mirror of
https://github.com/bjc/prosody.git
synced 2025-04-03 21:27:38 +03:00
Merge 0.10->trunk
This commit is contained in:
commit
38f73e28ae
13 changed files with 103 additions and 28 deletions
|
@ -76,8 +76,12 @@ local function get_password(username, host)
|
|||
return hosts[host].users.get_password(username);
|
||||
end
|
||||
|
||||
local function set_password(username, password, host)
|
||||
return hosts[host].users.set_password(username, password);
|
||||
local function set_password(username, password, host, resource)
|
||||
local ok, err = hosts[host].users.set_password(username, password);
|
||||
if ok then
|
||||
prosody.events.fire_event("user-password-changed", { username = username, host = host, resource = resource });
|
||||
end
|
||||
return ok, err;
|
||||
end
|
||||
|
||||
local function user_exists(username, host)
|
||||
|
|
30
net/http.lua
30
net/http.lua
|
@ -11,6 +11,7 @@ local url = require "socket.url"
|
|||
local httpstream_new = require "net.http.parser".new;
|
||||
local util_http = require "util.http";
|
||||
local events = require "util.events";
|
||||
local verify_identity = require"util.x509".verify_identity;
|
||||
|
||||
local ssl_available = pcall(require, "ssl");
|
||||
|
||||
|
@ -34,6 +35,26 @@ local listener = { default_port = 80, default_mode = "*a" };
|
|||
|
||||
function listener.onconnect(conn)
|
||||
local req = requests[conn];
|
||||
|
||||
-- Validate certificate
|
||||
if not req.insecure and conn:ssl() then
|
||||
local sock = conn:socket();
|
||||
local chain_valid = sock.getpeerverification and sock:getpeerverification();
|
||||
if not chain_valid then
|
||||
req.callback("certificate-chain-invalid", 0, req);
|
||||
req.callback = nil;
|
||||
conn:close();
|
||||
return;
|
||||
end
|
||||
local cert = sock.getpeercertificate and sock:getpeercertificate();
|
||||
if not cert or not verify_identity(req.host, false, cert) then
|
||||
req.callback("certificate-verify-failed", 0, req);
|
||||
req.callback = nil;
|
||||
conn:close();
|
||||
return;
|
||||
end
|
||||
end
|
||||
|
||||
-- Send the request
|
||||
local request_line = { req.method or "GET", " ", req.path, " HTTP/1.1\r\n" };
|
||||
if req.query then
|
||||
|
@ -181,6 +202,7 @@ local function request(self, u, ex, callback)
|
|||
headers[k] = v;
|
||||
end
|
||||
end
|
||||
req.insecure = ex.insecure;
|
||||
end
|
||||
|
||||
log("debug", "Making %s %s request '%s' to %s", req.scheme:upper(), method or "GET", req.id, (ex and ex.suppress_url and host_header) or u);
|
||||
|
@ -196,7 +218,7 @@ local function request(self, u, ex, callback)
|
|||
|
||||
local sslctx = false;
|
||||
if using_https then
|
||||
sslctx = ex and ex.sslctx or { mode = "client", protocol = "sslv23", options = { "no_sslv2", "no_sslv3" } };
|
||||
sslctx = ex and ex.sslctx or self.options and self.options.sslctx;
|
||||
end
|
||||
|
||||
local handler, conn = server.addclient(host, port_number, listener, "*a", sslctx)
|
||||
|
@ -235,17 +257,19 @@ local function new(options)
|
|||
return new(setmetatable(new_options, { __index = options }));
|
||||
end or new;
|
||||
events = events.new();
|
||||
request = request;
|
||||
};
|
||||
return http;
|
||||
end
|
||||
|
||||
local default_http = new();
|
||||
local default_http = new({
|
||||
sslctx = { mode = "client", protocol = "sslv23", options = { "no_sslv2", "no_sslv3" } };
|
||||
});
|
||||
|
||||
return {
|
||||
request = function (u, ex, callback)
|
||||
return default_http:request(u, ex, callback);
|
||||
end;
|
||||
default = default_http;
|
||||
new = new;
|
||||
events = default_http.events;
|
||||
-- COMPAT
|
||||
|
|
|
@ -38,7 +38,7 @@ function websocket_listeners.ondetach(handler)
|
|||
end
|
||||
|
||||
local function fail(s, code, reason)
|
||||
module:log("warn", "WebSocket connection failed, closing. %d %s", code, reason);
|
||||
log("warn", "WebSocket connection failed, closing. %d %s", code, reason);
|
||||
s:close(code, reason);
|
||||
s.handler:close();
|
||||
return false
|
||||
|
|
|
@ -97,7 +97,7 @@ local change_user_password_command_handler = adhoc_simple(change_user_password_l
|
|||
if module_host ~= host then
|
||||
return { status = "completed", error = { message = "Trying to change the password of a user on " .. host .. " but command was sent to " .. module_host}};
|
||||
end
|
||||
if usermanager_user_exists(username, host) and usermanager_set_password(username, fields.password, host) then
|
||||
