Commit graph

2540 commits

Author SHA1 Message Date
Matthew Wild
d2ede10c5d util.jwt: Consolidate payload parsing, ensure it's always a valid object 2022-07-11 13:42:08 +01:00
Matthew Wild
23458111dc util.jwt: Provide built-in token expiry support (defaults to 3600s lifetime)
To avoid every user of the library needing to add and verify expiry info, this
is now handled by util.jwt itself (if not overridden or disabled).

Issuing tokens that are valid forever is bad practice and rarely desired, and
the default token lifetime is now 3600s (1 hour).
2022-07-11 13:28:29 +01:00
Matthew Wild
fad58c5ab2 util.jwt: All the algorithms (+ all the tests!)
Except 'none'. Not implementing that one.
2022-07-02 15:29:04 +01:00
Matthew Wild
5316b0005e util.crypto: More digests for sign/verify, use macros for clarity/consistency 2022-07-02 14:59:52 +01:00
Matthew Wild
0b0555c339 util.jwt: Add support for RSA-based algorithms (RS256, PS256) 2022-07-02 12:26:43 +01:00
Matthew Wild
ae16ddcac7 util.jwt: Add support/tests for ES256 via improved API and using util.crypto
In many cases code will be either signing or verifying. With asymmetric
algorithms it's clearer and more efficient to just state that once, instead of
passing keys (and possibly other parameters) with every sign/verify call.

This also allows earlier validation of the key used.

The previous (HS256-only) sign/verify methods continue to be exposed for
backwards-compatibility.
2022-07-01 18:51:15 +01:00
Matthew Wild
4122acf8c8 util.paseto: Implementation of PASETO v4.public tokens
PASETO provides an alternative to JWT with the promise of fewer implementation
pitfalls. The v4.public algorithm allows asymmetric cryptographically-verified
token issuance and validation.

In summary, such tokens can be issued by one party and securely verified by
any other party independently using the public key of the issuer. This has a
number of potential applications in a decentralized network and ecosystem such
as XMPP. For example, such tokens could be combined with XEP-0317 to allow
hats to be verified even in the context of a third-party MUC service.
2022-06-24 17:03:28 +01:00
Matthew Wild
b02ab508d5 util.stanza: Add add_error() to simplify adding error tags to existing stanzas
Some fiddling is required now in error_reply() to ensure the cursor is in the
same place as before this change (a lot of code apparently uses that feature).
2022-08-29 14:59:46 +01:00
Matthew Wild
77146aa4e7 util.roles: Add new utility module to consolidate role objects and methods 2022-07-19 17:44:26 +01:00
Matthew Wild
7ebea134e6 util.session: Add role management methods 2022-06-15 11:37:09 +01:00
Kim Alvefur
8959868a28 util.stanza: Add method for extracting a single attribute value
Sometimes you only care about a single attribute, but the child tag
itself may be optional, leading to needing `tag and tag.attr.foo` or
`stanza:find("tag@foo")`.

The `:find()` method is fairly complex, so avoiding it for this kind of
simpler use case is a win.
2022-08-17 19:04:30 +02:00
Kim Alvefur
68867c09d6 util.datetime: Remove a line
No idea why the locals were declared on a line by itself. Perhaps line
length considerations? But saving 6 characters in width by adding a
whole line with 47 characters seems excessive.

This is still within the 150 character limit set by .luacheckrc
2022-08-17 18:07:31 +02:00
Kim Alvefur
c85c18b03a util.datetime: Add support for sub-second precision timestamps
Lua since 5.3 raises a fuss when time functions are handed a number with
a fractional part and the underlying C functions are all based on
integer seconds without support for more precision.
2022-08-14 16:57:31 +02:00
Kim Alvefur
6619b204e3 doap: Update XEP versions for which no code changes appear needed
XEP-0004: Partial forms are handled
XEP-0045: We're already strict with GC 1.0
XEP-0060: Change in semantics wrt 'pubsub#type', but not in code
XEP-0115: No protocol change
XEP-0138: Specification moved to Obsolete
XEP-0163: Editorial only change
XEP-0215: Minor schema change
XEP-0280: Editorial change
XEP-0297: Had the wrong version number
XEP-0106: Note missing piece for version 1.1
XEP-0313: Editorial change
XEP-0363: Editorial clarification, no code change required
XEP-0380: Registry additions, no code change needed
XEP-0384: Not directly supported, only here because people will ask otherwise
XEP-0445: Broken out of XEP-0401
2022-08-08 20:33:44 +02:00
Kim Alvefur
93830ecf40 various: Update IETF RFC URLs for tools.ietf.org transition
See https://www.ietf.org/blog/finalizing-ietf-tools-transition/

Already done in various other places.
2022-08-05 16:54:15 +02:00
Kim Alvefur
c1a166daa7 util.sasl.scram: Add 'tls-exporter' as recognised channel binding method
The last missing piece of #1760, otherwise SCRAM-SHA-*-PLUS is not
actually advertised.
2022-07-27 00:32:04 +02:00
Kim Alvefur
f8e73eba98 compat: Use table.pack (there since Lua 5.2) over our util.table
Added in d278a770eddc avoid having to deal with its absence in Lua 5.1.
No longer needed when Lua 5.1 support is dropped.
2022-07-11 19:15:24 +02:00
Kim Alvefur
5251c9b686 compat: Remove handling of Lua 5.1 location of 'unpack' function 2022-07-11 19:07:38 +02:00
Kim Alvefur
82135131e7 Merge 0.12->trunk 2022-07-08 19:36:07 +02:00
Kim Alvefur
bcc6efb2aa util.envload: Remove Lua 5.1 method
Part of #1600

