content-disposition": {
"version": "0.5.4",
"resolved": "https://registry.npmjs.org/content-disposition/-/content-disposition-0.5.4.tgz",
"integrity": "sha512-FveZTNuGw04cxlAiWbzi6zTAL/lhehaWbTtgluJh4/E95DqMwTmha3KZN1aAWA8cFIhHzMZUvLevkw5Rqk+tSQ==",
"dependencies": {
"safe-buffer": "5.2.1"
},
"engines": {
"node": ">= 0.6"
}
},
"node_modules/content-disposition/node_modules/safe-buffer": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ==",
"funding": [
{
"type": "github",
"url": "https://github.com/sponsors/feross"
},
{
"type": "patreon",
"url": "https://www.patreon.com/feross"
},
{
"type": "consulting",
"url": "https://feross.org/support"
}
]
},
"node_modules/content-type": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/content-type/-/content-type-1.0.4.tgz",
"integrity": "sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/cookie": {
"version": "0.4.0",
"resolved": "https://registry.npmjs.org/cookie/-/cookie-0.4.0.tgz",
"integrity": "sha512-+Hp8fLp57wnUSt0tY0tHEXh4voZRDnoIrZPqlo3DPiI4y9lwg/jqx+1Om94/W6ZaPDOUbnjOt/99w66zk+l1Xg==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/cookie-parser": {
"version": "1.4.5",
"resolved": "https://registry.npmjs.org/cookie-parser/-/cookie-parser-1.4.5.tgz",
"integrity": "sha512-f13bPUj/gG/5mDr+xLmSxxDsB9DQiTIfhJS/sqjrmfAWiAN+x2O4i/XguTL9yDZ+/IFDanJ+5x7hC4CXT9Tdzw==",
"dependencies": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/cookie-signature": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.6.tgz",
"integrity": "sha1-4wOogrNCzD7oylE6eZmXNNqzriw="
},
"node_modules/core-js": {
"version": "2.6.11",
"resolved": "https://registry.npmjs.org/core-js/-/core-js-2.6.11.tgz",
"integrity": "sha512-5wjnpaT/3dV+XB4borEsnAYQchn00XSgTAWKDkEqv+K8KevjbzmofK6hfJ9TZIlpj2N0xQpazy7PiRQiWHqzWg==",
"deprecated": "core-js@<3.4 is no longer maintained and not recommended for usage due to the number of issues. Because of the V8 engine whims, feature detection in old core-js versions could cause a slowdown up to 100x even if nothing is polyfilled. Please, upgrade your dependencies to the actual version of core-js.",
"hasInstallScript": true
},
"node_modules/core-util-is": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/core-util-is/-/core-util-is-1.0.2.tgz",
"integrity": "sha1-tf1UIgqivFq1eqtxQMlAdUUDwac="
},
"node_modules/cross-env": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/cross-env/-/cross-env-5.2.1.tgz",
"integrity": "sha512-1yHhtcfAd1r4nwQgknowuUNfIT9E8dOMMspC36g45dN+iD1blloi7xp8X/xAIDnjHWyt1uQ8PHk2fkNaym7soQ==",
"dev": true,
"dependencies": {
"cross-spawn": "^6.0.5"
},
"bin": {
"cross-env": "dist/bin/cross-env.js",
"cross-env-shell": "dist/bin/cross-env-shell.js"
},
"engines": {
"node": ">=4.0"
}
},
"node_modules/cross-spawn": {
"version": "6.0.5",
"resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz",
"integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==",
"dev": true,
"dependencies": {
"nice-try": "^1.0.4",
"path-key": "^2.0.1",
"semver": "^5.5.0",
"shebang-command": "^1.2.0",
"which": "^1.2.9"
},
"engines": {
"node": ">=4.8"
}
},
"node_modules/csrf": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/csrf/-/csrf-3.1.0.tgz",
"integrity": "sha512-uTqEnCvWRk042asU6JtapDTcJeeailFy4ydOQS28bj1hcLnYRiqi8SsD2jS412AY1I/4qdOwWZun774iqywf9w==",
"dependencies": {
"rndm": "1.2.0",
"tsscmp": "1.0.6",
"uid-safe": "2.1.5"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/csurf": {
"version": "1.11.0",
"resolved": "https://registry.npmjs.org/csurf/-/csurf-1.11.0.tgz",
"integrity": "sha512-UCtehyEExKTxgiu8UHdGvHj4tnpE/Qctue03Giq5gPgMQ9cg/ciod5blZQ5a4uCEenNQjxyGuzygLdKUmee/bQ==",
"dependencies": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6",
"csrf": "3.1.0",
"http-errors": "~1.7.3"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/csurf/node_modules/http-errors": {
"version": "1.7.3",
"resolved": "https://registry.npmjs.org/http-errors/-/http-errors-1.7.3.tgz",
"integrity": "sha512-ZTTX0MWrsQ2ZAhA1cejAwDLycFsd7I7nVtnkT3Ol0aqodaKW+0CTZDQ1uBv5whptCnc8e8HeRRJxRs0kmm/Qfw==",
"dependencies": {
"depd": "~1.1.2",
"inherits": "2.0.4",
"setprototypeof": "1.1.1",
"statuses": ">= 1.5.0 < 2",
"toidentifier": "1.0.0"
},
"engines": {
"node": ">= 0.6"
}
},
"node_modules/date-fns": {
"version": "2.12.0",
"resolved": "https://registry.npmjs.org/date-fns/-/date-fns-2.12.0.tgz",
"integrity": "sha512-qJgn99xxKnFgB1qL4jpxU7Q2t0LOn1p8KMIveef3UZD7kqjT3tpFNNdXJelEHhE+rUgffriXriw/sOSU+cS1Hw==",
"funding": {
"type": "opencollective",
"url": "https://opencollective.com/date-fns"
}
},
"node_modules/debug": {
"version": "2.6.9",
"resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz",
"integrity": "sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==",
"dependencies": {
"ms": "2.0.0"
}
},
"node_modules/decamelize": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/decamelize/-/decamelize-1.2.0.tgz",
"integrity": "sha1-9lNNFRSCabIDUue+4m9QH5oZEpA=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/decode-uri-component": {
"version": "0.2.2",
"resolved": "https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.2.tgz",
"integrity": "sha512-FqUYQ+8o158GyGTrMFJms9qh3CqTKvAqgqsTnkLI8sKu0028orqBhxNMFkFen0zGyg6epACD32pjVk58ngIErQ==",
"engines": {
"node": ">=0.10"
}
},
"node_modules/decompress-response": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/decompress-response/-/decompress-response-3.3.0.tgz",
"integrity": "sha1-gKTdMjdIOEv6JICDYirt7Jgq3/M=",
"dependencies": {
"mimic-response": "^1.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/depd": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/depd/-/depd-1.1.2.tgz",
"integrity": "sha1-m81S4UwJd2PnSbJ0xDRu0uVgtak=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/destroy": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/destroy/-/destroy-1.2.0.tgz",
"integrity": "sha512-2sJGJTaXIIaR1w4iJSNoN0hnMY7Gpc/n8D4qSCJw8QqFWXf7cuAgnEHxBpweaVcPevC2l3KpjYCx3NypQQgaJg==",
"engines": {
"node": ">= 0.8",
"npm": "1.2.8000 || >= 1.4.16"
}
},
"node_modules/diagnostics": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/diagnostics/-/diagnostics-1.1.1.tgz",
"integrity": "sha512-8wn1PmdunLJ9Tqbx+Fx/ZEuHfJf4NKSN2ZBj7SJC/OWRWha843+WsTjqMe1B5E3p28jqBlp+mJ2fPVxPyNgYKQ==",
"dependencies": {
"colorspace": "1.1.x",
"enabled": "1.0.x",
"kuler": "1.0.x"
}
},
"node_modules/doctypes": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/doctypes/-/doctypes-1.1.0.tgz",
"integrity": "sha1-6oCxBqh1OHdOijpKWv4pPeSJ4Kk="
},
"node_modules/dotenv": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/dotenv/-/dotenv-7.0.0.tgz",
"integrity": "sha512-M3NhsLbV1i6HuGzBUH8vXrtxOk+tWmzWKDMbAVSUp3Zsjm7ywFeuwrUXhmhQyRK1q5B5GGy7hcXPbj3bnfZg2g==",
"engines": {
"node": ">=6"
}
},
"node_modules/duplexer3": {
"version": "0.1.4",
"resolved": "https://registry.npmjs.org/duplexer3/-/duplexer3-0.1.4.tgz",
"integrity": "sha1-7gHdHKwO08vH/b6jfcCo8c4ALOI="
},
"node_modules/ecdsa-sig-formatter": {
"version": "1.0.11",
"resolved": "https://registry.npmjs.org/ecdsa-sig-formatter/-/ecdsa-sig-formatter-1.0.11.tgz",
"integrity": "sha512-nagl3RYrbNv6kQkeJIpt6NJZy8twLB/2vtz6yN9Z4vRKHN4/QZJIEbqohALSgwKdnksuY3k5Addp5lg8sVoVcQ==",
"dependencies": {
"safe-buffer": "^5.0.1"
}
},
"node_modules/ee-first": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/ee-first/-/ee-first-1.1.1.tgz",
"integrity": "sha1-WQxhFWsK4vTwJVcyoViyZrxWsh0="
},
"node_modules/enabled": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/enabled/-/enabled-1.0.2.tgz",
"integrity": "sha1-ll9lE9LC0cX0ZStkouM5ZGf8L5M=",
"dependencies": {
"env-variable": "0.0.x"
}
},
"node_modules/encodeurl": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/encodeurl/-/encodeurl-1.0.2.tgz",
"integrity": "sha512-TPJXq8JqFaVYm2CWmPvnP2Iyo4ZSM7/QKcSmuMLDObfpH5fi7RUGmd/rTDf+rut/saiDiQEeVTNgAmJEdAOx0w==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/env-variable": {
"version": "0.0.5",
"resolved": "https://registry.npmjs.org/env-variable/-/env-variable-0.0.5.tgz",
"integrity": "sha512-zoB603vQReOFvTg5xMl9I1P2PnHsHQQKTEowsKKD7nseUfJq6UWzK+4YtlWUO1nhiQUxe6XMkk+JleSZD1NZFA=="
},
"node_modules/es6-promise": {
"version": "4.2.8",
"resolved": "https://registry.npmjs.org/es6-promise/-/es6-promise-4.2.8.tgz",
"integrity": "sha512-HJDGx5daxeIvxdBxvG2cb9g4tEvwIk3i8+nhX0yGrYmZUzbkdg8QbDevheDB8gd0//uPj4c1EQua8Q+MViT0/w=="
},
"node_modules/escape-html": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/escape-html/-/escape-html-1.0.3.tgz",
"integrity": "sha512-NiSupZ4OeuGwr68lGIeym/ksIZMJodUGOSCZ/FSnTxcrekbvqrgdUxlJOMpijaKZVjAJrWrGs/6Jy8OMuyj9ow=="
},
"node_modules/escape-string-regexp": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz",
"integrity": "sha1-G2HAViGQqN/2rjuyzwIAyhMLhtQ=",
"engines": {
"node": ">=0.8.0"
}
},
"node_modules/esutils": {
"version": "2.0.3",
"resolved": "https://registry.npmjs.org/esutils/-/esutils-2.0.3.tgz",
"integrity": "sha512-kVscqXk4OCp68SZ0dkgEKVi6/8ij300KBWTJq32P/dYeWTSwK41WyTxalN1eRmA5Z9UU/LX9D7FWSmV9SAYx6g==",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/etag": {
"version": "1.8.1",
"resolved": "https://registry.npmjs.org/etag/-/etag-1.8.1.tgz",
"integrity": "sha1-Qa4u62XvpiJorr/qg6x9eSmbCIc=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/express": {
"version": "4.18.2",
"resolved": "https://registry.npmjs.org/express/-/express-4.18.2.tgz",
"integrity": "sha512-5/PsL6iGPdfQ/lKM1UuielYgv3BUoJfz1aUwU9vHZ+J7gyvwdQXFEBIEIaxeGf0GIcreATNyBExtalisDbuMqQ==",
"dependencies": {
"accepts": "~1.3.8",
"array-flatten": "1.1.1",
"body-parser": "1.20.1",
"content-disposition": "0.5.4",
"content-type": "~1.0.4",
"cookie": "0.5.0",
"cookie-signature": "1.0.6",
"debug": "2.6.9",
"depd": "2.0.0",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"etag": "~1.8.1",
"finalhandler": "1.2.0",
"fresh": "0.5.2",
"http-errors": "2.0.0",
"merge-descriptors": "1.0.1",
"methods": "~1.1.2",
"on-finished": "2.4.1",
"parseurl": "~1.3.3",
"path-to-regexp": "0.1.7",
"proxy-addr": "~2.0.7",
"qs": "6.11.0",
"range-parser": "~1.2.1",
"safe-buffer": "5.2.1",
"send": "0.18.0",
"serve-static": "1.15.0",
"setprototypeof": "1.2.0",
"statuses": "2.0.1",
"type-is": "~1.6.18",
"utils-merge": "1.0.1",
"vary": "~1.1.2"
},
"engines": {
"node": ">= 0.10.0"
}
},
"node_modules/express-session": {
"version": "1.17.0",
"resolved": "https://registry.npmjs.org/express-session/-/express-session-1.17.0.tgz",
"integrity": "sha512-t4oX2z7uoSqATbMfsxWMbNjAL0T5zpvcJCk3Z9wnPPN7ibddhnmDZXHfEcoBMG2ojKXZoCyPMc5FbtK+G7SoDg==",
"dependencies": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6",
"debug": "2.6.9",
"depd": "~2.0.0",
"on-headers": "~1.0.2",
"parseurl": "~1.3.3",
"safe-buffer": "5.2.0",
"uid-safe": "~2.1.5"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/express-session/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/express-session/node_modules/safe-buffer": {
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.0.tgz",
"integrity": "sha512-fZEwUGbVl7kouZs1jCdMLdt95hdIv0ZeHg6L7qPeciMZhZ+/gdesW4wgTARkrFWEpspjEATAzUGPG8N2jJiwbg=="
},
"node_modules/express-winston": {
"version": "3.4.0",
"resolved": "https://registry.npmjs.org/express-winston/-/express-winston-3.4.0.tgz",
"integrity": "sha512-CKo4ESwIV4BpNIsGVNiq2GcAwuomL4dVJRIIH/2K/jMpoRI2DakhkVTtaJACzV7n2I1v+knDJkkjZRCymJ7nmA==",
"dependencies": {
"chalk": "^2.4.1",
"lodash": "^4.17.10"
},
"engines": {
"node": ">= 6"
},
"peerDependencies": {
"winston": ">=3.x <4"
}
},
"node_modules/express/node_modules/cookie": {
"version": "0.5.0",
"resolved": "https://registry.npmjs.org/cookie/-/cookie-0.5.0.tgz",
"integrity": "sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/express/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/express/node_modules/on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"dependencies": {
"ee-first": "1.1.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/express/node_modules/safe-buffer": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ==",
"funding": [
{
"type": "github",
"url": "https://github.com/sponsors/feross"
},
{
"type": "patreon",
"url": "https://www.patreon.com/feross"
},
{
"type": "consulting",
"url": "https://feross.org/support"
}
]
},
"node_modules/express/node_modules/setprototypeof": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.2.0.tgz",
"integrity": "sha512-E5LDX7Wrp85Kil5bhZv46j8jOeboKq5JMmYM3gVGdGH8xFpPWXUMsNrlODCrkoxMEeNi/XZIwuRvY4XNwYMJpw=="
},
"node_modules/express/node_modules/statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/fast-safe-stringify": {
"version": "2.0.6",
"resolved": "https://registry.npmjs.org/fast-safe-stringify/-/fast-safe-stringify-2.0.6.tgz",
"integrity": "sha512-q8BZ89jjc+mz08rSxROs8VsrBBcn1SIw1kq9NjolL509tkABRk9io01RAjSaEv1Xb2uFLt8VtRiZbGp5H8iDtg=="
},
"node_modules/fecha": {
"version": "2.3.3",
"resolved": "https://registry.npmjs.org/fecha/-/fecha-2.3.3.tgz",
"integrity": "sha512-lUGBnIamTAwk4znq5BcqsDaxSmZ9nDVJaij6NvRt/Tg4R69gERA+otPKbS86ROw9nxVMw2/mp1fnaiWqbs6Sdg=="
},
"node_modules/fill-range": {
"version": "7.0.1",
"resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
"integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
"dev": true,
"dependencies": {
"to-regex-range": "^5.0.1"
},
"engines": {
"node": ">=8"
}
},
"node_modules/finalhandler": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/finalhandler/-/finalhandler-1.2.0.tgz",
"integrity": "sha512-5uXcUVftlQMFnWC9qu/svkWv3GTd2PfUhK/3PLkYNAe7FbqJMt3515HaxE6eRL74GdsriiwujiawdaB1BpEISg==",
"dependencies": {
"debug": "2.6.9",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"on-finished": "2.4.1",
"parseurl": "~1.3.3",
"statuses": "2.0.1",
"unpipe": "~1.0.0"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/finalhandler/node_modules/on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"dependencies": {
"ee-first": "1.1.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/finalhandler/node_modules/statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/follow-redirects": {
"version": "1.15.2",
"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.2.tgz",
"integrity": "sha512-VQLG33o04KaQ8uYi2tVNbdrWp1QWxNNea+nmIB4EVM28v0hmP17z7aG1+wAkNzVq4KeXTq3221ye5qTJP91JwA==",
"funding": [
{
"type": "individual",
"url": "https://github.com/sponsors/RubenVerborgh"
}
],
"engines": {
"node": ">=4.0"
},
"peerDependenciesMeta": {
"debug": {
"optional": true
}
}
},
"node_modules/forwarded": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/forwarded/-/forwarded-0.2.0.tgz",
"integrity": "sha512-buRG0fpBtRHSTCOASe6hD258tEubFoRLb4ZNA6NxMVHNw2gOcwHo9wyablzMzOA5z9xA9L1KNjk/Nt6MT9aYow==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/fresh": {
"version": "0.5.2",
"resolved": "https://registry.npmjs.org/fresh/-/fresh-0.5.2.tgz",
"integrity": "sha1-PYyt2Q2XZWn6g1qx+OSyOhBWBac=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/from2": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/from2/-/from2-2.3.0.tgz",
"integrity": "sha1-i/tVAr3kpNNs/e6gB/zKIdfjgq8=",
"dependencies": {
"inherits": "^2.0.1",
"readable-stream": "^2.0.0"
}
},
"node_modules/from2/node_modules/readable-stream": {
"version": "2.3.7",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.7.tgz",
"integrity": "sha512-Ebho8K4jIbHAxnuxi7o42OrZgF/ZTNcsZj6nRKyUmkhLFq8CHItp/fy6hQZuZmP/n3yZ9VBUbp4zz/mX8hmYPw==",
"dependencies": {
"core-util-is": "~1.0.0",
"inherits": "~2.0.3",
"isarray": "~1.0.0",
"process-nextick-args": "~2.0.0",
"safe-buffer": "~5.1.1",
"string_decoder": "~1.1.1",
"util-deprecate": "~1.0.1"
}
},
"node_modules/from2/node_modules/string_decoder": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.1.1.tgz",
"integrity": "sha512-n/ShnvDi6FHbbVfviro+WojiFzv+s8MPMHBczVePfUpDJLwoLT0ht1l4YwBCbi8pJAveEEdnkHyPyTP/mzRfwg==",
"dependencies": {
"safe-buffer": "~5.1.0"
}
},
"node_modules/fsevents": {
"version": "2.3.2",
"resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.3.2.tgz",
"integrity": "sha512-xiqMQR4xAeHTuB9uWm+fFRcIOgKBMiOBP+eXiyT7jsgVCq1bkVygt00oASowB7EdtpOHaaPgKt812P9ab+DDKA==",
"dev": true,
"hasInstallScript": true,
"optional": true,
"os": [
"darwin"
],
"engines": {
"node": "^8.16.0 || ^10.6.0 || >=11.0.0"
}
},
"node_modules/function-bind": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/function-bind/-/function-bind-1.1.1.tgz",
"integrity": "sha512-yIovAzMX49sF8Yl58fSCWJ5svSLuaibPxXQJFLmBObTuCr0Mf1KiPopGM9NiFjiYBCbfaa2Fh6breQ6ANVTI0A=="
},
"node_modules/get-intrinsic": {
"version": "1.1.3",
"resolved": "https://registry.npmjs.org/get-intrinsic/-/get-intrinsic-1.1.3.tgz",
"integrity": "sha512-QJVz1Tj7MS099PevUG5jvnt9tSkXN8K14dxQlikJuPt4uD9hHAHjLyLBiLR5zELelBdD9QNRAXZzsJx0WaDL9A==",
"dependencies": {
"function-bind": "^1.1.1",
"has": "^1.0.3",
"has-symbols": "^1.0.3"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/get-stream": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz",
"integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=",
"engines": {
"node": ">=4"
}
},
"node_modules/glob-parent": {
"version": "5.1.2",
"resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz",
"integrity": "sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==",
"dev": true,
"dependencies": {
"is-glob": "^4.0.1"
},
"engines": {
"node": ">= 6"
}
},
"node_modules/has": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/has/-/has-1.0.3.tgz",
"integrity": "sha512-f2dvO0VU6Oej7RkWJGrehjbzMAjFp5/VKPp5tTpWIV4JHHZK1/BxbFRtf/siA2SWTe09caDmVtYYzWEIbBS4zw==",
"dependencies": {
"function-bind": "^1.1.1"
},
"engines": {
"node": ">= 0.4.0"
}
},
"node_modules/has-flag": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz",
"integrity": "sha1-tdRU3CGZriJWmfNGfloH87lVuv0=",
"engines": {
"node": ">=4"
}
},
"node_modules/has-symbol-support-x": {
"version": "1.4.2",
"resolved": "https://registry.npmjs.org/has-symbol-support-x/-/has-symbol-support-x-1.4.2.tgz",
"integrity": "sha512-3ToOva++HaW+eCpgqZrCfN51IPB+7bJNVT6CUATzueB5Heb8o6Nam0V3HG5dlDvZU1Gn5QLcbahiKw/XVk5JJw==",
"engines": {
"node": "*"
}
},
"node_modules/has-symbols": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.3.tgz",
"integrity": "sha512-l3LCuF6MgDNwTDKkdYGEihYjt5pRPbEg46rtlmnSPlUbgmB8LOIrKJbYYFBSbnPaJexMKtiPO8hmeRjRz2Td+A==",
"engines": {
"node": ">= 0.4"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/has-to-string-tag-x": {
"version": "1.4.1",
"resolved": "https://registry.npmjs.org/has-to-string-tag-x/-/has-to-string-tag-x-1.4.1.tgz",
"integrity": "sha512-vdbKfmw+3LoOYVr+mtxHaX5a96+0f3DljYd8JOqvOLsf5mw2Otda2qCDT9qRqLAhrjyQ0h7ual5nOiASpsGNFw==",
"dependencies": {
"has-symbol-support-x": "^1.4.1"
},
"engines": {
"node": "*"
}
},
"node_modules/hoek": {
"version": "6.1.3",
"resolved": "https://registry.npmjs.org/hoek/-/hoek-6.1.3.tgz",
"integrity": "sha512-YXXAAhmF9zpQbC7LEcREFtXfGq5K1fmd+4PHkBq8NUqmzW3G+Dq10bI/i0KucLRwss3YYFQ0fSfoxBZYiGUqtQ==",
"deprecated": "This module has moved and is now available at @hapi/hoek. Please update your dependencies as this version is no longer maintained an may contain bugs and security issues."
},
"node_modules/http-cache-semantics": {
"version": "3.8.1",
"resolved": "https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-3.8.1.tgz",
"integrity": "sha512-5ai2iksyV8ZXmnZhHH4rWPoxxistEexSi5936zIQ1bnNTW5VnA85B6P/VpXiRM017IgRvb2kKo1a//y+0wSp3w=="
},
"node_modules/http-errors": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/http-errors/-/http-errors-2.0.0.tgz",
"integrity": "sha512-FtwrG/euBzaEjYeRqOgly7G0qviiXoJWnvEH2Z1plBdXgbyjv34pHTSb9zoeHMyDy33+DWy5Wt9Wo+TURtOYSQ==",
"dependencies": {
"depd": "2.0.0",
"inherits": "2.0.4",
"setprototypeof": "1.2.0",
"statuses": "2.0.1",
"toidentifier": "1.0.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/http-errors/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/http-errors/node_modules/setprototypeof": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.2.0.tgz",
"integrity": "sha512-E5LDX7Wrp85Kil5bhZv46j8jOeboKq5JMmYM3gVGdGH8xFpPWXUMsNrlODCrkoxMEeNi/XZIwuRvY4XNwYMJpw=="
},
"node_modules/http-errors/node_modules/statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/http-errors/node_modules/toidentifier": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/toidentifier/-/toidentifier-1.0.1.tgz",
"integrity": "sha512-o5sSPKEkg/DIQNmH43V0/uerLrpzVedkUh8tGNvaeXpfpuwjKenlSox/2O/BTlZUtEe+JG7s5YhEz608PlAHRA==",
"engines": {
"node": ">=0.6"
}
},
"node_modules/hydra-login-consent-logout": {
"version": "2.0.4-pre.2",
"resolved": "https://registry.npmjs.org/hydra-login-consent-logout/-/hydra-login-consent-logout-2.0.4-pre.2.tgz",
"integrity": "sha512-nB3JKffjiTyQZzr0DPdkdoUAg7mPlNTv7c/jZrC5IrIyodc3X4s16LzcZJcs/e2U3pZyu3CoWGUrnF//wPzmqQ==",
"dependencies": {
"@ory/client": "^0.2.0-alpha.24",
"@types/cookie-parser": "^1.4.2",
"@types/csurf": "^1.9.36",
"@types/express": "^4.17.7",
"@types/morgan": "^1.9.1",
"@types/url-join": "^4.0.0",
"body-parser": "^1.19.0",
"cookie-parser": "^1.4.5",
"csurf": "^1.11.0",
"debug": "^4.1.1",
"express": "^4.17.1",
"morgan": "^1.10.0",
"node-fetch": "^2.6.7",
"pug": "^2.0.4",
"querystring": "^0.2.0",
"serve-favicon": "^2.5.0",
"typescript": "^3.7.5",
"url-join": "^4.0.1"
},
"bin": {
"hydra-login-consent-logout": "lib/app.js"
}
},
"node_modules/hydra-login-consent-logout/node_modules/debug": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.1.1.tgz",
"integrity": "sha512-pYAIzeRo8J6KPEaJ0VWOh5Pzkbw/RetuzehGM7QRRX5he4fPHx2rdKMB256ehJCkX+XRQm16eZLqLNS8RSZXZw==",
"deprecated": "Debug versions >=3.2.0 <3.2.7 || >=4 <4.3.1 have a low-severity ReDos regression when used in a Node.js environment. It is recommended you upgrade to 3.2.7 or 4.3.1. (https://github.com/visionmedia/debug/issues/797)",
"dependencies": {
"ms": "^2.1.1"
}
},
"node_modules/hydra-login-consent-logout/node_modules/debug/node_modules/ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
},
"node_modules/iconv-lite": {
"version": "0.4.24",
"resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.4.24.tgz",
"integrity": "sha512-v3MXnZAcvnywkTUEZomIActle7RXXeedOR31wwl7VlyoXO4Qi9arvSenNQWne1TcRwhCL1HwLI21bEqdpj8/rA==",
"dependencies": {
"safer-buffer": ">= 2.1.2 < 3"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/ieee754": {
"version": "1.1.13",
"resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.1.13.tgz",
"integrity": "sha512-4vf7I2LYV/HaWerSo3XmlMkp5eZ83i+/CDluXi/IGTs/O1sejBNhTtnxzmRZfvOUqj7lZjqHkeTvpgSFDlWZTg=="
},
"node_modules/ignore-by-default": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/ignore-by-default/-/ignore-by-default-1.0.1.tgz",
"integrity": "sha1-SMptcvbGo68Aqa1K5odr44ieKwk=",
"dev": true
},
"node_modules/indent-string": {
"version": "3.2.0",
"resolved": "https://registry.npmjs.org/indent-string/-/indent-string-3.2.0.tgz",
"integrity": "sha1-Sl/W0nzDMvN+VBmlBNu4NxBckok=",
"engines": {
"node": ">=4"
}
},
"node_modules/inherits": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz",
"integrity": "sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ=="
},
"node_modules/into-stream": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/into-stream/-/into-stream-3.1.0.tgz",
"integrity": "sha1-lvsKk2wSur1v8XUqF9BWFqvQlMY=",
"dependencies": {
"from2": "^2.1.1",
"p-is-promise": "^1.1.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/ipaddr.js": {
"version": "1.9.1",
"resolved": "https://registry.npmjs.org/ipaddr.js/-/ipaddr.js-1.9.1.tgz",
"integrity": "sha512-0KI/607xoxSToH7GjN1FfSbLoU0+btTicjsQSWQlh/hZykN8KpmMf7uYwPW3R+akZ6R/w18ZlXSHBYXiYUPO3g==",
"engines": {
"node": ">= 0.10"
}
},
"node_modules/is-arrayish": {
"version": "0.3.2",
"resolved": "https://registry.npmjs.org/is-arrayish/-/is-arrayish-0.3.2.tgz",
"integrity": "sha512-eVRqCvVlZbuw3GrM63ovNSNAeA1K16kaR/LRY/92w0zxQ5/1YzwblUX652i4Xs9RwAGjW9d9y6X88t8OaAJfWQ=="
},
"node_modules/is-binary-path": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/is-binary-path/-/is-binary-path-2.1.0.tgz",
"integrity": "sha512-ZMERYes6pDydyuGidse7OsHxtbI7WVeUEozgR/g7rd0xUimYNlvZRE/K2MgZTjWy725IfelLeVcEM97mmtRGXw==",
"dev": true,
"dependencies": {
"binary-extensions": "^2.0.0"
},
"engines": {
"node": ">=8"
}
},
"node_modules/is-buffer": {
"version": "1.1.6",
"resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
"integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
},
"node_modules/is-expression": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/is-expression/-/is-expression-3.0.0.tgz",
"integrity": "sha1-Oayqa+f9HzRx3ELHQW5hwkMXrJ8=",
"dependencies": {
"acorn": "~4.0.2",
"object-assign": "^4.0.1"
}
},
"node_modules/is-expression/node_modules/acorn": {
"version": "4.0.13",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-4.0.13.tgz",
"integrity": "sha1-EFSVrlNh1pe9GVyCUZLhrX8lN4c=",
"bin": {
"acorn": "bin/acorn"
},
"engines": {
"node": ">=0.4.0"
}
},
"node_modules/is-extglob": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/is-extglob/-/is-extglob-2.1.1.tgz",
"integrity": "sha512-SbKbANkN603Vi4jEZv49LeVJMn4yGwsbzZworEoyEiutsN3nJYdbO36zfhGJ6QEDpOZIFkDtnq5JRxmvl3jsoQ==",
"dev": true,
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/is-glob": {
"version": "4.0.3",
"resolved": "https://registry.npmjs.org/is-glob/-/is-glob-4.0.3.tgz",
"integrity": "sha512-xelSayHH36ZgE7ZWhli7pW34hNbNl8Ojv5KVmkJD4hBdD3th8Tfk9vYasLM+mXWOZhFkgZfxhLSnrwRr4elSSg==",
"dev": true,
"dependencies": {
"is-extglob": "^2.1.1"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/is-number": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
"integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng==",
"dev": true,
"engines": {
"node": ">=0.12.0"
}
},
"node_modules/is-object": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/is-object/-/is-object-1.0.1.tgz",
"integrity": "sha1-iVJojF7C/9awPsyF52ngKQMINHA="
},
"node_modules/is-plain-obj": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-1.1.0.tgz",
"integrity": "sha1-caUMhCnfync8kqOQpKA7OfzVHT4=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/is-promise": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/is-promise/-/is-promise-2.1.0.tgz",
"integrity": "sha1-eaKp7OfwlugPNtKy87wWwf9L8/o="
},
"node_modules/is-regex": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz",
"integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==",
"dependencies": {
"has": "^1.0.3"
},
"engines": {
"node": ">= 0.4"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/is-retry-allowed": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/is-retry-allowed/-/is-retry-allowed-1.2.0.tgz",
"integrity": "sha512-RUbUeKwvm3XG2VYamhJL1xFktgjvPzL0Hq8C+6yrWIswDy3BIXGqCxhxkc30N9jqK311gVU137K8Ei55/zVJRg==",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/is-stream": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
"integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/isarray": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/isarray/-/isarray-1.0.0.tgz",
"integrity": "sha1-u5NdSFgsuhaMBoNJV6VKPgcSTxE="
},
"node_modules/isexe": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/isexe/-/isexe-2.0.0.tgz",
