ExFTP.Auth.WebhookAuth (ExFTP v1.0.2)
View SourceWhen authenticator is ExFTP.Auth.WebhookAuth
, this authenticator will call out to an HTTP endpoint that accepts
two query parameters: username
and/or password_hash
.
โ๏ธ Configuration
Keys
- authenticator ==
ExFTP.Auth.WebhookAuth
- authenticator_config ::
ExFTP.Auth.WebhookAuthConfig.t/0
Example
%{
# ... ,
authenticator: ExFTP.Auth.WebhookAuth,
authenticator_config: %{
login_url: "https://httpbin.dev/status/200",
login_method: :post,
password_hash_type: :sha256,
authenticated_url: "https://httpbin.dev/status/200",
authenticated_method: :post,
authenticated_ttl_ms: 1000 * 60 * 60
}
}
๐ See Also
๐ Resources
- ๐ RFC 959 (section-4)
- ๐ RFC 3659
- ๐ฌ Contact the maintainer (he's happy to help!)
Summary
Functions
Determines whether this session is still considered authenticated
Requests a login using a webhook.
Always returns true
.
Functions
Determines whether this session is still considered authenticated
๐ท๏ธ Params
- authenticator_state ::
ExFTP.Authenticator.authenticator_state/0
๐งโ๐ณ Workflow
- Reads the authenticator_config.
- If the config has authenticated_url,
- Calls it with the username(e.g
http://httpbin.dev/get?username={username}
) - If the response is HTTP 200, success. Otherwise, no longer authenticated.
- Calls it with the username(e.g
- If the config does not have authenticated_url,
- investigate the authenticator_state for
authenticated: true
- investigate the authenticator_state for
โคต๏ธ Returns
โ On Success
`true` or `false`
๐ป Examples
iex> alias ExFTP.Auth.WebhookAuth
iex> Application.put_env(:ex_ftp, :authenticator, ExFTP.Auth.WebhookAuth)
iex> Application.put_env(:ex_ftp, :authenticator_config, %{
iex> login_url: "https://httpbin.dev/status/200",
iex> authenticated_url: "https://httpbin.dev/get",
iex> authenticated_method: :get,
iex> })
iex> WebhookAuth.authenticated?(%{username: "jsmith"})
true
๐ See Also
@spec login( password :: ExFTP.Authenticator.password(), authenticator_state :: ExFTP.Authenticator.authenticator_state() ) :: {:ok, ExFTP.Authenticator.authenticator_state()} | {:error, term()}
Requests a login using a webhook.
๐ท๏ธ Params
- password ::
ExFTP.Authenticator.password/0
- authenticator_state ::
ExFTP.Authenticator.authenticator_state/0
๐งโ๐ณ Workflow
- Reads the authenticator_config.
- Receives a password from the client (a
:username
key might exist in the authenticator_state) - Hashes the password
- Calls the login_url (e.g
http://httpbin.dev/get?username={username}&password_hash={password_hash}
) - If the response is HTTP 200, success. Otherwise, bad login.
โคต๏ธ Returns
โ On Success
{:ok, authenticator_state}
โ On Failure
{:error, bad_login}
๐ป Examples
iex> alias ExFTP.Auth.WebhookAuth
iex> Application.put_env(:ex_ftp, :authenticator, ExFTP.Auth.WebhookAuth)
iex> Application.put_env(:ex_ftp, :authenticator_config, %{
iex> login_url: "https://httpbin.dev/status/200",
iex> login_method: :post,
iex> password_hash_type: :sha256
iex> })
iex> {:ok, _} = WebhookAuth.login("password123", %{username: "jsmith"})
๐ See Also
@spec valid_user?(username :: ExFTP.Authenticator.username()) :: boolean()
Always returns true
.
No performance benefit
This method is normally used to short-circuit bad login requests. The performance gain in that short-circuit is negligible for webhooks, so it's not used.