if usermanager_user_exists(username, host) and usermanager_set_password(username, fields.password, host, nil) then
|
||||
return { status = "completed", info = "Password successfully changed" };
|
||||
else
|
||||
return { status = "completed", error = { message = "User does not exist" } };
|
||||
|
|
|
@ -1067,7 +1067,7 @@ function def_env.user:password(jid, password)
|
|||
elseif not um.user_exists(username, host) then
|
||||
return nil, "No such user";
|
||||
end
|
||||
local ok, err = um.set_password(username, password, host);
|
||||
local ok, err = um.set_password(username, password, host, nil);
|
||||
if ok then
|
||||
return true, "User password changed";
|
||||
else
|
||||
|
|
|
@ -120,7 +120,9 @@ function provider.get_sasl_handler()
|
|||
local credentials = accounts:get(username);
|
||||
if not credentials then return; end
|
||||
if credentials.password then
|
||||
usermanager.set_password(username, credentials.password, host);
|
||||
if provider.set_password(username, credentials.password) == nil then
|
||||
return nil, "Auth failed. Could not set hashed password from plaintext.";
|
||||
end
|
||||
credentials = accounts:get(username);
|
||||
if not credentials then return; end
|
||||
end
|
||||
|
|
|
@ -201,6 +201,18 @@ module:hook_global("user-deleted", function(event)
|
|||
end
|
||||
end, 200);
|
||||
|
||||
module:hook_global("user-password-changed", function(event)
|
||||
local username, host, resource = event.username, event.host, event.resource;
|
||||
local user = hosts[host].sessions[username];
|
||||
if user and user.sessions then
|
||||
for r, session in pairs(user.sessions) do
|
||||
if r ~= resource then
|
||||
session:close{ condition = "reset", text = "Password changed" };
|
||||
end
|
||||
end
|
||||
end
|
||||
end, 200);
|
||||
|
||||
function runner_callbacks:ready()
|
||||
self.data.conn:resume();
|
||||
end
|
||||
|
|
|
@ -148,7 +148,7 @@ end);
|
|||
|
||||
-- Handle caps stream feature
|
||||
module:hook("stream-features", function (event)
|
||||
if event.origin.type == "c2s" or event.origin.type == "c2s_unauthed" then
|
||||
if event.origin.type == "c2s" or event.origin.type == "c2s_unbound" then
|
||||
event.features:add_child(get_server_caps_feature());
|
||||
end
|
||||
end);
|
||||
|
|
|
@ -243,15 +243,19 @@ local function message_handler(event, c2s)
|
|||
local with = jid_bare(c2s and orig_to or orig_from);
|
||||
|
||||
-- Filter out <stanza-id> that claim to be from us
|
||||
stanza:maptags(function (tag)
|
||||
if tag.name == "stanza-id" and tag.attr.xmlns == xmlns_st_id then
|
||||
local by_user, by_host, res = jid_prepped_split(tag.attr.by);
|
||||
if not res and by_host == module.host and by_user == store_user then
|
||||
return nil;
|
||||
if stanza:get_child("stanza-id", xmlns_st_id) then
|
||||
stanza = st.clone(stanza);
|
||||
stanza:maptags(function (tag)
|
||||
if tag.name == "stanza-id" and tag.attr.xmlns == xmlns_st_id then
|
||||
local by_user, by_host, res = jid_prepped_split(tag.attr.by);
|
||||
if not res and by_host == module.host and by_user == store_user then
|
||||
return nil;
|
||||
end
|
||||
end
|
||||
end
|
||||
return tag;
|
||||
end);
|
||||
return tag;
|
||||
end);
|
||||
event.stanza = stanza;
|
||||
end
|
||||
|
||||
-- We store chat messages or normal messages that have a body
|
||||
if not(orig_type == "chat" or (orig_type == "normal" and stanza:get_child("body")) ) then
|
||||
|
@ -268,18 +272,21 @@ local function message_handler(event, c2s)
|
|||
end
|
||||
end
|
||||
|
||||
local clone_for_storage;
|
||||
if not strip_tags:empty() then
|
||||
stanza = st.clone(stanza);
|
||||
stanza:maptags(function (tag)
|
||||
clone_for_storage = st.clone(stanza);
|
||||
clone_for_storage:maptags(function (tag)
|
||||
if strip_tags:contains(tag.attr.xmlns) then
|
||||
return nil;
|
||||
else
|
||||
return tag;
|
||||
end
|
||||
end);
|
||||
if #stanza.tags == 0 then
|
||||
if #clone_for_storage.tags == 0 then
|
||||
return;
|
||||
end
|
||||
else
|
||||
clone_for_storage = stanza;
|
||||
end
|
||||
|
||||
-- Check with the users preferences
|
||||
|
@ -287,12 +294,14 @@ local function message_handler(event, c2s)
|
|||
log("debug", "Archiving stanza: %s", stanza:top_tag());
|
||||
|
||||
-- And stash it
|
||||
local ok = archive:append(store_user, nil, stanza, time_now(), with);
|
||||
local ok = archive:append(store_user, nil, clone_for_storage, time_now(), with);
|
||||
if ok then
|
||||
