(but before you get too excited, no resource binding yet. And yes, there are still plenty of rough edges to the code...)
((eg. must move <stream:features> out of xmlhandlers.lua o_O ))
This commit is contained in:
Matthew Wild 2008-10-02 01:08:58 +01:00
parent f1cc4eb60f
commit 6db3d039b3
9 changed files with 194 additions and 45 deletions

View file

@ -23,19 +23,25 @@ function modulehelpers.add_iq_handler(origin_type, xmlns, handler)
if not handlers[origin_type].iq[xmlns] then
handlers[origin_type].iq[xmlns]= handler;
handler_info[handler] = getfenv(2).module;
log("debug", "mod_%s now handles iq,%s", getfenv(2).module.name, xmlns);
log("debug", "mod_%s now handles tag 'iq' with query namespace '%s'", getfenv(2).module.name, xmlns);
else
log("warning", "mod_%s wants to handle iq,%s but mod_%s already handles that", getfenv(2).module.name, xmlns, handler_info[handlers[origin_type].iq[xmlns]].module.name);
log("warning", "mod_%s wants to handle tag 'iq' with query namespace '%s' but mod_%s already handles that", getfenv(2).module.name, xmlns, handler_info[handlers[origin_type].iq[xmlns]].module.name);
end
end
function modulehelpers.add_presence_handler(origin_type, handler)
end
function modulehelpers.add_message_handler(origin_type, handler)
function modulehelpers.add_handler(origin_type, tag, handler)
handlers[origin_type] = handlers[origin_type] or {};
if not handlers[origin_type][tag] then
handlers[origin_type][tag]= handler;
handler_info[handler] = getfenv(2).module;
log("debug", "mod_%s now handles tag '%s'", getfenv(2).module.name, tag);
elseif handler_info[handlers[origin_type][tag]] then
log("warning", "mod_%s wants to handle tag '%s' but mod_%s already handles that", getfenv(2).module.name, tag, handler_info[handlers[origin_type][tag]].module.name);
end
end
function loadall()
load("saslauth");
load("legacyauth");
load("roster");
end
@ -58,9 +64,9 @@ function load(name)
end
function handle_stanza(origin, stanza)
local name, origin_type = stanza.name, origin.type;
local name, xmlns, origin_type = stanza.name, stanza.attr.xmlns, origin.type;
if name == "iq" then
if name == "iq" and xmlns == "jabber:client" and handlers[origin_type] then
log("debug", "Stanza is an <iq/>");
local child = stanza.tags[1];
if child then
@ -73,6 +79,13 @@ function handle_stanza(origin, stanza)
end
end
--FIXME: All iq's must be replied to, here we should return service-unavailable I think
elseif handlers[origin_type] then
local handler = handlers[origin_type][name];
if handler then
log("debug", "Passing stanza to mod_%s", handler_info[handler].name);
return handler(origin, stanza) or true;
end
end
log("debug", "Stanza unhandled by any modules");
return false; -- we didn't handle it

View file

@ -1,6 +1,10 @@
local tostring = tostring;
local print = print;
local hosts = hosts;
local log = require "util.logger".init("sessionmanager");
module "sessionmanager"
@ -12,9 +16,42 @@ function new_session(conn)
return session;
end
function destroy_session(session)
end
function send_to_session(session, data)
log("debug", "Sending...", tostring(data));
log("debug", "Sending: %s", tostring(data));
session.conn.write(tostring(data));
end
function make_authenticated(session, username)
session.username = username;
session.resource = resource;
if session.type == "c2s_unauthed" then
session.type = "c2s";
end
end
function bind_resource(session, resource)
if not session.username then return false, "auth"; end
if session.resource then return false, "constraint"; end -- We don't support binding multiple resources
resource = resource or math.random(100000, 99999999); -- FIXME: Clearly we have issues :)
--FIXME: Randomly-generated resources must be unique per-user, and never conflict with existing
if not hosts[session.host].sessions[session.username] then
hosts[session.host].sessions[session.username] = { sessions = {} };
else
if hosts[session.host].sessions[session.username].sessions[resource] then
-- Resource conflict
return false, "conflict";
end
end
session.resource = resource;
session.full_jid = session.username .. '@' .. session.host .. '/' .. resource;
hosts[session.host].sessions[session.username].sessions[resource] = session;
return true;
end
return _M;

View file

@ -9,3 +9,5 @@ function validate_credentials(host, username, password)
if password == credentials.password then return true; end
return false;
end
return _M;