"integrity": "sha1-6PvzdNxVb/iUehDcsFctYz8s+hA=",
"dev": true
},
"node_modules/isurl": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/isurl/-/isurl-1.0.0.tgz",
"integrity": "sha512-1P/yWsxPlDtn7QeRD+ULKQPaIaN6yF368GZ2vDfv0AL0NwpStafjWCDDdn0k8wgFMWpVAqG7oJhxHnlud42i9w==",
"dependencies": {
"has-to-string-tag-x": "^1.2.0",
"is-object": "^1.0.1"
},
"engines": {
"node": ">= 4"
}
},
"node_modules/jose": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.5.tgz",
"integrity": "sha512-BAiDNeDKTMgk4tvD0BbxJ8xHEHBZgpeRZ1zGPPsitSyMgjoMWiLGYAE7H7NpP5h0lPppQajQs871E8NHUrzVPA==",
"dependencies": {
"@panva/asn1.js": "^1.0.0"
},
"engines": {
"node": ">=10.13.0 < 13 || >=13.7.0"
},
"funding": {
"url": "https://github.com/sponsors/panva"
}
},
"node_modules/js-stringify": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/js-stringify/-/js-stringify-1.0.2.tgz",
"integrity": "sha1-Fzb939lyTyijaCrcYjCufk6Weds="
},
"node_modules/json-buffer": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/json-buffer/-/json-buffer-3.0.0.tgz",
"integrity": "sha1-Wx85evx11ne96Lz8Dkfh+aPZqJg="
},
"node_modules/jsonwebtoken": {
"version": "8.5.1",
"resolved": "https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz",
"integrity": "sha512-XjwVfRS6jTMsqYs0EsuJ4LGxXV14zQybNd4L2r0UvbVnSF9Af8x7p5MzbJ90Ioz/9TI41/hTCvznF/loiSzn8w==",
"dependencies": {
"jws": "^3.2.2",
"lodash.includes": "^4.3.0",
"lodash.isboolean": "^3.0.3",
"lodash.isinteger": "^4.0.4",
"lodash.isnumber": "^3.0.3",
"lodash.isplainobject": "^4.0.6",
"lodash.isstring": "^4.0.1",
"lodash.once": "^4.0.0",
"ms": "^2.1.1",
"semver": "^5.6.0"
},
"engines": {
"node": ">=4",
"npm": ">=1.4.28"
}
},
"node_modules/jsonwebtoken/node_modules/ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
},
"node_modules/jstransformer": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/jstransformer/-/jstransformer-1.0.0.tgz",
"integrity": "sha1-7Yvwkh4vPx7U1cGkT2hwntJHIsM=",
"dependencies": {
"is-promise": "^2.0.0",
"promise": "^7.0.1"
}
},
"node_modules/jwa": {
"version": "1.4.1",
"resolved": "https://registry.npmjs.org/jwa/-/jwa-1.4.1.tgz",
"integrity": "sha512-qiLX/xhEEFKUAJ6FiBMbes3w9ATzyk5W7Hvzpa/SLYdxNtng+gcurvrI7TbACjIXlsJyr05/S1oUhZrc63evQA==",
"dependencies": {
"buffer-equal-constant-time": "1.0.1",
"ecdsa-sig-formatter": "1.0.11",
"safe-buffer": "^5.0.1"
}
},
"node_modules/jwks-rsa": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/jwks-rsa/-/jwks-rsa-2.1.4.tgz",
"integrity": "sha512-mpArfgPkUpX11lNtGxsF/szkasUcbWHGplZl/uFvFO2NuMHmt0dQXIihh0rkPU2yQd5niQtuUHbXnG/WKiXF6Q==",
"dependencies": {
"@types/express": "^4.17.13",
"@types/jsonwebtoken": "^8.5.8",
"debug": "^4.3.4",
"jose": "^2.0.5",
"limiter": "^1.1.5",
"lru-memoizer": "^2.1.4"
},
"engines": {
"node": ">=10 < 13 || >=14"
}
},
"node_modules/jwks-rsa/node_modules/debug": {
"version": "4.3.4",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.3.4.tgz",
"integrity": "sha512-PRWFHuSU3eDtQJPvnNY7Jcket1j0t5OuOsFzPPzsekD52Zl8qUfFIPEiswXqIvHWGVHOgX+7G/vCNNhehwxfkQ==",
"dependencies": {
"ms": "2.1.2"
},
"engines": {
"node": ">=6.0"
},
"peerDependenciesMeta": {
"supports-color": {
"optional": true
}
}
},
"node_modules/jwks-rsa/node_modules/ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
},
"node_modules/jws": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/jws/-/jws-3.2.2.tgz",
"integrity": "sha512-YHlZCB6lMTllWDtSPHz/ZXTsi8S00usEV6v1tjq8tOUZzw7DpSDWVXjXDre6ed1w/pd495ODpHZYSdkRTsa0HA==",
"dependencies": {
"jwa": "^1.4.1",
"safe-buffer": "^5.0.1"
}
},
"node_modules/keyv": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/keyv/-/keyv-3.0.0.tgz",
"integrity": "sha512-eguHnq22OE3uVoSYG0LVWNP+4ppamWr9+zWBe1bsNcovIMy6huUJFPgy4mGwCd/rnl3vOLGW1MTlu4c57CT1xA==",
"dependencies": {
"json-buffer": "3.0.0"
}
},
"node_modules/kuler": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/kuler/-/kuler-1.0.1.tgz",
"integrity": "sha512-J9nVUucG1p/skKul6DU3PUZrhs0LPulNaeUOox0IyXDi8S4CztTHs1gQphhuZmzXG7VOQSf6NJfKuzteQLv9gQ==",
"dependencies": {
"colornames": "^1.1.1"
}
},
"node_modules/lazy-cache": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/lazy-cache/-/lazy-cache-1.0.4.tgz",
"integrity": "sha1-odePw6UEdMuAhF07O24dpJpEbo4=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/limiter": {
"version": "1.1.5",
"resolved": "https://registry.npmjs.org/limiter/-/limiter-1.1.5.tgz",
"integrity": "sha512-FWWMIEOxz3GwUI4Ts/IvgVy6LPvoMPgjMdQ185nN6psJyBJ4yOpzqm695/h5umdLJg2vW3GR5iG11MAkR2AzJA=="
},
"node_modules/lodash": {
"version": "4.17.14",
"resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz",
"integrity": "sha512-mmKYbW3GLuJeX+iGP+Y7Gp1AiGHGbXHCOh/jZmrawMmsE7MS4znI3RL2FsjbqOyMayHInjOeykW7PEajUk1/xw=="
},
"node_modules/lodash.clonedeep": {
"version": "4.5.0",
"resolved": "https://registry.npmjs.org/lodash.clonedeep/-/lodash.clonedeep-4.5.0.tgz",
"integrity": "sha512-H5ZhCF25riFd9uB5UCkVKo61m3S/xZk1x4wA6yp/L3RFP6Z/eHH1ymQcGLo7J3GMPfm0V/7m1tryHuGVxpqEBQ=="
},
"node_modules/lodash.includes": {
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/lodash.includes/-/lodash.includes-4.3.0.tgz",
"integrity": "sha1-YLuYqHy5I8aMoeUTJUgzFISfVT8="
},
"node_modules/lodash.isboolean": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isboolean/-/lodash.isboolean-3.0.3.tgz",
"integrity": "sha1-bC4XHbKiV82WgC/UOwGyDV9YcPY="
},
"node_modules/lodash.isinteger": {
"version": "4.0.4",
"resolved": "https://registry.npmjs.org/lodash.isinteger/-/lodash.isinteger-4.0.4.tgz",
"integrity": "sha1-YZwK89A/iwTDH1iChAt3sRzWg0M="
},
"node_modules/lodash.isnumber": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isnumber/-/lodash.isnumber-3.0.3.tgz",
"integrity": "sha1-POdoEMWSjQM1IwGsKHMX8RwLH/w="
},
"node_modules/lodash.isplainobject": {
"version": "4.0.6",
"resolved": "https://registry.npmjs.org/lodash.isplainobject/-/lodash.isplainobject-4.0.6.tgz",
"integrity": "sha1-fFJqUtibRcRcxpC4gWO+BJf1UMs="
},
"node_modules/lodash.isstring": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/lodash.isstring/-/lodash.isstring-4.0.1.tgz",
"integrity": "sha1-1SfftUVuynzJu5XV2ur4i6VKVFE="
},
"node_modules/lodash.once": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/lodash.once/-/lodash.once-4.1.1.tgz",
"integrity": "sha1-DdOXEhPHxW34gJd9UEyI+0cal6w="
},
"node_modules/logform": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/logform/-/logform-2.1.2.tgz",
"integrity": "sha512-+lZh4OpERDBLqjiwDLpAWNQu6KMjnlXH2ByZwCuSqVPJletw0kTWJf5CgSNAUKn1KUkv3m2cUz/LK8zyEy7wzQ==",
"dependencies": {
"colors": "^1.2.1",
"fast-safe-stringify": "^2.0.4",
"fecha": "^2.3.3",
"ms": "^2.1.1",
"triple-beam": "^1.3.0"
}
},
"node_modules/logform/node_modules/ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
},
"node_modules/long": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/long/-/long-4.0.0.tgz",
"integrity": "sha512-XsP+KhQif4bjX1kbuSiySJFNAehNxgLb6hPRGJ9QsUr8ajHkuXGdrHmFUTUUXhDwVX2R5bY4JNZEwbUiMhV+MA=="
},
"node_modules/longest": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/longest/-/longest-1.0.1.tgz",
"integrity": "sha1-MKCy2jj3N3DoKUoNIuZiXtd9AJc=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/lowercase-keys": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-1.0.1.tgz",
"integrity": "sha512-G2Lj61tXDnVFFOi8VZds+SoQjtQC3dgokKdDG2mTm1tx4m50NUHBOZSBwQQHyy0V12A0JTG4icfZQH+xPyh8VA==",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/lru-cache": {
"version": "4.0.2",
"resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-4.0.2.tgz",
"integrity": "sha1-HRdnnAac2l0ECZGgnbwsDbN35V4=",
"dependencies": {
"pseudomap": "^1.0.1",
"yallist": "^2.0.0"
}
},
"node_modules/lru-memoizer": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/lru-memoizer/-/lru-memoizer-2.1.4.tgz",
"integrity": "sha512-IXAq50s4qwrOBrXJklY+KhgZF+5y98PDaNo0gi/v2KQBFLyWr+JyFvijZXkGKjQj/h9c0OwoE+JZbwUXce76hQ==",
"dependencies": {
"lodash.clonedeep": "^4.5.0",
"lru-cache": "~4.0.0"
}
},
"node_modules/media-typer": {
"version": "0.3.0",
"resolved": "https://registry.npmjs.org/media-typer/-/media-typer-0.3.0.tgz",
"integrity": "sha1-hxDXrwqmJvj/+hzgAWhUUmMlV0g=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/merge-descriptors": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/merge-descriptors/-/merge-descriptors-1.0.1.tgz",
"integrity": "sha1-sAqqVW3YtEVoFQ7J0blT8/kMu2E="
},
"node_modules/methods": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/methods/-/methods-1.1.2.tgz",
"integrity": "sha1-VSmk1nZUE07cxSZmVoNbD4Ua/O4=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/mime": {
"version": "1.6.0",
"resolved": "https://registry.npmjs.org/mime/-/mime-1.6.0.tgz",
"integrity": "sha512-x0Vn8spI+wuJ1O6S7gnbaQg8Pxh4NNHb7KSINmEWKiPE4RKOplvijn+NkmYmmRgP68mc70j2EbeTFRsrswaQeg==",
"bin": {
"mime": "cli.js"
},
"engines": {
"node": ">=4"
}
},
"node_modules/mime-db": {
"version": "1.52.0",
"resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.52.0.tgz",
"integrity": "sha512-sPU4uV7dYlvtWJxwwxHD0PuihVNiE7TyAbQ5SWxDCB9mUYvOgroQOwYQQOKPJ8CIbE+1ETVlOoK1UC2nU3gYvg==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/mime-types": {
"version": "2.1.35",
"resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.35.tgz",
"integrity": "sha512-ZDY+bPm5zTTF+YpCrAU9nK0UgICYPT0QtT1NZWFv4s++TNkcgVaT0g6+4R2uI4MjQjzysHB1zxuWL50hzaeXiw==",
"dependencies": {
"mime-db": "1.52.0"
},
"engines": {
"node": ">= 0.6"
}
},
"node_modules/mimic-response": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/mimic-response/-/mimic-response-1.0.1.tgz",
"integrity": "sha512-j5EctnkH7amfV/q5Hgmoal1g2QHFJRraOtmx0JpIqkxhBhI/lJSl1nMpQ45hVarwNETOoWEimndZ4QK0RHxuxQ==",
"engines": {
"node": ">=4"
}
},
"node_modules/minimatch": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/minimatch/-/minimatch-3.1.2.tgz",
"integrity": "sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw==",
"dev": true,
"dependencies": {
"brace-expansion": "^1.1.7"
},
"engines": {
"node": "*"
}
},
"node_modules/morgan": {
"version": "1.10.0",
"resolved": "https://registry.npmjs.org/morgan/-/morgan-1.10.0.tgz",
"integrity": "sha512-AbegBVI4sh6El+1gNwvD5YIck7nSA36weD7xvIxG4in80j/UoK8AEGaWnnz8v1GxonMCltmlNs5ZKbGvl9b1XQ==",
"dependencies": {
"basic-auth": "~2.0.1",
"debug": "2.6.9",
"depd": "~2.0.0",
"on-finished": "~2.3.0",
"on-headers": "~1.0.2"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/morgan/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/ms": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
"integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
},
"node_modules/negotiator": {
"version": "0.6.3",
"resolved": "https://registry.npmjs.org/negotiator/-/negotiator-0.6.3.tgz",
"integrity": "sha512-+EUsqGPLsM+j/zdChZjsnX51g4XrHFOIXwfnCVPGlQk/k5giakcKsuxCObBRu6DSm9opw/O6slWbJdghQM4bBg==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/nice-try": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/nice-try/-/nice-try-1.0.5.tgz",
"integrity": "sha512-1nh45deeb5olNY7eX82BkPO7SSxR5SSYJiPTrTdFUVYwAl8CKMA5N9PjTYkHiRjisVcxcQ1HXdLhx2qxxJzLNQ==",
"dev": true
},
"node_modules/node-fetch": {
"version": "2.6.9",
"resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.9.tgz",
"integrity": "sha512-DJm/CJkZkRjKKj4Zi4BsKVZh3ValV5IR5s7LVZnW+6YMh0W1BfNA8XSs6DLMGYlId5F3KnA70uu2qepcR08Qqg==",
"dependencies": {
"whatwg-url": "^5.0.0"
},
"engines": {
"node": "4.x || >=6.0.0"
},
"peerDependencies": {
"encoding": "^0.1.0"
},
"peerDependenciesMeta": {
"encoding": {
"optional": true
}
}
},
"node_modules/node-forge": {
"version": "0.8.5",
"resolved": "https://registry.npmjs.org/node-forge/-/node-forge-0.8.5.tgz",
"integrity": "sha512-vFMQIWt+J/7FLNyKouZ9TazT74PRV3wgv9UT4cRjC8BffxFbKXkgIWR42URCPSnHm/QDz6BOlb2Q0U4+VQT67Q==",
"engines": {
"node": ">= 4.5.0"
}
},
"node_modules/node-jose": {
"version": "1.1.4",
"resolved": "https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz",
"integrity": "sha512-L31IFwL3pWWcMHxxidCY51ezqrDXMkvlT/5pLTfNw5sXmmOLJuN6ug7txzF/iuZN55cRpyOmoJrotwBQIoo5Lw==",
"dependencies": {
"base64url": "^3.0.1",
"browserify-zlib": "^0.2.0",
"buffer": "^5.5.0",
"es6-promise": "^4.2.8",
"lodash": "^4.17.15",
"long": "^4.0.0",
"node-forge": "^0.8.5",
"process": "^0.11.10",
"react-zlib-js": "^1.0.4",
"uuid": "^3.3.3"
}
},
"node_modules/node-jose/node_modules/lodash": {
"version": "4.17.15",
"resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz",
"integrity": "sha512-8xOcRHvCjnocdS5cpwXQXVzmmh5e5+saE2QGoeQmbKmRS6J3VQppPOIt0MnmE+4xlZoumy0GPG0D0MVIQbNA1A=="
},
"node_modules/node-jose/node_modules/uuid": {
"version": "3.4.0",
"resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
"integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==",
"deprecated": "Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.",
"bin": {
"uuid": "bin/uuid"
}
},
"node_modules/node-uuid": {
"version": "1.4.8",
"resolved": "https://registry.npmjs.org/node-uuid/-/node-uuid-1.4.8.tgz",
"integrity": "sha1-sEDrCSOWivq/jTL7HxfxFn/auQc=",
"deprecated": "Use uuid module instead",
"bin": {
"uuid": "bin/uuid"
}
},
"node_modules/nodemon": {
"version": "2.0.22",
"resolved": "https://registry.npmjs.org/nodemon/-/nodemon-2.0.22.tgz",
"integrity": "sha512-B8YqaKMmyuCO7BowF1Z1/mkPqLk6cs/l63Ojtd6otKjMx47Dq1utxfRxcavH1I7VSaL8n5BUaoutadnsX3AAVQ==",
"dev": true,
"dependencies": {
"chokidar": "^3.5.2",
"debug": "^3.2.7",
"ignore-by-default": "^1.0.1",
"minimatch": "^3.1.2",
"pstree.remy": "^1.1.8",
"semver": "^5.7.1",
"simple-update-notifier": "^1.0.7",
"supports-color": "^5.5.0",
"touch": "^3.1.0",
"undefsafe": "^2.0.5"
},
"bin": {
"nodemon": "bin/nodemon.js"
},
"engines": {
"node": ">=8.10.0"
},
"funding": {
"type": "opencollective",
"url": "https://opencollective.com/nodemon"
}
},
"node_modules/nodemon/node_modules/debug": {
"version": "3.2.7",
"resolved": "https://registry.npmjs.org/debug/-/debug-3.2.7.tgz",
"integrity": "sha512-CFjzYYAi4ThfiQvizrFQevTTXHtnCqWfe7x1AhgEscTz6ZbLbfoLRLPugTQyBth6f8ZERVUSyWHFD/7Wu4t1XQ==",
"dev": true,
"dependencies": {
"ms": "^2.1.1"
}
},
"node_modules/nodemon/node_modules/ms": {
"version": "2.1.3",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz",
"integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA==",
"dev": true
},
"node_modules/nopt": {
"version": "1.0.10",
"resolved": "https://registry.npmjs.org/nopt/-/nopt-1.0.10.tgz",
"integrity": "sha1-bd0hvSoxQXuScn3Vhfim83YI6+4=",
"dev": true,
"dependencies": {
"abbrev": "1"
},
"bin": {
"nopt": "bin/nopt.js"
},
"engines": {
"node": "*"
}
},
"node_modules/normalize-path": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/normalize-path/-/normalize-path-3.0.0.tgz",
"integrity": "sha512-6eZs5Ls3WtCisHWp9S2GUy8dqkpGi4BVSz3GaqiE6ezub0512ESztXUwUB6C6IKbQkY2Pnb/mD4WYojCRwcwLA==",
"dev": true,
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/normalize-url": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/normalize-url/-/normalize-url-2.0.1.tgz",
"integrity": "sha512-D6MUW4K/VzoJ4rJ01JFKxDrtY1v9wrgzCX5f2qj/lzH1m/lW6MhUZFKerVsnyjOhOsYzI9Kqqak+10l4LvLpMw==",
"dependencies": {
"prepend-http": "^2.0.0",
"query-string": "^5.0.1",
"sort-keys": "^2.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/normalize-url/node_modules/prepend-http": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/prepend-http/-/prepend-http-2.0.0.tgz",
"integrity": "sha1-6SQ0v6XqjBn0HN/UAddBo8gZ2Jc=",
"engines": {
"node": ">=4"
}
},
"node_modules/object-assign": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz",
"integrity": "sha1-IQmtx5ZYh8/AXLvUQsrIv7s2CGM=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/object-hash": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/object-hash/-/object-hash-1.3.1.tgz",
"integrity": "sha512-OSuu/pU4ENM9kmREg0BdNrUDIl1heYa4mBZacJc+vVWz4GtAwu7jO8s4AIt2aGRUTqxykpWzI3Oqnsm13tTMDA==",
"engines": {
"node": ">= 0.10.0"
}
},
"node_modules/object-inspect": {
"version": "1.12.2",
"resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.12.2.tgz",
"integrity": "sha512-z+cPxW0QGUp0mcqcsgQyLVRDoXFQbXOwBaqyF7VIgI4TWNQsDHrBpUQslRmIfAoYWdYzs6UlKJtB2XJpTaNSpQ==",
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/oidc-token-hash": {
"version": "3.0.2",
"resolved": "https://registry.npmjs.org/oidc-token-hash/-/oidc-token-hash-3.0.2.tgz",
"integrity": "sha512-dTzp80/y/da+um+i+sOucNqiPpwRL7M/xPwj7pH1TFA2/bqQ+OK2sJahSXbemEoLtPkHcFLyhLhLWZa9yW5+RA==",
"engines": {
"node": ">=6.9.0"
}
},
"node_modules/on-finished": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.3.0.tgz",
"integrity": "sha1-IPEzZIGwg811M3mSoWlxqi2QaUc=",
"dependencies": {
"ee-first": "1.1.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/on-headers": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/on-headers/-/on-headers-1.0.2.tgz",
"integrity": "sha512-pZAE+FJLoyITytdqK0U5s+FIpjN0JP3OzFi/u8Rx+EV5/W+JTWGXG8xFzevE7AjBfDqHv/8vL8qQsIhHnqRkrA==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/one-time": {
"version": "0.0.4",
"resolved": "https://registry.npmjs.org/one-time/-/one-time-0.0.4.tgz",
"integrity": "sha1-+M33eISCb+Tf+T46nMN7HkSAdC4="
},
"node_modules/openid-client": {
"version": "2.5.0",
"resolved": "https://registry.npmjs.org/openid-client/-/openid-client-2.5.0.tgz",
"integrity": "sha512-t3hFD7xEoW1U25RyBcRFaL19fGGs6hNVTysq9pgmiltH0IVUPzH/bQV9w24pM5Q7MunnGv2/5XjIru6BQcWdxg==",
"dependencies": {
"base64url": "^3.0.0",
"got": "^8.3.2",
"lodash": "^4.17.11",
"lru-cache": "^5.1.1",
"node-jose": "^1.1.0",
"object-hash": "^1.3.1",
"oidc-token-hash": "^3.0.1",
"p-any": "^1.1.0"
},
"engines": {
"node": ">=6.9.0"
}
},
"node_modules/openid-client/node_modules/got": {
"version": "8.3.2",
"resolved": "https://registry.npmjs.org/got/-/got-8.3.2.tgz",
"integrity": "sha512-qjUJ5U/hawxosMryILofZCkm3C84PLJS/0grRIpjAwu+Lkxxj5cxeCU25BG0/3mDSpXKTyZr8oh8wIgLaH0QCw==",
"dependencies": {
"@sindresorhus/is": "^0.7.0",
"cacheable-request": "^2.1.1",
"decompress-response": "^3.3.0",
"duplexer3": "^0.1.4",
"get-stream": "^3.0.0",
"into-stream": "^3.1.0",
"is-retry-allowed": "^1.1.0",
"isurl": "^1.0.0-alpha5",
"lowercase-keys": "^1.0.0",
"mimic-response": "^1.0.0",
"p-cancelable": "^0.4.0",
"p-timeout": "^2.0.1",
"pify": "^3.0.0",
"safe-buffer": "^5.1.1",
"timed-out": "^4.0.1",
"url-parse-lax": "^3.0.0",
"url-to-options": "^1.0.1"
},
"engines": {
"node": ">=4"
}
},
"node_modules/openid-client/node_modules/lru-cache": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-5.1.1.tgz",
"integrity": "sha512-KpNARQA3Iwv+jTA0utUVVbrh+Jlrr1Fv0e56GGzAFOXN7dk/FviaDW8LHmK52DlcH4WP2n6gI8vN1aesBFgo9w==",
"dependencies": {
"yallist": "^3.0.2"
}
},
"node_modules/openid-client/node_modules/prepend-http": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/prepend-http/-/prepend-http-2.0.0.tgz",
"integrity": "sha1-6SQ0v6XqjBn0HN/UAddBo8gZ2Jc=",
"engines": {
"node": ">=4"
}
},
"node_modules/openid-client/node_modules/url-parse-lax": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/url-parse-lax/-/url-parse-lax-3.0.0.tgz",
"integrity": "sha1-FrXK/Afb42dsGxmZF3gj1lA6yww=",
"dependencies": {
"prepend-http": "^2.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/openid-client/node_modules/yallist": {
"version": "3.1.1",
"resolved": "https://registry.npmjs.org/yallist/-/yallist-3.1.1.tgz",
"integrity": "sha512-a4UGQaWPH59mOXUYnAG2ewncQS4i4F43Tv3JoAM+s2VDAmS9NsK8GpDMLrCHPksFT7h3K6TOoUNn2pb7RoXx4g=="
},
"node_modules/p-any": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/p-any/-/p-any-1.1.0.tgz",
"integrity": "sha512-Ef0tVa4CZ5pTAmKn+Cg3w8ABBXh+hHO1aV8281dKOoUHfX+3tjG2EaFcC+aZyagg9b4EYGsHEjz21DnEE8Og2g==",
"dependencies": {
"p-some": "^2.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/p-cancelable": {
"version": "0.4.1",
"resolved": "https://registry.npmjs.org/p-cancelable/-/p-cancelable-0.4.1.tgz",
"integrity": "sha512-HNa1A8LvB1kie7cERyy21VNeHb2CWJJYqyyC2o3klWFfMGlFmWv2Z7sFgZH8ZiaYL95ydToKTFVXgMV/Os0bBQ==",
"engines": {
"node": ">=4"
}
},
"node_modules/p-finally": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
"integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4=",
"engines": {
"node": ">=4"
}
},
"node_modules/p-is-promise": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/p-is-promise/-/p-is-promise-1.1.0.tgz",
"integrity": "sha1-nJRWmJ6fZYgBewQ01WCXZ1w9oF4=",
"engines": {
"node": ">=4"
}
},
"node_modules/p-some": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/p-some/-/p-some-2.0.1.tgz",
"integrity": "sha1-Zdh8ixVO289SIdFnd4ttLhUPbwY=",
"dependencies": {
"aggregate-error": "^1.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/p-timeout": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/p-timeout/-/p-timeout-2.0.1.tgz",
"integrity": "sha512-88em58dDVB/KzPEx1X0N3LwFfYZPyDc4B6eF38M1rk9VTZMbxXXgjugz8mmwpS9Ox4BDZ+t6t3QP5+/gazweIA==",
"dependencies": {
"p-finally": "^1.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/pako": {
"version": "1.0.11",
"resolved": "https://registry.npmjs.org/pako/-/pako-1.0.11.tgz",
"integrity": "sha512-4hLB8Py4zZce5s4yd9XzopqwVv/yGNhV1Bl8NTmCq1763HeK2+EwVTv+leGeL13Dnh2wfbqowVPXCIO0z4taYw=="
},
"node_modules/parseurl": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/parseurl/-/parseurl-1.3.3.tgz",
"integrity": "sha512-CiyeOxFT/JZyN5m0z9PfXw4SCBJ6Sygz1Dpl0wqjlhDEGGBP1GnsUVEL0p63hoG1fcj3fHynXi9NYO4nWOL+qQ==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/path-key": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/path-key/-/path-key-2.0.1.tgz",
"integrity": "sha1-QRyttXTFoUDTpLGRDUDYDMn0C0A=",
"dev": true,
"engines": {
"node": ">=4"
}
},
"node_modules/path-parse": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz",
"integrity": "sha512-GSmOT2EbHrINBf9SR7CDELwlJ8AENk3Qn7OikK4nFYAu3Ote2+JYNVvkpAEQm3/TLNEJFD/xZJjzyxg3KBWOzw=="
},
"node_modules/path-to-regexp": {
"version": "0.1.7",
"resolved": "https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz",
"integrity": "sha1-32BBeABfUi8V60SQ5yR6G/qmf4w="
},
"node_modules/picomatch": {
"version": "2.3.1",
"resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz",
"integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==",
"dev": true,
"engines": {
"node": ">=8.6"
},
"funding": {
"url": "https://github.com/sponsors/jonschlinkert"
}
},
"node_modules/pify": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
"integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY=",
"engines": {
"node": ">=4"
}
},
"node_modules/process": {
"version": "0.11.10",
"resolved": "https://registry.npmjs.org/process/-/process-0.11.10.tgz",
"integrity": "sha1-czIwDoQBYb2j5podHZGn1LwW8YI=",
"engines": {
"node": ">= 0.6.0"
}
},
"node_modules/process-nextick-args": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/process-nextick-args/-/process-nextick-args-2.0.0.tgz",
"integrity": "sha512-MtEC1TqN0EU5nephaJ4rAtThHtC86dNN9qCuEhtshvpVBkAW5ZO7BASN9REnF9eoXGcRub+pFuKEpOHE+HbEMw=="
},
"node_modules/promise": {
"version": "7.3.1",
"resolved": "https://registry.npmjs.org/promise/-/promise-7.3.1.tgz",
"integrity": "sha512-nolQXZ/4L+bP/UGlkfaIujX9BKxGwmQ9OT4mOt5yvy8iK1h3wqTEJCijzGANTCCl9nWjY41juyAn2K3Q1hLLTg==",
"dependencies": {
"asap": "~2.0.3"
}
},
"node_modules/proxy-addr": {
"version": "2.0.7",
"resolved": "https://registry.npmjs.org/proxy-addr/-/proxy-addr-2.0.7.tgz",
"integrity": "sha512-llQsMLSUDUPT44jdrU/O37qlnifitDP+ZwrmmZcoSKyLKvtZxpyV0n2/bD/N4tBAAZ/gJEdZU7KMraoK1+XYAg==",
"dependencies": {
"forwarded": "0.2.0",
"ipaddr.js": "1.9.1"
},
"engines": {
"node": ">= 0.10"
}
},
"node_modules/pseudomap": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/pseudomap/-/pseudomap-1.0.2.tgz",
"integrity": "sha1-8FKijacOYYkX7wqKw0wa5aaChrM="
},
"node_modules/pstree.remy": {
"version": "1.1.8",
"resolved": "https://registry.npmjs.org/pstree.remy/-/pstree.remy-1.1.8.tgz",
"integrity": "sha512-77DZwxQmxKnu3aR542U+X8FypNzbfJ+C5XQDk3uWjWxn6151aIMGthWYRXTqT1E5oJvg+ljaa2OJi+VfvCOQ8w==",
"dev": true
},
"node_modules/pug": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/pug/-/pug-2.0.4.tgz",
"integrity": "sha512-XhoaDlvi6NIzL49nu094R2NA6P37ijtgMDuWE+ofekDChvfKnzFal60bhSdiy8y2PBO6fmz3oMEIcfpBVRUdvw==",
"dependencies": {
"pug-code-gen": "^2.0.2",
"pug-filters": "^3.1.1",
"pug-lexer": "^4.1.0",
"pug-linker": "^3.0.6",
"pug-load": "^2.0.12",
"pug-parser": "^5.0.1",
"pug-runtime": "^2.0.5",
"pug-strip-comments": "^1.0.4"
}
},
"node_modules/pug-attrs": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/pug-attrs/-/pug-attrs-2.0.4.tgz",
"integrity": "sha512-TaZ4Z2TWUPDJcV3wjU3RtUXMrd3kM4Wzjbe3EWnSsZPsJ3LDI0F3yCnf2/W7PPFF+edUFQ0HgDL1IoxSz5K8EQ==",
"dependencies": {
"constantinople": "^3.0.1",
"js-stringify": "^1.0.1",
"pug-runtime": "^2.0.5"
}
},
"node_modules/pug-code-gen": {
"version": "2.0.3",
"resolved": "https://registry.npmjs.org/pug-code-gen/-/pug-code-gen-2.0.3.tgz",
"integrity": "sha512-r9sezXdDuZJfW9J91TN/2LFbiqDhmltTFmGpHTsGdrNGp3p4SxAjjXEfnuK2e4ywYsRIVP0NeLbSAMHUcaX1EA==",
"dependencies": {
"constantinople": "^3.1.2",
"doctypes": "^1.1.0",
"js-stringify": "^1.0.1",
"pug-attrs": "^2.0.4",
"pug-error": "^1.3.3",
"pug-runtime": "^2.0.5",
"void-elements": "^2.0.1",
"with": "^5.0.0"
}
},
"node_modules/pug-error": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/pug-error/-/pug-error-1.3.3.tgz",
"integrity": "sha512-qE3YhESP2mRAWMFJgKdtT5D7ckThRScXRwkfo+Erqga7dyJdY3ZquspprMCj/9sJ2ijm5hXFWQE/A3l4poMWiQ=="
},
"node_modules/pug-filters": {
"version": "3.1.1",
"resolved": "https://registry.npmjs.org/pug-filters/-/pug-filters-3.1.1.tgz",
"integrity": "sha512-lFfjNyGEyVWC4BwX0WyvkoWLapI5xHSM3xZJFUhx4JM4XyyRdO8Aucc6pCygnqV2uSgJFaJWW3Ft1wCWSoQkQg==",
"dependencies": {
"clean-css": "^4.1.11",
"constantinople": "^3.0.1",
"jstransformer": "1.0.0",
"pug-error": "^1.3.3",
"pug-walk": "^1.1.8",
"resolve": "^1.1.6",
"uglify-js": "^2.6.1"
}
},
"node_modules/pug-lexer": {
"version": "4.1.0",
"resolved": "https://registry.npmjs.org/pug-lexer/-/pug-lexer-4.1.0.tgz",
"integrity": "sha512-i55yzEBtjm0mlplW4LoANq7k3S8gDdfC6+LThGEvsK4FuobcKfDAwt6V4jKPH9RtiE3a2Akfg5UpafZ1OksaPA==",
"dependencies": {
"character-parser": "^2.1.1",
"is-expression": "^3.0.0",
"pug-error": "^1.3.3"
}
},
"node_modules/pug-linker": {
"version": "3.0.6",
"resolved": "https://registry.npmjs.org/pug-linker/-/pug-linker-3.0.6.tgz",
"integrity": "sha512-bagfuHttfQOpANGy1Y6NJ+0mNb7dD2MswFG2ZKj22s8g0wVsojpRlqveEQHmgXXcfROB2RT6oqbPYr9EN2ZWzg==",
"dependencies": {
"pug-error": "^1.3.3",
"pug-walk": "^1.1.8"
}
},
"node_modules/pug-load": {
"version": "2.0.12",
"resolved": "https://registry.npmjs.org/pug-load/-/pug-load-2.0.12.tgz",
"integrity": "sha512-UqpgGpyyXRYgJs/X60sE6SIf8UBsmcHYKNaOccyVLEuT6OPBIMo6xMPhoJnqtB3Q3BbO4Z3Bjz5qDsUWh4rXsg==",
"dependencies": {
"object-assign": "^4.1.0",
"pug-walk": "^1.1.8"
}
},
"node_modules/pug-parser": {
"version": "5.0.1",
"resolved": "https://registry.npmjs.org/pug-parser/-/pug-parser-5.0.1.tgz",
"integrity": "sha512-nGHqK+w07p5/PsPIyzkTQfzlYfuqoiGjaoqHv1LjOv2ZLXmGX1O+4Vcvps+P4LhxZ3drYSljjq4b+Naid126wA==",
"dependencies": {
"pug-error": "^1.3.3",
