1
1
package idp
2
2
3
3
import (
4
+ "context"
4
5
"crypto/rsa"
5
6
"net/http"
6
7
"time"
@@ -260,7 +261,7 @@ func (idp *IDP) getVerificationKey() (*rsa.PublicKey, error) {
260
261
return key , nil
261
262
}
262
263
263
- func (idp * IDP ) getClient (clientID string ) (* hclient.Client , error ) {
264
+ func (idp * IDP ) getClient (ctx context. Context , clientID string ) (* hclient.Client , error ) {
264
265
clientKey := ClientInfoKey (clientID )
265
266
data , ok := idp .cache .Get (clientKey )
266
267
if ok {
@@ -271,7 +272,7 @@ func (idp *IDP) getClient(clientID string) (*hclient.Client, error) {
271
272
return nil , ErrorNoSuchClient
272
273
}
273
274
274
- client , err := idp .hc .Clients .GetClient (clientID )
275
+ client , err := idp .hc .Clients .GetClient (ctx , clientID )
275
276
if err != nil {
276
277
// Either the client isn't registered in hydra, or maybe hydra is
277
278
// having some problem. Either way, ensure we don't hit hydra again
@@ -286,7 +287,7 @@ func (idp *IDP) getClient(clientID string) (*hclient.Client, error) {
286
287
}
287
288
288
289
// Create a new Challenge. The request will contain all the necessary information from Hydra, passed in the URL.
289
- func (idp * IDP ) NewChallenge (r * http.Request , user string ) (challenge * Challenge , err error ) {
290
+ func (idp * IDP ) NewChallenge (ctx context. Context , r * http.Request , user string ) (challenge * Challenge , err error ) {
290
291
tokenStr := r .FormValue ("challenge" )
291
292
if tokenStr == "" {
292
293
// No challenge token
@@ -310,7 +311,7 @@ func (idp *IDP) NewChallenge(r *http.Request, user string) (challenge *Challenge
310
311
}
311
312
312
313
// Get data from the challenge jwt
313
- challenge .Client , err = idp .getClient (claims ["aud" ].(string ))
314
+ challenge .Client , err = idp .getClient (ctx , claims ["aud" ].(string ))
314
315
if err != nil {
315
316
return nil , err
316
317
}
0 commit comments