Mercurial > prosody-modules
view mod_extdisco/README.markdown @ 5390:f2363e6d9a64
mod_http_oauth2: Advertise the currently supported id_token signing algorithm
This field is REQUIRED. The algorithm RS256 MUST be included, but isn't
because we don't implement it, as that would require implementing a pile
of additional cryptography and JWT stuff. Instead the id_token is
signed using the client secret, which allows verification by the client,
since it's a shared secret per OpenID Connect Core 1.0 ยง 10.1 under
Symmetric Signatures.
OpenID Connect Discovery 1.0 has a lot of REQUIRED and MUST clauses that
are not supported here, but that's okay because this is served from the
RFC 8414 OAuth 2.0 Authorization Server Metadata .well-known endpoint!
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sun, 30 Apr 2023 16:13:40 +0200 |
parents | 4b47c8eeca22 |
children |
line wrap: on
line source
--- summary: External Service Discovery ... Introduction ============ This module adds support for [XEP-0215: External Service Discovery], which lets Prosody advertise non-XMPP services. Configuration ============= Example services from the XEP: ``` {.lua} modules_enabled = { -- other modules ... "extdisco"; } external_services = { ["stun.shakespeare.lit"] = { port="9998"; transport="udp"; type="stun"; }; ["relay.shakespeare.lit"] = { password="jj929jkj5sadjfj93v3n"; port="9999"; transport="udp"; type="turn"; username="nb78932lkjlskjfdb7g8"; }; ["192.0.2.1"] = { port="8888"; transport="udp"; type="stun"; }; ["192.0.2.1"] = { port="8889"; password="93jn3bakj9s832lrjbbz"; transport="udp"; type="turn"; username="auu98sjl2wk3e9fjdsl7"; }; ["ftp.shakespeare.lit"] = { name="Shakespearean File Server"; password="guest"; port="20"; transport="tcp"; type="ftp"; username="guest"; }; } ``` Compatibility ============= Incompatible with [mod_turncredentials](https://modules.prosody.im/mod_turncredentials).