From c6159e1a235bc07a8e1981ac62db2ba4a44d5afb Mon Sep 17 00:00:00 2001 From: "Vadim A. Misbakh-Soloviov" Date: Wed, 8 Aug 2018 19:17:24 +0300 Subject: prosody-modules: bump --- net-im/prosody-modules/metadata.xml | 69 ++++++++++---- net-im/prosody-modules/prosody-modules-9999.ebuild | 102 +++++++++++---------- 2 files changed, 106 insertions(+), 65 deletions(-) diff --git a/net-im/prosody-modules/metadata.xml b/net-im/prosody-modules/metadata.xml index 0eca69f..36e296f 100644 --- a/net-im/prosody-modules/metadata.xml +++ b/net-im/prosody-modules/metadata.xml @@ -13,6 +13,8 @@ This module is a partial implementation of XEP-0033: Extended Stanza Addressing. (info: https://modules.prosody.im/mod_addressing) This module adds an ad-hoc command that lets an user change their password. This is useful for clients that don’t have support for XEP-0077 style password changing. In the future, it may provide other account management commands. (info: https://modules.prosody.im/mod_adhoc_account_management) This module provides the Edit Blacklist ad-hoc command described in XEP-0133 and also performs the actual blocking of incoming and outgoing server-to-server connections. (info: https://modules.prosody.im/mod_adhoc_blacklist) + This module adds an Ad-Hoc command with a demo data form that includes all kinds of fields. It’s meant to help debug both Prosodys util.dataforms library and clients, eg seeing how various field types are rendered. (info: https://modules.prosody.im/mod_adhoc_dataforms_demo) + This module lets you join groups using an ad-hoc command. When a user joins a group, everyone in the group is added to their roster, and they are added to the rosters of existing members. (info: https://modules.prosody.im/mod_adhoc_groups) This module uses the blocklists set by admins for blocking s2s connections. (info: https://modules.prosody.im/mod_admin_blocklist) This module provides a console over XMPP. All the commands of the mod_admin_telnet module are available from an XMPP client. (info: https://modules.prosody.im/mod_admin_message) This module lets server administrators send <presence type="probe"/> to any local user and receive their presence in response, bypassing roster checks. (info: https://modules.prosody.im/mod_admin_probe) @@ -26,17 +28,21 @@ Allow client authentication to be handled by an external script/process. (info: https://modules.prosody.im/mod_auth_external) This module authenticates users against hashed credentials stored in a plain text file. The format is the same as that used by reTurnServer. (info: https://modules.prosody.im/mod_auth_ha1) This is an experimental authentication module that does an asynchronous HTTP call to verify username and password. (info: https://modules.prosody.im/mod_auth_http_async) + This is an experimental authentication module that does an asynchronous HTTP call to verify username and password. (info: https://modules.prosody.im/mod_auth_http_cookie) This is a Prosody authentication plugin which uses a generic IMAP server as the backend. (info: https://modules.prosody.im/mod_auth_imap) A YubiKey is a small USB one-time-password (OTP) generator. (info: https://modules.prosody.im/mod_auth_internal_yubikey) This module allows you to authenticate against an Joomla database. (info: https://modules.prosody.im/mod_auth_joomla) This is a Prosody authentication plugin which uses LDAP as the backend. (info: https://modules.prosody.im/mod_auth_ldap) See mod_lib_ldap for more information. (info: https://modules.prosody.im/mod_auth_ldap2) + This is an authentication module for the SASL OAUTHBEARER mechanism, as provided by mod_sasl_oauthbearer. (info: https://modules.prosody.im/mod_auth_oauthbearer) This module makes Prosody authenticate users against PAM (Linux Pluggable Authentication Modules) (info: https://modules.prosody.im/mod_auth_pam) This module allows you to authenticate against an PHPBB3 database. (info: https://modules.prosody.im/mod_auth_phpbb3) Allow client authentication to be handled by an SQL database query. (info: https://modules.prosody.im/mod_auth_sql) + This module enables Prosody to authenticate time-based one-time-pin (TOTP) HMAC tokens. (info: https://modules.prosody.im/mod_auth_token) This module allows you to authenticate against an Wordpress database. (info: https://modules.prosody.im/mod_auth_wordpress) In some environments where all users on the system have mutual trust in each other, it’s sometimes fine to skip the usual authorization process to add someone to your contact list and see their status. (info: https://modules.prosody.im/mod_auto_accept_subscriptions) By default Prosody does not automatically activate/deactivate hosts when they are added to and removed from the configuration. (info: https://modules.prosody.im/mod_auto_activate_hosts) + This module intercepts disco#info queries and checks if we already know the capabilities of this session, in which case we don’t transmit the iq and answer it ourselves. (info: https://modules.prosody.im/mod_auto_answer_disco_info) To benchmark mod_storage_internal: (info: https://modules.prosody.im/mod_benchmark_storage) This module implements XEP-0288: Bidirectional Server-to-Server Connections. It allows servers to use a single connection for sending stanzas to each other, instead of two connections (one for stanzas in each direction). (info: https://modules.prosody.im/mod_bidi) This module blocks all outgoing stanzas from a list of users. (info: https://modules.prosody.im/mod_block_outgoing) @@ -49,6 +55,7 @@ This module largely duplicates the functionality of the standard mod_announce that is included with Prosody. It was developed for compatibility with some clients (e.g. iChat) that do not support ad-hoc commands or sending to JIDs with the format ‘example.com/announce/online’. (info: https://modules.prosody.im/mod_broadcast) This module allows to throttle those client connections which exceed a n*seconds limit. (info: https://modules.prosody.im/mod_c2s_conn_throttle) This module lets you limit number of resources a user may connect. (info: https://modules.prosody.im/mod_c2s_limit_sessions) + This module listens on presences containing caps (XEP-0115) and asks the client for the corresponding disco#info if it changed. (info: https://modules.prosody.im/mod_cache_c2s_caps) This is a very simple demo module showing how to serve a BOSH-using web app from prosody. (info: https://modules.prosody.im/mod_candy) Prosody-captcha is a little