/[smecontribs]/rpms/ejabberd/contribs7/ejabberd-captcha.patch
ViewVC logotype

Contents of /rpms/ejabberd/contribs7/ejabberd-captcha.patch

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.1 - (show annotations) (download)
Mon Aug 24 18:19:21 2009 UTC (14 years, 8 months ago) by slords
Branch: MAIN
CVS Tags: ejabberd-2_0_5-2_el4_sme, HEAD
New package import

1 Binary files ejabberd-2.0.4/src/.DS_Store and ejabberd-2.0.4-new/src/.DS_Store differ
2 diff -urN ejabberd-2.0.4/src/ejabberd_captcha.erl ejabberd-2.0.4-new/src/ejabberd_captcha.erl
3 --- ejabberd-2.0.4/src/ejabberd_captcha.erl 1970-01-01 01:00:00.000000000 +0100
4 +++ ejabberd-2.0.4-new/src/ejabberd_captcha.erl 2009-03-14 07:27:05.000000000 +0100
5 @@ -0,0 +1,312 @@
6 +%%%-------------------------------------------------------------------
7 +%%% File : ejabberd_captcha.erl
8 +%%% Author : Evgeniy Khramtsov <xramtsov@gmail.com>
9 +%%% Description : CAPTCHA processing.
10 +%%%
11 +%%% Created : 26 Apr 2008 by Evgeniy Khramtsov <xramtsov@gmail.com>
12 +%%%-------------------------------------------------------------------
13 +-module(ejabberd_captcha).
14 +
15 +-behaviour(gen_server).
16 +
17 +%% API
18 +-export([start_link/0]).
19 +
20 +%% gen_server callbacks
21 +-export([init/1, handle_call/3, handle_cast/2, handle_info/2,
22 + terminate/2, code_change/3]).
23 +
24 +-export([create_captcha/6, process_reply/1, process/2]).
25 +
26 +-include("jlib.hrl").
27 +-include("ejabberd.hrl").
28 +-include("web/ejabberd_http.hrl").
29 +
30 +-define(VFIELD(Type, Var, Value),
31 + {xmlelement, "field", [{"type", Type}, {"var", Var}],
32 + [{xmlelement, "value", [], [Value]}]}).
33 +
34 +-define(CAPTCHA_BODY(Lang, Room, URL),
35 + translate:translate(Lang, "Your messages to ") ++ Room
36 + ++ translate:translate(Lang, " are being blocked. To unblock them, visit ")
37 + ++ URL).
38 +
39 +-define(CAPTCHA_TEXT(Lang), translate:translate(Lang, "Enter the text you see")).
40 +-define(CAPTCHA_LIFETIME, 120000). % two minutes
41 +
42 +-record(state, {}).
43 +-record(captcha, {id, pid, key, tref, args}).
44 +
45 +-define(T(S),
46 + case catch mnesia:transaction(fun() -> S end) of
47 + {atomic, Res} ->
48 + Res;
49 + {_, Reason} ->
50 + ?ERROR_MSG("mnesia transaction failed: ~p", [Reason]),
51 + {error, Reason}
52 + end).
53 +
54 +%%====================================================================
55 +%% API
56 +%%====================================================================
57 +%%--------------------------------------------------------------------
58 +%% Function: start_link() -> {ok,Pid} | ignore | {error,Error}
59 +%% Description: Starts the server
60 +%%--------------------------------------------------------------------
61 +start_link() ->
62 + gen_server:start_link({local, ?MODULE}, ?MODULE, [], []).
