zitadel/internal/user/model/token_view.go
Livio Amstutz fc6154cffc
feat: token revocation and OP certification (#2594)
* fix: try using only user session if no user is set (id_token_hint) on prompt none

* fix caos errors As implementation

* implement request mode

* return explicit error on invalid refresh token use

* begin token revocation

* token revocation

* tests

* tests

* cleanup

* set op config

* add revocation endpoint to config

* add revocation endpoint to config

* migration version

* error handling in token revocation

* migration version

* update oidc lib to 1.0.0
2021-11-03 08:35:24 +01:00

69 lines
1.4 KiB
Go

package model
import (
"github.com/caos/zitadel/internal/domain"
caos_errors "github.com/caos/zitadel/internal/errors"
"time"
)
type TokenView struct {
ID string
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
UserID string
ApplicationID string
UserAgentID string
Audience []string
Expiration time.Time
Scopes []string
Sequence uint64
PreferredLanguage string
RefreshTokenID string
}
type TokenSearchRequest struct {
Offset uint64
Limit uint64
SortingColumn TokenSearchKey
Asc bool
Queries []*TokenSearchQuery
}
type TokenSearchKey int32
const (
TokenSearchKeyUnspecified TokenSearchKey = iota
TokenSearchKeyTokenID
TokenSearchKeyUserID
TokenSearchKeyRefreshTokenID
TokenSearchKeyApplicationID
TokenSearchKeyUserAgentID
TokenSearchKeyExpiration
TokenSearchKeyResourceOwner
)
type TokenSearchQuery struct {
Key TokenSearchKey
Method domain.SearchMethod
Value interface{}
}
type TokenSearchResponse struct {
Offset uint64
Limit uint64
TotalResult uint64
Result []*Token
}
func (r *TokenSearchRequest) EnsureLimit(limit uint64) error {
if r.Limit > limit {
return caos_errors.ThrowInvalidArgument(nil, "SEARCH-M0fse", "Errors.Limit.ExceedsDefault")
}
if r.Limit == 0 {
r.Limit = limit
}
return nil
}