mod_auth_internal_hashed: Refactor to prepare for disabling users

Moving this out will make space for a dynamic check whether a particular
user is disabled or not, which is one possible response to abuse of
account privileges.
This commit is contained in:
Kim Alvefur 2023-02-22 13:27:08 +01:00
parent 5a3f0becf8
commit 01fedfa5be

View file

@ -110,6 +110,11 @@ function provider.user_exists(username)
return true; return true;
end end
function provider.is_enabled(username) -- luacheck: ignore 212
-- TODO look up somewhere and allow disabling
return true;
end
function provider.users() function provider.users()
return accounts:users(); return accounts:users();
end end
@ -140,7 +145,7 @@ end
function provider.get_sasl_handler() function provider.get_sasl_handler()
local testpass_authentication_profile = { local testpass_authentication_profile = {
plain_test = function(_, username, password, realm) plain_test = function(_, username, password, realm)
return usermanager.test_password(username, realm, password), true; return usermanager.test_password(username, realm, password), provider.is_enabled(username);
end, end,
[scram_name] = function(_, username) [scram_name] = function(_, username)
local credentials = accounts:get(username); local credentials = accounts:get(username);
@ -157,7 +162,7 @@ function provider.get_sasl_handler()
local iteration_count, salt = credentials.iteration_count, credentials.salt; local iteration_count, salt = credentials.iteration_count, credentials.salt;
stored_key = stored_key and from_hex(stored_key); stored_key = stored_key and from_hex(stored_key);
server_key = server_key and from_hex(server_key); server_key = server_key and from_hex(server_key);
return stored_key, server_key, iteration_count, salt, true; return stored_key, server_key, iteration_count, salt, provider.is_enabled(username);
end end
}; };
return new_sasl(host, testpass_authentication_profile); return new_sasl(host, testpass_authentication_profile);