mirror of
https://forgejo.ellis.link/continuwuation/continuwuity.git
synced 2025-06-26 21:06:36 +02:00
chore: fix up
This commit is contained in:
parent
a76480be48
commit
4692a936a7
5 changed files with 19 additions and 30 deletions
|
@ -23,7 +23,7 @@
|
|||
# See the docs for reverse proxying and delegation:
|
||||
# https://continuwuity.org/deploying/generic.html#setting-up-the-reverse-proxy
|
||||
#
|
||||
# Also see the `[global.well_known]` config section at the very bottom.
|
||||
# Also see the `[global.auth]` and `[global.well_known]` config sections at the very bottom.
|
||||
#
|
||||
# Examples of delegation:
|
||||
# - https://puppygock.gay/.well-known/matrix/server
|
||||
|
@ -58,10 +58,6 @@
|
|||
#
|
||||
#port = 8008
|
||||
|
||||
# This item is undocumented. Please contribute documentation for it.
|
||||
#
|
||||
#auth =
|
||||
|
||||
# The UNIX socket conduwuit will listen on.
|
||||
#
|
||||
# continuwuity cannot listen on both an IP address and a UNIX socket. If
|
||||
|
@ -1630,14 +1626,18 @@
|
|||
|
||||
[global.auth]
|
||||
|
||||
# Use this homeserver as the OIDC authentication reference.
|
||||
# Note that the legacy Matrix authentication still will work.
|
||||
# Use this homeserver as the OIDC authentication reference. It will
|
||||
# advertise itself as the OIDC authentication issuer to new clients,
|
||||
# and use the internal user database to answer on the advertised
|
||||
# endpoints. Note that the legacy Matrix authentication still will be
|
||||
# reachable.
|
||||
# Unset by default.
|
||||
#
|
||||
#enable_oidc_login =
|
||||
|
||||
# The URL where the user is able to access the account management
|
||||
# capabilities of the homeserver. Only used if `enable_oidc_login` is set.
|
||||
# Whether this homeserver should provide users with an account management
|
||||
# interface. Only used if `enable_oidc_login` is set. Note that the
|
||||
# endpoint is unimplemented at the moment.
|
||||
# Unset by default.
|
||||
#
|
||||
#enable_oidc_account_management =
|
||||
|
|
|
@ -39,10 +39,7 @@ pub(crate) async fn authorize(
|
|||
}
|
||||
|
||||
// Redirect to the login page if no token or token not known.
|
||||
let hostname = services
|
||||
.config
|
||||
.server_name
|
||||
.host();
|
||||
let hostname = services.config.server_name.host();
|
||||
match oauth.authorization_header() {
|
||||
| None => {
|
||||
return Ok(oidc_login_form(hostname, &query));
|
||||
|
|
|
@ -5,13 +5,10 @@ use axum::extract::State;
|
|||
use conduwuit::Result;
|
||||
use ruma::{
|
||||
api::client::{
|
||||
discovery::get_authorization_server_metadata::{
|
||||
self,
|
||||
msc2965::{
|
||||
AccountManagementAction, AuthorizationServerMetadata, CodeChallengeMethod,
|
||||
discovery::get_authorization_server_metadata::msc2965::{
|
||||
self, AccountManagementAction, AuthorizationServerMetadata, CodeChallengeMethod,
|
||||
GrantType, Prompt, ResponseMode, ResponseType,
|
||||
},
|
||||
},
|
||||
error::{
|
||||
Error as ClientError, ErrorBody as ClientErrorBody, ErrorKind as ClientErrorKind,
|
||||
},
|
||||
|
@ -92,5 +89,5 @@ pub(crate) async fn get_auth_metadata(
|
|||
};
|
||||
let metadata = Raw::new(&metadata).expect("authorization server metadata should serialize");
|
||||
|
||||
Ok(RumaResponse(Response::new(metadata)))
|
||||
Ok(RumaResponse(msc2965::Response::new(metadata)))
|
||||
}
|
||||
|
|
|
@ -27,10 +27,7 @@ pub(crate) async fn oidc_login(
|
|||
if !services.users.exists(&user_id).await {
|
||||
return Err(err!(Request(Unknown("unknown username"))));
|
||||
}
|
||||
let valid_hash = services
|
||||
.users
|
||||
.password_hash(&user_id)
|
||||
.await?;
|
||||
let valid_hash = services.users.password_hash(&user_id).await?;
|
||||
|
||||
if valid_hash.is_empty() {
|
||||
return Err(err!(Request(UserDeactivated("the user's hash was not found"))));
|
||||
|
@ -40,10 +37,7 @@ pub(crate) async fn oidc_login(
|
|||
}
|
||||
tracing::info!("logging in: {user_id:?}");
|
||||
|
||||
let hostname = services
|
||||
.config
|
||||
.server_name
|
||||
.host();
|
||||
let hostname = services.config.server_name.host();
|
||||
let authorization_query: AuthorizationQuery = query.into();
|
||||
|
||||
services
|
||||
|
|
|
@ -61,7 +61,8 @@ pub struct Config {
|
|||
/// See the docs for reverse proxying and delegation:
|
||||
/// https://continuwuity.org/deploying/generic.html#setting-up-the-reverse-proxy
|
||||
///
|
||||
/// Also see the `[global.auth]` and `[global.well_known]` config sections at the very bottom.
|
||||
/// Also see the `[global.auth]` and `[global.well_known]` config sections
|
||||
/// at the very bottom.
|
||||
///
|
||||
/// Examples of delegation:
|
||||
/// - https://puppygock.gay/.well-known/matrix/server
|
||||
|
|
Loading…
Add table
Reference in a new issue