@@ -17,7 +17,7 @@ import (
1717
1818type RDBItems map [string ]* RdbSchema
1919
20- type FositeRehinkDBStore struct {
20+ type FositeRethinkDBStore struct {
2121 Session * r.Session
2222 sync.RWMutex
2323
@@ -64,7 +64,7 @@ func requestFromRDB(s *RdbSchema, proto fosite.Session) (*fosite.Request, error)
6464 return d , nil
6565}
6666
67- func (m * FositeRehinkDBStore ) ColdStart () error {
67+ func (m * FositeRethinkDBStore ) ColdStart () error {
6868 if err := m .AccessTokens .coldStart (m .Session , & m .RWMutex , m .AccessTokensTable ); err != nil {
6969 return err
7070 } else if err := m .AuthorizeCodes .coldStart (m .Session , & m .RWMutex , m .AuthorizeCodesTable ); err != nil {
@@ -77,7 +77,7 @@ func (m *FositeRehinkDBStore) ColdStart() error {
7777 return nil
7878}
7979
80- func (s * FositeRehinkDBStore ) publishInsert (table r.Term , id string , requester fosite.Requester ) error {
80+ func (s * FositeRethinkDBStore ) publishInsert (table r.Term , id string , requester fosite.Requester ) error {
8181 sess , err := json .Marshal (requester .GetSession ())
8282 if err != nil {
8383 return errors .WithStack (err )
@@ -98,14 +98,14 @@ func (s *FositeRehinkDBStore) publishInsert(table r.Term, id string, requester f
9898 return nil
9999}
100100
101- func (s * FositeRehinkDBStore ) publishDelete (table r.Term , id string ) error {
101+ func (s * FositeRethinkDBStore ) publishDelete (table r.Term , id string ) error {
102102 if _ , err := table .Get (id ).Delete ().RunWrite (s .Session ); err != nil {
103103 return errors .WithStack (err )
104104 }
105105 return nil
106106}
107107
108- func (s * FositeRehinkDBStore ) waitFor (i RDBItems , id string ) error {
108+ func (s * FositeRethinkDBStore ) waitFor (i RDBItems , id string ) error {
109109 c := make (chan bool )
110110
111111 go func () {
@@ -135,14 +135,14 @@ func (s *FositeRehinkDBStore) waitFor(i RDBItems, id string) error {
135135 }
136136}
137137
138- func (s * FositeRehinkDBStore ) CreateOpenIDConnectSession (_ context.Context , authorizeCode string , requester fosite.Requester ) error {
138+ func (s * FositeRethinkDBStore ) CreateOpenIDConnectSession (_ context.Context , authorizeCode string , requester fosite.Requester ) error {
139139 if err := s .publishInsert (s .IDSessionsTable , authorizeCode , requester ); err != nil {
140140 return err
141141 }
142142 return s .waitFor (s .IDSessions , authorizeCode )
143143}
144144
145- func (s * FositeRehinkDBStore ) GetOpenIDConnectSession (_ context.Context , authorizeCode string , requester fosite.Requester ) (fosite.Requester , error ) {
145+ func (s * FositeRethinkDBStore ) GetOpenIDConnectSession (_ context.Context , authorizeCode string , requester fosite.Requester ) (fosite.Requester , error ) {
146146 s .RLock ()
147147 defer s .RUnlock ()
148148 cl , ok := s .IDSessions [authorizeCode ]
@@ -152,18 +152,18 @@ func (s *FositeRehinkDBStore) GetOpenIDConnectSession(_ context.Context, authori
152152 return requestFromRDB (cl , requester .GetSession ())
153153}
154154
155- func (s * FositeRehinkDBStore ) DeleteOpenIDConnectSession (_ context.Context , authorizeCode string ) error {
155+ func (s * FositeRethinkDBStore ) DeleteOpenIDConnectSession (_ context.Context , authorizeCode string ) error {
156156 return s .publishDelete (s .IDSessionsTable , authorizeCode )
157157}
158158
159- func (s * FositeRehinkDBStore ) CreateAuthorizeCodeSession (_ context.Context , code string , requester fosite.Requester ) error {