View file

@ -27,6 +27,7 @@ function init_xmlhandlers(session)
local stanza
function xml_handlers:StartElement(name, attr)
log("info", "xmlhandlers", "Start element: " .. name);
if stanza and #chardata > 0 then
-- We have some character data in the buffer
stanza:text(t_concat(chardata));
@ -41,21 +42,28 @@ function init_xmlhandlers(session)
session.streamid = m_random(1000000, 99999999);
print(session, session.host, "Client opened stream");
send("<?xml version='1.0'?>");
send(format("<stream:stream xmlns='jabber:client' xmlns:stream='http://etherx.jabber.org/streams' id='%s' from='%s'>", session.streamid, session.host));
--send("<stream:features>");
--send("<mechanism>PLAIN</mechanism>");
send(format("<stream:stream xmlns='jabber:client' xmlns:stream='http://etherx.jabber.org/streams' id='%s' from='%s' version='1.0'>", session.streamid, session.host));
send("<stream:features>");
if not session.username then
send("<mechanisms xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>");
send("<mechanism>PLAIN</mechanism>");
send("</mechanisms>");
else
send("<bind xmlns='urn:ietf:params:xml:ns:xmpp-bind'><required/></bind>");
end
--send [[<register xmlns="http://jabber.org/features/iq-register"/> ]]
--send("</stream:features>");
send("</stream:features>");
log("info", "core", "Stream opened successfully");
session.notopen = nil;
return;
end
error("Client failed to open stream successfully");
end
if name ~= "iq" and name ~= "presence" and name ~= "message" then
if curr_ns == "jabber:client" and name ~= "iq" and name ~= "presence" and name ~= "message" then
error("Client sent invalid top-level stanza");
end
stanza = st.stanza(name, { to = attr.to, type = attr.type, id = attr.id, xmlns = curr_ns });
attr.xmlns = curr_ns;
stanza = st.stanza(name, attr); --{ to = attr.to, type = attr.type, id = attr.id, xmlns = curr_ns });
curr_tag = stanza;
else
attr.xmlns = curr_ns;

View file

@ -21,6 +21,7 @@ require "core.modulemanager"
require "core.usermanager"
require "core.sessionmanager"
require "core.stanza_router"
require "net.connhandlers"
require "util.stanza"
require "util.jid"
@ -31,7 +32,6 @@ local t_concatall = function (t, sep) local tt = {}; for _, s in ipairs(t) do t_
local m_random = math.random;
local format = string.format;
local st = stanza;
local init_xmlhandlers = xmlhandlers.init_xmlhandlers;
------------------------------
@ -63,8 +63,8 @@ function handler(conn, data, err)
print("Client connected");
session.stanza_dispatch = function (stanza) return core_process_stanza(session, stanza); end
session.xml_handlers = init_xmlhandlers(session);
session.parser = lxp.new(session.xml_handlers, ":");
session.connhandler = connhandlers.new("xmpp-client", session);
function session.disconnect(err)
if session.last_presence and session.last_presence.attr.type ~= "unavailable" then
@ -82,7 +82,7 @@ function handler(conn, data, err)
end
end
if data then
session.parser:parse(data);
session.connhandler:data(data);
end
--log("info", "core", "Client disconnected, connection closed");

16
net/connhandlers.lua Normal file
View file

@ -0,0 +1,16 @@
local lxp = require "lxp"
local init_xmlhandlers = require "core.xmlhandlers"
module "connhandlers"
function new(name, session)
if name == "xmpp-client" then
local parser = lxp.new(init_xmlhandlers(session), ":");
local parse = parser.parse;
return { data = function (self, data) return parse(parser, data); end, parser = parser }
end
end
return _M;

View file

@ -21,16 +21,27 @@ add_iq_handler("c2s_unauthed", "jabber:iq:auth",
require "core.usermanager"
if usermanager.validate_credentials(session.host, username, password) then
-- Authentication successful!
session.username = username;
session.resource = resource;
session.full_jid = username.."@"..session.host.."/"..session.resource;
if session.type == "c2s_unauthed" then
session.type = "c2s";
local success, err = sessionmanager.make_authenticated(session, username);
if success then
success, err = sessionmanager.bind_resource(session, resource);
--FIXME: Reply with error
if not success then
local reply = st.reply(stanza);
reply.attr.type = "error";
if err == "conflict" then
reply:tag("error", { code = "409", type = "cancel" })
:tag("conflict", { xmlns = "urn:ietf:params:xml:ns:xmpp-stanzas" });
elseif err == "constraint" then
reply:tag("error", { code = "409", type = "cancel" })
:tag("already-bound", { xmlns = "x-lxmppd:extensions:legacyauth" });
elseif err == "auth" then
reply:tag("error", { code = "401", type = "auth" })
:tag("not-authorized", { xmlns = "urn:ietf:params:xml:ns:xmpp-stanzas" });
end
dispatch_stanza(reply);
return true;
end
end
if not hosts[session.host].sessions[username] then
hosts[session.host].sessions[username] = { sessions = {} };
end
hosts[session.host].sessions[username].sessions[resource] = session;
send(session, st.reply(stanza));
return true;
else

