Commit graph

12980 commits

Author SHA1 Message Date
Kim Alvefur
f68336b96e teal: Move into prosody namespace 2023-03-23 13:36:52 +01:00
Kim Alvefur
738df041ac CHANGES: The Great Rename-ning completed! #1223 2023-03-17 19:38:39 +01:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Kim Alvefur
8136aa749a util: Add compat for prosody module name change to C sources 2023-03-17 18:03:07 +01:00
Kim Alvefur
43531740f9 util: Prefix module imports with prosody namespace 2023-03-17 16:23:16 +01:00
Kim Alvefur
869581384d net: Prefix module imports with prosody namespace 2023-03-17 16:23:12 +01:00
Kim Alvefur
ffd1561c5e tests: Make tests work with new namespace prefix 2023-03-17 17:07:47 +01:00
Kim Alvefur
d47a7bb3bd core: Prefix module imports with prosody namespace 2023-03-17 16:23:07 +01:00
Kim Alvefur
9c63ae60fd executables: Prefix module imports with prosody namespace 2023-03-17 16:29:54 +01:00
Matthew Wild
b17564a71f mod_debug_reset: Remove unused import 2023-03-23 14:48:15 +00:00
Matthew Wild
a68bddfee8 scansion: Enable mod_debug_reset during tests 2023-03-23 14:41:08 +00:00
Matthew Wild
8e325c229f mod_debug_reset: New module to "reset" a running server (e.g. for testing)
Plan to use this for integration tests.
2023-03-23 14:40:51 +00:00
Matthew Wild
893366fb79 scansion: vcard_temp: Ensure at least one connection is open throughout test
I plan to introduce logic to "reset" the server between individual tests,
which is currently triggered by the lack of any connections. This is the only
test that has a point where no clients are connected, and it's not necessary,
so I changed it to keep the connection open for the duration of the test.
2023-03-23 14:19:43 +00:00
Matthew Wild
f3792af0fe scansion: Fix tests failing after addition of pubsub#itemreply config field
This is a newly added field, and we expect to see it in these places now.
2023-03-23 14:16:32 +00:00
Matthew Wild
18d9e6f65a scansion: Fix tests failing due to lack of 'publisher'
publisher is no longer included by default in broadcasts, but configured via
pubsub#itemreply instead.
2023-03-23 14:15:33 +00:00
Matthew Wild
d1d45c52e2 scansion: Add tests for pubsub#itemreply in PEP 2023-03-22 16:53:36 +00:00
Matthew Wild
26705419f9 scansion: PEP notifications no longer carry 'publisher' by default
Previous behaviour:

- publisher was always included in PEP notifications
- publisher was never included in get_items requests

New behaviour:

- publisher is included in both notifications and retrieval if
  itemreply == publisher
- publisher is not ever included if itemreply ~= publisher
2023-03-22 16:48:51 +00:00
Matthew Wild
a0ac04c72b mod_pep: Pass node/service objects to broadcaster when resending last item
This gives the broadcaster access to the node configuration, which is now
important for itemreply. It probably also fixes a bug with the notify_*
node config options?
2023-03-22 16:46:39 +00:00
Matthew Wild
2b72eb4211 mod_pubsub/pubsub.lib: Fix accidental name/var swap (thanks scansion) 2023-03-22 16:44:47 +00:00
Matthew Wild
5f98d0cc23 mod_pubsub, mod_pep: Support per-node configurable inclusion of publisher
This matches ejabberd's behaviour, using the 'pubsub#itemreply' config option.

Although the current definition of this option in the specification is not
as clear as it could be, I think matching what existing deployments do is the
best option to resolve the ambiguity and reduce fragmentation.

We should update the spec to be clearer about how to use and interpret this
option.

The 'expose_publisher' option for mod_pubsub is now an override (always expose
or never expose). If unset, it will use the per-node config (which defaults to
not exposing).

Thanks to Link Mauve, edhelas and goffi for sparking this feature.
2023-03-22 11:39:19 +00:00
Kim Alvefur
14f896bf2d mod_tokenauth: Fix traceback in get_token_session()
Errors in sha256 becasue `token_secret` is nil since it was not passed
to _get_validated_token_info().

Looks like a simple oversight in ebe3b2f96cad
2023-03-21 20:43:42 +01:00
Matthew Wild
8c25001712 CHANGES: Add keyval+ 2023-03-21 18:59:19 +00:00
Matthew Wild
7309514c2d features: Add "keyval+" 2023-03-21 18:57:33 +00:00
Matthew Wild
2460207d50 storagemanager: Add keyval+ (combined keyval + map) store type
This combines the two most common store types, which modules often end up
opening with both interfaces separately anyway.

