Comparison

mod_http_oauth2/mod_http_oauth2.lua @ 5450:d2594bbf7c36

mod_http_oauth2: Scope FIXMEs
author Kim Alvefur <zash@zash.se>
date Thu, 11 May 2023 21:43:23 +0200
parent 5449:9c19a6b8e542
child 5451:6705f2a09702
comparison
equal deleted inserted replaced
5449:9c19a6b8e542 5450:d2594bbf7c36
366 function grant_type_handlers.authorization_code(params) 366 function grant_type_handlers.authorization_code(params)
367 if not params.client_id then return oauth_error("invalid_request", "missing 'client_id'"); end 367 if not params.client_id then return oauth_error("invalid_request", "missing 'client_id'"); end
368 if not params.client_secret then return oauth_error("invalid_request", "missing 'client_secret'"); end 368 if not params.client_secret then return oauth_error("invalid_request", "missing 'client_secret'"); end
369 if not params.code then return oauth_error("invalid_request", "missing 'code'"); end 369 if not params.code then return oauth_error("invalid_request", "missing 'code'"); end
370 if params.scope and params.scope ~= "" then 370 if params.scope and params.scope ~= "" then
371 -- FIXME allow a subset of granted scopes
371 return oauth_error("invalid_scope", "unknown scope requested"); 372 return oauth_error("invalid_scope", "unknown scope requested");
372 end 373 end
373 374
374 local client_ok, client = jwt_verify(params.client_id); 375 local client_ok, client = jwt_verify(params.client_id);
375 if not client_ok then 376 if not client_ok then
542 function grant_type_handlers.password(params) 543 function grant_type_handlers.password(params)
543 local request_jid = assert(params.username, oauth_error("invalid_request", "missing 'username' (JID)")); 544 local request_jid = assert(params.username, oauth_error("invalid_request", "missing 'username' (JID)"));
544 local request_password = assert(params.password, oauth_error("invalid_request", "missing 'password'")); 545 local request_password = assert(params.password, oauth_error("invalid_request", "missing 'password'"));
545 local request_username, request_host, request_resource = jid.prepped_split(request_jid); 546 local request_username, request_host, request_resource = jid.prepped_split(request_jid);
546 if params.scope then 547 if params.scope then
548 -- TODO shouldn't we support scopes / roles here?
547 return oauth_error("invalid_scope", "unknown scope requested"); 549 return oauth_error("invalid_scope", "unknown scope requested");
548 end 550 end
549 if not request_host or request_host ~= module.host then 551 if not request_host or request_host ~= module.host then
550 return oauth_error("invalid_request", "invalid JID"); 552 return oauth_error("invalid_request", "invalid JID");
551 end 553 end