Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | mod_cron: Update Teal source and rebuild | Matthew Wild | 2023-11-30 | 1 | -77/+75 |
| | |||||
* | mod_cron: Rename variable to fix shadowing (#luacheck) | Matthew Wild | 2023-11-30 | 1 | -2/+2 |
| | |||||
* | mod_cron: Add shell command to list registered cron tasks with status | Matthew Wild | 2023-11-30 | 1 | -0/+28 |
| | |||||
* | mod_saslauth: Allow plugins to override return SASL condition/text | Matthew Wild | 2023-11-30 | 1 | -1/+3 |
| | |||||
* | luacheckrc, mod_http_file_share: Update for module API change (once->on_ready) | Matthew Wild | 2023-11-30 | 1 | -1/+1 |
| | |||||
* | usermanager, mod_auth_internal_hashed: Support metadata when disabling a user | Matthew Wild | 2023-11-30 | 1 | -1/+2 |
| | | | | | This allows us to store a time, actor, comment and/or reason why an account was disabled, which seems a generally useful thing to support. | ||||
* | mod_mam: Use for loop in metadata query | Kim Alvefur | 2023-11-26 | 1 | -4/+2 |
| | | | | | | Some storage drivers will perform cleanup after the last iteration, but if only one step is taken this might be delayed until the garbage collector gets to it. | ||||
* | mod_tokenauth: Ignore invalid grants in storage that have no id | Matthew Wild | 2023-11-29 | 1 | -1/+1 |
| | |||||
* | mod_invites: Fix linter issues | Matthew Wild | 2023-11-29 | 1 | -4/+4 |
| | |||||
* | mod_admin_shell: Fix linter issues | Matthew Wild | 2023-11-29 | 1 | -24/+26 |
| | |||||
* | mod_invites: Use new shell-command API | Matthew Wild | 2023-11-29 | 1 | -22/+25 |
| | |||||
* | mod_admin_shell: Remove verbose logging | Matthew Wild | 2023-11-29 | 1 | -4/+0 |
| | |||||
* | mod_admin_shell: Remove timer:info() (it's been debug:timers() for some time) | Matthew Wild | 2023-11-29 | 1 | -3/+0 |
| | |||||
* | mod_admin_shell: Support for 'shell-command' items (global and per-host) | Matthew Wild | 2023-11-29 | 1 | -0/+169 |
| | | | | | | This should simplify adding shell commands from other modules, which will reduce the growth of mod_admin_shell and make it easier for community modules to expose commands too. | ||||
* | mod_admin_shell: Refactor help to data structures for extensibility | Matthew Wild | 2023-11-29 | 1 | -157/+239 |
| | | | | | This makes it easier for commands added by other modules to add to the help output, for example. | ||||
* | mod_storage_internal: Clear archive item count cache after experimental trim | Kim Alvefur | 2023-11-26 | 1 | -1/+3 |
| | | | | | | | The previous count would be invalid at this point. Should be possible to math out how many items are left, but this is left as future work. | ||||
* | mod_blocklist: Remove weak cache (and increase default LRU cache size) | Kim Alvefur | 2023-11-26 | 1 | -18/+10 |
| | | | | | | | Weak tables are said to have suboptimal performance, so we might as well get replace it with an increased default LRU cache size. Sorry about the 'and' | ||||
* | mod_storage_internal: Close lazy-loading list abstraction after trim | Kim Alvefur | 2023-11-26 | 1 | -0/+6 |
| | | | | Should be done here too. | ||||
* | mod_storage_internal: Only close lazy-loading list store abstractions | Kim Alvefur | 2023-11-26 | 1 | -1/+3 |
| | | | | | Since datamanager can fall back to the old method of loading the whole list, which wouldn't come with a :close method. | ||||
* | mod_storage_internal: Close archive list after completion of iteration | Kim Alvefur | 2023-11-23 | 1 | -0/+1 |
