Changeset

6232:d72010642b31 draft default tip

Merge update
author Trần H. Trung <xmpp:trần.h.trung@trung.fun>
date Fri, 11 Apr 2025 23:19:21 +0700
parents 6211:750d64c47ec6 (current diff) 6231:6b3deaa523ad (diff)
children
files mod_invites_page/mod_invites_page.lua
diffstat 17 files changed, 144 insertions(+), 551 deletions(-) [+]
line wrap: on
line diff
--- a/mod_admin_web/admin_web/mod_admin_web.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_admin_web/admin_web/mod_admin_web.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -123,14 +123,8 @@
 	module:depends("admin_adhoc");
 	module:depends("http");
 
-	local serve;
-	if not pcall(function ()
-		local http_files = require "net.http.files";
-		serve = http_files.serve;
-	end) then
-		serve = module:depends"http_files".serve;
-	end
-	local serve_file = serve {
+	local http_files = require "net.http.files";
+	local serve_file = http_files.serve {
 		path = module:get_directory() .. "/www_files";
 	};
 
--- a/mod_cloud_notify_encrypted/README.md	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_cloud_notify_encrypted/README.md	Fri Apr 11 23:19:21 2025 +0700
@@ -15,15 +15,19 @@
 Details
 =======
 
-Add to modules_enabled, there are no configuration options.
+Add to `modules_enabled`, there are no configuration options.
 
-Depends on
+When used with Prosody 0.12.x, it has an extra dependency on
 [luaossl](http://25thandclement.com/~william/projects/luaossl.html)
 which is available in Debian as
 [`lua-luaossl`](https://tracker.debian.org/pkg/lua-luaossl) or via
 `luarocks install luaossl`.
 
-Compatibility
-=============
+Prosody 13.0.x and trunk does not require this.
+
+# Compatibility
 
-Not tested, but hopefully works on 0.11.x and later.
+  Prosody Version   Status
+  ----------------- -----------------------------------
+  13.0.x            Works
+  0.12.x            Works (with `luaossl`, see above)
--- a/mod_cloud_notify_encrypted/mod_cloud_notify_encrypted.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_cloud_notify_encrypted/mod_cloud_notify_encrypted.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -1,13 +1,23 @@
 local array = require "util.array";
 local base64 = require "util.encodings".base64;
 local valid_utf8 = require "util.encodings".utf8.valid;
-local ciphers = require "openssl.cipher";
+local have_crypto, crypto = pcall(require, "util.crypto");
 local jid = require "util.jid";
 local json = require "util.json";
 local random = require "util.random";
 local set = require "util.set";
 local st = require "util.stanza";
 
+if not have_crypto then
+	local ossl_ciphers = require "openssl.cipher";
+	crypto = {};
+	-- FIXME: luaossl does not expose the EVP_CTRL_GCM_GET_TAG API, so we append 16 NUL bytes
+	-- Siskin does not validate the tag anyway.
+	function crypto.aes_128_gcm_encrypt(key, iv, message)
+		return ciphers.new("AES-128-GCM"):encrypt(key, iv):final(message)..string.rep("\0", 16);
+	end
+end
+
 local xmlns_jmi = "urn:xmpp:jingle-message:0";
 local xmlns_jingle_apps_rtp = "urn:xmpp:jingle:apps:rtp:1";
 local xmlns_push = "urn:xmpp:push:0";
@@ -127,9 +137,7 @@
 	local key_binary = base64.decode(encryption.key_base64);
 	local push_json = json.encode(push_payload);
 
-	-- FIXME: luaossl does not expose the EVP_CTRL_GCM_GET_TAG API, so we append 16 NUL bytes
-	-- Siskin does not validate the tag anyway.
-	local encrypted_payload = base64.encode(ciphers.new("AES-128-GCM"):encrypt(key_binary, iv):final(push_json)..string.rep("\0", 16));
+	local encrypted_payload = base64.encode(crypto.aes_128_gcm_encrypt(key_binary, iv, push_json));
 	local encrypted_element = st.stanza("encrypted", { xmlns = xmlns_push_encrypt, iv = base64.encode(iv) })
 		:text(encrypted_payload);
 	if push_payload.type == "call" then
--- a/mod_conversejs/mod_conversejs.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_conversejs/mod_conversejs.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -28,17 +28,9 @@
 local serve_dist = nil;
 local resources = module:get_option_path("conversejs_resources");
 if resources then
-	local serve;
-	if prosody.process_type == "prosody" then
-		-- Prosody >= trunk / 0.12
-		local http_files = require "net.http.files";
-		serve = http_files.serve;
-	else
-		-- Prosody <= 0.11
-		serve = module:depends "http_files".serve;
-	end
+	local http_files = require "net.http.files";
 	local mime_map = module:shared("/*/http_files/mime").types or {css = "text/css"; js = "application/javascript"};
-	serve_dist = serve({path = resources; mime_map = mime_map});
+	serve_dist = http_files.serve({path = resources; mime_map = mime_map});
 
 	cdn_url = module:http_url();
 end
--- a/mod_http_libjs/mod_http_libjs.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_http_libjs/mod_http_libjs.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -1,16 +1,10 @@
+local http_files = require "net.http.files";
+
 local mime_map = module:shared("/*/http_files/mime").types or {
 	css = "text/css",
 	js = "application/javascript",
 };
 
-local serve;
-if prosody.process_type == "prosody" then
-	local http_files = require "net.http.files";
-	serve = http_files.serve;
-else
-	serve = module:depends"http_files".serve;
-end
-
 local libjs_path = module:get_option_string("libjs_path", "/usr/share/javascript");
 
 do -- sanity check
@@ -25,6 +19,6 @@
 module:provides("http", {
 		default_path = "/share";
 		route = {
-			["GET /*"] = serve({ path = libjs_path, mime_map = mime_map });
+			["GET /*"] = http_files.serve({ path = libjs_path, mime_map = mime_map });
 		}
 	});
--- a/mod_http_muc_log/mod_http_muc_log.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_http_muc_log/mod_http_muc_log.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -581,16 +581,9 @@
 
 local serve_static
 do
-	if prosody.process_type == "prosody" then
-		-- Prosody >= 0.12
-		local http_files = require "net.http.files";
-		serve = http_files.serve;
-	else
-		-- Prosody <= 0.11
-		serve = module:depends "http_files".serve;
-	end
+	local http_files = require "net.http.files";
 	local mime_map = module:shared("/*/http_files/mime").types or { css = "text/css"; js = "application/javascript" };
-	serve_static = serve({ path = resources; mime_map = mime_map });
+	serve_static = http_files.serve({ path = resources; mime_map = mime_map });
 end
 
 module:provides("http", {
--- a/mod_invite/mod_invite.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_invite/mod_invite.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -7,19 +7,12 @@
 local rostermanager = require "core.rostermanager";
 local tohtml = require "util.stanza".xml_escape
 local nodeprep = require "util.encodings".stringprep.nodeprep;
+local http_files = require "net.http.files";
 local tostring = tostring;
 
 local invite_storage = module:open_store();
 local inviter_storage = module:open_store("inviter");
 
-local serve;
-if prosody.process_type == "prosody" then
-	local http_files = require "net.http.files";
-	serve = http_files.serve;
-else
-	serve = module:depends"http_files".serve;
-end
-
 module:depends"adhoc";
 module:depends"http";
 
@@ -132,7 +125,7 @@
 
 module:provides("http", {
 	route = {
-		["GET /bootstrap.min.css"] = serve(module:get_directory() .. "/invite/bootstrap.min.css");
+		["GET /bootstrap.min.css"] = http_files.serve(module:get_directory() .. "/invite/bootstrap.min.css");
 		["GET /*"] = generate_page;
 		POST = handle_form;
 	};
--- a/mod_invites_page/mod_invites_page.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_invites_page/mod_invites_page.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -34,12 +34,7 @@
 	-- Load HTTP-serving dependencies
 	if prosody.shutdown then -- not if running under prosodyctl
 		module:depends("http");
-
-		if prosody.process_type == "prosody" then
-			http_files = require "net.http.files";
-		else
-			http_files = module:depends"http_files";
-		end
+		http_files = require "net.http.files";
 	elseif prosody.process_type and module.get_option_period then
 		module:depends("http");
 		http_files = require "net.http.files";
--- a/mod_jsxc/mod_jsxc.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_jsxc/mod_jsxc.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -19,17 +19,9 @@
 local serve_dist = nil;
 local resources = module:get_option_path("jsxc_resources");
 if resources then
-	local serve;
-	if prosody.process_type == "prosody" then
-		-- Prosody >= trunk / 0.12
-		local http_files = require "net.http.files";
-		serve = http_files.serve;
-	else
-		-- Prosody <= 0.11
-		serve = module:depends "http_files".serve;
-	end
+	local http_files = require "net.http.files";
 	local mime_map = module:shared("/*/http_files/mime").types or { css = "text/css", js = "application/javascript" };
-	serve_dist = serve({ path = resources, mime_map = mime_map });
+	serve_dist = http_files.serve({ path = resources, mime_map = mime_map });
 
 	cdn_url = module:http_url();
 end
--- a/mod_password_reset/mod_password_reset.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_password_reset/mod_password_reset.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -8,19 +8,12 @@
 local dataforms_new = require "util.dataforms".new;
 local st = require "util.stanza";
 local apply_template = require"util.interpolation".new("%b{}", st.xml_escape);
+local http_files = require "net.http.files";
 
 local reset_tokens = module:open_store();
 
 local max_token_age = module:get_option_number("password_reset_validity", 86400);
 
-local serve;
-if prosody.process_type == "prosody" then
-	local http_files = require "net.http.files";
-	serve = http_files.serve;
-else
-	serve = module:depends"http_files".serve;
-end
-
 module:depends("adhoc");
 module:depends("http");
 local password_policy = module:depends("password_policy");
@@ -90,7 +83,7 @@
 
 module:provides("http", {
 	route = {
-		["GET /bootstrap.min.css"] = serve(module:get_directory() .. "/password_reset/bootstrap.min.css");
+		["GET /bootstrap.min.css"] = http_files.serve(module:get_directory() .. "/password_reset/bootstrap.min.css");
 		["GET /reset"] = generate_page;
 		["POST /reset"] = handle_form;
 	};
--- a/mod_push2/README.md	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_push2/README.md	Fri Apr 11 23:19:21 2025 +0700
@@ -16,6 +16,7 @@
   ------------------------------------ ----------------- -------------------------------------------------------------------------------------------------------------------
   `contact_uri`                        xmpp:server.tld   Contact information for the server operator (usually as a `mailto:` URI is preferred)
   `push_max_hibernation_timeout`       `259200` (72h)    Number of seconds to extend the smacks timeout if no push was triggered yet (default: 72 hours)
+  `hibernate_past_first_push`          `true`            Keep hibernating using the `push_max_hibernation_timeout` even after first push
 
 Internal design notes
 =====================
--- a/mod_push2/mod_push2.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_push2/mod_push2.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -9,11 +9,14 @@
 local crypto = require "util.crypto";
 local jwt = require "util.jwt";
 
+pcall(function() module:depends("track_muc_joins") end)
+
 local xmlns_push = "urn:xmpp:push2:0";
 
 -- configuration
 local contact_uri = module:get_option_string("contact_uri", "xmpp:" .. module.host)
 local extended_hibernation_timeout = module:get_option_number("push_max_hibernation_timeout", 72*3600)  -- use same timeout like ejabberd
+local hibernate_past_first_push = module:get_option_boolean("hibernate_past_first_push", true)
 
 local host_sessions = prosody.hosts[module.host].sessions
 local push2_registrations = module:open_store("push2_registrations", "keyval")
@@ -28,7 +31,22 @@
 module:hook("account-disco-info", account_dico_info);
 
 local function parse_match(matchel)
-		local match = { match = matchel.attr.profile }
+		local match = { match = matchel.attr.profile, chats = {} }
+
+		for chatel in matchel:childtags("chat") do
+			local chat = {}
+			if chatel:get_child("mention") then
+				chat.mention = true
+			end
+			if chatel:get_child("reply") then
+				chat.reply = true
+			end
+			match.chats[chatel.attr.jid] = chat
+		end
+
+		match.grace = matchel:get_child_text("grace")
+		if match.grace then match.grace = tonumber(match.grace) end
+
 		local send = matchel:get_child("send", "urn:xmpp:push2:send:notify-only:0")
 		if send then
 			match.send = send.attr.xmlns
@@ -156,7 +174,7 @@
 end
 
 -- is this push a high priority one
-local function is_important(stanza)
+local function is_important(stanza, session)
 	local is_voip_stanza, urgent_reason = is_voip(stanza)
 	if is_voip_stanza then return true; end
 
@@ -177,8 +195,17 @@
 		-- carbon copied outgoing messages are not important
 		if carbon and stanza_direction == "out" then return false; end
 
-		-- groupchat subjects are not important here
-		if st_type == "groupchat" and stanza:get_child_text("subject") then
+		-- groupchat reflections are not important here
+		if st_type == "groupchat" and session and session.rooms_joined then
+			local muc = jid.bare(stanza.attr.from)
+			local from_nick = jid.resource(stanza.attr.from)
+			if from_nick == session.rooms_joined[muc] then
+				return false
+			end
+		end
+
+		-- edits are not imporatnt
+		if stanza:get_child("replace", "urn:xmpp:message-correct:0") then
 			return false
 		end
 
@@ -222,7 +249,7 @@
 	end
 	if string.len(envelope_bytes) > max_data_size then
 		local body = stanza:get_child_text("body")
-		if string.len(body) > 50 then
+		if body and string.len(body) > 50 then
 			stanza_clone:maptags(function(el)
 				if el.name == "body" then
 					return nil
@@ -251,8 +278,9 @@
 		end)
 		envelope_bytes = tostring(envelope)
 	end
-	if string.len(envelope_bytes) < max_data_size/2 then
-		envelope:text_tag("rpad", base64.encode(random.bytes(math.min(150, max_data_size/3 - string.len(envelope_bytes)))))
+	local padding_size = math.min(150, max_data_size/3 - string.len(envelope_bytes))
+	if padding_size > 0 then
+		envelope:text_tag("rpad", base64.encode(random.bytes(padding_size)))
 		envelope_bytes = tostring(envelope)
 	end
 
@@ -294,12 +322,12 @@
 	push_notification_payload:text_tag("jwt", signer(payload), { key = base64.encode(public_key) })
 end
 
-local function handle_notify_request(stanza, node, user_push_services, log_push_decline)
+local function handle_notify_request(stanza, node, user_push_services, session, log_push_decline)
 	local pushes = 0;
 	if not #user_push_services then return pushes end
 
 	local notify_push_services = {};
-	if is_important(stanza) then
+	if is_important(stanza, session) then
 		notify_push_services = user_push_services
 	else
 		for identifier, push_info in pairs(user_push_services) do
@@ -329,7 +357,7 @@
 		if send_push then
 			local push_notification_payload = st.stanza("notification", { xmlns = xmlns_push })
 			push_notification_payload:text_tag("client", push_info.client)
-			push_notification_payload:text_tag("priority", is_voip(stanza) and "high" or (is_important(stanza) and "normal" or "low"))
+			push_notification_payload:text_tag("priority", is_voip(stanza) and "high" or (is_important(stanza, session) and "normal" or "low"))
 			if is_voip(stanza) then
 				push_notification_payload:tag("voip"):up()
 			end
@@ -340,13 +368,47 @@
 				if match.match == "urn:xmpp:push2:match:all" then
 					does_match = true
 				elseif match.match == "urn:xmpp:push2:match:important" then
-					does_match = is_important(stanza)
+					does_match = is_important(stanza, session)
 				elseif match.match == "urn:xmpp:push2:match:archived" then
 					does_match = stanza:get_child("stana-id", "urn:xmpp:sid:0")
 				elseif match.match == "urn:xmpp:push2:match:archived-with-body" then
 					does_match = stanza:get_child("stana-id", "urn:xmpp:sid:0") and has_body(stanza)
 				end
 
+				local to_user, to_host = jid.split(stanza.attr.to)
+				to_user = to_user or session.username
+				to_host = to_host or module.host
+
+				-- If another session has recent activity within configured grace period, don't send push
+				if does_match and match.grace and to_host == module.host and host_sessions[to_user] then
+					local now = os_time()
+					for _, session in pairs(host_sessions[to_user].sessions) do
+						if session.last_activity and session.push_registration_id ~= push_registration_id and (now - session.last_activity) < match.grace then
+							does_match = false
+						end
+					end
+				end
+
+				local chat = match.chats and (match.chats[stanza.attr.from] or match.chats[jid.bare(stanza.attr.from)] or match.chats[jid.host(stanza.attr.from)])
+				if does_match and chat then
+					does_match = false
+
+					local nick = (session.rooms_joined and session.rooms_joined[jid.bare(stanza.attr.from)]) or to_user
+
+					if not does_match and chat.mention then
+						local body = stanza:get_child_text("body")
+						if body and body:find(nick, 1, true) then
+							does_match = true
+						end
+					end
+					if not does_match and chat.reply then
+						local reply = stanza:get_child("reply", "urn:xmpp:reply:0")
+						if reply and (reply.attr.to == to_user.."@"..to_host or (jid.bare(reply.attr.to) == jid.bare(stanza.attr.from) and jid.resource(reply.attr.to) == nick)) then
+							does_match = true
+						end
+					end
+				end
+
 				if does_match and not sends_added[match.send] then
 					sends_added[match.send] = true
 					if match.send == "urn:xmpp:push2:send:notify-only" then
@@ -384,7 +446,7 @@
 module:hook("message/offline/handle", function(event)
 	local node, user_push_services = get_push_settings(event.stanza, event.origin);
 	module:log("debug", "Invoking handle_notify_request() for offline stanza");
-	handle_notify_request(event.stanza, node, user_push_services, true);
+	handle_notify_request(event.stanza, node, user_push_services, event.origin, true);
 end, 1);
 
 -- publish on bare groupchat
@@ -402,7 +464,7 @@
 		end
 	end
 
-	handle_notify_request(event.stanza, node, notify_push_services, true);
+	handle_notify_request(event.stanza, node, notify_push_services, event.origin, true);
 end, 1);
 
 local function process_stanza_queue(queue, session, queue_type)
@@ -415,14 +477,14 @@
 			local node, all_push_services = get_push_settings(stanza, session)
 			local user_push_services = {[session.push_registration_id] = all_push_services[session.push_registration_id]}
 			local stanza_type = "unimportant";
-			if is_important(stanza) then stanza_type = "important"; end
+			if is_important(stanza, session) then stanza_type = "important"; end
 			if not notified[stanza_type] then		-- only notify if we didn't try to push for this stanza type already
-				if handle_notify_request(stanza, node, user_push_services, false) ~= 0 then
+				if handle_notify_request(stanza, node, user_push_services, session, false) ~= 0 then
 					if session.hibernating and not session.first_hibernated_push then
 						-- if the message was important
 						-- then record the time of first push in the session for the smack module which will extend its hibernation
 						-- timeout based on the value of session.first_hibernated_push
-						if is_important(stanza) then
+						if is_important(stanza, session) and not hibernate_past_first_push then
 							session.first_hibernated_push = os_time();
 							-- check for prosody 0.12 mod_smacks
 							if session.hibernating_watchdog and session.original_smacks_callback and session.original_smacks_timeout then
@@ -567,7 +629,7 @@
 			end
 		end
 
-		handle_notify_request(stanza, to_user, notify_push_services, true);
+		handle_notify_request(stanza, to_user, notify_push_services, event.origin, true);
 	end
 end
 
@@ -577,6 +639,15 @@
 module:hook("smacks-hibernation-stanza-queued", process_smacks_stanza);
 module:hook("archive-message-added", archive_message_added);
 
+local function track_activity(event)
+	if has_body(event.stanza) or event.stanza:child_with_ns("http://jabber.org/protocol/chatstates") then
+		event.origin.last_activity = os_time()
+	end
+end
+
+module:hook("pre-message/bare", track_activity)
+module:hook("pre-message/full", track_activity)
+
 module:log("info", "Module loaded");
 function module.unload()
 	module:log("info", "Unloading module");
--- a/mod_push2/push2.md	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_push2/push2.md	Fri Apr 11 23:19:21 2025 +0700
@@ -15,6 +15,10 @@
     <service>pusher@push.example.com</service>
     <client>https://push.example.com/adlfkjadafdasf</client>
     <match profile="urn:xmpp:push2:match:archived-with-body">
+        <grace>144</grace>
+        <chat jid="somemuc@conference.example.com">
+            <mention/>
+        </chat>
         <send xmlns="urn:xmpp:push2:send:notify-only:0"/>
     </match>
 </enable>
@@ -26,6 +30,10 @@
 
 The `<match/>` and `<send/>` elements define what profiles to use for matching stanzas and sending notifications. These are described later in this document.
 
+The optional `<chat/>` child of `<match/>` allows extra filtering of pushes for only specific chats. No specified filters means muted, do not push. `<mention/>` means push on mentions, `<reply/>` means push on replies.
+
+The optional `<grace/>` child of `<match/>` allows specifying a "grace period" in seconds where activity on another session by the same user (such as sending a message) will temporarily pause sending push notifications.
+
 ## Match and send profiles
 
 Different clients and push services have different requirements for push notifications, often due to the differing capabilities of target platforms.
--- a/mod_register_apps/mod_register_apps.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_register_apps/mod_register_apps.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -1,13 +1,6 @@
 -- luacheck: ignore 631
 module:depends("http");
-local http_files
-if prosody.process_type then
-	-- Prosody >= 0.12
-	http_files = require "net.http.files";
-else
-	-- Prosody <= 0.11
-	http_files = module:depends "http_files";
-end
+local http_files = require "net.http.files";
 
 local app_config = module:get_option("site_apps", {
 	{
@@ -225,7 +218,7 @@
 
 module:provides("http", {
 	route = {
-		["GET /assets/*"] = http_files and http_files.serve({
+		["GET /assets/*"] = http_files.serve({
 			path = module:get_directory().."/assets";
 			mime_map = mime_map;
 		});
--- a/mod_s2s_auth_dane/README.md	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_s2s_auth_dane/README.md	Fri Apr 11 23:19:21 2025 +0700
@@ -1,10 +1,16 @@
 ---
 labels:
-- Stage-Broken
+- Stage-Obsolete
 - Type-S2SAuth
 summary: S2S authentication using DANE
 ...
 
+::: {.alert .alert-warning}
+This module no longer works with recent versions of Prosody.
+
+However, Prosody as of [13.0.0](//prosody.im/doc/release/13.0.0) ships with native support for [DANE](//prosody.im/doc/dnssec).
+:::
+
 Introduction
 ============
 
--- a/mod_s2s_auth_dane/mod_s2s_auth_dane.lua	Tue Mar 18 00:31:36 2025 +0700
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,436 +0,0 @@
--- mod_s2s_auth_dane
--- Copyright (C) 2013-2014 Kim Alvefur
---
--- This file is MIT/X11 licensed.
---
--- Implements DANE and Secure Delegation using DNS SRV as described in
--- http://tools.ietf.org/html/draft-miller-xmpp-dnssec-prooftype
---
--- Known issues:
--- Could be done much cleaner if mod_s2s was using util.async
---
--- TODO Things to test/handle:
--- Negative or bogus answers
--- No encryption offered
--- Different hostname before and after STARTTLS - mod_s2s should complain
--- Interaction with Dialback
---
--- luacheck: ignore module
-
-module:set_global();
-
-local have_async, async = pcall(require, "util.async");
-local noop = function () end
-local unpack = table.unpack or _G.unpack;
-local type = type;
-local t_insert = table.insert;
-local set = require"util.set";
-local dns_lookup = require"net.adns".lookup;
-local hashes = require"util.hashes";
-local base64 = require"util.encodings".base64;
-local idna_to_ascii = require "util.encodings".idna.to_ascii;
-local idna_to_unicode = require"util.encodings".idna.to_unicode;
-local nameprep = require"util.encodings".stringprep.nameprep;
-local cert_verify_identity = require "util.x509".verify_identity;
-
-do
-	local net_dns = require"net.dns";
-	if not net_dns.types or not net_dns.types[52] then
-		module:log("error", "No TLSA support available, DANE will not be supported");
-		return
-	end
-end
-
-local pat = "%-%-%-%-%-BEGIN ([A-Z ]+)%-%-%-%-%-\r?\n"..
-"([0-9A-Za-z=+/\r\n]*)\r?\n%-%-%-%-%-END %1%-%-%-%-%-";
-local function pem2der(pem)
-	local typ, data = pem:match(pat);
-	if typ and data then
-		return base64.decode(data), typ;
-	end
-end
-local use_map = { ["DANE-EE"] = 3; ["DANE-TA"] = 2; ["PKIX-EE"] = 1; ["PKIX-CA"] = 0 }
-
-local implemented_uses = set.new { "DANE-EE", "PKIX-EE" };
-do
-	local cert_mt = debug.getregistry()["SSL:Certificate"];
-	if cert_mt and cert_mt.__index.issued then
-		-- Need cert:issued() for these
-		implemented_uses:add("DANE-TA");
-		implemented_uses:add("PKIX-CA");
-	else
-		module:log("debug", "The cert:issued() method is unavailable, DANE-TA and PKIX-CA can't be enabled");
-	end
-	if not cert_mt.__index.pubkey then
-		module:log("debug", "The cert:pubkey() method is unavailable, the SPKI usage can't be supported");
-	end
-end
-local configured_uses = module:get_option_set("dane_uses", { "DANE-EE", "DANE-TA" });
-local enabled_uses = set.intersection(implemented_uses, configured_uses) / function(use) return use_map[use] end;
-local unsupported = configured_uses - implemented_uses;
-if not unsupported:empty() then
-	module:log("warn", "Unable to support DANE uses %s", tostring(unsupported));
-end
-
--- Find applicable TLSA records
--- Takes a s2sin/out and a callback
-local function dane_lookup(host_session, cb)
-	cb = cb or noop;
-	local log = host_session.log or module._log;
-	if host_session.dane ~= nil then return end -- Has already done a lookup
-
-	if host_session.direction == "incoming" then
-		if not host_session.from_host then
-			log("debug", "Session doesn't have a 'from' host set");
-			return;
-		end
-		-- We don't know what hostname or port to use for Incoming connections
-		-- so we do a SRV lookup and then request TLSA records for each SRV
-		-- Most servers will probably use the same certificate on outgoing
-		-- and incoming connections, so this should work well
-		local name = host_session.from_host and idna_to_ascii(host_session.from_host);
-		if not name then
-			log("warn", "Could not convert '%s' to ASCII for DNS lookup", tostring(host_session.from_host));
-			return;
-		end
-		log("debug", "Querying SRV records from _xmpp-server._tcp.%s.", name);
-		host_session.dane = dns_lookup(function (answer, err)
-			host_session.dane = false; -- Mark that we already did the lookup
-
-			if not answer then
-				log("debug", "Resolver error: %s", tostring(err));
-				return cb(host_session);
-			end
-
-			if answer.bogus then
-				log("warn", "Results are bogus!");
-				-- Bad sign, probably not a good idea to do any fallback here
-				host_session.dane = answer;
-			elseif not answer.secure then
-				log("debug", "Results are not secure");
-				return cb(host_session);
-			end
-
-			local n = answer.n or #answer;
-			if n == 0 then
-				-- No SRV records, synthesize fallback host and port
-				-- this may behave oddly for connections in the other direction if
-				-- mod_s2s doesn't keep the answer around
-				answer[1] = { srv = { target = name, port = 5269 } };
-				n = 1;
-			elseif n == 1 and answer[1].srv.target == '.' then
-				return cb(host_session); -- No service ... This shouldn't happen?
-			end
-			local srv_hosts = { answer = answer };
-			host_session.srv_hosts = srv_hosts;
-			local dane;
-			for _, record in ipairs(answer) do
-				t_insert(srv_hosts, record.srv);
-				log("debug", "Querying TLSA record for %s:%d", record.srv.target, record.srv.port);
-				dns_lookup(function(dane_answer)
-					log("debug", "Got answer for %s:%d", record.srv.target, record.srv.port);
-					n = n - 1;
-					-- There are three kinds of answers
-					-- Insecure, Secure and Bogus
-					--
-					-- We collect Secure answers for later use
-					--
-					-- Insecure (legacy) answers are simply ignored
-					--
-					-- If we get a Bogus (dnssec error) reply, keep the
-					-- status around.  If there were only bogus replies, the
-					-- connection will be aborted.  If there were at least
-					-- one non-Bogus reply, we proceed.  If none of the
-					-- replies matched, we consider the connection insecure.
-
-					if (dane_answer.bogus or dane_answer.secure) and not dane then
-						-- The first answer we care about
-						-- For services with only one SRV record, this will be the only one
-						log("debug", "First secure (or bogus) TLSA")
-						dane = dane_answer;
-					elseif dane_answer.bogus then
-						log("debug", "Got additional bogus TLSA")
-						dane.bogus = dane_answer.bogus;
-					elseif dane_answer.secure then
-						log("debug", "Got additional secure TLSA")
-						for _, dane_record in ipairs(dane_answer) do
-							t_insert(dane, dane_record);
-						end
-					end
-					if n == 0 then
-						if dane then
-							host_session.dane = dane;
-							if #dane > 0 and dane.bogus then
-								-- Got at least one non-bogus reply,
-								-- This should trigger a failure if one of them did not match
-								log("warn", "Ignoring bogus replies");
-								dane.bogus = nil;
-							end
-							if #dane == 0 and dane.bogus == nil then
-								-- Got no usable data
-								host_session.dane = false;
-							end
-						end
-						return cb(host_session);
-					end
-				end, ("_%d._tcp.%s."):format(record.srv.port, record.srv.target), "TLSA");
-			end
-		end, "_xmpp-server._tcp."..name..".", "SRV");
-		return true;
-	elseif host_session.direction == "outgoing" then
-		-- Prosody has already done SRV lookups for outgoing session, so check if those are secure
-		local srv_hosts = host_session.srv_hosts;
-		if not ( srv_hosts and srv_hosts.answer and srv_hosts.answer.secure ) then
-			return; -- No secure SRV records, fall back to non-DANE mode
-			-- Empty response were not kept by older mod_s2s/s2sout
-		end
-		-- Do TLSA lookup for currently selected SRV record
-		local srv_choice = srv_hosts[host_session.srv_choice or 0] or { target = idna_to_ascii(host_session.to_host), port = 5269 };
-		log("debug", "Querying TLSA record for %s:%d", srv_choice.target, srv_choice.port);
-		host_session.dane = dns_lookup(function(answer)
-			if answer and ((answer.secure and #answer > 0) or answer.bogus) then
-				srv_choice.dane = answer;
-			else
-				srv_choice.dane = false;
-			end
-			host_session.dane = srv_choice.dane;
-			return cb(host_session);
-		end, ("_%d._tcp.%s."):format(srv_choice.port, srv_choice.target), "TLSA");
-		return true;
-	end
-end
-
-local function pause(host_session)
-	host_session.log("debug", "Pausing connection until DANE lookup is completed");
-	host_session.conn:pause()
-end
-
-local function resume(host_session)
-	host_session.log("debug", "DANE lookup completed, resuming connection");
-	host_session.conn:resume()
-end
-
-if have_async then
-	function pause(host_session)
-		host_session.log("debug", "Pausing connection until DANE lookup is completed");
-		local wait, done = async.waiter();
-		host_session._done_waiting_for_dane = done;
-		wait();
-	end
-	local function _resume(_, host_session)
-		if host_session._done_waiting_for_dane then
-			host_session.log("debug", "DANE lookup completed, resuming connection");
-			host_session._done_waiting_for_dane();
-			host_session._done_waiting_for_dane = nil;
-		end
-	end
-	function resume(host_session)
-		-- Something about the way luaunbound calls callbacks is messed up
-		if host_session._done_waiting_for_dane then
-			module:add_timer(0, _resume, host_session);
-		end
-	end
-end
-
-local new_dane = module:get_option_boolean("use_dane", false);
-
-function module.add_host(module)
-	local function on_new_s2s(event)
-		local host_session = event.origin;
-		if host_session.type == "s2sout" or host_session.type == "s2sin" then
-			return; -- Already authenticated
-		end
-		if host_session.dane ~= nil then
-			return; -- Already done DANE lookup
-		end
-		dane_lookup(host_session, resume);
-		-- Let it run in parallel until we need to check the cert
-	end
-
-	if not new_dane then
-		-- New outgoing connections
-		module:hook("stanza/http://etherx.jabber.org/streams:features", on_new_s2s, 501);
-		module:hook("s2sout-authenticate-legacy", on_new_s2s, 200);
-	end
-
-	-- New incoming connections
-	module:hook("s2s-stream-features", on_new_s2s, 10);
-
-	module:hook("s2s-authenticated", function(event)
-		local session = event.session;
-		if session.dane and type(session.dane) == "table" and next(session.dane) ~= nil and not session.secure then
-			-- TLSA record but no TLS, not ok.
-			-- TODO Optional?
-			-- Bogus replies should trigger this path
-			-- How does this interact with Dialback?
-			session:close({
-				condition = "policy-violation",
-				text = "Encrypted server-to-server communication is required but was not "
-					..((session.direction == "outgoing" and "offered") or "used")
-			});
-			return false;
-		end
-		-- Cleanup
-		session.srv_hosts = nil;
-	end);
-end
-
--- Compare one TLSA record against a certificate
-local function one_dane_check(tlsa, cert, log)
-	local select, match, certdata = tlsa.select, tlsa.match;
-
-	if select == 0 then
-		certdata = pem2der(cert:pem());
-	elseif select == 1 and cert.pubkey then
-		certdata = pem2der(cert:pubkey());
-	else
-		log("warn", "DANE selector %s is unsupported", tlsa:getSelector() or select);
-		return;
-	end
-
-	if match == 1 then
-		certdata = hashes.sha256(certdata);
-	elseif match == 2 then
-		certdata = hashes.sha512(certdata);
-	elseif match ~= 0 then
-		log("warn", "DANE match rule %s is unsupported", tlsa:getMatchType() or match);
-		return;
-	end
-
-	if #certdata ~= #tlsa.data then
-		log("warn", "Length mismatch: Cert: %d, TLSA: %d", #certdata, #tlsa.data);
-	end
-	return certdata == tlsa.data;
-end
-
-module:hook("s2s-check-certificate", function(event)
-	local session, cert, host = event.session, event.cert, event.host;
-	if not cert then return end
-	local log = session.log or module._log;
-	local dane = session.dane;
-	if type(dane) ~= "table" then
-		if dane == nil and dane_lookup(session, resume) then
-			pause(session);
-			dane = session.dane;
-		end
-	end
-	if type(dane) == "table" then
-		local match_found, supported_found;
-		for i = 1, #dane do
-			local tlsa = dane[i].tlsa;
-			log("debug", "TLSA #%d: %s", i, tostring(tlsa))
-			local use = tlsa.use;
-
-			if enabled_uses:contains(use) then
-				-- DANE-EE or PKIX-EE
-				if use == 3 or use == 1 then
-					-- Should we check if the cert subject matches?
-					local is_match = one_dane_check(tlsa, cert, log);
-					if is_match ~= nil then
-						supported_found = true;
-					end
-					if is_match and use == 1 and session.cert_chain_status ~= "valid" then
-						-- for usage 1, PKIX-EE, the chain has to be valid already
-						log("debug", "PKIX-EE TLSA matches untrusted certificate");
-						is_match = false;
-					end
-					if is_match then
-						log("info", "DANE validated ok for %s using %s", host, tlsa:getUsage());
-						session.cert_identity_status = "valid";
-						if use == 3 then -- DANE-EE, chain status equals DNSSEC chain status
-							session.cert_chain_status = "valid";
-						end
-						match_found = true;
-						dane.matching = tlsa;
-						break;
-					end
-				-- DANE-TA or PKIX-CA
-				elseif use == 2 or use == 0 then
-					supported_found = true;
-					local chain = session.conn:socket():getpeerchain();
-					for c = 1, #chain do
-						local cacert = chain[c];
-						local is_match = one_dane_check(tlsa, cacert, log);
-						if is_match ~= nil then
-							supported_found = true;
-						end
-						if is_match and not cacert:issued(cert, unpack(chain)) then
-							is_match = false;
-						end
-						if is_match and use == 0 and session.cert_chain_status ~= "valid" then
-							-- for usage 0, PKIX-CA, identity and chain has to be valid already
-							is_match = false;
-						end
-						if is_match then
-							log("info", "DANE validated ok for %s using %s", host, tlsa:getUsage());
-							if use == 2 then -- DANE-TA
-								session.cert_identity_status = "valid";
-								if cert_verify_identity(host, "xmpp-server", cert) then
-									session.cert_chain_status = "valid";
-									-- else -- TODO Check against SRV target?
-								end
-							end
-							match_found = true;
-							dane.matching = tlsa;
-							break;
-						end
-					end
-					if match_found then break end
-				end
-			end
-		end
-		if supported_found and not match_found or dane.bogus then
-			-- No TLSA matched or response was bogus
-			local why = "No TLSA matched certificate";
-			if dane.bogus then
-				why = "Bogus: "..tostring(dane.bogus);
-			end
-			log("warn", "DANE validation failed for %s: %s", host, why);
-			session.cert_identity_status = "invalid";
-			session.cert_chain_status = "invalid";
-		end
-	else
-		if session.cert_chain_status == "valid" and session.cert_identity_status ~= "valid"
-		and session.srv_hosts and session.srv_hosts.answer and session.srv_hosts.answer.secure then
-			local srv_hosts, srv_choice, srv_target = session.srv_hosts, session.srv_choice;
-			for i = srv_choice or 1, srv_choice or #srv_hosts do
-				srv_target = session.srv_hosts[i].target:gsub("%.?$","");
-				log("debug", "Comparing certificate with Secure SRV target %s", srv_target);
-				srv_target = nameprep(idna_to_unicode(srv_target));
-				if srv_target and cert_verify_identity(srv_target, "xmpp-server", cert) then
-					log("info", "Certificate for %s matches Secure SRV target %s", host, srv_target);
-					session.cert_identity_status = "valid";
-					return;
-				end
-			end
-		end
-	end
-end);
-
--- Telnet command
-if module:get_option_set("modules_enabled", {}):contains("admin_telnet") then
-	module:depends("admin_telnet"); -- Make sure the env is there
-	local def_env = module:shared("admin_telnet/env");
-
-	local function annotate(session, line)
-		line = line or {};
-		table.insert(line, "--");
-		if session.dane == nil then
-			table.insert(line, "No DANE attempted, probably insecure SRV response");
-		elseif session.dane == false then
-			table.insert(line, "DANE failed or response was insecure");
-		elseif type(session.dane) ~= "table" then
-			table.insert(line, "Waiting for DANE records...");
-		elseif session.dane.matching then
-			table.insert(line, "Matching DANE record:\n|       " .. tostring(session.dane.matching));
-		else
-			table.insert(line, "DANE records:\n|       " .. tostring(session.dane));
-		end
-		return table.concat(line, " ");
-	end
-
-	function def_env.s2s:show_dane(...)
-		return self:show(..., annotate);
-	end
-end
-
--- a/mod_welcome_page/mod_welcome_page.lua	Tue Mar 18 00:31:36 2025 +0700
+++ b/mod_welcome_page/mod_welcome_page.lua	Fri Apr 11 23:19:21 2025 +0700
@@ -3,6 +3,7 @@
 local render_html_template = require"util.interpolation".new("%b{}", st.xml_escape, {
 	urlescape = url_escape;
 });
+local http_files = require "net.http.files";
 
 local template_path = module:get_option_string("welcome_page_template_path", module:get_directory().."/html");
 local user_vars = module:get_option("welcome_page_variables", {});
@@ -61,15 +62,6 @@
 	return 303;
 end
 
-local http_files
-if prosody.process_type == "prosody" then
-	-- Prosody >= 0.12
-	http_files = require "net.http.files";
-else
-	-- Prosody <= 0.11
-	http_files = module:depends "http_files";
-end
-
 module:provides("http", {
 	default_path = "/";
 	route = {