Commit graph

13490 commits

Author SHA1 Message Date
Kim Alvefur
58af0798b7 Merge 0.12->trunk 2024-04-27 15:59:46 +02:00
Kim Alvefur
83ee7e5739 mod_pep: Implement 'roster' (group) access_model
Allows e.g. restricting your vcard4 to only family or similar.

Notes: This does not include roster groups in the configuration form,
so the client will have to get them from the actual roster.
2023-12-03 23:19:27 +01:00
Matthew Wild
5ef6234248 mod_announce: Suppress luacheck warnings 2024-04-26 10:37:20 +01:00
Matthew Wild
a839446a32 mod_announce: Add shell commands and APIs for sending to all/online/roles 2024-04-24 11:50:13 +01:00
Matthew Wild
272e700f50 prosodyctl shell: Fix invocation with 3+ command arguments
The code correctly inserted the ',' when there was already a "%q" in the
format string, but then the next argument would fail to match because it
inserted ", %q" instead of "%q". The code now matches both, ensuring the
generated code will not produce a syntax error with multiple arguments.
2024-04-24 11:45:37 +01:00
Kim Alvefur
cbd3982308 mod_blocklist: Fix fix signal for letting stanzas pass
Returning nothing/nil lets stanzas pass, returning anything else blocks
2024-04-23 20:01:41 +02:00
Matthew Wild
f94d5d2f7f mod_blocklist: Check JID of mediated MUC invite sender against blocklist
This ensures that someone on your blocklist is unable to invite you to MUC
rooms.
2024-04-22 11:26:20 +01:00
Matthew Wild
d1022fe0c4 mod_saslauth: Log when tls-exporter is NOT supported, as well as when it is 2024-04-17 16:47:38 +01:00
Kim Alvefur
f29bc1c119 net.unbound: Show canonical name in textual format (e.g. in shell)
libunbound does not tell us the whole chain of CNAMEs, only the final
canonical name.

This is to aid in debugging since it will only be shown in the shell.
2024-04-14 14:06:57 +02:00
Kim Alvefur
04a918233e mod_http_file_share: Fix expiry disabled check for new config API
Similar to 26c30844cac6
2024-04-08 16:44:11 +02:00
Kim Alvefur
a4f4acaa55 util.startup: Fix notifying config-reload to systemd
Does this event name seem backwards to anyone else?
2024-04-08 09:29:58 +02:00
Kim Alvefur
269d40f1ea mod_version: Fix uname result style (thanks riau)
`result[, err]`, not `ok, err|result`, must have confused it with pcall
2024-04-07 18:36:00 +02:00
Kim Alvefur
b438a292e9 mod_server_contact_info: Sort form fields to please scansion
The unstable hash table order caused the tests to fail and I don't know
how to tell scansion to ignore the order.
2024-04-06 16:51:27 +02:00
Kim Alvefur
0987a0113d mod_version: Handle access denied from uname()
Discovered while experimenting with a stricter SystemCallFilter setting
See man:systemd.exec(5)
2024-04-06 14:31:28 +02:00
aidan
5550be6381 mod_admin_shell: Add connection created time
This adds an output format option to show the time that the connection was created.

Ref #1852
2024-04-03 21:56:03 -07:00
Kim Alvefur
0c03df98fe Merge 0.12->trunk 2024-04-04 19:44:17 +02:00
Kim Alvefur
ec3655ced6 mod_invites_adhoc: Fix result form type (thanks betarays) 2024-04-04 19:39:33 +02:00
Kim Alvefur
502b8d3998 util.startup: Support systemd Type=notify service type
This lets Prosody report its lifecycle status to systemd, so it knows
when Prosody has completed its startup, when it's reloading and shutting
down.

Both Type=notify and Type=notify-reload is supported

Example systemd .service configuration snippet:

[Service]
Type=notify
2024-04-04 19:00:27 +02:00
Kim Alvefur
221f86f77f MUC: Fix legacy hats (thanks nicoco)
Why do we not have tests for this?
2024-03-28 15:39:59 +01:00
Kim Alvefur
8cdc5fb3a2 MUC: Switch to official XEP-0317 namespace for Hats (including compat) (thanks nicoco) 2024-03-28 15:26:57 +01:00
Kim Alvefur
e311f13c43 util.startup: Fix exiting on pidfile trouble
prosody.shutdown() relies on prosody.main_thread, which has not been set
yet at this point.

Doing a clean shutdown might actually be harmful in case it tears down
things set up by the conflicting Prosody, such as the very pidfile we
were looking at.

Thanks again SigmaTel71 for noticing
2024-03-27 19:33:11 +01:00
Matthew Wild
a8556c1875 Merge 0.12->trunk 2024-03-27 15:39:03 +00:00
Matthew Wild
655c972a7d prosodyctl check: Warn about invalid domain names in the config file
This ensures that domain names of virtual hosts and components are valid in
XMPP, and that they are encoded correctly.
2024-03-27 15:35:15 +00:00
Kim Alvefur
b41253bb49 util.startup: Abort before initialization of logging when started as root
Prevents creation of log files owned by the root user which could be
inaccessible once started correctly.
2024-03-24 21:32:00 +01:00
Kim Alvefur
78be92ab70 util.startup: Don't use not yet existent shutdown procedure when started as root (thanks SigmaTel71) 2024-03-24 21:31:47 +01:00
Kim Alvefur
e76620ad10 util.startup: Check root after detecting platform and reading config (thanks SigmaTel71)
Ensures that startup.detect_platform() runs so know whether to use the
POSIX method of checking the current user or something else. Also after
reading the config so we know whether the root override setting is set.
2024-03-24 20:39:42 +01:00
Kim Alvefur
c2c82a10d3 mod_posix: Move everything to util.startup
This allows greater control over the order of events.

