gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-docs] branch master updated: document need for RFC 8959 prefix (#


From: gnunet
Subject: [taler-docs] branch master updated: document need for RFC 8959 prefix (#9112)
Date: Sat, 24 Aug 2024 16:11:13 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository docs.

The following commit(s) were added to refs/heads/master by this push:
     new dfd8ea54 document need for RFC 8959 prefix (#9112)
dfd8ea54 is described below

commit dfd8ea545acbe1d2b0b0b7afa0cabab12d065efa
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Sat Aug 24 16:11:10 2024 +0200

    document need for RFC 8959 prefix (#9112)
---
 manpages/challenger-admin.1.rst |  4 ++--
 taler-challenger-manual.rst     | 23 +++++++++++------------
 2 files changed, 13 insertions(+), 14 deletions(-)

diff --git a/manpages/challenger-admin.1.rst b/manpages/challenger-admin.1.rst
index 8d7d823d..2441b7a4 100644
--- a/manpages/challenger-admin.1.rst
+++ b/manpages/challenger-admin.1.rst
@@ -32,8 +32,8 @@ Description
 
 Its options are as follows:
 
-**-a** *SECRET* \| **--add=**\ ‌\ *SECRET*
-   Add the client with the given *CLIENT_REDIRECT_URL setting the client 
secret to *SECRET*.  Prints the *CLIENT_ID* of the added client.
+**-a** *CLIENT_SECRET* \| **--add=**\ ‌\ *CLIENT_SECRET*
+   Add the client with the given *CLIENT_REDIRECT_URL setting the client 
secret to *CLIENT_SECRET*.  Prints the *CLIENT_ID* of the added client. The 
*CLIENT_SECRET* must begin with "secret-token:" as per RFC 8959.
 
 **-c** *FILENAME* \| **--config=**\ ‌\ *FILENAME*
    Use the configuration and other resources for the Challenger commands
diff --git a/taler-challenger-manual.rst b/taler-challenger-manual.rst
index 4198a9c9..75215f25 100644
--- a/taler-challenger-manual.rst
+++ b/taler-challenger-manual.rst
@@ -421,7 +421,7 @@ Authorizing clients
 
 Before clients can use Challenger, they must be explicitly configured. Each
 client is identified via its OAuth 2.0 REDIRECT URI.  Thus, a client must have
-exactly one REDIRECT URI
+exactly one REDIRECT URI. Challenger also does not allow multiple clients 
sharing the same REDIRECT URI.
 
 .. note::
 
@@ -438,16 +438,16 @@ restarting the service.  To add (or remove) a client, you 
must use the
 
 .. code-block:: shell-session
 
-  # sudo -u challenger-httpd challenger-admin --add=$SECRET $REDIRECT_URI
+  # sudo -u challenger-httpd challenger-admin --add=$CLIENT_SECRET 
$CLIENT_REDIRECT_URI
 
-Here, ``$SECRET`` is the client secret of OAuth 2.0 which will be used in
-various parts of the protocol to authenticate the client.  The
-``$REDIRECT_URI`` is the URI where the user-agent will be redirected to upon
+Here, ``$CLIENT_SECRET`` is the client secret of OAuth 2.0 which will be used 
in
+various parts of the protocol to authenticate the client. It must begin with 
the "secret-token:" prefix of RFC 8959.  The
+``$CLIENT_REDIRECT_URI`` is the REDIRECT URI where the user-agent will be 
redirected to upon
 completion of the process.  The ``challenger-admin`` command will
-then output the *client ID*, which will be a unique positive number.
+then output the *CLIENT_ID*, which will be a unique positive number.
 The first time you run the command, you will thus likely see:
-``Client added. Client ID is: 1``.  This client ID, the ``$SECRET``
-and the ``$REDIRECT_URI`` will form the foundation for the OAuth 2.0
+``Client added. Client ID is: 1``.  This CLIENT_ID, the ``$CLIENT_SECRET``
+and the ``$CLIENT_REDIRECT_URI`` will form the foundation for the OAuth 2.0
 configuration.
 
 
@@ -469,8 +469,8 @@ by the client using the ``/setup/$CLIENT_ID`` endpoint!
   validation could be expensive.
 
 Thus, to generate the authorization URL, a client must first POST to
-``/setup/$CLIENT_ID`` using their client secret in an ``Authorization: Bearer 
$SECRET``
-HTTP header to obtain a fresh ``$NONCE``.
+``/setup/$CLIENT_ID`` using their client secret in an ``Authorization: Bearer
+$CLIENT_SECRET`` HTTP header to obtain a fresh ``$NONCE``.
 
 In the GNU Taler exchange configuration, this is indicated by appending
 ``#setup`` to the ``KYC_OAUTH2_AUTHORIZE_URL`` endpoint.  Be careful to quote
@@ -487,6 +487,7 @@ the configuration file syntax:
   KYC_OAUTH2_TOKEN_URL = "https://challenger.example.com/token";
   KYC_OAUTH2_INFO_URL = "https://challenger.example.com/info";
   KYC_OAUTH2_CLIENT_ID = 1
+  # Make sure to include the RFC 8959 prefix in "$SECRET"
   KYC_OAUTH2_CLIENT_SECRET = "$SECRET"
 
 
@@ -525,5 +526,3 @@ The Challenger database can be re-initialized using:
 
 However, running this command will result in all data in the database
 being lost.
-
-

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]