Comparison

mod_flash_policy/mod_flash_policy.lua @ 379:eebc19c224fb

Moved the file to a directory
author leonbogaert
date Wed, 06 Jul 2011 23:34:36 +0200
child 394:4219f69be1cf
comparison
equal deleted inserted replaced
378:7dcc5953d799 379:eebc19c224fb
1 local filters = require "util.filters";
2 local config = {}
3 config.file = module:get_option_string("crossdomain_file", "");
4 config.string = module:get_option_string("crossdomain_string", [[<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><site-control permitted-cross-domain-policies="master-only"/><allow-access-from domain="*" /></cross-domain-policy>]]);
5 local string = ''
6 if not config.file ~= '' then
7 local f = assert(io.open(config.file));
8 string = f:read("*all");
9 else
10 string = config.string
11 end
12
13 module:log("debug", "crossdomain string: "..string);
14
15 module:set_global();
16
17 function filter_policy(data, session)
18 -- Since we only want to check the first block of data, remove the filter
19 filters.remove_filter(session, "bytes/in", filter_policy);
20 if data == "<policy-file-request/>\0" then
21 session.send([[<?xml version="1.0"?>
22 <!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd">
23 <cross-domain-policy>
24 <site-control permitted-cross-domain-policies="master-only"/>
25 <allow-access-from domain="livechat.concepts.tim-online.nl" to-ports="5222" />
26 </cross-domain-policy>]].."\0");
27 return nil; -- Drop data to prevent it reaching the XMPP parser
28 else
29 return data; -- Pass data through, it wasn't a policy request
30 end
31
32 end
33
34 function filter_session(session)
35 if session.type == "c2s_unauthed" then
36 filters.add_filter(session, "bytes/in", filter_policy, -1);
37 end
38 end
39
40 function module.load()
41 filters.add_filter_hook(filter_session);
42 end
43
44 function module.unload()
45 filters.remove_filter_hook(filter_session);
46 end