Commit graph

13687 commits

Author SHA1 Message Date
Matthew Wild
1acb229597 net.httpserver: Remove obsolete API 2025-02-14 14:50:22 +00:00
Matthew Wild
09e5f799a0 prosody.cfg.lua.dist: Updates for 13.0+ 2025-02-14 14:47:11 +00:00
Matthew Wild
e3bd013535 CHANGES: List mod_cloud_notify 2025-02-14 14:44:47 +00:00
Matthew Wild
d71473df3b MUC: Use new XEP namespace for hats by default
Revert with muc_hats_compat = true in the config if necessary.
2025-02-14 13:08:45 +00:00
Matthew Wild
ed5dfc1a62 prosodyctl: check: Warn about deprecated mod_posix 2025-02-13 18:01:15 +00:00
Matthew Wild
90fea186dd modulemanager: Remove autoloading of per-platform module
We only support posix these days, and we moved it to the core startup process
to make it more deterministic and reliable.
2025-02-13 18:00:54 +00:00
Matthew Wild
df63482b96 mod_admin_shell: Remove duplicated line 2025-02-13 17:05:36 +00:00
Matthew Wild
56dc05885e mod_admin_shell: Rename user:setrole to user:set_roles
This is more readable and accessible, and it will only be harder to change
after release.
2025-02-13 16:20:42 +00:00
Matthew Wild
f8a9943d17 mod_admin_shell: Hide secondary role commands, focus on primary roles
Secondary roles are an advanced feature without any strong use cases
currently. Having multiple ways to manage roles is confusing.

Now the 'user:role' command will just show the primary role if that is all
there is, but will list secondary roles too if there are any (which in 99.9%
of cases there won't be).
2025-02-13 16:18:59 +00:00
Matthew Wild
009996c9e8 mod_admin_shell: Support for hiding certain commands from default help listing
Useful for e.g. deprecated commands.
2025-02-13 16:16:19 +00:00
Matthew Wild
4cc122bdc0 mod_account_activity: Fix error when no duration specified in shell command 2025-02-13 16:15:16 +00:00
Matthew Wild
b07c1436e7 mod_admin_shell: Fix result handling of user addrole/delrole commands 2025-02-13 15:54:39 +00:00
Matthew Wild
ccacf5acb3 usermanager: Include role_name in event for consistency with the 'removed' event 2025-02-13 15:31:37 +00:00
Matthew Wild
d384d98c11 mod_authz_internal: Fix error messages 2025-02-13 15:31:14 +00:00
Matthew Wild
dc810fea2d mod_authz_internal: Fix return values of secondary role management methods
usermanager expects (role, err) and (ok, err)
2025-02-13 15:30:23 +00:00
Matthew Wild
3cdaf29bf8 mod_presence: Fix traceback if origin gets disconnected during processing
Fixes #1887
2025-02-13 14:00:08 +00:00
Matthew Wild
91e846ee71 mod_invites: Add shell commands to list, show and delete pending invitations 2025-02-13 13:04:37 +00:00
Matthew Wild
94385af697 mod_invites: Shell command to create reset links 2025-02-13 12:21:16 +00:00
Kim Alvefur
e91c540eea core.configmanager: Delay reporting warnings about Credential until use
Too much noise to use Credential if you get a pile of warnings every
time you touch prosodyctl for anything. This way warnings should be
printed only if e.g used by prosodyctl check config or a module command.
2025-02-12 22:35:39 +01:00
Matthew Wild
d828183c6a CHANGES: Update with some more 13.0 features 2025-02-12 17:15:49 +00:00
Matthew Wild
85b82fdb3d mod_account_activity: Add shell command to list inactive accounts
Including accounts which may never have logged in.
2025-02-12 17:15:29 +00:00
Matthew Wild
6b6707efe5 mod_account_activity: Fix required module names 2025-02-12 17:15:00 +00:00
Matthew Wild
54b77fd3ca mod_account_activity: Record an account's last activity timestamp
This is similar to mod_lastlog/mod_lastlog2.

Some functionality was dropped, compared to mod_lastlog2. These features
(recording the IP address, or tracking the timestamp of multiple events) are
handled better by the mod_audit family of modules. For example, those
correctly handle multiple logins, IP address truncation, and data retention
policies.