53
plugins/mod_saslauth.lua Normal file
View file

@ -0,0 +1,53 @@
local st = require "util.stanza";
local send = require "core.sessionmanager".send_to_session;
local usermanager_validate_credentials = require "core.usermanager".validate_credentials;
local t_concat = table.concat;
local tostring = tostring;
local log = require "util.logger".init("mod_saslauth");
local xmlns_sasl ='urn:ietf:params:xml:ns:xmpp-sasl';
local new_connhandler = require "net.connhandlers".new;
local new_sasl = require "util.sasl".new;
add_handler("c2s_unauthed", "auth",
function (session, stanza)
if not session.sasl_handler then
session.sasl_handler = new_sasl(stanza.attr.mechanism,
function (username, password)
-- onAuth
require "core.usermanager"
if usermanager_validate_credentials(session.host, username, password) then
return true;
end
return false;
end,
function (username)
-- onSuccess
local success, err = sessionmanager.make_authenticated(session, username);
if not success then
sessionmanager.destroy_session(session);
end
session.sasl_handler = nil;
session.connhandler = new_connhandler("xmpp-client", session);
session.notopen = true;
end,
function (reason)
-- onFail
log("debug", "SASL failure, reason: %s", reason);
end,
function (stanza)
-- onWrite
log("debug", "SASL writes: %s", tostring(stanza));
send(session, stanza);
end
);
session.sasl_handler:feed(stanza);
else
error("Client tried to negotiate SASL again", 0);
end
end);

View file

@ -1,34 +1,43 @@
require "base64"
sasl = {}
function sasl:new_plain(onAuth, onSuccess, onFail, onWrite)
local base64 = require "base64"
local log = require "util.logger".init("sasl");
local tostring = tostring;
local st = require "util.stanza";
local s_match = string.match;
module "sasl"
local function new_plain(onAuth, onSuccess, onFail, onWrite)
local object = { mechanism = "PLAIN", onAuth = onAuth, onSuccess = onSuccess, onFail = onFail,
onWrite = onWrite}
local challenge = base64.encode("");
onWrite(stanza.stanza("challenge", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}):text(challenge))
--local challenge = base64.encode("");
--onWrite(st.stanza("challenge", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}):text(challenge))
object.feed = function(self, stanza)
if (stanza.name ~= "response") then self.onFail() end
if (stanza.attr.xmlns ~= "urn:ietf:params:xml:ns:xmpp-sasl") then self.onFail() end
local response = base64.decode(stanza.tag[1])
local authorization = string.match(response, "([^&\0]+)")
local authentication = string.match(response, "\0([^&\0]+)\0")
local password = string.match(response, "\0[^&\0]+\0([^&\0]+)")
if stanza.name ~= "response" and stanza.name ~= "auth" then self.onFail("invalid-stanza-tag") end
if stanza.attr.xmlns ~= "urn:ietf:params:xml:ns:xmpp-sasl" then self.onFail("invalid-stanza-namespace") end
local response = base64.decode(stanza[1])
local authorization = s_match(response, "([^&%z]+)")
local authentication = s_match(response, "%z([^&%z]+)%z")
local password = s_match(response, "%z[^&%z]+%z([^&%z]+)")
if self.onAuth(authorization, password) == true then
self.onWrite(stanza.stanza("success", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}))
self.onSuccess()
self.onWrite(st.stanza("success", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}))
self.onSuccess(authentication)
else
self.onWrite(stanza.stanza("failure", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}):tag("temporary-auth-failure"));
self.onWrite(st.stanza("failure", {xmlns = "urn:ietf:params:xml:ns:xmpp-sasl"}):tag("temporary-auth-failure"));
end
end
return object
end
function sasl:new(mechanism, onAuth, onSuccess, onFail, onWrite)
function new(mechanism, onAuth, onSuccess, onFail, onWrite)
local object
if mechanism == "PLAIN" then object = new_plain(onAuth, onSuccess, onFail, onWrite)
else onFail()
else
log("debug", "Unsupported SASL mechanism: "..tostring(mechanism));
onFail("unsupported-mechanism")
end
return object
end
module "sasl"
return _M;