63 +
64 +create_captcha(Id, SID, From, To, Lang, Args)
65 + when is_list(Id), is_list(Lang), is_list(SID),
66 + is_record(From, jid), is_record(To, jid) ->
67 + case create_image() of
68 + {ok, Type, Key, Image} ->
69 + B64Image = jlib:encode_base64(binary_to_list(Image)),
70 + JID = jlib:jid_to_string(From),
71 + CID = "sha1+" ++ sha:sha(Image) ++ "@bob.xmpp.org",
72 + Data = {xmlelement, "data",
73 + [{"xmlns", ?NS_BOB}, {"cid", CID},
74 + {"max-age", "0"}, {"type", Type}],
75 + [{xmlcdata, B64Image}]},
76 + Captcha =
77 + {xmlelement, "captcha", [{"xmlns", ?NS_CAPTCHA}],
78 + [{xmlelement, "x", [{"xmlns", ?NS_XDATA}, {"type", "form"}],
79 + [?VFIELD("hidden", "FORM_TYPE", {xmlcdata, ?NS_CAPTCHA}),
80 + ?VFIELD("hidden", "from", {xmlcdata, jlib:jid_to_string(To)}),
81 + ?VFIELD("hidden", "challenge", {xmlcdata, Id}),
82 + ?VFIELD("hidden", "sid", {xmlcdata, SID}),
83 + {xmlelement, "field", [{"var", "ocr"}],
84 + [{xmlelement, "media", [{"xmlns", ?NS_MEDIA}],
85 + [{xmlelement, "uri", [{"type", Type}],
86 + [{xmlcdata, "cid:" ++ CID}]}]}]}]}]},
87 + Body = {xmlelement, "body", [],
88 + [{xmlcdata, ?CAPTCHA_BODY(Lang, JID, get_url(Id))}]},
89 + OOB = {xmlelement, "x", [{"xmlns", ?NS_OOB}],
90 + [{xmlelement, "url", [], [{xmlcdata, get_url(Id)}]}]},
91 + Tref = erlang:send_after(?CAPTCHA_LIFETIME, ?MODULE, {remove_id, Id}),
92 + ?T(mnesia:write(#captcha{id=Id, pid=self(), key=Key,
93 + tref=Tref, args=Args})),
94 + {ok, [Body, OOB, Captcha, Data]};
95 + _Err ->
96 + error
97 + end.
98 +
99 +process_reply({xmlelement, "captcha", _, _} = El) ->
100 + case xml:get_subtag(El, "x") of
101 + false ->
102 + {error, malformed};
103 + Xdata ->
104 + Fields = jlib:parse_xdata_submit(Xdata),
105 + [Id | _] = proplists:get_value("challenge", Fields, [none]),
106 + [OCR | _] = proplists:get_value("ocr", Fields, [none]),
107 + ?T(case mnesia:read(captcha, Id, write) of
108 + [#captcha{pid=Pid, args=Args, key=Key, tref=Tref}] ->
109 + mnesia:delete({captcha, Id}),
110 + erlang:cancel_timer(Tref),
111 + if OCR == Key ->
112 + Pid ! {captcha_succeed, Args},
113 + ok;
114 + true ->
115 + Pid ! {captcha_failed, Args},
116 + {error, bad_match}
117 + end;
118 + _ ->
119 + {error, not_found}
120 + end)
121 + end;
122 +process_reply(_) ->
123 + {error, malformed}.
