File

mod_s2s_auth_samecert/mod_s2s_auth_samecert.lua @ 6249:12a2989c7cc1

mod_limits_exception: obsolete diff --git a/mod_limits_exception/README.md b/mod_limits_exception/README.md --- a/mod_limits_exception/README.md +++ b/mod_limits_exception/README.md @@ -1,6 +1,8 @@ --- +labels: +- Stage-Obsolete summary: Allow specified JIDs to bypass rate limits -... +--- This module allows you to configure a list of JIDs that should be allowed to bypass rate limit restrictions.
author Menel <menel@snikket.de>
date Mon, 12 May 2025 10:57:17 +0200
parent 4675:c9397cd5cfe6
line wrap: on
line source

module:set_global()

local hosts = prosody.hosts;

module:hook("s2s-check-certificate", function(event)
	local session, cert = event.session, event.cert;
	if not cert or session.direction ~= "incoming" then return end

	local outgoing = hosts[session.to_host].s2sout[session.from_host];
	if outgoing and outgoing.type == "s2sout" and outgoing.secure and outgoing.conn:socket():getpeercertificate():pem() == cert:pem() then
		session.log("debug", "Certificate matches that of s2sout%s", tostring(outgoing):match("[a-f0-9]+$"));
		session.cert_identity_status = outgoing.cert_identity_status;
		session.cert_chain_status = outgoing.cert_chain_status;
		return true;
	end
end, 1000);