mirror of
https://github.com/processone/ejabberd.git
synced 2024-12-26 17:38:45 +01:00
Detect auth errors and report in log file. Support auth when domain not provided.
SVN Revision: 2330
This commit is contained in:
parent
534d6a49f9
commit
34a490361f
@ -45,7 +45,6 @@
|
|||||||
{"name", Name},
|
{"name", Name},
|
||||||
{"value", Value}])).
|
{"value", Value}])).
|
||||||
|
|
||||||
|
|
||||||
process(["doc", LocalFile], _Request) ->
|
process(["doc", LocalFile], _Request) ->
|
||||||
DocPath = case os:getenv("EJABBERD_DOC_PATH") of
|
DocPath = case os:getenv("EJABBERD_DOC_PATH") of
|
||||||
P when is_list(P) -> P;
|
P when is_list(P) -> P;
|
||||||
@ -70,68 +69,81 @@ process(["doc", LocalFile], _Request) ->
|
|||||||
end
|
end
|
||||||
end;
|
end;
|
||||||
|
|
||||||
process(["server", SHost | RPath], #request{auth = Auth} = Request) ->
|
process(["server", SHost | RPath], #request{auth = Auth, lang = Lang, host = HostHTTP} = Request) ->
|
||||||
Host = jlib:nameprep(SHost),
|
Host = jlib:nameprep(SHost),
|
||||||
case lists:member(Host, ?MYHOSTS) of
|
case lists:member(Host, ?MYHOSTS) of
|
||||||
true ->
|
true ->
|
||||||
case get_auth(Auth) of
|
case get_auth_admin(Auth, Host, HostHTTP) of
|
||||||
{User, Server} ->
|
{ok, {User, Server}} ->
|
||||||
case acl:match_rule(
|
process_admin(Host, Request#request{path = RPath,
|
||||||
Host, configure, jlib:make_jid(User, Server, "")) of
|
us = {User, Server}});
|
||||||
deny ->
|
{unauthorized, "no-auth-provided"} ->
|
||||||
ejabberd_web:error(not_allowed);
|
|
||||||
allow ->
|
|
||||||
process_admin(
|
|
||||||
Host, Request#request{path = RPath,
|
|
||||||
us = {User, Server}})
|
|
||||||
end;
|
|
||||||
unauthorized ->
|
|
||||||
{401,
|
{401,
|
||||||
[{"WWW-Authenticate", "basic realm=\"ejabberd\""}],
|
[{"WWW-Authenticate", "basic realm=\"ejabberd\""}],
|
||||||
ejabberd_web:make_xhtml([{xmlelement, "h1", [],
|
ejabberd_web:make_xhtml([?XCT("h1", "Unauthorized")])};
|
||||||
[{xmlcdata, "401 Unauthorized"}]}])}
|
{unauthorized, Error} ->
|
||||||
|
?WARNING_MSG("Access ~p failed with error: ~p~n~p",
|
||||||
|
[Auth, Error, Request]),
|
||||||
|
{401,
|
||||||
|
[{"WWW-Authenticate",
|
||||||
|
"basic realm=\"auth error, retry login to ejabberd\""}],
|
||||||
|
ejabberd_web:make_xhtml([?XCT("h1", "Unauthorized")])}
|
||||||
end;
|
end;
|
||||||
false ->
|
false ->
|
||||||
ejabberd_web:error(not_found)
|
ejabberd_web:error(not_found)
|
||||||
end;
|
end;
|
||||||
|
|
||||||
process(RPath, #request{auth = Auth} = Request) ->
|
process(RPath, #request{auth = Auth, lang = Lang, host = HostHTTP} = Request) ->
|
||||||
case get_auth(Auth) of
|
case get_auth_admin(Auth, global, HostHTTP) of
|
||||||
{User, Server} ->
|
{ok, {User, Server}} ->
|
||||||
case acl:match_rule(
|
process_admin(global, Request#request{path = RPath,
|
||||||
global, configure, jlib:make_jid(User, Server, "")) of
|
us = {User, Server}});
|
||||||
deny ->
|
{unauthorized, "no-auth-provided"} ->
|
||||||
ejabberd_web:error(not_allowed);
|
{401,
|
||||||
allow ->
|
|
||||||
process_admin(
|
|
||||||
global, Request#request{path = RPath,
|
|
||||||
us = {User, Server}})
|
|
||||||
end;
|
|
||||||
unauthorized ->
|
|
||||||
%% XXX bard: any reason to send this data now and not
|
|
||||||
%% always in case of an 401? ought to check http specs...