"token-stream": "0.0.1"
}
},
"node_modules/pug-runtime": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/pug-runtime/-/pug-runtime-2.0.5.tgz",
"integrity": "sha512-P+rXKn9un4fQY77wtpcuFyvFaBww7/91f3jHa154qU26qFAnOe6SW1CbIDcxiG5lLK9HazYrMCCuDvNgDQNptw=="
},
"node_modules/pug-strip-comments": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/pug-strip-comments/-/pug-strip-comments-1.0.4.tgz",
"integrity": "sha512-i5j/9CS4yFhSxHp5iKPHwigaig/VV9g+FgReLJWWHEHbvKsbqL0oP/K5ubuLco6Wu3Kan5p7u7qk8A4oLLh6vw==",
"dependencies": {
"pug-error": "^1.3.3"
}
},
"node_modules/pug-walk": {
"version": "1.1.8",
"resolved": "https://registry.npmjs.org/pug-walk/-/pug-walk-1.1.8.tgz",
"integrity": "sha512-GMu3M5nUL3fju4/egXwZO0XLi6fW/K3T3VTgFQ14GxNi8btlxgT5qZL//JwZFm/2Fa64J/PNS8AZeys3wiMkVA=="
},
"node_modules/qs": {
"version": "6.11.0",
"resolved": "https://registry.npmjs.org/qs/-/qs-6.11.0.tgz",
"integrity": "sha512-MvjoMCJwEarSbUYk5O+nmoSzSutSsTwF85zcHPQ9OrlFoZOYIjaqBAJIqIXjptyD5vThxGq52Xu/MaJzRkIk4Q==",
"dependencies": {
"side-channel": "^1.0.4"
},
"engines": {
"node": ">=0.6"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/query-string": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/query-string/-/query-string-5.1.1.tgz",
"integrity": "sha512-gjWOsm2SoGlgLEdAGt7a6slVOk9mGiXmPFMqrEhLQ68rhQuBnpfs3+EmlvqKyxnCo9/PPlF+9MtY02S1aFg+Jw==",
"dependencies": {
"decode-uri-component": "^0.2.0",
"object-assign": "^4.1.0",
"strict-uri-encode": "^1.0.0"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/querystring": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/querystring/-/querystring-0.2.0.tgz",
"integrity": "sha1-sgmEkgO7Jd+CDadW50cAWHhSFiA=",
"deprecated": "The querystring API is considered Legacy. new code should use the URLSearchParams API instead.",
"engines": {
"node": ">=0.4.x"
}
},
"node_modules/random-bytes": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/random-bytes/-/random-bytes-1.0.0.tgz",
"integrity": "sha1-T2ih3Arli9P7lYSMMDJNt11kNgs=",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/range-parser": {
"version": "1.2.1",
"resolved": "https://registry.npmjs.org/range-parser/-/range-parser-1.2.1.tgz",
"integrity": "sha512-Hrgsx+orqoygnmhFbKaHE6c296J+HTAQXoxEF6gNupROmmGJRoyzfG3ccAveqCBrwr/2yxQ5BVd/GTl5agOwSg==",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/raw-body": {
"version": "2.5.1",
"resolved": "https://registry.npmjs.org/raw-body/-/raw-body-2.5.1.tgz",
"integrity": "sha512-qqJBtEyVgS0ZmPGdCFPWJ3FreoqvG4MVQln/kCgF7Olq95IbOp0/BWyMwbdtn4VTvkM8Y7khCQ2Xgk/tcrCXig==",
"dependencies": {
"bytes": "3.1.2",
"http-errors": "2.0.0",
"iconv-lite": "0.4.24",
"unpipe": "1.0.0"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/react-zlib-js": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/react-zlib-js/-/react-zlib-js-1.0.4.tgz",
"integrity": "sha512-ynXD9DFxpE7vtGoa3ZwBtPmZrkZYw2plzHGbanUjBOSN4RtuXdektSfABykHtTiWEHMh7WdYj45LHtp228ZF1A=="
},
"node_modules/readable-stream": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-3.3.0.tgz",
"integrity": "sha512-EsI+s3k3XsW+fU8fQACLN59ky34AZ14LoeVZpYwmZvldCFo0r0gnelwF2TcMjLor/BTL5aDJVBMkss0dthToPw==",
"dependencies": {
"inherits": "^2.0.3",
"string_decoder": "^1.1.1",
"util-deprecate": "^1.0.1"
},
"engines": {
"node": ">= 6"
}
},
"node_modules/readdirp": {
"version": "3.6.0",
"resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.6.0.tgz",
"integrity": "sha512-hOS089on8RduqdbhvQ5Z37A0ESjsqz6qnRcffsMU3495FuTdqSm+7bhJ29JvIOsBDEEnan5DPu9t3To9VRlMzA==",
"dev": true,
"dependencies": {
"picomatch": "^2.2.1"
},
"engines": {
"node": ">=8.10.0"
}
},
"node_modules/regenerator-runtime": {
"version": "0.11.1",
"resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.11.1.tgz",
"integrity": "sha512-MguG95oij0fC3QV3URf4V2SDYGJhJnJGqvIIgdECeODCT98wSWDAJ94SSuVpYQUoTcGUIL6L4yNB7j1DFFHSBg=="
},
"node_modules/repeat-string": {
"version": "1.6.1",
"resolved": "https://registry.npmjs.org/repeat-string/-/repeat-string-1.6.1.tgz",
"integrity": "sha1-jcrkcOHIirwtYA//Sndihtp15jc=",
"engines": {
"node": ">=0.10"
}
},
"node_modules/resolve": {
"version": "1.16.0",
"resolved": "https://registry.npmjs.org/resolve/-/resolve-1.16.0.tgz",
"integrity": "sha512-LarL/PIKJvc09k1jaeT4kQb/8/7P+qV4qSnN2K80AES+OHdfZELAKVOBjxsvtToT/uLOfFbvYvKfZmV8cee7nA==",
"dependencies": {
"path-parse": "^1.0.6"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/responselike": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/responselike/-/responselike-1.0.2.tgz",
"integrity": "sha1-kYcg7ztjHFZCvgaPFa3lpG9Loec=",
"dependencies": {
"lowercase-keys": "^1.0.0"
}
},
"node_modules/right-align": {
"version": "0.1.3",
"resolved": "https://registry.npmjs.org/right-align/-/right-align-0.1.3.tgz",
"integrity": "sha1-YTObci/mo1FWiSENJOFMlhSGE+8=",
"dependencies": {
"align-text": "^0.1.1"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/rndm": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/rndm/-/rndm-1.2.0.tgz",
"integrity": "sha1-8z/pz7Urv9UgqhgyO8ZdsRCht2w="
},
"node_modules/safe-buffer": {
"version": "5.1.2",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.1.2.tgz",
"integrity": "sha512-Gd2UZBJDkXlY7GbJxfsE8/nvKkUEU1G38c1siN6QP6a9PT9MmHB8GnpscSmMJSoF8LOIrt8ud/wPtojys4G6+g=="
},
"node_modules/safer-buffer": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz",
"integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg=="
},
"node_modules/semver": {
"version": "5.7.2",
"resolved": "https://registry.npmjs.org/semver/-/semver-5.7.2.tgz",
"integrity": "sha512-cBznnQ9KjJqU67B52RMC65CMarK2600WFnbkcaiwWq3xy/5haFJlshgnpjovMVJ+Hff49d8GEn0b87C5pDQ10g==",
"bin": {
"semver": "bin/semver"
}
},
"node_modules/send": {
"version": "0.18.0",
"resolved": "https://registry.npmjs.org/send/-/send-0.18.0.tgz",
"integrity": "sha512-qqWzuOjSFOuqPjFe4NOsMLafToQQwBSOEpS+FwEt3A2V3vKubTquT3vmLTQpFgMXp8AlFWFuP1qKaJZOtPpVXg==",
"dependencies": {
"debug": "2.6.9",
"depd": "2.0.0",
"destroy": "1.2.0",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"etag": "~1.8.1",
"fresh": "0.5.2",
"http-errors": "2.0.0",
"mime": "1.6.0",
"ms": "2.1.3",
"on-finished": "2.4.1",
"range-parser": "~1.2.1",
"statuses": "2.0.1"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/send/node_modules/depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/send/node_modules/ms": {
"version": "2.1.3",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz",
"integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA=="
},
"node_modules/send/node_modules/on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"dependencies": {
"ee-first": "1.1.1"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/send/node_modules/statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ==",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/serve-favicon": {
"version": "2.5.0",
"resolved": "https://registry.npmjs.org/serve-favicon/-/serve-favicon-2.5.0.tgz",
"integrity": "sha1-k10kDN/g9YBTB/3+ln2IlCosvPA=",
"dependencies": {
"etag": "~1.8.1",
"fresh": "0.5.2",
"ms": "2.1.1",
"parseurl": "~1.3.2",
"safe-buffer": "5.1.1"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/serve-favicon/node_modules/ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
},
"node_modules/serve-favicon/node_modules/safe-buffer": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.1.1.tgz",
"integrity": "sha512-kKvNJn6Mm93gAczWVJg7wH+wGYWNrDHdWvpUmHyEsgCtIwwo3bqPtV4tR5tuPaUhTOo/kvhVwd8XwwOllGYkbg=="
},
"node_modules/serve-static": {
"version": "1.15.0",
"resolved": "https://registry.npmjs.org/serve-static/-/serve-static-1.15.0.tgz",
"integrity": "sha512-XGuRDNjXUijsUL0vl6nSD7cwURuzEgglbOaFuZM9g3kwDXOWVTck0jLzjPzGD+TazWbboZYu52/9/XPdUgne9g==",
"dependencies": {
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"parseurl": "~1.3.3",
"send": "0.18.0"
},
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/setprototypeof": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.1.1.tgz",
"integrity": "sha512-JvdAWfbXeIGaZ9cILp38HntZSFSo3mWg6xGcJJsd+d4aRMOqauag1C63dJfDw7OaMYwEbHMOxEZ1lqVRYP2OAw=="
},
"node_modules/shebang-command": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-1.2.0.tgz",
"integrity": "sha1-RKrGW2lbAzmJaMOfNj/uXer98eo=",
"dev": true,
"dependencies": {
"shebang-regex": "^1.0.0"
},
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/shebang-regex": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-1.0.0.tgz",
"integrity": "sha1-2kL0l0DAtC2yypcoVxyxkMmO/qM=",
"dev": true,
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/side-channel": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/side-channel/-/side-channel-1.0.4.tgz",
"integrity": "sha512-q5XPytqFEIKHkGdiMIrY10mvLRvnQh42/+GoBlFW3b2LXLE2xxJpZFdm94we0BaoV3RwJyGqg5wS7epxTv0Zvw==",
"dependencies": {
"call-bind": "^1.0.0",
"get-intrinsic": "^1.0.2",
"object-inspect": "^1.9.0"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/simple-oauth2": {
"version": "2.5.2",
"resolved": "https://registry.npmjs.org/simple-oauth2/-/simple-oauth2-2.5.2.tgz",
"integrity": "sha512-8qjf+nHRdSUllFjjfpnonrU1oF/HNVbDle5HIbvXRYiy38C7KUvYe6w0ZZ//g4AFB6VNWuiZ80HmnycR8ZFDyQ==",
"deprecated": "simple-oauth2 v2 is no longer supported. Please upgrade to v3 for further support",
"dependencies": {
"@hapi/joi": "^15.1.1",
"date-fns": "^2.2.1",
"debug": "^4.1.1",
"wreck": "^14.0.2"
}
},
"node_modules/simple-oauth2/node_modules/debug": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.1.1.tgz",
"integrity": "sha512-pYAIzeRo8J6KPEaJ0VWOh5Pzkbw/RetuzehGM7QRRX5he4fPHx2rdKMB256ehJCkX+XRQm16eZLqLNS8RSZXZw==",
"deprecated": "Debug versions >=3.2.0 <3.2.7 || >=4 <4.3.1 have a low-severity ReDos regression when used in a Node.js environment. It is recommended you upgrade to 3.2.7 or 4.3.1. (https://github.com/visionmedia/debug/issues/797)",
"dependencies": {
"ms": "^2.1.1"
}
},
"node_modules/simple-oauth2/node_modules/ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
},
"node_modules/simple-swizzle": {
"version": "0.2.2",
"resolved": "https://registry.npmjs.org/simple-swizzle/-/simple-swizzle-0.2.2.tgz",
"integrity": "sha1-pNprY1/8zMoz9w0Xy5JZLeleVXo=",
"dependencies": {
"is-arrayish": "^0.3.1"
}
},
"node_modules/simple-update-notifier": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/simple-update-notifier/-/simple-update-notifier-1.1.0.tgz",
"integrity": "sha512-VpsrsJSUcJEseSbMHkrsrAVSdvVS5I96Qo1QAQ4FxQ9wXFcB+pjj7FB7/us9+GcgfW4ziHtYMc1J0PLczb55mg==",
"dev": true,
"dependencies": {
"semver": "~7.0.0"
},
"engines": {
"node": ">=8.10.0"
}
},
"node_modules/simple-update-notifier/node_modules/semver": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/semver/-/semver-7.0.0.tgz",
"integrity": "sha512-+GB6zVA9LWh6zovYQLALHwv5rb2PHGlJi3lfiqIHxR0uuwCgefcOJc59v9fv1w8GbStwxuuqqAjI9NMAOOgq1A==",
"dev": true,
"bin": {
"semver": "bin/semver.js"
}
},
"node_modules/sort-keys": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/sort-keys/-/sort-keys-2.0.0.tgz",
"integrity": "sha1-ZYU1WEhh7JfXMNbPQYIuH1ZoQSg=",
"dependencies": {
"is-plain-obj": "^1.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/source-map": {
"version": "0.5.7",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
"integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/stack-trace": {
"version": "0.0.10",
"resolved": "https://registry.npmjs.org/stack-trace/-/stack-trace-0.0.10.tgz",
"integrity": "sha1-VHxws0fo0ytOEI6hoqFZ5f3eGcA=",
"engines": {
"node": "*"
}
},
"node_modules/statuses": {
"version": "1.5.0",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-1.5.0.tgz",
"integrity": "sha1-Fhx9rBd2Wf2YEfQ3cfqZOBR4Yow=",
"engines": {
"node": ">= 0.6"
}
},
"node_modules/strict-uri-encode": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/strict-uri-encode/-/strict-uri-encode-1.1.0.tgz",
"integrity": "sha1-J5siXfHVgrH1TmWt3UNS4Y+qBxM=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/string_decoder": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.2.0.tgz",
"integrity": "sha512-6YqyX6ZWEYguAxgZzHGL7SsCeGx3V2TtOTqZz1xSTSWnqsbWwbptafNyvf/ACquZUXV3DANr5BDIwNYe1mN42w==",
"dependencies": {
"safe-buffer": "~5.1.0"
}
},
"node_modules/supports-color": {
"version": "5.5.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
"integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
"dependencies": {
"has-flag": "^3.0.0"
},
"engines": {
"node": ">=4"
}
},
"node_modules/text-hex": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/text-hex/-/text-hex-1.0.0.tgz",
"integrity": "sha512-uuVGNWzgJ4yhRaNSiubPY7OjISw4sw4E5Uv0wbjp+OzcbmVU/rsT8ujgcXJhn9ypzsgr5vlzpPqP+MBBKcGvbg=="
},
"node_modules/timed-out": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/timed-out/-/timed-out-4.0.1.tgz",
"integrity": "sha1-8y6srFoXW+ol1/q1Zas+2HQe9W8=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/to-fast-properties": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/to-fast-properties/-/to-fast-properties-1.0.3.tgz",
"integrity": "sha1-uDVx+k2MJbguIxsG46MFXeTKGkc=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/to-regex-range": {
"version": "5.0.1",
"resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
"integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
"dev": true,
"dependencies": {
"is-number": "^7.0.0"
},
"engines": {
"node": ">=8.0"
}
},
"node_modules/toidentifier": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/toidentifier/-/toidentifier-1.0.0.tgz",
"integrity": "sha512-yaOH/Pk/VEhBWWTlhI+qXxDFXlejDGcQipMlyxda9nthulaxLZUNcUqFxokp0vcYnvteJln5FNQDRrxj3YcbVw==",
"engines": {
"node": ">=0.6"
}
},
"node_modules/token-stream": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/token-stream/-/token-stream-0.0.1.tgz",
"integrity": "sha1-zu78cXp2xDFvEm0LnbqlXX598Bo="
},
"node_modules/touch": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/touch/-/touch-3.1.0.tgz",
"integrity": "sha512-WBx8Uy5TLtOSRtIq+M03/sKDrXCLHxwDcquSP2c43Le03/9serjQBIztjRz6FkJez9D/hleyAXTBGLwwZUw9lA==",
"dev": true,
"dependencies": {
"nopt": "~1.0.10"
},
"bin": {
"nodetouch": "bin/nodetouch.js"
}
},
"node_modules/tr46": {
"version": "0.0.3",
"resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz",
"integrity": "sha512-N3WMsuqV66lT30CrXNbEjx4GEwlow3v6rr4mCcv6prnfwhS01rkgyFdjPNBYd9br7LpXV1+Emh01fHnq2Gdgrw=="
},
"node_modules/triple-beam": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/triple-beam/-/triple-beam-1.3.0.tgz",
"integrity": "sha512-XrHUvV5HpdLmIj4uVMxHggLbFSZYIn7HEWsqePZcI50pco+MPqJ50wMGY794X7AOOhxOBAjbkqfAbEe/QMp2Lw=="
},
"node_modules/tsscmp": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/tsscmp/-/tsscmp-1.0.6.tgz",
"integrity": "sha512-LxhtAkPDTkVCMQjt2h6eBVY28KCjikZqZfMcC15YBeNjkgUpdCfBu5HoiOTDu86v6smE8yOjyEktJ8hlbANHQA==",
"engines": {
"node": ">=0.6.x"
}
},
"node_modules/type-is": {
"version": "1.6.18",
"resolved": "https://registry.npmjs.org/type-is/-/type-is-1.6.18.tgz",
"integrity": "sha512-TkRKr9sUTxEH8MdfuCSP7VizJyzRNMjj2J2do2Jr3Kym598JVdEksuzPQCnlFPW4ky9Q+iA+ma9BGm06XQBy8g==",
"dependencies": {
"media-typer": "0.3.0",
"mime-types": "~2.1.24"
},
"engines": {
"node": ">= 0.6"
}
},
"node_modules/typescript": {
"version": "3.9.10",
"resolved": "https://registry.npmjs.org/typescript/-/typescript-3.9.10.tgz",
"integrity": "sha512-w6fIxVE/H1PkLKcCPsFqKE7Kv7QUwhU8qQY2MueZXWx5cPZdwFupLgKK3vntcK98BtNHZtAF4LA/yl2a7k8R6Q==",
"bin": {
"tsc": "bin/tsc",
"tsserver": "bin/tsserver"
},
"engines": {
"node": ">=4.2.0"
}
},
"node_modules/uglify-js": {
"version": "2.8.29",
"resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-2.8.29.tgz",
"integrity": "sha1-KcVzMUgFe7Th913zW3qcty5qWd0=",
"dependencies": {
"source-map": "~0.5.1",
"yargs": "~3.10.0"
},
"bin": {
"uglifyjs": "bin/uglifyjs"
},
"engines": {
"node": ">=0.8.0"
},
"optionalDependencies": {
"uglify-to-browserify": "~1.0.0"
}
},
"node_modules/uglify-to-browserify": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/uglify-to-browserify/-/uglify-to-browserify-1.0.2.tgz",
"integrity": "sha1-bgkk1r2mta/jSeOabWMoUKD4grc=",
"optional": true
},
"node_modules/uid-safe": {
"version": "2.1.5",
"resolved": "https://registry.npmjs.org/uid-safe/-/uid-safe-2.1.5.tgz",
"integrity": "sha512-KPHm4VL5dDXKz01UuEd88Df+KzynaohSL9fBh096KWAxSKZQDI2uBrVqtvRM4rwrIrRRKsdLNML/lnaaVSRioA==",
"dependencies": {
"random-bytes": "~1.0.0"
},
"engines": {
"node": ">= 0.8"
}
},
"node_modules/undefsafe": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/undefsafe/-/undefsafe-2.0.5.tgz",
"integrity": "sha512-WxONCrssBM8TSPRqN5EmsjVrsv4A8X12J4ArBiiayv3DyyG3ZlIg6yysuuSYdZsVz3TKcTg2fd//Ujd4CHV1iA==",
"dev": true
},
"node_modules/unpipe": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/unpipe/-/unpipe-1.0.0.tgz",
"integrity": "sha1-sr9O6FFKrmFltIF4KdIbLvSZBOw=",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/url-join": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/url-join/-/url-join-4.0.1.tgz",
"integrity": "sha512-jk1+QP6ZJqyOiuEI9AEWQfju/nB2Pw466kbA0LEZljHwKeMgd9WrAEgEGxjPDD2+TNbbb37rTyhEfrCXfuKXnA=="
},
"node_modules/url-to-options": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/url-to-options/-/url-to-options-1.0.1.tgz",
"integrity": "sha1-FQWgOiiaSMvXpDTvuu7FBV9WM6k=",
"engines": {
"node": ">= 4"
}
},
"node_modules/util-deprecate": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/util-deprecate/-/util-deprecate-1.0.2.tgz",
"integrity": "sha1-RQ1Nyfpw3nMnYvvS1KKJgUGaDM8="
},
"node_modules/utils-merge": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/utils-merge/-/utils-merge-1.0.1.tgz",
"integrity": "sha1-n5VxD1CiZ5R7LMwSR0HBAoQn5xM=",
"engines": {
"node": ">= 0.4.0"
}
},
"node_modules/vary": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/vary/-/vary-1.1.2.tgz",
"integrity": "sha1-IpnwLG3tMNSllhsLn3RSShj2NPw=",
"engines": {
"node": ">= 0.8"
}
},
"node_modules/void-elements": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/void-elements/-/void-elements-2.0.1.tgz",
"integrity": "sha1-wGavtYK7HLQSjWDqkjkulNXp2+w=",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/webidl-conversions": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz",
"integrity": "sha512-2JAn3z8AR6rjK8Sm8orRC0h/bcl/DqL7tRPdGZ4I1CjdF+EaMLmYxBHyXuKL849eucPFhvBoxMsflfOb8kxaeQ=="
},
"node_modules/whatwg-url": {
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz",
"integrity": "sha512-saE57nupxk6v3HY35+jzBwYa0rKSy0XR8JSxZPwgLr7ys0IBzhGviA1/TUGJLmSVqs8pb9AnvICXEuOHLprYTw==",
"dependencies": {
"tr46": "~0.0.3",
"webidl-conversions": "^3.0.0"
}
},
"node_modules/which": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/which/-/which-1.3.1.tgz",
"integrity": "sha512-HxJdYWq1MTIQbJ3nw0cqssHoTNU267KlrDuGZ1WYlxDStUtKUhOaJmh112/TZmHxxUfuJqPXSOm7tDyas0OSIQ==",
"dev": true,
"dependencies": {
"isexe": "^2.0.0"
},
"bin": {
"which": "bin/which"
}
},
"node_modules/window-size": {
"version": "0.1.0",
"resolved": "https://registry.npmjs.org/window-size/-/window-size-0.1.0.tgz",
"integrity": "sha1-VDjNLqk7IC76Ohn+iIeu58lPnJ0=",
"engines": {
"node": ">= 0.8.0"
}
},
"node_modules/winston": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/winston/-/winston-3.2.1.tgz",
"integrity": "sha512-zU6vgnS9dAWCEKg/QYigd6cgMVVNwyTzKs81XZtTFuRwJOcDdBg7AU0mXVyNbs7O5RH2zdv+BdNZUlx7mXPuOw==",
"dependencies": {
"async": "^2.6.1",
"diagnostics": "^1.1.1",
"is-stream": "^1.1.0",
"logform": "^2.1.1",
"one-time": "0.0.4",
"readable-stream": "^3.1.1",
"stack-trace": "0.0.x",
"triple-beam": "^1.3.0",
"winston-transport": "^4.3.0"
},
"engines": {
"node": ">= 6.4.0"
}
},
"node_modules/winston-transport": {
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/winston-transport/-/winston-transport-4.3.0.tgz",
"integrity": "sha512-B2wPuwUi3vhzn/51Uukcao4dIduEiPOcOt9HJ3QeaXgkJ5Z7UwpBzxS4ZGNHtrxrUvTwemsQiSys0ihOf8Mp1A==",
"dependencies": {
"readable-stream": "^2.3.6",
"triple-beam": "^1.2.0"
},
"engines": {
"node": ">= 6.4.0"
}
},
"node_modules/winston-transport/node_modules/readable-stream": {
"version": "2.3.6",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.6.tgz",
"integrity": "sha512-tQtKA9WIAhBF3+VLAseyMqZeBjW0AHJoxOtYqSUZNJxauErmLbVm2FW1y+J/YA9dUrAC39ITejlZWhVIwawkKw==",
"dependencies": {
"core-util-is": "~1.0.0",
"inherits": "~2.0.3",
"isarray": "~1.0.0",
"process-nextick-args": "~2.0.0",
"safe-buffer": "~5.1.1",
"string_decoder": "~1.1.1",
"util-deprecate": "~1.0.1"
}
},
"node_modules/winston-transport/node_modules/string_decoder": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.1.1.tgz",
"integrity": "sha512-n/ShnvDi6FHbbVfviro+WojiFzv+s8MPMHBczVePfUpDJLwoLT0ht1l4YwBCbi8pJAveEEdnkHyPyTP/mzRfwg==",
"dependencies": {
"safe-buffer": "~5.1.0"
}
},
"node_modules/with": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/with/-/with-5.1.1.tgz",
"integrity": "sha1-+k2qktrzLE6pTtRTyB8EaGtXXf4=",
"dependencies": {
"acorn": "^3.1.0",
"acorn-globals": "^3.0.0"
}
},
"node_modules/wordwrap": {
"version": "0.0.2",
"resolved": "https://registry.npmjs.org/wordwrap/-/wordwrap-0.0.2.tgz",
"integrity": "sha1-t5Zpu0LstAn4PVg8rVLKF+qhZD8=",
"engines": {
"node": ">=0.4.0"
}
},
"node_modules/wreck": {
"version": "14.2.0",
"resolved": "https://registry.npmjs.org/wreck/-/wreck-14.2.0.tgz",
"integrity": "sha512-NFFft3SMgqrJbXEVfYifh+QDWFxni+98/I7ut7rLbz3F0XOypluHsdo3mdEYssGSirMobM3fGlqhyikbWKDn2Q==",
"deprecated": "This module has moved and is now available at @hapi/wreck. Please update your dependencies as this version is no longer maintained an may contain bugs and security issues.",
"dependencies": {
"boom": "7.x.x",
"bourne": "1.x.x",
"hoek": "6.x.x"
}
},
"node_modules/yallist": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/yallist/-/yallist-2.1.2.tgz",
"integrity": "sha1-HBH5IY8HYImkfdUS+TxmmaaoHVI="
},
"node_modules/yargs": {
"version": "3.10.0",
"resolved": "https://registry.npmjs.org/yargs/-/yargs-3.10.0.tgz",
"integrity": "sha1-9+572FfdfB0tOMDnTvvWgdFDH9E=",
"dependencies": {
"camelcase": "^1.0.2",
"cliui": "^2.1.0",
"decamelize": "^1.0.0",
"window-size": "0.1.0"
}
},
"node_modules/yargs/node_modules/camelcase": {
"version": "1.2.1",
"resolved": "https://registry.npmjs.org/camelcase/-/camelcase-1.2.1.tgz",
"integrity": "sha1-m7UwTS4LVmmLLHWLCKPqqdqlijk=",
"engines": {
"node": ">=0.10.0"
}
}
},
"dependencies": {
"@hapi/address": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/@hapi/address/-/address-2.1.4.tgz",
"integrity": "sha512-QD1PhQk+s31P1ixsX0H0Suoupp3VMXzIVMSwobR3F3MSUO2YCV0B7xqLcUw/Bh8yuvd3LhpyqLQWTNcRmp6IdQ=="
},
"@hapi/bourne": {
"version": "1.3.2",
"resolved": "https://registry.npmjs.org/@hapi/bourne/-/bourne-1.3.2.tgz",
"integrity": "sha512-1dVNHT76Uu5N3eJNTYcvxee+jzX4Z9lfciqRRHCU27ihbUcYi+iSc2iml5Ke1LXe1SyJCLA0+14Jh4tXJgOppA=="
},
"@hapi/hoek": {
"version": "8.5.1",
"resolved": "https://registry.npmjs.org/@hapi/hoek/-/hoek-8.5.1.tgz",
"integrity": "sha512-yN7kbciD87WzLGc5539Tn0sApjyiGHAJgKvG9W8C7O+6c7qmoQMfVs0W4bX17eqz6C78QJqqFrtgdK5EWf6Qow=="
},
"@hapi/joi": {
"version": "15.1.1",
"resolved": "https://registry.npmjs.org/@hapi/joi/-/joi-15.1.1.tgz",
"integrity": "sha512-entf8ZMOK8sc+8YfeOlM8pCfg3b5+WZIKBfUaaJT8UsjAAPjartzxIYm3TIbjvA4u+u++KbcXD38k682nVHDAQ==",
"requires": {
"@hapi/address": "2.x.x",
"@hapi/bourne": "1.x.x",
"@hapi/hoek": "8.x.x",
"@hapi/topo": "3.x.x"
}
},
"@hapi/topo": {
"version": "3.1.6",
"resolved": "https://registry.npmjs.org/@hapi/topo/-/topo-3.1.6.tgz",
"integrity": "sha512-tAag0jEcjwH+P2quUfipd7liWCNX2F8NvYjQp2wtInsZxnMlypdw0FtAOLxtvvkO+GSRRbmNi8m/5y42PQJYCQ==",
"requires": {
"@hapi/hoek": "^8.3.0"
}
},
"@ory/client": {
"version": "0.2.0-alpha.60",
"resolved": "https://registry.npmjs.org/@ory/client/-/client-0.2.0-alpha.60.tgz",
"integrity": "sha512-fGovJ/xIl7dvJJP9/IL4Xu1yiOCy9pvmkfj2xnHZbPrIbL9c9tqVcC3CSlzBq6zJQZMC3XI7VmZ8uEQ+cF4suw==",
"requires": {
"axios": "^0.21.4"
}
},
"@panva/asn1.js": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/@panva/asn1.js/-/asn1.js-1.0.0.tgz",
"integrity": "sha512-UdkG3mLEqXgnlKsWanWcgb6dOjUzJ+XC5f+aWw30qrtjxeNUSfKX1cd5FBzOaXQumoe9nIqeZUvrRJS03HCCtw=="
},
"@sindresorhus/is": {
"version": "0.7.0",
"resolved": "https://registry.npmjs.org/@sindresorhus/is/-/is-0.7.0.tgz",
"integrity": "sha512-ONhaKPIufzzrlNbqtWFFd+jlnemX6lJAgq9ZeiZtS7I1PIf/la7CW4m83rTXRnVnsMbW2k56pGYu7AUFJD9Pow=="
},
"@types/babel-types": {
"version": "7.0.7",
"resolved": "https://registry.npmjs.org/@types/babel-types/-/babel-types-7.0.7.tgz",
"integrity": "sha512-dBtBbrc+qTHy1WdfHYjBwRln4+LWqASWakLHsWHR2NWHIFkv4W3O070IGoGLEBrJBvct3r0L1BUPuvURi7kYUQ=="
},
"@types/babylon": {
"version": "6.16.5",
"resolved": "https://registry.npmjs.org/@types/babylon/-/babylon-6.16.5.tgz",
"integrity": "sha512-xH2e58elpj1X4ynnKp9qSnWlsRTIs6n3tgLGNfwAGHwePw0mulHQllV34n0T25uYSu1k0hRKkWXF890B1yS47w==",
"requires": {
"@types/babel-types": "*"
}
},
"@types/body-parser": {
"version": "1.19.2",
"resolved": "https://registry.npmjs.org/@types/body-parser/-/body-parser-1.19.2.tgz",
"integrity": "sha512-ALYone6pm6QmwZoAgeyNksccT9Q4AWZQ6PvfwR37GT6r6FWUPguq6sUmNGSMV2Wr761oQoBxwGGa6DR5o1DC9g==",
"requires": {
"@types/connect": "*",
"@types/node": "*"
}
},
"@types/connect": {
"version": "3.4.35",
"resolved": "https://registry.npmjs.org/@types/connect/-/connect-3.4.35.tgz",
"integrity": "sha512-cdeYyv4KWoEgpBISTxWvqYsVy444DOqehiF3fM3ne10AmJ62RSyNkUnxMJXHQWRQQX2eR94m5y1IZyDwBjV9FQ==",
"requires": {
"@types/node": "*"
}
},
"@types/cookie-parser": {
"version": "1.4.3",
"resolved": "https://registry.npmjs.org/@types/cookie-parser/-/cookie-parser-1.4.3.tgz",
"integrity": "sha512-CqSKwFwefj4PzZ5n/iwad/bow2hTCh0FlNAeWLtQM3JA/NX/iYagIpWG2cf1bQKQ2c9gU2log5VUCrn7LDOs0w==",
"requires": {
"@types/express": "*"
}
},
"@types/csurf": {
"version": "1.11.2",
"resolved": "https://registry.npmjs.org/@types/csurf/-/csurf-1.11.2.tgz",
"integrity": "sha512-9bc98EnwmC1S0aSJiA8rWwXtgXtXHHOQOsGHptImxFgqm6CeH+mIOunHRg6+/eg2tlmDMX3tY7XrWxo2M/nUNQ==",
"requires": {
"@types/express-serve-static-core": "*"
}
},
"@types/express": {
"version": "4.17.13",
"resolved": "https://registry.npmjs.org/@types/express/-/express-4.17.13.tgz",
"integrity": "sha512-6bSZTPaTIACxn48l50SR+axgrqm6qXFIxrdAKaG6PaJk3+zuUr35hBlgT7vOmJcum+OEaIBLtHV/qloEAFITeA==",
"requires": {
"@types/body-parser": "*",
"@types/express-serve-static-core": "^4.17.18",
"@types/qs": "*",
"@types/serve-static": "*"
}
},
"@types/express-serve-static-core": {
"version": "4.17.28",
"resolved": "https://registry.npmjs.org/@types/express-serve-static-core/-/express-serve-static-core-4.17.28.tgz",
"integrity": "sha512-P1BJAEAW3E2DJUlkgq4tOL3RyMunoWXqbSCygWo5ZIWTjUgN1YnaXWW4VWl/oc8vs/XoYibEGBKP0uZyF4AHig==",
"requires": {
"@types/node": "*",
"@types/qs": "*",
"@types/range-parser": "*"
}
},
"@types/jsonwebtoken": {
"version": "8.5.8",
"resolved": "https://registry.npmjs.org/@types/jsonwebtoken/-/jsonwebtoken-8.5.8.tgz",
"integrity": "sha512-zm6xBQpFDIDM6o9r6HSgDeIcLy82TKWctCXEPbJJcXb5AKmi5BNNdLXneixK4lplX3PqIVcwLBCGE/kAGnlD4A==",
"requires": {
"@types/node": "*"
}
},
"@types/mime": {
"version": "1.3.2",
"resolved": "https://registry.npmjs.org/@types/mime/-/mime-1.3.2.tgz",
