Legend:
Page
Library
Module
Module type
Parameter
Class
Class type
Source
Source file contract_token.ml
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788exceptionExceptionofstringletname="token"moduletypeSig=sig(** [create ?ctx ?expires_in ?secret data] returns a token that expires in
[expires_in] with the associated data [data]. If no [expires_in] is set,
the default is 7 days. An optional secret [secret] can be provided for the
token signature, by default `SIHL_SECRET` is used. *)valcreate:?ctx:(string*string)list->?secret:string->?expires_in:Core_time.duration->(string*string)list->stringLwt.t(** [read ?ctx ?secret ?force token k] returns the value that is associated
with the key [k] in the token [token]. If [force] is set, the value is
read and returned even if the token is expired, deactivated and the
signature is invalid. If the token is completely invalid and can not be
read, no value is returned. An optional secret [secret] can be provided to
override the default `SIHL_SECRET`. *)valread:?ctx:(string*string)list->?secret:string->?force:unit->string->k:string->stringoptionLwt.t(** [read_all ?ctx ?secret ?force token] returns all key-value pairs
associated with the token [token]. If [force] is set, the values are read
and returned even if the token is expired, deactivated and the signature
is invalid. If the token is completely invalid and can not be read, no
value is returned. An optional secret [secret] can be provided to override
the default `SIHL_SECRET`.*)valread_all:?ctx:(string*string)list->?secret:string->?force:unit->string->(string*string)listoptionLwt.t(** [verify ?ctx ?secret token] returns true if the token has a valid
structure and the signature is valid, false otherwise. An optional secret
[secret] can be provided to override the default `SIHL_SECRET`. *)valverify:?ctx:(string*string)list->?secret:string->string->boolLwt.t(** [deactivate ?ctx token] deactivates the token. Depending on the backend of
the token service a blacklist is used to store the token. *)valdeactivate:?ctx:(string*string)list->string->unitLwt.t(** [activate ?ctx token] re-activates the token. Depending on the backend of
the token service a blacklist is used to store the token. *)valactivate:?ctx:(string*string)list->string->unitLwt.t(** [is_active ?ctx token] returns true if the token is active, false if the
token was deactivated. An expired token or a token that has an invalid
signature is not necessarily inactive.*)valis_active:?ctx:(string*string)list->string->boolLwt.t(** [is_expired ?ctx token] returns true if the token is expired, false
otherwise. An optional secret [secret] can be provided to override the
default `SIHL_SECRET`. *)valis_expired:?ctx:(string*string)list->?secret:string->string->boolLwt.t(** [is_valid ?ctx token] returns true if the token is not expired, active and
the signature is valid and false otherwise. A valid token can safely be
used. An optional secret [secret] can be provided to override the default
`SIHL_SECRET`. *)valis_valid:?ctx:(string*string)list->?secret:string->string->boolLwt.tvalregister:unit->Core_container.Service.tincludeCore_container.Service.Sigend