124 +
125 +process(_Handlers, #request{method='GET', lang=Lang, path=[_, Id]}) ->
126 + case mnesia:dirty_read(captcha, Id) of
127 + [#captcha{}] ->
128 + Form =
129 + {xmlelement, "div", [{"align", "center"}],
130 + [{xmlelement, "form", [{"action", get_url(Id)},
131 + {"name", "captcha"},
132 + {"method", "POST"}],
133 + [{xmlelement, "img", [{"src", get_url(Id ++ "/image")}], []},
134 + {xmlelement, "br", [], []},
135 + {xmlcdata, ?CAPTCHA_TEXT(Lang)},
136 + {xmlelement, "br", [], []},
137 + {xmlelement, "input", [{"type", "text"},
138 + {"name", "key"},
139 + {"size", "10"}], []},
140 + {xmlelement, "br", [], []},
141 + {xmlelement, "input", [{"type", "submit"},
142 + {"name", "enter"},
143 + {"value", "OK"}], []}]}]},
144 + ejabberd_web:make_xhtml([Form]);
145 + _ ->
146 + ejabberd_web:error(not_found)
147 + end;
148 +
149 +process(_Handlers, #request{method='GET', path=[_, Id, "image"]}) ->
150 + case mnesia:dirty_read(captcha, Id) of
151 + [#captcha{key=Key}] ->
152 + case create_image(Key) of
153 + {ok, Type, _, Img} ->
154 + {200,
155 + [{"Content-Type", Type},
156 + {"Cache-Control", "no-cache"},
157 + {"Last-Modified", httpd_util:rfc1123_date()}],
158 + Img};
159 + _ ->
160 + ejabberd_web:error(not_found)
161 + end;
162 + _ ->
163 + ejabberd_web:error(not_found)
164 + end;
165 +
166 +process(_Handlers, #request{method='POST', q=Q, path=[_, Id]}) ->
167 + ?T(case mnesia:read(captcha, Id, write) of
168 + [#captcha{pid=Pid, args=Args, key=Key, tref=Tref}] ->
169 + mnesia:delete({captcha, Id}),
170 + erlang:cancel_timer(Tref),
171 + Input = proplists:get_value("key", Q, none),
172 + if Input == Key ->
173 + Pid ! {captcha_succeed, Args},
174 + ejabberd_web:make_xhtml([]);
175 + true ->
176 + Pid ! {captcha_failed, Args},
177 + ejabberd_web:error(not_allowed)
178 + end;
179 + _ ->
180 + ejabberd_web:error(not_found)
181 + end).
182 +
183 +%%====================================================================
184 +%% gen_server callbacks
185 +%%====================================================================
186 +init([]) ->
187 + mnesia:create_table(captcha,
188 + [{ram_copies, [node()]},
189 + {attributes, record_info(fields, captcha)}]),
190 + mnesia:add_table_copy(captcha, node(), ram_copies),
191 + {ok, #state{}}.
192 +
193 +handle_call(_Request, _From, State) ->
194 + {reply, bad_request, State}.
195 +
196 +handle_cast(_Msg, State) ->
197 + {noreply, State}.
198 +
199 +handle_info({remove_id, Id}, State) ->
200 + ?DEBUG("captcha ~p timed out", [Id]),
201 + ?T(case mnesia:read(captcha, Id, write) of
202 + [#captcha{args=Args, pid=Pid}] ->
203 + Pid ! {captcha_failed, Args},
204 + mnesia:delete({captcha, Id});
205 + _ ->
206 + ok
207 + end),
208 + {noreply, State};
209 +
210 +handle_info(_Info, State) ->
211 + {noreply, State}.
212 +
213 +terminate(_Reason, _State) ->
214 + ok.
215 +
216 +code_change(_OldVsn, State, _Extra) ->
217 + {ok, State}.
218 +
219 +%%--------------------------------------------------------------------
220 +%%% Internal functions
221 +%%--------------------------------------------------------------------
222 +%%--------------------------------------------------------------------
223 +%% Function: create_image() -> {ok, Type, Key, Image} | {error, Reason}
224 +%% Type = "image/png" | "image/jpeg" | "image/gif"
225 +%% Key = string()
226 +%% Image = binary()
227 +%% Reason = atom()
228 +%%--------------------------------------------------------------------
229 +create_image() ->
230 + %% Six numbers from 1 to 9.
231 + Key = string:substr(randoms:get_string(), 1, 6),
232 + create_image(Key).
233 +
234 +create_image(Key) ->
235 + FileName = get_prog_name(),
236 + Cmd = lists:flatten(io_lib:format("~s ~s", [FileName, Key])),
237 + case cmd(Cmd) of
238 + {ok, <<16#89, $P, $N, $G, $\r, $\n, 16#1a, $\n, _/binary>> = Img} ->
239 + {ok, "image/png", Key, Img};
240 + {ok, <<16#ff, 16#d8, _/binary>> = Img} ->
241 + {ok, "image/jpeg", Key, Img};
242 + {ok, <<$G, $I, $F, $8, X, $a, _/binary>> = Img} when X==$7; X==$9 ->
243 + {ok, "image/gif", Key, Img};
244 + {error, Reason} ->
245 + ?ERROR_MSG("Failed to process an output from \"~s\": ~p",
246 + [Cmd, Reason]),
247 + {error, Reason};
248 + _ ->
249 + Reason = malformed_image,
250 + ?ERROR_MSG("Failed to process an output from \"~s\": ~p",
251 + [Cmd, Reason]),
252 + {error, Reason}
253 + end.
254 +
255 +get_prog_name() ->
256 + case ejabberd_config:get_local_option(captcha_cmd) of
257 + FileName when is_list(FileName) ->
258 + FileName;
259 + _ ->
260 + ""
261 + end.
262 +
263 +get_url(Str) ->
264 + case ejabberd_config:get_local_option(captcha_host) of
265 + Host when is_list(Host) ->
266 + "http://" ++ Host ++ "/captcha/" ++ Str;
267 + _ ->
268 + "http://" ++ ?MYNAME ++ "/captcha/" ++ Str
269 + end.
270 +
271 +%%--------------------------------------------------------------------
272 +%% Function: cmd(Cmd) -> Data | {error, Reason}
273 +%% Cmd = string()
274 +%% Data = binary()
275 +%% Description: os:cmd/1 replacement
276 +%%--------------------------------------------------------------------
277 +-define(CMD_TIMEOUT, 5000).
278 +-define(MAX_FILE_SIZE, 64*1024).
279 +
280 +cmd(Cmd) ->
281 + Port = open_port({spawn, Cmd}, [stream, eof, binary]),
282 + TRef = erlang:start_timer(?CMD_TIMEOUT, self(), timeout),
283 + recv_data(Port, TRef, <<>>).
284 +
285 +recv_data(Port, TRef, Buf) ->
286 + receive
287 + {Port, {data, Bytes}} ->
288 + NewBuf = <<Buf/binary, Bytes/binary>>,
289 + if size(NewBuf) > ?MAX_FILE_SIZE ->
290 + return(Port, TRef, {error, efbig});
291 + true ->
292 + recv_data(Port, TRef, NewBuf)
293 + end;
294 + {Port, {data, _}} ->
295 + return(Port, TRef, {error, efbig});
296 + {Port, eof} when Buf /= <<>> ->
297 + return(Port, TRef, {ok, Buf});
298 + {Port, eof} ->
299 + return(Port, TRef, {error, enodata});
300 + {timeout, TRef, _} ->
301 + return(Port, TRef, {error, timeout})
302 + end.
303 +
304 +return(Port, TRef, Result) ->
305 + case erlang:cancel_timer(TRef) of
306 + false ->
307 + receive
308 + {timeout, TRef, _} ->
309 + ok
310 + after 0 ->
311 + ok
312 + end;
313 + _ ->
314 + ok
315 + end,
316 + catch port_close(Port),
317 + Result.
