aboutsummaryrefslogtreecommitdiffstats
path: root/plugins/mod_auth_internal.lua
diff options
context:
space:
mode:
authorWaqas Hussain <waqas20@gmail.com>2010-06-07 02:33:40 +0500
committerWaqas Hussain <waqas20@gmail.com>2010-06-07 02:33:40 +0500
commite42b058b2b4157b2bed2120db82495860fc502d9 (patch)
tree60b795556333727febeec0794e9c44d764c9f6e9 /plugins/mod_auth_internal.lua
parent5e11733f0cbb7c26abb3a346fbf8eaec8ebf3e8f (diff)
downloadprosody-e42b058b2b4157b2bed2120db82495860fc502d9.tar.gz
prosody-e42b058b2b4157b2bed2120db82495860fc502d9.zip
mod_auth_internal, mod_auth_internal_hashed: Updated to provide get_sasl_handler.
Diffstat (limited to 'plugins/mod_auth_internal.lua')
-rw-r--r--plugins/mod_auth_internal.lua21
1 files changed, 19 insertions, 2 deletions
diff --git a/plugins/mod_auth_internal.lua b/plugins/mod_auth_internal.lua
index 78a75a1d..0fc6e487 100644
--- a/plugins/mod_auth_internal.lua
+++ b/plugins/mod_auth_internal.lua
@@ -16,6 +16,8 @@ local hashes = require "util.hashes";
local jid_bare = require "util.jid".bare;
local config = require "core.configmanager";
local usermanager = require "core.usermanager";
+local new_sasl = require "util.sasl".new;
+local nodeprep = require "util.encodings".stringprep.nodeprep;
local hosts = hosts;
local prosody = _G.prosody;
@@ -73,8 +75,23 @@ function new_default_provider(host)
return datamanager.store(username, host, "accounts", {password = password});
end
- function provider.get_supported_methods()
- return {["PLAIN"] = true, ["DIGEST-MD5"] = true}; -- TODO this should be taken from the config
+ function provider.get_sasl_handler()
+ local realm = module:get_option("sasl_realm") or origin.host;
+ local getpass_authentication_profile = {
+ plain = function(username, realm)
+ local prepped_username = nodeprep(username);
+ if not prepped_username then
+ log("debug", "NODEprep failed on username: %s", username);
+ return "", nil;
+ end
+ local password = usermanager.get_password(prepped_username, realm);
+ if not password then
+ return "", nil;
+ end
+ return password, true;
+ end
+ };
+ return new_sasl(realm, getpass_authentication_profile);
end
function provider.is_admin(jid)