You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

mod_auth_token.lua 4.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. -- Token authentication
  2. -- Copyright (C) 2021-present 8x8, Inc.
  3. local formdecode = require "util.http".formdecode;
  4. local generate_uuid = require "util.uuid".generate;
  5. local new_sasl = require "util.sasl".new;
  6. local sasl = require "util.sasl";
  7. local token_util = module:require "token/util".new(module);
  8. local sessions = prosody.full_sessions;
  9. -- no token configuration
  10. if token_util == nil then
  11. return;
  12. end
  13. module:depends("jitsi_session");
  14. -- define auth provider
  15. local provider = {};
  16. local host = module.host;
  17. -- Extract 'token' param from URL when session is created
  18. function init_session(event)
  19. local session, request = event.session, event.request;
  20. local query = request.url.query;
  21. if query ~= nil then
  22. local params = formdecode(query);
  23. -- The following fields are filled in the session, by extracting them
  24. -- from the query and no validation is beeing done.
  25. -- After validating auth_token will be cleaned in case of error and few
  26. -- other fields will be extracted from the token and set in the session
  27. session.auth_token = query and params.token or nil;
  28. end
  29. end
  30. module:hook_global("bosh-session", init_session);
  31. module:hook_global("websocket-session", init_session);
  32. function provider.test_password(username, password)
  33. return nil, "Password based auth not supported";
  34. end
  35. function provider.get_password(username)
  36. return nil;
  37. end
  38. function provider.set_password(username, password)
  39. return nil, "Set password not supported";
  40. end
  41. function provider.user_exists(username)
  42. return nil;
  43. end
  44. function provider.create_user(username, password)
  45. return nil;
  46. end
  47. function provider.delete_user(username)
  48. return nil;
  49. end
  50. function provider.get_sasl_handler(session)
  51. local function get_username_from_token(self, message)
  52. -- retrieve custom public key from server and save it on the session
  53. local pre_event_result = prosody.events.fire_event("pre-jitsi-authentication-fetch-key", session);
  54. if pre_event_result ~= nil and pre_event_result.res == false then
  55. log("warn",
  56. "Error verifying token on pre authentication stage:%s, reason:%s", pre_event_result.error, pre_event_result.reason);
  57. session.auth_token = nil;
  58. return pre_event_result.res, pre_event_result.error, pre_event_result.reason;
  59. end
  60. local res, error, reason = token_util:process_and_verify_token(session);
  61. if res == false then
  62. log("warn",
  63. "Error verifying token err:%s, reason:%s", error, reason);
  64. session.auth_token = nil;
  65. return res, error, reason;
  66. end
  67. local shouldAllow = prosody.events.fire_event("jitsi-access-ban-check", session);
  68. if shouldAllow == false then
  69. log("warn", "user is banned")
  70. return false, "not-allowed", "user is banned";
  71. end
  72. local customUsername
  73. = prosody.events.fire_event("pre-jitsi-authentication", session);
  74. if (customUsername) then
  75. self.username = customUsername;
  76. elseif (session.previd ~= nil) then
  77. for _, session1 in pairs(sessions) do
  78. if (session1.resumption_token == session.previd) then
  79. self.username = session1.username;
  80. break;
  81. end
  82. end
  83. else
  84. self.username = message;
  85. end
  86. local post_event_result = prosody.events.fire_event("post-jitsi-authentication", session);
  87. if post_event_result ~= nil and post_event_result.res == false then
  88. log("warn",
  89. "Error verifying token on post authentication stage :%s, reason:%s", post_event_result.error, post_event_result.reason);
  90. session.auth_token = nil;
  91. return post_event_result.res, post_event_result.error, post_event_result.reason;
  92. end
  93. return res;
  94. end
  95. return new_sasl(host, { anonymous = get_username_from_token });
  96. end
  97. module:provides("auth", provider);
  98. local function anonymous(self, message)
  99. local username = generate_uuid();
  100. -- This calls the handler created in 'provider.get_sasl_handler(session)'
  101. local result, err, msg = self.profile.anonymous(self, username, self.realm);
  102. if result == true then
  103. if (self.username == nil) then
  104. self.username = username;
  105. end
  106. return "success";
  107. else
  108. return "failure", err, msg;
  109. end
  110. end
  111. sasl.registerMechanism("ANONYMOUS", {"anonymous"}, anonymous);