emqx_auth_pgsql.schema 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. %%-*- mode: erlang -*-
  2. %% emqx_auth_pgsl config mapping
  3. {mapping, "auth.pgsql.server", "emqx_auth_pgsql.server", [
  4. {default, {"127.0.0.1", 5432}},
  5. {datatype, [integer, ip, string]}
  6. ]}.
  7. {mapping, "auth.pgsql.pool", "emqx_auth_pgsql.server", [
  8. {default, 8},
  9. {datatype, integer}
  10. ]}.
  11. {mapping, "auth.pgsql.database", "emqx_auth_pgsql.server", [
  12. {datatype, string}
  13. ]}.
  14. {mapping, "auth.pgsql.username", "emqx_auth_pgsql.server", [
  15. {default, ""},
  16. {datatype, string}
  17. ]}.
  18. {mapping, "auth.pgsql.password", "emqx_auth_pgsql.server", [
  19. {default, ""},
  20. {datatype, string}
  21. ]}.
  22. {mapping, "auth.pgsql.encoding", "emqx_auth_pgsql.server", [
  23. {default, utf8},
  24. {datatype, atom}
  25. ]}.
  26. {mapping, "auth.pgsql.ssl", "emqx_auth_pgsql.server", [
  27. {default, off},
  28. {datatype, {enum, [on, off, true, false]}} %% FIXME: true/fasle is compatible with 4.0-4.2 version format, plan to delete in 5.0
  29. ]}.
  30. {mapping, "auth.pgsql.ssl.tls_versions", "emqx_auth_pgsql.server", [
  31. {default, "tlsv1.2"},
  32. {datatype, string}
  33. ]}.
  34. {mapping, "auth.pgsql.ssl.keyfile", "emqx_auth_pgsql.server", [
  35. {datatype, string}
  36. ]}.
  37. {mapping, "auth.pgsql.ssl.certfile", "emqx_auth_pgsql.server", [
  38. {datatype, string}
  39. ]}.
  40. {mapping, "auth.pgsql.ssl.cacertfile", "emqx_auth_pgsql.server", [
  41. {datatype, string}
  42. ]}.
  43. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  44. {mapping, "auth.pgsql.ssl_opts.keyfile", "emqx_auth_pgsql.server", [
  45. {datatype, string}
  46. ]}.
  47. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  48. {mapping, "auth.pgsql.ssl_opts.certfile", "emqx_auth_pgsql.server", [
  49. {datatype, string}
  50. ]}.
  51. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  52. {mapping, "auth.pgsql.ssl_opts.cacertfile", "emqx_auth_pgsql.server", [
  53. {datatype, string}
  54. ]}.
  55. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  56. {mapping, "auth.pgsql.ssl_opts.tls_versions", "emqx_auth_pgsql.server", [
  57. {default, "tlsv1.2"},
  58. {datatype, string}
  59. ]}.
  60. {translation, "emqx_auth_pgsql.server", fun(Conf) ->
  61. {PgHost, PgPort} =
  62. case cuttlefish:conf_get("auth.pgsql.server", Conf) of
  63. {Ip, Port} -> {Ip, Port};
  64. S -> case string:tokens(S, ":") of
  65. [Domain] -> {Domain, 5432};
  66. [Domain, Port] -> {Domain, list_to_integer(Port)}
  67. end
  68. end,
  69. Pool = cuttlefish:conf_get("auth.pgsql.pool", Conf),
  70. Username = cuttlefish:conf_get("auth.pgsql.username", Conf),
  71. Passwd = cuttlefish:conf_get("auth.pgsql.password", Conf, ""),
  72. DB = cuttlefish:conf_get("auth.pgsql.database", Conf),
  73. Encoding = cuttlefish:conf_get("auth.pgsql.encoding", Conf),
  74. Filter = fun(Opts) -> [{K, V} || {K, V} <- Opts, V =/= undefined] end,
  75. SslOpts = fun(Prefix) ->
  76. Filter([{keyfile, cuttlefish:conf_get(Prefix ++ ".keyfile", Conf, undefined)},
  77. {certfile, cuttlefish:conf_get(Prefix ++ ".certfile", Conf, undefined)},
  78. {cacertfile, cuttlefish:conf_get(Prefix ++ ".cacertfile", Conf, undefined),
  79. {versions, [list_to_existing_atom(Value)
  80. ||Value <- string:tokens(cuttlefish:conf_get(Prefix ++ ".tls_versions", Conf), " ,")]}}])
  81. end,
  82. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  83. GenSsl = case cuttlefish:conf_get("auth.pgsql.ssl.cacertfile", Conf, undefined) of
  84. undefined -> [{ssl, true}, {ssl_opts, SslOpts("auth.pgsql.ssl_opts")}];
  85. _ -> [{ssl, true}, {ssl_opts, SslOpts("auth.pgsql.ssl")}]
  86. end,
  87. %% FIXME: compatible with 4.0-4.2 version format, plan to delete in 5.0
  88. Ssl = case cuttlefish:conf_get("auth.pgsql.ssl", Conf) of
  89. on -> GenSsl;
  90. off -> [];
  91. true -> GenSsl;
  92. false -> []
  93. end,
  94. TempHost = case inet:parse_address(PgHost) of
  95. {ok, IpAddr} ->
  96. IpAddr;
  97. _ ->
  98. PgHost
  99. end,
  100. [{pool_size, Pool},
  101. {auto_reconnect, 1},
  102. {host, TempHost},
  103. {port, PgPort},
  104. {username, Username},
  105. {password, Passwd},
  106. {database, DB},
  107. {encoding, Encoding}] ++ Ssl
  108. end}.
  109. {mapping, "auth.pgsql.auth_query", "emqx_auth_pgsql.auth_query", [
  110. {datatype, string}
  111. ]}.
  112. {mapping, "auth.pgsql.password_hash", "emqx_auth_pgsql.password_hash", [
  113. {datatype, string}
  114. ]}.
  115. {mapping, "auth.pgsql.pbkdf2_macfun", "emqx_auth_pgsql.pbkdf2_macfun", [
  116. {datatype, atom}
  117. ]}.
  118. {mapping, "auth.pgsql.pbkdf2_iterations", "emqx_auth_pgsql.pbkdf2_iterations", [
  119. {datatype, integer}
  120. ]}.
  121. {mapping, "auth.pgsql.pbkdf2_dklen", "emqx_auth_pgsql.pbkdf2_dklen", [
  122. {datatype, integer}
  123. ]}.
  124. {mapping, "auth.pgsql.super_query", "emqx_auth_pgsql.super_query", [
  125. {datatype, string}
  126. ]}.
  127. {mapping, "auth.pgsql.acl_query", "emqx_auth_pgsql.acl_query", [
  128. {datatype, string}
  129. ]}.
  130. {translation, "emqx_auth_pgsql.password_hash", fun(Conf) ->
  131. HashValue = cuttlefish:conf_get("auth.pgsql.password_hash", Conf),
  132. case string:tokens(HashValue, ",") of
  133. [Hash] -> list_to_atom(Hash);
  134. [Prefix, Suffix] -> {list_to_atom(Prefix), list_to_atom(Suffix)};
  135. [Hash, MacFun, Iterations, Dklen] -> {list_to_atom(Hash), list_to_atom(MacFun), list_to_integer(Iterations), list_to_integer(Dklen)};
  136. _ -> plain
  137. end
  138. end}.