Commit graph

5303 commits

Author SHA1 Message Date
Matthew Wild
b17564a71f mod_debug_reset: Remove unused import 2023-03-23 14:48:15 +00:00
Matthew Wild
8e325c229f mod_debug_reset: New module to "reset" a running server (e.g. for testing)
Plan to use this for integration tests.
2023-03-23 14:40:51 +00:00
Matthew Wild
a0ac04c72b mod_pep: Pass node/service objects to broadcaster when resending last item
This gives the broadcaster access to the node configuration, which is now
important for itemreply. It probably also fixes a bug with the notify_*
node config options?
2023-03-22 16:46:39 +00:00
Matthew Wild
2b72eb4211 mod_pubsub/pubsub.lib: Fix accidental name/var swap (thanks scansion) 2023-03-22 16:44:47 +00:00
Matthew Wild
5f98d0cc23 mod_pubsub, mod_pep: Support per-node configurable inclusion of publisher
This matches ejabberd's behaviour, using the 'pubsub#itemreply' config option.

Although the current definition of this option in the specification is not
as clear as it could be, I think matching what existing deployments do is the
best option to resolve the ambiguity and reduce fragmentation.

We should update the spec to be clearer about how to use and interpret this
option.

The 'expose_publisher' option for mod_pubsub is now an override (always expose
or never expose). If unset, it will use the per-node config (which defaults to
not exposing).

Thanks to Link Mauve, edhelas and goffi for sparking this feature.
2023-03-22 11:39:19 +00:00
Kim Alvefur
14f896bf2d mod_tokenauth: Fix traceback in get_token_session()
Errors in sha256 becasue `token_secret` is nil since it was not passed
to _get_validated_token_info().

Looks like a simple oversight in ebe3b2f96cad
2023-03-21 20:43:42 +01:00
Matthew Wild
fc80e83b42 mod_tokenauth: Switch to new token format (invalidates existing tokens!)
The new format has the following properties:

- 5 bytes longer than the previous format
- The token now has separate 'id' and 'secret' parts - the token itself is no
  longer stored in the DB, and the secret part is hashed
- The only variable length field (JID) has been moved to the end
- The 'secret-token:' prefix (RFC 8959) is now included

Compatibility with the old token format was not maintained, and all previously
issued tokens are invalid after this commit (they will be removed from the DB
if used).
2023-03-21 14:33:29 +00:00
Matthew Wild
5019bacff6 mod_tokenauth: Log error when token validation fails 2023-03-21 14:04:39 +00:00
Vitaly Orekhov
6d526798bf mod_auth_internal_plain: Fix user creation done via mod_admin_shell
Following the new behavior in auth_internal_hashed (c8f59ce7d3cf), the account
will be created and disabled, instead of returning an error telling password
being nil when calling saslprep().

Note that mod_auth_internal_plain does not have full support for
enabled/disabled accounts, but that may be fixed in subsequent commits.
2023-03-21 01:46:47 +03:00
Kim Alvefur
9dd7ce434d mod_auth_internal_hashed: Shorten call path
Why did it call a function defined in the same module through
usermanager?
2023-03-18 16:13:32 +01:00
Kim Alvefur
566a991f84 util.sasl.oauthbearer: Return username from callback instead using authzid (BC)
RFC 6120 states that
>  If the initiating entity does not wish to act on behalf of another
>  entity, it MUST NOT provide an authorization identity.

Thus it seems weird to require it here.  We can instead expect an
username from the token data passed back from the profile.

