Software /
code /
prosody-modules
File
mod_telnet_tlsinfo/mod_telnet_tlsinfo.lua @ 5511:0860497152af
mod_http_oauth2: Record hash of client_id to allow future verification
RFC 6819 section 5.2.2.2 states that refresh tokens MUST be bound to the
client. In order to do that, we must record something that can
definitely tie the client to the grant. Since the full client_id is so
large (why we have this client_subset function), a hash is stored
instead.
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Fri, 02 Jun 2023 10:14:16 +0200 |
parent | 1132:832235cc1910 |
line wrap: on
line source
-- mod_telnet_tlsinfo.lua module:set_global(); module:depends("admin_telnet"); local console_env = module:shared("/*/admin_telnet/env"); local c2s_sessions = module:shared("/*/c2s/sessions"); local s2s_sessions = module:shared("/*/s2s/sessions"); local function print_tlsinfo(print, session) if session.secure then local sock = session.conn:socket() for k,v in pairs(sock:info()) do print(("%20s: %s"):format(k, tostring(v))) end else print(("%20s: %s"):format("protocol", "TCP")) end end function console_env.c2s:showtls(pat) local print = self.session.print; for _, session in pairs(c2s_sessions) do if not pat or session.full_jid and session.full_jid:find(pat, nil, true) then print(session.full_jid or "unauthenticated") print_tlsinfo(print, session); print"" end end end function console_env.s2s:showtls(pat) local print = self.session.print; for _, session in pairs(s2s_sessions) do if not pat or session.from_host == pat or session.to_host == pat then if session.direction == "outgoing" then print(session.from_host, "->", session.to_host) else print(session.to_host, "<-", session.from_host) end print_tlsinfo(print, session); print"" end end end