Commit graph

143 commits

Author SHA1 Message Date
Matthew Wild
5b4624137d mod_c2s: Code formatting change
Although we do sometimes use single-line if blocks, I'm expanding this one to
make it easier to compare with the duplicated (but modified) code in
mod_websocket that we plan to de-duplicate one day.
2025-03-11 18:37:16 +00:00
Matthew Wild
ba53fa2e21 mod_c2s: Add debug log when disconnecting all user sessions 2025-02-06 12:40:11 +00:00
Matthew Wild
6bbfcd801a mod_c2s, mod_s2s: Support for queuing callbacks to run in session thread
This allows certain session-specific code that needs to run in the async
context, but is itself triggered outside of that context (e.g. timers), to
be queued.

An example of this is the session destruction code of mod_smacks, when the
hibernation timeout is reached.
2024-11-21 17:02:07 +00:00
Kim Alvefur
73aed09475 mod_c2s,mod_s2s: Advertise idle-seconds per XEP-0478
This is the time after liveness checks are performed via the respective
read-timeout event, which by default involves sending a space character
but could be overridden e.g. as is done by mod_smacks.

Only advertised, unsure what we would do with it.
2024-08-03 16:28:59 +02:00
Kim Alvefur
2ef771fff8 mod_c2s: Fix error on role change on Components (thanks Menel) 2024-02-17 19:07:57 +01:00
Kim Alvefur
5dfd9d25cd mod_c2s: Make c2s_timeout timer reachable to allow access from other modules
E.g. the timeout could be extended under certain conditions.
2023-12-03 15:46:33 +01:00
Matthew Wild
18db016c2f mod_saslauth, mod_c2s: Disable tls-server-end-point channel binding by default
This channel binding method is now enabled when a hash is manually set in the
config, or it attempts to discover the hash automatically if the value is the
special string "auto".

A related change to mod_c2s prevents complicated certificate lookups in the
client connection hot path - this work now happens only when this channel
binding method is used. I'm not aware of anything else that uses ssl_cfg (vs
ssl_ctx).

Rationale for disabling by default:

- Minor performance impact in automatic cert detection
- This method is weak against a leaked/stolen private key (other methods such
  as 'tls-exporter' would not be compromised in such a case)

Rationale for keeping the implementation:

- For some deployments, this may be the only method available (e.g. due to
  TLS offloading in another process/server).
2023-10-26 15:14:39 +01:00
Matthew Wild
4cc85dc056 mod_c2s: Add session.ssl_cfg/ssl_ctx for direct TLS connections 2022-09-07 11:29:00 +01:00
Kim Alvefur
99cca59d6e plugins: Handle how get_option_period returns "never" 2023-07-21 17:23:00 +02:00
Kim Alvefur
71ad48095d plugins: Use integer config API with interval specification where sensible
Many of these fall into a few categories:
- util.cache size, must be >= 1
- byte or item counts that logically can't be negative
- port numbers that should be in 1..0xffff
2023-07-17 01:38:54 +02:00
Kim Alvefur
1987a7411f plugins: Switch to :get_option_period() for time range options
Improves readability ("1 day" vs 86400) and centralizes validation.
2023-07-16 20:49:33 +02:00
Kim Alvefur
33c20d9cf4 core.sessionmanager: Delay closing a replaced connection after replacement
Closing the session invokes ondisconnect and session close logic,
including mod_smacks hibernation and the timer that destroys the session
after a timeout.