Notably, the internal ordering between daemonization, initialization of
libunbound and setup of signal handling is sensitive.

libunbound starts a separate thread for processing DNS requests.
If this thread is started before signal handling has been set up, it
will not inherit the signal handlers and instead behave as it would have
before signal handlers were set up, i.e. cause the whole process to
immediately exit.

libunbound is usually initialized on the first DNS request, usually
triggered by an outgoing s2s connection attempt.

If daemonization happens before signals have been set up, signals may
not be processed at all.
2024-03-23 20:48:19 +01:00
Matthew Wild
2bc341d8b1 mod_bosh: Set base_type on session
This fixes a traceback with mod_saslauth. Ideally we move this to util.session
at some point, though.
2024-03-17 10:10:24 +00:00
Kim Alvefur
1b62552e1d util.startup: Back out 598df17b8ebb
Broke signal handling again, such that an early s2s connection results
in libunbound catching signals and getting Prosody killed on e.g. SIGHUP

This returns to the situation where prosody --daemonize does not respond
to signals.
2024-03-10 15:56:01 +01:00
Kim Alvefur
ed94077e82 util.startup: Hook signals after daemonization
signalfds stop working with epoll after forking

hooking signals later should not affect anything
2024-03-06 20:43:25 +01:00
Kim Alvefur
fabcc21881 mod_pubsub: Ignore shadowed variable [luacheck] 2024-03-06 19:12:11 +01:00
Matthew Wild
7ad4c88432 mod_pubsub: Add shell commands to create and list nodes 2024-03-06 17:38:21 +00:00
Kim Alvefur
72f1094ea4 core.features: Advertise that events are fired for SIGUSR1/2
Moved here from mod_posix since these events no longer originate there
2024-03-02 14:14:27 +01:00
Kim Alvefur
dd973a9e43 util.startup: Fix firing of USR1/2 events 2024-03-02 14:08:47 +01:00
Kim Alvefur
1d5021a663 net.server: Restore epoll signalfd handling
Reverts 4a9a69659727
2024-03-02 13:40:37 +01:00
Kim Alvefur
3036a689fa mod_posix: Move POSIX signal handling into util.startup to avoid race
When libunbound is initialized, it spawns a thread to work in.
In case a module initializes libunbound, e.g. by triggering a s2s
connection, Prosody would not handle signals, instead immediately quit
on e.g. the reload (SIGHUP) signal. Likely because the libunbound thread
would not have inherited the signal mask from the main Prosody thread.

Thanks Menel, riau and franck-x for reporting and help narrowing down
2024-03-02 13:23:24 +01:00
Kim Alvefur
ed0188ce81 net.server: Disable epoll signalfd handling by default until problems resolved 2024-03-01 19:22:49 +01:00
Kim Alvefur
865df3d373 net.server_epoll: Log creation of signalfd handles at noise level
To aid in tracking down signalfd-related problems
2024-03-01 19:20:45 +01:00
Matthew Wild
876162b9cf util.bit53: Add bnot() method 2024-03-01 17:22:29 +00:00
Kim Alvefur
36a9583069 util.signal: Fail signalfd() if unable to change signal mask
By aborting early, the failure should be brought to the attention
somehow.
2024-02-28 22:31:06 +01:00
Kim Alvefur
f1e07782ed net.server_epoll: Log failure to hook signals
To make any such failures noticeable
2024-02-28 22:24:09 +01:00
Kim Alvefur
3d2bad3d4b Merge 0.12->trunk 2024-02-27 17:15:36 +01:00
Kim Alvefur
f7b35d516f net.http.files: Validate argument to setup function
Fixes error in #1765 by throwing an error earlier
2024-02-27 17:14:16 +01:00
Kim Alvefur
18813c2ffa mod_s2s: Comment on why we avoid hostnames in stanza bounce messages 2024-02-24 17:45:50 +01:00
Kim Alvefur
01a44e88db mod_cron: Fix log format to account for float that was integer before 2024-02-24 14:35:17 +01:00
Kim Alvefur
cef925e9a5 mod_cron: Sync Teal source with 92301fa7a673
Yeah, it's weird to have two versions. Needing more build dependencies
is also something we want to avoid, so here we are.
2024-02-24 14:32:59 +01:00
Kim Alvefur
761643abcc util.signal: Wrap signalfd in an userdatum for gc handling etc 2024-02-24 01:00:44 +01:00
Kim Alvefur
49c296360d net.server_epoll: Support hooking signals via signalfd
Handling signal events the same way as all other events makes sense and
seems safer than the signal handling just jumping around in C and
messing with Lua states.
2024-02-24 00:20:35 +01:00
Kim Alvefur
54f76b97d2 util.signal: Add support for signalfd(2) on Linux
signalfd allows handling signal events using the same method as sockets,
via file descriptors. Thus all signal dispatch can go through the same
main event loop as everything else, removing need for thread-scary
signal handling where execution would just jump to the signal handler
regardless of the state of Lua, and needing to keep track of Lua
states/threads.
2024-02-24 00:05:29 +01:00
Matthew Wild
c3af93fce7 features: Add mod_server_info 2024-02-23 22:45:42 +00:00