aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKim Alvefur <zash@zash.se>2018-11-25 13:31:40 +0100
committerKim Alvefur <zash@zash.se>2018-11-25 13:31:40 +0100
commit56227ef034709e59ffcd56470082c201ba731474 (patch)
tree07413213fa09876c6643f173b952382902f0aa36
parent255d4ba139a93aecf66bb4a081f3aa45b6ac4e35 (diff)
parent38498588b43c93cbc2bc5de9f21cf8975b8169a1 (diff)
downloadprosody-56227ef034709e59ffcd56470082c201ba731474.tar.gz
prosody-56227ef034709e59ffcd56470082c201ba731474.zip
Merge 0.11->trunk
-rw-r--r--CHANGES2
-rw-r--r--plugins/muc/muc.lib.lua1
-rw-r--r--prosody.cfg.lua.dist15
3 files changed, 6 insertions, 12 deletions
diff --git a/CHANGES b/CHANGES
index a5c185cc..136b7d2b 100644
--- a/CHANGES
+++ b/CHANGES
@@ -1,7 +1,7 @@
0.11.0
======
-**YYYY-MM-DD** (not yet)
+**2018-11-18**
New features
------------
diff --git a/plugins/muc/muc.lib.lua b/plugins/muc/muc.lib.lua
index d9fa37f5..96f58023 100644
--- a/plugins/muc/muc.lib.lua
+++ b/plugins/muc/muc.lib.lua
@@ -904,6 +904,7 @@ function room_mt:handle_admin_query_set_command(origin, stanza)
local item = stanza.tags[1].tags[1];
if not item then
origin.send(st.error_reply(stanza, "cancel", "bad-request"));
+ return true;
end
if item.attr.jid then -- Validate provided JID
item.attr.jid = jid_prep(item.attr.jid);
diff --git a/prosody.cfg.lua.dist b/prosody.cfg.lua.dist
index b6ea2ecb..f7f7b731 100644
--- a/prosody.cfg.lua.dist
+++ b/prosody.cfg.lua.dist
@@ -102,16 +102,10 @@ c2s_require_encryption = true
-- Force servers to use encrypted connections? This option will
-- prevent servers from authenticating unless they are using encryption.
--- Note that this is different from authentication
s2s_require_encryption = true
-
-- Force certificate authentication for server-to-server connections?
--- This provides ideal security, but requires servers you communicate
--- with to support encryption AND present valid, trusted certificates.
--- NOTE: Your version of LuaSec must support certificate verification!
--- For more information see https://prosody.im/doc/s2s#security
s2s_secure_auth = false
@@ -122,17 +116,13 @@ s2s_secure_auth = false
--s2s_insecure_domains = { "insecure.example" }
--- Even if you leave s2s_secure_auth disabled, you can still require valid
+-- Even if you disable s2s_secure_auth, you can still require valid
-- certificates for some domains by specifying a list here.
--s2s_secure_domains = { "jabber.org" }
-- Select the authentication backend to use. The 'internal' providers
-- use Prosody's configured data storage to store the authentication data.
--- To allow Prosody to offer secure authentication mechanisms to clients, the
--- default provider stores passwords in plaintext. If you do not trust your
--- server please see https://prosody.im/doc/modules/mod_auth_internal_hashed
--- for information about using the hashed backend.
authentication = "internal_hashed"
@@ -183,6 +173,9 @@ log = {
-- Location of directory to find certificates in (relative to main config file):
certificates = "certs"
+-- HTTPS currently only supports a single certificate, specify it here:
+--https_certificate = "certs/localhost.crt"
+
----------- Virtual hosts -----------
-- You need to add a VirtualHost entry for each domain you wish Prosody to serve.
-- Settings under each VirtualHost entry apply *only* to that host.