modification of prosody’s “mod_register.lua” module that provides captcha protection for registration form. (info: https://modules.prosody.im/mod_captcha_registration) This module implements XEP-0280: Message Carbons, allowing users to maintain a shared and synchronized view of all conversations across all their online clients and devices. (info: https://modules.prosody.im/mod_carbons) @@ -56,6 +63,7 @@ No documentation yet :( (info: https://modules.prosody.im/mod_carbons_copies) This module periodically checks your certificate to see if it is about to expire soon. The time before expiry is printed in the logs. About a week before a certificate expires, reminder messages will be sent to admins. (info: https://modules.prosody.im/mod_checkcerts) XEP-0257 specifies a protocol for clients to store and manage client side certificates. When a client presents a stored client side certificate during the TLS handshake, it can log in without supplying a password (using SASL EXTERNAL). This makes it possible to have multiple devices accessing an account, without any of them needing to know the password, and makes it easier to revoke access for a single device. (info: https://modules.prosody.im/mod_client_certs) + This module must be used as a component. For example: (info: https://modules.prosody.im/mod_client_proxy) This is an implementation of the server bits of XEP-0357: Push Notifications. It allows clients to register an “app server” which is notified about new messages while the user is offline, disconnected or the session is hibernated by mod_smacks. Implementation of the “app server” is not included1. (info: https://modules.prosody.im/mod_cloud_notify) No documentation yet :( (info: https://modules.prosody.im/mod_compact_resource) No documentation yet :( (info: https://modules.prosody.im/mod_compat_bind) @@ -63,10 +71,11 @@ Adds compatibility for old clients/libraries attempting to change affiliations and retrieve ’em sending the < http://jabber.org/protocol/muc#owner > xmlns instead of < http://jabber.org/protocol/muc#admin >. (info: https://modules.prosody.im/mod_compat_muc_admin) No documentation yet :( (info: https://modules.prosody.im/mod_compat_vcard) This module turns Prosody hosts into components of other XMPP servers. (info: https://modules.prosody.im/mod_component_client) + This module allows you to implement a component that speaks HTTP. Stanzas (such as messages) coming from XMPP are sent to a configurable URL as a HTTP POST. If the POST returns a response, that response is returned to the sender over XMPP. (info: https://modules.prosody.im/mod_component_http) This module enables multiple instances of external components to connect at the same time, and does round-robin load-balancing of incoming stanzas. (info: https://modules.prosody.im/mod_component_roundrobin) NOTE: XMPP compression has unresolved security concerns, and this module has been removed from Prosody and renamed. (info: https://modules.prosody.im/mod_compression_unsafe) This module sends processing instructions, comments, DTDs and a non predefined entity (defined by the DTD) to the requesting entity. (info: https://modules.prosody.im/mod_conformance_restricted) - No documentation yet :( (info: https://modules.prosody.im/mod_conversejs) + This module serves a small snippet of HTML that loads Converse.js, configured to work with the VirtualHost that it is loaded onto. (info: https://modules.prosody.im/mod_conversejs) Note: This module needs updating to the 0.8 storage module API. (info: https://modules.prosody.im/mod_couchdb) This module implements Client State Indication, a way for mobile clients to tell the server that they are sitting in someones pocket and would rather not get some less urgent things pushed to it. (info: https://modules.prosody.im/mod_csi) Please use this module instead of mod_csi_pump if you want timestamping, properly handled carbon copies, support for handling encrypted messages and correctly handled smacks events. (info: https://modules.prosody.im/mod_csi_battery_saver) @@ -76,7 +85,8 @@ This module allows you to add default bookmarks for users. It only kicks in when the user has no existing bookmarks, so users are free to add, change or remove them. (info: https://modules.prosody.im/mod_default_bookmarks) It is possible for the user to supply more than just a username and password when creating an account using mod_register. This module automatically copies over that data to the user’s vcard. (info: https://modules.prosody.im/mod_default_vcard) This module adds “Delayed Delivery”-tags to every message stanza passing the server containing the current time on that server. (info: https://modules.prosody.im/mod_delay) - Namespace Delegation is an extension which allows server to delegate some features handling to an entity/component. Typical use case is an external PEP service, but it can be used more generally when your prefered server lack one internal feature and you found an external component which can do it. (info: https://modules.prosody.im/mod_delegation) + Namespace Delegation is an extension which allows server to delegate some features handling to an entity/component. Typical use case is an external PEP service, but it can be used more generally when your preferred server lack one internal feature and you found an external component which can do it. (info: https://modules.prosody.im/mod_delegation) + No documentation yet :( (info: https://modules.prosody.im/mod_deny_omemo) This module can be used to prevent Prosody from offering TLS on client ports that you specify. This can be useful to work around buggy clients when transport security is not required. (info: https://modules.prosody.im/mod_disable_tls) This Prosody plugin lets you manually override the service discovery items for a host. (info: https://modules.prosody.im/mod_discoitems) This module implements an optimization of the Dialback protocol, by skipping the dialback step for servers presenting a valid certificate. (info: https://modules.prosody.im/mod_dwd) @@ -95,13 +105,16 @@ This module allows you to monitor the state of hosts and components in your Prosody server. For example, it will track whether components are connected and (if the component supports it) listen for heartbeats sent by the component to indicate that it is functioning. (info: https://modules.prosody.im/mod_host_status_check) This module integrates with mod_host_status_check to provide heartbeats at regular