318 diff -urN ejabberd-2.0.4/src/ejabberd_config.erl ejabberd-2.0.4-new/src/ejabberd_config.erl
319 --- ejabberd-2.0.4/src/ejabberd_config.erl 2009-03-12 09:41:02.000000000 +0100
320 +++ ejabberd-2.0.4-new/src/ejabberd_config.erl 2009-03-14 11:43:35.000000000 +0100
321 @@ -164,6 +164,10 @@
322 add_option(watchdog_admins, Admins, State);
323 {registration_timeout, Timeout} ->
324 add_option(registration_timeout, Timeout, State);
325 + {captcha_cmd, Cmd} ->
326 + add_option(captcha_cmd, Cmd, State);
327 + {captcha_host, Host} ->
328 + add_option(captcha_host, Host, State);
329 {loglevel, Loglevel} ->
330 ejabberd_loglevel:set(Loglevel),
331 State;
332 diff -urN ejabberd-2.0.4/src/ejabberd_sup.erl ejabberd-2.0.4-new/src/ejabberd_sup.erl
333 --- ejabberd-2.0.4/src/ejabberd_sup.erl 2009-03-12 09:41:02.000000000 +0100
334 +++ ejabberd-2.0.4-new/src/ejabberd_sup.erl 2009-03-14 12:36:43.000000000 +0100
335 @@ -84,6 +84,13 @@
336 brutal_kill,
337 worker,
338 [ejabberd_local]},
339 + Captcha =
340 + {ejabberd_captcha,
341 + {ejabberd_captcha, start_link, []},
342 + permanent,
343 + brutal_kill,
344 + worker,
345 + [ejabberd_captcha]},
346 Listener =
347 {ejabberd_listener,
348 {ejabberd_listener, start_link, []},
349 @@ -170,6 +177,7 @@
350 SM,
351 S2S,
352 Local,
353 + Captcha,
354 ReceiverSupervisor,
355 C2SSupervisor,
356 S2SInSupervisor,
357 diff -urN ejabberd-2.0.4/src/jlib.hrl ejabberd-2.0.4-new/src/jlib.hrl
358 --- ejabberd-2.0.4/src/jlib.hrl 2009-03-12 09:41:02.000000000 +0100
359 +++ ejabberd-2.0.4-new/src/jlib.hrl 2009-03-14 11:41:46.000000000 +0100
360 @@ -74,6 +74,12 @@
361
362 -define(NS_CAPS, "http://jabber.org/protocol/caps").
363
364 +%% CAPTCHA related NSes.
365 +-define(NS_OOB, "jabber:x:oob").
366 +-define(NS_CAPTCHA, "urn:xmpp:captcha").
367 +-define(NS_MEDIA, "urn:xmpp:media-element").
368 +-define(NS_BOB, "urn:xmpp:bob").
369 +
370 % TODO: remove "code" attribute (currently it used for backward-compatibility)
371 -define(STANZA_ERROR(Code, Type, Condition),
372 {xmlelement, "error",
373 diff -urN ejabberd-2.0.4/src/mod_muc/mod_muc_room.erl ejabberd-2.0.4-new/src/mod_muc/mod_muc_room.erl
374 --- ejabberd-2.0.4/src/mod_muc/mod_muc_room.erl 2009-03-12 09:41:02.000000000 +0100
375 +++ ejabberd-2.0.4-new/src/mod_muc/mod_muc_room.erl 2009-03-14 11:40:40.000000000 +0100
376 @@ -69,6 +69,7 @@
377 public_list = true,
378 persistent = false,
379 moderated = true,
380 + captcha_protected = false,
381 members_by_default = true,
382 members_only = false,
383 allow_user_invites = false,
384 @@ -98,6 +99,7 @@
385 jid,
386 config = #config{},
387 users = ?DICT:new(),
388 + robots = ?DICT:new(),
389 affiliations = ?DICT:new(),
390 history = lqueue_new(20),
391 subject = "",
392 @@ -382,7 +384,8 @@
393 (XMLNS == ?NS_MUC_ADMIN) or
394 (XMLNS == ?NS_MUC_OWNER) or
395 (XMLNS == ?NS_DISCO_INFO) or
396 - (XMLNS == ?NS_DISCO_ITEMS) ->
397 + (XMLNS == ?NS_DISCO_ITEMS) or
398 + (XMLNS == ?NS_CAPTCHA) ->
399 Res1 = case XMLNS of
400 ?NS_MUC_ADMIN ->
401 process_iq_admin(From, Type, Lang, SubEl, StateData);
402 @@ -391,7 +394,9 @@
403 ?NS_DISCO_INFO ->
