1
0
mirror of https://github.com/matrix-org/matrix-authentication-service.git synced 2025-07-29 22:01:14 +03:00

Have all server metadata from the IANA registry

This commit is contained in:
Quentin Gliech
2022-01-11 11:20:17 +01:00
parent a30d4b58f0
commit b4f0f0d0be
3 changed files with 149 additions and 18 deletions

View File

@ -253,7 +253,6 @@ pub mod rfc6749 {
}
pub mod oidc_core {
oauth2_error! {
InteractionRequired,
"interaction_required" =>

View File

@ -20,7 +20,7 @@ use url::Url;
use crate::{
pkce::CodeChallengeMethod,
requests::{ClientAuthenticationMethod, GrantType, ResponseMode},
requests::{ClientAuthenticationMethod, Display, GrantType, ResponseMode},
};
#[derive(Serialize, Clone, Copy, PartialEq, Eq, Hash)]
@ -45,13 +45,13 @@ pub enum SigningAlgorithm {
EcDsa,
}
// TODO: https://datatracker.ietf.org/doc/html/rfc8414#section-2
/// Authorization server metadata, as described by the
/// [IANA registry](https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata)
#[skip_serializing_none]
#[derive(Serialize, Clone)]
#[derive(Serialize, Clone, Default)]
pub struct Metadata {
/// The authorization server's issuer identifier, which is a URL that uses
/// the "https" scheme and has no query or fragment components.
pub issuer: Url,
/// Authorization server's issuer identifier URL.
pub issuer: Option<Url>,
/// URL of the authorization server's authorization endpoint.
pub authorization_endpoint: Option<Url>,
@ -75,8 +75,7 @@ pub struct Metadata {
pub response_types_supported: Option<HashSet<String>>,
/// JSON array containing a list of the OAuth 2.0 "response_mode" values
/// that this authorization server supports, as specified in "OAuth 2.0
/// Multiple Response Type Encoding Practices".
/// that this authorization server supports.
pub response_modes_supported: Option<HashSet<ResponseMode>>,
/// JSON array containing a list of the OAuth 2.0 grant type values that
@ -88,17 +87,151 @@ pub struct Metadata {
pub token_endpoint_auth_methods_supported: Option<HashSet<ClientAuthenticationMethod>>,
/// JSON array containing a list of the JWS signing algorithms supported by
/// the Token Endpoint for the signature on the JWT used to authenticate
/// the Client at the Token Endpoint for the private_key_jwt and
/// client_secret_jwt authentication methods. Servers SHOULD support
/// RS256. The value none MUST NOT be used.
/// the token endpoint for the signature on the JWT used to authenticate the
/// client at the token endpoint.
pub token_endpoint_auth_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
/// PKCE code challenge methods supported by this authorization server
pub code_challenge_methods_supported: Option<HashSet<CodeChallengeMethod>>,
/// URL of a page containing human-readable information that developers
/// might want or need to know when using the authorization server.
pub service_documentation: Option<Url>,
// TODO: type
/// Languages and scripts supported for the user interface, represented as a
/// JSON array of language tag values from BCP 47. If omitted, the set of
/// supported languages and scripts is unspecified.
pub ui_locales_supported: Option<HashSet<String>>,
/// URL that the authorization server provides to the person registering the
/// client to read about the authorization server's requirements on how the
/// client can use the data provided by the authorization server.
pub op_policy_uri: Option<Url>,
/// URL that the authorization server provides to the person registering the
/// client to read about the authorization server's terms of service.
pub op_tos_uri: Option<Url>,
/// URL of the authorization server's OAuth 2.0 revocation endpoint.
pub revocation_endpoint: Option<Url>,
/// JSON array containing a list of client authentication methods supported
/// by this revocation endpoint.
pub revocation_endpoint_auth_methods_supported: Option<HashSet<ClientAuthenticationMethod>>,
/// JSON array containing a list of the JWS signing algorithms supported by
/// the revocation endpoint for the signature on the JWT used to
/// authenticate the client at the revocation endpoint.
pub revocation_endpoint_auth_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
/// URL of the authorization server's OAuth 2.0 introspection endpoint.
pub introspection_endpoint: Option<Url>,
/// JSON array containing a list of client authentication methods supported
/// by this introspection endpoint.
pub introspection_endpoint_auth_methods_supported: Option<HashSet<ClientAuthenticationMethod>>,
/// JSON array containing a list of the JWS signing algorithms supported by
/// the introspection endpoint for the signature on the JWT used to
/// authenticate the client at the introspection endpoint.
pub introspection_endpoint_auth_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
/// PKCE code challenge methods supported by this authorization server.
pub code_challenge_methods_supported: Option<HashSet<CodeChallengeMethod>>,
/// URL of the OP's UserInfo Endpoint.
pub userinfo_endpoint: Option<Url>,
/// JSON array containing a list of the Authentication Context Class
/// References that this OP supports.
pub acr_values_supported: Option<HashSet<String>>,
/// JSON array containing a list of the Subject Identifier types that this
/// OP supports.
pub subject_types_supported: Option<HashSet<String>>,
/// JSON array containing a list of the JWS "alg" values supported by the OP
/// for the ID Token.
pub id_token_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "alg" values supported by the OP
/// for the ID Token.
pub id_token_encryption_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "enc" values supported by the OP
/// for the ID Token.
pub id_token_encryption_enc_values_supported: Option<HashSet<SigningAlgorithm>>,
/// JSON array containing a list of the JWS "alg" values supported by the
/// UserInfo Endpoint.
pub userinfo_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "alg" values supported by the
/// UserInfo Endpoint.
pub userinfo_encryption_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "enc" values supported by the
/// UserInfo Endpoint.
pub userinfo_encryption_enc_values_supported: Option<HashSet<SigningAlgorithm>>,
/// JSON array containing a list of the JWS "alg" values supported by the OP
/// for Request Objects.
pub request_object_signing_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "alg" values supported by the OP
/// for Request Objects.
pub request_object_encryption_alg_values_supported: Option<HashSet<SigningAlgorithm>>,
// TODO: type
/// JSON array containing a list of the JWE "enc" values supported by the OP
/// for Request Objects.
pub request_object_encryption_enc_values_supported: Option<HashSet<SigningAlgorithm>>,
/// JSON array containing a list of the "display" parameter values that the
/// OpenID Provider supports.
pub display_values_supported: Option<HashSet<Display>>,
// TODO: type
/// JSON array containing a list of the Claim Types that the OpenID Provider
/// supports.
pub claim_types_supported: Option<HashSet<String>>,
/// JSON array containing a list of the Claim Names of the Claims that the
/// OpenID Provider MAY be able to supply values for.
pub claims_supported: Option<HashSet<String>>,
// TODO: type
/// Languages and scripts supported for values in Claims being returned,
/// represented as a JSON array of BCP 47 [RFC5646] language tag values.
pub claims_locales_supported: Option<HashSet<String>>,
/// Boolean value specifying whether the OP supports use of the "claims"
/// parameter.
pub claims_parameter_supported: Option<bool>,
/// Boolean value specifying whether the OP supports use of the "request"
/// parameter.
pub request_parameter_supported: Option<bool>,
/// Boolean value specifying whether the OP supports use of the
/// "request_uri" parameter.
pub request_uri_parameter_supported: Option<bool>,
/// Boolean value specifying whether the OP requires any "request_uri"
/// values used to be pre-registered.
pub require_request_uri_registration: Option<bool>,
/// Indicates where authorization request needs to be protected as Request
/// Object and provided through either request or request_uri parameter.
pub require_signed_request_object: Option<bool>,
/// URL of the authorization server's pushed authorization request endpoint.
pub pushed_authorization_request_endpoint: Option<bool>,
/// Indicates whether the authorization server accepts authorization
/// requests only via PAR.
pub require_pushed_authorization_requests: Option<bool>,
}