intervals. (info: https://modules.prosody.im/mod_host_status_heartbeat) No documentation yet :( (info: https://modules.prosody.im/mod_http_altconnect) + This module lets you test whether a set of credentials are valid, using Prosody’s configured authentication mechanism. (info: https://modules.prosody.im/mod_http_auth_check) This module enforces HTTP Basic authentication across all HTTP endpoints served by Prosody. (info: https://modules.prosody.im/mod_http_authentication) + This module serves avatars from local users who have one set in their vCard, see XEP-0054 and XEP-0153. (info: https://modules.prosody.im/mod_http_avatar) This module generates directory listings when invoked by mod_http_files. See documentation on mod_http_files. (info: https://modules.prosody.im/mod_http_dir_listing) + This module generates directory listings when invoked by mod_http_files. See documentation on mod_http_files. (info: https://modules.prosody.im/mod_http_dir_listing2) This simple module serves a favicon.ico from prosodys HTTP server and nothing else. (info: https://modules.prosody.im/mod_http_favicon) This module exposes serves over HTTP the information collected by mod_host_status_check and mod_host_status_heartbeat in a convenient format for automated monitoring tools. (info: https://modules.prosody.im/mod_http_host_status_check) No documentation yet :( (info: https://modules.prosody.im/mod_http_hostaliases) This module produces a list of enabled HTTP “apps” exposed from Prosody at http://example.org:5280/, e.g. mod_http_muc_log, mod_http_files or mod_admin_web. If you think Prosodys default “root” web page (a 404 error usually) is boring, this might be the module for you! :) (info: https://modules.prosody.im/mod_http_index) - No documentation yet :( (info: https://modules.prosody.im/mod_http_logging) + This module produces more detailed HTTP logs for Prosodys built-in HTTP server. The format is similar to that of Apache and go into Prosodys normal logs at the info level. (info: https://modules.prosody.im/mod_http_logging) This module provides a built-in web interface to view chatroom logs stored by mod_mam_muc. (info: https://modules.prosody.im/mod_http_muc_log) This module provides a RESTful method for sending XMPP stanzas. (info: https://modules.prosody.im/mod_http_rest) NOTE: THIS MODULE IS RELEASED UNDER THE MOZILLA PUBLIC LICENSE VERSION 2. (info: https://modules.prosody.im/mod_http_roster_admin) @@ -111,11 +124,12 @@ No documentation yet :( (info: https://modules.prosody.im/mod_http_user_count) This module adds XEP-0319 idle tags to presence stanzas containing XEP-0012: Last Activity tags for idle indication (e.g. supported by libpurple clients). It works on outgoing and incoming presence stanzas. (info: https://modules.prosody.im/mod_idlecompat) This module implements XEP-268. (info: https://modules.prosody.im/mod_incidents_handling) + This module injects ecaps2 elements in the presence once the legacy caps (XEP-0115) are received. (info: https://modules.prosody.im/mod_inject_ecaps2) No documentation yet :( (info: https://modules.prosody.im/mod_inotify_reload) This module allows users with an account to generate single-use invite URLs using an ad-hoc command. The invite URLs allow new users to create an account even if public registration is disabled. (info: https://modules.prosody.im/mod_invite) Sometimes for various reasons a client might want to know its IP address as it appears to the server. This simple XEP allows the client to ask the server for the IP address it is connected from. (info: https://modules.prosody.im/mod_ipcheck) In some environments it is desirable to isolate one or more hosts, and prevent communication with external, or even other internal domains. (info: https://modules.prosody.im/mod_isolate_host) - This is a plugin that implements the JID prep protocol defined in http://xmpp.org/extensions/inbox/jidprep.html (info: https://modules.prosody.im/mod_jid_prep) + This is a plugin that implements the JID prep protocol defined in http://xmpp.org/extensions/inbox/jidprep.html (info: https://modules.prosody.im/mod_jid_prep) This plugin encodes XMPP as JSON. This is an implementation of XEP-0295: JSON Encodings for XMPP. (info: https://modules.prosody.im/mod_json_streams) Simple module that stores the timestamp of when a user logs in. (info: https://modules.prosody.im/mod_lastlog) This module intercepts messages between users and into chatrooms, and attaches a links to a rendered version of any LaTeX in the message. This requires client support for XHTML-IM, and fetching images via HTTP. (info: https://modules.prosody.im/mod_latex) @@ -132,54 +146,63 @@ This module logs messages to a SQL database. (info: https://modules.prosody.im/mod_log_messages_sql) If you ever wanted to collect statistics on the number of log messages, this is the module for you! (info: https://modules.prosody.im/mod_log_rate) No documentation yet :( (info: https://modules.prosody.im/mod_log_sasl_mech) - No documentation yet :( (info: https://modules.prosody.im/mod_log_slow_events) + Most activities in Prosody take place within our built-in events framework, for example stanza processing and HTTP request handling, authentication, etc. (info: https://modules.prosody.im/mod_log_slow_events) Implementation of XEP-0313: Message Archive Management. (info: https://modules.prosody.im/mod_mam) This module complements mod_mam by allowing clients to change archiving preferences through an Ad-hoc command. (info: https://modules.prosody.im/mod_mam_adhoc) Implementation of XEP-0136: Message Archiving for mod_mam. (info: https://modules.prosody.im/mod_mam_archive) - This module logs the conversation of chatrooms running on the server to Prosody’s archive storage. To access them you will need a client with support for XEP-0313: Message Archive Management or a module such as mod_http_muc_log. (info: https://modules.prosody.im/mod_mam_muc) + This module logs the conversation of chatrooms running on the server to Prosody’s archive storage. To access them you will need a client with support for XEP-0313: Message Archive Management version 0.5 or a module such as mod_http_muc_log. (info: https://modules.prosody.im/mod_mam_muc) No documentation yet :( (info: https://modules.prosody.im/mod_mamsub) This module informs users about the XMPP Test day and whether their contacts are affected. For mor info about the test day, see https://stpeter.im/journal/1496.html (info: https://modules.prosody.im/mod_manifesto) + This module measures the number of connected clients per identity. (info: https://modules.prosody.im/mod_measure_client_identities) This module measures the number of resources of a certain show (available, away, etc.) currently connected, and reports using Prosody 0.10 APIs (info: https://modules.prosody.im/mod_measure_client_presence) This module measures CPU usage and reports using Prosody 0.10 APIs (info: https://modules.prosody.im/mod_measure_cpu) This module collects stats from util.pposix.meminfo usage and reports using Prosody 0.10 APIs (info: https://modules.prosody.im/mod_measure_malloc) This module measures memory usage and reports using Prosody 0.10 APIs (info: https://modules.prosody.im/mod_measure_memory) + This module measures the rate at which text messages are exchanged, and their encryption status. (info: https://modules.prosody.im/mod_measure_message_e2ee) Simple module that collects statistics on message length in bytes, word count and line count. (info: https://modules.prosody.im/mod_measure_message_length) This module measures the number of stanzas handled and reports using Prosody 0.10 APIs (info: https://modules.prosody.im/mod_measure_stanza_counts) This module collects statistics from storage operations. (info: https://modules.prosody.im/mod_measure_storage) Often service administrators need to log their users’ messages for reasons such as auditing and compliance. This module simply logs user messages to simple text files, which can be easily searched, archived or removed on a regular basis. (info: https://modules.prosody.im/mod_message_logging) This module adds a command to prosodyctl for copying data between storage drivers. (info: https://modules.prosody.im/mod_migrate) + Normally when joining a MUC groupchat, it is each individual client that joins. This means their presence in the group is tied to the session, which can be short-lived or unstable, especially in the case of mobile clients. (info: https://modules.prosody.im/mod_minimix) mod_motd_sequential is a variant of mod_motd that lets you specify a sequence of MOTD messages instead of a single static one. Each message is only sent once and the module keeps track of who as seen which message. (info: https://modules.prosody.im/mod_motd_sequential) No documentation yet :( (info: https://modules.prosody.im/mod_muc_access_control) + This module generates a badge for MUC rooms at a HTTP URL like https://example.com:5281/muc_badge/room@conference.example.org containing the number of occupants. (info: https://modules.prosody.im/mod_muc_badge) One frequent complaint about XMPP chatrooms (MUCs) compared to IRC is the inability for a room admin to ban a user based on their IP address. This is because an XMPP user is not identified on the network by their IP address, only their JID. (info: https://modules.prosody.im/mod_muc_ban_ip) This module prevents unaffiliated users from sending private messages in chat rooms, unless someone with an affiliation (member, admin etc) messages them first. (info: https://modules.prosody.im/mod_muc_block_pm) Sometimes, especially on public services, you may want to allow people to create their own rooms, but prevent some options from being modified by normal users. (info: https://modules.prosody.im/mod_muc_config_restrict) + This module and its docs shamelessly forked from mod_pubsub_eventsource. (info: https://modules.prosody.im/mod_muc_eventsource) + Groupchat 1.0 was probably the protocol that predated XEP-0045: Multi-User Chat and there is still some compatibility that lives on, in the XEP and in implementations. (info: https://modules.prosody.im/mod_muc_gc10) This module allows sending a message to another MUC room. (info: https://modules.prosody.im/mod_muc_intercom) + This module adds support for advertising the language used in a room. (info: https://modules.prosody.im/mod_muc_lang) This module allows you to control the maximum rate of ‘events’ in a MUC room. This makes it useful to prevent room floods (whether malicious or accidental). (info: https://modules.prosody.im/mod_muc_limits) This module logs the conversation of chatrooms running on the server to Prosody’s data store. To view them you will need a module such as mod_muc_log_http. (info: https://modules.prosody.im/mod_muc_log) This module provides a built-in web interface to view chatroom logs stored by mod_muc_log. (info: https://modules.prosody.im/mod_muc_log_http) This module allows disabling room creation based on regexp patterns defined in configuration. (info: https://modules.prosody.im/mod_muc_restrict_rooms) This module implements the Munin reporting protocol, allowing you to collect statistics directly from Prosody into Munin. (info: https://modules.prosody.im/mod_munin) mod_net_dovecotauth is a server implementation of the Dovecot authentication protocol. It allows you to authenticate e.g. Postfix against your Prosody installation. (info: https://modules.prosody.im/mod_net_dovecotauth) + This module implements the PROXY protocol in versions 1 and 2, which fulfills the following usecase as described within the official protocol specifications: (info: https://modules.prosody.im/mod_net_proxy) Quite often when I am out and about, I’m not able to connect to Jabber. It is usually much more likely I can access my email though (whether via the web, or a mobile client). (info: https://modules.prosody.im/mod_offline_email) + Traditionally OMEMO encrypted messages could only be exchanged after gaining mutual presence subscription due to the OMEMO key material being stored in PEP. (info: https://modules.prosody.im/mod_omemo_all_access) Enable mod_onhold to allow temporarily placing messages from particular JIDs “on hold” – i.e. store them, but do not deliver them until the hold status is taken away. (info: https://modules.prosody.im/mod_onhold) This plugin allows Prosody to connect to other servers that are running as a Tor hidden service. Running Prosody on a hidden service works without this module, this module is only necessary to allow Prosody to federate to hidden XMPP servers. (info: https://modules.prosody.im/mod_onions) OpenID is an decentralized authentication mechanism for the Web. mod_openid turns Prosody into an OpenID provider, allowing users to use their Prosody credentials to authenticate with various third party websites. (info: https://modules.prosody.im/mod_openid) No documentation yet :( (info: https://modules.prosody.im/mod_password_policy) Pastebins are used very often in IM, especially in chat rooms. You have a long log or command output which you need to send to someone over IM, and don’t want to fill their message window with it. Put it on a pastebin site, and give them the URL instead, simple. (info: https://modules.prosody.im/mod_pastebin) - No documentation yet :( (info: https://modules.prosody.im/mod_pep_plus) - This module pushes the users nickname and avatar from vCards into PEP, or into vCards from PEP. This allows interop between older clients that use XEP-0153: vCard-Based Avatars to see the avatars of clients that use XEP-0084: User Avatar and vice versa. (info: https://modules.prosody.im/mod_pep_vcard_avatar) + This module pushes the users nickname and avatar from vCards into PEP, or into vCards from PEP. This allows interop between older clients that use XEP-0153: vCard-Based Avatars to see the avatars of clients that use XEP-0084: User Avatar and vice versa. (info: https://modules.prosody.im/mod_pep_vcard_avatar) Conversations (an XMPP client for Android) is publishing PEP avatars in the webp file format. However Pidgin and other XMPP desktop clients can only show vcard avatars, that are in the PNG file format. This module is the mod_pep_vcard_avatar module extended to also change the avatar file format to PNG. (info: https://modules.prosody.im/mod_pep_vcard_png_avatar) This module creates stub configuration files for newly activated hosts. (info: https://modules.prosody.im/mod_persisthosts) No documentation yet :( (info: https://modules.prosody.im/mod_pinger) In order to build heuristics for which messages are spam, it is necessary to log as many details as possible about the spammers. This module sends a version and disco query whenever a message is received from a JID to a user it is not subscribed to. The results are printed to Prosody’s log file at the ‘info’ level. Queried full JIDs are not queried again until Prosody restarts. (info: https://modules.prosody.im/mod_poke_strangers) Sometimes it’s useful to have different interfaces to access XMPP. (info: https://modules.prosody.im/mod_post_msg) This module stores a timestamp of the latest presence received from users contacts so that the client can see who is online faster when they sign in, and won’t have to wait for remote servers to reply. (info: https://modules.prosody.im/mod_presence_cache) - This module tries to squash incoming identical presence stanzas to save some bandwith at the cost of increased memory use. (info: https://modules.prosody.im/mod_presence_dedup) + This module tries to squash incoming identical presence stanzas to save some bandwidth at the cost of increased memory use. (info: https://modules.prosody.im/mod_presence_dedup) Privacy lists are a flexible method for blocking communications. (info: https://modules.prosody.im/mod_privacy_lists) This is a very simple module which implements an adhoc commant toretrieves the users private XML data. (info: https://modules.prosody.im/mod_private_adhoc) Privileged Entity is an extension which allows entity/component to have privileged access to server (set/get roster, send message on behalf of server, access presence informations). It can be used to build services independently of server (e.g.: PEP service). (info: https://modules.prosody.im/mod_privilege) This module sets the process name to prosody so it shows up as such instead of lua in process management tools. (info: https://modules.prosody.im/mod_proctitle) - This module provides a replacement for mod_vcard. In addition to the ageing protocol defined by XEP-0054, it also supports the new vCard 4 based protocol and integrates with Personal Eventing Protocol. The vCard 4, User Avatar and User Nickname PEP nodes are updated when the vCard is changed.. (info: https://modules.prosody.im/mod_profile) + This module provides a replacement for mod_vcard. In addition to the ageing protocol defined by XEP-0054, it also supports the new vCard 4 based protocol and integrates with Personal Eventing Protocol. (info: https://modules.prosody.im/mod_profile) + This module implements the Prometheus reporting protocol, allowing you to collect statistics directly from Prosody into Prometheus. (info: https://modules.prosody.im/mod_prometheus) This module attempts to restrict use of non-whitelisted XEP-0065 proxies. (info: https://modules.prosody.im/mod_proxy65_whitelist) Server-Sent Events is a simple HTTP/line-based protocol supported in HTML5, making it easy to receive a stream of “events” in realtime using the Javascript EventSource API. (info: https://modules.prosody.im/mod_pubsub_eventsource) This module allows Prosody to fetch Atom and RSS feeds for you, and push new results to subscribers over XMPP. (info: https://modules.prosody.im/mod_pubsub_feeds) @@ -187,13 +210,17 @@ This module implements a PubSubHubbub (PuSH) hub, allowing PuSH clients to subscribe to local XMPP Publish-Subscribe nodes stored by mod_pubsub and receive real time updates to feeds. (info: https://modules.prosody.im/mod_pubsub_hub) MQTT is a lightweight binary pubsub protocol suited to embedded devices. This module provides a way for MQTT clients to connect to Prosody and publish or subscribe to local pubsub nodes. (info: https://modules.prosody.im/mod_pubsub_mqtt) No documentation yet :( (info: https://modules.prosody.im/mod_pubsub_pivotaltracker) - No documentation yet :( (info: https://modules.prosody.im/mod_pubsub_post) + Lets you easily publish data to PubSub using a HTTP POST request. The payload can be Atom feeds, arbitrary XML, or arbitrary JSON. The type should be indicated via the Content-Type header. (info: https://modules.prosody.im/mod_pubsub_post) + This module publishes data from internal statistics into a PubSub node in XEP-0039 format. (info: https://modules.prosody.im/mod_pubsub_stats) Twitter has an open ‘realtime’ search API, but it requires polling (within their rate limits). This module allows Prosody to poll for you, and push new results to subscribers over XMPP. (info: https://modules.prosody.im/mod_pubsub_twitter) - No documentation yet :( (info: https://modules.prosody.im/mod_query_client_ver) + This module sends a version query to clients when they connect, and logs the response, allowing statistics of client usage to be recorded. (info: https://modules.prosody.im/mod_query_client_ver) Sometimes it is useful to get the raw XML logs from clients for debugging purposes, but some clients