By closing the connection after it has been detached from the sessions
table it will no longer invoke the ondetach handler, which should
prevent the above problem.
2023-05-07 12:27:55 +02:00
Kim Alvefur
4d2ecf1d51 mod_c2s,mod_s2s: Fix tag name for SLA (thanks mjk)
The (still not published) XEP-xxxx: Stream Limits Advertisement uses the
element <max-bytes/> to advertise the maximum octet size of top level
stream elements. "size" was probably a leftover of an even earlier
version of the (Proto)XEP.
2023-05-03 18:02:11 +02:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Kim Alvefur
893dce647b mod_c2s: Disconnect accounts when they are disabled
We decided that at the first stage, accounts that are disabled should
simply be prevented from authenticating, thus they should also be
prevented from having connected sessions.  Since this is aimed to be a
moderation action for cases of abuse, they shouldn't be allowed to
continue being connected.
2023-02-23 16:28:57 +01:00
Kim Alvefur
a46ae8cb89 mod_c2s,mod_s2s: Adapt to XEP-xxxx: Stream Limits Advertisement
Thanks MattJ
2022-10-20 14:04:56 +02:00
Kim Alvefur
b8c31f2d5c mod_c2s: Advertise stanza size limit to clients
Should help clients avoid sending stanzas that will get their stream
killed.  Custom namespace while ironing out the protocol.

My spoon is too big!
2021-03-16 18:17:05 +01:00
Matthew Wild
fdf61a38cf mod_c2s: Include stream attributes in stream-features event
We need this to access 'from' in SASL2/FAST.
2022-10-14 11:21:16 +01:00
Matthew Wild
54fcc029c8 mod_smacks: Long overdue cleanup of resumption code, fixes some old TODOs 2022-08-26 17:04:15 +01:00
Matthew Wild
f5768f63c9 mod_authz_internal, and more: New iteration of role API
These changes to the API (hopefully the last) introduce a cleaner separation
between the user's primary (default) role, and their secondary (optional)
roles.

To keep the code sane and reduce complexity, a data migration is needed for
people using stored roles in 0.12. This can be performed with

  prosodyctl mod_authz_internal migrate <host>
2022-08-17 16:38:53 +01:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Kim Alvefur
36512eca29 mod_c2s,mod_s2s: Fix error on shutdown (Thanks Martin)
Since there are two calls to done() that can happen, if the timing is
right (or wrong) both can happen, which previously triggered an error.
2022-02-22 14:17:27 +01:00
Kim Alvefur
1d20ec63e6 mod_c2s,mod_s2s: Wrap callback to improve tracebacks
Should make traces point here instead of timer dispatch, making
debugging easier
2022-02-22 12:35:31 +01:00
Kim Alvefur
b70a61be4c mod_c2s: Ignore unused event payload [luacheck] 2022-02-18 23:13:01 +01:00
Kim Alvefur
a8f4892fe3 mod_c2s,mod_s2s: Wait for sessions to close before proceeding with shutdown steps
Ensures unavailable presence and other outgoing stanzas are sent.

Waiting for c2s sessions to close first before proceeding to disable and
close s2s ensures that unavailable presence can go out, even if it
requires dialback to complete first.
2022-02-17 03:49:47 +01:00
Kim Alvefur
13dc49d1a7 mod_c2s: Close ports in a separate, earlier event from closing sessions
Lets other things step in and do things while c2s ports are closed, e.g.
mod_smacks, or other modules with port handlers that forward to c2s.
2022-02-18 14:25:22 +01:00
Kim Alvefur
f56aaf1ba1 mod_c2s,mod_s2s: Disable and close port listeners before closing sessions
This ensures no new clients can start connecting during shutdown
2022-02-11 21:36:53 +01:00
Kim Alvefur
6c98ee025e mod_c2s: Fire pre-closing event regardless of connected state
With mod_smacks, a session can outlive the connection, so whether the
event is fired should not hinge on whether the session is connected or
not.

