Software /
code /
prosody-modules
File
mod_telnet_tlsinfo/mod_telnet_tlsinfo.lua @ 5705:527c747711f3
mod_http_oauth2: Limit revocation to clients own tokens in strict mode
RFC 7009 section 2.1 states:
> The authorization server first validates the client credentials (in
> case of a confidential client) and then verifies whether the token was
> issued to the client making the revocation request. If this
> validation fails, the request is refused and the client is informed of
> the error by the authorization server as described below.
The first part was already covered (in strict mode). This adds the later
part using the hash of client_id recorded in 0860497152af
It still seems weird to me that revoking a leaked token should not be
allowed whoever might have discovered it, as that seems the responsible
thing to do.
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sun, 29 Oct 2023 11:30:49 +0100 |
parent | 1132:832235cc1910 |
line wrap: on
line source
-- mod_telnet_tlsinfo.lua module:set_global(); module:depends("admin_telnet"); local console_env = module:shared("/*/admin_telnet/env"); local c2s_sessions = module:shared("/*/c2s/sessions"); local s2s_sessions = module:shared("/*/s2s/sessions"); local function print_tlsinfo(print, session) if session.secure then local sock = session.conn:socket() for k,v in pairs(sock:info()) do print(("%20s: %s"):format(k, tostring(v))) end else print(("%20s: %s"):format("protocol", "TCP")) end end function console_env.c2s:showtls(pat) local print = self.session.print; for _, session in pairs(c2s_sessions) do if not pat or session.full_jid and session.full_jid:find(pat, nil, true) then print(session.full_jid or "unauthenticated") print_tlsinfo(print, session); print"" end end end function console_env.s2s:showtls(pat) local print = self.session.print; for _, session in pairs(s2s_sessions) do if not pat or session.from_host == pat or session.to_host == pat then if session.direction == "outgoing" then print(session.from_host, "->", session.to_host) else print(session.to_host, "<-", session.from_host) end print_tlsinfo(print, session); print"" end end end