159+ func (s * FositeRethinkDBStore ) CreateAuthorizeCodeSession (_ context.Context , code string , requester fosite.Requester ) error {
160160 if err := s .publishInsert (s .AuthorizeCodesTable , code , requester ); err != nil {
161161 return err
162162 }
163163 return s .waitFor (s .AuthorizeCodes , code )
164164}
165165
166- func (s * FositeRehinkDBStore ) GetAuthorizeCodeSession (_ context.Context , code string , sess fosite.Session ) (fosite.Requester , error ) {
166+ func (s * FositeRethinkDBStore ) GetAuthorizeCodeSession (_ context.Context , code string , sess fosite.Session ) (fosite.Requester , error ) {
167167 s .RLock ()
168168 defer s .RUnlock ()
169169 rel , ok := s .AuthorizeCodes [code ]
@@ -174,18 +174,18 @@ func (s *FositeRehinkDBStore) GetAuthorizeCodeSession(_ context.Context, code st
174174 return requestFromRDB (rel , sess )
175175}
176176
177- func (s * FositeRehinkDBStore ) DeleteAuthorizeCodeSession (_ context.Context , code string ) error {
177+ func (s * FositeRethinkDBStore ) DeleteAuthorizeCodeSession (_ context.Context , code string ) error {
178178 return s .publishDelete (s .AuthorizeCodesTable , code )
179179}
180180
181- func (s * FositeRehinkDBStore ) CreateAccessTokenSession (_ context.Context , signature string , requester fosite.Requester ) error {
181+ func (s * FositeRethinkDBStore ) CreateAccessTokenSession (_ context.Context , signature string , requester fosite.Requester ) error {
182182 if err := s .publishInsert (s .AccessTokensTable , signature , requester ); err != nil {
183183 return err
184184 }
185185 return s .waitFor (s .AccessTokens , signature )
186186}
187187
188- func (s * FositeRehinkDBStore ) GetAccessTokenSession (_ context.Context , signature string , sess fosite.Session ) (fosite.Requester , error ) {
188+ func (s * FositeRethinkDBStore ) GetAccessTokenSession (_ context.Context , signature string , sess fosite.Session ) (fosite.Requester , error ) {
189189 s .RLock ()
190190 defer s .RUnlock ()
191191 rel , ok := s .AccessTokens [signature ]
@@ -196,18 +196,18 @@ func (s *FositeRehinkDBStore) GetAccessTokenSession(_ context.Context, signature
196196 return requestFromRDB (rel , sess )
197197}
198198
199- func (s * FositeRehinkDBStore ) DeleteAccessTokenSession (_ context.Context , signature string ) error {
199+ func (s * FositeRethinkDBStore ) DeleteAccessTokenSession (_ context.Context , signature string ) error {
200200 return s .publishDelete (s .AccessTokensTable , signature )
201201}
202202
203- func (s * FositeRehinkDBStore ) CreateRefreshTokenSession (_ context.Context , signature string , requester fosite.Requester ) error {
203+ func (s * FositeRethinkDBStore ) CreateRefreshTokenSession (_ context.Context , signature string , requester fosite.Requester ) error {
204204 if err := s .publishInsert (s .RefreshTokensTable , signature , requester ); err != nil {
205205 return err
206206 }
207207 return s .waitFor (s .RefreshTokens , signature )
208208}
209209
210- func (s * FositeRehinkDBStore ) GetRefreshTokenSession (_ context.Context , signature string , sess fosite.Session ) (fosite.Requester , error ) {
210+ func (s * FositeRethinkDBStore ) GetRefreshTokenSession (_ context.Context , signature string , sess fosite.Session ) (fosite.Requester , error ) {
211211 s .RLock ()
212212 defer s .RUnlock ()
213213 rel , ok := s .RefreshTokens [signature ]
@@ -218,15 +218,15 @@ func (s *FositeRehinkDBStore) GetRefreshTokenSession(_ context.Context, signatur
