Commit graph

117 commits

Author SHA1 Message Date
Kim Alvefur
7721cc667b mod_http: Generate URL from configuration in prosodyctl
This removes the need to configure e.g. http_external_url or similar
settings in order to get correct URLs out of prosodyctl, as the API
depends on portmanager to know the actual ports that are used.
2023-07-26 14:39:36 +02:00
Kim Alvefur
fd63cc11c1 mod_http: Fix passing minimum limits in wrong argument position 2023-07-17 02:26:16 +02:00
Kim Alvefur
71ad48095d plugins: Use integer config API with interval specification where sensible
Many of these fall into a few categories:
- util.cache size, must be >= 1
- byte or item counts that logically can't be negative
- port numbers that should be in 1..0xffff
2023-07-17 01:38:54 +02:00
Kim Alvefur
1987a7411f plugins: Switch to :get_option_period() for time range options
Improves readability ("1 day" vs 86400) and centralizes validation.
2023-07-16 20:49:33 +02:00
Kim Alvefur
af2cf5f188 renamening: Fix newly added imports to use the new namespace 2023-06-18 16:48:56 +02:00
Kim Alvefur
0d6c625f93 Merge 0.12->trunk 2023-06-10 13:06:05 +02:00
Kim Alvefur
960f406662 mod_http: Fix error if 'access_control_allow_origins' is set
Because it changes the type of the 'opt_origins' variable from util.set
to the internal _items table so next time an http app is added an error
"attempt to call a nil value (method 'empty')" is triggered.  The value
is not used anywhere else.

Noticed when reviewing uses of the '_items' set property.

Not reported by any users, implying this setting is rarely used.
2023-06-10 12:33:58 +02:00
Kim Alvefur
57dd3340b0 mod_http: Simplify conversion of Set to Array
Avoids the _items semi-private value, that is used everywhere for some
reason.
2023-06-10 12:18:09 +02:00
Kim Alvefur
0890b20fbf mod_http: Unhook CORS handlers only if active (fixes #1801) 2023-03-05 15:45:01 +01:00
Matthew Wild
246d797f81 mod_http: Allow disabling CORS in the http_cors_override option and by default
Fixes #1779.

Due to an oversight in the logic, if the user set 'enabled' to false in an
override, it would disable the item's requested CORS settings, but still apply
Prosody's default CORS policy.

This change ensures that 'enabled = false' will now disable CORS entirely for
the requested item.

Due to the new structure of the code, it was necessary to have a flag to say
whether CORS is to be applied at all. Rather than hard-coding 'true' here, I
chose to add a new option: 'http_default_cors_enabled'. This is a boolean that
allows the operator to disable Prosody's default CORS policy entirely (the one
that is used when a module or config does not override it). This makes it
easier to disable CORS and then selectively enable it only on services you
want it on.
2022-10-31 14:32:02 +00:00
Matthew Wild
f19f1088b7 mod_http (and dependent modules): Make CORS opt-in by default (fixes #1731)
The same-origin policy enforced by browsers is a security measure that should
only be turned off when it is safe to do so. It is safe to do so in Prosody's
default modules, but people may load third-party modules that are unsafe.

Therefore we have flipped the default, so that modules must explicitly opt in
to having CORS headers added on their requests.
2022-03-28 14:53:24 +01:00
Matthew Wild
331ede129e mod_http: Reintroduce support for disabling or limiting CORS (fixes #1730)
This is far better than pre-0.12, because we now have a universal way to
configure and enable/disable CORS on a per-module basis.
2022-03-28 14:40:21 +01:00
Kim Alvefur
16381e754d mod_http: Make RFC 7239 Forwarded opt-in for now to be safe
Supporting both methods at the same time may open to spoofing attacks,
whereby a client sends a Forwarded header that is not stripped by a
reverse proxy, leading Prosody to use that instead of the X-Forwarded-*
headers actually sent by the proxy.

By only supporting one at a time, it can be configured to match what the
proxy uses.

Disabled by default since implementations are sparse and X-Forwarded-*
are everywhere.
2023-06-03 21:53:20 +02:00
Kim Alvefur
8c92b32b7a mod_http: Use RFC 7239 Forwarded header to find original client IP
Prefer over X-Forwarded-* since it has an actual specification.

Main practical difference is that Forwarded may carry more properties
than only the IP address since it is a structured header.

Since we parse it into an array, it is easier to do the logical thing
and iterate backwards trough proxies until an untrusted one is
encountered. Compare the handling of X-Forwarded-For.

