auth
2014-08-01
Child:65c49af1ed3f
auth/errors.go
Continue our descent to horribleness. Remove all the nonsense about "extensibility" and "clean separation of concerns", instead hardcoding connections to decisions. Remove all those "test" things that stopped passing.
| paddy@1 | 1 package oauth2 |
| paddy@1 | 2 |
| paddy@1 | 3 import "errors" |
| paddy@1 | 4 |
| paddy@1 | 5 const ( |
| paddy@1 | 6 ErrorServerError = "server_error" |
| paddy@1 | 7 ErrorInvalidRequest = "invalid_request" |
| paddy@1 | 8 ErrorAccessDenied = "access_denied" |
| paddy@1 | 9 ) |
| paddy@1 | 10 |
| paddy@1 | 11 var ( |
| paddy@1 | 12 ClientNotFoundError = errors.New("Client not found.") |
| paddy@1 | 13 URIMissingError = errors.New("Redirect URI missing.") |
| paddy@1 | 14 InvalidMethodError = errors.New("Invalid request method.") |
| paddy@1 | 15 InternalServerError = errors.New("Internal server error.") |
| paddy@1 | 16 ErrorNotAuthenticated = errors.New("Not authenticated.") |
| paddy@1 | 17 ) |
| paddy@1 | 18 |
| paddy@1 | 19 type URIFormatError string |
| paddy@1 | 20 |
| paddy@1 | 21 func (err URIFormatError) Error() string { |
| paddy@1 | 22 return "Invalid URI format: " + string(err) |
| paddy@1 | 23 } |
| paddy@1 | 24 |
| paddy@1 | 25 type InvalidClientIDError string |
| paddy@1 | 26 |
| paddy@1 | 27 func (err InvalidClientIDError) Error() string { |
| paddy@1 | 28 return "Invalid client ID: " + string(err) |
| paddy@1 | 29 } |
| paddy@1 | 30 |
| paddy@1 | 31 type URIMismatchError struct { |
| paddy@1 | 32 uri string |
| paddy@1 | 33 mismatch string |
| paddy@1 | 34 } |
| paddy@1 | 35 |
| paddy@1 | 36 func (err URIMismatchError) Error() string { |
| paddy@1 | 37 return "Supplied redirect URI " + err.mismatch + " does not match the redirect in the database (" + err.uri + ")" |
| paddy@1 | 38 } |
| paddy@1 | 39 |
| paddy@1 | 40 func NewURIMismatchError(uri, mismatch string) error { |
| paddy@1 | 41 return URIMismatchError{ |
| paddy@1 | 42 uri: uri, |
| paddy@1 | 43 mismatch: mismatch, |
| paddy@1 | 44 } |
| paddy@1 | 45 } |