Kim Alvefur
93ddf6892c
prosody.loader: Ensure already loaded modules are found in old and new namespaces
...
Prevents modules being initialized twice, ensuring that
require"prosody.util.foo" == require"util.foo"
2023-03-17 15:11:26 +01:00
Kim Alvefur
d06cc5176b
prosody.loader: Incorporate search path rewrite patch from Debian packages
...
Nice to drop that patch.
Will allow loading this to do something both when installed under a
prosody directory or from a source checkout.
2023-03-17 14:36:02 +01:00
Kim Alvefur
d33f55156b
prosody.loader: Allow loading modules under 'prosody' namespace ( #1223 )
...
Actually `hg mv`-ing all the files is disruptive, basically breaking
everything from rebasing all my WIP draft commits to the package
building. So instead, what if we didn't and instead rewrote package
names as they are `require()`-d?
Debian packages produced by the Prosody are already installed into this
structure so much will Just Work if all require calls are updated.
2023-03-17 13:51:43 +01:00
Kim Alvefur
9dd7ce434d
mod_auth_internal_hashed: Shorten call path
...
Why did it call a function defined in the same module through
usermanager?
2023-03-18 16:13:32 +01:00
Kim Alvefur
c11d121c06
util.sasl.{scram,plain}: Pass authzid to SASL profile callback
...
For potential future use.
Used for logging into a different account than the one used for
authentication.
2023-03-16 13:57:30 +01:00
Kim Alvefur
f23ad827a3
util.jsonschema: Disable some further new failing tests
...
Absolute references, weird fractions, unevaluatedProperties???
2023-03-11 12:12:49 +01:00
Kim Alvefur
fc0e882e29
util.jsonschema: Ignore some new tests in test suite
...
These seem to be using absolute URI references, Not Yet Implemented
2023-03-11 12:01:17 +01:00
Matthew Wild
7a6d2e1226
util.table: Expand table.move() tests (thanks mutation testing)
2023-03-17 17:06:05 +00:00
Kim Alvefur
b156f013c4
util.sasl.scram: Fix off-by-one indentation
2023-03-16 13:52:22 +01:00
Kim Alvefur
2331fc8b65
util.sasl.oauthbearer: Adjust parsing of GS2 to allow lack of authzid
...
Partly copied from util.sasl.scram and then reduced a bit.
2023-03-16 13:45:49 +01:00
Kim Alvefur
8aecd19812
doap: Sort by XEP number
...
To keep them sorted.
Not pedantic at all!
2023-03-16 13:20:19 +01:00
Kim Alvefur
566a991f84
util.sasl.oauthbearer: Return username from callback instead using authzid (BC)
...
RFC 6120 states that
> If the initiating entity does not wish to act on behalf of another
> entity, it MUST NOT provide an authorization identity.
Thus it seems weird to require it here. We can instead expect an
username from the token data passed back from the profile.
This follows the practice of util.sasl.external where the profile
callback returns the selected username, making the authentication module
responsible for extracting the username from the token.
2023-03-16 12:18:23 +01:00
Matthew Wild
944c25f352
util.sasl.oauthbearer: Fix syntax error in b796e08e6376
2023-03-15 12:02:23 +00:00
Matthew Wild
9dedc78f3c
util.sasl.oauthbearer: Attach token_info to sasl handler
...
This allows token-aware things to access extra information about the
authentication, such as when the token is due to expire and the attached
custom 'data'.
2023-03-15 09:41:38 +00:00
Kim Alvefur
adb37b8272
util.ip: Add Teal interface description
2023-03-14 19:46:46 +01:00
Matthew Wild
55106e91ce
util.ip: Tests for truncate()
2023-03-14 18:40:16 +00:00
Kim Alvefur
5afb393d53
mod_auth_internal_hashed: Record time of account disable / re-enable
...
Could be useful for e.g. #1772
2023-03-12 01:24:59 +01:00
Matthew Wild
84c0204ea2
util.ip: Add ip.truncate() to return a new IP with only the prefix of another
2023-03-14 18:24:58 +00:00
Matthew Wild
3eedf79c8b
util.ip: Add is_ip() helper method to detect if an object is an ip object
2023-03-14 18:23:33 +00:00
Kim Alvefur
9c8b2f5099
doap: Add RFC 7628 introduced in ab1164eda011
2023-03-12 13:05:50 +01:00
Kim Alvefur
b64d6afeab
util.jwt: Import definition of key from util.crypto
...
Turns out we had a definition of that already
2023-03-10 13:58:43 +01:00
Kim Alvefur
7623bc24de
util.jwt: Fixup argument and type order
2023-03-10 13:58:14 +01:00
Kim Alvefur
c425da3c6a
mod_admin_shell: Limit module dependency listings to loaded on current host
...
E.g. module:info("http") with many http modules loaded would show a lot
of duplication, as each module would be listed for each host, even if
not actually enabled on that host.
2023-03-10 12:33:02 +01:00
Kim Alvefur
4fa75289f6
util.jwt: Document interface as Teal definition file
2023-03-10 10:55:50 +01:00
Kim Alvefur
cb65c58950
mod_authz_internal: Fix wrong role name field in user_can_assume_role()
...
Made it reject the primary role since it compares against a non-existent
field, i.e. nil.