"integrity": "sha512-YATxVxgRqNH6nHEIsvg6k2Boc1JHI9ZbH5iWFFv/MTkchz3b1ieGDa5T0a9RznNdI0KhVbdbWSN+KWWrQZRxTw=="
},
"@types/morgan": {
"version": "1.9.4",
"resolved": "https://registry.npmjs.org/@types/morgan/-/morgan-1.9.4.tgz",
"integrity": "sha512-cXoc4k+6+YAllH3ZHmx4hf7La1dzUk6keTR4bF4b4Sc0mZxU/zK4wO7l+ZzezXm/jkYj/qC+uYGZrarZdIVvyQ==",
"requires": {
"@types/node": "*"
}
},
"@types/node": {
"version": "17.0.42",
"resolved": "https://registry.npmjs.org/@types/node/-/node-17.0.42.tgz",
"integrity": "sha512-Q5BPGyGKcvQgAMbsr7qEGN/kIPN6zZecYYABeTDBizOsau+2NMdSVTar9UQw21A2+JyA2KRNDYaYrPB0Rpk2oQ=="
},
"@types/qs": {
"version": "6.9.7",
"resolved": "https://registry.npmjs.org/@types/qs/-/qs-6.9.7.tgz",
"integrity": "sha512-FGa1F62FT09qcrueBA6qYTrJPVDzah9a+493+o2PCXsesWHIn27G98TsSMs3WPNbZIEj4+VJf6saSFpvD+3Zsw=="
},
"@types/range-parser": {
"version": "1.2.4",
"resolved": "https://registry.npmjs.org/@types/range-parser/-/range-parser-1.2.4.tgz",
"integrity": "sha512-EEhsLsD6UsDM1yFhAvy0Cjr6VwmpMWqFBCb9w07wVugF7w9nfajxLuVmngTIpgS6svCnm6Vaw+MZhoDCKnOfsw=="
},
"@types/serve-static": {
"version": "1.13.10",
"resolved": "https://registry.npmjs.org/@types/serve-static/-/serve-static-1.13.10.tgz",
"integrity": "sha512-nCkHGI4w7ZgAdNkrEu0bv+4xNV/XDqW+DydknebMOQwkpDGx8G+HTlj7R7ABI8i8nKxVw0wtKPi1D+lPOkh4YQ==",
"requires": {
"@types/mime": "^1",
"@types/node": "*"
}
},
"@types/url-join": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/@types/url-join/-/url-join-4.0.1.tgz",
"integrity": "sha512-wDXw9LEEUHyV+7UWy7U315nrJGJ7p1BzaCxDpEoLr789Dk1WDVMMlf3iBfbG2F8NdWnYyFbtTxUn2ZNbm1Q4LQ=="
},
"abbrev": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/abbrev/-/abbrev-1.1.1.tgz",
"integrity": "sha512-nne9/IiQ/hzIhY6pdDnbBtz7DjPTKrY00P/zvPSm5pOFkl6xuGrGnXn/VtTNNfNtAfZ9/1RtehkszU9qcTii0Q==",
"dev": true
},
"accepts": {
"version": "1.3.8",
"resolved": "https://registry.npmjs.org/accepts/-/accepts-1.3.8.tgz",
"integrity": "sha512-PYAthTa2m2VKxuvSD3DPC/Gy+U+sOA1LAuT8mkmRuvw+NACSaeXEQ+NHcVF7rONl6qcaxV3Uuemwawk+7+SJLw==",
"requires": {
"mime-types": "~2.1.34",
"negotiator": "0.6.3"
}
},
"acorn": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-3.3.0.tgz",
"integrity": "sha1-ReN/s56No/JbruP/U2niu18iAXo="
},
"acorn-globals": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/acorn-globals/-/acorn-globals-3.1.0.tgz",
"integrity": "sha1-/YJw9x+7SZawBPqIDuXUZXOnMb8=",
"requires": {
"acorn": "^4.0.4"
},
"dependencies": {
"acorn": {
"version": "4.0.13",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-4.0.13.tgz",
"integrity": "sha1-EFSVrlNh1pe9GVyCUZLhrX8lN4c="
}
}
},
"aggregate-error": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/aggregate-error/-/aggregate-error-1.0.0.tgz",
"integrity": "sha1-iINE2tAiCnLjr1CQYRf0h3GSX6w=",
"requires": {
"clean-stack": "^1.0.0",
"indent-string": "^3.0.0"
}
},
"align-text": {
"version": "0.1.4",
"resolved": "https://registry.npmjs.org/align-text/-/align-text-0.1.4.tgz",
"integrity": "sha1-DNkKVhCT810KmSVsIrcGlDP60Rc=",
"requires": {
"kind-of": "^3.0.2",
"longest": "^1.0.1",
"repeat-string": "^1.5.2"
},
"dependencies": {
"kind-of": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-3.2.2.tgz",
"integrity": "sha1-MeohpzS6ubuw8yRm2JOupR5KPGQ=",
"requires": {
"is-buffer": "^1.1.5"
}
}
}
},
"ansi-styles": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz",
"integrity": "sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==",
"requires": {
"color-convert": "^1.9.0"
}
},
"anymatch": {
"version": "3.1.3",
"resolved": "https://registry.npmjs.org/anymatch/-/anymatch-3.1.3.tgz",
"integrity": "sha512-KMReFUr0B4t+D+OBkjR3KYqvocp2XaSzO55UcB6mgQMd3KbcE+mWTyvVV7D/zsdEbNnV6acZUutkiHQXvTr1Rw==",
"dev": true,
"requires": {
"normalize-path": "^3.0.0",
"picomatch": "^2.0.4"
}
},
"array-flatten": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/array-flatten/-/array-flatten-1.1.1.tgz",
"integrity": "sha1-ml9pkFGx5wczKPKgCJaLZOopVdI="
},
"asap": {
"version": "2.0.6",
"resolved": "https://registry.npmjs.org/asap/-/asap-2.0.6.tgz",
"integrity": "sha1-5QNHYR1+aQlDIIu9r+vLwvuGbUY="
},
"async": {
"version": "2.6.4",
"resolved": "https://registry.npmjs.org/async/-/async-2.6.4.tgz",
"integrity": "sha512-mzo5dfJYwAn29PeiJ0zvwTo04zj8HDJj0Mn8TD7sno7q12prdbnasKJHhkm2c1LgrhlJ0teaea8860oxi51mGA==",
"requires": {
"lodash": "^4.17.14"
}
},
"axios": {
"version": "0.21.4",
"resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz",
"integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==",
"requires": {
"follow-redirects": "^1.14.0"
}
},
"babel-runtime": {
"version": "6.26.0",
"resolved": "https://registry.npmjs.org/babel-runtime/-/babel-runtime-6.26.0.tgz",
"integrity": "sha1-llxwWGaOgrVde/4E/yM3vItWR/4=",
"requires": {
"core-js": "^2.4.0",
"regenerator-runtime": "^0.11.0"
}
},
"babel-types": {
"version": "6.26.0",
"resolved": "https://registry.npmjs.org/babel-types/-/babel-types-6.26.0.tgz",
"integrity": "sha1-o7Bz+Uq0nrb6Vc1lInozQ4BjJJc=",
"requires": {
"babel-runtime": "^6.26.0",
"esutils": "^2.0.2",
"lodash": "^4.17.4",
"to-fast-properties": "^1.0.3"
}
},
"babylon": {
"version": "6.18.0",
"resolved": "https://registry.npmjs.org/babylon/-/babylon-6.18.0.tgz",
"integrity": "sha512-q/UEjfGJ2Cm3oKV71DJz9d25TPnq5rhBVL2Q4fA5wcC3jcrdn7+SssEybFIxwAvvP+YCsCYNKughoF33GxgycQ=="
},
"balanced-match": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/balanced-match/-/balanced-match-1.0.0.tgz",
"integrity": "sha1-ibTRmasr7kneFk6gK4nORi1xt2c=",
"dev": true
},
"base64-js": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/base64-js/-/base64-js-1.3.1.tgz",
"integrity": "sha512-mLQ4i2QO1ytvGWFWmcngKO//JXAQueZvwEKtjgQFM4jIK0kU+ytMfplL8j+n5mspOfjHwoAg+9yhb7BwAHm36g=="
},
"base64url": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/base64url/-/base64url-3.0.1.tgz",
"integrity": "sha512-ir1UPr3dkwexU7FdV8qBBbNDRUhMmIekYMFZfi+C/sLNnRESKPl23nB9b2pltqfOQNnGzsDdId90AEtG5tCx4A=="
},
"basic-auth": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/basic-auth/-/basic-auth-2.0.1.tgz",
"integrity": "sha512-NF+epuEdnUYVlGuhaxbbq+dvJttwLnGY+YixlXlME5KpQ5W3CnXA5cVTneY3SPbPDRkcjMbifrwmFYcClgOZeg==",
"requires": {
"safe-buffer": "5.1.2"
}
},
"binary-extensions": {
"version": "2.2.0",
"resolved": "https://registry.npmjs.org/binary-extensions/-/binary-extensions-2.2.0.tgz",
"integrity": "sha512-jDctJ/IVQbZoJykoeHbhXpOlNBqGNcwXJKJog42E5HDPUwQTSdjCHdihjj0DlnheQ7blbT6dHOafNAiS8ooQKA==",
"dev": true
},
"body-parser": {
"version": "1.20.1",
"resolved": "https://registry.npmjs.org/body-parser/-/body-parser-1.20.1.tgz",
"integrity": "sha512-jWi7abTbYwajOytWCQc37VulmWiRae5RyTpaCyDcS5/lMdtwSz5lOpDE67srw/HYe35f1z3fDQw+3txg7gNtWw==",
"requires": {
"bytes": "3.1.2",
"content-type": "~1.0.4",
"debug": "2.6.9",
"depd": "2.0.0",
"destroy": "1.2.0",
"http-errors": "2.0.0",
"iconv-lite": "0.4.24",
"on-finished": "2.4.1",
"qs": "6.11.0",
"raw-body": "2.5.1",
"type-is": "~1.6.18",
"unpipe": "1.0.0"
},
"dependencies": {
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
},
"on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"requires": {
"ee-first": "1.1.1"
}
}
}
},
"boom": {
"version": "7.3.0",
"resolved": "https://registry.npmjs.org/boom/-/boom-7.3.0.tgz",
"integrity": "sha512-Swpoyi2t5+GhOEGw8rEsKvTxFLIDiiKoUc2gsoV6Lyr43LHBIzch3k2MvYUs8RTROrIkVJ3Al0TkaOGjnb+B6A==",
"requires": {
"hoek": "6.x.x"
}
},
"bourne": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/bourne/-/bourne-1.1.2.tgz",
"integrity": "sha512-b2dgVkTZhkQirNMohgC00rWfpVqEi9y5tKM1k3JvoNx05ODtfQoPPd4js9CYFQoY0IM8LAmnJulEuWv74zjUOg=="
},
"brace-expansion": {
"version": "1.1.11",
"resolved": "https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz",
"integrity": "sha512-iCuPHDFgrHX7H2vEI/5xpz07zSHB00TpugqhmYtVmMO6518mCuRMoOYFldEBl0g187ufozdaHgWKcYFb61qGiA==",
"dev": true,
"requires": {
"balanced-match": "^1.0.0",
"concat-map": "0.0.1"
}
},
"braces": {
"version": "3.0.2",
"resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz",
"integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==",
"dev": true,
"requires": {
"fill-range": "^7.0.1"
}
},
"browserify-zlib": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/browserify-zlib/-/browserify-zlib-0.2.0.tgz",
"integrity": "sha512-Z942RysHXmJrhqk88FmKBVq/v5tqmSkDz7p54G/MGyjMnCFFnC79XWNbg+Vta8W6Wb2qtSZTSxIGkJrRpCFEiA==",
"requires": {
"pako": "~1.0.5"
}
},
"buffer": {
"version": "5.6.0",
"resolved": "https://registry.npmjs.org/buffer/-/buffer-5.6.0.tgz",
"integrity": "sha512-/gDYp/UtU0eA1ys8bOs9J6a+E/KWIY+DZ+Q2WESNUA0jFRsJOc0SNUO6xJ5SGA1xueg3NL65W6s+NY5l9cunuw==",
"requires": {
"base64-js": "^1.0.2",
"ieee754": "^1.1.4"
}
},
"buffer-equal-constant-time": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/buffer-equal-constant-time/-/buffer-equal-constant-time-1.0.1.tgz",
"integrity": "sha1-+OcRMvf/5uAaXJaXpMbz5I1cyBk="
},
"bytes": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/bytes/-/bytes-3.1.2.tgz",
"integrity": "sha512-/Nf7TyzTx6S3yRJObOAV7956r8cr2+Oj8AC5dt8wSP3BQAoeX58NoHyCU8P8zGkNXStjTSi6fzO6F0pBdcYbEg=="
},
"cacheable-request": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/cacheable-request/-/cacheable-request-2.1.4.tgz",
"integrity": "sha1-DYCIAbY0KtM8kd+dC0TcCbkeXD0=",
"requires": {
"clone-response": "1.0.2",
"get-stream": "3.0.0",
"http-cache-semantics": "3.8.1",
"keyv": "3.0.0",
"lowercase-keys": "1.0.0",
"normalize-url": "2.0.1",
"responselike": "1.0.2"
},
"dependencies": {
"lowercase-keys": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-1.0.0.tgz",
"integrity": "sha1-TjNms55/VFfjXxMkvfb4jQv8cwY="
}
}
},
"call-bind": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/call-bind/-/call-bind-1.0.2.tgz",
"integrity": "sha512-7O+FbCihrB5WGbFYesctwmTKae6rOiIzmz1icreWJ+0aA7LJfuqhEso2T9ncpcFtzMQtzXf2QGGueWJGTYsqrA==",
"requires": {
"function-bind": "^1.1.1",
"get-intrinsic": "^1.0.2"
}
},
"center-align": {
"version": "0.1.3",
"resolved": "https://registry.npmjs.org/center-align/-/center-align-0.1.3.tgz",
"integrity": "sha1-qg0yYptu6XIgBBHL1EYckHvCt60=",
"requires": {
"align-text": "^0.1.3",
"lazy-cache": "^1.0.3"
}
},
"chalk": {
"version": "2.4.2",
"resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz",
"integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==",
"requires": {
"ansi-styles": "^3.2.1",
"escape-string-regexp": "^1.0.5",
"supports-color": "^5.3.0"
}
},
"character-parser": {
"version": "2.2.0",
"resolved": "https://registry.npmjs.org/character-parser/-/character-parser-2.2.0.tgz",
"integrity": "sha1-x84o821LzZdE5f/CxfzeHHMmH8A=",
"requires": {
"is-regex": "^1.0.3"
}
},
"chokidar": {
"version": "3.5.3",
"resolved": "https://registry.npmjs.org/chokidar/-/chokidar-3.5.3.tgz",
"integrity": "sha512-Dr3sfKRP6oTcjf2JmUmFJfeVMvXBdegxB0iVQ5eb2V10uFJUCAS8OByZdVAyVb8xXNz3GjjTgj9kLWsZTqE6kw==",
"dev": true,
"requires": {
"anymatch": "~3.1.2",
"braces": "~3.0.2",
"fsevents": "~2.3.2",
"glob-parent": "~5.1.2",
"is-binary-path": "~2.1.0",
"is-glob": "~4.0.1",
"normalize-path": "~3.0.0",
"readdirp": "~3.6.0"
}
},
"clean-css": {
"version": "4.2.3",
"resolved": "https://registry.npmjs.org/clean-css/-/clean-css-4.2.3.tgz",
"integrity": "sha512-VcMWDN54ZN/DS+g58HYL5/n4Zrqe8vHJpGA8KdgUXFU4fuP/aHNw8eld9SyEIyabIMJX/0RaY/fplOo5hYLSFA==",
"requires": {
"source-map": "~0.6.0"
},
"dependencies": {
"source-map": {
"version": "0.6.1",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz",
"integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g=="
}
}
},
"clean-stack": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/clean-stack/-/clean-stack-1.3.0.tgz",
"integrity": "sha1-noIVAa6XmYbEax1m0tQy2y/UrjE="
},
"cliui": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/cliui/-/cliui-2.1.0.tgz",
"integrity": "sha1-S0dXYP+AJkx2LDoXGQMukcf+oNE=",
"requires": {
"center-align": "^0.1.1",
"right-align": "^0.1.1",
"wordwrap": "0.0.2"
}
},
"clone-response": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/clone-response/-/clone-response-1.0.2.tgz",
"integrity": "sha1-0dyXOSAxTfZ/vrlCI7TuNQI56Ws=",
"requires": {
"mimic-response": "^1.0.0"
}
},
"color": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/color/-/color-3.0.0.tgz",
"integrity": "sha512-jCpd5+s0s0t7p3pHQKpnJ0TpQKKdleP71LWcA0aqiljpiuAkOSUFN/dyH8ZwF0hRmFlrIuRhufds1QyEP9EB+w==",
"requires": {
"color-convert": "^1.9.1",
"color-string": "^1.5.2"
}
},
"color-convert": {
"version": "1.9.3",
"resolved": "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz",
"integrity": "sha512-QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg==",
"requires": {
"color-name": "1.1.3"
}
},
"color-name": {
"version": "1.1.3",
"resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz",
"integrity": "sha1-p9BVi9icQveV3UIyj3QIMcpTvCU="
},
"color-string": {
"version": "1.5.5",
"resolved": "https://registry.npmjs.org/color-string/-/color-string-1.5.5.tgz",
"integrity": "sha512-jgIoum0OfQfq9Whcfc2z/VhCNcmQjWbey6qBX0vqt7YICflUmBCh9E9CiQD5GSJ+Uehixm3NUwHVhqUAWRivZg==",
"requires": {
"color-name": "^1.0.0",
"simple-swizzle": "^0.2.2"
}
},
"colornames": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/colornames/-/colornames-1.1.1.tgz",
"integrity": "sha1-+IiQMGhcfE/54qVZ9Qd+t2qBb5Y="
},
"colors": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/colors/-/colors-1.3.3.tgz",
"integrity": "sha512-mmGt/1pZqYRjMxB1axhTo16/snVZ5krrKkcmMeVKxzECMMXoCgnvTPp10QgHfcbQZw8Dq2jMNG6je4JlWU0gWg=="
},
"colorspace": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/colorspace/-/colorspace-1.1.1.tgz",
"integrity": "sha512-pI3btWyiuz7Ken0BWh9Elzsmv2bM9AhA7psXib4anUXy/orfZ/E0MbQwhSOG/9L8hLlalqrU0UhOuqxW1YjmVw==",
"requires": {
"color": "3.0.x",
"text-hex": "1.0.x"
}
},
"concat-map": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/concat-map/-/concat-map-0.0.1.tgz",
"integrity": "sha1-2Klr13/Wjfd5OnMDajug1UBdR3s=",
"dev": true
},
"constantinople": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/constantinople/-/constantinople-3.1.2.tgz",
"integrity": "sha512-yePcBqEFhLOqSBtwYOGGS1exHo/s1xjekXiinh4itpNQGCu4KA1euPh1fg07N2wMITZXQkBz75Ntdt1ctGZouw==",
"requires": {
"@types/babel-types": "^7.0.0",
"@types/babylon": "^6.16.2",
"babel-types": "^6.26.0",
"babylon": "^6.18.0"
}
},
"content-disposition": {
"version": "0.5.4",
"resolved": "https://registry.npmjs.org/content-disposition/-/content-disposition-0.5.4.tgz",
"integrity": "sha512-FveZTNuGw04cxlAiWbzi6zTAL/lhehaWbTtgluJh4/E95DqMwTmha3KZN1aAWA8cFIhHzMZUvLevkw5Rqk+tSQ==",
"requires": {
"safe-buffer": "5.2.1"
},
"dependencies": {
"safe-buffer": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
}
}
},
"content-type": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/content-type/-/content-type-1.0.4.tgz",
"integrity": "sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA=="
},
"cookie": {
"version": "0.4.0",
"resolved": "https://registry.npmjs.org/cookie/-/cookie-0.4.0.tgz",
"integrity": "sha512-+Hp8fLp57wnUSt0tY0tHEXh4voZRDnoIrZPqlo3DPiI4y9lwg/jqx+1Om94/W6ZaPDOUbnjOt/99w66zk+l1Xg=="
},
"cookie-parser": {
"version": "1.4.5",
"resolved": "https://registry.npmjs.org/cookie-parser/-/cookie-parser-1.4.5.tgz",
"integrity": "sha512-f13bPUj/gG/5mDr+xLmSxxDsB9DQiTIfhJS/sqjrmfAWiAN+x2O4i/XguTL9yDZ+/IFDanJ+5x7hC4CXT9Tdzw==",
"requires": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6"
}
},
"cookie-signature": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/cookie-signature/-/cookie-signature-1.0.6.tgz",
"integrity": "sha1-4wOogrNCzD7oylE6eZmXNNqzriw="
},
"core-js": {
"version": "2.6.11",
"resolved": "https://registry.npmjs.org/core-js/-/core-js-2.6.11.tgz",
"integrity": "sha512-5wjnpaT/3dV+XB4borEsnAYQchn00XSgTAWKDkEqv+K8KevjbzmofK6hfJ9TZIlpj2N0xQpazy7PiRQiWHqzWg=="
},
"core-util-is": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/core-util-is/-/core-util-is-1.0.2.tgz",
"integrity": "sha1-tf1UIgqivFq1eqtxQMlAdUUDwac="
},
"cross-env": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/cross-env/-/cross-env-5.2.1.tgz",
"integrity": "sha512-1yHhtcfAd1r4nwQgknowuUNfIT9E8dOMMspC36g45dN+iD1blloi7xp8X/xAIDnjHWyt1uQ8PHk2fkNaym7soQ==",
"dev": true,
"requires": {
"cross-spawn": "^6.0.5"
}
},
"cross-spawn": {
"version": "6.0.5",
"resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz",
"integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==",
"dev": true,
"requires": {
"nice-try": "^1.0.4",
"path-key": "^2.0.1",
"semver": "^5.5.0",
"shebang-command": "^1.2.0",
"which": "^1.2.9"
}
},
"csrf": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/csrf/-/csrf-3.1.0.tgz",
"integrity": "sha512-uTqEnCvWRk042asU6JtapDTcJeeailFy4ydOQS28bj1hcLnYRiqi8SsD2jS412AY1I/4qdOwWZun774iqywf9w==",
"requires": {
"rndm": "1.2.0",
"tsscmp": "1.0.6",
"uid-safe": "2.1.5"
}
},
"csurf": {
"version": "1.11.0",
"resolved": "https://registry.npmjs.org/csurf/-/csurf-1.11.0.tgz",
"integrity": "sha512-UCtehyEExKTxgiu8UHdGvHj4tnpE/Qctue03Giq5gPgMQ9cg/ciod5blZQ5a4uCEenNQjxyGuzygLdKUmee/bQ==",
"requires": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6",
"csrf": "3.1.0",
"http-errors": "~1.7.3"
},
"dependencies": {
"http-errors": {
"version": "1.7.3",
"resolved": "https://registry.npmjs.org/http-errors/-/http-errors-1.7.3.tgz",
"integrity": "sha512-ZTTX0MWrsQ2ZAhA1cejAwDLycFsd7I7nVtnkT3Ol0aqodaKW+0CTZDQ1uBv5whptCnc8e8HeRRJxRs0kmm/Qfw==",
"requires": {
"depd": "~1.1.2",
"inherits": "2.0.4",
"setprototypeof": "1.1.1",
"statuses": ">= 1.5.0 < 2",
"toidentifier": "1.0.0"
}
}
}
},
"date-fns": {
"version": "2.12.0",
"resolved": "https://registry.npmjs.org/date-fns/-/date-fns-2.12.0.tgz",
"integrity": "sha512-qJgn99xxKnFgB1qL4jpxU7Q2t0LOn1p8KMIveef3UZD7kqjT3tpFNNdXJelEHhE+rUgffriXriw/sOSU+cS1Hw=="
},
"debug": {
"version": "2.6.9",
"resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz",
"integrity": "sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==",
"requires": {
"ms": "2.0.0"
}
},
"decamelize": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/decamelize/-/decamelize-1.2.0.tgz",
"integrity": "sha1-9lNNFRSCabIDUue+4m9QH5oZEpA="
},
"decode-uri-component": {
"version": "0.2.2",
"resolved": "https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.2.tgz",
"integrity": "sha512-FqUYQ+8o158GyGTrMFJms9qh3CqTKvAqgqsTnkLI8sKu0028orqBhxNMFkFen0zGyg6epACD32pjVk58ngIErQ=="
},
"decompress-response": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/decompress-response/-/decompress-response-3.3.0.tgz",
"integrity": "sha1-gKTdMjdIOEv6JICDYirt7Jgq3/M=",
"requires": {
"mimic-response": "^1.0.0"
}
},
"depd": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/depd/-/depd-1.1.2.tgz",
"integrity": "sha1-m81S4UwJd2PnSbJ0xDRu0uVgtak="
},
"destroy": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/destroy/-/destroy-1.2.0.tgz",
"integrity": "sha512-2sJGJTaXIIaR1w4iJSNoN0hnMY7Gpc/n8D4qSCJw8QqFWXf7cuAgnEHxBpweaVcPevC2l3KpjYCx3NypQQgaJg=="
},
"diagnostics": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/diagnostics/-/diagnostics-1.1.1.tgz",
"integrity": "sha512-8wn1PmdunLJ9Tqbx+Fx/ZEuHfJf4NKSN2ZBj7SJC/OWRWha843+WsTjqMe1B5E3p28jqBlp+mJ2fPVxPyNgYKQ==",
"requires": {
"colorspace": "1.1.x",
"enabled": "1.0.x",
"kuler": "1.0.x"
}
},
"doctypes": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/doctypes/-/doctypes-1.1.0.tgz",
"integrity": "sha1-6oCxBqh1OHdOijpKWv4pPeSJ4Kk="
},
"dotenv": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/dotenv/-/dotenv-7.0.0.tgz",
"integrity": "sha512-M3NhsLbV1i6HuGzBUH8vXrtxOk+tWmzWKDMbAVSUp3Zsjm7ywFeuwrUXhmhQyRK1q5B5GGy7hcXPbj3bnfZg2g=="
},
"duplexer3": {
"version": "0.1.4",
"resolved": "https://registry.npmjs.org/duplexer3/-/duplexer3-0.1.4.tgz",
"integrity": "sha1-7gHdHKwO08vH/b6jfcCo8c4ALOI="
},
"ecdsa-sig-formatter": {
"version": "1.0.11",
"resolved": "https://registry.npmjs.org/ecdsa-sig-formatter/-/ecdsa-sig-formatter-1.0.11.tgz",
"integrity": "sha512-nagl3RYrbNv6kQkeJIpt6NJZy8twLB/2vtz6yN9Z4vRKHN4/QZJIEbqohALSgwKdnksuY3k5Addp5lg8sVoVcQ==",
"requires": {
"safe-buffer": "^5.0.1"
}
},
"ee-first": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/ee-first/-/ee-first-1.1.1.tgz",
"integrity": "sha1-WQxhFWsK4vTwJVcyoViyZrxWsh0="
},
"enabled": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/enabled/-/enabled-1.0.2.tgz",
"integrity": "sha1-ll9lE9LC0cX0ZStkouM5ZGf8L5M=",
"requires": {
"env-variable": "0.0.x"
}
},
"encodeurl": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/encodeurl/-/encodeurl-1.0.2.tgz",
"integrity": "sha512-TPJXq8JqFaVYm2CWmPvnP2Iyo4ZSM7/QKcSmuMLDObfpH5fi7RUGmd/rTDf+rut/saiDiQEeVTNgAmJEdAOx0w=="
},
"env-variable": {
"version": "0.0.5",
"resolved": "https://registry.npmjs.org/env-variable/-/env-variable-0.0.5.tgz",
"integrity": "sha512-zoB603vQReOFvTg5xMl9I1P2PnHsHQQKTEowsKKD7nseUfJq6UWzK+4YtlWUO1nhiQUxe6XMkk+JleSZD1NZFA=="
},
"es6-promise": {
"version": "4.2.8",
"resolved": "https://registry.npmjs.org/es6-promise/-/es6-promise-4.2.8.tgz",
"integrity": "sha512-HJDGx5daxeIvxdBxvG2cb9g4tEvwIk3i8+nhX0yGrYmZUzbkdg8QbDevheDB8gd0//uPj4c1EQua8Q+MViT0/w=="
},
"escape-html": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/escape-html/-/escape-html-1.0.3.tgz",
"integrity": "sha512-NiSupZ4OeuGwr68lGIeym/ksIZMJodUGOSCZ/FSnTxcrekbvqrgdUxlJOMpijaKZVjAJrWrGs/6Jy8OMuyj9ow=="
},
"escape-string-regexp": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz",
"integrity": "sha1-G2HAViGQqN/2rjuyzwIAyhMLhtQ="
},
"esutils": {
"version": "2.0.3",
"resolved": "https://registry.npmjs.org/esutils/-/esutils-2.0.3.tgz",
"integrity": "sha512-kVscqXk4OCp68SZ0dkgEKVi6/8ij300KBWTJq32P/dYeWTSwK41WyTxalN1eRmA5Z9UU/LX9D7FWSmV9SAYx6g=="
},
"etag": {
"version": "1.8.1",
"resolved": "https://registry.npmjs.org/etag/-/etag-1.8.1.tgz",
"integrity": "sha1-Qa4u62XvpiJorr/qg6x9eSmbCIc="
},
"express": {
"version": "4.18.2",
"resolved": "https://registry.npmjs.org/express/-/express-4.18.2.tgz",
"integrity": "sha512-5/PsL6iGPdfQ/lKM1UuielYgv3BUoJfz1aUwU9vHZ+J7gyvwdQXFEBIEIaxeGf0GIcreATNyBExtalisDbuMqQ==",
"requires": {
"accepts": "~1.3.8",
"array-flatten": "1.1.1",
"body-parser": "1.20.1",
"content-disposition": "0.5.4",
"content-type": "~1.0.4",
"cookie": "0.5.0",
"cookie-signature": "1.0.6",
"debug": "2.6.9",
"depd": "2.0.0",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"etag": "~1.8.1",
"finalhandler": "1.2.0",
"fresh": "0.5.2",
"http-errors": "2.0.0",
"merge-descriptors": "1.0.1",
"methods": "~1.1.2",
"on-finished": "2.4.1",
"parseurl": "~1.3.3",
"path-to-regexp": "0.1.7",
"proxy-addr": "~2.0.7",
"qs": "6.11.0",
"range-parser": "~1.2.1",
"safe-buffer": "5.2.1",
"send": "0.18.0",
"serve-static": "1.15.0",
"setprototypeof": "1.2.0",
"statuses": "2.0.1",
"type-is": "~1.6.18",
"utils-merge": "1.0.1",
"vary": "~1.1.2"
},
"dependencies": {
"cookie": {
"version": "0.5.0",
"resolved": "https://registry.npmjs.org/cookie/-/cookie-0.5.0.tgz",
"integrity": "sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw=="
},
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
},
"on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"requires": {
"ee-first": "1.1.1"
}
},
"safe-buffer": {
"version": "5.2.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
},
"setprototypeof": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.2.0.tgz",
"integrity": "sha512-E5LDX7Wrp85Kil5bhZv46j8jOeboKq5JMmYM3gVGdGH8xFpPWXUMsNrlODCrkoxMEeNi/XZIwuRvY4XNwYMJpw=="
},
"statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ=="
}
}
},
"express-session": {
"version": "1.17.0",
"resolved": "https://registry.npmjs.org/express-session/-/express-session-1.17.0.tgz",
"integrity": "sha512-t4oX2z7uoSqATbMfsxWMbNjAL0T5zpvcJCk3Z9wnPPN7ibddhnmDZXHfEcoBMG2ojKXZoCyPMc5FbtK+G7SoDg==",
"requires": {
"cookie": "0.4.0",
"cookie-signature": "1.0.6",
"debug": "2.6.9",
"depd": "~2.0.0",
"on-headers": "~1.0.2",
"parseurl": "~1.3.3",
"safe-buffer": "5.2.0",
"uid-safe": "~2.1.5"
},
"dependencies": {
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
},
"safe-buffer": {
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.0.tgz",
"integrity": "sha512-fZEwUGbVl7kouZs1jCdMLdt95hdIv0ZeHg6L7qPeciMZhZ+/gdesW4wgTARkrFWEpspjEATAzUGPG8N2jJiwbg=="
}
}
},
"express-winston": {
"version": "3.4.0",
"resolved": "https://registry.npmjs.org/express-winston/-/express-winston-3.4.0.tgz",
"integrity": "sha512-CKo4ESwIV4BpNIsGVNiq2GcAwuomL4dVJRIIH/2K/jMpoRI2DakhkVTtaJACzV7n2I1v+knDJkkjZRCymJ7nmA==",
"requires": {
"chalk": "^2.4.1",
"lodash": "^4.17.10"
}
},
"fast-safe-stringify": {
"version": "2.0.6",
"resolved": "https://registry.npmjs.org/fast-safe-stringify/-/fast-safe-stringify-2.0.6.tgz",
"integrity": "sha512-q8BZ89jjc+mz08rSxROs8VsrBBcn1SIw1kq9NjolL509tkABRk9io01RAjSaEv1Xb2uFLt8VtRiZbGp5H8iDtg=="
},
"fecha": {
"version": "2.3.3",
"resolved": "https://registry.npmjs.org/fecha/-/fecha-2.3.3.tgz",
"integrity": "sha512-lUGBnIamTAwk4znq5BcqsDaxSmZ9nDVJaij6NvRt/Tg4R69gERA+otPKbS86ROw9nxVMw2/mp1fnaiWqbs6Sdg=="
},
"fill-range": {
"version": "7.0.1",
"resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz",
"integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==",
"dev": true,
"requires": {
"to-regex-range": "^5.0.1"
}
},
"finalhandler": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/finalhandler/-/finalhandler-1.2.0.tgz",
"integrity": "sha512-5uXcUVftlQMFnWC9qu/svkWv3GTd2PfUhK/3PLkYNAe7FbqJMt3515HaxE6eRL74GdsriiwujiawdaB1BpEISg==",
"requires": {
"debug": "2.6.9",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"on-finished": "2.4.1",
"parseurl": "~1.3.3",
"statuses": "2.0.1",
"unpipe": "~1.0.0"
},
"dependencies": {
"on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"requires": {
"ee-first": "1.1.1"
}
},
"statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ=="
}
}
},
"follow-redirects": {
"version": "1.15.2",
"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.2.tgz",
"integrity": "sha512-VQLG33o04KaQ8uYi2tVNbdrWp1QWxNNea+nmIB4EVM28v0hmP17z7aG1+wAkNzVq4KeXTq3221ye5qTJP91JwA=="
},
"forwarded": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/forwarded/-/forwarded-0.2.0.tgz",
"integrity": "sha512-buRG0fpBtRHSTCOASe6hD258tEubFoRLb4ZNA6NxMVHNw2gOcwHo9wyablzMzOA5z9xA9L1KNjk/Nt6MT9aYow=="
},
"fresh": {
"version": "0.5.2",
"resolved": "https://registry.npmjs.org/fresh/-/fresh-0.5.2.tgz",
"integrity": "sha1-PYyt2Q2XZWn6g1qx+OSyOhBWBac="
},
"from2": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/from2/-/from2-2.3.0.tgz",
"integrity": "sha1-i/tVAr3kpNNs/e6gB/zKIdfjgq8=",
"requires": {
"inherits": "^2.0.1",
"readable-stream": "^2.0.0"
},
"dependencies": {
"readable-stream": {
"version": "2.3.7",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.7.tgz",
"integrity": "sha512-Ebho8K4jIbHAxnuxi7o42OrZgF/ZTNcsZj6nRKyUmkhLFq8CHItp/fy6hQZuZmP/n3yZ9VBUbp4zz/mX8hmYPw==",
"requires": {
"core-util-is": "~1.0.0",
"inherits": "~2.0.3",
"isarray": "~1.0.0",
"process-nextick-args": "~2.0.0",
"safe-buffer": "~5.1.1",
"string_decoder": "~1.1.1",
"util-deprecate": "~1.0.1"
}
},
"string_decoder": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.1.1.tgz",
