// Handles health check requests (GET /v1/health) func (s *Service) healthcheck(w http.ResponseWriter, r *http.Request) { rows, err := s.db.Raw("SELECT 1=1").Rows() defer rows.Close() var healthy bool if err == nil { healthy = true } response.WriteJSON(w, map[string]interface{}{ "healthy": healthy, }, 200) }
// introspectHandler handles OAuth 2.0 introspect request // (POST /v1/oauth/introspect) func (s *Service) introspectHandler(w http.ResponseWriter, r *http.Request) { // Client auth client, err := s.basicAuthClient(r) if err != nil { response.UnauthorizedError(w, err.Error()) return } // Introspect the token resp, err := s.introspectToken(r, client) if err != nil { response.Error(w, err.Error(), getErrStatusCode(err)) return } // Write response to json response.WriteJSON(w, resp, 200) }
// tokensHandler handles all OAuth 2.0 grant types // (POST /v1/oauth/tokens) func (s *Service) tokensHandler(w http.ResponseWriter, r *http.Request) { // Parse the form so r.Form becomes available if err := r.ParseForm(); err != nil { response.Error(w, err.Error(), http.StatusInternalServerError) return } // Map of grant types against handler functions grantTypes := map[string]func(r *http.Request, client *models.OauthClient) (*AccessTokenResponse, error){ "authorization_code": s.authorizationCodeGrant, "password": s.passwordGrant, "client_credentials": s.clientCredentialsGrant, "refresh_token": s.refreshTokenGrant, } // Check the grant type grantHandler, ok := grantTypes[r.Form.Get("grant_type")] if !ok { response.Error(w, ErrInvalidGrantType.Error(), http.StatusBadRequest) return } // Client auth client, err := s.basicAuthClient(r) if err != nil { response.UnauthorizedError(w, err.Error()) return } // Grant processing resp, err := grantHandler(r, client) if err != nil { response.Error(w, err.Error(), getErrStatusCode(err)) return } // Write response to json response.WriteJSON(w, resp, 200) }