aaa_examples/aaa_with_subgroups.lua (31 lines of code) (raw):

--[[ Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ]]-- -- This is aaa.lua - AAA filter with portal validation. -- It checks that an oauth validated account was logged in through a specific -- OAuth provider, and if used, allows access to private lists. -- To use this as your AAA lib, replace aaa.lua in site/api/lib with this file. local config = require 'lib/config' -- Allow anyone logged in through Google+ access to private emails -- This is a direct string match, not a GLOB local valid_portal = "www.googleapis.com" -- Grant specific email addresses access to specific private areas. -- This is either (sub)domain specific or list specific. -- Lists must follow the List-ID format: listname.domain.tld -- Thus internal.foocorp.com can point to either internal@foocorp.com or -- *@internal.foocorp.com, use with care! local access_list = { ['luca@foocorp.com'] = { "internal.foocorp.com", -- grant access to *@internal.foocorp.com "hr.foocorp.com" -- grant access to hr@foocorp.com }, ['donna@foocorp.com'] = { 'hr.foocorp.com', -- hr@foocorp.com 'legal.foocorp.com' -- *@legal.foorcop.com (or legal@foorcorp.com, depends :p) }, ['eric@foocorp.com'] = { '*' -- grant access to everything! } } -- Get rights (full or no access) local function getRights(r, usr) local email = usr.credentials.email or "|||" local xemail = email:match("([-a-zA-Z0-9._@]+)") -- whitelist characters local rights = {} -- bad char in email? if not email or xemail ~= email then return rights end -- Check if the access list has this email on file, and if so, -- return the access list for that specific email account if access_list[email] then rights = access_list[email] end return rights end -- module defs return { validateParams = true, rights = getRights }