Middleware which populates the :identity key in the request based on Bearer token or session
These need to be added to the (group of) route(s) that need them. If they are routes end-users access in their browser, session-auth makes sense. If they are routes the relying party calls with a bearer token, then bearer-auth makes sense. Routes that don't need these should not have them.
Middleware which populates the :identity key in the request based on Bearer token or session These need to be added to the (group of) route(s) that need them. If they are routes end-users access in their browser, session-auth makes sense. If they are routes the relying party calls with a bearer token, then bearer-auth makes sense. Routes that don't need these should not have them.
Automatic database schema evolution utilities
Automatic database schema evolution utilities
lambdaisland/cli middleware for convenient and pretty error handling
lambdaisland/cli middleware for convenient and pretty error handling
Convenience functions for next.jdbc/honeysql
Default to returning kebab-cased qualified maps.
Convenience functions for next.jdbc/honeysql Default to returning kebab-cased qualified maps.
Handle (outgoing) email
Handle (outgoing) email
Monkey patch Hato to read/write JSON using Charred
Monkey patch Hato to read/write JSON using Charred
No vars found in this namespace.
Wrapper around password4j that can detect the hash type based on the Modular Crypt Format (MCF) prefix.
Pepper and other settings can be configured through Password4j's own mechanisms,
-J-Dpsw4j.configuration=/my/path/to/password4j.properties
Wrapper around password4j that can detect the hash type based on the Modular Crypt Format (MCF) prefix. Pepper and other settings can be configured through Password4j's own mechanisms, `-J-Dpsw4j.configuration=/my/path/to/password4j.properties`
PostgreSQL JSONB type handling for next.jdbc
PostgreSQL JSONB type handling for next.jdbc
Middleware that sets a CSP policy.
CSP policy is configured through :http/csp-policy. The special value nonce
is replaced with nonce-<per-request-generated-nonce>, which can be accessed
through *csp-nonce*
Middleware that sets a CSP policy. CSP policy is configured through `:http/csp-policy`. The special value `nonce` is replaced with `nonce-<per-request-generated-nonce>`, which can be accessed through `*csp-nonce*`
A library generate, verify time-based one time passwords for Multi-Factor Authentication.
A library generate, verify time-based one time passwords for Multi-Factor Authentication.
cljdoc builds & hosts documentation for Clojure/Script libraries
| Ctrl+k | Jump to recent docs |
| ← | Move to previous article |
| → | Move to next article |
| Ctrl+/ | Jump to the search field |