"integrity": "sha512-n/ShnvDi6FHbbVfviro+WojiFzv+s8MPMHBczVePfUpDJLwoLT0ht1l4YwBCbi8pJAveEEdnkHyPyTP/mzRfwg==",
"requires": {
"safe-buffer": "~5.1.0"
}
}
}
},
"fsevents": {
"version": "2.3.2",
"resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.3.2.tgz",
"integrity": "sha512-xiqMQR4xAeHTuB9uWm+fFRcIOgKBMiOBP+eXiyT7jsgVCq1bkVygt00oASowB7EdtpOHaaPgKt812P9ab+DDKA==",
"dev": true,
"optional": true
},
"function-bind": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/function-bind/-/function-bind-1.1.1.tgz",
"integrity": "sha512-yIovAzMX49sF8Yl58fSCWJ5svSLuaibPxXQJFLmBObTuCr0Mf1KiPopGM9NiFjiYBCbfaa2Fh6breQ6ANVTI0A=="
},
"get-intrinsic": {
"version": "1.1.3",
"resolved": "https://registry.npmjs.org/get-intrinsic/-/get-intrinsic-1.1.3.tgz",
"integrity": "sha512-QJVz1Tj7MS099PevUG5jvnt9tSkXN8K14dxQlikJuPt4uD9hHAHjLyLBiLR5zELelBdD9QNRAXZzsJx0WaDL9A==",
"requires": {
"function-bind": "^1.1.1",
"has": "^1.0.3",
"has-symbols": "^1.0.3"
}
},
"get-stream": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz",
"integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ="
},
"glob-parent": {
"version": "5.1.2",
"resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz",
"integrity": "sha512-AOIgSQCepiJYwP3ARnGx+5VnTu2HBYdzbGP45eLw1vr3zB3vZLeyed1sC9hnbcOc9/SrMyM5RPQrkGz4aS9Zow==",
"dev": true,
"requires": {
"is-glob": "^4.0.1"
}
},
"has": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/has/-/has-1.0.3.tgz",
"integrity": "sha512-f2dvO0VU6Oej7RkWJGrehjbzMAjFp5/VKPp5tTpWIV4JHHZK1/BxbFRtf/siA2SWTe09caDmVtYYzWEIbBS4zw==",
"requires": {
"function-bind": "^1.1.1"
}
},
"has-flag": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz",
"integrity": "sha1-tdRU3CGZriJWmfNGfloH87lVuv0="
},
"has-symbol-support-x": {
"version": "1.4.2",
"resolved": "https://registry.npmjs.org/has-symbol-support-x/-/has-symbol-support-x-1.4.2.tgz",
"integrity": "sha512-3ToOva++HaW+eCpgqZrCfN51IPB+7bJNVT6CUATzueB5Heb8o6Nam0V3HG5dlDvZU1Gn5QLcbahiKw/XVk5JJw=="
},
"has-symbols": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.3.tgz",
"integrity": "sha512-l3LCuF6MgDNwTDKkdYGEihYjt5pRPbEg46rtlmnSPlUbgmB8LOIrKJbYYFBSbnPaJexMKtiPO8hmeRjRz2Td+A=="
},
"has-to-string-tag-x": {
"version": "1.4.1",
"resolved": "https://registry.npmjs.org/has-to-string-tag-x/-/has-to-string-tag-x-1.4.1.tgz",
"integrity": "sha512-vdbKfmw+3LoOYVr+mtxHaX5a96+0f3DljYd8JOqvOLsf5mw2Otda2qCDT9qRqLAhrjyQ0h7ual5nOiASpsGNFw==",
"requires": {
"has-symbol-support-x": "^1.4.1"
}
},
"hoek": {
"version": "6.1.3",
"resolved": "https://registry.npmjs.org/hoek/-/hoek-6.1.3.tgz",
"integrity": "sha512-YXXAAhmF9zpQbC7LEcREFtXfGq5K1fmd+4PHkBq8NUqmzW3G+Dq10bI/i0KucLRwss3YYFQ0fSfoxBZYiGUqtQ=="
},
"http-cache-semantics": {
"version": "3.8.1",
"resolved": "https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-3.8.1.tgz",
"integrity": "sha512-5ai2iksyV8ZXmnZhHH4rWPoxxistEexSi5936zIQ1bnNTW5VnA85B6P/VpXiRM017IgRvb2kKo1a//y+0wSp3w=="
},
"http-errors": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/http-errors/-/http-errors-2.0.0.tgz",
"integrity": "sha512-FtwrG/euBzaEjYeRqOgly7G0qviiXoJWnvEH2Z1plBdXgbyjv34pHTSb9zoeHMyDy33+DWy5Wt9Wo+TURtOYSQ==",
"requires": {
"depd": "2.0.0",
"inherits": "2.0.4",
"setprototypeof": "1.2.0",
"statuses": "2.0.1",
"toidentifier": "1.0.1"
},
"dependencies": {
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
},
"setprototypeof": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.2.0.tgz",
"integrity": "sha512-E5LDX7Wrp85Kil5bhZv46j8jOeboKq5JMmYM3gVGdGH8xFpPWXUMsNrlODCrkoxMEeNi/XZIwuRvY4XNwYMJpw=="
},
"statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ=="
},
"toidentifier": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/toidentifier/-/toidentifier-1.0.1.tgz",
"integrity": "sha512-o5sSPKEkg/DIQNmH43V0/uerLrpzVedkUh8tGNvaeXpfpuwjKenlSox/2O/BTlZUtEe+JG7s5YhEz608PlAHRA=="
}
}
},
"hydra-login-consent-logout": {
"version": "2.0.4-pre.2",
"resolved": "https://registry.npmjs.org/hydra-login-consent-logout/-/hydra-login-consent-logout-2.0.4-pre.2.tgz",
"integrity": "sha512-nB3JKffjiTyQZzr0DPdkdoUAg7mPlNTv7c/jZrC5IrIyodc3X4s16LzcZJcs/e2U3pZyu3CoWGUrnF//wPzmqQ==",
"requires": {
"@ory/client": "^0.2.0-alpha.24",
"@types/cookie-parser": "^1.4.2",
"@types/csurf": "^1.9.36",
"@types/express": "^4.17.7",
"@types/morgan": "^1.9.1",
"@types/url-join": "^4.0.0",
"body-parser": "^1.19.0",
"cookie-parser": "^1.4.5",
"csurf": "^1.11.0",
"debug": "^4.1.1",
"express": "^4.17.1",
"morgan": "^1.10.0",
"node-fetch": "^2.6.7",
"pug": "^2.0.4",
"querystring": "^0.2.0",
"serve-favicon": "^2.5.0",
"typescript": "^3.7.5",
"url-join": "^4.0.1"
},
"dependencies": {
"debug": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.1.1.tgz",
"integrity": "sha512-pYAIzeRo8J6KPEaJ0VWOh5Pzkbw/RetuzehGM7QRRX5he4fPHx2rdKMB256ehJCkX+XRQm16eZLqLNS8RSZXZw==",
"requires": {
"ms": "^2.1.1"
},
"dependencies": {
"ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
}
}
}
}
},
"iconv-lite": {
"version": "0.4.24",
"resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.4.24.tgz",
"integrity": "sha512-v3MXnZAcvnywkTUEZomIActle7RXXeedOR31wwl7VlyoXO4Qi9arvSenNQWne1TcRwhCL1HwLI21bEqdpj8/rA==",
"requires": {
"safer-buffer": ">= 2.1.2 < 3"
}
},
"ieee754": {
"version": "1.1.13",
"resolved": "https://registry.npmjs.org/ieee754/-/ieee754-1.1.13.tgz",
"integrity": "sha512-4vf7I2LYV/HaWerSo3XmlMkp5eZ83i+/CDluXi/IGTs/O1sejBNhTtnxzmRZfvOUqj7lZjqHkeTvpgSFDlWZTg=="
},
"ignore-by-default": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/ignore-by-default/-/ignore-by-default-1.0.1.tgz",
"integrity": "sha1-SMptcvbGo68Aqa1K5odr44ieKwk=",
"dev": true
},
"indent-string": {
"version": "3.2.0",
"resolved": "https://registry.npmjs.org/indent-string/-/indent-string-3.2.0.tgz",
"integrity": "sha1-Sl/W0nzDMvN+VBmlBNu4NxBckok="
},
"inherits": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz",
"integrity": "sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ=="
},
"into-stream": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/into-stream/-/into-stream-3.1.0.tgz",
"integrity": "sha1-lvsKk2wSur1v8XUqF9BWFqvQlMY=",
"requires": {
"from2": "^2.1.1",
"p-is-promise": "^1.1.0"
}
},
"ipaddr.js": {
"version": "1.9.1",
"resolved": "https://registry.npmjs.org/ipaddr.js/-/ipaddr.js-1.9.1.tgz",
"integrity": "sha512-0KI/607xoxSToH7GjN1FfSbLoU0+btTicjsQSWQlh/hZykN8KpmMf7uYwPW3R+akZ6R/w18ZlXSHBYXiYUPO3g=="
},
"is-arrayish": {
"version": "0.3.2",
"resolved": "https://registry.npmjs.org/is-arrayish/-/is-arrayish-0.3.2.tgz",
"integrity": "sha512-eVRqCvVlZbuw3GrM63ovNSNAeA1K16kaR/LRY/92w0zxQ5/1YzwblUX652i4Xs9RwAGjW9d9y6X88t8OaAJfWQ=="
},
"is-binary-path": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/is-binary-path/-/is-binary-path-2.1.0.tgz",
"integrity": "sha512-ZMERYes6pDydyuGidse7OsHxtbI7WVeUEozgR/g7rd0xUimYNlvZRE/K2MgZTjWy725IfelLeVcEM97mmtRGXw==",
"dev": true,
"requires": {
"binary-extensions": "^2.0.0"
}
},
"is-buffer": {
"version": "1.1.6",
"resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-1.1.6.tgz",
"integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w=="
},
"is-expression": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/is-expression/-/is-expression-3.0.0.tgz",
"integrity": "sha1-Oayqa+f9HzRx3ELHQW5hwkMXrJ8=",
"requires": {
"acorn": "~4.0.2",
"object-assign": "^4.0.1"
},
"dependencies": {
"acorn": {
"version": "4.0.13",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-4.0.13.tgz",
"integrity": "sha1-EFSVrlNh1pe9GVyCUZLhrX8lN4c="
}
}
},
"is-extglob": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/is-extglob/-/is-extglob-2.1.1.tgz",
"integrity": "sha512-SbKbANkN603Vi4jEZv49LeVJMn4yGwsbzZworEoyEiutsN3nJYdbO36zfhGJ6QEDpOZIFkDtnq5JRxmvl3jsoQ==",
"dev": true
},
"is-glob": {
"version": "4.0.3",
"resolved": "https://registry.npmjs.org/is-glob/-/is-glob-4.0.3.tgz",
"integrity": "sha512-xelSayHH36ZgE7ZWhli7pW34hNbNl8Ojv5KVmkJD4hBdD3th8Tfk9vYasLM+mXWOZhFkgZfxhLSnrwRr4elSSg==",
"dev": true,
"requires": {
"is-extglob": "^2.1.1"
}
},
"is-number": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/is-number/-/is-number-7.0.0.tgz",
"integrity": "sha512-41Cifkg6e8TylSpdtTpeLVMqvSBEVzTttHvERD741+pnZ8ANv0004MRL43QKPDlK9cGvNp6NZWZUBlbGXYxxng==",
"dev": true
},
"is-object": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/is-object/-/is-object-1.0.1.tgz",
"integrity": "sha1-iVJojF7C/9awPsyF52ngKQMINHA="
},
"is-plain-obj": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-1.1.0.tgz",
"integrity": "sha1-caUMhCnfync8kqOQpKA7OfzVHT4="
},
"is-promise": {
"version": "2.1.0",
"resolved": "https://registry.npmjs.org/is-promise/-/is-promise-2.1.0.tgz",
"integrity": "sha1-eaKp7OfwlugPNtKy87wWwf9L8/o="
},
"is-regex": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz",
"integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==",
"requires": {
"has": "^1.0.3"
}
},
"is-retry-allowed": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/is-retry-allowed/-/is-retry-allowed-1.2.0.tgz",
"integrity": "sha512-RUbUeKwvm3XG2VYamhJL1xFktgjvPzL0Hq8C+6yrWIswDy3BIXGqCxhxkc30N9jqK311gVU137K8Ei55/zVJRg=="
},
"is-stream": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/is-stream/-/is-stream-1.1.0.tgz",
"integrity": "sha1-EtSj3U5o4Lec6428hBc66A2RykQ="
},
"isarray": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/isarray/-/isarray-1.0.0.tgz",
"integrity": "sha1-u5NdSFgsuhaMBoNJV6VKPgcSTxE="
},
"isexe": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/isexe/-/isexe-2.0.0.tgz",
"integrity": "sha1-6PvzdNxVb/iUehDcsFctYz8s+hA=",
"dev": true
},
"isurl": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/isurl/-/isurl-1.0.0.tgz",
"integrity": "sha512-1P/yWsxPlDtn7QeRD+ULKQPaIaN6yF368GZ2vDfv0AL0NwpStafjWCDDdn0k8wgFMWpVAqG7oJhxHnlud42i9w==",
"requires": {
"has-to-string-tag-x": "^1.2.0",
"is-object": "^1.0.1"
}
},
"jose": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.5.tgz",
"integrity": "sha512-BAiDNeDKTMgk4tvD0BbxJ8xHEHBZgpeRZ1zGPPsitSyMgjoMWiLGYAE7H7NpP5h0lPppQajQs871E8NHUrzVPA==",
"requires": {
"@panva/asn1.js": "^1.0.0"
}
},
"js-stringify": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/js-stringify/-/js-stringify-1.0.2.tgz",
"integrity": "sha1-Fzb939lyTyijaCrcYjCufk6Weds="
},
"json-buffer": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/json-buffer/-/json-buffer-3.0.0.tgz",
"integrity": "sha1-Wx85evx11ne96Lz8Dkfh+aPZqJg="
},
"jsonwebtoken": {
"version": "8.5.1",
"resolved": "https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz",
"integrity": "sha512-XjwVfRS6jTMsqYs0EsuJ4LGxXV14zQybNd4L2r0UvbVnSF9Af8x7p5MzbJ90Ioz/9TI41/hTCvznF/loiSzn8w==",
"requires": {
"jws": "^3.2.2",
"lodash.includes": "^4.3.0",
"lodash.isboolean": "^3.0.3",
"lodash.isinteger": "^4.0.4",
"lodash.isnumber": "^3.0.3",
"lodash.isplainobject": "^4.0.6",
"lodash.isstring": "^4.0.1",
"lodash.once": "^4.0.0",
"ms": "^2.1.1",
"semver": "^5.6.0"
},
"dependencies": {
"ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
}
}
},
"jstransformer": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/jstransformer/-/jstransformer-1.0.0.tgz",
"integrity": "sha1-7Yvwkh4vPx7U1cGkT2hwntJHIsM=",
"requires": {
"is-promise": "^2.0.0",
"promise": "^7.0.1"
}
},
"jwa": {
"version": "1.4.1",
"resolved": "https://registry.npmjs.org/jwa/-/jwa-1.4.1.tgz",
"integrity": "sha512-qiLX/xhEEFKUAJ6FiBMbes3w9ATzyk5W7Hvzpa/SLYdxNtng+gcurvrI7TbACjIXlsJyr05/S1oUhZrc63evQA==",
"requires": {
"buffer-equal-constant-time": "1.0.1",
"ecdsa-sig-formatter": "1.0.11",
"safe-buffer": "^5.0.1"
}
},
"jwks-rsa": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/jwks-rsa/-/jwks-rsa-2.1.4.tgz",
"integrity": "sha512-mpArfgPkUpX11lNtGxsF/szkasUcbWHGplZl/uFvFO2NuMHmt0dQXIihh0rkPU2yQd5niQtuUHbXnG/WKiXF6Q==",
"requires": {
"@types/express": "^4.17.13",
"@types/jsonwebtoken": "^8.5.8",
"debug": "^4.3.4",
"jose": "^2.0.5",
"limiter": "^1.1.5",
"lru-memoizer": "^2.1.4"
},
"dependencies": {
"debug": {
"version": "4.3.4",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.3.4.tgz",
"integrity": "sha512-PRWFHuSU3eDtQJPvnNY7Jcket1j0t5OuOsFzPPzsekD52Zl8qUfFIPEiswXqIvHWGVHOgX+7G/vCNNhehwxfkQ==",
"requires": {
"ms": "2.1.2"
}
},
"ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
}
}
},
"jws": {
"version": "3.2.2",
"resolved": "https://registry.npmjs.org/jws/-/jws-3.2.2.tgz",
"integrity": "sha512-YHlZCB6lMTllWDtSPHz/ZXTsi8S00usEV6v1tjq8tOUZzw7DpSDWVXjXDre6ed1w/pd495ODpHZYSdkRTsa0HA==",
"requires": {
"jwa": "^1.4.1",
"safe-buffer": "^5.0.1"
}
},
"keyv": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/keyv/-/keyv-3.0.0.tgz",
"integrity": "sha512-eguHnq22OE3uVoSYG0LVWNP+4ppamWr9+zWBe1bsNcovIMy6huUJFPgy4mGwCd/rnl3vOLGW1MTlu4c57CT1xA==",
"requires": {
"json-buffer": "3.0.0"
}
},
"kuler": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/kuler/-/kuler-1.0.1.tgz",
"integrity": "sha512-J9nVUucG1p/skKul6DU3PUZrhs0LPulNaeUOox0IyXDi8S4CztTHs1gQphhuZmzXG7VOQSf6NJfKuzteQLv9gQ==",
"requires": {
"colornames": "^1.1.1"
}
},
"lazy-cache": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/lazy-cache/-/lazy-cache-1.0.4.tgz",
"integrity": "sha1-odePw6UEdMuAhF07O24dpJpEbo4="
},
"limiter": {
"version": "1.1.5",
"resolved": "https://registry.npmjs.org/limiter/-/limiter-1.1.5.tgz",
"integrity": "sha512-FWWMIEOxz3GwUI4Ts/IvgVy6LPvoMPgjMdQ185nN6psJyBJ4yOpzqm695/h5umdLJg2vW3GR5iG11MAkR2AzJA=="
},
"lodash": {
"version": "4.17.14",
"resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.14.tgz",
"integrity": "sha512-mmKYbW3GLuJeX+iGP+Y7Gp1AiGHGbXHCOh/jZmrawMmsE7MS4znI3RL2FsjbqOyMayHInjOeykW7PEajUk1/xw=="
},
"lodash.clonedeep": {
"version": "4.5.0",
"resolved": "https://registry.npmjs.org/lodash.clonedeep/-/lodash.clonedeep-4.5.0.tgz",
"integrity": "sha512-H5ZhCF25riFd9uB5UCkVKo61m3S/xZk1x4wA6yp/L3RFP6Z/eHH1ymQcGLo7J3GMPfm0V/7m1tryHuGVxpqEBQ=="
},
"lodash.includes": {
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/lodash.includes/-/lodash.includes-4.3.0.tgz",
"integrity": "sha1-YLuYqHy5I8aMoeUTJUgzFISfVT8="
},
"lodash.isboolean": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isboolean/-/lodash.isboolean-3.0.3.tgz",
"integrity": "sha1-bC4XHbKiV82WgC/UOwGyDV9YcPY="
},
"lodash.isinteger": {
"version": "4.0.4",
"resolved": "https://registry.npmjs.org/lodash.isinteger/-/lodash.isinteger-4.0.4.tgz",
"integrity": "sha1-YZwK89A/iwTDH1iChAt3sRzWg0M="
},
"lodash.isnumber": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isnumber/-/lodash.isnumber-3.0.3.tgz",
"integrity": "sha1-POdoEMWSjQM1IwGsKHMX8RwLH/w="
},
"lodash.isplainobject": {
"version": "4.0.6",
"resolved": "https://registry.npmjs.org/lodash.isplainobject/-/lodash.isplainobject-4.0.6.tgz",
"integrity": "sha1-fFJqUtibRcRcxpC4gWO+BJf1UMs="
},
"lodash.isstring": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/lodash.isstring/-/lodash.isstring-4.0.1.tgz",
"integrity": "sha1-1SfftUVuynzJu5XV2ur4i6VKVFE="
},
"lodash.once": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/lodash.once/-/lodash.once-4.1.1.tgz",
"integrity": "sha1-DdOXEhPHxW34gJd9UEyI+0cal6w="
},
"logform": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/logform/-/logform-2.1.2.tgz",
"integrity": "sha512-+lZh4OpERDBLqjiwDLpAWNQu6KMjnlXH2ByZwCuSqVPJletw0kTWJf5CgSNAUKn1KUkv3m2cUz/LK8zyEy7wzQ==",
"requires": {
"colors": "^1.2.1",
"fast-safe-stringify": "^2.0.4",
"fecha": "^2.3.3",
"ms": "^2.1.1",
"triple-beam": "^1.3.0"
},
"dependencies": {
"ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
}
}
},
"long": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/long/-/long-4.0.0.tgz",
"integrity": "sha512-XsP+KhQif4bjX1kbuSiySJFNAehNxgLb6hPRGJ9QsUr8ajHkuXGdrHmFUTUUXhDwVX2R5bY4JNZEwbUiMhV+MA=="
},
"longest": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/longest/-/longest-1.0.1.tgz",
"integrity": "sha1-MKCy2jj3N3DoKUoNIuZiXtd9AJc="
},
"lowercase-keys": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/lowercase-keys/-/lowercase-keys-1.0.1.tgz",
"integrity": "sha512-G2Lj61tXDnVFFOi8VZds+SoQjtQC3dgokKdDG2mTm1tx4m50NUHBOZSBwQQHyy0V12A0JTG4icfZQH+xPyh8VA=="
},
"lru-cache": {
"version": "4.0.2",
"resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-4.0.2.tgz",
"integrity": "sha1-HRdnnAac2l0ECZGgnbwsDbN35V4=",
"requires": {
"pseudomap": "^1.0.1",
"yallist": "^2.0.0"
}
},
"lru-memoizer": {
"version": "2.1.4",
"resolved": "https://registry.npmjs.org/lru-memoizer/-/lru-memoizer-2.1.4.tgz",
"integrity": "sha512-IXAq50s4qwrOBrXJklY+KhgZF+5y98PDaNo0gi/v2KQBFLyWr+JyFvijZXkGKjQj/h9c0OwoE+JZbwUXce76hQ==",
"requires": {
"lodash.clonedeep": "^4.5.0",
"lru-cache": "~4.0.0"
}
},
"media-typer": {
"version": "0.3.0",
"resolved": "https://registry.npmjs.org/media-typer/-/media-typer-0.3.0.tgz",
"integrity": "sha1-hxDXrwqmJvj/+hzgAWhUUmMlV0g="
},
"merge-descriptors": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/merge-descriptors/-/merge-descriptors-1.0.1.tgz",
"integrity": "sha1-sAqqVW3YtEVoFQ7J0blT8/kMu2E="
},
"methods": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/methods/-/methods-1.1.2.tgz",
"integrity": "sha1-VSmk1nZUE07cxSZmVoNbD4Ua/O4="
},
"mime": {
"version": "1.6.0",
"resolved": "https://registry.npmjs.org/mime/-/mime-1.6.0.tgz",
"integrity": "sha512-x0Vn8spI+wuJ1O6S7gnbaQg8Pxh4NNHb7KSINmEWKiPE4RKOplvijn+NkmYmmRgP68mc70j2EbeTFRsrswaQeg=="
},
"mime-db": {
"version": "1.52.0",
"resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.52.0.tgz",
"integrity": "sha512-sPU4uV7dYlvtWJxwwxHD0PuihVNiE7TyAbQ5SWxDCB9mUYvOgroQOwYQQOKPJ8CIbE+1ETVlOoK1UC2nU3gYvg=="
},
"mime-types": {
"version": "2.1.35",
"resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.35.tgz",
"integrity": "sha512-ZDY+bPm5zTTF+YpCrAU9nK0UgICYPT0QtT1NZWFv4s++TNkcgVaT0g6+4R2uI4MjQjzysHB1zxuWL50hzaeXiw==",
"requires": {
"mime-db": "1.52.0"
}
},
"mimic-response": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/mimic-response/-/mimic-response-1.0.1.tgz",
"integrity": "sha512-j5EctnkH7amfV/q5Hgmoal1g2QHFJRraOtmx0JpIqkxhBhI/lJSl1nMpQ45hVarwNETOoWEimndZ4QK0RHxuxQ=="
},
"minimatch": {
"version": "3.1.2",
"resolved": "https://registry.npmjs.org/minimatch/-/minimatch-3.1.2.tgz",
"integrity": "sha512-J7p63hRiAjw1NDEww1W7i37+ByIrOWO5XQQAzZ3VOcL0PNybwpfmV/N05zFAzwQ9USyEcX6t3UO+K5aqBQOIHw==",
"dev": true,
"requires": {
"brace-expansion": "^1.1.7"
}
},
"morgan": {
"version": "1.10.0",
"resolved": "https://registry.npmjs.org/morgan/-/morgan-1.10.0.tgz",
"integrity": "sha512-AbegBVI4sh6El+1gNwvD5YIck7nSA36weD7xvIxG4in80j/UoK8AEGaWnnz8v1GxonMCltmlNs5ZKbGvl9b1XQ==",
"requires": {
"basic-auth": "~2.0.1",
"debug": "2.6.9",
"depd": "~2.0.0",
"on-finished": "~2.3.0",
"on-headers": "~1.0.2"
},
"dependencies": {
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
}
}
},
"ms": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
"integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
},
"negotiator": {
"version": "0.6.3",
"resolved": "https://registry.npmjs.org/negotiator/-/negotiator-0.6.3.tgz",
"integrity": "sha512-+EUsqGPLsM+j/zdChZjsnX51g4XrHFOIXwfnCVPGlQk/k5giakcKsuxCObBRu6DSm9opw/O6slWbJdghQM4bBg=="
},
"nice-try": {
"version": "1.0.5",
"resolved": "https://registry.npmjs.org/nice-try/-/nice-try-1.0.5.tgz",
"integrity": "sha512-1nh45deeb5olNY7eX82BkPO7SSxR5SSYJiPTrTdFUVYwAl8CKMA5N9PjTYkHiRjisVcxcQ1HXdLhx2qxxJzLNQ==",
"dev": true
},
"node-fetch": {
"version": "2.6.9",
"resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.9.tgz",
"integrity": "sha512-DJm/CJkZkRjKKj4Zi4BsKVZh3ValV5IR5s7LVZnW+6YMh0W1BfNA8XSs6DLMGYlId5F3KnA70uu2qepcR08Qqg==",
"requires": {
"whatwg-url": "^5.0.0"
}
},
"node-forge": {
"version": "0.8.5",
"resolved": "https://registry.npmjs.org/node-forge/-/node-forge-0.8.5.tgz",
"integrity": "sha512-vFMQIWt+J/7FLNyKouZ9TazT74PRV3wgv9UT4cRjC8BffxFbKXkgIWR42URCPSnHm/QDz6BOlb2Q0U4+VQT67Q=="
},
"node-jose": {
"version": "1.1.4",
"resolved": "https://registry.npmjs.org/node-jose/-/node-jose-1.1.4.tgz",
"integrity": "sha512-L31IFwL3pWWcMHxxidCY51ezqrDXMkvlT/5pLTfNw5sXmmOLJuN6ug7txzF/iuZN55cRpyOmoJrotwBQIoo5Lw==",
"requires": {
"base64url": "^3.0.1",
"browserify-zlib": "^0.2.0",
"buffer": "^5.5.0",
"es6-promise": "^4.2.8",
"lodash": "^4.17.15",
"long": "^4.0.0",
"node-forge": "^0.8.5",
"process": "^0.11.10",
"react-zlib-js": "^1.0.4",
"uuid": "^3.3.3"
},
"dependencies": {
"lodash": {
"version": "4.17.15",
"resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz",
"integrity": "sha512-8xOcRHvCjnocdS5cpwXQXVzmmh5e5+saE2QGoeQmbKmRS6J3VQppPOIt0MnmE+4xlZoumy0GPG0D0MVIQbNA1A=="
},
"uuid": {
"version": "3.4.0",
"resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz",
"integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A=="
}
}
},
"node-uuid": {
"version": "1.4.8",
"resolved": "https://registry.npmjs.org/node-uuid/-/node-uuid-1.4.8.tgz",
"integrity": "sha1-sEDrCSOWivq/jTL7HxfxFn/auQc="
},
"nodemon": {
"version": "2.0.22",
"resolved": "https://registry.npmjs.org/nodemon/-/nodemon-2.0.22.tgz",
"integrity": "sha512-B8YqaKMmyuCO7BowF1Z1/mkPqLk6cs/l63Ojtd6otKjMx47Dq1utxfRxcavH1I7VSaL8n5BUaoutadnsX3AAVQ==",
"dev": true,
"requires": {
"chokidar": "^3.5.2",
"debug": "^3.2.7",
"ignore-by-default": "^1.0.1",
"minimatch": "^3.1.2",
"pstree.remy": "^1.1.8",
"semver": "^5.7.1",
"simple-update-notifier": "^1.0.7",
"supports-color": "^5.5.0",
"touch": "^3.1.0",
"undefsafe": "^2.0.5"
},
"dependencies": {
"debug": {
"version": "3.2.7",
"resolved": "https://registry.npmjs.org/debug/-/debug-3.2.7.tgz",
"integrity": "sha512-CFjzYYAi4ThfiQvizrFQevTTXHtnCqWfe7x1AhgEscTz6ZbLbfoLRLPugTQyBth6f8ZERVUSyWHFD/7Wu4t1XQ==",
"dev": true,
"requires": {
"ms": "^2.1.1"
}
},
"ms": {
"version": "2.1.3",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz",
"integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA==",
"dev": true
}
}
},
"nopt": {
"version": "1.0.10",
"resolved": "https://registry.npmjs.org/nopt/-/nopt-1.0.10.tgz",
"integrity": "sha1-bd0hvSoxQXuScn3Vhfim83YI6+4=",
"dev": true,
"requires": {
"abbrev": "1"
}
},
"normalize-path": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/normalize-path/-/normalize-path-3.0.0.tgz",
"integrity": "sha512-6eZs5Ls3WtCisHWp9S2GUy8dqkpGi4BVSz3GaqiE6ezub0512ESztXUwUB6C6IKbQkY2Pnb/mD4WYojCRwcwLA==",
"dev": true
},
"normalize-url": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/normalize-url/-/normalize-url-2.0.1.tgz",
"integrity": "sha512-D6MUW4K/VzoJ4rJ01JFKxDrtY1v9wrgzCX5f2qj/lzH1m/lW6MhUZFKerVsnyjOhOsYzI9Kqqak+10l4LvLpMw==",
"requires": {
"prepend-http": "^2.0.0",
"query-string": "^5.0.1",
"sort-keys": "^2.0.0"
},
"dependencies": {
"prepend-http": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/prepend-http/-/prepend-http-2.0.0.tgz",
"integrity": "sha1-6SQ0v6XqjBn0HN/UAddBo8gZ2Jc="
}
}
},
"object-assign": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz",
"integrity": "sha1-IQmtx5ZYh8/AXLvUQsrIv7s2CGM="
},
"object-hash": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/object-hash/-/object-hash-1.3.1.tgz",
"integrity": "sha512-OSuu/pU4ENM9kmREg0BdNrUDIl1heYa4mBZacJc+vVWz4GtAwu7jO8s4AIt2aGRUTqxykpWzI3Oqnsm13tTMDA=="
},
"object-inspect": {
"version": "1.12.2",
"resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.12.2.tgz",
"integrity": "sha512-z+cPxW0QGUp0mcqcsgQyLVRDoXFQbXOwBaqyF7VIgI4TWNQsDHrBpUQslRmIfAoYWdYzs6UlKJtB2XJpTaNSpQ=="
},
"oidc-token-hash": {
"version": "3.0.2",
"resolved": "https://registry.npmjs.org/oidc-token-hash/-/oidc-token-hash-3.0.2.tgz",
"integrity": "sha512-dTzp80/y/da+um+i+sOucNqiPpwRL7M/xPwj7pH1TFA2/bqQ+OK2sJahSXbemEoLtPkHcFLyhLhLWZa9yW5+RA=="
},
"on-finished": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.3.0.tgz",
"integrity": "sha1-IPEzZIGwg811M3mSoWlxqi2QaUc=",
"requires": {
"ee-first": "1.1.1"
}
},
"on-headers": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/on-headers/-/on-headers-1.0.2.tgz",
"integrity": "sha512-pZAE+FJLoyITytdqK0U5s+FIpjN0JP3OzFi/u8Rx+EV5/W+JTWGXG8xFzevE7AjBfDqHv/8vL8qQsIhHnqRkrA=="
},
"one-time": {
"version": "0.0.4",
"resolved": "https://registry.npmjs.org/one-time/-/one-time-0.0.4.tgz",
"integrity": "sha1-+M33eISCb+Tf+T46nMN7HkSAdC4="
},
"openid-client": {
"version": "2.5.0",
"resolved": "https://registry.npmjs.org/openid-client/-/openid-client-2.5.0.tgz",
"integrity": "sha512-t3hFD7xEoW1U25RyBcRFaL19fGGs6hNVTysq9pgmiltH0IVUPzH/bQV9w24pM5Q7MunnGv2/5XjIru6BQcWdxg==",
"requires": {
"base64url": "^3.0.0",
"got": "^8.3.2",
"lodash": "^4.17.11",
"lru-cache": "^5.1.1",
"node-jose": "^1.1.0",
"object-hash": "^1.3.1",
"oidc-token-hash": "^3.0.1",
"p-any": "^1.1.0"
},
"dependencies": {
"got": {
"version": "8.3.2",
"resolved": "https://registry.npmjs.org/got/-/got-8.3.2.tgz",
"integrity": "sha512-qjUJ5U/hawxosMryILofZCkm3C84PLJS/0grRIpjAwu+Lkxxj5cxeCU25BG0/3mDSpXKTyZr8oh8wIgLaH0QCw==",
"requires": {
"@sindresorhus/is": "^0.7.0",
"cacheable-request": "^2.1.1",
"decompress-response": "^3.3.0",
"duplexer3": "^0.1.4",
"get-stream": "^3.0.0",
"into-stream": "^3.1.0",
"is-retry-allowed": "^1.1.0",
"isurl": "^1.0.0-alpha5",
"lowercase-keys": "^1.0.0",
"mimic-response": "^1.0.0",
"p-cancelable": "^0.4.0",
"p-timeout": "^2.0.1",
"pify": "^3.0.0",
"safe-buffer": "^5.1.1",
"timed-out": "^4.0.1",
"url-parse-lax": "^3.0.0",
"url-to-options": "^1.0.1"
}
},
"lru-cache": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/lru-cache/-/lru-cache-5.1.1.tgz",
"integrity": "sha512-KpNARQA3Iwv+jTA0utUVVbrh+Jlrr1Fv0e56GGzAFOXN7dk/FviaDW8LHmK52DlcH4WP2n6gI8vN1aesBFgo9w==",
"requires": {
"yallist": "^3.0.2"
}
},
"prepend-http": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/prepend-http/-/prepend-http-2.0.0.tgz",
"integrity": "sha1-6SQ0v6XqjBn0HN/UAddBo8gZ2Jc="
},
"url-parse-lax": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/url-parse-lax/-/url-parse-lax-3.0.0.tgz",
"integrity": "sha1-FrXK/Afb42dsGxmZF3gj1lA6yww=",
"requires": {
"prepend-http": "^2.0.0"
}
},
"yallist": {
"version": "3.1.1",
"resolved": "https://registry.npmjs.org/yallist/-/yallist-3.1.1.tgz",
"integrity": "sha512-a4UGQaWPH59mOXUYnAG2ewncQS4i4F43Tv3JoAM+s2VDAmS9NsK8GpDMLrCHPksFT7h3K6TOoUNn2pb7RoXx4g=="
}
}
},
"p-any": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/p-any/-/p-any-1.1.0.tgz",
"integrity": "sha512-Ef0tVa4CZ5pTAmKn+Cg3w8ABBXh+hHO1aV8281dKOoUHfX+3tjG2EaFcC+aZyagg9b4EYGsHEjz21DnEE8Og2g==",
"requires": {
"p-some": "^2.0.0"
}
},
"p-cancelable": {
"version": "0.4.1",
"resolved": "https://registry.npmjs.org/p-cancelable/-/p-cancelable-0.4.1.tgz",
"integrity": "sha512-HNa1A8LvB1kie7cERyy21VNeHb2CWJJYqyyC2o3klWFfMGlFmWv2Z7sFgZH8ZiaYL95ydToKTFVXgMV/Os0bBQ=="
},
"p-finally": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/p-finally/-/p-finally-1.0.0.tgz",
"integrity": "sha1-P7z7FbiZpEEjs0ttzBi3JDNqLK4="
},
"p-is-promise": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/p-is-promise/-/p-is-promise-1.1.0.tgz",
"integrity": "sha1-nJRWmJ6fZYgBewQ01WCXZ1w9oF4="
},
"p-some": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/p-some/-/p-some-2.0.1.tgz",
"integrity": "sha1-Zdh8ixVO289SIdFnd4ttLhUPbwY=",
"requires": {
"aggregate-error": "^1.0.0"
}
},
"p-timeout": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/p-timeout/-/p-timeout-2.0.1.tgz",
"integrity": "sha512-88em58dDVB/KzPEx1X0N3LwFfYZPyDc4B6eF38M1rk9VTZMbxXXgjugz8mmwpS9Ox4BDZ+t6t3QP5+/gazweIA==",