218218 return requestFromRDB (rel , sess )
219219}
220220
221- func (s * FositeRehinkDBStore ) DeleteRefreshTokenSession (_ context.Context , signature string ) error {
221+ func (s * FositeRethinkDBStore ) DeleteRefreshTokenSession (_ context.Context , signature string ) error {
222222 return s .publishDelete (s .RefreshTokensTable , signature )
223223}
224224
225- func (s * FositeRehinkDBStore ) CreateImplicitAccessTokenSession (ctx context.Context , code string , req fosite.Requester ) error {
225+ func (s * FositeRethinkDBStore ) CreateImplicitAccessTokenSession (ctx context.Context , code string , req fosite.Requester ) error {
226226 return s .CreateAccessTokenSession (ctx , code , req )
227227}
228228
229- func (s * FositeRehinkDBStore ) PersistAuthorizeCodeGrantSession (ctx context.Context , authorizeCode , accessSignature , refreshSignature string , request fosite.Requester ) error {
229+ func (s * FositeRethinkDBStore ) PersistAuthorizeCodeGrantSession (ctx context.Context , authorizeCode , accessSignature , refreshSignature string , request fosite.Requester ) error {
230230 if err := s .DeleteAuthorizeCodeSession (ctx , authorizeCode ); err != nil {
231231 return err
232232 } else if err := s .CreateAccessTokenSession (ctx , accessSignature , request ); err != nil {
@@ -244,7 +244,7 @@ func (s *FositeRehinkDBStore) PersistAuthorizeCodeGrantSession(ctx context.Conte
244244 return nil
245245}
246246
247- func (s * FositeRehinkDBStore ) PersistRefreshTokenGrantSession (ctx context.Context , originalRefreshSignature , accessSignature , refreshSignature string , request fosite.Requester ) error {
247+ func (s * FositeRethinkDBStore ) PersistRefreshTokenGrantSession (ctx context.Context , originalRefreshSignature , accessSignature , refreshSignature string , request fosite.Requester ) error {
248248 if err := s .DeleteRefreshTokenSession (ctx , originalRefreshSignature ); err != nil {
249249 return err
250250 } else if err := s .CreateAccessTokenSession (ctx , accessSignature , request ); err != nil {
@@ -256,7 +256,7 @@ func (s *FositeRehinkDBStore) PersistRefreshTokenGrantSession(ctx context.Contex
256256 return nil
257257}
258258
259- func (m * FositeRehinkDBStore ) Watch (ctx context.Context ) {
259+ func (m * FositeRethinkDBStore ) Watch (ctx context.Context ) {
260260 m .AccessTokens .watch (ctx , m .Session , & m .RWMutex , m .AccessTokensTable )
261261 m .AuthorizeCodes .watch (ctx , m .Session , & m .RWMutex , m .AuthorizeCodesTable )
262262 m .IDSessions .watch (ctx , m .Session , & m .RWMutex , m .IDSessionsTable )
@@ -318,7 +318,7 @@ func (items RDBItems) watch(ctx context.Context, sess *r.Session, lock *sync.RWM
318318 })
319319}
320320
321- func (s * FositeRehinkDBStore ) RevokeRefreshToken (ctx context.Context , id string ) error {
321+ func (s * FositeRethinkDBStore ) RevokeRefreshToken (ctx context.Context , id string ) error {
322322 var found bool
323323 for sig , token := range s .RefreshTokens {
324324 if token .RequestID == id {
@@ -334,7 +334,7 @@ func (s *FositeRehinkDBStore) RevokeRefreshToken(ctx context.Context, id string)
334334 return nil
335335}
336336
337- func (s * FositeRehinkDBStore ) RevokeAccessToken (ctx context.Context , id string ) error {
337+ func (s * FositeRethinkDBStore ) RevokeAccessToken (ctx context.Context , id string ) error {
338338 var found bool
339339 for sig , token := range s .AccessTokens {
340340 if token .RequestID == id {
0 commit comments