The 'secure' field now accounts for the full chain of proxies, which
must be secure all the way to be considered secure.
2023-06-03 17:10:04 +02:00
Kim Alvefur
3fbd92e26d mod_http: Handle bracketed IP address format from RFC 7239
There are hints that this format might be used in X-Forwarded-For as
well, so best handle it everywhere. Strips both brackets and optional
port number.
2023-06-03 17:10:12 +02:00
Kim Alvefur
0b87371f78 mod_http: Add way to retrieve internal URL instead of external
This could be of help when configuring reverse proxies, as it is the
internal URL the proxy must point at.

Argument treated as an enum "internal" "external"(default) to allow for
future extensibility.
2023-05-24 14:43:45 +02:00
Kim Alvefur
59be792439 mod_http: Fix reliance on previous tostring() format of util.set
a863e4237b91 unintentionally changed the format of HTTP CORS headers,
which were apparently relying on the output of tostring(), which it
shouldn't have.

Explicitly serializing it this time.
2023-04-10 11:50:27 +02:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Kim Alvefur
eae775bc79 mod_http: Use interface name as default default global hostname
http://[::]:5280/ is as sensible as http://*:5280/ so why not

This might be a bit weird when listening no multiple interfaces but not
sure we can really do anything sensible then anyway.
2022-02-04 20:11:18 +01:00
Kim Alvefur
35e77293c0 mod_http: Use http_default_host for URLs generated in global context
This might make the global routes less confusing sometimes, or at least
valid URLs instead of http://*:5280/ which doesn't make much sense.
2022-02-04 19:58:43 +01:00
Kim Alvefur
a798505a97 mod_http: Increase severity of loading unreachable http modules
This is either caused by an earlier failure to bind http/s ports, in
which case that should be corrected, or explicitly disbling the http/s
ports, in which case ... why enable http modules?

Suggested by jonas’
2022-01-15 17:37:07 +01:00
Kim Alvefur
77630b72ff mod_http: Skip querying portmanager when http_external_url when is set
When http_external_url is set then the portmanager usage only really
serves as a check of whether any http service is enabled at all.

Should allow generating an URL from prosodyctl when http_external_url is
set.
2021-11-27 12:26:15 +01:00
Kim Alvefur
b187489802 mod_http: Limit unencrypted http port (5280) to loopback by default
Since accessing this port directly over the wider Internet is unlikely
to intentional anymore.  Most uses will likely be by reverse proxies, by
mistake or because of trouble configuring HTTPS.

Blocking mistaken uses is just a good thing, letting users send
potentially private things unencrypted tends to be Strongly Discouraged
these days.

Many reverse proxy setups operate over loopback, so listening there
instead of all interfaces is a net improvement.

Improved automatic certificate location and SNI support has mostly
eliminated the need for manual certificate configuration so HTTPS should
Just Work once certificates have been provided.

For local testing during development, connecting over loopback is likely
fine as well. When really needed, `http_interfaces` can still be set.

Suggested by Link Mauve
2022-01-15 15:13:41 +01:00
Kim Alvefur
6d8f1d56ed mod_http: Clean up redirects handlers for wildcard on http module unload
These would previously be left behind. Probably mostly harmless except
for clogging up the `debug:events()` listing in the console.
2021-12-22 19:27:03 +01:00
Kim Alvefur
c506269ff5 Fix various spelling errors (thanks codespell)
Also special thanks to timeless, for wordlessly reminding me to check
for typos.
2021-07-27 00:13:18 +02:00
Kim Alvefur
4b60587e75 mod_http: Consolidate handling of proxied connection details
Trying to move everything relating to proxies and X-Forwarded-Foo into a
single place.
2021-02-27 21:37:56 +01:00
Kim Alvefur
2acba62388 net.http.server: Set request.ip so mod_http doesn't have to
Because it already sets request.secure, which depends on the connection,
just like the IP, so it makes sense to do both in the same place.

Dealing with proxies can be left to mod_http for now, but maybe it could
move into some util some day?
2021-02-27 21:37:16 +01:00
Kim Alvefur
d8bcee69f3 Merge 0.11->trunk 2021-02-27 21:07:36 +01:00
Kim Alvefur
aa9e2741d5 mod_http: Restore ip field for requests without proxies
8603011e51fe optimized out more than just the loop, leaving the .ip
field blank when the request wasn't from a proxy.
2021-02-27 20:45:45 +01:00
Kim Alvefur
4ed5700a19 mod_http: Improve message for missing 'route'
This was the late night early draft text, thought I had amended this but
apparently I forgot.
2021-02-23 16:07:41 +01:00
Kim Alvefur
19eb907613 mod_http: Warn if app is missing 'route'
Makes no sense to have a http module with no handlers