As well as combining them, I've taken the opportunity to improve some of the
method names to make them clearer.
2022-09-27 17:46:27 +01:00
Kim Alvefur
784ad4b1ba core.features: Add feature for prosody.loader
Allows modules explicit dependencies upon its availability
2023-03-18 18:20:03 +01:00
Kim Alvefur
763a2bb0ed executables: Invoke loader to allow mixing of old and new import style
Now both require"util.foo" and require"prosody.util.foo" should be
equivalent.
2023-03-17 16:29:07 +01:00
Matthew Wild
fc80e83b42 mod_tokenauth: Switch to new token format (invalidates existing tokens!)
The new format has the following properties:

- 5 bytes longer than the previous format
- The token now has separate 'id' and 'secret' parts - the token itself is no
  longer stored in the DB, and the secret part is hashed
- The only variable length field (JID) has been moved to the end
- The 'secret-token:' prefix (RFC 8959) is now included

Compatibility with the old token format was not maintained, and all previously
issued tokens are invalid after this commit (they will be removed from the DB
if used).
2023-03-21 14:33:29 +00:00
Matthew Wild
5019bacff6 mod_tokenauth: Log error when token validation fails 2023-03-21 14:04:39 +00:00
Matthew Wild
2c87a0108b util.sasl.oauthbearer: Fix gs2-header parsing 2023-03-21 14:01:03 +00:00
Vitaly Orekhov
6d526798bf mod_auth_internal_plain: Fix user creation done via mod_admin_shell
Following the new behavior in auth_internal_hashed (c8f59ce7d3cf), the account
will be created and disabled, instead of returning an error telling password
being nil when calling saslprep().

Note that mod_auth_internal_plain does not have full support for
enabled/disabled accounts, but that may be fixed in subsequent commits.
2023-03-21 01:46:47 +03:00
Kim Alvefur
93ddf6892c prosody.loader: Ensure already loaded modules are found in old and new namespaces
Prevents modules being initialized twice, ensuring that
require"prosody.util.foo" == require"util.foo"
2023-03-17 15:11:26 +01:00
Kim Alvefur
d06cc5176b prosody.loader: Incorporate search path rewrite patch from Debian packages
Nice to drop that patch.

Will allow loading this to do something both when installed under a
prosody directory or from a source checkout.
2023-03-17 14:36:02 +01:00
Kim Alvefur
d33f55156b prosody.loader: Allow loading modules under 'prosody' namespace (#1223)
Actually `hg mv`-ing all the files is disruptive, basically breaking
everything from rebasing all my WIP draft commits to the package
building. So instead, what if we didn't and instead rewrote package
names as they are `require()`-d?

Debian packages produced by the Prosody are already installed into this
structure so much will Just Work if all require calls are updated.
2023-03-17 13:51:43 +01:00
Kim Alvefur
9dd7ce434d mod_auth_internal_hashed: Shorten call path
Why did it call a function defined in the same module through
usermanager?
2023-03-18 16:13:32 +01:00
Kim Alvefur
c11d121c06 util.sasl.{scram,plain}: Pass authzid to SASL profile callback
For potential future use.

Used for logging into a different account than the one used for
authentication.
2023-03-16 13:57:30 +01:00
Kim Alvefur
f23ad827a3 util.jsonschema: Disable some further new failing tests
Absolute references, weird fractions, unevaluatedProperties???
2023-03-11 12:12:49 +01:00
Kim Alvefur
fc0e882e29 util.jsonschema: Ignore some new tests in test suite
These seem to be using absolute URI references, Not Yet Implemented
2023-03-11 12:01:17 +01:00
Matthew Wild
7a6d2e1226 util.table: Expand table.move() tests (thanks mutation testing) 2023-03-17 17:06:05 +00:00
Kim Alvefur
b156f013c4 util.sasl.scram: Fix off-by-one indentation 2023-03-16 13:52:22 +01:00
Kim Alvefur
2331fc8b65 util.sasl.oauthbearer: Adjust parsing of GS2 to allow lack of authzid
Partly copied from util.sasl.scram and then reduced a bit.
2023-03-16 13:45:49 +01:00
Kim Alvefur
8aecd19812 doap: Sort by XEP number
To keep them sorted.

Not pedantic at all!
2023-03-16 13:20:19 +01:00
Kim Alvefur
566a991f84 util.sasl.oauthbearer: Return username from callback instead using authzid (BC)
RFC 6120 states that
>  If the initiating entity does not wish to act on behalf of another
>  entity, it MUST NOT provide an authorization identity.

Thus it seems weird to require it here.  We can instead expect an
username from the token data passed back from the profile.

This follows the practice of util.sasl.external where the profile
callback returns the selected username, making the authentication module
responsible for extracting the username from the token.
2023-03-16 12:18:23 +01:00
Matthew Wild
944c25f352 util.sasl.oauthbearer: Fix syntax error in b796e08e6376 2023-03-15 12:02:23 +00:00
Matthew Wild
9dedc78f3c util.sasl.oauthbearer: Attach token_info to sasl handler
This allows token-aware things to access extra information about the
authentication, such as when the token is due to expire and the attached
custom 'data'.
2023-03-15 09:41:38 +00:00
Kim Alvefur
adb37b8272 util.ip: Add Teal interface description 2023-03-14 19:46:46 +01:00
Matthew Wild
55106e91ce util.ip: Tests for truncate() 2023-03-14 18:40:16 +00:00
Kim Alvefur
5afb393d53 mod_auth_internal_hashed: Record time of account disable / re-enable
Could be useful for e.g. #1772
2023-03-12 01:24:59 +01:00
Matthew Wild
84c0204ea2 util.ip: Add ip.truncate() to return a new IP with only the prefix of another 2023-03-14 18:24:58 +00:00
Matthew Wild
3eedf79c8b util.ip: Add is_ip() helper method to detect if an object is an ip object 2023-03-14 18:23:33 +00:00
Kim Alvefur
9c8b2f5099 doap: Add RFC 7628 introduced in ab1164eda011 2023-03-12 13:05:50 +01:00