Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 18:43:54 +0000] rev 12921
mod_tokenauth: Gracefully handle missing tokens
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 13:05:17 +0000] rev 12920
mod_auth_internal_hashed: Add oauthbearer handler to our SASL profile
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 13:04:36 +0000] rev 12919
mod_tokenauth: Add SASL handler backend that can accept and verify tokens
This is designed for use by other modules that want to accept tokens issued
by mod_tokenauth, without duplicating all the necessary logic.
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 13:02:51 +0000] rev 12918
mod_tokenauth: Add some sanity checking of the new optional parameters
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 13:01:21 +0000] rev 12917
mod_tokenauth: Add 'purpose' constraint
This allows tokens to be tied to specific purposes/protocols. For example, we
shouldn't (without specific consideration) allow an OAuth token to be dropped
into a slot expecting a FAST token.
While FAST doesn't currently use mod_tokenauth, it and others may do in the
future. It's better to be explicit about what kind of token code is issuing or
expecting.
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 12:56:08 +0000] rev 12916
mod_saslauth: Support for SASL handlers forcing a specific resource
The token layer supports tokens that are tied to a given resource.
Matthew Wild <mwild1@gmail.com> [Wed, 01 Mar 2023 12:55:00 +0000] rev 12915
util.sasl: Add SASL OAUTHBEARER mechanism (RFC 7628)
Kim Alvefur <zash@zash.se> [Thu, 23 Feb 2023 18:39:02 +0100] rev 12914
mod_admin_adhoc: Add XEP-0133 commands to Disable and Re-Enable users
Enables UI in clients supporting XEP-0050
Kim Alvefur <zash@zash.se> [Thu, 23 Feb 2023 18:11:15 +0100] rev 12913
CHANGES: Mention new ability to disable and enable user accounts
Kim Alvefur <zash@zash.se> [Thu, 23 Feb 2023 18:10:06 +0100] rev 12912
mod_admin_shell: Add commands to disable and enable accounts
First proper UI to enable/disable, allowing it to be tested.