Would have helped me when I accidentally

module:provides("http", {
  GET = handler;
})
2021-02-21 01:00:00 +01:00
Kim Alvefur
e52a77ff84 mod_http: Fix trusted proxies check (thanks buildbot)
is_trusted_proxy() is only in trunk, I dun goofed when I rebased
8603011e51fe from trunk.
2021-02-18 14:34:38 +01:00
Kim Alvefur
80116bf0e3 mod_http: Skip IP resolution in non-proxied case
Skips doing the whole get_ip_from_request() dance if the request isn't
from a proxy at all, even if the client sent the header for some reason.
2021-02-18 12:00:00 +01:00
Kim Alvefur
d65d38846d mod_http: Allow modifying CORS header list via :provides API
E.g.

module:provides("http", {
		cors = {
			headers = {
				Accept = true;
				Expect = false;
			};
		};
		route = { ... };
	});

Case might be weird.
2019-12-30 09:50:59 +01:00
Kim Alvefur
5d4446cd13 mod_http: Allow setting the CORS credentials flag via :provides API
E.g.

module:provides("http", {
		cors = {
			credentials = true;
		};
		route = { ... };
	});
2019-12-30 09:49:28 +01:00
Kim Alvefur
0e6a6fff96 mod_http: Optimize proxy IP check
No need to do a subnet match comparison to see if two IP addresses match
exactly.
2021-02-18 10:41:04 +01:00
Kim Alvefur
362c228c47 mod_http: Consider x-forwarded-proto from trusted proxies
Should be better than setting consider_{bosh,websocket}_secure as that
may end up causing actually insecure requests to be considered secure.

Doing it here, as with IP, should make this apply to all HTTP modules.
2021-02-18 10:00:56 +01:00
Kim Alvefur
4b4636ae65 Merge 0.11->trunk 2021-02-18 12:02:11 +01:00
Matthew Wild
29f2e5906f mod_http: Silence warnings when running under prosodyctl 2020-09-11 12:37:07 +01:00
Kim Alvefur
933c048829 mod_http: Add way to signal that a module supports streaming uploads
Fixes #726

API:

module:provides("http", {
	streaming_uploads = true;
	route = {
		PUT = function (event)
			event.request.body_sink = io.tmpfile();
			return true;
		end
	}
})
2020-08-01 18:41:30 +02:00
Kim Alvefur
91d2ab9108 net.http.parser: Allow specifying sink for large request bodies
This enables uses such as saving uploaded files directly to a file on
disk or streaming parsing of payloads.

See #726
2020-08-01 18:41:23 +02:00
Boris Grozev
edd798dd98 mod_http: Support CIDR for trusted proxies. 2020-06-10 13:15:57 -05:00
Kim Alvefur
d689f6c9a1 mod_http: Tell luacheck to ignore the long comment lines 2020-05-14 16:55:01 +02:00
Jonas Schäfer
d6de70d19f mod_http: Add documentation to the non-obvious logic of get_ip_from_request
Because docs are good.
2020-05-14 14:59:59 +02:00
Kim Alvefur
0fdb85997a mod_net_multiplex: Add support for using ALPN
Potentially a bit more efficient since it can jump to the selected
protocol on connect instead of waiting for some data to look at.

Adds a 'protocol' field to net providers for this purpose.
2019-11-29 23:27:51 +01:00
Kim Alvefur
6fd9868ed5 mod_http: Log served URLs at 'info' level
These are similar to the "activated service" messages from portmanager
and similarily useful for the service admin to know even if they're not
debugging anything.
2019-11-29 21:30:08 +01:00
Kim Alvefur
fd9ccf20d5 mod_http: Soften dependency on mod_http_errors
This allows disabling mod_http_errors by adding it to
moduless_disabled and ensures mod_http loads even if the error pages
aren't as pretty.
2019-11-16 16:39:45 +01:00
Kim Alvefur
8340ca2b18 mod_http: Unhook CORS related event handlers
Prevents CORS related handlers from being left over on reload.

BC: `mod_http.apps[app_name][event_name]` is now a table instead of the
main handler function.
2019-10-10 20:46:27 +02:00
Matthew Wild
d24e6c7582 mod_http: Add support for configuring CORS Access-Control-Allow-Credentials 2019-09-11 15:10:31 +01:00
Kim Alvefur
0247a0e904 mod_http: Move normalize_path to util.http 2018-10-14 14:31:59 +02:00