| | | | | | This closes the two FDs that the random access list abstraction uses, otherwise they are left to the garbage collector. | ||||
* | mod_pubsub: Provide some node properties in summary template #1809 | Kim Alvefur | 2023-11-22 | 1 | -1/+11 |
| | | | | | | Gives some access to node details which are otherwise hard to determine if you only see the plain text summary, since it is shared based on the pubsub#type setting (or payload xmlns). | ||||
* | mod_admin_shell: Fix lint [luacheck] | Kim Alvefur | 2023-11-21 | 1 | -10/+8 |
| | |||||
* | mod_admin_shell: Add debug:async() command to show blocked async runners | Matthew Wild | 2023-11-21 | 1 | -0/+65 |
| | |||||
* | mod_s2s_auth_dane_in: Bail out on explicit service denial | Kim Alvefur | 2023-11-12 | 1 | -0/+1 |
| | |||||
* | mod_tokenauth: Include more details in debug logs | Kim Alvefur | 2023-11-12 | 1 | -5/+5 |
| | | | | | Had a hard time following what was happening when it did not specify which grant or token was being removed. | ||||
* | mod_storage_sql: Use UUIDv7 as keys | Kim Alvefur | 2023-07-17 | 1 | -1/+1 |
| | | | | | Potentially allows sorting on those directly as they will be in increasing order. | ||||
* | mod_muc: Switch to module:could() for some implicit access control checks | Matthew Wild | 2023-11-07 | 1 | -2/+2 |
| | |||||
* | mod_muc: Allow guest users to list rooms by default | Matthew Wild | 2023-11-07 | 1 | -0/+3 |
| | |||||
* | mod_muc: Add :list-rooms permission | Matthew Wild | 2023-11-07 | 1 | -1/+5 |
| | |||||
* | mod_tokenauth: Fix saving grants after clearing expired tokens | Kim Alvefur | 2023-11-05 | 1 | -4/+4 |
| | | | | | Previously the whole grant was deleted if it found one expired toke, which was not indented. | ||||
* | mod_s2s_auth_certs: Remove LuaSec compat that moved to net.server | Kim Alvefur | 2023-11-04 | 1 | -6/+1 |
| | |||||
* | muc.register: Clarify what's going on when enforcing nicknames | Kim Alvefur | 2023-11-03 | 1 | -0/+2 |
| | | | | Does this make it clearer what is going on? | ||||
* | mod_s2s: Automagically enable DANE for s2sin if 'use_dane' is enabled | Kim Alvefur | 2023-11-02 | 1 | -0/+6 |
| | | | | Simplifies configuration, only one already existing boolean to flip. | ||||
* | mod_s2s_auth_dane_in: DANE support for s2sin | Kim Alvefur | 2023-11-01 | 1 | -0/+114 |
| | | | | | Complements the DANE support for outgoing connections included in net.connect | ||||
* | mod_bosh: Include stream attributes in stream-features event | Matthew Wild | 2023-10-28 | 1 | -1/+1 |
| | | | | | This matches what mod_c2s does, and fixes a traceback in mod_sasl2_fast when used with BOSH (that module tries to use event.stream.from). | ||||
* | mod_saslauth: Clear 'auto' from endpoint hash var, it's not a real hash ↵ | Matthew Wild | 2023-10-26 | 1 | -0/+1 |
| | | | | (thanks tmolitor) | ||||
* | mod_saslauth, mod_c2s: Disable tls-server-end-point channel binding by default | Matthew Wild | 2023-10-26 | 2 | -14/+23 |
| | | | | | | | | | | | | | | | | | | | | | | This channel binding method is now enabled when a hash is manually set in the config, or it attempts to discover the hash automatically if the value is the special string "auto". A related change to mod_c2s prevents complicated certificate lookups in the client connection hot path - this work now happens only when this channel binding method is used. I'm not aware of anything else that uses ssl_cfg (vs ssl_ctx). Rationale for disabling by default: - Minor performance impact in automatic cert detection - This method is weak against a leaked/stolen private key (other methods such as 'tls-exporter' would not be compromised in such a case) Rationale for keeping the implementation: - For some deployments, this may be the only method available (e.g. due to TLS offloading in another process/server). | ||||
