Safe Haskell | Safe-Inferred |
---|---|
Language | GHC2021 |
Synopsis
- newtype RedirectUrl = RedirectUrl {}
- addParams :: [(ByteString, ByteString)] -> RedirectUrl -> RedirectUrl
- type OAuthApplicationNameMinLength = 6 :: Nat
- type OAuthApplicationNameMaxLength = 256 :: Nat
- newtype OAuthApplicationName = OAuthApplicationName {}
- data OAuthClientConfig = OAuthClientConfig {}
- newtype OAuthClientPlainTextSecret = OAuthClientPlainTextSecret {}
- data OAuthClientCredentials = OAuthClientCredentials {}
- data OAuthClient = OAuthClient {}
- data OAuthResponseType = OAuthResponseTypeCode
- data OAuthScope
- class IsOAuthScope scope where
- newtype OAuthScopes = OAuthScopes {}
- data CodeChallengeMethod = S256
- newtype OAuthCodeVerifier = OAuthCodeVerifier {
- unOAuthCodeVerifier :: Range 43 128 Text
- newtype OAuthCodeChallenge = OAuthCodeChallenge {}
- verifyCodeChallenge :: OAuthCodeVerifier -> OAuthCodeChallenge -> Bool
- mkChallenge :: OAuthCodeVerifier -> OAuthCodeChallenge
- data CreateOAuthAuthorizationCodeRequest = CreateOAuthAuthorizationCodeRequest {}
- newtype OAuthAuthorizationCode = OAuthAuthorizationCode {}
- data OAuthGrantType
- data OAuthAccessTokenRequest = OAuthAccessTokenRequest {}
- data OAuthAccessTokenType = OAuthAccessTokenTypeBearer
- data TokenTag
- newtype OAuthToken a = OAuthToken {}
- type OAuthAccessToken = OAuthToken 'Access
- type OAuthRefreshToken = OAuthToken 'Refresh
- data OAuthAccessTokenResponse = OAuthAccessTokenResponse {}
- data OAuthClaimsSet = OAuthClaimsSet {}
- hcsSub :: HasClaimsSet hcs => hcs -> Maybe (Id a)
- verify :: JWK -> SignedJWT -> IO (Either JWTError OAuthClaimsSet)
- verify' :: JWK -> SignedJWT -> IO (Either JWTError ClaimsSet)
- data OAuthRefreshTokenInfo = OAuthRefreshTokenInfo {}
- data OAuthRefreshAccessTokenRequest = OAuthRefreshAccessTokenRequest {}
- data OAuthRevokeRefreshTokenRequest = OAuthRevokeRefreshTokenRequest {}
- data OAuthSession = OAuthSession {}
- data OAuthApplication = OAuthApplication {}
- data OAuthError
Documentation
newtype RedirectUrl Source #
Instances
addParams :: [(ByteString, ByteString)] -> RedirectUrl -> RedirectUrl Source #
type OAuthApplicationNameMinLength = 6 :: Nat Source #
type OAuthApplicationNameMaxLength = 256 :: Nat Source #
newtype OAuthApplicationName Source #
Instances
data OAuthClientConfig Source #
Instances
newtype OAuthClientPlainTextSecret Source #
Instances
data OAuthClientCredentials Source #
Instances
data OAuthClient Source #
Instances
data OAuthResponseType Source #
Instances
data OAuthScope Source #
The OAuth scopes that are supported by the backend. This type is a bit redundant and unfortunately has to be kept in sync with the supported scopes defined in the nginx configs. However, having this typed makes it easier to handle scopes in the backend, and e.g. provide more meaningful error messages when the scope is invalid.
Instances
class IsOAuthScope scope where Source #
Instances
IsOAuthScope 'ReadFeatureConfigs Source # | |
Defined in Wire.API.OAuth | |
IsOAuthScope 'ReadSelf Source # | |
Defined in Wire.API.OAuth | |
IsOAuthScope 'WriteConversations Source # | |
Defined in Wire.API.OAuth | |
IsOAuthScope 'WriteConversationsCode Source # | |
Defined in Wire.API.OAuth |
newtype OAuthScopes Source #
Instances
data CodeChallengeMethod Source #
Instances
newtype OAuthCodeVerifier Source #
OAuthCodeVerifier | |
|
Instances
newtype OAuthCodeChallenge Source #
Instances
data CreateOAuthAuthorizationCodeRequest Source #
Instances
newtype OAuthAuthorizationCode Source #
Instances
data OAuthGrantType Source #
Instances
data OAuthAccessTokenRequest Source #
Instances
data OAuthAccessTokenType Source #
Instances
newtype OAuthToken a Source #
Instances
type OAuthAccessToken = OAuthToken 'Access Source #
type OAuthRefreshToken = OAuthToken 'Refresh Source #
data OAuthAccessTokenResponse Source #
Instances
data OAuthClaimsSet Source #
Instances
verify :: JWK -> SignedJWT -> IO (Either JWTError OAuthClaimsSet) Source #
Verify a JWT and return the claims set. Use this function if you have a custom claims set.
verify' :: JWK -> SignedJWT -> IO (Either JWTError ClaimsSet) Source #
Verify a JWT and return the claims set. Use this if you are using the default claims set.
data OAuthRefreshTokenInfo Source #
Instances
data OAuthRefreshAccessTokenRequest Source #
Instances
data OAuthRevokeRefreshTokenRequest Source #
Instances
data OAuthSession Source #
Instances
data OAuthApplication Source #
Instances
data OAuthError Source #