Commit graph

1886 commits

Author SHA1 Message Date
Matthew Wild
7309514c2d features: Add "keyval+" 2023-03-21 18:57:33 +00:00
Matthew Wild
2460207d50 storagemanager: Add keyval+ (combined keyval + map) store type
This combines the two most common store types, which modules often end up
opening with both interfaces separately anyway.

As well as combining them, I've taken the opportunity to improve some of the
method names to make them clearer.
2022-09-27 17:46:27 +01:00
Kim Alvefur
784ad4b1ba core.features: Add feature for prosody.loader
Allows modules explicit dependencies upon its availability
2023-03-18 18:20:03 +01:00
Kim Alvefur
32445b3082 core.moduleapi: Record reverse dependencies
Useful to know why a module was auto-loaded without having to dig trough
all other modules for the one that depends on it.
2023-03-05 14:07:08 +01:00
Kim Alvefur
4d46c27840 authz: Add method for retrieving all roles
Some of the OAuth stuff highlights a small need to retrieve a list of
roles somehow. Handy if you ever need a role selector in adhoc or
something.

Unless there's some O(n) thing we were avoiding?
2023-03-04 18:40:43 +01:00
Kim Alvefur
bb65a83696 core.usermanager: Fire events when enabling and disabling users
Allow modules to act on this state change, e.g. kick accounts etc.
2023-02-23 16:25:31 +01:00
Kim Alvefur
931c14e50b core.usermanager: Add methods for enabling and disabling users
Calling into the auth module, where available.
2023-02-23 16:24:41 +01:00
Matthew Wild
8bc31437bc Merge 0.12->trunk 2023-02-09 22:34:05 +00:00
Matthew Wild
a4556fc67a sessionmanager: Improve logging around session destruction 2023-02-09 15:09:03 +00:00
Kim Alvefur
d90a094949 core.moduleapi: Fix passing variable to logging 2023-01-31 07:48:21 +01:00
Kim Alvefur
d616d70f3c core.sessionmanager: Mark session as destroyed to prevent reentry
If it reaches this point, then the session will be most definitely be
destroyed, so try to prevent destroy_session() from being called again.
2023-01-19 21:40:09 +01:00
Kim Alvefur
b89b219406 core.sessionmanager: Skip log when (not) destroying destroyed sessions
On regular disconnects, </stream> is sent, then
sessionmanager.destroy_session() is called, then
sessionmanager.destroy_session() is called again when the TCP connection
is closed, from ondisconnect in mod_c2s.

It is a bit annoying and doesn't really tell you much.
2023-01-19 21:38:14 +01:00
Kim Alvefur
814817ebf2 core.s2smanager: Don't remove unrelated session on close of bidi session
Normally with bidi, any outgoing connection should be the same as the
incoming, hence when closing a bidi connection it should be removed as a
route to the remote server. However it is not guaranteed, a remote bidi-capable server
might have decided to open a new connection for some reason. This can
lead to a situation where there are two bidi connections, and the s2sout
route is a locally initiated s2sout connection. In this case, such a
s2sout connection should be kept.

Noticed in a rare case where bidi has just been enabled on a running
server, and something establishes new connections immediately when a
connection is closed.
2022-06-27 01:22:36 +02:00
Kim Alvefur
1f668fed00 core.certmanager: Expand debug messages about cert lookups in index
Answers my recurring question of
> Using cert "certs/example.com.crt" from index
... for what?
2022-05-16 11:39:17 +02:00
Kim Alvefur
9e5bf4fc48 core.moduleapi: Fix 'global' property via :context() - #1748
The 'global' property should reflect whether the module API instance
represents the global context or a VirtualHost or Component context.
However the module:context() method did not override this, leading the
property of the previous module shining trough, leading to bugs in code
relying on the 'global' property.