* | mod_saslauth: Fix traceback in tls-server-end-point channel binding | Matthew Wild | 2023-10-26 | 1 | -3/+8 |
| | |||||
* | mod_admin_shell: Make 'Role' column dynamically sized | Kim Alvefur | 2023-10-26 | 1 | -1/+1 |
| | | | | | | | Some of the new roles don't quite fit nicely into 4 characters (excluding ellipsis). Given the ability to dynamically add additional roles from the config and possibly from modules, it seems better to just make it a relative size since we can't know how long they will be. | ||||
* | mod_saslauth: Actively close cert file after reading | Matthew Wild | 2023-10-24 | 1 | -0/+1 |
| | | | | Explicit > implicit | ||||
* | mod_saslauth: Fix read format string (thanks tmolitor) | Matthew Wild | 2023-10-24 | 1 | -1/+1 |
| | |||||
* | mod_cron: Make task frequencies configurable in overly generic manner | Kim Alvefur | 2023-10-22 | 1 | -5/+4 |
| | | | | Requested feature for many modules, notably MAM and file sharing. | ||||
* | mod_saslauth: Get correct 'tls-server-end-point' with new LuaSec API | Kim Alvefur | 2022-10-23 | 1 | -12/+15 |
| | | | | | | MattJ contributed new APIs for retrieving the actually used certificate and chain to LuaSec, which are not in a release at the time of this commit. | ||||
* | mod_c2s: Add session.ssl_cfg/ssl_ctx for direct TLS connections | Matthew Wild | 2022-09-07 | 1 | -0/+8 |
| | |||||
* | mod_saslauth: Derive hash from certificate per tls-server-end-point | Kim Alvefur | 2021-06-29 | 1 | -0/+34 |
| | | | | | | | | | | | This originally used a WIP implementation of cert:sigalg(), a method to retrieve certificate signature algorithm, but it was never submitted upstream. https://github.com/Zash/luasec/tree/zash/sigalg cert:getsignaturename() was merged in https://github.com/brunoos/luasec/commit/de393417b7c7566caf1e0a0ad54132942ac4f049 XEP-0440 v0.3.0 made implementing tls-server-end-point a MUST | ||||
* | mod_saslauth: Support tls-server-end-point via manually specified hash | Kim Alvefur | 2020-12-07 | 1 | -0/+13 |
| | | | | | | | | Since this channel binding method is said to enable TLS offloading then you need tell Prosody the hash (or the full cert), so this seems like a good start. Support is RECOMMENDED in XEP-0440 version 0.2 | ||||
* | mod_tokenauth: Set name/description on cleanup job | Kim Alvefur | 2023-10-21 | 1 | -1/+1 |
| | |||||
* | mod_tokenauth: Save grant after removing expired tokens | Kim Alvefur | 2023-10-21 | 1 | -0/+5 |
| | | | | Ensures the periodic cleanup really does remove expired tokens. | ||||
* | mod_tokenauth: Periodically clear out expired tokens and grants | Kim Alvefur | 2023-10-09 | 1 | -0/+6 |
| | | | | This should ensure expired grants eventually disappear. | ||||
* | mod_tokenauth: Delete grants without tokens after period | Kim Alvefur | 2023-10-16 | 1 | -0/+8 |
| | | | | | | | | | | Generally it is expected that a grant would have at least one token as long as the grant is in active use. Refresh tokens issued by mod_http_oauth2 have a lifetime of one week by default, so the idea here is that if that refresh token expired and another week goes by without the grant being used, then the whole grant can be removed. |