404 process_iq_disco_info(From, Type, Lang, StateData);
405 ?NS_DISCO_ITEMS ->
406 - process_iq_disco_items(From, Type, Lang, StateData)
407 + process_iq_disco_items(From, Type, Lang, StateData);
408 + ?NS_CAPTCHA ->
409 + process_iq_captcha(From, Type, Lang, SubEl, StateData)
410 end,
411 {IQRes, NewStateData} =
412 case Res1 of
413 @@ -761,6 +766,30 @@
414 {empty, _} ->
415 {next_state, StateName, StateData}
416 end;
417 +handle_info({captcha_succeed, From}, normal_state, StateData) ->
418 + NewState = case ?DICT:find(From, StateData#state.robots) of
419 + {ok, {Nick, Packet}} ->
420 + Robots = ?DICT:store(From, passed, StateData#state.robots),
421 + add_new_user(From, Nick, Packet, StateData#state{robots=Robots});
422 + _ ->
423 + StateData
424 + end,
425 + {next_state, normal_state, NewState};
426 +handle_info({captcha_failed, From}, normal_state, StateData) ->
427 + NewState = case ?DICT:find(From, StateData#state.robots) of
428 + {ok, {Nick, Packet}} ->
429 + Robots = ?DICT:erase(From, StateData#state.robots),
430 + Err = jlib:make_error_reply(
431 + Packet, ?ERR_NOT_AUTHORIZED),
432 + ejabberd_router:route( % TODO: s/Nick/""/
433 + jlib:jid_replace_resource(
434 + StateData#state.jid, Nick),
435 + From, Err),
436 + StateData#state{robots=Robots};
437 + _ ->
438 + StateData
439 + end,
440 + {next_state, normal_state, NewState};
441 handle_info(_Info, StateName, StateData) ->
442 {next_state, StateName, StateData}.
443
444 @@ -1461,7 +1490,8 @@
445 From, Err),
446 StateData;
447 {_, _, _, Role} ->
448 - case check_password(ServiceAffiliation, Els, StateData) of
449 + case check_password(ServiceAffiliation, Affiliation,
450 + Els, From, StateData) of
451 true ->
452 NewState =
453 add_user_presence(
454 @@ -1494,7 +1524,8 @@
455 true ->
456 NewState#state{just_created = false};
457 false ->
458 - NewState
459 + Robots = ?DICT:erase(From, StateData#state.robots),
460 + NewState#state{robots = Robots}
461 end;
462 nopass ->
463 ErrText = "Password required to enter this room",
464 @@ -1505,6 +1536,29 @@
465 StateData#state.jid, Nick),
466 From, Err),
467 StateData;
468 + captcha_required ->
469 + ID = randoms:get_string(),
470 + SID = xml:get_attr_s("id", Attrs),
471 + RoomJID = StateData#state.jid,
472 + To = jlib:jid_replace_resource(RoomJID, Nick),
473 + case ejabberd_captcha:create_captcha(
474 + ID, SID, RoomJID, To, Lang, From) of
475 + {ok, CaptchaEls} ->
476 + MsgPkt = {xmlelement, "message", [{"id", ID}], CaptchaEls},
477 + Robots = ?DICT:store(From,
478 + {Nick, Packet}, StateData#state.robots),
479 + ejabberd_router:route(RoomJID, From, MsgPkt),
480 + StateData#state{robots = Robots};
481 + error ->
482 + ErrText = "Unable to generate a captcha",
483 + Err = jlib:make_error_reply(
484 + Packet, ?ERRT_INTERNAL_SERVER_ERROR(Lang, ErrText)),
485 + ejabberd_router:route( % TODO: s/Nick/""/
486 + jlib:jid_replace_resource(
487 + StateData#state.jid, Nick),
488 + From, Err),
489 + StateData
490 + end;
491 _ ->
492 ErrText = "Incorrect password",
493 Err = jlib:make_error_reply(
494 @@ -1517,13 +1571,13 @@
495 end
496 end.
