File

mod_telnet_tlsinfo/mod_telnet_tlsinfo.lua @ 6057:cc665f343690

mod_firewall: SUBSCRIBED: Flip subscription check to match documentation The documentation claims that this condition checks whether the recipient is subscribed to the sender. However, it was using the wrong method, and actually checking whether the sender was subscribed to the recipient. A quick poll of folk suggested that the documentation's approach is the right one, so this should fix the code to match the documentation. This should also fix the bundled anti-spam rules from blocking presence from JIDs that you subscribe do (but don't have a mutual subscription with).
author Matthew Wild <mwild1@gmail.com>
date Fri, 22 Nov 2024 13:50:48 +0000
parent 1132:832235cc1910
line wrap: on
line source

-- mod_telnet_tlsinfo.lua

module:set_global();
module:depends("admin_telnet");

local console_env = module:shared("/*/admin_telnet/env");
local c2s_sessions = module:shared("/*/c2s/sessions");
local s2s_sessions = module:shared("/*/s2s/sessions");

local function print_tlsinfo(print, session)
	if session.secure then
		local sock = session.conn:socket()
		for k,v in pairs(sock:info()) do
			print(("%20s: %s"):format(k, tostring(v)))
		end
	else
		print(("%20s: %s"):format("protocol", "TCP"))
	end
end

function console_env.c2s:showtls(pat)
	local print = self.session.print;
	for _, session in pairs(c2s_sessions) do
		if not pat or session.full_jid and session.full_jid:find(pat, nil, true) then
			print(session.full_jid or "unauthenticated")
			print_tlsinfo(print, session);
			print""
		end
	end
end

function console_env.s2s:showtls(pat)
	local print = self.session.print;
	for _, session in pairs(s2s_sessions) do
		if not pat or session.from_host == pat or session.to_host == pat then
			if session.direction == "outgoing" then
				print(session.from_host, "->", session.to_host)
			else
				print(session.to_host, "<-", session.from_host)
			end
			print_tlsinfo(print, session);
			print""
		end
	end
end