comparison mod_auth_ccert/mod_auth_ccert.lua @ 1065:3d04d9377a67

mod_auth_ccert: Prepare for supporting more ways to figure out the username
author Kim Alvefur <zash@zash.se>
date Fri, 14 Jun 2013 20:10:33 +0200
parents b2a4679e7d20
children 83175a6af8c5
comparison
equal deleted inserted replaced
1064:5db8debb4531 1065:3d04d9377a67
7 local new_sasl = require "util.sasl".new; 7 local new_sasl = require "util.sasl".new;
8 local log = module._log; 8 local log = module._log;
9 local subject_alternative_name = "2.5.29.17"; 9 local subject_alternative_name = "2.5.29.17";
10 local id_on_xmppAddr = "1.3.6.1.5.5.7.8.5"; 10 local id_on_xmppAddr = "1.3.6.1.5.5.7.8.5";
11 local now = os.time; 11 local now = os.time;
12
13 local cert_match = module:get_option("certificate_match", "xmppaddr");
14
15 local username_extractor = {}
16
17 function username_extractor.xmppaddr(cert)
18 local extensions = cert:extensions();
19 local SANs = extensions[subject_alternative_name];
20 local xmppAddrs = SANs and SANs[id_on_xmppAddr];
21
22 if not xmppAddrs then
23 (session.log or log)("warn", "Client certificate contains no xmppAddrs");
24 return nil, false;
25 end
26
27 for i=1,#xmppAddrs do
28 if authz == "" or jid_compare(authz, xmppAddrs[i]) then
29 (session.log or log)("debug", "xmppAddrs[%d] %q matches authz %q", i, xmppAddrs[i], authz)
30 local username, host = jid_split(xmppAddrs[i]);
31 if host == module.host then
32 return username, true
33 end
34 end
35 end
36 end
37
38 local find_username = username_extractor[cert_match];
39 if not find_username then
40 module:log("error", "certificate_match = %q is not supported");
41 return
42 end
43
12 44
13 function get_sasl_handler(session) 45 function get_sasl_handler(session)
14 return new_sasl(module.host, { 46 return new_sasl(module.host, {
15 external = session.secure and function(authz) 47 external = session.secure and function(authz)
16 if not session.secure then 48 if not session.secure then
37 (session.log or log)("warn", "%d: %s", i, table.concat(chain_errors, ", ")); 69 (session.log or log)("warn", "%d: %s", i, table.concat(chain_errors, ", "));
38 end 70 end
39 return nil, false; 71 return nil, false;
40 end 72 end
41 73
42 local extensions = cert:extensions(); 74 return find_username(cert);
43 local SANs = extensions[subject_alternative_name];
44 local xmppAddrs = SANs and SANs[id_on_xmppAddr];
45
46 if not xmppAddrs then
47 (session.log or log)("warn", "Client certificate contains no xmppAddrs");
48 return nil, false;
49 end
50
51 for i=1,#xmppAddrs do
52 if authz == "" or jid_compare(authz, xmppAddrs[i]) then
53 (session.log or log)("debug", "xmppAddrs[%d] %q matches authz %q", i, xmppAddrs[i], authz)
54 local username, host = jid_split(xmppAddrs[i]);
55 if host == module.host then
56 return username, true
57 end
58 end
59 end
60 end 75 end
61 }); 76 });
62 end 77 end
63 78
64 module:provides "auth"; 79 module:provides "auth";