feat: allow additional scopes

This commit is contained in:
Fabiennne 2020-10-28 13:34:26 +01:00
parent 6162e217e9
commit f47fb07c0f
2 changed files with 2 additions and 2 deletions

View file

@ -121,7 +121,7 @@ func ValidateAuthReqScopes(client Client, scopes []string) ([]string, error) {
scope == oidc.ScopePhone || scope == oidc.ScopePhone ||
scope == oidc.ScopeAddress || scope == oidc.ScopeAddress ||
scope == oidc.ScopeOfflineAccess) && scope == oidc.ScopeOfflineAccess) &&
!utils.Contains(client.AllowedScopes(), scope) { !client.IsScopeAllowed(scope) {
scopes[i] = scopes[len(scopes)-1] scopes[i] = scopes[len(scopes)-1]
scopes[len(scopes)-1] = "" scopes[len(scopes)-1] = ""
scopes = scopes[:len(scopes)-1] scopes = scopes[:len(scopes)-1]

View file

@ -34,9 +34,9 @@ type Client interface {
AccessTokenType() AccessTokenType AccessTokenType() AccessTokenType
IDTokenLifetime() time.Duration IDTokenLifetime() time.Duration
DevMode() bool DevMode() bool
AllowedScopes() []string
AssertAdditionalIdTokenScopes() bool AssertAdditionalIdTokenScopes() bool
AssertAdditionalAccessTokenScopes() bool AssertAdditionalAccessTokenScopes() bool
IsScopeAllowed(scope string) bool
} }
func ContainsResponseType(types []oidc.ResponseType, responseType oidc.ResponseType) bool { func ContainsResponseType(types []oidc.ResponseType, responseType oidc.ResponseType) bool {