@@ -15,44 +15,42 @@ const FORBIDDEN = [
15
15
'client_id_issued_at' ,
16
16
] ;
17
17
18
- const validateRegistrationAccessToken = [
19
- async function validateRegistrationAccessToken ( ctx , next ) {
20
- try {
21
- const regAccessToken = await ctx . oidc . provider . RegistrationAccessToken . find (
22
- ctx . oidc . getAccessToken ( ) ,
23
- ) ;
24
- ctx . assert ( regAccessToken , new InvalidToken ( 'registration access token not found' ) ) ;
25
-
26
- const client = await ctx . oidc . provider . Client . find ( ctx . params . clientId ) ;
27
-
28
- if ( client ?. clientId !== regAccessToken . clientId ) {
29
- await regAccessToken . destroy ( ) ;
30
- throw new InvalidToken ( 'client mismatch' ) ;
31
- }
18
+ async function validateRegistrationAccessToken ( ctx , next ) {
19
+ try {
20
+ const regAccessToken = await ctx . oidc . provider . RegistrationAccessToken . find (
21
+ ctx . oidc . getAccessToken ( ) ,
22
+ ) ;
23
+ ctx . assert ( regAccessToken , new InvalidToken ( 'registration access token not found' ) ) ;
24
+
25
+ const client = await ctx . oidc . provider . Client . find ( ctx . params . clientId ) ;
26
+
27
+ if ( client ?. clientId !== regAccessToken . clientId ) {
28
+ await regAccessToken . destroy ( ) ;
29
+ throw new InvalidToken ( 'client mismatch' ) ;
30
+ }
32
31
33
- ctx . oidc . entity ( 'Client' , client ) ;
34
- ctx . oidc . entity ( 'RegistrationAccessToken' , regAccessToken ) ;
35
- } catch ( err ) {
36
- if ( err . expose ) {
37
- if ( err . error_description === 'no access token provided' ) {
38
- appendWWWAuthenticate ( ctx , 'Bearer' , {
39
- realm : ctx . oidc . issuer ,
40
- scope : err . scope ,
41
- } ) ;
42
- } else {
43
- appendWWWAuthenticate ( ctx , 'Bearer' , {
44
- realm : ctx . oidc . issuer ,
45
- error : err . message ,
46
- error_description : err . error_description ,
47
- } ) ;
48
- }
32
+ ctx . oidc . entity ( 'Client' , client ) ;
33
+ ctx . oidc . entity ( 'RegistrationAccessToken' , regAccessToken ) ;
34
+ } catch ( err ) {
35
+ if ( err . expose ) {
36
+ if ( err . error_description === 'no access token provided' ) {
37
+ appendWWWAuthenticate ( ctx , 'Bearer' , {
38
+ realm : ctx . oidc . issuer ,
39
+ scope : err . scope ,
40
+ } ) ;
41
+ } else {
42
+ appendWWWAuthenticate ( ctx , 'Bearer' , {
43
+ realm : ctx . oidc . issuer ,
44
+ error : err . message ,
45
+ error_description : err . error_description ,
46
+ } ) ;
49
47
}
50
- throw err ;
51
48
}
49
+ throw err ;
50
+ }
52
51
53
- await next ( ) ;
54
- } ,
55
- ] ;
52
+ await next ( ) ;
53
+ }
56
54
57
55
export const post = [
58
56
noCache ,
@@ -171,7 +169,7 @@ export const post = [
171
169
172
170
export const get = [
173
171
noCache ,
174
- ... validateRegistrationAccessToken ,
172
+ validateRegistrationAccessToken ,
175
173
176
174
async function clientReadResponse ( ctx ) {
177
175
if ( ctx . oidc . client . noManage ) {
@@ -191,7 +189,7 @@ export const get = [
191
189
192
190
export const put = [
193
191
noCache ,
194
- ... validateRegistrationAccessToken ,
192
+ validateRegistrationAccessToken ,
195
193
parseBody ,
196
194
197
195
async function forbiddenFields ( ctx , next ) {
@@ -287,7 +285,7 @@ export const put = [
287
285
288
286
export const del = [
289
287
noCache ,
290
- ... validateRegistrationAccessToken ,
288
+ validateRegistrationAccessToken ,
291
289
292
290
async function clientRemoveResponse ( ctx ) {
293
291
if ( ctx . oidc . client . noManage ) {
0 commit comments