mirror of
https://github.com/bjc/prosody.git
synced 2025-04-05 06:07:37 +03:00
mod_s2s_auth_dane_in: Simplify result processing
Fewer loops
This commit is contained in:
parent
cb66977bd4
commit
2dba3989e7
1 changed files with 26 additions and 18 deletions
|
@ -24,6 +24,20 @@ local function ensure_secure(r)
|
||||||
return r;
|
return r;
|
||||||
end
|
end
|
||||||
|
|
||||||
|
local function flatten(a)
|
||||||
|
local seen = {};
|
||||||
|
local ret = {};
|
||||||
|
for _, rrset in ipairs(a) do
|
||||||
|
for _, rr in ipairs(rrset) do
|
||||||
|
if not seen[tostring(rr)] then
|
||||||
|
table.insert(ret, rr);
|
||||||
|
seen[tostring(rr)] = true;
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
return ret;
|
||||||
|
end
|
||||||
|
|
||||||
local lazy_tlsa_mt = {
|
local lazy_tlsa_mt = {
|
||||||
__index = function(t, i)
|
__index = function(t, i)
|
||||||
if i == 1 then
|
if i == 1 then
|
||||||
|
@ -73,23 +87,20 @@ module:hook("s2s-check-certificate", function(event)
|
||||||
if rr.srv.target == "." then return {}; end
|
if rr.srv.target == "." then return {}; end
|
||||||
table.insert(tlsas, resolver:lookup_promise(("_%d._tcp.%s"):format(rr.srv.port, rr.srv.target), "TLSA"):next(ensure_secure));
|
table.insert(tlsas, resolver:lookup_promise(("_%d._tcp.%s"):format(rr.srv.port, rr.srv.target), "TLSA"):next(ensure_secure));
|
||||||
end
|
end
|
||||||
return promise.all(tlsas);
|
return promise.all(tlsas):next(flatten);
|
||||||
end
|
end
|
||||||
|
|
||||||
local ret = async.wait_for(promise.all({
|
local ret = async.wait_for(promise.all({
|
||||||
resolver:lookup_promise("_xmpps-server._tcp." .. dns_domain, "SRV"):next(ensure_secure):next(fetch_tlsa);
|
resolver:lookup_promise("_xmpps-server._tcp." .. dns_domain, "SRV"):next(ensure_secure):next(fetch_tlsa);
|
||||||
resolver:lookup_promise("_xmpp-server._tcp." .. dns_domain, "SRV"):next(ensure_secure):next(fetch_tlsa);
|
resolver:lookup_promise("_xmpp-server._tcp." .. dns_domain, "SRV"):next(ensure_secure):next(fetch_tlsa);
|
||||||
}));
|
}):next(flatten));
|
||||||
|
|
||||||
if not ret then
|
if not ret then
|
||||||
return
|
return
|
||||||
end
|
end
|
||||||
|
|
||||||
local found_supported = false;
|
local found_supported = false;
|
||||||
for _, by_proto in ipairs(ret) do
|
for _, rr in ipairs(ret) do
|
||||||
for _, by_srv in ipairs(by_proto) do
|
|
||||||
for _, by_target in ipairs(by_srv) do
|
|
||||||
for _, rr in ipairs(by_target) do
|
|
||||||
if rr.tlsa.use == 3 and by_select_match[rr.tlsa.select] and rr.tlsa.match <= 2 then
|
if rr.tlsa.use == 3 and by_select_match[rr.tlsa.select] and rr.tlsa.match <= 2 then
|
||||||
found_supported = true;
|
found_supported = true;
|
||||||
if rr.tlsa.data == by_select_match[rr.tlsa.select][rr.tlsa.match] then
|
if rr.tlsa.data == by_select_match[rr.tlsa.select][rr.tlsa.match] then
|
||||||
|
@ -102,9 +113,6 @@ module:hook("s2s-check-certificate", function(event)
|
||||||
log("debug", "Unsupported DANE TLSA record: %s", rr);
|
log("debug", "Unsupported DANE TLSA record: %s", rr);
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
if found_supported then
|
if found_supported then
|
||||||
session.cert_chain_status = "invalid";
|
session.cert_chain_status = "invalid";
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue