blob: 6de63e3070f3996d7745f06d5cd44fbeedd796eb [file] [log] [blame]
--[[
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
]]--
-- This is aaa.lua - AAA filter with portal validation.
-- It checks that an oauth validated account was logged in through a specific
-- OAuth provider, and if used, allows access to private lists.
-- To use this as your AAA lib, replace aaa.lua in site/api/lib with this file.
local config = require 'lib/config'
-- Allow anyone logged in through Google+ access to private emails
-- This is a direct string match, not a GLOB
local valid_portal = "www.googleapis.com"
-- Grant specific email addresses access to specific private areas.
-- This is either (sub)domain specific or list specific.
-- Lists must follow the List-ID format: listname.domain.tld
-- Thus internal.foocorp.com can point to either internal@foocorp.com or
-- *@internal.foocorp.com, use with care!
local access_list = {
['luca@foocorp.com'] = {
"internal.foocorp.com", -- grant access to *@internal.foocorp.com
"hr.foocorp.com" -- grant access to hr@foocorp.com
},
['donna@foocorp.com'] = {
'hr.foocorp.com', -- hr@foocorp.com
'legal.foocorp.com' -- *@legal.foorcop.com (or legal@foorcorp.com, depends :p)
},
['eric@foocorp.com'] = {
'*' -- grant access to everything!
}
}
-- Get rights (full or no access)
local function getRights(r, usr)
local email = usr.credentials.email or "|||"
local xemail = email:match("([-a-zA-Z0-9._@]+)") -- whitelist characters
local rights = {}
-- bad char in email?
if not email or xemail ~= email then
return rights
end
-- Check if the access list has this email on file, and if so,
-- return the access list for that specific email account
if access_list[email] then
rights = access_list[email]
end
return rights
end
-- module defs
return {
validateParams = true,
rights = getRights
}