view mod_auth_external_insecure/examples/bash/prosody-auth-example.sh @ 5264:d3ebaef1ea7a

mod_http_oauth2: Correctly verify OAuth client credentials on revocation Makes no sense to validate against username and password here, or using a token to revoke another token, or itself? In fact, upon further discussion, why do you need credentials to revoke a token? If you are not supposed to have the token, revoking it seems the most responsible thing to do with it, so it should be allowed, while if you are supposed to have it, you should be allowed to revoke it.
author Kim Alvefur <zash@zash.se>
date Tue, 21 Mar 2023 21:57:18 +0100
parents f84ede3e9e3b
children
line wrap: on
line source

#!/bin/bash

IFS=":"
AUTH_OK=1
AUTH_FAILED=0
LOGFILE="/var/log/prosody/auth.log"
USELOG=false

while read ACTION USER HOST PASS ; do

    [ $USELOG == true ] && { echo "Date: $(date) Action: $ACTION User: $USER Host: $HOST Pass: $PASS" >> $LOGFILE; }

    case $ACTION in
	"auth")
	    if [ $USER == "someone" ] ; then
        	echo $AUTH_OK
            else
		echo $AUTH_FAILED
	    fi
	;;
	*)
	    echo $AUTH_FAILED
	;;
    esac

done