Merge 0.9->0.10
[prosody.git] / plugins / mod_s2s_auth_certs.lua
1 module:set_global();
2
3 local cert_verify_identity = require "util.x509".verify_identity;
4 local NULL = {};
5 local log = module._log;
6
7 module:hook("s2s-check-certificate", function(event)
8         local session, host, cert = event.session, event.host, event.cert;
9         local conn = session.conn:socket();
10
11         if cert then
12                 local log = session.log or log;
13                 local chain_valid, errors;
14                 if conn.getpeerverification then
15                         chain_valid, errors = conn:getpeerverification();
16                 elseif conn.getpeerchainvalid then -- COMPAT mw/luasec-hg
17                         chain_valid, errors = conn:getpeerchainvalid();
18                         errors = (not chain_valid) and { { errors } } or nil;
19                 else
20                         chain_valid, errors = false, { { "Chain verification not supported by this version of LuaSec" } };
21                 end
22                 -- Is there any interest in printing out all/the number of errors here?
23                 if not chain_valid then
24                         log("debug", "certificate chain validation result: invalid");
25                         for depth, t in pairs(errors or NULL) do
26                                 log("debug", "certificate error(s) at depth %d: %s", depth-1, table.concat(t, ", "))
27                         end
28                         session.cert_chain_status = "invalid";
29                 else
30                         log("debug", "certificate chain validation result: valid");
31                         session.cert_chain_status = "valid";
32
33                         -- We'll go ahead and verify the asserted identity if the
34                         -- connecting server specified one.
35                         if host then
36                                 if cert_verify_identity(host, "xmpp-server", cert) then
37                                         session.cert_identity_status = "valid"
38                                 else
39                                         session.cert_identity_status = "invalid"
40                                 end
41                                 log("debug", "certificate identity validation result: %s", session.cert_identity_status);
42                         end
43                 end
44         end
45 end, 509);
46