|
|
||||||
{401,
|
|
||||||
[{"WWW-Authenticate", "basic realm=\"ejabberd\""}],
|
[{"WWW-Authenticate", "basic realm=\"ejabberd\""}],
|
||||||
ejabberd_web:make_xhtml([{xmlelement, "h1", [],
|
ejabberd_web:make_xhtml([?XCT("h1", "Unauthorized")])};
|
||||||
[{xmlcdata, "401 Unauthorized"}]}])}
|
{unauthorized, Error} ->
|
||||||
|
?WARNING_MSG("Access ~p failed with error: ~p~n~p",
|
||||||
|
[Auth, Error, Request]),
|
||||||
|
{401,
|
||||||
|
[{"WWW-Authenticate",
|
||||||
|
"basic realm=\"auth error, retry login to ejabberd\""}],
|
||||||
|
ejabberd_web:make_xhtml([?XCT("h1", "Unauthorized")])}
|
||||||
end.
|
end.
|
||||||
|
|
||||||
get_auth(Auth) ->
|
get_auth_admin(Auth, Host, HostHTTP) ->
|
||||||
case Auth of
|
case Auth of
|
||||||
{SJID, P} ->
|
{SJID, Pass} ->
|
||||||
case jlib:string_to_jid(SJID) of
|
case jlib:string_to_jid(SJID) of
|
||||||
error ->
|
error ->
|
||||||
unauthorized;
|
{unauthorized, "badformed-jid"};
|
||||||
#jid{user = U, server = S} ->
|
#jid{user = "", server = User} ->
|
||||||
case ejabberd_auth:check_password(U, S, P) of
|
%% If the user only specified username, not username@server
|
||||||
true ->
|
get_auth_account(Host, User, HostHTTP, Pass);
|
||||||
{U, S};
|
#jid{user = User, server = Server} ->
|
||||||
false ->
|
get_auth_account(Host, User, Server, Pass)
|
||||||
unauthorized
|
|
||||||
end
|
|
||||||
end;
|
end;
|
||||||
_ ->
|
undefined ->
|
||||||
unauthorized
|
{unauthorized, "no-auth-provided"}
|
||||||
|
end.
|
||||||
|
|
||||||
|
get_auth_account(Host, User, Server, Pass) ->
|
||||||
|
case ejabberd_auth:check_password(User, Server, Pass) of
|
||||||
|
true ->
|
||||||
|
case acl:match_rule(Host, configure,
|
||||||
|
jlib:make_jid(User, Server, "")) of
|
||||||
|
deny ->
|
||||||
|
{unauthorized, "unprivileged-account"};
|
||||||
|
allow ->
|
||||||
|
{ok, {User, Server}}
|
||||||
|
end;
|
||||||
|
false ->
|
||||||
|
case ejabberd_auth:is_user_exists(User, Server) of
|
||||||
|
true ->
|
||||||
|
{unauthorized, "bad-password"};
|
||||||
|
false ->
|
||||||
|
{unauthorized, "inexistent-account"}
|
||||||
|
end
|
||||||
end.
|
end.
|
||||||
|
|
||||||
make_xhtml(Els, Host, Lang) ->
|
make_xhtml(Els, Host, Lang) ->
|
||||||
|
Loading…
Reference in New Issue
Block a user