Commit graph

5294 commits

Author SHA1 Message Date
Kim Alvefur
9dd7ce434d mod_auth_internal_hashed: Shorten call path
Why did it call a function defined in the same module through
usermanager?
2023-03-18 16:13:32 +01:00
Kim Alvefur
566a991f84 util.sasl.oauthbearer: Return username from callback instead using authzid (BC)
RFC 6120 states that
>  If the initiating entity does not wish to act on behalf of another
>  entity, it MUST NOT provide an authorization identity.

Thus it seems weird to require it here.  We can instead expect an
username from the token data passed back from the profile.

This follows the practice of util.sasl.external where the profile
callback returns the selected username, making the authentication module
responsible for extracting the username from the token.
2023-03-16 12:18:23 +01:00
Kim Alvefur
5afb393d53 mod_auth_internal_hashed: Record time of account disable / re-enable
Could be useful for e.g. #1772
2023-03-12 01:24:59 +01:00
Kim Alvefur
c425da3c6a mod_admin_shell: Limit module dependency listings to loaded on current host
E.g. module:info("http") with many http modules loaded would show a lot
of duplication, as each module would be listed for each host, even if
not actually enabled on that host.
2023-03-10 12:33:02 +01:00
Kim Alvefur
cb65c58950 mod_authz_internal: Fix wrong role name field in user_can_assume_role()
Made it reject the primary role since it compares against a non-existent
field, i.e. nil.
2023-03-09 16:02:55 +01:00
Kim Alvefur
11a3373e89 Merge 0.12->trunk 2023-03-05 15:45:44 +01:00
Kim Alvefur
0890b20fbf mod_http: Unhook CORS handlers only if active (fixes #1801) 2023-03-05 15:45:01 +01:00
Kim Alvefur
283322543e mod_admin_shell: Show reverse dependencies in module:info()
Why was this module loaded? Now you can find out!
2023-03-05 14:08:26 +01:00
Kim Alvefur
4d46c27840 authz: Add method for retrieving all roles
Some of the OAuth stuff highlights a small need to retrieve a list of
roles somehow. Handy if you ever need a role selector in adhoc or
something.

Unless there's some O(n) thing we were avoiding?
2023-03-04 18:40:43 +01:00
Kim Alvefur
7b7cad2b66 mod_tokenauth: Fix misplaced closing parenthesis
`type(x ~= y)` is always a string, thus truthy
2023-03-02 22:34:29 +01:00
Matthew Wild
9e02d322d8 mod_tokenauth: Gracefully handle missing tokens 2023-03-01 18:43:54 +00:00
Matthew Wild
4ce832123e mod_auth_internal_hashed: Add oauthbearer handler to our SASL profile 2023-03-01 13:05:17 +00:00
Matthew Wild
b435f6d52a mod_tokenauth: Add SASL handler backend that can accept and verify tokens
This is designed for use by other modules that want to accept tokens issued
by mod_tokenauth, without duplicating all the necessary logic.
2023-03-01 13:04:36 +00:00
Matthew Wild
f3d152eb1b mod_tokenauth: Add some sanity checking of the new optional parameters 2023-03-01 13:02:51 +00:00
Matthew Wild
a58a6d2317 mod_tokenauth: Add 'purpose' constraint
This allows tokens to be tied to specific purposes/protocols. For example, we
shouldn't (without specific consideration) allow an OAuth token to be dropped
into a slot expecting a FAST token.

While FAST doesn't currently use mod_tokenauth, it and others may do in the
future. It's better to be explicit about what kind of token code is issuing or
expecting.
2023-03-01 13:01:21 +00:00
Matthew Wild
16137b3b14 mod_saslauth: Support for SASL handlers forcing a specific resource
The token layer supports tokens that are tied to a given resource.
2023-03-01 12:56:08 +00:00
Kim Alvefur
d5661f1de3 mod_admin_adhoc: Add XEP-0133 commands to Disable and Re-Enable users
Enables UI in clients supporting XEP-0050
2023-02-23 18:39:02 +01:00
Kim Alvefur
701fb4fce0 mod_admin_shell: Add commands to disable and enable accounts
First proper UI to enable/disable, allowing it to be tested.
2023-02-23 18:10:06 +01:00
Kim Alvefur
893dce647b mod_c2s: Disconnect accounts when they are disabled
We decided that at the first stage, accounts that are disabled should
simply be prevented from authenticating, thus they should also be
prevented from having connected sessions.  Since this is aimed to be a
moderation action for cases of abuse, they shouldn't be allowed to
continue being connected.
2023-02-23 16:28:57 +01:00
Kim Alvefur
fe206323b5 mod_auth_internal_hashed: Implement methods to enable and disable users 2023-02-23 14:44:35 +01:00
Kim Alvefur
96acef2170 mod_auth_internal_hashed: Implement is_enabled() method
Uses 'disabled' property already introduced in aed38948791f
2023-02-23 14:34:10 +01:00
Kim Alvefur
4704e98af6 mod_auth_internal_hashed: Add stub methods for enabling and disabling users
But how and where?
2023-02-22 15:32:40 +01:00
Kim Alvefur
01fedfa5be mod_auth_internal_hashed: Refactor to prepare for disabling users
Moving this out will make space for a dynamic check whether a particular
user is disabled or not, which is one possible response to abuse of
account privileges.
2023-02-22 13:27:08 +01:00
Matthew Wild
a3d7c77607 Merge 0.12->trunk 2023-02-20 18:10:36 +00:00
Matthew Wild
4dcabd36ce mod_websocket: Fire pre-session-close event (fixes #1800)
This event was added in a7c183bb4e64 and is required to make mod_smacks know
that a session was intentionally closed and shouldn't be hibernated (see
fcea4d9e7502).