This follows the practice of util.sasl.external where the profile
callback returns the selected username, making the authentication module
responsible for extracting the username from the token.
2023-03-16 12:18:23 +01:00
Kim Alvefur
5afb393d53 mod_auth_internal_hashed: Record time of account disable / re-enable
Could be useful for e.g. #1772
2023-03-12 01:24:59 +01:00
Kim Alvefur
c425da3c6a mod_admin_shell: Limit module dependency listings to loaded on current host
E.g. module:info("http") with many http modules loaded would show a lot
of duplication, as each module would be listed for each host, even if
not actually enabled on that host.
2023-03-10 12:33:02 +01:00
Kim Alvefur
cb65c58950 mod_authz_internal: Fix wrong role name field in user_can_assume_role()
Made it reject the primary role since it compares against a non-existent
field, i.e. nil.
2023-03-09 16:02:55 +01:00
Kim Alvefur
11a3373e89 Merge 0.12->trunk 2023-03-05 15:45:44 +01:00
Kim Alvefur
0890b20fbf mod_http: Unhook CORS handlers only if active (fixes #1801) 2023-03-05 15:45:01 +01:00
Kim Alvefur
283322543e mod_admin_shell: Show reverse dependencies in module:info()
Why was this module loaded? Now you can find out!
2023-03-05 14:08:26 +01:00
Kim Alvefur
4d46c27840 authz: Add method for retrieving all roles
Some of the OAuth stuff highlights a small need to retrieve a list of
roles somehow. Handy if you ever need a role selector in adhoc or
something.

Unless there's some O(n) thing we were avoiding?
2023-03-04 18:40:43 +01:00
Kim Alvefur
7b7cad2b66 mod_tokenauth: Fix misplaced closing parenthesis
`type(x ~= y)` is always a string, thus truthy
2023-03-02 22:34:29 +01:00
Matthew Wild
9e02d322d8 mod_tokenauth: Gracefully handle missing tokens 2023-03-01 18:43:54 +00:00
Matthew Wild
4ce832123e mod_auth_internal_hashed: Add oauthbearer handler to our SASL profile 2023-03-01 13:05:17 +00:00
Matthew Wild
b435f6d52a mod_tokenauth: Add SASL handler backend that can accept and verify tokens
This is designed for use by other modules that want to accept tokens issued
by mod_tokenauth, without duplicating all the necessary logic.
2023-03-01 13:04:36 +00:00
Matthew Wild
f3d152eb1b mod_tokenauth: Add some sanity checking of the new optional parameters 2023-03-01 13:02:51 +00:00
Matthew Wild
a58a6d2317 mod_tokenauth: Add 'purpose' constraint
This allows tokens to be tied to specific purposes/protocols. For example, we
shouldn't (without specific consideration) allow an OAuth token to be dropped
into a slot expecting a FAST token.

While FAST doesn't currently use mod_tokenauth, it and others may do in the
future. It's better to be explicit about what kind of token code is issuing or
expecting.
2023-03-01 13:01:21 +00:00
Matthew Wild
16137b3b14 mod_saslauth: Support for SASL handlers forcing a specific resource
The token layer supports tokens that are tied to a given resource.
2023-03-01 12:56:08 +00:00
Kim Alvefur
d5661f1de3 mod_admin_adhoc: Add XEP-0133 commands to Disable and Re-Enable users
Enables UI in clients supporting XEP-0050
2023-02-23 18:39:02 +01:00
Kim Alvefur
701fb4fce0 mod_admin_shell: Add commands to disable and enable accounts
First proper UI to enable/disable, allowing it to be tested.
2023-02-23 18:10:06 +01:00
Kim Alvefur
893dce647b mod_c2s: Disconnect accounts when they are disabled
We decided that at the first stage, accounts that are disabled should
simply be prevented from authenticating, thus they should also be
prevented from having connected sessions.  Since this is aimed to be a
moderation action for cases of abuse, they shouldn't be allowed to
continue being connected.
2023-02-23 16:28:57 +01:00
Kim Alvefur
fe206323b5 mod_auth_internal_hashed: Implement methods to enable and disable users 2023-02-23 14:44:35 +01:00
Kim Alvefur
96acef2170 mod_auth_internal_hashed: Implement is_enabled() method
Uses 'disabled' property already introduced in aed38948791f
2023-02-23 14:34:10 +01:00
Kim Alvefur
4704e98af6 mod_auth_internal_hashed: Add stub methods for enabling and disabling users
But how and where?
2023-02-22 15:32:40 +01:00
Kim Alvefur
01fedfa5be mod_auth_internal_hashed: Refactor to prepare for disabling users
Moving this out will make space for a dynamic check whether a particular
user is disabled or not, which is one possible response to abuse of
account privileges.
2023-02-22 13:27:08 +01:00
Matthew Wild
a3d7c77607 Merge 0.12->trunk 2023-02-20 18:10:36 +00:00
Matthew Wild
4dcabd36ce mod_websocket: Fire pre-session-close event (fixes #1800)
This event was added in a7c183bb4e64 and is required to make mod_smacks know
that a session was intentionally closed and shouldn't be hibernated (see
fcea4d9e7502).