"requires": {
"p-finally": "^1.0.0"
}
},
"pako": {
"version": "1.0.11",
"resolved": "https://registry.npmjs.org/pako/-/pako-1.0.11.tgz",
"integrity": "sha512-4hLB8Py4zZce5s4yd9XzopqwVv/yGNhV1Bl8NTmCq1763HeK2+EwVTv+leGeL13Dnh2wfbqowVPXCIO0z4taYw=="
},
"parseurl": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/parseurl/-/parseurl-1.3.3.tgz",
"integrity": "sha512-CiyeOxFT/JZyN5m0z9PfXw4SCBJ6Sygz1Dpl0wqjlhDEGGBP1GnsUVEL0p63hoG1fcj3fHynXi9NYO4nWOL+qQ=="
},
"path-key": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/path-key/-/path-key-2.0.1.tgz",
"integrity": "sha1-QRyttXTFoUDTpLGRDUDYDMn0C0A=",
"dev": true
},
"path-parse": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz",
"integrity": "sha512-GSmOT2EbHrINBf9SR7CDELwlJ8AENk3Qn7OikK4nFYAu3Ote2+JYNVvkpAEQm3/TLNEJFD/xZJjzyxg3KBWOzw=="
},
"path-to-regexp": {
"version": "0.1.7",
"resolved": "https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz",
"integrity": "sha1-32BBeABfUi8V60SQ5yR6G/qmf4w="
},
"picomatch": {
"version": "2.3.1",
"resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz",
"integrity": "sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==",
"dev": true
},
"pify": {
"version": "3.0.0",
"resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz",
"integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY="
},
"process": {
"version": "0.11.10",
"resolved": "https://registry.npmjs.org/process/-/process-0.11.10.tgz",
"integrity": "sha1-czIwDoQBYb2j5podHZGn1LwW8YI="
},
"process-nextick-args": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/process-nextick-args/-/process-nextick-args-2.0.0.tgz",
"integrity": "sha512-MtEC1TqN0EU5nephaJ4rAtThHtC86dNN9qCuEhtshvpVBkAW5ZO7BASN9REnF9eoXGcRub+pFuKEpOHE+HbEMw=="
},
"promise": {
"version": "7.3.1",
"resolved": "https://registry.npmjs.org/promise/-/promise-7.3.1.tgz",
"integrity": "sha512-nolQXZ/4L+bP/UGlkfaIujX9BKxGwmQ9OT4mOt5yvy8iK1h3wqTEJCijzGANTCCl9nWjY41juyAn2K3Q1hLLTg==",
"requires": {
"asap": "~2.0.3"
}
},
"proxy-addr": {
"version": "2.0.7",
"resolved": "https://registry.npmjs.org/proxy-addr/-/proxy-addr-2.0.7.tgz",
"integrity": "sha512-llQsMLSUDUPT44jdrU/O37qlnifitDP+ZwrmmZcoSKyLKvtZxpyV0n2/bD/N4tBAAZ/gJEdZU7KMraoK1+XYAg==",
"requires": {
"forwarded": "0.2.0",
"ipaddr.js": "1.9.1"
}
},
"pseudomap": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/pseudomap/-/pseudomap-1.0.2.tgz",
"integrity": "sha1-8FKijacOYYkX7wqKw0wa5aaChrM="
},
"pstree.remy": {
"version": "1.1.8",
"resolved": "https://registry.npmjs.org/pstree.remy/-/pstree.remy-1.1.8.tgz",
"integrity": "sha512-77DZwxQmxKnu3aR542U+X8FypNzbfJ+C5XQDk3uWjWxn6151aIMGthWYRXTqT1E5oJvg+ljaa2OJi+VfvCOQ8w==",
"dev": true
},
"pug": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/pug/-/pug-2.0.4.tgz",
"integrity": "sha512-XhoaDlvi6NIzL49nu094R2NA6P37ijtgMDuWE+ofekDChvfKnzFal60bhSdiy8y2PBO6fmz3oMEIcfpBVRUdvw==",
"requires": {
"pug-code-gen": "^2.0.2",
"pug-filters": "^3.1.1",
"pug-lexer": "^4.1.0",
"pug-linker": "^3.0.6",
"pug-load": "^2.0.12",
"pug-parser": "^5.0.1",
"pug-runtime": "^2.0.5",
"pug-strip-comments": "^1.0.4"
}
},
"pug-attrs": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/pug-attrs/-/pug-attrs-2.0.4.tgz",
"integrity": "sha512-TaZ4Z2TWUPDJcV3wjU3RtUXMrd3kM4Wzjbe3EWnSsZPsJ3LDI0F3yCnf2/W7PPFF+edUFQ0HgDL1IoxSz5K8EQ==",
"requires": {
"constantinople": "^3.0.1",
"js-stringify": "^1.0.1",
"pug-runtime": "^2.0.5"
}
},
"pug-code-gen": {
"version": "2.0.3",
"resolved": "https://registry.npmjs.org/pug-code-gen/-/pug-code-gen-2.0.3.tgz",
"integrity": "sha512-r9sezXdDuZJfW9J91TN/2LFbiqDhmltTFmGpHTsGdrNGp3p4SxAjjXEfnuK2e4ywYsRIVP0NeLbSAMHUcaX1EA==",
"requires": {
"constantinople": "^3.1.2",
"doctypes": "^1.1.0",
"js-stringify": "^1.0.1",
"pug-attrs": "^2.0.4",
"pug-error": "^1.3.3",
"pug-runtime": "^2.0.5",
"void-elements": "^2.0.1",
"with": "^5.0.0"
}
},
"pug-error": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/pug-error/-/pug-error-1.3.3.tgz",
"integrity": "sha512-qE3YhESP2mRAWMFJgKdtT5D7ckThRScXRwkfo+Erqga7dyJdY3ZquspprMCj/9sJ2ijm5hXFWQE/A3l4poMWiQ=="
},
"pug-filters": {
"version": "3.1.1",
"resolved": "https://registry.npmjs.org/pug-filters/-/pug-filters-3.1.1.tgz",
"integrity": "sha512-lFfjNyGEyVWC4BwX0WyvkoWLapI5xHSM3xZJFUhx4JM4XyyRdO8Aucc6pCygnqV2uSgJFaJWW3Ft1wCWSoQkQg==",
"requires": {
"clean-css": "^4.1.11",
"constantinople": "^3.0.1",
"jstransformer": "1.0.0",
"pug-error": "^1.3.3",
"pug-walk": "^1.1.8",
"resolve": "^1.1.6",
"uglify-js": "^2.6.1"
}
},
"pug-lexer": {
"version": "4.1.0",
"resolved": "https://registry.npmjs.org/pug-lexer/-/pug-lexer-4.1.0.tgz",
"integrity": "sha512-i55yzEBtjm0mlplW4LoANq7k3S8gDdfC6+LThGEvsK4FuobcKfDAwt6V4jKPH9RtiE3a2Akfg5UpafZ1OksaPA==",
"requires": {
"character-parser": "^2.1.1",
"is-expression": "^3.0.0",
"pug-error": "^1.3.3"
}
},
"pug-linker": {
"version": "3.0.6",
"resolved": "https://registry.npmjs.org/pug-linker/-/pug-linker-3.0.6.tgz",
"integrity": "sha512-bagfuHttfQOpANGy1Y6NJ+0mNb7dD2MswFG2ZKj22s8g0wVsojpRlqveEQHmgXXcfROB2RT6oqbPYr9EN2ZWzg==",
"requires": {
"pug-error": "^1.3.3",
"pug-walk": "^1.1.8"
}
},
"pug-load": {
"version": "2.0.12",
"resolved": "https://registry.npmjs.org/pug-load/-/pug-load-2.0.12.tgz",
"integrity": "sha512-UqpgGpyyXRYgJs/X60sE6SIf8UBsmcHYKNaOccyVLEuT6OPBIMo6xMPhoJnqtB3Q3BbO4Z3Bjz5qDsUWh4rXsg==",
"requires": {
"object-assign": "^4.1.0",
"pug-walk": "^1.1.8"
}
},
"pug-parser": {
"version": "5.0.1",
"resolved": "https://registry.npmjs.org/pug-parser/-/pug-parser-5.0.1.tgz",
"integrity": "sha512-nGHqK+w07p5/PsPIyzkTQfzlYfuqoiGjaoqHv1LjOv2ZLXmGX1O+4Vcvps+P4LhxZ3drYSljjq4b+Naid126wA==",
"requires": {
"pug-error": "^1.3.3",
"token-stream": "0.0.1"
}
},
"pug-runtime": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/pug-runtime/-/pug-runtime-2.0.5.tgz",
"integrity": "sha512-P+rXKn9un4fQY77wtpcuFyvFaBww7/91f3jHa154qU26qFAnOe6SW1CbIDcxiG5lLK9HazYrMCCuDvNgDQNptw=="
},
"pug-strip-comments": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/pug-strip-comments/-/pug-strip-comments-1.0.4.tgz",
"integrity": "sha512-i5j/9CS4yFhSxHp5iKPHwigaig/VV9g+FgReLJWWHEHbvKsbqL0oP/K5ubuLco6Wu3Kan5p7u7qk8A4oLLh6vw==",
"requires": {
"pug-error": "^1.3.3"
}
},
"pug-walk": {
"version": "1.1.8",
"resolved": "https://registry.npmjs.org/pug-walk/-/pug-walk-1.1.8.tgz",
"integrity": "sha512-GMu3M5nUL3fju4/egXwZO0XLi6fW/K3T3VTgFQ14GxNi8btlxgT5qZL//JwZFm/2Fa64J/PNS8AZeys3wiMkVA=="
},
"qs": {
"version": "6.11.0",
"resolved": "https://registry.npmjs.org/qs/-/qs-6.11.0.tgz",
"integrity": "sha512-MvjoMCJwEarSbUYk5O+nmoSzSutSsTwF85zcHPQ9OrlFoZOYIjaqBAJIqIXjptyD5vThxGq52Xu/MaJzRkIk4Q==",
"requires": {
"side-channel": "^1.0.4"
}
},
"query-string": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/query-string/-/query-string-5.1.1.tgz",
"integrity": "sha512-gjWOsm2SoGlgLEdAGt7a6slVOk9mGiXmPFMqrEhLQ68rhQuBnpfs3+EmlvqKyxnCo9/PPlF+9MtY02S1aFg+Jw==",
"requires": {
"decode-uri-component": "^0.2.0",
"object-assign": "^4.1.0",
"strict-uri-encode": "^1.0.0"
}
},
"querystring": {
"version": "0.2.0",
"resolved": "https://registry.npmjs.org/querystring/-/querystring-0.2.0.tgz",
"integrity": "sha1-sgmEkgO7Jd+CDadW50cAWHhSFiA="
},
"random-bytes": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/random-bytes/-/random-bytes-1.0.0.tgz",
"integrity": "sha1-T2ih3Arli9P7lYSMMDJNt11kNgs="
},
"range-parser": {
"version": "1.2.1",
"resolved": "https://registry.npmjs.org/range-parser/-/range-parser-1.2.1.tgz",
"integrity": "sha512-Hrgsx+orqoygnmhFbKaHE6c296J+HTAQXoxEF6gNupROmmGJRoyzfG3ccAveqCBrwr/2yxQ5BVd/GTl5agOwSg=="
},
"raw-body": {
"version": "2.5.1",
"resolved": "https://registry.npmjs.org/raw-body/-/raw-body-2.5.1.tgz",
"integrity": "sha512-qqJBtEyVgS0ZmPGdCFPWJ3FreoqvG4MVQln/kCgF7Olq95IbOp0/BWyMwbdtn4VTvkM8Y7khCQ2Xgk/tcrCXig==",
"requires": {
"bytes": "3.1.2",
"http-errors": "2.0.0",
"iconv-lite": "0.4.24",
"unpipe": "1.0.0"
}
},
"react-zlib-js": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/react-zlib-js/-/react-zlib-js-1.0.4.tgz",
"integrity": "sha512-ynXD9DFxpE7vtGoa3ZwBtPmZrkZYw2plzHGbanUjBOSN4RtuXdektSfABykHtTiWEHMh7WdYj45LHtp228ZF1A=="
},
"readable-stream": {
"version": "3.3.0",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-3.3.0.tgz",
"integrity": "sha512-EsI+s3k3XsW+fU8fQACLN59ky34AZ14LoeVZpYwmZvldCFo0r0gnelwF2TcMjLor/BTL5aDJVBMkss0dthToPw==",
"requires": {
"inherits": "^2.0.3",
"string_decoder": "^1.1.1",
"util-deprecate": "^1.0.1"
}
},
"readdirp": {
"version": "3.6.0",
"resolved": "https://registry.npmjs.org/readdirp/-/readdirp-3.6.0.tgz",
"integrity": "sha512-hOS089on8RduqdbhvQ5Z37A0ESjsqz6qnRcffsMU3495FuTdqSm+7bhJ29JvIOsBDEEnan5DPu9t3To9VRlMzA==",
"dev": true,
"requires": {
"picomatch": "^2.2.1"
}
},
"regenerator-runtime": {
"version": "0.11.1",
"resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.11.1.tgz",
"integrity": "sha512-MguG95oij0fC3QV3URf4V2SDYGJhJnJGqvIIgdECeODCT98wSWDAJ94SSuVpYQUoTcGUIL6L4yNB7j1DFFHSBg=="
},
"repeat-string": {
"version": "1.6.1",
"resolved": "https://registry.npmjs.org/repeat-string/-/repeat-string-1.6.1.tgz",
"integrity": "sha1-jcrkcOHIirwtYA//Sndihtp15jc="
},
"resolve": {
"version": "1.16.0",
"resolved": "https://registry.npmjs.org/resolve/-/resolve-1.16.0.tgz",
"integrity": "sha512-LarL/PIKJvc09k1jaeT4kQb/8/7P+qV4qSnN2K80AES+OHdfZELAKVOBjxsvtToT/uLOfFbvYvKfZmV8cee7nA==",
"requires": {
"path-parse": "^1.0.6"
}
},
"responselike": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/responselike/-/responselike-1.0.2.tgz",
"integrity": "sha1-kYcg7ztjHFZCvgaPFa3lpG9Loec=",
"requires": {
"lowercase-keys": "^1.0.0"
}
},
"right-align": {
"version": "0.1.3",
"resolved": "https://registry.npmjs.org/right-align/-/right-align-0.1.3.tgz",
"integrity": "sha1-YTObci/mo1FWiSENJOFMlhSGE+8=",
"requires": {
"align-text": "^0.1.1"
}
},
"rndm": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/rndm/-/rndm-1.2.0.tgz",
"integrity": "sha1-8z/pz7Urv9UgqhgyO8ZdsRCht2w="
},
"safe-buffer": {
"version": "5.1.2",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.1.2.tgz",
"integrity": "sha512-Gd2UZBJDkXlY7GbJxfsE8/nvKkUEU1G38c1siN6QP6a9PT9MmHB8GnpscSmMJSoF8LOIrt8ud/wPtojys4G6+g=="
},
"safer-buffer": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz",
"integrity": "sha512-YZo3K82SD7Riyi0E1EQPojLz7kpepnSQI9IyPbHHg1XXXevb5dJI7tpyN2ADxGcQbHG7vcyRHk0cbwqcQriUtg=="
},
"semver": {
"version": "5.7.2",
"resolved": "https://registry.npmjs.org/semver/-/semver-5.7.2.tgz",
"integrity": "sha512-cBznnQ9KjJqU67B52RMC65CMarK2600WFnbkcaiwWq3xy/5haFJlshgnpjovMVJ+Hff49d8GEn0b87C5pDQ10g=="
},
"send": {
"version": "0.18.0",
"resolved": "https://registry.npmjs.org/send/-/send-0.18.0.tgz",
"integrity": "sha512-qqWzuOjSFOuqPjFe4NOsMLafToQQwBSOEpS+FwEt3A2V3vKubTquT3vmLTQpFgMXp8AlFWFuP1qKaJZOtPpVXg==",
"requires": {
"debug": "2.6.9",
"depd": "2.0.0",
"destroy": "1.2.0",
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"etag": "~1.8.1",
"fresh": "0.5.2",
"http-errors": "2.0.0",
"mime": "1.6.0",
"ms": "2.1.3",
"on-finished": "2.4.1",
"range-parser": "~1.2.1",
"statuses": "2.0.1"
},
"dependencies": {
"depd": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz",
"integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw=="
},
"ms": {
"version": "2.1.3",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz",
"integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA=="
},
"on-finished": {
"version": "2.4.1",
"resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz",
"integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==",
"requires": {
"ee-first": "1.1.1"
}
},
"statuses": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz",
"integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ=="
}
}
},
"serve-favicon": {
"version": "2.5.0",
"resolved": "https://registry.npmjs.org/serve-favicon/-/serve-favicon-2.5.0.tgz",
"integrity": "sha1-k10kDN/g9YBTB/3+ln2IlCosvPA=",
"requires": {
"etag": "~1.8.1",
"fresh": "0.5.2",
"ms": "2.1.1",
"parseurl": "~1.3.2",
"safe-buffer": "5.1.1"
},
"dependencies": {
"ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
},
"safe-buffer": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.1.1.tgz",
"integrity": "sha512-kKvNJn6Mm93gAczWVJg7wH+wGYWNrDHdWvpUmHyEsgCtIwwo3bqPtV4tR5tuPaUhTOo/kvhVwd8XwwOllGYkbg=="
}
}
},
"serve-static": {
"version": "1.15.0",
"resolved": "https://registry.npmjs.org/serve-static/-/serve-static-1.15.0.tgz",
"integrity": "sha512-XGuRDNjXUijsUL0vl6nSD7cwURuzEgglbOaFuZM9g3kwDXOWVTck0jLzjPzGD+TazWbboZYu52/9/XPdUgne9g==",
"requires": {
"encodeurl": "~1.0.2",
"escape-html": "~1.0.3",
"parseurl": "~1.3.3",
"send": "0.18.0"
}
},
"setprototypeof": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.1.1.tgz",
"integrity": "sha512-JvdAWfbXeIGaZ9cILp38HntZSFSo3mWg6xGcJJsd+d4aRMOqauag1C63dJfDw7OaMYwEbHMOxEZ1lqVRYP2OAw=="
},
"shebang-command": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/shebang-command/-/shebang-command-1.2.0.tgz",
"integrity": "sha1-RKrGW2lbAzmJaMOfNj/uXer98eo=",
"dev": true,
"requires": {
"shebang-regex": "^1.0.0"
}
},
"shebang-regex": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/shebang-regex/-/shebang-regex-1.0.0.tgz",
"integrity": "sha1-2kL0l0DAtC2yypcoVxyxkMmO/qM=",
"dev": true
},
"side-channel": {
"version": "1.0.4",
"resolved": "https://registry.npmjs.org/side-channel/-/side-channel-1.0.4.tgz",
"integrity": "sha512-q5XPytqFEIKHkGdiMIrY10mvLRvnQh42/+GoBlFW3b2LXLE2xxJpZFdm94we0BaoV3RwJyGqg5wS7epxTv0Zvw==",
"requires": {
"call-bind": "^1.0.0",
"get-intrinsic": "^1.0.2",
"object-inspect": "^1.9.0"
}
},
"simple-oauth2": {
"version": "2.5.2",
"resolved": "https://registry.npmjs.org/simple-oauth2/-/simple-oauth2-2.5.2.tgz",
"integrity": "sha512-8qjf+nHRdSUllFjjfpnonrU1oF/HNVbDle5HIbvXRYiy38C7KUvYe6w0ZZ//g4AFB6VNWuiZ80HmnycR8ZFDyQ==",
"requires": {
"@hapi/joi": "^15.1.1",
"date-fns": "^2.2.1",
"debug": "^4.1.1",
"wreck": "^14.0.2"
},
"dependencies": {
"debug": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.1.1.tgz",
"integrity": "sha512-pYAIzeRo8J6KPEaJ0VWOh5Pzkbw/RetuzehGM7QRRX5he4fPHx2rdKMB256ehJCkX+XRQm16eZLqLNS8RSZXZw==",
"requires": {
"ms": "^2.1.1"
}
},
"ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w=="
}
}
},
"simple-swizzle": {
"version": "0.2.2",
"resolved": "https://registry.npmjs.org/simple-swizzle/-/simple-swizzle-0.2.2.tgz",
"integrity": "sha1-pNprY1/8zMoz9w0Xy5JZLeleVXo=",
"requires": {
"is-arrayish": "^0.3.1"
}
},
"simple-update-notifier": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/simple-update-notifier/-/simple-update-notifier-1.1.0.tgz",
"integrity": "sha512-VpsrsJSUcJEseSbMHkrsrAVSdvVS5I96Qo1QAQ4FxQ9wXFcB+pjj7FB7/us9+GcgfW4ziHtYMc1J0PLczb55mg==",
"dev": true,
"requires": {
"semver": "~7.0.0"
},
"dependencies": {
"semver": {
"version": "7.0.0",
"resolved": "https://registry.npmjs.org/semver/-/semver-7.0.0.tgz",
"integrity": "sha512-+GB6zVA9LWh6zovYQLALHwv5rb2PHGlJi3lfiqIHxR0uuwCgefcOJc59v9fv1w8GbStwxuuqqAjI9NMAOOgq1A==",
"dev": true
}
}
},
"sort-keys": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/sort-keys/-/sort-keys-2.0.0.tgz",
"integrity": "sha1-ZYU1WEhh7JfXMNbPQYIuH1ZoQSg=",
"requires": {
"is-plain-obj": "^1.0.0"
}
},
"source-map": {
"version": "0.5.7",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
"integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w="
},
"stack-trace": {
"version": "0.0.10",
"resolved": "https://registry.npmjs.org/stack-trace/-/stack-trace-0.0.10.tgz",
"integrity": "sha1-VHxws0fo0ytOEI6hoqFZ5f3eGcA="
},
"statuses": {
"version": "1.5.0",
"resolved": "https://registry.npmjs.org/statuses/-/statuses-1.5.0.tgz",
"integrity": "sha1-Fhx9rBd2Wf2YEfQ3cfqZOBR4Yow="
},
"strict-uri-encode": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/strict-uri-encode/-/strict-uri-encode-1.1.0.tgz",
"integrity": "sha1-J5siXfHVgrH1TmWt3UNS4Y+qBxM="
},
"string_decoder": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.2.0.tgz",
"integrity": "sha512-6YqyX6ZWEYguAxgZzHGL7SsCeGx3V2TtOTqZz1xSTSWnqsbWwbptafNyvf/ACquZUXV3DANr5BDIwNYe1mN42w==",
"requires": {
"safe-buffer": "~5.1.0"
}
},
"supports-color": {
"version": "5.5.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz",
"integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==",
"requires": {
"has-flag": "^3.0.0"
}
},
"text-hex": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/text-hex/-/text-hex-1.0.0.tgz",
"integrity": "sha512-uuVGNWzgJ4yhRaNSiubPY7OjISw4sw4E5Uv0wbjp+OzcbmVU/rsT8ujgcXJhn9ypzsgr5vlzpPqP+MBBKcGvbg=="
},
"timed-out": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/timed-out/-/timed-out-4.0.1.tgz",
"integrity": "sha1-8y6srFoXW+ol1/q1Zas+2HQe9W8="
},
"to-fast-properties": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/to-fast-properties/-/to-fast-properties-1.0.3.tgz",
"integrity": "sha1-uDVx+k2MJbguIxsG46MFXeTKGkc="
},
"to-regex-range": {
"version": "5.0.1",
"resolved": "https://registry.npmjs.org/to-regex-range/-/to-regex-range-5.0.1.tgz",
"integrity": "sha512-65P7iz6X5yEr1cwcgvQxbbIw7Uk3gOy5dIdtZ4rDveLqhrdJP+Li/Hx6tyK0NEb+2GCyneCMJiGqrADCSNk8sQ==",
"dev": true,
"requires": {
"is-number": "^7.0.0"
}
},
"toidentifier": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/toidentifier/-/toidentifier-1.0.0.tgz",
"integrity": "sha512-yaOH/Pk/VEhBWWTlhI+qXxDFXlejDGcQipMlyxda9nthulaxLZUNcUqFxokp0vcYnvteJln5FNQDRrxj3YcbVw=="
},
"token-stream": {
"version": "0.0.1",
"resolved": "https://registry.npmjs.org/token-stream/-/token-stream-0.0.1.tgz",
"integrity": "sha1-zu78cXp2xDFvEm0LnbqlXX598Bo="
},
"touch": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/touch/-/touch-3.1.0.tgz",
"integrity": "sha512-WBx8Uy5TLtOSRtIq+M03/sKDrXCLHxwDcquSP2c43Le03/9serjQBIztjRz6FkJez9D/hleyAXTBGLwwZUw9lA==",
"dev": true,
"requires": {
"nopt": "~1.0.10"
}
},
"tr46": {
"version": "0.0.3",
"resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz",
"integrity": "sha512-N3WMsuqV66lT30CrXNbEjx4GEwlow3v6rr4mCcv6prnfwhS01rkgyFdjPNBYd9br7LpXV1+Emh01fHnq2Gdgrw=="
},
"triple-beam": {
"version": "1.3.0",
"resolved": "https://registry.npmjs.org/triple-beam/-/triple-beam-1.3.0.tgz",
"integrity": "sha512-XrHUvV5HpdLmIj4uVMxHggLbFSZYIn7HEWsqePZcI50pco+MPqJ50wMGY794X7AOOhxOBAjbkqfAbEe/QMp2Lw=="
},
"tsscmp": {
"version": "1.0.6",
"resolved": "https://registry.npmjs.org/tsscmp/-/tsscmp-1.0.6.tgz",
"integrity": "sha512-LxhtAkPDTkVCMQjt2h6eBVY28KCjikZqZfMcC15YBeNjkgUpdCfBu5HoiOTDu86v6smE8yOjyEktJ8hlbANHQA=="
},
"type-is": {
"version": "1.6.18",
"resolved": "https://registry.npmjs.org/type-is/-/type-is-1.6.18.tgz",
"integrity": "sha512-TkRKr9sUTxEH8MdfuCSP7VizJyzRNMjj2J2do2Jr3Kym598JVdEksuzPQCnlFPW4ky9Q+iA+ma9BGm06XQBy8g==",
"requires": {
"media-typer": "0.3.0",
"mime-types": "~2.1.24"
}
},
"typescript": {
"version": "3.9.10",
"resolved": "https://registry.npmjs.org/typescript/-/typescript-3.9.10.tgz",
"integrity": "sha512-w6fIxVE/H1PkLKcCPsFqKE7Kv7QUwhU8qQY2MueZXWx5cPZdwFupLgKK3vntcK98BtNHZtAF4LA/yl2a7k8R6Q=="
},
"uglify-js": {
"version": "2.8.29",
"resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-2.8.29.tgz",
"integrity": "sha1-KcVzMUgFe7Th913zW3qcty5qWd0=",
"requires": {
"source-map": "~0.5.1",
"uglify-to-browserify": "~1.0.0",
"yargs": "~3.10.0"
}
},
"uglify-to-browserify": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/uglify-to-browserify/-/uglify-to-browserify-1.0.2.tgz",
"integrity": "sha1-bgkk1r2mta/jSeOabWMoUKD4grc=",
"optional": true
},
"uid-safe": {
"version": "2.1.5",
"resolved": "https://registry.npmjs.org/uid-safe/-/uid-safe-2.1.5.tgz",
"integrity": "sha512-KPHm4VL5dDXKz01UuEd88Df+KzynaohSL9fBh096KWAxSKZQDI2uBrVqtvRM4rwrIrRRKsdLNML/lnaaVSRioA==",
"requires": {
"random-bytes": "~1.0.0"
}
},
"undefsafe": {
"version": "2.0.5",
"resolved": "https://registry.npmjs.org/undefsafe/-/undefsafe-2.0.5.tgz",
"integrity": "sha512-WxONCrssBM8TSPRqN5EmsjVrsv4A8X12J4ArBiiayv3DyyG3ZlIg6yysuuSYdZsVz3TKcTg2fd//Ujd4CHV1iA==",
"dev": true
},
"unpipe": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/unpipe/-/unpipe-1.0.0.tgz",
"integrity": "sha1-sr9O6FFKrmFltIF4KdIbLvSZBOw="
},
"url-join": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/url-join/-/url-join-4.0.1.tgz",
"integrity": "sha512-jk1+QP6ZJqyOiuEI9AEWQfju/nB2Pw466kbA0LEZljHwKeMgd9WrAEgEGxjPDD2+TNbbb37rTyhEfrCXfuKXnA=="
},
"url-to-options": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/url-to-options/-/url-to-options-1.0.1.tgz",
"integrity": "sha1-FQWgOiiaSMvXpDTvuu7FBV9WM6k="
},
"util-deprecate": {
"version": "1.0.2",
"resolved": "https://registry.npmjs.org/util-deprecate/-/util-deprecate-1.0.2.tgz",
"integrity": "sha1-RQ1Nyfpw3nMnYvvS1KKJgUGaDM8="
},
"utils-merge": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/utils-merge/-/utils-merge-1.0.1.tgz",
"integrity": "sha1-n5VxD1CiZ5R7LMwSR0HBAoQn5xM="
},
"vary": {
"version": "1.1.2",
"resolved": "https://registry.npmjs.org/vary/-/vary-1.1.2.tgz",
"integrity": "sha1-IpnwLG3tMNSllhsLn3RSShj2NPw="
},
"void-elements": {
"version": "2.0.1",
"resolved": "https://registry.npmjs.org/void-elements/-/void-elements-2.0.1.tgz",
"integrity": "sha1-wGavtYK7HLQSjWDqkjkulNXp2+w="
},
"webidl-conversions": {
"version": "3.0.1",
"resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz",
"integrity": "sha512-2JAn3z8AR6rjK8Sm8orRC0h/bcl/DqL7tRPdGZ4I1CjdF+EaMLmYxBHyXuKL849eucPFhvBoxMsflfOb8kxaeQ=="
},
"whatwg-url": {
"version": "5.0.0",
"resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz",
"integrity": "sha512-saE57nupxk6v3HY35+jzBwYa0rKSy0XR8JSxZPwgLr7ys0IBzhGviA1/TUGJLmSVqs8pb9AnvICXEuOHLprYTw==",
"requires": {
"tr46": "~0.0.3",
"webidl-conversions": "^3.0.0"
}
},
"which": {
"version": "1.3.1",
"resolved": "https://registry.npmjs.org/which/-/which-1.3.1.tgz",
"integrity": "sha512-HxJdYWq1MTIQbJ3nw0cqssHoTNU267KlrDuGZ1WYlxDStUtKUhOaJmh112/TZmHxxUfuJqPXSOm7tDyas0OSIQ==",
"dev": true,
"requires": {
"isexe": "^2.0.0"
}
},
"window-size": {
"version": "0.1.0",
"resolved": "https://registry.npmjs.org/window-size/-/window-size-0.1.0.tgz",
"integrity": "sha1-VDjNLqk7IC76Ohn+iIeu58lPnJ0="
},
"winston": {
"version": "3.2.1",
"resolved": "https://registry.npmjs.org/winston/-/winston-3.2.1.tgz",
"integrity": "sha512-zU6vgnS9dAWCEKg/QYigd6cgMVVNwyTzKs81XZtTFuRwJOcDdBg7AU0mXVyNbs7O5RH2zdv+BdNZUlx7mXPuOw==",
"requires": {
"async": "^2.6.1",
"diagnostics": "^1.1.1",
"is-stream": "^1.1.0",
"logform": "^2.1.1",
"one-time": "0.0.4",
"readable-stream": "^3.1.1",
"stack-trace": "0.0.x",
"triple-beam": "^1.3.0",
"winston-transport": "^4.3.0"
}
},
"winston-transport": {
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/winston-transport/-/winston-transport-4.3.0.tgz",
"integrity": "sha512-B2wPuwUi3vhzn/51Uukcao4dIduEiPOcOt9HJ3QeaXgkJ5Z7UwpBzxS4ZGNHtrxrUvTwemsQiSys0ihOf8Mp1A==",
"requires": {
"readable-stream": "^2.3.6",
"triple-beam": "^1.2.0"
},
"dependencies": {
"readable-stream": {
"version": "2.3.6",
"resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.6.tgz",
"integrity": "sha512-tQtKA9WIAhBF3+VLAseyMqZeBjW0AHJoxOtYqSUZNJxauErmLbVm2FW1y+J/YA9dUrAC39ITejlZWhVIwawkKw==",
"requires": {
"core-util-is": "~1.0.0",
"inherits": "~2.0.3",
"isarray": "~1.0.0",
"process-nextick-args": "~2.0.0",
"safe-buffer": "~5.1.1",
"string_decoder": "~1.1.1",
"util-deprecate": "~1.0.1"
}
},
"string_decoder": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.1.1.tgz",
"integrity": "sha512-n/ShnvDi6FHbbVfviro+WojiFzv+s8MPMHBczVePfUpDJLwoLT0ht1l4YwBCbi8pJAveEEdnkHyPyTP/mzRfwg==",
"requires": {
"safe-buffer": "~5.1.0"
}
}
}
},
"with": {
"version": "5.1.1",
"resolved": "https://registry.npmjs.org/with/-/with-5.1.1.tgz",
"integrity": "sha1-+k2qktrzLE6pTtRTyB8EaGtXXf4=",
"requires": {
"acorn": "^3.1.0",
"acorn-globals": "^3.0.0"
}
},
"wordwrap": {
"version": "0.0.2",
"resolved": "https://registry.npmjs.org/wordwrap/-/wordwrap-0.0.2.tgz",
"integrity": "sha1-t5Zpu0LstAn4PVg8rVLKF+qhZD8="
},
"wreck": {
"version": "14.2.0",
"resolved": "https://registry.npmjs.org/wreck/-/wreck-14.2.0.tgz",
"integrity": "sha512-NFFft3SMgqrJbXEVfYifh+QDWFxni+98/I7ut7rLbz3F0XOypluHsdo3mdEYssGSirMobM3fGlqhyikbWKDn2Q==",
"requires": {
"boom": "7.x.x",
"bourne": "1.x.x",
"hoek": "6.x.x"
}
},
"yallist": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/yallist/-/yallist-2.1.2.tgz",
"integrity": "sha1-HBH5IY8HYImkfdUS+TxmmaaoHVI="
},
"yargs": {
"version": "3.10.0",
"resolved": "https://registry.npmjs.org/yargs/-/yargs-3.10.0.tgz",
"integrity": "sha1-9+572FfdfB0tOMDnTvvWgdFDH9E=",
"requires": {
"camelcase": "^1.0.2",
"cliui": "^2.1.0",
"decamelize": "^1.0.0",
"window-size": "0.1.0"
},
"dependencies": {
"camelcase": {
"version": "1.2.1",
"resolved": "https://registry.npmjs.org/camelcase/-/camelcase-1.2.1.tgz",
"integrity": "sha1-m7UwTS4LVmmLLHWLCKPqqdqlijk="
}
}
}
}
} |
JSON | hydra/test/e2e/oauth2-client/package.json | {
"name": "ory-hydra-mock-oauth2-client",
"version": "0.0.0",
"private": true,
"main": "./src/index.js",
"scripts": {
"consent": "node node_modules/hydra-login-consent-logout/lib/app.js",
"start": "node ./src/index.js",
"watch": "nodemon ./src/index.js"
},
"dependencies": {
"body-parser": "^1.20.1",
"dotenv": "^7.0.0",
"express": "^4.18.2",
"express-session": "^1.17.0",
"express-winston": "^3.4.0",
"hydra-login-consent-logout": "2.0.4-pre.2",
"jsonwebtoken": "^8.5.1",
"jwks-rsa": "^2.1.4",
"node-fetch": "^2.6.0",
"node-uuid": "^1.4.8",
"openid-client": "^2.5.0",
"simple-oauth2": "^2.5.2",
"winston": "^3.2.1"
},
"devDependencies": {
"cross-env": "^5.2.1",
"nodemon": "^2.0.22"
}
} |
JavaScript | hydra/test/e2e/oauth2-client/src/index.js | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
const express = require("express")
const session = require("express-session")
const uuid = require("node-uuid")
const oauth2 = require("simple-oauth2")
const fetch = require("node-fetch")
const ew = require("express-winston")
const winston = require("winston")
const { Issuer } = require("openid-client")
const { URLSearchParams } = require("url")
const bodyParser = require("body-parser")
const jwksClient = require("jwks-rsa")
const jwt = require("jsonwebtoken")
const app = express()
app.use(bodyParser.urlencoded({ extended: true }))
const blacklistedSid = []
const isStatusOk = (res) =>
res.ok
? Promise.resolve(res)
: Promise.reject(
new Error(`Received unexpected status code ${res.statusCode}`),
)
const config = {
url: process.env.AUTHORIZATION_SERVER_URL || "http://127.0.0.1:5004/",
public: process.env.PUBLIC_URL || "http://127.0.0.1:5004/",
admin: process.env.ADMIN_URL || "http://127.0.0.1:5001/",
port: parseInt(process.env.PORT) || 5003,
}
const redirect_uri = `http://127.0.0.1:${config.port}`
app.use(
ew.logger({
transports: [new winston.transports.Console()],
format: winston.format.combine(
winston.format.colorize(),
winston.format.simple(),
),
}),
)
app.use(
session({
secret: "804cd9c9-b447-4df0-b9f0-3126893d3a8e",
resave: false,
saveUninitialized: true,
cookie: {
secure: false,
httpOnly: true,
},
}),
)
const nc = (req) =>
Issuer.discover(config.public).then((issuer) => {
// This is necessary when working with docker...