Helps mod_smacks remove some state.
2021-12-18 13:43:57 +01:00
Kim Alvefur
d02e79c6a9 mod_c2s: Add event just before closing as session
To allow modules to do things just before the session is closed. The
'(pre-)resource-unbind' events are fired after the stream is closed,
leaving no way to send something.
2021-12-01 15:06:48 +01:00
Matthew Wild
1a64d5d876 mod_c2s: Disconnect user sessions on a role change event
The overlapping logic for deletion and password changed has been merged into
a single function.
2021-11-12 13:26:05 +00:00
Kim Alvefur
ef6cb64b9e mod_c2s,etc: Identify stanza object with appropriate function
Better than duck typing, in case anyone ever passes a non-stanza table
with a 'name' field.
2021-10-24 15:17:01 +02:00
Kim Alvefur
f24aba7b19 mod_c2s: Rename Direct TLS listener 'c2s_direct_tls' for clarity
And to follow existing naming practices better than 'legacy_ssl' did.
2021-09-09 22:14:43 +02:00
Kim Alvefur
8bde7461c1 mod_c2s,mod_s2s: Indicate stanza size violation with condition from XEP-0205 (thanks mjk) 2021-09-06 23:21:25 +02:00
Kim Alvefur
48216c1dc8 mod_c2s,mod_s2s: Fire event just before writes
Could allow e.g. a XEP-0198 implementation to efficiently send ack
requests at optimal times without using timers or nextTick.
2021-08-16 12:45:14 +02:00
Kim Alvefur
814a3a3482 mod_c2s: Guard against LuaSec not returning TLS info (thanks Martin)
The :info() method has been observed to return nothing ... sometimes.
Unclear what causes it. Perhaps the TLS connection was shut down or
hasn't fully settled?

The LuaSec code has code paths that return nothing or nil, error, so it
is best to guard against it.
2021-06-21 13:36:05 +02:00
Kim Alvefur
0acd505f2e mod_c2s: Log the same messages for Direct TLS as with starttls
^C^V
2021-06-20 18:15:59 +02:00
Kim Alvefur
807c78400f mod_c2s: Update a comment to reflect Direct TLS 2021-06-20 18:14:18 +02:00
Kim Alvefur
db64810141 mod_c2s: Add a Direct TLS listener
This only differs from 'legacy_ssl' in name, at least on the server
side. For clients this is the one that uses SRV records.
2021-06-20 16:51:08 +02:00
Kim Alvefur
aa041ffa10 mod_c2s,mod_s2s: Collect stats on TLS versions and ciphers 2021-06-16 00:00:17 +02:00
Matthew Wild
5bc8b2a379 Merge 0.11->trunk 2021-05-13 11:17:13 +01:00
Jonas Schäfer
2bfa403e36 mod_c2s: Port to new OpenMetrics API 2021-04-18 12:34:17 +02:00
Kim Alvefur
21fa25b27b mod_c2s: Fix traceback if session was destroyed while opening stream (thanks Ge0rG)
Could happen with the 'opportunistic_writes' setting, since then the
stream opening is written directly to the socket, which can in turn
trigger session destruction if the socket somehow got closed just after
the other sent their stream header.

Error happens later when it tries to `hosts[session.host == nil].events`
2021-04-14 16:02:47 +02:00
Kim Alvefur
7c5659808a Merge 0.11->trunk 2021-04-10 16:45:44 +02:00
Kim Alvefur
72cb2e0362 mod_c2s: Log about missing conn on async state changes 2021-03-18 16:24:46 +01:00
Kim Alvefur
846862e1e7 mod_c2s: Improve code style
We don't use the quoted table indexing style that often, it's not needed
here and it's enough to check for falsyness rather than `nil`.
2021-03-18 16:23:47 +01:00
Kim Alvefur
b5f808c769 mod_c2s: Fix traceback in session close when conn is nil
Unclear how this happens.
2021-03-17 12:47:16 +01:00
tmolitor
2b0c472f87 mod_c2s: Don't throw errors in async code when connections are gone
Fixes #1507
2021-03-18 14:30:32 +01:00
Kim Alvefur
f7cfe660cd mod_c2s: Log a debug message before closing due to c2s_timeout
It was confusing that the connection would just close without much
explanation.

Wanted this while investigating https://github.com/conversejs/converse.js/issues/2438
2021-03-23 21:46:11 +01:00
Kim Alvefur
2845337d4b mod_c2s: Reflect stream 'from' attribute back if set (fix #1625)
Clients should *not* be setting this before TLS anyways.
2021-02-03 21:41:45 +01:00
Kim Alvefur
c90918837e mod_c2s,mod_s2s: Make stanza size limits configurable 2020-05-31 22:39:34 +02:00