Software /
code /
prosody-modules
File
mod_muc_auto_reserve_nicks/mod_muc_auto_reserve_nicks.lua @ 5390:f2363e6d9a64
mod_http_oauth2: Advertise the currently supported id_token signing algorithm
This field is REQUIRED. The algorithm RS256 MUST be included, but isn't
because we don't implement it, as that would require implementing a pile
of additional cryptography and JWT stuff. Instead the id_token is
signed using the client secret, which allows verification by the client,
since it's a shared secret per OpenID Connect Core 1.0 § 10.1 under
Symmetric Signatures.
OpenID Connect Discovery 1.0 has a lot of REQUIRED and MUST clauses that
are not supported here, but that's okay because this is served from the
RFC 8414 OAuth 2.0 Authorization Server Metadata .well-known endpoint!
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sun, 30 Apr 2023 16:13:40 +0200 |
parent | 4950:c83bc703825d |
line wrap: on
line source
local jid = require "util.jid"; local set = require "util.set"; local active_affiliations = set.new({ "member", "admin", "owner" }); module:hook("muc-occupant-joined", function (event) local room, occupant = event.room, event.occupant; local user_jid = occupant.bare_jid; local user_affiliation = room:get_affiliation(user_jid); if not active_affiliations:contains(user_affiliation) then return; end local aff_data = event.room:get_affiliation_data(user_jid); if not aff_data then local reserved_nick = jid.resource(occupant.nick); module:log("debug", "Automatically reserving nickname '%s' for <%s>", reserved_nick, user_jid); room:set_affiliation_data(user_jid, "reserved_nickname", reserved_nick); room._reserved_nicks = nil; -- force refresh of nickname map end end);