issuer.metadata.token_endpoint = new URL(
"/oauth2/token",
config.public,
).toString()
issuer.metadata.jwks_uri = new URL(
"/.well-known/jwks.json",
config.public,
).toString()
issuer.metadata.revocation_endpoint = new URL(
"/oauth2/revoke",
config.public,
).toString()
issuer.metadata.introspection_endpoint = new URL(
"/oauth2/introspect",
config.admin,
).toString()
return Promise.resolve(
new issuer.Client({
...issuer.metadata,
...req.session.oidc_credentials,
}),
)
})
app.get("/oauth2/code", async (req, res) => {
const credentials = {
client: {
id: req.query.client_id,
secret: req.query.client_secret,
},
auth: {
tokenHost: config.public,
authorizeHost: config.url,
tokenPath: "/oauth2/token",
authorizePath: "/oauth2/auth",
},
}
const state = uuid.v4()
const scope = req.query.scope || ""
req.session.credentials = credentials
req.session.state = state
req.session.scope = scope.split(" ")
res.redirect(
oauth2.create(credentials).authorizationCode.authorizeURL({
redirect_uri: `${redirect_uri}/oauth2/callback`,
scope,
state,
}),
)
})
app.get("/oauth2/callback", async (req, res) => {
if (req.query.error) {
res.send(JSON.stringify(Object.assign({ result: "error" }, req.query)))
return
}
if (req.query.state !== req.session.state) {
res.send(JSON.stringify({ result: "error", error: "states mismatch" }))
return
}
if (!req.query.code) {
res.send(JSON.stringify({ result: "error", error: "no code given" }))
return
}
oauth2
.create(req.session.credentials)
.authorizationCode.getToken({
redirect_uri: `${redirect_uri}/oauth2/callback`,
scope: req.session.scope,
code: req.query.code,
})
.then((token) => {
req.session.oauth2_flow = { token } // code returns {access_token} because why not...
res.send({ result: "success", token })
})
.catch((err) => {
if (err.data.payload) {
res.send(JSON.stringify(err.data.payload))
return
}
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/oauth2/refresh", function (req, res) {
oauth2
.create(req.session.credentials)
.accessToken.create(req.session.oauth2_flow.token)
.refresh()
.then((token) => {
req.session.oauth2_flow = token // refresh returns {token:{access_token}} because why not...
res.send({ result: "success", token: token.token })
})
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/oauth2/revoke", (req, res) => {
oauth2
.create(req.session.credentials)
.accessToken.create(req.session.oauth2_flow.token)
.revoke(req.query.type || "access_token")
.then(() => {
res.sendStatus(201)
})
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/oauth2/validate-jwt", (req, res) => {
const client = jwksClient({
jwksUri: new URL("/.well-known/jwks.json", config.public).toString(),
})
jwt.verify(
req.session.oauth2_flow.token.access_token,
(header, callback) => {
client.getSigningKey(header.kid, function (err, key) {
const signingKey = key.publicKey || key.rsaPublicKey
callback(null, signingKey)
})
},
(err, decoded) => {
if (err) {
console.error(err)
res.send(400)
return
}
res.send(decoded)
},
)
})
app.get("/oauth2/introspect/at", (req, res) => {
const params = new URLSearchParams()
params.append("token", req.session.oauth2_flow.token.access_token)
fetch(new URL("/oauth2/introspect", config.admin).toString(), {
method: "POST",
body: params,
})
.then(isStatusOk)
.then((res) => res.json())
.then((body) => res.json({ result: "success", body }))
.catch((err) => {
console.error(err)
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/oauth2/introspect/rt", async (req, res) => {
const params = new URLSearchParams()
params.append("token", req.session.oauth2_flow.token.refresh_token)
fetch(new URL("/oauth2/introspect", config.admin).toString(), {
method: "POST",
body: params,
})
.then(isStatusOk)
.then((res) => res.json())
.then((body) => res.json({ result: "success", body }))
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
// client credentials
app.get("/oauth2/cc", (req, res) => {
const credentials = {
client: {
id: req.query.client_id,
secret: req.query.client_secret,
},
auth: {
tokenHost: config.public,
tokenPath: "/oauth2/token",
},
options: {
authorizationMethod: "header",
},
}
oauth2
.create(credentials)
.clientCredentials.getToken({ scope: req.query.scope.split(" ") })
.then((token) => {
res.send({ result: "success", token })
})
.catch((err) => {
if (err.data.payload) {
res.send(JSON.stringify(err.data.payload))
return
}
res.send(JSON.stringify({ error: err.toString() }))
})
})
// openid
app.get("/openid/code", async (req, res) => {
const credentials = {
client_id: req.query.client_id,
client_secret: req.query.client_secret,
}
const state = uuid.v4()
const nonce = uuid.v4()
const scope = req.query.scope || ""
req.session.oidc_credentials = credentials
req.session.state = state
req.session.nonce = nonce
req.session.scope = scope.split(" ")
const client = await nc(req)
const url = client.authorizationUrl({
redirect_uri: `${redirect_uri}/openid/callback`,
scope: scope,
state: state,
nonce: nonce,
prompt: req.query.prompt,
})
res.redirect(url)
})
app.get("/openid/callback", async (req, res) => {
if (req.query.error) {
res.send(JSON.stringify(Object.assign({ result: "error" }, req.query)))
return
}
if (req.query.state !== req.session.state) {
res.send(JSON.stringify({ result: "error", error: "states mismatch" }))
return
}
if (!req.query.code) {
res.send(JSON.stringify({ result: "error", error: "no code given" }))
return
}
const client = await nc(req)
client
.authorizationCallback(`${redirect_uri}/openid/callback`, req.query, {
state: req.session.state,
nonce: req.session.nonce,
response_type: "code",
})
.then((ts) => {
req.session.openid_token = ts
req.session.openid_claims = ts.claims
res.send({ result: "success", token: ts, claims: ts.claims })
})
.catch((err) => {
console.error(err)
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/openid/userinfo", async (req, res) => {
const client = await nc(req)
client
.userinfo(req.session.openid_token.access_token)
.then((ui) => res.json(ui))
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/openid/revoke/at", async (req, res) => {
const client = await nc(req)
client
.revoke(req.session.openid_token.access_token)
.then(() => res.json({ result: "success" }))
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/openid/revoke/rt", async (req, res) => {
const client = await nc(req)
client
.revoke(req.session.openid_token.refresh_token)
.then(() => res.json({ result: "success" }))
.catch((err) => {
res.send(JSON.stringify({ error: err.toString() }))
})
})
app.get("/openid/session/end", async (req, res) => {
const client = await nc(req)
const state = uuid.v4()
if (req.query.simple) {
res.redirect(new URL("/oauth2/sessions/logout", config.public).toString())
} else {
req.session.logout_state = state
res.redirect(
client.endSessionUrl({
state,
id_token_hint:
req.query.id_token_hint || req.session.openid_token.id_token,
}),
)
}
})
app.get("/openid/session/end/fc", async (req, res) => {
if (req.session.openid_claims.sid !== req.query.sid) {
res.sendStatus(400)
return
}
if (req.session.openid_claims.iss !== req.query.iss) {
res.sendStatus(400)
return
}
setTimeout(() => {
req.session.destroy(() => {
res.send("ok")
})
}, 500)
})
app.post("/openid/session/end/bc", (req, res) => {
const client = jwksClient({
jwksUri: new URL("/.well-known/jwks.json", config.public).toString(),
cache: false,
})
jwt.verify(
req.body.logout_token,
(header, callback) => {
client.getSigningKey(header.kid, (err, key) => {
if (err) {
console.error(err)
res.sendStatus(400)
return
}
callback(null, key.publicKey || key.rsaPublicKey)
})
},
(err, decoded) => {
if (err) {
console.error(err)
res.sendStatus(400)
return
}
if (decoded.nonce) {
console.error("nonce is set but should not be", decoded.nonce)
res.sendStatus(400)
return
}
if (decoded.sid.length === 0) {
console.error("sid should be set but is not", decoded.sid)
res.sendStatus(400)
return
}
if (decoded.iss.indexOf(config.url) === -1) {
console.error("issuer is mismatching", decoded.iss, config.url)
res.sendStatus(400)
return
}
blacklistedSid.push(decoded.sid)
res.send("ok")
},
)
})
app.get("/openid/session/check", async (req, res) => {
const { openid_claims: { sid = "" } = {} } = req.session
if (blacklistedSid.indexOf(sid) > -1) {
req.session.destroy(() => {
res.json({ has_session: false })
})
return
}
res.json({
has_session:
Boolean(req.session.oauth2_flow) ||
(Boolean(req.session.openid_token) && Boolean(req.session.openid_claims)),
})
})
app.get("/empty", (req, res) => {
res.setHeader("Content-Type", "text/html")
res.send(Buffer.from("<div>Nothing to see here.</div>"))
})
app.listen(config.port, function () {
console.log(`Listening on port ${config.port}!`)
}) |
Go | hydra/test/mock-cb/main.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package main
import (
"context"
"encoding/json"
"fmt"
"log"
"net/http"
"os"
"strings"
"time"
"golang.org/x/oauth2"
)
func callback(rw http.ResponseWriter, r *http.Request) {
if r.URL.Query().Get("error") != "" {
http.Error(rw, "error happened in callback: "+r.URL.Query().Get("error")+" "+r.URL.Query().Get("error_description")+" "+r.URL.Query().Get("error_debug"), http.StatusInternalServerError)
return
}
code := r.URL.Query().Get("code")
conf := oauth2.Config{
ClientID: os.Getenv("OAUTH2_CLIENT_ID"),
ClientSecret: os.Getenv("OAUTH2_CLIENT_SECRET"),
Endpoint: oauth2.Endpoint{
AuthURL: strings.TrimRight(os.Getenv("HYDRA_URL"), "/") + "/oauth2/auth",
TokenURL: strings.TrimRight(os.Getenv("HYDRA_URL"), "/") + "/oauth2/token",
},
RedirectURL: os.Getenv("REDIRECT_URL"),
}
token, err := conf.Exchange(context.Background(), code)
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
if err := json.NewEncoder(rw).Encode(&struct {
IDToken string `json:"id_token"`
AccessToken string `json:"access_token"`
TokenType string `json:"token_type,omitempty"`
RefreshToken string `json:"refresh_token,omitempty"`
Expiry time.Time `json:"expiry,omitempty"`
}{
IDToken: fmt.Sprintf("%s", token.Extra("id_token")),
AccessToken: token.AccessToken,
RefreshToken: token.RefreshToken,
TokenType: token.TokenType,
Expiry: token.Expiry,
}); err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
}
func main() {
http.HandleFunc("/callback", callback)
port := "4445"
if os.Getenv("PORT") != "" {
port = os.Getenv("PORT")
}
log.Fatal(http.ListenAndServe(":"+port, nil)) // #nosec G114
} |
Go | hydra/test/mock-client/main.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package main
import (
"bytes"
"context"
"encoding/json"
"flag"
"fmt"
"io"
"log"
"net/http"
"net/http/cookiejar"
"net/url"
"os"
"strings"
"time"
hydra "github.com/ory/hydra-client-go/v2"
"golang.org/x/oauth2"
"github.com/ory/hydra/v2/x"
"github.com/ory/x/cmdx"
"github.com/ory/x/urlx"
)
var hydraURL = urlx.ParseOrPanic(os.Getenv("HYDRA_ADMIN_URL"))
var sdk = hydra.NewAPIClient(hydra.NewConfiguration())
func init() {
sdk.GetConfig().Servers = hydra.ServerConfigurations{{URL: hydraURL.String()}}
}
type oauth2token struct {
IDToken string `json:"id_token"`
AccessToken string `json:"access_token"`
TokenType string `json:"token_type,omitempty"`
RefreshToken string `json:"refresh_token,omitempty"`
Expiry time.Time `json:"expiry,omitempty"`
}
var printToken, printCookie bool
func init() {
flag.BoolVar(&printToken, "print-token", false, "")
flag.BoolVar(&printCookie, "print-cookie", false, "")
}
func main() {
flag.Parse()
conf := oauth2.Config{
ClientID: os.Getenv("OAUTH2_CLIENT_ID"),
ClientSecret: os.Getenv("OAUTH2_CLIENT_SECRET"),
Endpoint: oauth2.Endpoint{
AuthURL: strings.TrimRight(os.Getenv("HYDRA_URL"), "/") + "/oauth2/auth",
TokenURL: strings.TrimRight(os.Getenv("HYDRA_URL"), "/") + "/oauth2/token",
},
Scopes: strings.Split(os.Getenv("OAUTH2_SCOPE"), ","),
RedirectURL: os.Getenv("REDIRECT_URL"),
}
au := conf.AuthCodeURL("some-stupid-state-foo") + os.Getenv("OAUTH2_EXTRA")
c, err := cookiejar.New(&cookiejar.Options{})
if err != nil {
log.Fatalf("Unable to create cookie jar: %s", err)
}
u, _ := url.Parse("http://127.0.0.1")
if os.Getenv("AUTH_COOKIE") != "" {
c.SetCookies(u, []*http.Cookie{{Name: "oauth2_authentication_session", Value: os.Getenv("AUTH_COOKIE")}})
}
resp, err := (&http.Client{
Jar: c,
// Hack to fix cookie across domains
CheckRedirect: func(req *http.Request, via []*http.Request) error {
if len(via) > 0 && req.Header.Get("cookie") == "" {
req.Header.Set("Cookie", via[len(via)-1].Header.Get("Cookie"))
}
return nil
},
}).Get(au)
cmdx.CheckResponse(err, http.StatusOK, resp)
defer resp.Body.Close()
out, err := io.ReadAll(resp.Body)
if err != nil {
log.Fatalf("Unable to read body: %s", err)
}
for _, c := range c.Cookies(u) {
if c.Name == "oauth2_authentication_session" {
if printCookie {
fmt.Print(c.Value)
}
}
}
var token oauth2token
if err := json.Unmarshal(out, &token); err != nil {
log.Fatalf("Unable transform to token: %s", err)
}
checkTokenResponse(token)
for i := 0; i <= 5; i++ {
token = refreshToken(token)
checkTokenResponse(token)
}
newToken := refreshToken(token)
if printToken {
fmt.Printf("%s", newToken.AccessToken)
}
// refreshing the same token twice does not work
resp, err = refreshTokenRequest(token)
cmdx.CheckResponse(err, http.StatusBadRequest, resp)
defer resp.Body.Close()
}
func refreshTokenRequest(token oauth2token) (*http.Response, error) {
req, err := http.NewRequest("POST", strings.TrimRight(os.Getenv("HYDRA_URL"), "/")+"/oauth2/token", bytes.NewBufferString(url.Values{
"refresh_token": {token.RefreshToken},
"grant_type": {"refresh_token"},
}.Encode()))
cmdx.Must(err, "%s", err)
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
req.SetBasicAuth(os.Getenv("OAUTH2_CLIENT_ID"), os.Getenv("OAUTH2_CLIENT_SECRET"))
return http.DefaultClient.Do(req)
}
func refreshToken(token oauth2token) (result oauth2token) {
resp, err := refreshTokenRequest(token)
cmdx.CheckResponse(err, http.StatusOK, resp)
defer resp.Body.Close()
err = json.NewDecoder(resp.Body).Decode(&result)
cmdx.Must(err, "Unable to decode refresh token: %s", err)
return result
}
func checkTokenResponse(token oauth2token) {
if token.RefreshToken == "" {
log.Fatalf("Expected a refresh token but none received: %+v", token)
}
// This value oscillates between bar and rab, depending on whether authorization was remembered or not. Check
// mock-lcp which sets the value
expectedValue := "bar"
if strings.Contains(os.Getenv("OAUTH2_EXTRA"), "prompt=none") {
expectedValue = "rab"
}
if os.Getenv("OAUTH2_ACCESS_TOKEN_STRATEGY") == "jwt" {
parts := strings.Split(token.AccessToken, ".")
if len(parts) != 3 {
log.Fatalf("JWT Access Token does not seem to have three parts: %d - %+v - %v", len(parts), token, parts)
}
payload, err := x.DecodeSegment(parts[1])
if err != nil {
log.Fatalf("Unable to decode id token segment: %s", err)
}
var claims map[string]interface{}
if err := json.Unmarshal(payload, &claims); err != nil {
log.Fatalf("Unable to unmarshal id token body: %s", err)
}
if fmt.Sprintf("%s", claims["sub"]) != "the-subject" {
log.Fatalf("Expected subject from access token to be %s but got %s", "the-subject", claims["sub"])
}
ext := claims["ext"].(map[string]interface{})
if ext["foo"] != expectedValue {
log.Fatalf("Expected extra field \"foo\" from access token to be \"%s\" but got %s", expectedValue, ext["foo"])
}
}
intro, resp, err := sdk.OAuth2Api.IntrospectOAuth2Token(context.Background()).Token(token.AccessToken).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to introspect OAuth2 token: %s", err)
}
if !intro.Active {
log.Fatalf("Expected token to be active: %s", token.AccessToken)
}
if *intro.Sub != "the-subject" {
log.Fatalf("Expected subject from access token to be %s but got %s", "the-subject", *intro.Sub)
}
if intro.Ext["foo"] != expectedValue {
log.Fatalf("Expected extra field \"foo\" from access token to be \"%s\" but got %s", expectedValue, intro.Ext["foo"])
}
idt := token.IDToken
if len(idt) == 0 {
log.Fatalf("ID Token does not seem to be set: %+v", token)
}
parts := strings.Split(idt, ".")
if len(parts) != 3 {
log.Fatalf("ID Token does not seem to have three parts: %d - %+v - %v", len(parts), token, parts)
}
payload, err := x.DecodeSegment(parts[1])
if err != nil {
log.Fatalf("Unable to decode id token segment: %s", err)
}
var claims map[string]interface{}
if err := json.Unmarshal(payload, &claims); err != nil {
log.Fatalf("Unable to unmarshal id token body: %s", err)
}
if fmt.Sprintf("%s", claims["sub"]) != "the-subject" {
log.Fatalf("Expected subject from id token to be %s but got %s", "the-subject", claims["sub"])
}
if fmt.Sprintf("%s", claims["baz"]) != expectedValue {
log.Fatalf("Expected extra field \"baz\" from access token to be \"%s\" but got \"%s\"", expectedValue, claims["baz"])
}
} |
Go | hydra/test/mock-lcp/main.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package main
import (
"log"
"net/http"
"os"
"strings"
hydra "github.com/ory/hydra-client-go/v2"
"github.com/ory/x/pointerx"
"github.com/ory/x/urlx"
)
var hydraURL = urlx.ParseOrPanic(os.Getenv("HYDRA_ADMIN_URL"))
var client = hydra.NewAPIClient(hydra.NewConfiguration())
func init() {
client.GetConfig().Servers = hydra.ServerConfigurations{{URL: hydraURL.String()}}
}
func login(rw http.ResponseWriter, r *http.Request) {
challenge := r.URL.Query().Get("login_challenge")
lr, resp, err := client.OAuth2Api.GetOAuth2LoginRequest(r.Context()).LoginChallenge(challenge).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to fetch clogin request: %s", err)
}
var redirectTo string
if strings.Contains(lr.RequestUrl, "mockLogin=accept") {
remember := false
if strings.Contains(lr.RequestUrl, "rememberLogin=yes") {
remember = true
}
vr, resp, err := client.OAuth2Api.AcceptOAuth2LoginRequest(r.Context()).
LoginChallenge(challenge).
AcceptOAuth2LoginRequest(hydra.AcceptOAuth2LoginRequest{
Subject: "the-subject",
Remember: pointerx.Bool(remember),
}).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to execute request: %s", err)
}
redirectTo = vr.RedirectTo
} else {
vr, resp, err := client.OAuth2Api.RejectOAuth2LoginRequest(r.Context()).
LoginChallenge(challenge).
RejectOAuth2Request(hydra.RejectOAuth2Request{
Error: pointerx.String("invalid_request"),
}).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to execute request: %s", err)
}
redirectTo = vr.RedirectTo
}
if err != nil {
log.Fatalf("Unable to accept/reject login request: %s", err)
}
http.Redirect(rw, r, redirectTo, http.StatusFound)
}
func consent(rw http.ResponseWriter, r *http.Request) {
challenge := r.URL.Query().Get("consent_challenge")
o, resp, err := client.OAuth2Api.GetOAuth2ConsentRequest(r.Context()).ConsentChallenge(challenge).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to fetch consent request: %s", err)
}
var redirectTo string
if strings.Contains(*o.RequestUrl, "mockConsent=accept") {
remember := false
if strings.Contains(*o.RequestUrl, "rememberConsent=yes") {
remember = true
}
value := "bar"
if *o.Skip {
value = "rab"
}
v, resp, err := client.OAuth2Api.AcceptOAuth2ConsentRequest(r.Context()).
ConsentChallenge(challenge).
AcceptOAuth2ConsentRequest(hydra.AcceptOAuth2ConsentRequest{
GrantScope: o.RequestedScope,
Remember: pointerx.Bool(remember),
Session: &hydra.AcceptOAuth2ConsentRequestSession{
AccessToken: map[string]interface{}{"foo": value},
IdToken: map[string]interface{}{"baz": value},
},
}).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to execute request: %s", err)
}
redirectTo = v.RedirectTo
} else {
v, resp, err := client.OAuth2Api.RejectOAuth2ConsentRequest(r.Context()).
ConsentChallenge(challenge).
