|
@@ -1,5 +1,5 @@
|
|
|
use super::{api, OIDCError, OIDCErrorType, Request};
|
|
|
-use crate::{config, schema, server::session::SessionHelper};
|
|
|
+use crate::{client::ClientExt, config, schema, server::session::SessionHelper};
|
|
|
use microrm::prelude::*;
|
|
|
|
|
|
fn do_code_authorize<'l, 's>(
|
|
@@ -108,8 +108,7 @@ pub(super) fn do_authorize(
|
|
|
));
|
|
|
};
|
|
|
|
|
|
- // verify the realm and client_id and redirect_uri
|
|
|
-
|
|
|
+ // verify the client_id refers to an extant client
|
|
|
let client = realm
|
|
|
.clients
|
|
|
.with(schema::Client::Shortname, &qp.client_id)
|
|
@@ -120,14 +119,31 @@ pub(super) fn do_authorize(
|
|
|
.ok_or_else(|| {
|
|
|
OIDCError(
|
|
|
OIDCErrorType::UnauthorizedClient,
|
|
|
- "Client does not exist".into(),
|
|
|
+ "client does not exist".into(),
|
|
|
state,
|
|
|
)
|
|
|
})?;
|
|
|
|
|
|
let scopes = qp.scope.as_deref().unwrap_or("").split_whitespace();
|
|
|
|
|
|
- // TODO: check that redirect URI matches
|
|
|
+ // check that redirect URI matches
|
|
|
+ match client.check_redirect(qp.redirect_uri.as_str()) {
|
|
|
+ Ok(true) => (),
|
|
|
+ Ok(false) => {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::InvalidRequest,
|
|
|
+ "invalid redirect URI".into(),
|
|
|
+ state,
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ Err(_) => {
|
|
|
+ return Err(OIDCError(
|
|
|
+ OIDCErrorType::ServerError,
|
|
|
+ "invalid stored redirect uri".into(),
|
|
|
+ state,
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ }
|
|
|
|
|
|
if qp.response_type == "code" {
|
|
|
do_code_authorize(
|
|
@@ -167,7 +183,7 @@ pub(super) fn do_authorize(
|
|
|
} else {
|
|
|
Err(OIDCError(
|
|
|
OIDCErrorType::UnsupportedResponseType,
|
|
|
- "Only code and token are understood.".into(),
|
|
|
+ "only 'code' and 'token' are understood".into(),
|
|
|
state,
|
|
|
))
|
|
|
}
|