Software /
code /
prosody-modules
File
mod_flash_policy/mod_flash_policy.lua @ 5185:09d6bbd6c8a4
mod_http_oauth2: Fix treatment of 'redirect_uri' parameter in code flow
It's optional and the one stored in the client registration should
really be used instead. RFC 6749 says an URI provided as parameter MUST
be validated against the stored one but does not say how.
Given that the client needs their secret to proceed, it seems fine to
leave this for later.
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Thu, 02 Mar 2023 22:00:42 +0100 (22 months ago) |
parent | 1343:7dbde05b48a9 |
line wrap: on
line source
local filters = require "util.filters"; local config = {} config.file = module:get_option_string("crossdomain_file", ""); config.string = module:get_option_string("crossdomain_string", [[<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><site-control permitted-cross-domain-policies="master-only"/><allow-access-from domain="*" /></cross-domain-policy>]]); local string = '' if not config.file ~= '' then local f = assert(io.open(config.file)); string = f:read("*all"); else string = config.string end module:log("debug", "crossdomain string: "..string); module:set_global(); function filter_policy(data, session) -- Since we only want to check the first block of data, remove the filter filters.remove_filter(session, "bytes/in", filter_policy); if data == "<policy-file-request/>\0" then session.send(string.."\0"); return nil; -- Drop data to prevent it reaching the XMPP parser else return data; -- Pass data through, it wasn't a policy request end end function filter_session(session) if session.type == "c2s_unauthed" then filters.add_filter(session, "bytes/in", filter_policy, -1); end end function module.load() filters.add_filter_hook(filter_session); end function module.unload() filters.remove_filter_hook(filter_session); end