RejectOAuth2Request(hydra.RejectOAuth2Request{Error: pointerx.String("invalid_request")}).Execute()
defer resp.Body.Close()
if err != nil {
log.Fatalf("Unable to execute request: %s", err)
}
redirectTo = v.RedirectTo
}
if err != nil {
log.Fatalf("Unable to accept/reject consent request: %s", err)
}
http.Redirect(rw, r, redirectTo, http.StatusFound)
}
func errh(rw http.ResponseWriter, r *http.Request) {
http.Error(rw, r.URL.Query().Get("error")+" "+r.URL.Query().Get("error_debug"), http.StatusInternalServerError)
}
func main() {
http.HandleFunc("/login", login)
http.HandleFunc("/consent", consent)
http.HandleFunc("/error", errh)
port := "3000"
if os.Getenv("PORT") != "" {
port = os.Getenv("PORT")
}
log.Fatal(http.ListenAndServe(":"+port, nil)) // #nosec G114
} |
hydra/test/stub/ecdh.key | -----BEGIN EC PRIVATE KEY-----
MIGkAgEBBDDvoj/bM1HokUjYWO/IDFs26Jo0GIFtU3tMQQu7ZabKscDMK3dZA0mK
v97ij7BBFbCgBwYFK4EEACKhZANiAAT3KhQQCDFN32y/B72g+qOFw/5/aNx1MvZa
rwDDa/2G3V0HLTS0VE82sLEUKS8xwkWFI+gNRXk0vvN+Hf+myJI1jOIY+tYQlh+C
ZiKGNJ6g5/Su7V6ukGtN+UiY+sx+0LI=
-----END EC PRIVATE KEY----- |
|
hydra/test/stub/ecdh.pub | -----BEGIN PUBLIC KEY-----
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE9yoUEAgxTd9svwe9oPqjhcP+f2jcdTL2
Wq8Aw2v9ht1dBy00tFRPNrCxFCkvMcJFhSPoDUV5NL7zfh3/psiSNYziGPrWEJYf
gmYihjSeoOf0ru1erpBrTflImPrMftCy
-----END PUBLIC KEY----- |
|
hydra/test/stub/pgp.key | -----BEGIN PGP PRIVATE KEY BLOCK-----
lQPGBFycM3oBCADUSXgKFJJMXeZbmaYhhK7Ky364MhyBDvh+J8rFdyIC2q4CNzsw
e9q+PnOEXuCYlkrtrlHkzaxRUHcva9zFC3zUbKxCa/ErfPFQD6iBheE2L2/Ihp4Z
0PMKIFJM90LRqqa3VqItfleHwT6BUp21mTzq0dZLDUAv36P8IX/N+cMTxxbUuql2
oGZ3AlzPpwwnyOif/vgYEbcK0CcwVO4+jVXQ0xEx6KArv7XZtTcFqF6YslCNVcd2
R6YcAj1DDrIGX2GgacXYlG/hCQe3t9Avog9Qwny6lOTbwCQdfFBp78zAuxgSrru6
ta/HzM+HSnfDTp7rU4tZEdEaJ/Ob0iIEGFV3ABEBAAH+BwMCr0iIUsATVnDol+eM
qOA1eOYxyXipVoDHXn8GMLRIDoneay0DWTp+/Z621odo5jrMGDS8z9T9oLFjXmuV
k8vyqFU5SCJozsLlCMEg9MXIz1hdhVw09XSIU6Sk5fZm97YCVWYpq7tkL5rIQrFq
zzgC7TQtwGXiaHtCW/ir/CiOauPl0lRVTSOL2Olzp5Bcb4bGDXoqopW1OMVMn51V
bumwA4oCv5YxxmaGk2EKDb4WdwxZQ7oS5Xnwut7DOWw+8cydAS5kIVcFHseltvZL
UzUTiZritqjMDXzgr0HeMcIOg+0MIkb91c/3nlXjMz3Rl2FtfuHm7ZmVZLmamesg
6111p/RekGvBYrhTBNJQD8FhZNcWi9Dn4773t2F3E11BCPT6hw+sQ6fE4tuc4tg0
5H8TIDl+HsETP1WELY5t9dX9sxPMeWV0OLrp7oK7SxM6d5+tfJ3up1sPa+UytKon
q2SzzOtXAaKhsiLmAQasFymyDkCZgfx0CXIhdJmdLVGaTkhrZbUQAWUplXgqgFaj
oouacgpOibjFu8m48AO3KOqmoRVNKjVH8008+7FEWGa2Ec8Ct9XhiKegkF3oFaCU
QA8EsFjV+zmXNHvtbyC5/wNwABICUaZVzLx3RYE9NgFMDDsd2KV61n7fcMmvMKBN
OtCxwPGTmVvibWagQOsnv322HF3WSctGfRe5UTV2gcuzuJwQsL2syZYaBuOc70Op
xeTIorN9mL0twlmPeXrXXAtKvP1KrpxhuyaiKe/8+IkXiAdPyKY/m0lTsL37swP6
6kvDNmhpeP2V6eq07eNuhK5+NRG+J2sK2l/mCXTzN13mX2W7DHbPPw7vhrvEymsK
pWqD7bbmCTJW+qZZzx1Tey4GeuKo0eSVf/iifg/uUf4SbPG+RyKgbYJHRVMGQjL0
06en6ArOW0xutCJoeWRyYSB0ZXN0ZXIgPGV4YW1wbGVAZXhhbXBsZS5jb20+iQFO
BBMBCgA4FiEE/jArhaPUtyvCUV4weO7bnWZnI6EFAlycM3oCGwMFCwkIBwMFFQoJ
CAsFFgIDAQACHgECF4AACgkQeO7bnWZnI6E+tQgAiVtVXp2/j+P42nFsgWBbnH/Z
2gIxpra+Biu6AVgOPkQD/OceDblCxkZOs9U2XMNwxh7h/cazSkixVFuLx572rcoa
amRJqyAGr6sW6f4rn6kf+/qu3u5Q6f1c6Ep0wiDfeOsXSzkojhAgxHGawX/Gvxdc
L8HdJClo2hMdl6Kl54K6EdR10hI3+X4C7xZJE4x+O3nKIxquiAeeozsXmT2G+ftd
P3O3+PN3d7VRvCRxTIyJIDzn7wttW9UBiLmQyK1mSTJ0atMI9y9zBMj6NHN4ZEuA
CVjk+GGtuRdg2k/rkrmms/Vv/ezjNL6vK19Hb8Ah+ziAlyAqLIB6Ej3KkhFtUp0D
xgRcnDPgAQgAxxgBUKkeKtam7dgh8kkQnY2st8SfcSq3rOc1q73engZzYYTIcVWq
BdmUQvmoN1shWbNP+os2CKj/En1dK1nnFpePol06tjTWbxQARVI7dF2YrdG+pqMZ
mQcpYT5TgmHXnp1gU15mGFSL//kkq9KUrB80nztGn5Dp85GrviZzkmZbz7Hic49L
O+G+5TTSBEs4uCJFGf9RycwrlP/ytKS/YXFBFbrkI5HWtbfQYcOuDKpt4EodNECG
4NK0xl8CA0mnzAbPl5WLbowxMgu1ItKz3DuSEZegMBI4PccpSojY5QVL4Q/Nvnt2
MDJWl6f7f8dFLxrQEzq8+UDImEFi/yelsQARAQAB/gcDAjt3VX+IWC866JV7XeDL
N/7JwIl/G34hyoXwsx4mmo78IFnL5AMDwZexan7FJFQdYsOdKyIfVILzIjTuK0wy
IaBDnC7iOOYxRBtm0sJwKRilJg5M6USyG5/1c2brz7w+oA9ML0Esxx/natqIp7pL
vuN2p3Z53DfiPpdOOTyH8sWcuAmJR0MO1pY2T6CCEFUFPntD3yzoF0YwbTOHUAA+
UmyXN3M8t/3OszY2rMTZM36eu6N9O9Un++sZLUrzdl5zZK0VOu1exoAgcCSH4xVu
psWjrCc5TnH6POL4MFbJBv3B3Ht4UwIScELUqtkR2D/0sEBzFPJ57sdqfq/gLeIl
NKcYHgpFFT2BrEstQIvIxJ0NBUlF2azOV/qCM8CG4xWP2j4jvKpaVPBti/HRl76z
su8E1e8wMmmb/V2QyPzWf0pSjp6BHIkOegKe9Aj5+bv2tjfpeohwUPp2lP422H0E
jxI/na8A/0Orq2+j0xOOa/nTfXUeYq+kTClm62pwGOjrEuycV/qKS4Vv/8dFWwMv
qUkXQB7NWdlhzMPz8OrvF1GWZEo+uwpd9pIBPiZeRuWaerTEk1aAerKUA6RU/0Fv
hDLYDl8lT9BZ5JBbczaAwkhM3jb1sEnzipczhDr7cb77QDvuLycEOGQb6R9f8m2b
sdB4+tO9xXEeANqL84yfZnEDMOW4x0V8+LRjkOY97YcsQG9MJ8jJHV6jOX5BHcB1
wf4oMYR1k3vQV5AFRxE/oDpumStnp0LjkKEzINwc/xuXD4AAlLPKCpNvb9etn40m
bemLYhiG1tNk49BsZ+3ZJ212AW2Yx6Stt09YipfKL4UwUyAixMV4d1ayDc+xZERe
fiPH6+qTIkRD4QVWl/ZcewvN29gEpl/ptsq6E8g4M3JxmkH9VQRTQEkbMq8M621L
G8zCLtZBAYkCbAQYAQoAIBYhBP4wK4Wj1LcrwlFeMHju251mZyOhBQJcnDPgAhsC
AUAJEHju251mZyOhwHQgBBkBCgAdFiEE4/sSOIwbqbblVhqUltKxyeOBaJoFAlyc
M+AACgkQltKxyeOBaJpVpQf6AhPXOoMPuS95MRZrBsOVYR7JM7quagUjk70fv8pd
RBNxRSJQpnFj01SwekaA+4J4rJm0bW+kQcIIQMq+kSVF+u23Bu7FQkUtjzPpM2Pt
hFXqIrgmhx5955H+LhNHJZ3qnNOr1/4ysQFrPPQ3RjYZvNC8n9JVDhjsxRizVjmI
iMp0rdIpWnj/UdJet/NmZF7iaNJuehw694CYa5hPzBTLybM5BTdzsbbR2xmOC8RE
jq+izqIaUuvbJvOk5lVYOhhqNypWq/+GWPtZfeRT9B0HYHsqw40ZnkykMtmwnnhF
qtW0IsnwbSu2s1w683E9vkTRyzvA90e76uV/1R/XrX2+sA4/B/9s6EnbTROD4ZIt
ouyr1VDn4SeS3knN7bg7DMO3zfpxxKtE1XTP3tqOfP5UQzsz8rLK9SUCpyKuMN4X
r1DCQHWTRJSYvUG071u2zaBjkvhSGc/kVFx0ddahvWTAOnYEvFuOZC/XxC6cdJnG
DtoSaCPe38SctFmz1IwJd6pULRUaEVotuztFyuQICsDhjZMR4P2AEeBmCOmHvzGN
5fbYt6uEnDBd4tprXCIQfO+yHaCgyN6s5pUXmwUvgcq3Tlbbr1QbJbYvaksojzLK
bwlYZjXT5eBn3LYknMZ0yerVN9/fgNDQJ9gHXWSscgmk913Wv01Q1Js2/wNy8+DX
El6BJMTjnQPGBFycM/wBCAC45owcWXAvgQwx3TvgiHA7yUnPe6RIJWuUxMwVrA6y
bKvqEeip2zZa9euH01feIvIddhzCad0dcwv4cm6GLWWohp1OlbjICMWJWVzywotF
+jpS7TW7PG9KGI8POu6lFmKpjDNzy135SiiBMfQYReOk/bUEHN999HOjCYXXZuqD
S9Reluq9XleqX3kTqqz67I0eATctmazFF6ftIcXpFpOvkhunbIxCyp+y1KEWWmzr
U1PwCd9MxUEHIy4unNa1i++RZuWIv85yWV/+Bzol613TAIUr9N6Yi09z/oA9We46
E3rCXkbTer0iibcXEbhll6WJ7IgJEu6DjtTNFftJO/N3ABEBAAH+BwMCdHZ/OFzu
Hr3ohYBiOGszAGD9KOYjdrfTtDN8GQrGn+vzn5Z+itcaegBws8q+CHvYtHoB8YaX
erpORsDZmPBogd/bAJBbtzSGecJHrB6P1lqI8WPecEzGOyaYFiWVQyZR0JgR0By/
tBZBqnEgcPBbEb+YsO6X3z+pzBrrkOyv65LV3rVNtadLhMCrcdmdfxjM1XlbKDvH
+J1Yh1/YrY8HdHShYFXzJoq2W/JSvDkeTzs71H0ESaSGs1IxCilA9CsxEFEfsDgR
3NsP1NxlYq0VRpk2BtVvnDJRLUmnO/8GaWZxdgWb2ctMui3K3mlSc0b7MThJDpze
yaXJ6q2dge2wCToWptqyIQsZFP78pw2Q800YfUmC+Dta4DQYCEkA8SdMR1wM/N2k
VrDvyTAbe7lUG+K9LseayteHg5kiz01iAzKGsb+5CwCo7eWoKtmtIoy+AY3hlcJA
I/cJ/k3IL4niGjFfEpdNAJzyuI/E32p7hspemUOfLVoQ50W9s34PAeW7EscE9sEg
Rbmac6pnMTmkk1CBpBQrQHVE/07PECivX4+NCMH5u5dEp8AVV3IzDHpETOtsOfG9
pAwszI1bGxikmc7k0AF2ZPiLS1w291BIeMVXSOQonsshDEYKVXMY9hmGE13E3v6Y
r4eAaouFgA0p6mjYyaS8i7M7Uvz2EfU9dlCxrbDOxrPtuJbMYbZmT4s+dkCyaqS/
wHedCgCqw+e6UEJbUqJe2yYoo568qTm3++bmlZS/Lx9JC4exlbqica6qO5G60MJo
HWmnolPwzW+4RYSsbCQSoz3t2K2uSmE0QmbzQYXcwWW04yXIt+L9/t6P0Jmk4XiD
ypUJtA1fGqnJB+eF7wuOTXJYI3fsgru9nyDhMr+C0HvIRPyiCQFvrtl5F2DXKuZ+
znh78HA3yPGDKkn4JFHFiQE2BBgBCgAgFiEE/jArhaPUtyvCUV4weO7bnWZnI6EF
AlycM/wCGwwACgkQeO7bnWZnI6HErAf/byLABD+UWtygMSG+eJfnL/bBs1VEWQ7I
72BCdO9L50jgK+b8LynNbmUg4pUzeOfmuuuaevkJI0tNgXT/1Ly6x7qdmu6h8mBs
TVQxAfTDnZWV7Ib0WziqyO+X7QbuYRNsN6ZidY4WQpVKCevXyLb1lGLssb4ciZXB
pW6dijZGI3/zqBGHFsbJBDc5F+bDGU8xK1pj2MZLvDXyaX5r/aJwrl5TKRcYm26v
DB2VBQvmIH9SvLmWsd8pzJcEewWthVo1bsSxkpZyTh21NTwNsiYkIdzhEYgFU6BT
Tpu9yG7X+ljt0RF7VNrXALbvodD0hxH5FWWlclOeAdxc4OaRsnhLuw==
=3JKT
-----END PGP PRIVATE KEY BLOCK----- |
|
hydra/test/stub/pgp.pub | -----BEGIN PGP PUBLIC KEY BLOCK-----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=z+ay
-----END PGP PUBLIC KEY BLOCK----- |
|
hydra/test/stub/rsa.key | -----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY----- |
|
hydra/test/stub/rsa.pub | -----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAslWybuiNYR7uOgKuvaBw
qVk8saEutKhOAaW+3hWF65gJei+ZV8QFfYDxs9ZaRZlWAUMtncQPnw7ZQlXO9ogN
5cMcN50C6qMOOZzghK7danalhF5lUETC4Hk3Eisbi/PR3IfVyXaRmqL6X66MKj/J
AKyD9NFIDVy52K8A198Jojnrw2+XXQW72U68fZtvlyl/BTBWQ9Re5JSTpEcVmpCR
8FrFc0RPMBm+G5dRs08vvhZNiTT2JACO5V+J5ZrgP3s5hnGFcQFZgDnXLInDUdoi
1MuCjaAU0ta8/08pHMijNix5kFofdPEB954MiZ9k4kQ5/utt02I9x2ssHqw71ojj
vwIDAQAB
-----END PUBLIC KEY----- |
|
Go | hydra/x/audit.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"net/http"
"github.com/ory/x/logrusx"
)
func LogAudit(r *http.Request, message interface{}, logger *logrusx.Logger) {
if logger == nil {
logger = logrusx.NewAudit("", "")
}
logger = logger.WithRequest(r)
if err, ok := message.(error); ok {
logger.WithError(err).Infoln("access denied")
return
}
logger.Infoln("access allowed")
} |
Go | hydra/x/audit_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"bytes"
"fmt"
"net/http"
"testing"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
"github.com/stretchr/testify/assert"
"github.com/ory/x/logrusx"
)
func TestLogAudit(t *testing.T) {
for k, tc := range []struct {
d string
message interface{}
expectContains []string
}{
{
d: "This should log \"access allowed\" because no errors are given",
message: nil,
expectContains: []string{"msg=access allowed"},
},
{
d: "This should log \"access denied\" because an error is given",
message: errors.New("asdf"),
expectContains: []string{"msg=access denied"},
},
} {
t.Run(fmt.Sprintf("case=%d/description=%s", k, tc.d), func(t *testing.T) {
r, err := http.NewRequest(http.MethodGet, "https://hydra/some/endpoint", nil)
if err != nil {
t.Fatal(err)
}
buf := bytes.NewBuffer([]byte{})
l := logrusx.NewAudit("", "", logrusx.ForceLevel(logrus.TraceLevel))
l.Logger.Out = buf
LogAudit(r, tc.message, l)
assert.Contains(t, buf.String(), "audience=audit")
for _, expectContain := range tc.expectContains {
assert.Contains(t, buf.String(), expectContain)
}
})
}
} |
Go | hydra/x/authenticator.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"net/http"
"net/url"
"github.com/ory/fosite"
)
type ClientAuthenticatorProvider interface {
ClientAuthenticator() ClientAuthenticator
}
type ClientAuthenticator interface {
AuthenticateClient(ctx context.Context, r *http.Request, form url.Values) (fosite.Client, error)
} |
Go | hydra/x/basic_auth.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"encoding/base64"
"net/url"
)
func BasicAuth(username, password string) string {
return base64.StdEncoding.EncodeToString([]byte(url.QueryEscape(username) + ":" + url.QueryEscape(password)))
} |
Go | hydra/x/clean_sql.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"testing"
"github.com/gobuffalo/pop/v6"
)
func DeleteHydraRows(t *testing.T, c *pop.Connection) {
for _, tb := range []string{
"hydra_oauth2_access",
"hydra_oauth2_refresh",
"hydra_oauth2_code",
"hydra_oauth2_oidc",
"hydra_oauth2_pkce",
"hydra_oauth2_flow",
"hydra_oauth2_authentication_session",
"hydra_oauth2_obfuscated_authentication_session",
"hydra_oauth2_logout_request",
"hydra_oauth2_jti_blacklist",
"hydra_oauth2_trusted_jwt_bearer_issuer",
"hydra_jwk",
"hydra_client",
} {
if err := c.RawQuery("DELETE FROM " + tb).Exec(); err != nil {
t.Logf(`Unable to delete rows in table "%s": %s`, tb, err)
}
}
}
func CleanSQLPop(t *testing.T, c *pop.Connection) {
t.Logf("Cleaning up database: %s", c.Dialect.Name())
for _, tb := range []string{
"hydra_oauth2_access",
"hydra_oauth2_refresh",
"hydra_oauth2_code",
"hydra_oauth2_oidc",
"hydra_oauth2_pkce",
"hydra_oauth2_flow",
"hydra_oauth2_authentication_session",
"hydra_oauth2_obfuscated_authentication_session",
"hydra_oauth2_logout_request",
"hydra_oauth2_jti_blacklist",
"hydra_oauth2_trusted_jwt_bearer_issuer",
"hydra_jwk",
"hydra_client",
// Migrations
"hydra_oauth2_authentication_consent_migration",
"hydra_client_migration",
"hydra_oauth2_migration",
"hydra_jwk_migration",
"networks",
"schema_migration",
} {
if err := c.RawQuery("DROP TABLE IF EXISTS " + tb).Exec(); err != nil {
t.Fatalf(`Unable to clean up table "%s": %s`, tb, err)
}
}
t.Logf("Successfully cleaned up database: %s", c.Dialect.Name())
} |
Go | hydra/x/config.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
//go:generate ../.bin/mockgen -package mock -destination ../internal/mock/config_cookie.go . CookieConfigProvider
package x
import (
"context"
"net/http"
)
type CookieConfigProvider interface {
CookieDomain(ctx context.Context) string
IsDevelopmentMode(ctx context.Context) bool
CookieSameSiteMode(ctx context.Context) http.SameSite
CookieSameSiteLegacyWorkaround(ctx context.Context) bool
CookieSecure(ctx context.Context) bool
} |
Go | hydra/x/const.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
const (
OpenIDConnectKeyName = "hydra.openid.id-token"
OAuth2JWTKeyName = "hydra.jwt.access-token"
) |
Go | hydra/x/doc.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
// ORY Hydra
//
// Welcome to the ORY Hydra HTTP API documentation. You will find documentation for all HTTP APIs here.
//
// Schemes: http, https
// Host:
// BasePath: /
// Version: latest
//
// Consumes:
// - application/json
// - application/x-www-form-urlencoded
//
// Produces:
// - application/json
//
// SecurityDefinitions:
// oauth2:
// type: oauth2
// authorizationUrl: https://hydra.demo.ory.sh/oauth2/auth
// tokenUrl: https://hydra.demo.ory.sh/oauth2/token
// flow: accessCode
// scopes:
// offline: "A scope required when requesting refresh tokens (alias for `offline_access`)"
// offline_access: "A scope required when requesting refresh tokens"
// openid: "Request an OpenID Connect ID Token"
// basic:
// type: basic
// bearer:
// type: basic
//
// Extensions:
// ---
// x-request-id: string
// x-forwarded-proto: string
// ---
//
// swagger:meta
package x |
Go | hydra/x/doc_swagger.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
// Empty responses are sent when, for example, resources are deleted. The HTTP status code for empty responses is
// typically 201.
//
// swagger:response emptyResponse
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type emptyResponse struct{}
// Error
//
// swagger:model errorOAuth2
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type errorOAuth2 struct {
// Error
Name string `json:"error"`
// Error Description
Description string `json:"error_description"`
// Error Hint
//
// Helps the user identify the error cause.
//
// Example: The redirect URL is not allowed.
Hint string `json:"error_hint"`
// HTTP Status Code
//
// Example: 401
Code int `json:"status_code"`
// Error Debug Information
//
// Only available in dev mode.
Debug string `json:"error_debug,omitempty"`
}
// Default Error Response
//
// swagger:response errorOAuth2Default
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type errorOAuth2Default struct {
// in: body
Body errorOAuth2
}
// Bad Request Error Response
//
// swagger:response errorOAuth2BadRequest
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type errorOAuth2BadRequest struct {
// in: body
Body errorOAuth2
}
// Not Found Error Response
//
// swagger:response errorOAuth2NotFound
//
//lint:ignore U1000 Used to generate Swagger and OpenAPI definitions
type errorOAuth2NotFound struct {
// in: body
Body errorOAuth2
} |
Go | hydra/x/errors.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"net/http"
"github.com/ory/fosite"
"github.com/ory/x/logrusx"
)
var (
ErrNotFound = &fosite.RFC6749Error{
CodeField: http.StatusNotFound,
ErrorField: http.StatusText(http.StatusNotFound),
DescriptionField: "Unable to locate the requested resource",
}
ErrConflict = &fosite.RFC6749Error{
CodeField: http.StatusConflict,
ErrorField: http.StatusText(http.StatusConflict),
DescriptionField: "Unable to process the requested resource because of conflict in the current state",
}
)
func LogError(r *http.Request, err error, logger *logrusx.Logger) {
if logger == nil {
logger = logrusx.New("", "")
}
logger.WithRequest(r).
WithError(err).Errorln("An error occurred")
}
func Must[T any](t T, err error) T {
if err != nil {
panic(err)
}
return t
} |
Go | hydra/x/errors_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"bytes"
"net/http"
"strings"
"testing"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
"github.com/stretchr/testify/assert"
"github.com/ory/x/logrusx"
)
type errStackTracer struct{}
func (s *errStackTracer) StackTrace() errors.StackTrace {
return errors.StackTrace{}
}
func (s *errStackTracer) Error() string {
return "foo"
}
func TestLogError(t *testing.T) {
r, err := http.NewRequest(http.MethodGet, "https://hydra/some/endpoint", nil)
if err != nil {
t.Fatal(err)
}
buf := bytes.NewBuffer([]byte{})
l := logrusx.New("", "", logrusx.ForceLevel(logrus.TraceLevel))
l.Logger.Out = buf
LogError(r, errors.New("asdf"), l)
t.Logf("%s", buf.String())
assert.True(t, strings.Contains(buf.String(), "trace"))
LogError(r, errors.Wrap(new(errStackTracer), ""), l)
}
func TestLogErrorDoesNotPanic(t *testing.T) {
r, err := http.NewRequest(http.MethodGet, "https://hydra/some/endpoint", nil)
if err != nil {
t.Fatal(err)
}
LogError(r, errors.New("asdf"), nil)
} |
Go | hydra/x/error_enhancer.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"net/http"
"github.com/pkg/errors"
"github.com/ory/fosite"
"github.com/ory/herodot"
)
type enhancedError struct {
*fosite.RFC6749Error
RequestID string `json:"request_id"`
}
func ErrorEnhancer(r *http.Request, err error) interface{} {
if e := new(herodot.DefaultError); errors.As(err, &e) {
return &enhancedError{
RFC6749Error: (&fosite.RFC6749Error{
ErrorField: e.Error(),
DescriptionField: e.Reason(),
CodeField: e.StatusCode(),
}).WithTrace(err),
RequestID: r.Header.Get("X-Request-Id"),
}
}
return &enhancedError{
RFC6749Error: fosite.ErrorToRFC6749Error(err),
RequestID: r.Header.Get("X-Request-Id"),
}
} |
Go | hydra/x/error_enhancer_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"encoding/json"
errors2 "errors"
"fmt"
"net/http"
"testing"
"github.com/ory/x/errorsx"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/ory/fosite"
"github.com/ory/x/sqlcon"
)
func TestErrorEnhancer(t *testing.T) {
for k, tc := range []struct {
in error
out string
}{
{
in: sqlcon.ErrNoRows,
out: "{\"error\":\"Unable to locate the resource\",\"error_description\":\"\"}",
},
{
in: errorsx.WithStack(sqlcon.ErrNoRows),
out: "{\"error\":\"Unable to locate the resource\",\"error_description\":\"\"}",
},
{
in: errors.New("bla"),
out: "{\"error\":\"error\",\"error_description\":\"The error is unrecognizable\"}",
},
{
in: errors2.New("bla"),
out: "{\"error\":\"error\",\"error_description\":\"The error is unrecognizable\"}",
},
{
in: fosite.ErrInvalidRequest,
out: "{\"error\":\"invalid_request\",\"error_description\":\"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed. Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.\"}",
},
{
in: errorsx.WithStack(fosite.ErrInvalidRequest),
out: "{\"error\":\"invalid_request\",\"error_description\":\"The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed. Make sure that the various parameters are correct, be aware of case sensitivity and trim your parameters. Make sure that the client you are using has exactly whitelisted the redirect_uri you specified.\"}",
},
} {
t.Run(fmt.Sprintf("case=%d", k), func(t *testing.T) {
err := ErrorEnhancer(new(http.Request), tc.in)
out, err2 := json.Marshal(err)
require.NoError(t, err2)
assert.Equal(t, tc.out, string(out))
})
}
} |
Go | hydra/x/fosite_storer.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"time"
"github.com/ory/fosite"
"github.com/ory/fosite/handler/oauth2"
"github.com/ory/fosite/handler/openid"
"github.com/ory/fosite/handler/pkce"
"github.com/ory/fosite/handler/rfc7523"
"github.com/ory/fosite/handler/verifiable"
)
type FositeStorer interface {
fosite.Storage
oauth2.CoreStorage
openid.OpenIDConnectRequestStorage
pkce.PKCERequestStorage
rfc7523.RFC7523KeyStorage
verifiable.NonceManager
RevokeRefreshToken(ctx context.Context, requestID string) error
RevokeAccessToken(ctx context.Context, requestID string) error
// flush the access token requests from the database.
// no data will be deleted after the 'notAfter' timeframe.
FlushInactiveAccessTokens(ctx context.Context, notAfter time.Time, limit int, batchSize int) error
// flush the login requests from the database.
// this will address the database long-term growth issues discussed in https://github.com/ory/hydra/issues/1574.
// no data will be deleted after the 'notAfter' timeframe.
FlushInactiveLoginConsentRequests(ctx context.Context, notAfter time.Time, limit int, batchSize int) error
DeleteAccessTokens(ctx context.Context, clientID string) error
FlushInactiveRefreshTokens(ctx context.Context, notAfter time.Time, limit int, batchSize int) error
// DeleteOpenIDConnectSession deletes an OpenID Connect session.
// This is duplicated from Ory Fosite to help against deprecation linting errors.
DeleteOpenIDConnectSession(ctx context.Context, authorizeCode string) error
} |
Go | hydra/x/hasher.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"github.com/ory/fosite"
"github.com/ory/x/hasherx"
"go.opentelemetry.io/otel"
"github.com/ory/x/errorsx"
)
const tracingComponent = "github.com/ory/hydra/x"
var _ fosite.Hasher = (*Hasher)(nil)
type HashAlgorithm string
func (a HashAlgorithm) String() string {
return string(a)
}
const (
HashAlgorithmBCrypt = HashAlgorithm("bcrypt")
HashAlgorithmPBKDF2 = HashAlgorithm("pbkdf2")
)
// Hasher implements fosite.Hasher.
type Hasher struct {
c config
bcrypt *hasherx.Bcrypt
pbkdf2 *hasherx.PBKDF2
}
type config interface {
hasherx.PBKDF2Configurator
hasherx.BCryptConfigurator
GetHasherAlgorithm(ctx context.Context) HashAlgorithm
}
// NewHasher returns a new BCrypt instance.
func NewHasher(c config) *Hasher {
return &Hasher{
c: c,
bcrypt: hasherx.NewHasherBcrypt(c),
pbkdf2: hasherx.NewHasherPBKDF2(c),
}
}
func (b *Hasher) Hash(ctx context.Context, data []byte) ([]byte, error) {
ctx, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "x.hasher.Hash")
defer span.End()
switch b.c.GetHasherAlgorithm(ctx) {
case HashAlgorithmBCrypt:
return b.bcrypt.Generate(ctx, data)
case HashAlgorithmPBKDF2:
fallthrough
default:
return b.pbkdf2.Generate(ctx, data)
}
}
func (b *Hasher) Compare(ctx context.Context, hash, data []byte) error {
_, span := otel.GetTracerProvider().Tracer(tracingComponent).Start(ctx, "x.hasher.Hash")
defer span.End()
if err := hasherx.Compare(ctx, data, hash); err != nil {
return errorsx.WithStack(err)
}
return nil
} |
Go | hydra/x/hasher_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"fmt"
"testing"
"github.com/ory/x/hasherx"
"github.com/stretchr/testify/require"
)
type hasherConfig struct {
cost uint32
}
func (c hasherConfig) HasherPBKDF2Config(ctx context.Context) *hasherx.PBKDF2Config {
return &hasherx.PBKDF2Config{}
}
func (c hasherConfig) HasherBcryptConfig(ctx context.Context) *hasherx.BCryptConfig {
return &hasherx.BCryptConfig{Cost: c.cost}
}
func (c hasherConfig) GetHasherAlgorithm(ctx context.Context) HashAlgorithm {
return HashAlgorithmPBKDF2
}
func TestHasher(t *testing.T) {
for _, cost := range []uint32{1, 8, 10} {
result, err := NewHasher(&hasherConfig{cost: cost}).Hash(context.Background(), []byte("foobar"))
require.NoError(t, err)
require.NotEmpty(t, result)
}
}
// TestBackwardsCompatibility confirms that hashes generated with v1.x work with v2.x.
func TestBackwardsCompatibility(t *testing.T) {
h := NewHasher(new(hasherConfig))
require.NoError(t, h.Compare(context.Background(), []byte("$2a$10$lsrJjLPOUF7I75s3339R2uwqpjSlYGfhFyg7YsPtrSoITVy5UF3B2"), []byte("secret")))
require.NoError(t, h.Compare(context.Background(), []byte("$2a$10$O1jZhd3U0azpLXwTu0cHHuTDWsBFnTJVbeHTADNQJWPR4Zqs8ATKS"), []byte("secret")))
require.Error(t, h.Compare(context.Background(), []byte("$2a$10$lsrJjLPOUF7I75s3339R2uwqpjSlYGfhFyg7YsPtrSoITVy5UF3B3"), []byte("secret")))
}
func BenchmarkHasher(b *testing.B) {
for cost := uint32(1); cost <= 16; cost++ {
b.Run(fmt.Sprintf("cost=%d", cost), func(b *testing.B) {
for n := 0; n < b.N; n++ {
result, err := NewHasher(&hasherConfig{cost: cost}).Hash(context.Background(), []byte("foobar"))
require.NoError(b, err)
require.NotEmpty(b, result)
}
})
}
} |
Go | hydra/x/int_to_bytes.go | // Copyright © 2023 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"encoding/binary"
"github.com/pkg/errors"
)
// IntToBytes converts an int64 to a byte slice. It is the inverse of BytesToInt.
func IntToBytes(i int64) []byte {
b := make([]byte, 8)
binary.LittleEndian.PutUint64(b, uint64(i))
return b
}
// BytesToInt converts a byte slice to an int64. It is the inverse of IntToBytes.
func BytesToInt(b []byte) (int64, error) {
if len(b) != 8 {
return 0, errors.New("byte slice must be 8 bytes long")
}
return int64(binary.LittleEndian.Uint64(b)), nil
} |
Go | hydra/x/int_to_bytes_test.go | // Copyright © 2023 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"math"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func Test_toBytes_fromBytes(t *testing.T) {
for _, tc := range []struct {
name string
i int64
}{
{
name: "zero",
i: 0,
},
{
name: "positive",
i: 1234567890,
},
{
name: "negative",
i: -1234567890,
},
{
name: "now",
i: time.Now().Unix(),
},
{
name: "max",
i: math.MaxInt64,
},
{
name: "min",
i: math.MinInt64,
},
} {
t.Run("case="+tc.name, func(t *testing.T) {
bytes := IntToBytes(tc.i)
i, err := BytesToInt(bytes)
require.NoError(t, err)
assert.Equal(t, tc.i, i)
})
}
} |
Go | hydra/x/jwt.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"encoding/base64"
"strings"
)
// Decode JWT specific base64url encoding with padding stripped
func DecodeSegment(seg string) ([]byte, error) {
if l := len(seg) % 4; l > 0 {
seg += strings.Repeat("=", 4-l)
}
return base64.URLEncoding.DecodeString(seg)
} |
Go | hydra/x/pagination.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"net/http"
"net/url"
"github.com/ory/x/pagination/tokenpagination"
)
// swagger:model paginationHeaders
type PaginationHeaders struct {
// The link header contains pagination links.
//
// For details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).
//
// in: header
Link string `json:"link"`
// The total number of clients.
//
// in: header
XTotalCount string `json:"x-total-count"`
}
// swagger:model pagination
type PaginationParams struct {
// Items per page
//
// This is the number of items per page to return.
// For details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).
//
// required: false
// in: query
// default: 250
// min: 1
// max: 1000
PageSize int `json:"page_size"`
// Next Page Token
//
// The next page token.
// For details on pagination please head over to the [pagination documentation](https://www.ory.sh/docs/ecosystem/api-design#pagination).
//
// required: false
// in: query
// default: 1
// min: 1
PageToken string `json:"page_token"`
}
const paginationMaxItems = 1000
const paginationDefaultItems = 250
var paginator = &tokenpagination.TokenPaginator{
MaxItems: paginationMaxItems,
DefaultItems: paginationDefaultItems,
}
// ParsePagination parses limit and page from *http.Request with given limits and defaults.
func ParsePagination(r *http.Request) (page, itemsPerPage int) {
return paginator.ParsePagination(r)
}
func PaginationHeader(w http.ResponseWriter, u *url.URL, total int64, page, itemsPerPage int) {
tokenpagination.PaginationHeader(w, u, total, page, itemsPerPage)
} |
Go | hydra/x/pointer.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
// ToPointer returns the pointer to the value.
func ToPointer[T any](val T) *T {
return &val
}
// FromPointer returns the dereferenced value or if the pointer is nil the zero value.
func FromPointer[T any, TT *T](val *T) (zero T) {
if val == nil {
return zero
}
return *val
} |
Go | hydra/x/redirect_uri.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"net/url"
"github.com/ory/fosite"
)
type redirectConfiguration interface {
IsDevelopmentMode(context.Context) bool
}
func IsRedirectURISecure(rc redirectConfiguration) func(context.Context, *url.URL) bool {
return func(ctx context.Context, redirectURI *url.URL) bool {
if rc.IsDevelopmentMode(ctx) {
return true
}
if fosite.IsRedirectURISecure(ctx, redirectURI) {
return true
}
return false
}
} |
Go | hydra/x/redirect_uri_test.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"net/url"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
type mockrc struct{ dm bool }
func (m *mockrc) IsDevelopmentMode(ctx context.Context) bool {
return m.dm
}
func TestIsRedirectURISecure(t *testing.T) {
for d, c := range []struct {
u string
err bool
dev bool
}{
{u: "http://google.com", err: true},
{u: "https://google.com", err: false},
{u: "http://localhost", err: false},
{u: "http://test.localhost", err: false},
{u: "wta://auth", err: false},
{u: "http://foo.com/bar", err: false, dev: true},
{u: "http://baz.com/bar", err: false, dev: true},
} {
uu, err := url.Parse(c.u)
require.NoError(t, err)
assert.Equal(t, !c.err, IsRedirectURISecure(&mockrc{dm: c.dev})(context.Background(), uu), "case %d", d)
}
} |
Go | hydra/x/registry.go | // Copyright © 2022 Ory Corp
// SPDX-License-Identifier: Apache-2.0
package x
import (
"context"
"github.com/hashicorp/go-retryablehttp"
"github.com/ory/x/httpx"
"github.com/ory/x/otelx"
"github.com/gorilla/sessions"
"github.com/ory/herodot"
"github.com/ory/x/logrusx"
)
type RegistryLogger interface {
Logger() *logrusx.Logger
AuditLogger() *logrusx.Logger
}
type RegistryWriter interface {
Writer() herodot.Writer
}
type RegistryCookieStore interface {
CookieStore(ctx context.Context) (sessions.Store, error)
}
type TracingProvider interface {
Tracer(ctx context.Context) *otelx.Tracer
}
type HTTPClientProvider interface {
HTTPClient(ctx context.Context, opts ...httpx.ResilientOptions) *retryablehttp.Client
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.