Mon, 30 Oct 2023 12:28:12 +0000 mod_storage_ejabberdsql_readonly: Don't use MySQL-specific syntax
Matthew Wild <mwild1@gmail.com> [Mon, 30 Oct 2023 12:28:12 +0000] rev 5688
mod_storage_ejabberdsql_readonly: Don't use MySQL-specific syntax util.sql should take care of transformation when MySQL is in use.
Sun, 29 Oct 2023 12:41:56 +0100 mod_client_management: Bail out retrieving tokens for user
Kim Alvefur <zash@zash.se> [Sun, 29 Oct 2023 12:41:56 +0100] rev 5687
mod_client_management: Bail out retrieving tokens for user Fixes core/usermanager.lua:118: attempt to index a nil value (field '?')
Sun, 29 Oct 2023 11:30:49 +0100 mod_http_oauth2: Limit revocation to clients own tokens in strict mode
Kim Alvefur <zash@zash.se> [Sun, 29 Oct 2023 11:30:49 +0100] rev 5686
mod_http_oauth2: Limit revocation to clients own tokens in strict mode RFC 7009 section 2.1 states: > The authorization server first validates the client credentials (in > case of a confidential client) and then verifies whether the token was > issued to the client making the revocation request. If this > validation fails, the request is refused and the client is informed of > the error by the authorization server as described below. The first part was already covered (in strict mode). This adds the later part using the hash of client_id recorded in 0860497152af It still seems weird to me that revoking a leaked token should not be allowed whoever might have discovered it, as that seems the responsible thing to do.
Sun, 29 Oct 2023 11:20:15 +0100 mod_http_oauth2: Restrict introspection to clients own tokens
Kim Alvefur <zash@zash.se> [Sun, 29 Oct 2023 11:20:15 +0100] rev 5685
mod_http_oauth2: Restrict introspection to clients own tokens The introspection code was added before the client hash was added in 0860497152af which allows connecting tokens to clients.
Thu, 25 May 2023 09:31:21 +0200 mod_http_oauth2: Implement introspection endpoint
Kim Alvefur <zash@zash.se> [Thu, 25 May 2023 09:31:21 +0200] rev 5684
mod_http_oauth2: Implement introspection endpoint "Tell me about this token"
Wed, 25 Oct 2023 17:18:50 +0200 mod_http_status: Add IP allowlisting capabilities
Kim Alvefur <zash@zash.se> [Wed, 25 Oct 2023 17:18:50 +0200] rev 5683
mod_http_status: Add IP allowlisting capabilities Based on mod_http_openmetrics
Wed, 25 Oct 2023 15:36:20 +0200 mod_rest: Limit payload size (cf stanza size limits)
Kim Alvefur <zash@zash.se> [Wed, 25 Oct 2023 15:36:20 +0200] rev 5682
mod_rest: Limit payload size (cf stanza size limits) Otherwise the limit would be defined by the HTTP stack.
Sat, 14 Oct 2023 23:05:59 +0200 mod_storage_s3: Add brief README
Kim Alvefur <zash@zash.se> [Sat, 14 Oct 2023 23:05:59 +0200] rev 5681
mod_storage_s3: Add brief README
Sat, 14 Oct 2023 22:50:29 +0200 mod_storage_s3: Treat 404 to GET as a signal for empty data
Kim Alvefur <zash@zash.se> [Sat, 14 Oct 2023 22:50:29 +0200] rev 5680
mod_storage_s3: Treat 404 to GET as a signal for empty data
Sat, 14 Oct 2023 22:49:57 +0200 mod_storage_s3: Use '@' as placeholder for empty (host) store slots
Kim Alvefur <zash@zash.se> [Sat, 14 Oct 2023 22:49:57 +0200] rev 5679
mod_storage_s3: Use '@' as placeholder for empty (host) store slots Used when the server stores things for itself.
(0) -3000 -1000 -300 -100 -10 +10 +100 tip