See also #1736
2022-04-27 17:18:46 +02:00
Kim Alvefur
a696800291 core.modulemanager: Fix global flag on per-host instances of shared modules (fix #1736)
This flag is something of a shortcut for `module.host == "*"` and should
always be equal to that. Its absence on the proxy object made the
property of the global module instance visible, causing problems such as
with URL reporting in mod_http
2022-04-04 18:44:57 +02:00
Matthew Wild
0f493bd245 configmanager: Clearer errors when providing unexpected values after VirtualHost (fixes #1735, thanks arawaks) 2022-04-03 12:56:11 +01:00
Matthew Wild
a52c531dc5 configmanager: Add method to report loaded config files (part of #1729 fix) 2022-03-28 11:41:32 +01:00
Kim Alvefur
43351d2b54 Spelling: Fix various spelling mistakes (thanks timeless)
Words, sometimes I wonder how they even work

Maybe I missed something.
2022-03-07 00:13:56 +01:00
Matthew Wild
b47c7951d5 Merge config-updates+check-turn from timber 2022-03-04 16:33:41 +00:00
Kim Alvefur
c460117e3c core.portmanager: Fix traceback on attempt to get non-existent service
If there's no such interface:port then `data` is nil and `data.service`
errors.
2022-02-22 13:41:05 +01:00
Kim Alvefur
dd1e42f499 core.certmanager: Ensure key exists for fullchain
Since 5cd075ed4fd3 any file matching "fullchain" would be considered for
use.

Dehydrated stores fullchain certs in e.g, fullchain-1641171024.pem and a
symlink fullchain.pem pointing at the latest one. However the current
rule for finding a corresponding private key would try
privkey-1641171024.pem in the same directory, which may not exist.
2022-02-21 08:54:39 +01:00
Matthew Wild
45978d6be2 sessionmanager: Fire event before retiring old session
This allows for modules to update fields, which is generally better than
maintaining this hard-coded list of transferable properties here.
2022-12-29 16:25:00 +00:00
Matthew Wild
51bf5f2d34 sessionmanager: Pluck sasl_handler from old session when resuming (fixes #1785) 2022-12-29 16:23:08 +00:00
Matthew Wild
067a0ad4d8 usermanager, mod_saslauth: Default to internal_hashed if no auth module specified
The default config was updated in this way long ago, but if no option was
present in the config, Prosody would load internal_plain.

This change can result in changes (for the better) for people using very old
configuration files lacking an 'authentication' setting.
2022-02-10 19:54:14 +00:00
Kim Alvefur
406b90d31d core.certmanager: Turn soft dependency on LuaSec into a hard
The default network backend server_epoll already requires LuaSec so
Prosody won't even start without it, so we can get rid of these lines
here too.
2022-02-10 17:15:55 +01:00
Kim Alvefur
03b3b1b9ad core.moduleapi: Check for local role-aware sessions before e.g. s2s
The condition checked for s2sin but not s2sout, so would have ignored
bidi-enabled s2sout sessions.  Components as well.
2022-08-29 11:47:31 +02:00
Kim Alvefur
6a37ab6356 core.usermanager: Link to docs for new role API to make warning more actionable 2022-08-27 17:01:36 +02:00
Kim Alvefur
a018497a27 mod_s2s: Simplify conditionals since all sessions should have .host now 2022-08-26 19:10:15 +02:00
Matthew Wild
54fcc029c8 mod_smacks: Long overdue cleanup of resumption code, fixes some old TODOs 2022-08-26 17:04:15 +01:00
Kim Alvefur
b608af36ed core.usermanager: Update argument name in authz fallback method
It's not plural
2022-08-18 15:42:07 +02:00
Kim Alvefur
1f4b94adab core.usermanager: Remove obsolete authz fallback method 2022-08-18 15:38:18 +02:00
Kim Alvefur
51b17f1c20 core.usermanager: Add missing methods to fallback authz provider 2022-08-18 14:10:21 +02:00
Kim Alvefur
8bed557afd core.usermanager: Add scoped luacheck ignore rule to reduce clutter 2022-08-18 14:07:54 +02:00
Matthew Wild
f75ac951b5 mod_authz_internal: Expose convenience method to test if user can assume role 2022-08-18 10:37:59 +01:00
Matthew Wild
f5768f63c9 mod_authz_internal, and more: New iteration of role API
These changes to the API (hopefully the last) introduce a cleaner separation
between the user's primary (default) role, and their secondary (optional)
roles.

To keep the code sane and reduce complexity, a data migration is needed for
people using stored roles in 0.12. This can be performed with

  prosodyctl mod_authz_internal migrate <host>
2022-08-17 16:38:53 +01:00
Matthew Wild
ae3a89375d usermanager: Add back temporary is_admin to warn about deprecated API usage
Goal: Introduce role-auth with minimal disruption

is_admin() is unsafe in a system with per-session permissions, so it has been
deprecated.