don’t expose this. (info: https://modules.prosody.im/mod_rawdebug) No documentation yet :( (info: https://modules.prosody.im/mod_readonly) - This module checks the IP address of newly registered users against a DNS block list. If a positive match is found, it gets logged. (info: https://modules.prosody.im/mod_register_dnsbl) + This module checks the IP addresses attempting to register an account against a DNSBL, blocking the attempt if there is a hit. (info: https://modules.prosody.im/mod_register_dnsbl) + No documentation yet :( (info: https://modules.prosody.im/mod_register_dnsbl_firewall_mark) + This module checks the IP address of newly registered users against a DNS block list. If a positive match is found, it gets logged. (info: https://modules.prosody.im/mod_register_dnsbl_warn) This module let’s you activate a httpserver interface to handle data from webforms with POST and Base64 encoded JSON. (info: https://modules.prosody.im/mod_register_json) + Registration redirect to out of band URL as described in XEP-0077: In-Band Registration. (info: https://modules.prosody.im/mod_register_oob_url) Registration Redirect as explained in the IBR XEP. (info: https://modules.prosody.im/mod_register_redirect) There are various reasons to prefer web registration instead of “in-band” account registration over XMPP. For example the lack of CAPTCHA support in clients and servers. (info: https://modules.prosody.im/mod_register_web) This module allows to load/unload external components after they have been added/removed to a configuration file. It is necessary to explicitly initiate a reload on Prosody either via prosodyctl reload or config:reload(). (info: https://modules.prosody.im/mod_reload_components) @@ -206,24 +233,26 @@ This module implements DANE as described in Using DNS Security Extensions (DNSSEC) and DNS-based Authentication of Named Entities (DANE) as a Prooftype for XMPP Domain Name Associations. (info: https://modules.prosody.im/mod_s2s_auth_dane) This module allows you to manually pin certificate fingerprints of remote servers. (info: https://modules.prosody.im/mod_s2s_auth_fingerprint) Monkeysphere is a project aiming to introduce PGP’s web of trust to protocols such as SSH and TLS (which XMPP uses). (info: https://modules.prosody.im/mod_s2s_auth_monkeysphere) + PKIX over Secure HTTP (POSH) describes a method of securely delegating a domain to a hosting provider, without that hosting provider needing keys and certificates covering the hosted domain. (info: https://modules.prosody.im/mod_s2s_auth_posh) No documentation yet :( (info: https://modules.prosody.im/mod_s2s_auth_samecert) - No documentation yet :( (info: https://modules.prosody.im/mod_s2s_blacklist) + This module lets you block connections to remote servers at the s2s level. (info: https://modules.prosody.im/mod_s2s_blacklist) Some people find it preferable to close server-to-server connections after they have been silent for a while. (info: https://modules.prosody.im/mod_s2s_idle_timeout) This module periodically sends XEP-0199 ping requests to remote servers to keep your connection alive. (info: https://modules.prosody.im/mod_s2s_keepalive) This module sets the security status of s2s connections to invalid if their key is too small and their certificate was issued after 2014, per CA/B Forum guidelines. (info: https://modules.prosody.im/mod_s2s_keysize_policy) - This module produces info level log messages with the certificate status and fingerprint every time an s2s connection is established. It can also optionally store this in persistant storage. (info: https://modules.prosody.im/mod_s2s_log_certs) + This module produces info level log messages with the certificate status and fingerprint every time an s2s connection is established. It can also optionally store this in persistent storage. (info: https://modules.prosody.im/mod_s2s_log_certs) Let’s you stop Prosody from sending <starttls xmlns=‘urn:ietf:params:xml:ns:xmpp-tls’> feature to choppy/buggy servers which therefore would fail to re-negotiate and use a secure stream. (e.g. OpenFire 3.7.0) (info: https://modules.prosody.im/mod_s2s_never_encrypt_blacklist) Currently, module:reload command in console doesn’t load new components. This module will automatically load the new components (if any) when the config:reload command is run in the console. (info: https://modules.prosody.im/mod_s2s_reload_newcomponent) - No documentation yet :( (info: https://modules.prosody.im/mod_s2s_whitelist) + This module lets you block connections to any remote servers not on a whitelist. (info: https://modules.prosody.im/mod_s2s_whitelist) This module is similar to mod_srvinjection but less of an hack. (info: https://modules.prosody.im/mod_s2soutinjection) + This module adds a new SASL mechanism OAUTHBEARER, as defined in RFC-7628. (info: https://modules.prosody.im/mod_sasl_oauthbearer) No documentation yet :( (info: https://modules.prosody.im/mod_saslauth_muc) This module implements a manual method for advertsing the Kerberos principal name as per XEP-0233. It could be used in conjection with a Kerberos authentication module. (info: https://modules.prosody.im/mod_saslname) This module implements XEP-0258: Security Labels in XMPP, but not actual policy enforcement. See for example mod_firewall for that. (info: https://modules.prosody.im/mod_seclabels) Sometimes you might run clients without encryption on the same machine or LAN as Prosody - and you want Prosody to treat them as secure ( e.g. allowing plaintext authentication) even though they are not encrypted. (info: https://modules.prosody.im/mod_secure_interfaces) - This module lets you advertise various contact addresses for your XMPP service via XEP-0157. (info: https://modules.prosody.im/mod_server_contact_info) This module fetches the current status of configured hosts and/or stanza statistics from mod_stanza_counter. And outputs it in either XML or JSON format. (info: https://modules.prosody.im/mod_server_status) No documentation yet :( (info: https://modules.prosody.im/mod_service_directories) SIFT is a technology to allow clients to filter incoming traffic on the server. This helps save bandwidth, etc. (info: https://modules.prosody.im/mod_sift) + This module provides a Slack-compatible “web hook” interface to Prosody MUCs. Both “incoming” web hooks, which allow Slack integrations to post messages to Prosody MUCs, and “outgoing” web hooks, which copy messages from Prosody MUCs