emqx_auth_pgsql.schema 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. %%-*- mode: erlang -*-
  2. %% emqx_auth_pgsl config mapping
  3. {mapping, "auth.pgsql.server", "emqx_auth_pgsql.server", [
  4. {default, {"127.0.0.1", 5432}},
  5. {datatype, [integer, ip, string]}
  6. ]}.
  7. {mapping, "auth.pgsql.pool", "emqx_auth_pgsql.server", [
  8. {default, 8},
  9. {datatype, integer}
  10. ]}.
  11. {mapping, "auth.pgsql.database", "emqx_auth_pgsql.server", [
  12. {datatype, string}
  13. ]}.
  14. {mapping, "auth.pgsql.username", "emqx_auth_pgsql.server", [
  15. {default, ""},
  16. {datatype, string}
  17. ]}.
  18. {mapping, "auth.pgsql.password", "emqx_auth_pgsql.server", [
  19. {default, ""},
  20. {datatype, string}
  21. ]}.
  22. {mapping, "auth.pgsql.encoding", "emqx_auth_pgsql.server", [
  23. {default, utf8},
  24. {datatype, atom}
  25. ]}.
  26. {mapping, "auth.pgsql.ssl", "emqx_auth_pgsql.server", [
  27. {default, off},
  28. {datatype, {enum, [on, off, true, false]}} %% FIXME: true/fasle is compatible with 4.0-4.2 version format, plan to delete in 5.0
  29. ]}.
  30. {mapping, "auth.pgsql.ssl.tls_versions", "emqx_auth_pgsql.server", [
  31. {default, "tlsv1.3,tlsv1.2,tlsv1.1"},
  32. {datatype, string}
  33. ]}.
  34. {mapping, "auth.pgsql.ssl.keyfile", "emqx_auth_pgsql.server", [
  35. {datatype, string}
  36. ]}.
  37. {mapping, "auth.pgsql.ssl.certfile", "emqx_auth_pgsql.server", [
  38. {datatype, string}
  39. ]}.
  40. {mapping, "auth.pgsql.ssl.cacertfile", "emqx_auth_pgsql.server", [
  41. {datatype, string}
  42. ]}.
  43. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  44. {mapping, "auth.pgsql.ssl_opts.keyfile", "emqx_auth_pgsql.server", [
  45. {datatype, string}
  46. ]}.
  47. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  48. {mapping, "auth.pgsql.ssl_opts.certfile", "emqx_auth_pgsql.server", [
  49. {datatype, string}
  50. ]}.
  51. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  52. {mapping, "auth.pgsql.ssl_opts.cacertfile", "emqx_auth_pgsql.server", [
  53. {datatype, string}
  54. ]}.
  55. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  56. {mapping, "auth.pgsql.ssl_opts.tls_versions", "emqx_auth_pgsql.server", [
  57. {default, "tlsv1.2"},
  58. {datatype, string}
  59. ]}.
  60. {translation, "emqx_auth_pgsql.server", fun(Conf) ->
  61. {PgHost, PgPort} =
  62. case cuttlefish:conf_get("auth.pgsql.server", Conf) of
  63. {Ip, Port} -> {Ip, Port};
  64. S -> case string:tokens(S, ":") of
  65. [Domain] -> {Domain, 5432};
  66. [Domain, Port] -> {Domain, list_to_integer(Port)}
  67. end
  68. end,
  69. Pool = cuttlefish:conf_get("auth.pgsql.pool", Conf),
  70. Username = cuttlefish:conf_get("auth.pgsql.username", Conf),
  71. Passwd = cuttlefish:conf_get("auth.pgsql.password", Conf, ""),
  72. DB = cuttlefish:conf_get("auth.pgsql.database", Conf),
  73. Encoding = cuttlefish:conf_get("auth.pgsql.encoding", Conf),
  74. Filter = fun(Opts) -> [{K, V} || {K, V} <- Opts, V =/= undefined] end,
  75. SslOpts = fun(Prefix) ->
  76. Filter([{keyfile, cuttlefish:conf_get(Prefix ++ ".keyfile", Conf, undefined)},
  77. {certfile, cuttlefish:conf_get(Prefix ++ ".certfile", Conf, undefined)},
  78. {cacertfile, cuttlefish:conf_get(Prefix ++ ".cacertfile", Conf, undefined)},
  79. {versions, [list_to_existing_atom(Value)
  80. || Value <- string:tokens(cuttlefish:conf_get(Prefix ++ ".tls_versions", Conf), " ,")]}])
  81. end,
  82. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  83. Ssl = case cuttlefish:conf_get("auth.pgsql.ssl", Conf) of
  84. on -> [{ssl, true}, {ssl_opts, SslOpts("auth.pgsql.ssl")}];
  85. off -> [];
  86. true -> [{ssl, true}, {ssl_opts, SslOpts("auth.pgsql.ssl_opts")}];
  87. false -> []
  88. end,
  89. TempHost = case inet:parse_address(PgHost) of
  90. {ok, IpAddr} ->
  91. IpAddr;
  92. _ ->
  93. PgHost
  94. end,
  95. [{pool_size, Pool},
  96. {auto_reconnect, 1},
  97. {host, TempHost},
  98. {port, PgPort},
  99. {username, Username},
  100. {password, Passwd},
  101. {database, DB},
  102. {encoding, Encoding}] ++ Ssl
  103. end}.
  104. {mapping, "auth.pgsql.auth_query", "emqx_auth_pgsql.auth_query", [
  105. {datatype, string}
  106. ]}.
  107. {mapping, "auth.pgsql.password_hash", "emqx_auth_pgsql.password_hash", [
  108. {datatype, string}
  109. ]}.
  110. {mapping, "auth.pgsql.pbkdf2_macfun", "emqx_auth_pgsql.pbkdf2_macfun", [
  111. {datatype, atom}
  112. ]}.
  113. {mapping, "auth.pgsql.pbkdf2_iterations", "emqx_auth_pgsql.pbkdf2_iterations", [
  114. {datatype, integer}
  115. ]}.
  116. {mapping, "auth.pgsql.pbkdf2_dklen", "emqx_auth_pgsql.pbkdf2_dklen", [
  117. {datatype, integer}
  118. ]}.
  119. {mapping, "auth.pgsql.super_query", "emqx_auth_pgsql.super_query", [
  120. {datatype, string}
  121. ]}.
  122. {mapping, "auth.pgsql.acl_query", "emqx_auth_pgsql.acl_query", [
  123. {datatype, string}
  124. ]}.
  125. {translation, "emqx_auth_pgsql.password_hash", fun(Conf) ->
  126. HashValue = cuttlefish:conf_get("auth.pgsql.password_hash", Conf),
  127. case string:tokens(HashValue, ",") of
  128. [Hash] -> list_to_atom(Hash);
  129. [Prefix, Suffix] -> {list_to_atom(Prefix), list_to_atom(Suffix)};
  130. [Hash, MacFun, Iterations, Dklen] -> {list_to_atom(Hash), list_to_atom(MacFun), list_to_integer(Iterations), list_to_integer(Dklen)};
  131. _ -> plain
  132. end
  133. end}.