Roll-out approach:

1) First, log a warning when is_admin() is used. It should continue to
   function normally, backed by the new role API. Nothing is really using
   per-session authz yet, so there is minimal security concern.

   The 'strict_deprecate_is_admin' global setting can be set to 'true' to
   force a hard failure of is_admin() attempts (it will log an error and
   always return false).

2) In some time (at least 1 week), but possibly longer depending on the number
   of affected deployments: switch 'strict_deprecate_is_admin' to 'true' by
   default. It can still be disabled for systems that need it.

3) Further in the future, before the next release, the option will be removed
   and is_admin() will be permanently disabled.
2022-08-15 15:25:07 +01:00
Matthew Wild
7ccf41ebb5 usermanager: Remove concept of global authz provider
Rationale:

- Removes a bunch of code!
- We don't have many cases where an actor is not bound to one of our hosts
- A notable exception is the admin shell, but if we ever attempt to lock those
  sessions down, there is a load of other work that also has to be done. And
  it's not clear if we would need a global authz provider for that anyway.
- Removes an extra edge case from the necessary mental model for operators
- Sessions that aren't bound to a host generally are anonymous or have an
  alternative auth model (such as by IP addres).
- With the encapsulation now provided by util.roles, ad-hoc "detached roles"
  can still be created anyway by code that needs them.
2022-08-12 16:21:57 +01:00
Matthew Wild
bd2b2af7b7 usermanager: Fix method name of global authz provider (thanks Zash) 2022-08-12 11:58:25 +01:00
Matthew Wild
afbc47f8ba usermanager: Remove obsolete function from global authz provider 2022-08-11 16:56:59 +01:00
Matthew Wild
341a5fd99f features: Add "permissions" feature for role-auth 2022-08-11 16:47:09 +01:00
Matthew Wild
b1f0061da3 usermanager: Handle local JIDs being passed to get/set_jid_role()
There is no reasonable fallback for set_jid_role() because users may have
multiple roles, so that's an error.
2022-08-01 20:26:00 +01:00
Kim Alvefur
a88c982ae2 core.usermanager: Add missing stub authz methods to global authz provider
Except, should we have a global authz provider at all?
2022-07-20 13:10:47 +02:00
Kim Alvefur
cdd5608f4a moduleapi: Stricter type check for actor in permission check
Non-table but truthy values would trigger "attempt to index a foo value"
on the next line otherwise
2022-07-20 13:08:07 +02:00
Kim Alvefur
55378f128a moduleapi: Remove redundant expansion of ':' prefix in permission names 2022-07-20 13:07:04 +02:00
Kim Alvefur
5f8e441449 moduleapi: Distribute permissions set from global modules to all hosts
Roles and permissions will always happen in the context of a host.

Prevents error upon indexing since `hosts["*"] == nil`
2022-07-20 13:05:35 +02:00
Matthew Wild
c0b857e5fb mod_authz_internal: Use util.roles, some API changes and config support
This commit was too awkward to split (hg record didn't like it), so:

- Switch to the new util.roles lib to provide a consistent representation of
  a role object.

- Change API method from get_role_info() to get_role_by_name() (touches
  sessionmanager and usermanager)

- Change get_roles() to get_user_roles(), take a username instead of a JID
  This is more consistent with all other usermanager API methods.

- Support configuration of custom roles and permissions via the config file
  (to be documented).
2022-07-19 18:02:02 +01:00
Matthew Wild
4db3d15723 usermanager, mod_auth_*: Add get_account_info() returning creation/update time
This is useful for a number of things. For example, listing users that need to
rotate their passwords after some event. It also provides a safer way for code
to determine that a user password has changed without needing to set a handler
for the password change event (which is a more fragile approach).
2022-07-12 13:14:47 +01:00
Kim Alvefur
af339f0e66 core.moduleapi: Expand permission name ':' prefix earlier
Ensures it applies to the context as string case

Somehow this fixes everything
2022-06-15 23:04:17 +02:00
Kim Alvefur
c776c71066 core.moduleapi: Fixup method name
`get_user_role()` did not exist anywhere else.

MattJ said `get_user_default_role()` was indented
2022-06-15 23:03:15 +02:00