Skip to content

Commit

Permalink
Revert "DEB packaging: add auth_jwt module package"
Browse files Browse the repository at this point in the history
Because not all supported distributives have libjwt-dev

This reverts commit 5e7a57f.
  • Loading branch information
Nick Altmann committed Mar 24, 2020
1 parent 24d0ef2 commit baa5cfc
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 31 deletions.
28 changes: 1 addition & 27 deletions packaging/debian/control
Expand Up @@ -15,7 +15,6 @@ Build-Depends: bison,
libmaxminddb-dev | libgeoip-dev (>= 1.4.4),
libhiredis-dev,
libjson-c-dev,
libjwt-dev,
libldap2-dev,
liblua5.1-0-dev,
libmemcached-dev,
Expand Down Expand Up @@ -48,8 +47,7 @@ Package: opensips
Architecture: any
Multi-Arch: foreign
Depends: adduser, python, ${misc:Depends}, ${shlibs:Depends}
Suggests: opensips-auth-jwt-module,
opensips-b2bua-module,
Suggests: opensips-b2bua-module,
opensips-berkeley-module,
opensips-carrierroute-module,
opensips-cgrates-module,
Expand Down Expand Up @@ -655,27 +653,3 @@ Description: STIR/SHAKEN support for OpenSIPS
.
This module adds support for implementing STIR/SHAKEN (RFC 8224, RFC 8588)
Authentication and Verification services in OpenSIPS.

Package: opensips-auth-jwt-module
Architecture: any
Multi-Arch: same
Depends: opensips (= ${binary:Version}),
${misc:Depends},
${shlibs:Depends}
Description: JSON Web Tokens authentication module for OpenSIPS
OpenSIPS is a very fast and flexible SIP (RFC3261)
server. Written entirely in C, OpenSIPS can handle thousands calls
per second even on low-budget hardware.
.
The module implements authentication over JSON Web Tokens. In
some cases ( ie. WebRTC ) the user authenticates on another
layer ( other than SIP ), so it makes no sense to
double-authenticate it on the SIP layer. Thus, the SIP client
will simply present the JWT auth token it received from the
server, and pass it on to OpenSIPS which will use that for
authentication purposes. It relies on two DB tables, one
containing JWT profiles ( a profile name and it's SIP username
associated to it ) and one containing JWT secrets. Each secret
has a corresponding profile, the KEY used for signing the JWT
and two timestamps describing a validation interval. Multiple
JWT secrets can point to the same JWT profile.
5 changes: 1 addition & 4 deletions packaging/debian/rules
Expand Up @@ -54,7 +54,7 @@ ALL_MODPKG_LIST := \
GEOIP REGEX IDENTITY B2BUA DBHTTP DIALPLAN MEMCACHED JSON \
REDIS RABBITMQ HTTP COMPRESSION EMERGENCY \
PROTO_TLS PROTO_WSS TLS_MGM REST_CLIENT LUA \
SQLITE CGRATES XML SIPREC PYTHON UUID STIR_SHAKEN AUTH_JWT
SQLITE CGRATES XML SIPREC PYTHON UUID STIR_SHAKEN
# add SCTP only on linux systems
ifeq ($(DEB_HOST_ARCH_OS),linux)
ALL_MODPKG_LIST += PROTO_SCTP
Expand Down Expand Up @@ -216,9 +216,6 @@ STIR_SHAKEN_MOD_PATH=$(addprefix modules/, $(STIR_SHAKEN_MODULES))
UUID_PKGNAME = opensips-uuid-module
UUID_MODULES = uuid
UUID_MOD_PATH=$(addprefix modules/, $(UUID_MODULES))
AUTH_JWT_PKGNAME = opensips-auth-jwt-module
AUTH_JWT_MODULES = auth_jwt
AUTH_JWT_MOD_PATH=$(addprefix modules/, $(AUTH_JWT_MODULES))


# Need this per-package variables available in environment so accessible
Expand Down

0 comments on commit baa5cfc

Please sign in to comment.