The "registered" timestamp from mod_lastlog2 was also dropped, as this has
been stored in account_details by Prosody itself since at least 0.12 already.
2025-02-12 12:33:45 +00:00
Matthew Wild
2d695b3c01 CHANGES: Update for 13.0.x 2025-02-11 14:57:18 +00:00
Kim Alvefur
271860a171 util.dnsregistry: Update using script 2025-02-09 16:27:28 +01:00
Kim Alvefur
df27bf0645 tools.dnsregistry: Comment out duplicate error codes
This has previously been done manually after running this script
2025-02-09 16:26:22 +01:00
Kim Alvefur
c1655a181f mod_storage_sql: Fix tests for SQLite3
Tests does not run the code that initializes `sqlite_version`
2025-02-08 12:55:40 +01:00
Matthew Wild
d6f8c4fe18 MUC: Don't inform people about the avatar hash when there is none 2025-02-07 10:19:36 +00:00
Kim Alvefur
b4e8a8c6c4 net.adns: Collect DNS lookup timing metrics
Nice to have this in OpenMetricts instead of debug logs
2025-02-07 09:22:52 +01:00
Matthew Wild
3d61988313 mod_vcard: Switch store name for MUC hosts (thanks lissine) 2025-02-06 17:37:59 +00:00
Matthew Wild
857c61ffd3 mod_muc: Integrate support for vcards/avatars on MUC rooms
This was previously served by a community module (mod_vcard_muc).

It can be disabled by setting `vcard_muc = false` in the config.
2025-02-06 17:08:46 +00:00
Matthew Wild
839498eb5d mod_vcard: Some support for handling vcards on components 2025-02-06 17:03:03 +00:00
Matthew Wild
eac45d938a mod_vcard: Fire event when vcard updated 2025-02-06 17:02:29 +00:00
Matthew Wild
810b59d50e mod_vcard: Add API to get hash of the vcard avatar 2025-02-06 17:02:02 +00:00
Matthew Wild
2fef4f5d9c prosodyctl: Fix check for whether to show init system warning
Overlooked from testing.
2025-02-06 15:43:23 +00:00
Martijn van Duren
e7f77807c9 net.server_epoll: Call :shutdown() on TLS sockets when supported
Comment from Matthew:

This fixes a potential issue where the Prosody process gets blocked on sockets
waiting for them to close. Unlike non-TLS sockets, closing a TLS socket sends
layer 7 data, and this can cause problems for sockets which are in the process
of being cleaned up.

This depends on LuaSec changes which are not yet upstream.

From Martijn's original email:

So first my analysis of luasec. in ssl.c the socket is put into blocking
mode right before calling SSL_shutdown() inside meth_destroy(). My best
guess to why this is is because meth_destroy is linked to the __close
and __gc methods, which can't exactly be called multiple times and
luasec does want to make sure that a tls session is shutdown as clean
as possible.
I can't say I disagree with this reasoning and don't want to change this
behaviour. My solution to this without changing the current behaviour is
to introduce a shutdown() method. I am aware that this overlaps in a
conflicting way with tcp's shutdown method, but it stays close to the
OpenSSL name. This method calls SSL_shutdown() in the current
(non)blocking mode of the underlying socket and returns a boolean
whether or not the shutdown is completed (matching SSL_shutdown()'s 0
or 1 return values), and returns the familiar ssl_ioerror() strings on
error with a false for completion. This error can then be used to
determine if we have wantread/wantwrite to finalize things. Once
meth_shutdown() has been called once a shutdown flag will be set, which
indicates to meth_destroy() that the SSL_shutdown() has been handled
by the application and it shouldn't be needed to set the socket to
blocking mode. I've left the SSL_shutdown() call in the
LSEC_STATE_CONNECTED to prevent TOCTOU if the application reaches a
timeout for the shutdown code, which might allow SSL_shutdown() to
clean up anyway at the last possible moment.
Another thing I've changed to luasec is the call to socket_setblocking()
right before calling close(2) in socket_destroy() in usocket.c.
According to the latest POSIX[0]:
  Note that the requirement for close() on a socket to block for up to
  the current linger interval is not conditional on the O_NONBLOCK
  setting.
Which I read to mean that removing O_NONBLOCK on the socket before close
doesn't impact the behaviour and only causes noise in system call
tracers. I didn't touch the windows bits of this, since I don't do
windows.