to Slack-style integrations by HTTP, are supported. This can also be used, in conjunction with various Slack inter-namespace bridging tools, to provide a bidirectional bridge between a Prosody-hosted XMPP MUC and a Slack channel. (info: https://modules.prosody.im/mod_slack_webhooks) By default XMPP is as reliable as your network is. Unfortunately in some cases that is not very reliable - in some network conditions disconnects can be frequent and message loss can occur. (info: https://modules.prosody.im/mod_smacks) By default mod_smacks sends back error stanzas for every unacked message stanza when the hibernation times out. This leads to “message not delivered” errors displayed in clients. (info: https://modules.prosody.im/mod_smacks_noerror) No documentation yet :( (info: https://modules.prosody.im/mod_smacks_offline) @@ -238,6 +267,7 @@ No documentation yet :( (info: https://modules.prosody.im/mod_statistics_cputotal) No documentation yet :( (info: https://modules.prosody.im/mod_statistics_mem) No documentation yet :( (info: https://modules.prosody.im/mod_statistics_statsd) + A module providing a streaming statistics interface like mod_statistics but based on the new statistics API introduced in Prosody 0.10. (info: https://modules.prosody.im/mod_statistics_statsman) No documentation yet :( (info: https://modules.prosody.im/mod_statsd) This is an experimental storage driver where changed data is appended. Data is simply written as key = value pairs to the end of the file. This allows changes to individual keys to be written without needing to write out the entire object again, but reads would grow gradually larger as it still needs to read old overwritten keys. This may be suitable for e.g. rosters where individual contacts are changed at a time. In theory, this could also allow rolling back changes. (info: https://modules.prosody.im/mod_storage_appendmap) This is a storage backend using Ejabberd’s SQL backend. It depends on LuaDBI (info: https://modules.prosody.im/mod_storage_ejabberdsql_readonly) @@ -246,7 +276,7 @@ This is a storage module using OpenLDAP Lightning Memory-Mapped Database as backend. (info: https://modules.prosody.im/mod_storage_lmdb) This module acts as a normal storage module for Prosody, but saves all data in memory only. All data is lost when the server stops. This makes it useful for testing, or certain specialized applications. (info: https://modules.prosody.im/mod_storage_memory) This is a storage backend that uses MongoDB. Depends on luamongo bindings (info: https://modules.prosody.im/mod_storage_mongodb) - mod_muc_log provided logging of chatrooms running on the server to Prosody’s data store. This module gives access to this data using the 0.10+ stanza archive API, allowing legacy log data to be used with mod_mam_muc and mod_http_muc_log. (info: https://modules.prosody.im/mod_storage_muc_log) + mod_muc_log provided logging of chatrooms running on the server to Prosody’s data store. This module gives access to this data using the 0.10+ stanza archive API, allowing legacy log data to be used with mod_mam_muc and mod_http_muc_log. (info: https://modules.prosody.im/mod_storage_muc_log) This is a storage backend using MU-Conference’s SQL storage. It depends on LuaDBI (info: https://modules.prosody.im/mod_storage_muconference_readonly) This module attemtps to provide a storage driver that is really multiple storage drivers. This could be used for storage error tolerance or caching of data in a faster storage driver. (info: https://modules.prosody.im/mod_storage_multi) This module implements stanza archives using files, similar to the default “internal” storage. (info: https://modules.prosody.im/mod_storage_xmlarchive) @@ -264,9 +294,12 @@ XEP-0215 implementation for time-limited TURN credentials. (info: https://modules.prosody.im/mod_turncredentials) Twitter has simple API to use, so I tried to deal with it via Prosody. I didn’t manage to finish this module, but it is nice example of component that accepts registrations, unregistrations, does HTTP polling and so on. Maybe someone will finnish this idea. (info: https://modules.prosody.im/mod_twitter) This module simply responds to a presence probe sent to the server with a presence staza containing a timestamp from when the server started. (info: https://modules.prosody.im/mod_uptime_presence) + No documentation yet :( (info: https://modules.prosody.im/mod_vcard_command) + This module adds the ability to set vCard for MUC rooms. One of the most common use case is to be able to define an avatar for your own MUC room. (info: https://modules.prosody.im/mod_vcard_muc) Basic implementation of XEP-0055: Jabber Search. (info: https://modules.prosody.im/mod_vjud) Similar to mod_watchregistrations, this module warns admins when an s2s connection fails due for encryption or trust reasons. (info: https://modules.prosody.im/mod_watchuntrusted) Quite often you may want to publish your Jabber status to your blog or website. mod_webpresence allows you to do exactly this. (info: https://modules.prosody.im/mod_webpresence) + This module attempts to sanitize XHTML-IM messages. (info: https://modules.prosody.im/mod_xhtmlim) diff --git a/net-im/prosody-modules/prosody-modules-9999.ebuild b/net-im/prosody-modules/prosody-modules-9999.ebuild index 4020978..c375f5f 100644 --- a/net-im/prosody-modules/prosody-modules-9999.ebuild +++ b/net-im/prosody-modules/prosody-modules-9999.ebuild @@ -16,61 +16,69 @@ KEYWORDS="" IUSE="misc luajit" PROSODY_MODULES=" - addressing adhoc_account_management adhoc_blacklist admin_blocklist - admin_message admin_probe admin_web alias atom auth_any auth_ccert - auth_custom_http auth_dovecot auth_external auth_ha1 auth_http_async - auth_imap auth_internal_yubikey auth_joomla auth_ldap auth_ldap2 - auth_pam auth_phpbb3 auth_sql auth_wordpress auto_accept_subscriptions - auto_activate_hosts benchmark_storage bidi block_outgoing - block_registrations block_s2s_subscriptions block_strangers - block_subscribes block_subscriptions blocking broadcast - c2s_conn_throttle c2s_limit_sessions candy captcha_registration carbons - carbons_adhoc carbons_copies checkcerts client_certs cloud_notify - compact_resource compat_bind compat_dialback compat_muc_admin - compat_vcard component_client component_roundrobin compression_unsafe - conformance_restricted conversejs couchdb csi csi_battery_saver - csi_compat csi_pump data_access default_bookmarks default_vcard delay - delegation