1 |
|
-module(ejabberd_auth_dummy). |
2 |
|
|
3 |
|
%% API |
4 |
|
-export([start/1, |
5 |
|
stop/1, |
6 |
|
config_spec/0, |
7 |
|
check_password/4, |
8 |
|
check_password/6, |
9 |
|
authorize/1, |
10 |
|
remove_domain/2, |
11 |
|
supported_features/0]). |
12 |
|
|
13 |
|
%% ejabberd_auth compatibility layer - not supported features |
14 |
|
-behaviour(mongoose_gen_auth). |
15 |
|
|
16 |
|
-export([set_password/4, |
17 |
|
try_register/4, |
18 |
|
get_password/3, |
19 |
|
get_password_s/3, |
20 |
|
does_user_exist/3, |
21 |
|
remove_user/3, |
22 |
|
supports_sasl_module/2, |
23 |
|
scram_passwords/0]). |
24 |
|
|
25 |
|
-ignore_xref([scram_passwords/0]). |
26 |
|
|
27 |
|
-include("mongoose.hrl"). |
28 |
|
-include("mongoose_config_spec.hrl"). |
29 |
|
|
30 |
|
%%%---------------------------------------------------------------------- |
31 |
|
%%% API |
32 |
|
%%%---------------------------------------------------------------------- |
33 |
|
|
34 |
|
-spec start(HostType :: mongooseim:host_type()) -> ok. |
35 |
|
start(_HostType) -> |
36 |
2 |
ok. |
37 |
|
|
38 |
|
-spec stop(HostType :: mongooseim:host_type()) -> ok. |
39 |
|
stop(_HostType) -> |
40 |
:-( |
ok. |
41 |
|
|
42 |
|
-spec config_spec() -> mongoose_config_spec:config_section(). |
43 |
|
config_spec() -> |
44 |
8 |
#section{ |
45 |
|
items = #{<<"base_time">> => #option{type = integer, |
46 |
|
validate = non_negative}, |
47 |
|
<<"variance">> => #option{type = integer, |
48 |
|
validate = positive}}, |
49 |
|
defaults = #{<<"base_time">> => 50, |
50 |
|
<<"variance">> => 450} |
51 |
|
}. |
52 |
|
|
53 |
|
authorize(Creds) -> |
54 |
:-( |
HostType = mongoose_credentials:host_type(Creds), |
55 |
:-( |
#{base_time := Base, |
56 |
|
variance := Variance} = mongoose_config:get_opt([{auth, HostType}, dummy]), |
57 |
:-( |
timer:sleep(Base + rand:uniform(Variance)), |
58 |
:-( |
{ok, mongoose_credentials:set(Creds, auth_module, ?MODULE)}. |
59 |
|
|
60 |
|
check_password(_HostType, _User, _Server, _Password) -> |
61 |
:-( |
true. |
62 |
|
|
63 |
|
check_password(_HostType, User, Server, _Password, _Digest, _DigestGen) -> |
64 |
:-( |
?LOG_DEBUG(#{what => digest_auth_unsupported, |
65 |
|
text => <<"no support for digest authentication">>, |
66 |
:-( |
user => User, server => Server}), |
67 |
:-( |
false. |
68 |
|
|
69 |
|
-spec set_password(mongooseim:host_type(), jid:luser(), jid:lserver(), binary()) -> ok. |
70 |
|
set_password(_HostType, _User, _Server, _Password) -> |
71 |
:-( |
ok. |
72 |
|
|
73 |
|
-spec try_register(mongooseim:host_type(), jid:luser(), jid:lserver(), binary()) -> ok. |
74 |
|
try_register(_HostType, _User, _Server, _Password) -> |
75 |
:-( |
ok. |
76 |
|
|
77 |
|
-spec get_password(mongooseim:host_type(), jid:luser(), jid:lserver()) -> binary(). |
78 |
|
get_password(_HostType, _User, _Server) -> |
79 |
:-( |
<<>>. |
80 |
|
|
81 |
|
-spec get_password_s(mongooseim:host_type(), jid:luser(), jid:lserver()) -> binary(). |
82 |
|
get_password_s(_HostType, _User, _Server) -> |
83 |
:-( |
<<>>. |
84 |
|
|
85 |
|
-spec does_user_exist(mongooseim:host_type(), jid:luser(), jid:lserver()) -> boolean(). |
86 |
|
does_user_exist(_HostType, _User, _Server) -> |
87 |
:-( |
true. |
88 |
|
|
89 |
|
%% @doc Remove user. |
90 |
|
%% Note: it returns ok even if there was some problem removing the user. |
91 |
|
-spec remove_user(mongooseim:host_type(), jid:luser(), jid:lserver()) -> ok. |
92 |
|
remove_user(_HostType, _User, _Server) -> |
93 |
:-( |
ok. |
94 |
|
|
95 |
|
-spec remove_domain(mongooseim:host_type(), jid:lserver()) -> ok. |
96 |
:-( |
remove_domain(_HostType, _Server) -> ok. |
97 |
|
|
98 |
|
-spec supported_features() -> [atom()]. |
99 |
2 |
supported_features() -> [dynamic_domains]. |
100 |
|
|
101 |
|
-spec supports_sasl_module(mongooseim:host_type(), cyrsasl:sasl_module()) -> boolean(). |
102 |
:-( |
supports_sasl_module(_, cyrsasl_plain) -> true; |
103 |
:-( |
supports_sasl_module(_, _) -> false. |
104 |
|
|
105 |
|
scram_passwords() -> |
106 |
:-( |
not_supported. |