local clone_for_other_handlers = st.clone(stanza);
|
||||
local id = ok;
|
||||
event.stanza:tag("stanza-id", { xmlns = xmlns_st_id, by = store_user.."@"..host, id = id }):up();
|
||||
clone_for_other_handlers:tag("stanza-id", { xmlns = xmlns_st_id, by = store_user.."@"..host, id = id }):up();
|
||||
event.stanza = clone_for_other_handlers;
|
||||
if cleanup then cleanup[store_user] = true; end
|
||||
module:fire_event("archive-message-added", { origin = origin, stanza = stanza, for_user = store_user, id = id });
|
||||
module:fire_event("archive-message-added", { origin = origin, stanza = clone_for_storage, for_user = store_user, id = id });
|
||||
end
|
||||
else
|
||||
log("debug", "Not archiving stanza: %s (prefs)", stanza:top_tag());
|
||||
|
|
|
@ -91,6 +91,7 @@ module:hook("stream-features", function(event)
|
|||
features:add_child(register_stream_feature);
|
||||
end);
|
||||
|
||||
-- Password change and account deletion handler
|
||||
local function handle_registration_stanza(event)
|
||||
local session, stanza = event.origin, event.stanza;
|
||||
local log = session.log or module._log;
|
||||
|
@ -130,7 +131,7 @@ local function handle_registration_stanza(event)
|
|||
local password = query:get_child_text("password");
|
||||
if username and password then
|
||||
if username == session.username then
|
||||
if usermanager_set_password(username, password, session.host) then
|
||||
if usermanager_set_password(username, password, session.host, session.resource) then
|
||||
session.send(st.reply(stanza));
|
||||
else
|
||||
-- TODO unable to write file, file may be locked, etc, what's the correct error?
|
||||
|
@ -207,6 +208,7 @@ local function check_throttle(ip)
|
|||
return throttle:poll(1);
|
||||
end
|
||||
|
||||
-- In-band registration
|
||||
module:hook("stanza/iq/jabber:iq:register:query", function(event)
|
||||
local session, stanza = event.origin, event.stanza;
|
||||
local log = session.log or module._log;
|
||||
|
|
6
prosody
6
prosody
|
@ -321,7 +321,11 @@ function load_secondary_libraries()
|
|||
return function() end
|
||||
end});
|
||||
|
||||
require "net.http"
|
||||
local http = require "net.http"
|
||||
local config_ssl = config.get("*", "ssl")
|
||||
local https_client = config.get("*", "client_https_ssl")
|
||||
http.default.options.sslctx = require "core.certmanager".create_context("client_https port 0", "client",
|
||||
{ capath = config_ssl.capath, cafile = config_ssl.cafile, verify = "peer", }, https_client);
|
||||
|
||||
require "util.array"
|
||||
require "util.datetime"
|
||||
|
|
16
prosodyctl
16
prosodyctl
|
@ -249,6 +249,13 @@ local modulemanager = require "core.modulemanager"
|
|||
|
||||
local prosodyctl = require "util.prosodyctl"
|
||||
local socket = require "socket"
|
||||
|
||||
local http = require "net.http"
|
||||
local config_ssl = config.get("*", "ssl")
|
||||
local https_client = config.get("*", "client_https_ssl")
|
||||
http.default.options.sslctx = require "core.certmanager".create_context("client_https port 0", "client",
|
||||
{ capath = config_ssl.capath, cafile = config_ssl.cafile, verify = "peer", }, https_client);
|
||||
|
||||
-----------------------
|
||||
|
||||
-- FIXME: Duplicate code waiting for util.startup
|
||||
|
@ -1334,7 +1341,14 @@ function commands.check(arg)
|
|||
print("This version of LuaSec (" .. ssl._VERSION .. ") does not support certificate checking");
|
||||
cert_ok = false
|
||||
else
|
||||
for host in enabled_hosts() do
|
||||
local function skip_bare_jid_hosts(host)
|
||||
if jid_split(host) then
|
||||
-- See issue #779
|
||||
return false;
|
||||
end
|
||||
return true;
|
||||
end
|
||||
for host in it.filter(skip_bare_jid_hosts, enabled_hosts()) do
|
||||
print("Checking certificate for "..host);
|
||||
-- First, let's find out what certificate this host uses.
|
||||
local host_ssl_config = config.rawget(host, "ssl")
|
||||
|
|
|
@ -175,7 +175,11 @@ function engine:execute_query(sql, ...)
|
|||
sql = self:prepquery(sql);
|
||||
local stmt = assert(self.conn:prepare(sql));
|
||||
assert(stmt:execute(...));
|
||||
return stmt:rows();
|
||||
local result = {};
|
||||
for row in stmt:rows() do result[#result + 1] = row; end
|
||||
stmt:close();
|
||||
local i = 0;
|
||||
return function() i=i+1; return result[i]; end;
|
||||
end
|
||||
function engine:execute_update(sql, ...)
|
||||
sql = self:prepquery(sql);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue