Sat, 23 Dec 2023 00:01:30 +0100 mod_http_oauth2: Tweak fallback error text
Kim Alvefur <zash@zash.se> [Sat, 23 Dec 2023 00:01:30 +0100] rev 5802
mod_http_oauth2: Tweak fallback error text Since the oauth error is more like the error condition, a symbolic error code, not the most human-friendly. Many error cases do have human-readable error descriptions that should be fine on their own, or changed to be. As a fallback, capitalize the error name.
Thu, 21 Dec 2023 18:26:42 +0100 mod_http_oauth2: Improve registration schema documentation parts
Kim Alvefur <zash@zash.se> [Thu, 21 Dec 2023 18:26:42 +0100] rev 5801
mod_http_oauth2: Improve registration schema documentation parts
Fri, 15 Dec 2023 12:10:07 +0100 mod_http_oauth2: Do not enforce PKCE on Device and OOB flows
Kim Alvefur <zash@zash.se> [Fri, 15 Dec 2023 12:10:07 +0100] rev 5800
mod_http_oauth2: Do not enforce PKCE on Device and OOB flows PKCE does not appear to be used with the Device flow. I have found no mention of any interaction between those standards. Since no data is delivered via redirects in these cases, PKCE may not serve any purpose. This is mostly a problem because we reuse the authorization code to implement the Device and OOB flows.
Thu, 14 Dec 2023 09:44:13 +0000 mod_groups_internal: Return group name instead of MUC name if MUC has no name
Matthew Wild <mwild1@gmail.com> [Thu, 14 Dec 2023 09:44:13 +0000] rev 5799
mod_groups_internal: Return group name instead of MUC name if MUC has no name
Tue, 12 Dec 2023 19:08:28 +0000 mod_server_info: New module to add custom service extension forms to disco
Matthew Wild <mwild1@gmail.com> [Tue, 12 Dec 2023 19:08:28 +0000] rev 5798
mod_server_info: New module to add custom service extension forms to disco
Tue, 12 Dec 2023 19:06:37 +0000 mod_firewall: TO/FROM ROLE: Handle JIDs with no role (thanks Zash)
Matthew Wild <mwild1@gmail.com> [Tue, 12 Dec 2023 19:06:37 +0000] rev 5797
mod_firewall: TO/FROM ROLE: Handle JIDs with no role (thanks Zash)
Mon, 11 Dec 2023 19:09:25 +0000 mod_firewall: Fix TO/FROM ROLE
Matthew Wild <mwild1@gmail.com> [Mon, 11 Dec 2023 19:09:25 +0000] rev 5796
mod_firewall: Fix TO/FROM ROLE These conditions did not match because get_jid_role() returns a role object. We want to compare based on the name.
Mon, 11 Dec 2023 12:10:43 +0000 mod_measure_active_users: Fix inverted logic (thanks mirux)
Matthew Wild <mwild1@gmail.com> [Mon, 11 Dec 2023 12:10:43 +0000] rev 5795
mod_measure_active_users: Fix inverted logic (thanks mirux)
Fri, 08 Dec 2023 20:08:35 +0100 mod_http_oauth2: Use color-scheme to get nice dark mode defaults
Kim Alvefur <zash@zash.se> [Fri, 08 Dec 2023 20:08:35 +0100] rev 5794
mod_http_oauth2: Use color-scheme to get nice dark mode defaults
Fri, 08 Dec 2023 16:00:34 +0000 mod_isolate_host: Fix inverted logic in log message
Matthew Wild <mwild1@gmail.com> [Fri, 08 Dec 2023 16:00:34 +0000] rev 5793
mod_isolate_host: Fix inverted logic in log message
Fri, 08 Dec 2023 12:45:22 +0000 mod_s2s_status: Add missing return (thanks Zash)
Matthew Wild <mwild1@gmail.com> [Fri, 08 Dec 2023 12:45:22 +0000] rev 5792
mod_s2s_status: Add missing return (thanks Zash)
Thu, 07 Dec 2023 15:46:50 +0000 mod_c2s_conn_throttle: Reduce log level from error->info
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:46:50 +0000] rev 5791
mod_c2s_conn_throttle: Reduce log level from error->info Our general policy is that "error" should never be triggerable by remote entities, and that it is always about something that requires admin intervention. This satisfies neither condition. The "warn" level can be used for unexpected events/behaviour triggered by remote entities, and this could qualify. However I don't think failed auth attempts are unexpected enough. I selected "info" because it is what is also used for other notable session lifecycle events.
Thu, 07 Dec 2023 15:43:47 +0000 mod_http_admin_api: Abort request if no valid username
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:43:47 +0000] rev 5790
mod_http_admin_api: Abort request if no valid username
Thu, 07 Dec 2023 15:43:16 +0000 mod_http_admin_api: Fix some luacheck warnings and code style issues
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:43:16 +0000] rev 5789
mod_http_admin_api: Fix some luacheck warnings and code style issues
Thu, 07 Dec 2023 15:41:55 +0000 mod_http_admin_api: Support PATCH for user enabled status
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:41:55 +0000] rev 5788
mod_http_admin_api: Support PATCH for user enabled status
Thu, 07 Dec 2023 15:41:18 +0000 mod_http_admin_api: Support for setting user account enabled status
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:41:18 +0000] rev 5787
mod_http_admin_api: Support for setting user account enabled status
Thu, 07 Dec 2023 15:30:41 +0000 mod_http_admin_api: Only include user deletion_request if account is disabled
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:30:41 +0000] rev 5786
mod_http_admin_api: Only include user deletion_request if account is disabled
Thu, 07 Dec 2023 15:30:01 +0000 mod_http_admin_api: Return avatar metadata from get_user_info()
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 15:30:01 +0000] rev 5785
mod_http_admin_api: Return avatar metadata from get_user_info()
Thu, 07 Dec 2023 13:02:36 +0000 mod_audit_auth: Improve user-agent building (fixes traceback)
Matthew Wild <mwild1@gmail.com> [Thu, 07 Dec 2023 13:02:36 +0000] rev 5784
mod_audit_auth: Improve user-agent building (fixes traceback)
Wed, 06 Dec 2023 19:13:26 +0000 mod_http_admin_api: Include information about pending deletion request, if any
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 19:13:26 +0000] rev 5783
mod_http_admin_api: Include information about pending deletion request, if any
Wed, 06 Dec 2023 15:50:46 +0000 mod_measure_active_users: Use the new mod_lastlog2 API
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 15:50:46 +0000] rev 5782
mod_measure_active_users: Use the new mod_lastlog2 API
Wed, 06 Dec 2023 15:45:44 +0000 mod_measure_active_users: Exclude disabled user accounts from counts
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 15:45:44 +0000] rev 5781
mod_measure_active_users: Exclude disabled user accounts from counts ...if usermanager exposes that API (it's in trunk, not 0.12).
Wed, 06 Dec 2023 15:07:09 +0000 mod_lastlog2: Fix to interpret stored data structure correctly
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 15:07:09 +0000] rev 5780
mod_lastlog2: Fix to interpret stored data structure correctly
Wed, 06 Dec 2023 12:14:12 +0000 mod_http_admin_api: Include user account status and activity in get_user_info
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 12:14:12 +0000] rev 5779
mod_http_admin_api: Include user account status and activity in get_user_info
Wed, 06 Dec 2023 12:12:37 +0000 mod_lastlog2: Expose API to query the last active time of a user
Matthew Wild <mwild1@gmail.com> [Wed, 06 Dec 2023 12:12:37 +0000] rev 5778
mod_lastlog2: Expose API to query the last active time of a user
Tue, 05 Dec 2023 12:39:00 +0000 mod_sasl_ssdp: New module implementing XEP-0474 SASL SCRAM Downgrade Protection
Matthew Wild <mwild1@gmail.com> [Tue, 05 Dec 2023 12:39:00 +0000] rev 5777
mod_sasl_ssdp: New module implementing XEP-0474 SASL SCRAM Downgrade Protection
Mon, 04 Dec 2023 21:38:27 +0100 mod_log_sasl_mech: Handle auth event from other than mod_saslauth
Kim Alvefur <zash@zash.se> [Mon, 04 Dec 2023 21:38:27 +0100] rev 5776
mod_log_sasl_mech: Handle auth event from other than mod_saslauth E.g. mod_http_oauth2
Mon, 04 Dec 2023 21:36:35 +0100 mod_http_oauth2: Add logger to "session" for auth event
Kim Alvefur <zash@zash.se> [Mon, 04 Dec 2023 21:36:35 +0100] rev 5775
mod_http_oauth2: Add logger to "session" for auth event So many assumptions in so many other modules about auth-success/fail
Mon, 04 Dec 2023 21:07:54 +0100 mod_http_oauth2: Move some code earlier
Kim Alvefur <zash@zash.se> [Mon, 04 Dec 2023 21:07:54 +0100] rev 5774
mod_http_oauth2: Move some code earlier
Mon, 04 Dec 2023 00:23:19 +0100 mod_restrict_xmpp: Allow all XEP-0199 pings to self
Kim Alvefur <zash@zash.se> [Mon, 04 Dec 2023 00:23:19 +0100] rev 5773
mod_restrict_xmpp: Allow all XEP-0199 pings to self No permission to send a ping without a 'to' attribute?
(0) -3000 -1000 -300 -100 -50 -30 +30 +50 +100 tip