Is this module even needed anymore?
2022-07-05 14:18:32 +02:00
Kim Alvefur
49a9a1e76a util: Remove various Lua 5.1 compatibility hacks
Part of #1600
2022-07-02 17:31:14 +02:00
Kim Alvefur
ada68efcc9 util.dependencies: Reject Lua 5.1, Lua 5.2 or later is now required (see #1600) 2022-07-02 17:30:34 +02:00
Kim Alvefur
5393bff075 util.dependencies: Deprecate support for Lua 5.1, this is your final warning 2022-06-30 17:03:50 +02:00
Kim Alvefur
f3d61e3945 util.hashes: Bind BLAKE2 algoritms supported by OpenSSL 2020-09-10 21:58:24 +02:00
Kim Alvefur
ae14dc1220 util.hashes: Expose sha224 and sha384 HMAC functions
For completeness and consistency with set of plain hash functions
2020-11-29 17:58:45 +01:00
Kim Alvefur
529d711bf1 Merge 0.12->trunk 2022-06-14 19:21:20 +02:00
Matthew Wild
7532eac0e5 util.watchdog: Allow passing a new timeout to :reset() 2022-06-11 22:15:31 +01:00
Matthew Wild
029e093478 util.watchdog: Allow :reset() to restart a cancelled watchdog 2022-06-11 22:15:14 +01:00
Matthew Wild
49a9d5e427 util.watchdog: Update to use "new" util.timer API
When this module was written, it wasn't possible to cancel or reschedule a
timer. Times have changed, and we should take advantage of those new methods.

This module becomes a very thin wrapper around util.timer now, but I'd argue
it's still a very common and useful concept/abstraction to have around.

Possible API change: this removes the 'last_reset' field of the watchdog. This
was never really intended as a public thing, and I can't find any code that
uses it, so I consider removal to be safe.
2022-06-11 21:11:01 +01:00
Kim Alvefur
02f67bb917 util.prosodyctl.shell: Print errors in red to highlight them 2022-06-01 13:59:00 +02:00
Kim Alvefur
677d77e82e util.openmetrics: Set __name field on metatables to improve error messages
Don't think we cause any such errors right now, but you never know!
2022-05-30 17:37:25 +02:00
Kim Alvefur
b78c9e7f5f util.openmetrics: Set (previously unused, empty) metatable
Silences luacheck warning about the metatable being unused.
2022-05-30 17:34:58 +02:00
Kim Alvefur
fb0299bbf6 util.vcard: Delete since nothing uses it 2022-05-30 16:25:35 +02:00
Kim Alvefur
0267554c8e prosodyctl shell: Communicate width of terminal to mod_admin_shell
This lets it adjust the width of tables to the actual terminal width.
2022-05-30 15:28:44 +02:00
Kim Alvefur
b0e3ea775a Merge 0.12->trunk 2022-05-26 13:46:10 +02:00
Kim Alvefur
9135764484 Merge 0.12->trunk 2022-05-09 22:40:45 +02:00
Kim Alvefur
1c6747f200 Merge 0.12->trunk 2022-05-08 18:06:41 +02:00
Kim Alvefur
b58b7a3cb0 Merge 0.12->trunk 2022-05-05 14:15:15 +02:00
Jonas Schäfer
9f7c3b9ba6 net: refactor sslconfig to not depend on LuaSec
This now requires that the network backend exposes a tls_builder
function, which essentially wraps the former util.sslconfig.new()
function, passing a factory to create the eventual SSL context.

That allows a net.server backend to pick whatever it likes as SSL
context factory, as long as it understands the config table passed by
the SSL config builder. Heck, a backend could even mock and replace the
entire SSL config builder API.
2022-04-02 11:15:33 +02:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Matthew Wild
07ee0f4470 Merge 0.12->trunk 2022-04-25 16:35:10 +01:00
Matthew Wild
fc5a8d7f4a Merge 0.12->trunk 2022-04-25 15:09:53 +01:00
Matthew Wild
7fc174f045 Merge 0.12->trunk 2022-04-13 18:46:26 +01:00
Kim Alvefur
72d5a83e42 Merge 0.12->trunk 2022-04-02 16:39:29 +02:00
Matthew Wild
6a923e65c9 Merge 0.12->trunk 2022-03-28 11:42:16 +01:00
Matthew Wild
92cec56e97 util.xmppstream: Allow dynamically configuring the stanza size limit for a stream
This may be useful for any plugins that want to experiment with different policies
for stanza size limits (e.g. unauthenticated vs authenticated streams).
2021-05-10 17:03:27 +01:00
Matthew Wild
7cb3ec61d5 util.xmppstream: Mark bytes for stream closure as handled 2021-05-10 17:02:37 +01:00
Matthew Wild
d126ee88bc util.xmppstream: Reduce default xmppstream limit to 1MB 2021-05-10 16:44:55 +01:00
Matthew Wild
06161ab766 util.set: Add is_set() to test if an object is a set 2021-05-10 16:41:56 +01:00
Matthew Wild
4c7989e7e4 util.startup: Set more aggressive defaults for GC
Testing has demonstrated that the default GC parameters are not
sufficient to prevent runaway memory growth when running under Lua 5.2
and Lua 5.3.

Setting the GC speed to 500 was tested on Lua versions 5.1->5.4 and did
not display unbounded memory growth.
2021-05-07 16:41:39 +01:00