Because this was missing from mod_websocket's session.close(), mod_smacks
would always attempt to hibernate websocket sessions even if they closed
cleanly.

That mod_websocket has its own copy of session.close() is something to fix
another day (probably not in the stable branch). So for now this commit makes
the minimal change to get things working again.

Thanks to Damian and the Jitsi team for reporting.
2023-02-20 18:10:15 +00:00
Kim Alvefur
02b01c4826 Merge 0.12->trunk 2023-02-16 20:15:39 +01:00
Kim Alvefur
67ea0ee50e mod_admin_socket: Return error on unhandled input to prevent apparent freeze
When mod_admin_socket is loaded without mod_admin_shell, attempt to use
`prosodyctl shell` will appear to freeze after any input, since no
response is returned.
2023-02-16 17:20:09 +01:00
Kim Alvefur
3605137656 mod_storage_sql: Remove module status on unknown 'debug' level
Expected this to be translated to 'core', but it logs an error instead.
See previous commit.
2023-01-31 07:52:33 +01:00
Kim Alvefur
89f652ff0b mod_storage_sql: Silence luacheck warning 2023-01-30 00:40:47 +01:00
Kim Alvefur
0147b972e0 mod_storage_sql: Record connection to database as module status
Allows retrieving this in e.g. a health reporting module

Thanks pfak
2023-01-30 00:38:26 +01:00
Kim Alvefur
dc958f1e40 mod_admin_shell: Match substring in muc:affiliations() like muc:occupants()
Maybe one day we'll get consistent filtering semantics everywhere.
2023-01-30 00:14:50 +01:00
Kim Alvefur
1b71a53fb7 mod_admin_shell: Sort MUC users by relation and JID
Suggested by MattJ, our resident UI expert :)
2023-01-29 21:37:13 +01:00
Kim Alvefur
5c676bab58 mod_admin_shell: Make Role and Affiliation columns the same width for aesthetics
The length of the title "Affiliation" made them both close enough that
it looked off.
2023-01-29 18:57:28 +01:00
Kim Alvefur
6e120ad485 mod_admin_shell: Use tables to present MUC users
Tables are awesome!
2023-01-29 18:31:25 +01:00
Kim Alvefur
d5b5b5ba86 mod_admin_shell: Factor out room retrieval into common function
Justification: See diffstat
2023-01-29 17:55:56 +01:00
Kim Alvefur
08a730746c mod_admin_shell: Add muc:affiliations(room) command to list memberships
Easier than going trough muc:room():each_affiliation() since you have to
do fiddly things to reach the print() function.
2023-01-29 17:53:21 +01:00
Kim Alvefur
2b0584d2ee mod_admin_shell: Add muc:occupants(room) command to list occupants
Easier than going trough muc:room():each_occupant() since you have to do
fiddly things to reach the print() function.
2023-01-29 17:41:08 +01:00
Kim Alvefur
27d63ff731 mod_muc_mam: Use higher precision timestamps
See also 781772c8b6d9
2023-01-21 17:24:45 +01:00
Kim Alvefur
dbbde4a0f0 Merge 0.12->trunk 2023-01-21 17:18:16 +01:00
Kim Alvefur
81fd03356f mod_muc_mam: Copy "include total" behavior from mod_mam
Not sure why this was missing from MUC MAM, it already had some of the
code for dealing with it.
2023-01-21 17:14:55 +01:00
Kim Alvefur
d0321442c9 mod_muc_mam: Add mam#extended form fields #1796 (Thanks Rain)
Oversight in cabb022f31c0
2023-01-21 17:09:22 +01:00