Because this was missing from mod_websocket's session.close(), mod_smacks
would always attempt to hibernate websocket sessions even if they closed
cleanly.

That mod_websocket has its own copy of session.close() is something to fix
another day (probably not in the stable branch). So for now this commit makes
the minimal change to get things working again.

Thanks to Damian and the Jitsi team for reporting.
2023-02-20 18:10:15 +00:00
Kim Alvefur
02b01c4826 Merge 0.12->trunk 2023-02-16 20:15:39 +01:00
Kim Alvefur
67ea0ee50e mod_admin_socket: Return error on unhandled input to prevent apparent freeze
When mod_admin_socket is loaded without mod_admin_shell, attempt to use
`prosodyctl shell` will appear to freeze after any input, since no
response is returned.
2023-02-16 17:20:09 +01:00
Kim Alvefur
3605137656 mod_storage_sql: Remove module status on unknown 'debug' level
Expected this to be translated to 'core', but it logs an error instead.
See previous commit.
2023-01-31 07:52:33 +01:00
Kim Alvefur
89f652ff0b mod_storage_sql: Silence luacheck warning 2023-01-30 00:40:47 +01:00
Kim Alvefur
0147b972e0 mod_storage_sql: Record connection to database as module status
Allows retrieving this in e.g. a health reporting module

Thanks pfak
2023-01-30 00:38:26 +01:00
Kim Alvefur
dc958f1e40 mod_admin_shell: Match substring in muc:affiliations() like muc:occupants()
Maybe one day we'll get consistent filtering semantics everywhere.
2023-01-30 00:14:50 +01:00
Kim Alvefur
1b71a53fb7 mod_admin_shell: Sort MUC users by relation and JID
Suggested by MattJ, our resident UI expert :)
2023-01-29 21:37:13 +01:00
Kim Alvefur
5c676bab58 mod_admin_shell: Make Role and Affiliation columns the same width for aesthetics
The length of the title "Affiliation" made them both close enough that
it looked off.
2023-01-29 18:57:28 +01:00
Kim Alvefur
6e120ad485 mod_admin_shell: Use tables to present MUC users
Tables are awesome!
2023-01-29 18:31:25 +01:00
Kim Alvefur
d5b5b5ba86 mod_admin_shell: Factor out room retrieval into common function
Justification: See diffstat
2023-01-29 17:55:56 +01:00
Kim Alvefur
08a730746c mod_admin_shell: Add muc:affiliations(room) command to list memberships
Easier than going trough muc:room():each_affiliation() since you have to
do fiddly things to reach the print() function.
2023-01-29 17:53:21 +01:00
Kim Alvefur
2b0584d2ee mod_admin_shell: Add muc:occupants(room) command to list occupants
Easier than going trough muc:room():each_occupant() since you have to do
fiddly things to reach the print() function.
2023-01-29 17:41:08 +01:00
Kim Alvefur
27d63ff731 mod_muc_mam: Use higher precision timestamps
See also 781772c8b6d9
2023-01-21 17:24:45 +01:00
Kim Alvefur
dbbde4a0f0 Merge 0.12->trunk 2023-01-21 17:18:16 +01:00
Kim Alvefur
81fd03356f mod_muc_mam: Copy "include total" behavior from mod_mam
Not sure why this was missing from MUC MAM, it already had some of the
code for dealing with it.
2023-01-21 17:14:55 +01:00
Kim Alvefur
d0321442c9 mod_muc_mam: Add mam#extended form fields #1796 (Thanks Rain)
Oversight in cabb022f31c0
2023-01-21 17:09:22 +01:00
Kim Alvefur
4830568435 mod_mam,mod_muc_mam: Minimize differences (reorder, copy some comments)
Should have no functional difference, but makes it easier keeping
mod_mam and mod_muc_mam in sync.
2023-01-21 16:54:43 +01:00
Kim Alvefur
0aae39f660 MUC: Add note about non-existant room method 2023-01-20 19:47:00 +01:00
Kim Alvefur
b15a8e1360 mod_admin_socket: Fix typo in comments
Introduced in 6966026262f4
2023-01-20 18:16:10 +01:00
Kim Alvefur
762e56920b Merge 0.12->trunk 2023-01-19 21:14:31 +01:00
Kim Alvefur
67b6440d9b mod_smacks: Log something when hibernation starts
Will hopefully save future confusion about sessions being destroyed when
they are in fact not.
2023-01-19 20:59:28 +01:00
Kim Alvefur
b18280d35f mod_invites: Prefer landing page over xmpp URI in shell command
To mirror behavior of prosodyctl invocation
2023-01-10 21:10:58 +01:00
Kim Alvefur
91a064bd49 mod_storage_sql: Fix #1639
Patch by Peter Kieser
2023-01-01 16:20:58 +01:00
Kim Alvefur
2317f6a09f mod_storage_sql: Don't avoid initialization under prosodyctl (fix #1787)
Fixes `prosodyctl adduser` etc.

Prior to d580e6a57cbb the line did nothing.

Sometimes storage in the prosodyctl context does cause weirdness, as it
is not in a host context, but rather a variant of global.
2022-12-29 18:06:35 +01:00
Kim Alvefur
d158455de6 mod_smacks: Disable resumption behavior on s2s
Since resumption is not supported on s2s currently, there is no point in
allocating resumption tokens.  The code that removes entries from
session_registry is only invoked for c2s sessions, thus enabling
resumable smacks on s2s adds an entry that never goes away.
2022-11-13 18:16:59 +01:00