disable_tls discoitems dwd e2e_policy email_pass extdisco - fallback_vcard filter_chatstates filter_words firewall flash_policy - graceful_shutdown group_bookmarks host_blacklist host_guard - host_status_check host_status_heartbeat http_altconnect - http_authentication http_dir_listing http_favicon http_host_status_check - http_hostaliases http_index http_logging http_muc_log http_rest - http_roster_admin http_stats_stream http_upload http_upload_external - http_user_count idlecompat incidents_handling inotify_reload invite - ipcheck isolate_host jid_prep json_streams lastlog latex lib_ldap - limit_auth limits list_active list_inactive listusers log_auth - log_events log_http log_mark log_messages_sql log_rate log_sasl_mech - log_slow_events mam mam_adhoc mam_archive mam_muc mamsub manifesto + addressing adhoc_account_management adhoc_blacklist adhoc_dataforms_demo + adhoc_groups admin_blocklist admin_message admin_probe admin_web alias + atom auth_any auth_ccert auth_custom_http auth_dovecot auth_external + auth_ha1 auth_http_async auth_http_cookie auth_imap + auth_internal_yubikey auth_joomla auth_ldap auth_ldap2 auth_oauthbearer + auth_pam auth_phpbb3 auth_sql auth_token auth_wordpress + auto_accept_subscriptions auto_activate_hosts auto_answer_disco_info + benchmark_storage bidi block_outgoing block_registrations + block_s2s_subscriptions block_strangers block_subscribes + block_subscriptions blocking broadcast c2s_conn_throttle + c2s_limit_sessions cache_c2s_caps candy captcha_registration carbons + carbons_adhoc carbons_copies checkcerts client_certs client_proxy + cloud_notify compact_resource compat_bind compat_dialback + compat_muc_admin compat_vcard component_client component_http + component_roundrobin compression_unsafe conformance_restricted + conversejs couchdb csi csi_battery_saver csi_compat csi_pump data_access + default_bookmarks default_vcard delay delegation deny_omemo disable_tls + discoitems dwd e2e_policy email_pass extdisco fallback_vcard + filter_chatstates filter_words firewall flash_policy graceful_shutdown + group_bookmarks host_blacklist host_guard host_status_check + host_status_heartbeat http_altconnect http_auth_check + http_authentication http_avatar http_dir_listing http_dir_listing2 + http_favicon http_host_status_check http_hostaliases http_index + http_logging http_muc_log http_rest http_roster_admin http_stats_stream + http_upload http_upload_external http_user_count idlecompat + incidents_handling inject_ecaps2 inotify_reload invite ipcheck + isolate_host jid_prep json_streams lastlog latex lib_ldap limit_auth + limits list_active list_inactive listusers log_auth log_events log_http + log_mark log_messages_sql log_rate log_sasl_mech log_slow_events mam + mam_adhoc mam_archive mam_muc mamsub manifesto measure_client_identities measure_client_presence measure_cpu measure_malloc measure_memory - measure_message_length measure_stanza_counts measure_storage - message_logging migrate motd_sequential muc_access_control muc_ban_ip - muc_block_pm muc_config_restrict muc_intercom muc_limits muc_log - muc_log_http muc_restrict_rooms munin net_dovecotauth offline_email - onhold onions openid password_policy pastebin pep_plus pep_vcard_avatar - pep_vcard_png_avatar persisthosts pinger poke_strangers post_msg - presence_cache presence_dedup privacy_lists private_adhoc privilege - proctitle profile proxy65_whitelist pubsub_eventsource pubsub_feeds - pubsub_github pubsub_hub pubsub_mqtt pubsub_pivotaltracker pubsub_post - pubsub_twitter query_client_ver rawdebug readonly register_dnsbl - register_json register_redirect register_web reload_components + measure_message_e2ee measure_message_length measure_stanza_counts + measure_storage message_logging migrate minimix motd_sequential + muc_access_control muc_badge muc_ban_ip muc_block_pm muc_config_restrict + muc_eventsource muc_gc10 muc_intercom muc_lang muc_limits muc_log + muc_log_http muc_restrict_rooms munin net_dovecotauth net_proxy + offline_email omemo_all_access onhold onions openid password_policy + pastebin pep_vcard_avatar pep_vcard_png_avatar persisthosts pinger + poke_strangers post_msg presence_cache presence_dedup privacy_lists + private_adhoc privilege proctitle profile prometheus proxy65_whitelist + pubsub_eventsource pubsub_feeds pubsub_github pubsub_hub pubsub_mqtt + pubsub_pivotaltracker pubsub_post pubsub_stats pubsub_twitter + query_client_ver rawdebug readonly register_dnsbl + register_dnsbl_firewall_mark register_dnsbl_warn register_json + register_oob_url register_redirect register_web reload_components reload_modules remote_roster require_otr roster_allinall roster_command s2s_auth_compat s2s_auth_dane s2s_auth_fingerprint s2s_auth_monkeysphere - s2s_auth_samecert s2s_blacklist s2s_idle_timeout s2s_keepalive - s2s_keysize_policy s2s_log_certs s2s_never_encrypt_blacklist - s2s_reload_newcomponent s2s_whitelist s2soutinjection saslauth_muc - saslname seclabels secure_interfaces server_contact_info server_status - service_directories sift smacks smacks_noerror smacks_offline - sms_clickatell spam_reporting srvinjection sslv3_warn stanza_counter - stanzadebug statistics statistics_auth statistics_cputotal - statistics_mem statistics_statsd statsd storage_appendmap + s2s_auth_posh s2s_auth_samecert s2s_blacklist s2s_idle_timeout + s2s_keepalive s2s_keysize_policy s2s_log_certs + s2s_never_encrypt_blacklist s2s_reload_newcomponent s2s_whitelist + s2soutinjection sasl_oauthbearer saslauth_muc saslname seclabels + secure_interfaces server_status service_directories sift slack_webhooks + smacks smacks_noerror smacks_offline sms_clickatell spam_reporting + srvinjection sslv3_warn stanza_counter stanzadebug statistics + statistics_auth statistics_cputotal statistics_mem statistics_statsd + statistics_statsman statsd storage_appendmap storage_ejabberdsql_readonly storage_gdbm storage_ldap storage_lmdb storage_memory storage_mongodb storage_muc_log storage_muconference_readonly storage_multi storage_xmlarchive streamstats strict_https support_contact swedishchef tcpproxy telnet_tlsinfo throttle_presence throttle_unsolicited tls_policy - traceback track_muc_joins turncredentials twitter uptime_presence vjud - watchuntrusted webpresence + traceback track_muc_joins turncredentials twitter uptime_presence + vcard_command vcard_muc vjud watchuntrusted webpresence xhtmlim " # Dirty hack. TODO: remove it after proper naming at upstream -- cgit v1.2.3-65-gdbad