2021-12-28 01:28:10 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2023-01-14 21:27:37 +00:00
|
|
|
"net/http"
|
|
|
|
|
2022-01-13 20:43:07 +00:00
|
|
|
"github.com/goccy/go-json"
|
2021-12-28 01:28:10 +00:00
|
|
|
|
2022-03-13 10:58:34 +00:00
|
|
|
"source.toby3d.me/toby3d/auth/internal/common"
|
|
|
|
"source.toby3d.me/toby3d/auth/internal/domain"
|
2021-12-28 01:28:10 +00:00
|
|
|
)
|
|
|
|
|
2023-01-16 10:23:20 +00:00
|
|
|
type Handler struct {
|
|
|
|
metadata *domain.Metadata
|
|
|
|
}
|
2021-12-28 01:28:10 +00:00
|
|
|
|
2023-01-14 21:27:37 +00:00
|
|
|
func NewHandler(metadata *domain.Metadata) *Handler {
|
|
|
|
return &Handler{
|
2022-02-15 20:07:39 +00:00
|
|
|
metadata: metadata,
|
2021-12-28 01:28:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-14 21:27:37 +00:00
|
|
|
func (h *Handler) Handler() http.Handler {
|
|
|
|
return http.HandlerFunc(h.handleFunc)
|
2021-12-28 01:28:10 +00:00
|
|
|
}
|
|
|
|
|
2023-01-14 21:27:37 +00:00
|
|
|
func (h *Handler) handleFunc(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if r.Method != "" && r.Method != http.MethodGet {
|
|
|
|
http.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set(common.HeaderContentType, common.MIMEApplicationJSONCharsetUTF8)
|
2022-02-17 16:13:11 +00:00
|
|
|
|
|
|
|
scopes, responseTypes, grantTypes, codeChallengeMethods := make([]string, 0), make([]string, 0),
|
|
|
|
make([]string, 0), make([]string, 0)
|
|
|
|
|
|
|
|
for i := range h.metadata.ScopesSupported {
|
|
|
|
scopes = append(scopes, h.metadata.ScopesSupported[i].String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range h.metadata.ResponseTypesSupported {
|
|
|
|
responseTypes = append(responseTypes, h.metadata.ResponseTypesSupported[i].String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range h.metadata.GrantTypesSupported {
|
|
|
|
grantTypes = append(grantTypes, h.metadata.GrantTypesSupported[i].String())
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range h.metadata.CodeChallengeMethodsSupported {
|
|
|
|
codeChallengeMethods = append(codeChallengeMethods,
|
|
|
|
h.metadata.CodeChallengeMethodsSupported[i].String())
|
|
|
|
}
|
|
|
|
|
2023-01-14 21:27:37 +00:00
|
|
|
_ = json.NewEncoder(w).Encode(&MetadataResponse{
|
2022-02-17 16:13:11 +00:00
|
|
|
AuthorizationEndpoint: h.metadata.AuthorizationEndpoint.String(),
|
|
|
|
IntrospectionEndpoint: h.metadata.IntrospectionEndpoint.String(),
|
|
|
|
Issuer: h.metadata.Issuer.String(),
|
|
|
|
RevocationEndpoint: h.metadata.RevocationEndpoint.String(),
|
|
|
|
ServiceDocumentation: h.metadata.ServiceDocumentation.String(),
|
|
|
|
TokenEndpoint: h.metadata.TokenEndpoint.String(),
|
|
|
|
UserinfoEndpoint: h.metadata.UserinfoEndpoint.String(),
|
2022-02-15 20:07:39 +00:00
|
|
|
AuthorizationResponseIssParameterSupported: h.metadata.AuthorizationResponseIssParameterSupported,
|
2022-02-17 16:13:11 +00:00
|
|
|
CodeChallengeMethodsSupported: codeChallengeMethods,
|
|
|
|
GrantTypesSupported: grantTypes,
|
|
|
|
IntrospectionEndpointAuthMethodsSupported: h.metadata.IntrospectionEndpointAuthMethodsSupported,
|
|
|
|
ResponseTypesSupported: responseTypes,
|
|
|
|
ScopesSupported: scopes,
|
|
|
|
// NOTE(toby3d): If a revocation endpoint is provided, this
|
|
|
|
// property should also be provided with the value ["none"],
|
|
|
|
// since the omission of this value defaults to
|
|
|
|
// client_secret_basic according to RFC8414.
|
|
|
|
RevocationEndpointAuthMethodsSupported: h.metadata.RevocationEndpointAuthMethodsSupported,
|
2022-02-15 20:07:39 +00:00
|
|
|
})
|
2023-01-14 21:27:37 +00:00
|
|
|
|
|
|
|
w.WriteHeader(http.StatusOK)
|
2021-12-28 01:28:10 +00:00
|
|
|
}
|