For the prosody side of things I've made the TLS shutdown bits resemble
interface:onwritable(), and put it under a combined guard of self._tls
and self.conn.shutdown. The self._tls bit is there to prevent getting
stuck on this condition, and self.conn.shutdown is there to prevent the
code being called by instances where the patched luasec isn't deployed.
The destroy() method can be called from various places and is read by
me as the "we give up" error path. To accommodate for these unexpected
entrypoints I've added a single call to self.conn:shutdown() to prevent
the socket being put into blocking mode. I have no expectations that
there is any other use here. Same as previous, the self.conn.shutdown
check is there to make sure it's not called on unpatched luasec
deployments and self._tls is there to make sure we don't call shutdown()
on tcp sockets.
I wouldn't recommend logging of the conn:shutdown() error inside
close(), since a lot of clients simply close the connection before
SSL_shutdown() is done.
2025-02-06 15:04:38 +00:00
Matthew Wild
0a93dccaa9 prosodyctl: Further deprecate start/stop/restart commands when installed
Despite the warning we introduced, many people continue to try using
prosodyctl to manage Prosody in the presence of systemctl (e.g. #1688).

Also, despite the warning, prosodyctl proceeded with the operation. This means
the commands could be invoked by accident, and cause a situation that is hard
to recover from (needing to manually track down stray processes).

This commit disables all the problematic commands by default, but this can
still be overridden using --force or via a config option.

We only perform this check when we believe Prosody has been "installed" for
system-wide use (i.e. running it from a source directory is still supported).
2025-02-06 14:51:31 +00:00
Matthew Wild
08d69fb759 prosodyctl: reload: Assume reload-via-socket if any arguments passed 2025-02-06 14:47:45 +00:00
Matthew Wild
24d50902bd prosodyctl: Fix luacheck warning 2025-02-06 14:46:36 +00:00
Matthew Wild
3e23058a2d prosodyctl: reload: Remove redundant require 2025-02-06 14:45:56 +00:00
Matthew Wild
68fa291829 util.prosodyctl: Add comments to explain logic and expected behaviour (#1688) 2025-02-06 14:42:18 +00:00
Matthew Wild
60460d4d22 prosodyctl: stop: Fix detection of whether Prosody is running 2025-02-06 14:35:29 +00:00
Matthew Wild
b3d9577ceb prosodyctl: reload: Fix detection of whether prosody is running
isrunning() returns two values (success, status) and we were only checking the
first one.
2025-02-06 14:34:47 +00:00
Matthew Wild
f2e87307a4 prosodyctl: reload: use admin socket to issue reload command, if available 2025-02-06 14:24:16 +00:00
Matthew Wild
1377333751 util.prosodyctl.shell: Export function to check for availability of admin socket 2025-02-06 14:23:15 +00:00
Matthew Wild
ba53fa2e21 mod_c2s: Add debug log when disconnecting all user sessions 2025-02-06 12:40:11 +00:00
Kim Alvefur
56c7957a56 mod_admin_shell: Fix column alignment in 'help roles' 2025-02-02 14:12:52 +01:00
Kim Alvefur
084774ae50 mod_admin_shell: Fix help forgetting arguments
The array:pluck() method mutates the args, replacing the table items
with the resulting strings. On later runs I assume it tries to index the
string, which returns nil, emptying the array.
2025-02-02 13:33:17 +01:00
Kim Alvefur
885164b2b1 util.startup: Drop mention of systemd from notification socket handling
This does not have to be specific to systemd
2025-02-01 20:42:59 +01:00
Rémi Bardon
9732b0f9d8 mod_tokenauth: Fix expiry lasting one second too much
Because the code was using `< now` in a lot of places, things expiring at the current second
wouldn't be marked as expired. It isn't noticeable in real-world scenarios but I wanted to
create OAuth 2.0 tokens valid for 0 second in integration tests and it wasn't possible.

By using `<=` instead of `<`, we make sure tokens don't live a single millisecond more than
what they are supposed to.
2025-02-01 20:45:28 +01:00