2023-03-09 16:02:55 +01:00
Kim Alvefur
11a3373e89
Merge 0.12->trunk
2023-03-05 15:45:44 +01:00
Kim Alvefur
0890b20fbf
mod_http: Unhook CORS handlers only if active ( fixes #1801 )
2023-03-05 15:45:01 +01:00
Kim Alvefur
283322543e
mod_admin_shell: Show reverse dependencies in module:info()
...
Why was this module loaded? Now you can find out!
2023-03-05 14:08:26 +01:00
Kim Alvefur
32445b3082
core.moduleapi: Record reverse dependencies
...
Useful to know why a module was auto-loaded without having to dig trough
all other modules for the one that depends on it.
2023-03-05 14:07:08 +01:00
Kim Alvefur
4d46c27840
authz: Add method for retrieving all roles
...
Some of the OAuth stuff highlights a small need to retrieve a list of
roles somehow. Handy if you ever need a role selector in adhoc or
something.
Unless there's some O(n) thing we were avoiding?
2023-03-04 18:40:43 +01:00
Kim Alvefur
7b7cad2b66
mod_tokenauth: Fix misplaced closing parenthesis
...
`type(x ~= y)` is always a string, thus truthy
2023-03-02 22:34:29 +01:00
Kim Alvefur
aabfdaf01a
util.sasl.oauthbearer: Fix traceback on authz in unexpected format
...
E.g. if you were to just pass "username" without @hostname, the split
will return nil, "username" and the nil gets passed to saslprep() and it
does not like that.
2023-03-02 14:37:46 +01:00
Matthew Wild
9e02d322d8
mod_tokenauth: Gracefully handle missing tokens
2023-03-01 18:43:54 +00:00
Matthew Wild
4ce832123e
mod_auth_internal_hashed: Add oauthbearer handler to our SASL profile
2023-03-01 13:05:17 +00:00
Matthew Wild
b435f6d52a
mod_tokenauth: Add SASL handler backend that can accept and verify tokens
...
This is designed for use by other modules that want to accept tokens issued
by mod_tokenauth, without duplicating all the necessary logic.
2023-03-01 13:04:36 +00:00
Matthew Wild
f3d152eb1b
mod_tokenauth: Add some sanity checking of the new optional parameters
2023-03-01 13:02:51 +00:00
Matthew Wild
a58a6d2317
mod_tokenauth: Add 'purpose' constraint
...
This allows tokens to be tied to specific purposes/protocols. For example, we
shouldn't (without specific consideration) allow an OAuth token to be dropped
into a slot expecting a FAST token.
While FAST doesn't currently use mod_tokenauth, it and others may do in the
future. It's better to be explicit about what kind of token code is issuing or
expecting.
2023-03-01 13:01:21 +00:00
Matthew Wild
16137b3b14
mod_saslauth: Support for SASL handlers forcing a specific resource
...
The token layer supports tokens that are tied to a given resource.
2023-03-01 12:56:08 +00:00
Matthew Wild
6db4afa0c3
util.sasl: Add SASL OAUTHBEARER mechanism (RFC 7628)
2023-03-01 12:55:00 +00:00
Kim Alvefur
d5661f1de3
mod_admin_adhoc: Add XEP-0133 commands to Disable and Re-Enable users
...
Enables UI in clients supporting XEP-0050
2023-02-23 18:39:02 +01:00
Kim Alvefur
087ffc7f32
CHANGES: Mention new ability to disable and enable user accounts
2023-02-23 18:11:15 +01:00
Kim Alvefur
701fb4fce0
mod_admin_shell: Add commands to disable and enable accounts
...
First proper UI to enable/disable, allowing it to be tested.
2023-02-23 18:10:06 +01:00
Kim Alvefur
893dce647b
mod_c2s: Disconnect accounts when they are disabled
...
We decided that at the first stage, accounts that are disabled should
simply be prevented from authenticating, thus they should also be
prevented from having connected sessions. Since this is aimed to be a
moderation action for cases of abuse, they shouldn't be allowed to
continue being connected.
2023-02-23 16:28:57 +01:00
Kim Alvefur
bb65a83696
core.usermanager: Fire events when enabling and disabling users
...
Allow modules to act on this state change, e.g. kick accounts etc.
2023-02-23 16:25:31 +01:00
Kim Alvefur
931c14e50b
core.usermanager: Add methods for enabling and disabling users
...
Calling into the auth module, where available.
2023-02-23 16:24:41 +01:00
Kim Alvefur
ef6ad34029
core.usermanager: Add Teal description file
2023-02-23 16:04:02 +01:00
Kim Alvefur
fe206323b5
mod_auth_internal_hashed: Implement methods to enable and disable users
2023-02-23 14:44:35 +01:00
Kim Alvefur
96acef2170
mod_auth_internal_hashed: Implement is_enabled() method
...
Uses 'disabled' property already introduced in aed38948791f
2023-02-23 14:34:10 +01:00
Kim Alvefur
9c49ca70fd
util.prosodyctl.check: Suggest 'http_cors_override' instead of older CORS settings
...
The cross_domain_* settings were added here prior to http_cors_override
being added back in 17d87fb2312a, so for a time there was no
replacement, but now there is.
2023-02-22 22:27:42 +01:00
Kim Alvefur
4704e98af6
mod_auth_internal_hashed: Add stub methods for enabling and disabling users
...
But how and where?
2023-02-22 15:32:40 +01:00