Commit graph

12755 commits

Author SHA1 Message Date
Matthew Wild
f8f90ea923 util.datetime: Add some missing test cases
You guessed it, mutation testing.
2022-10-08 23:55:22 +01:00
Matthew Wild
c6c5fec97e util.roles: Fix tests to use autogenerated role id 2022-10-08 20:39:14 +01:00
Matthew Wild
e3d1958cc4 util.roles: Add some more missing test cases
Found via mutation testing.
2022-10-08 20:33:01 +01:00
Matthew Wild
c1627c5d66 util.promise: Fix field name in failing test (introduced in 2639e0e1c378) 2022-10-07 18:04:30 +01:00
Matthew Wild
e8080773d6 util.promise: Add some missing test cases (found through mutation testing) 2022-10-07 17:56:38 +01:00
Matthew Wild
a79238fb37 util.promise: Remove line that was supposed to be removed in eb9814372c54 2022-10-07 17:45:23 +01:00
Matthew Wild
aed0c1c5ab util.promise: Remove some redundant checks, add tests confirming redundancy
This lines don't appear to do anything useful, and all tests pass when they
are removed. Discovered via mutation testing.

I added extra tests to exercise this code, because I wasn't certain that there
were no side-effects caused by removal. Everything appears to be fine, thanks
to the "pending" check at the start of promise_settle().
2022-10-07 17:43:26 +01:00
Matthew Wild
d08ddc1f4a util.roles: Add a :policies() method to iterate through available policies
We don't expose the policies directly, to force people to go through :may().
However, there are times when we really just need to know what policies a
role has inside it (e.g. for reporting or debugging purposes).
2022-10-07 17:01:35 +01:00
Matthew Wild
bda9ea678c util.roles: Add tests 2022-10-07 16:58:52 +01:00
Matthew Wild
d6863b51b9 util.roles: Return nil if the role has no explicit policy (fixes inheritance)
Previously, if the first inherited role had no opinion, it returned false and
prevented further consultation of other inherited roles.

This bug was found thanks to the implementation of missing test cases
identified through mutation testing.
2022-10-07 16:58:08 +01:00
Matthew Wild
01e03f4837 mod_smacks: Change boolean attribute from '1' to 'true' for compatibility
Conversations 2.10.10 and earlier expect this to be literally 'true' and don't
recognise '1'. This leads to it not attempting resumption with Prosody at all
since this change was introduced in 36ba170c4fd0.

Thanks to Zash for noticing, debugging and diagnosing this issue.

This issue is fixed in Conversations commit 052c58f3 (unreleased at the time
of writing).
2022-10-07 11:35:56 +01:00
Matthew Wild
08b49654d9 util.iterators: join: Work even with only a single iterator in the chain 2022-10-06 18:34:40 +01:00
Matthew Wild
12fc0febf1 mod_tokenauth: Remove expired tokens from storage 2022-10-06 16:00:39 +01:00
Matthew Wild
36afd999b1 mod_tokenauth: Invalidate tokens issued before most recent password change
This is a security improvement, to ensure that sessions authenticated using a
token (note: not currently possible in stock Prosody) are invalidated just
like password-authenticated sessions are.
2022-10-06 15:59:07 +01:00
Matthew Wild
bfa6d5634a prosodyctl: check turn: More clearly indicate the error is from TURN server 2022-10-06 11:12:57 +01:00
Kim Alvefur
988e651630 mod_authz_internal: Fix warning due to global use
Thanks Menel and Martin
2022-10-04 12:04:43 +02:00
Jonas Schäfer
865b6da69d Backed out changeset 1bc2220cd6ec
The use of the error helpers creates an `<error/>` child element
containing the error condition. This is however not allowed as per
XEP-0198, which specifies that the error condition is to be a direct
child of the `<failed/>` stream management element.

This has triggered a fun reconnect loop in aioxmpp where it was
reported by a user [1].

   [1]: https://github.com/horazont/aioxmpp/issues/382
2022-10-03 12:55:11 +02:00
Matthew Wild
e7bfb40a32 util.jwt: More robust ECDSA signature parsing, fail early on unexpected length 2022-09-30 20:38:31 +01:00
Kim Alvefur
70e54affa0 util.crypto: Fix tests
Found this number in a hat.

Sleepy time.  Good night.
2022-09-30 00:27:10 +02:00
Matthew Wild
5ca81b0e3b util.jwt: Add support for ES512 (+ tests) 2022-09-29 23:17:42 +01:00
Matthew Wild
8695a72a66 util.crypto, util.jwt: Generate consistent signature sizes (via padding)
This fixes the signature parsing and building to work correctly. Sometimes
a signature was one or two bytes too short, and needed to be padded. OpenSSL
can do this for us.
2022-09-29 23:15:39 +01:00
Matthew Wild
dfd1e396bb CHANGES: Update with MUC permission changes 2022-09-29 12:57:05 +01:00
Matthew Wild
5ed7f1638c mod_authz_internal: Allow specifying default role for public (remote) users 2022-09-29 12:46:02 +01:00
Matthew Wild
53ccf68cdf Backed out changeset 73a45ba6e3f1 in favour of 427dd01f0864
New behaviour (muc_room_allow_persistent = true, the default):

- Parent host users are not restricted by default (prosody:user)
- Users without roles (by default that is non-admins, non-parent-host users,
  and users on other servers) can no longer configure persistence by default.

muc_room_allow_persistent = false will restrict persistence to prosody:admin.

Parent-host users should not be restricted by default, and this can be
configured via the new roles/permissions options.
2022-09-29 12:43:09 +01:00
Matthew Wild
856a482013 mod_muc: Better map restrict_room_creation to role permissions (behaviour change)
With this change and 427dd01f0864, room creation is now effectively restricted
to parent-host users by default. This is a better default than previous
Prosody versions (where room creation was not restricted).

The "local" option for restrict_room_creation is no longer used (any value
other than true/false won't change the default behaviour).

restrict_room_creation = true will grant prosody:admin the ability to create
rooms.

restrict_room_creation = false disables all permission checks.

Anything between these two can be achieved using custom roles and permissions.
2022-09-29 12:30:52 +01:00
Matthew Wild
9b8c2cd1c9 mod_authz_internal: Allow configuring role of local-server/parent-host users
'host_user_role' is the default role of users who have JIDs on the "parent"
host (i.e. jabber.org users on conference.jabber.org). Defaults to
'prosody:user'.

'server_user_roles' is the default role of users who have JIDs on any active
host on the current Prosody instance. Default to nil (no role).

This finally allows better permissions splitting between host and server
users, which has previously been done (e.g. in MUC) with options like
'restrict_room_creation' and 'muc_room_allow_persistent'. Using roles makes
these permissions a lot more flexible, and easier for developers to integrate.
2022-09-29 12:10:14 +01:00
Matthew Wild
4dc941fa53 muc: Re-allow non-admins to configure persistence (thanks Meaz)
Non-admins don't have a role on MUC services by default. Not even
prosody:user. This meant they had no :create-persistent-room permission, even
if muc_room_allow_persistent was true (the default).

Now we only check the role permissions if persistent room creation is
restricted, otherwise we skip any permission checks, just like previous
versions.
2022-09-28 17:47:00 +01:00
Matthew Wild
67db899511 doap: Latest XEP-0440 supported since 9f100ab9ffdf 2022-09-26 15:47:15 +01:00
Kim Alvefur
8b82dc338c mod_admin_shell: Fix display of session without role (thanks Link Mauve)
This can happen to sessions before they are assigned a role
2022-09-23 11:58:15 +02:00
Matthew Wild
afa583dfcd mod_saslauth: Put <sasl-channel-binding> in stream:features per XEP-0440 0.4.0 2022-09-21 15:00:06 +01:00
Kim Alvefur
473c68770e Merge 0.12->trunk 2022-09-15 11:11:52 +02:00
Kim Alvefur
f6727510da util.stanza: Return nil instead of nothing (fix test with luassert >=1.9)
Due to a change in luassert, a dependency luassert of the Busted test
framework, returning nothing is no longer treated as not falsy.
2022-09-15 11:05:21 +02:00
Kim Alvefur
1dd9e547ce mod_storage_sql: Strip timestamp precision in queries to fix error (thanks muppeth)
Fixes
Error in SQL transaction: Error executing statement parameters: ERROR:  invalid input syntax for integer

This was handled for INSERT in 9524bb7f3944 but not SELECT.
2022-09-07 12:27:12 +02:00
Matthew Wild
fd637bf6be mod_http_file_share: Use correct variable name (thanks riau.sni) 2022-09-04 10:01:57 +01:00
Matthew Wild
af0f1947cf mod_saslauth: Fix incorrect variable name introduced in 27a4a7e64831 2022-09-03 21:25:51 +01:00
Matthew Wild
5f2c086da7 mod_smacks: Set session flag during successful enable 2022-09-03 21:20:29 +01:00
Matthew Wild
a061b11f32 mod_smacks: Add type field to results so actions can be later distinguished 2022-09-03 21:20:07 +01:00
Matthew Wild
5eef82fdcf mod_saslauth: Only announce bind feature if no resource yet bound
It's now possible to bind during SASL2 negotiation.
2022-09-03 21:19:00 +01:00
Matthew Wild
928fe5d059 semgrep: Catch stanza:text() (assuming it's meant to be :get_text()) 2022-09-03 21:17:38 +01:00
Kim Alvefur
e38e915ef5 mod_s2s: Fix firing buffer drain events
Fixes the same kind of issue as in 65563530375b but once and for all,
while improving similarity between incoming and outgoing connections.
2022-08-26 18:53:00 +02:00
Kim Alvefur
ee21d9480a mod_admin_shell: Switch names for user role management commands
user:roles() does not convey that this is the mutating command, it
should have been called setroles from the start but wasn't due to lack
of foresight. This has to accidentally removing roles when wanting to
show them.
2022-08-15 18:56:22 +02:00
Kim Alvefur
2dbbce2382 mod_storage_sql: Fix summary API with Postgres (fixes #1766)
The ORDER BY and LIMIT clauses are not needed and don't even make much
sense. This part was most likely a leftover from the :find method.

Tested with sqlite and postgres 14
2022-07-22 19:09:50 +02:00
Kim Alvefur
3ee6df83b0 storage tests: Add test for the archive:summary API
Passes with memory, internal, sqlite
Fails with postgres as in #1766
2022-07-22 18:32:45 +02:00
Kim Alvefur
78e7707791 mod_http_files: Log warning about legacy modules using mod_http_files
It is time. Most community modules should have been adjusted to work
with the new (net.http.files) way.

At some point this usage should be prevented.

Related to #1765
2022-07-17 17:05:28 +02:00
Kim Alvefur
96301b2229 mod_bookmarks: Reduce error about not having bookmarks to debug (thanks tom)
This is happens if the account is new and doesn't have any bookmarks
yet, which is not a problem.

Rarely seen since most clients currently use the older version of
XEP-0084 stored in XEP-0049 rather than in PEP, but at least one
(Converse.js )does.

One scenario in which this would show up often is with Converse.js as a
guest chat using anonymous authentication, where all "accounts" would
always be new and not have any bookmarks. This scenario probably does
not need to have mod_bookmarks at all, but if enabled globally it would
likely become loaded onto the VirtualHost unless explicitly disabled.
2022-07-26 23:44:33 +02:00
Kim Alvefur
9f51add3a8 mod_storage_sql: Fix bypass of load procedure under prosodyctl
There's no 'prosody.prosodyctl' property other than this one, introduced
in 6216743c188c in 2015.

Guessing that the intent was to skip this when running as a prosodyctl
command. The module.command code does its own version of this
initialization, so this seems likely.

Thanks raja for noticing
2022-07-26 00:39:16 +02:00
Kim Alvefur
a3e182ffa1 util.paseto: Do strict type check in pae() function
Fixes a test failure on Lua 5.4 where ipairs("") does not produce an
error.
2022-07-11 18:48:57 +02:00
Kim Alvefur
62438f482e util.crypto: Use Lua 5.2 API for predictable buffer size
In Lua 5.3 LUAL_BUFFERSIZE is a macro computed from sizeof and is thus
not known at pre-processing time, so this does not work.

Since Lua 5.1 is no longer supported, we can use luaL_prepbuffsize()
which is available from Lua 5.2
2022-07-11 17:11:38 +02:00
Kim Alvefur
e893bbf681 util.crypto: Use stack space buffers
Removes assumption that LUAL_BUFFERSIZE is known at pre-processing time,
which it is not in Lua 5.3 and 5.4, where it is a computed macro based
on sizeof.

Allocation of stack space is safer and faster, no need to worry about
luaL_prepbuffer failing to allocate memory and skipping free()
2022-07-11 17:01:55 +02:00
Matthew Wild
e12c9a83df util.paseto: Drop custom wrappers around key objects
The PASETO spec recommends - no, *requires* - that implementations enforce
type safety for keys, and e.g. do not pass them around as arbitrary byte
strings. Typed wrapper objects are recommended.

I originally followed this advice when starting the lib. However, key wrapping
and type safety is now also a feature of util.crypto. All we're doing is
duplicating it unnecessarily with this additional wrapper code.
2022-07-11 14:30:39 +01:00