497
498 -check_password(owner, _Els, _StateData) ->
499 +check_password(owner, _Affiliation, _Els, _From, _StateData) ->
500 %% Don't check pass if user is owner in MUC service (access_admin option)
501 true;
502 -check_password(_ServiceAffiliation, Els, StateData) ->
503 +check_password(_ServiceAffiliation, Affiliation, Els, From, StateData) ->
504 case (StateData#state.config)#config.password_protected of
505 false ->
506 - true;
507 + check_captcha(Affiliation, From, StateData);
508 true ->
509 Pass = extract_password(Els),
510 case Pass of
511 @@ -1539,6 +1593,19 @@
512 end
513 end.
514
515 +check_captcha(Affiliation, From, StateData) ->
516 + case (StateData#state.config)#config.captcha_protected of
517 + true when Affiliation == none ->
518 + case ?DICT:find(From, StateData#state.robots) of
519 + {ok, passed} ->
520 + true;
521 + _ ->
522 + captcha_required
523 + end;
524 + _ ->
525 + true
526 + end.
527 +
528 extract_password([]) ->
529 false;
530 extract_password([{xmlelement, _Name, Attrs, _SubEls} = El | Els]) ->
531 @@ -2713,6 +2780,9 @@
532 ?BOOLXFIELD("Make room members-only",
533 "muc#roomconfig_membersonly",
534 Config#config.members_only),
535 + ?BOOLXFIELD("Make room captcha protected",
536 + "captcha_protected",
537 + Config#config.captcha_protected),
538 ?BOOLXFIELD("Make room moderated",
539 "muc#roomconfig_moderatedroom",
540 Config#config.moderated),
541 @@ -2823,6 +2893,8 @@
542 ?SET_BOOL_XOPT(members_by_default, Val);
543 set_xoption([{"muc#roomconfig_membersonly", [Val]} | Opts], Config) ->
544 ?SET_BOOL_XOPT(members_only, Val);
545 +set_xoption([{"captcha_protected", [Val]} | Opts], Config) ->
546 + ?SET_BOOL_XOPT(captcha_protected, Val);
547 set_xoption([{"muc#roomconfig_allowinvites", [Val]} | Opts], Config) ->
548 ?SET_BOOL_XOPT(allow_user_invites, Val);
549 set_xoption([{"muc#roomconfig_passwordprotectedroom", [Val]} | Opts], Config) ->
550 @@ -2913,6 +2985,7 @@
551 ?CASE_CONFIG_OPT(members_only);
552 ?CASE_CONFIG_OPT(allow_user_invites);
553 ?CASE_CONFIG_OPT(password_protected);
554 + ?CASE_CONFIG_OPT(captcha_protected);
555 ?CASE_CONFIG_OPT(password);
556 ?CASE_CONFIG_OPT(anonymous);
557 ?CASE_CONFIG_OPT(logging);
558 @@ -2954,6 +3027,7 @@
559 ?MAKE_CONFIG_OPT(members_only),
560 ?MAKE_CONFIG_OPT(allow_user_invites),
561 ?MAKE_CONFIG_OPT(password_protected),
562 + ?MAKE_CONFIG_OPT(captcha_protected),
563 ?MAKE_CONFIG_OPT(password),
564 ?MAKE_CONFIG_OPT(anonymous),
565 ?MAKE_CONFIG_OPT(logging),
566 @@ -3074,6 +3148,17 @@
567 {error, ?ERR_FORBIDDEN}
568 end.
569
570 +process_iq_captcha(_From, get, _Lang, _SubEl, _StateData) ->
571 + {error, ?ERR_NOT_ALLOWED};
572 +
573 +process_iq_captcha(_From, set, _Lang, SubEl, StateData) ->
574 + case ejabberd_captcha:process_reply(SubEl) of
575 + ok ->
576 + {result, [], StateData};
577 + _ ->
578 + {error, ?ERR_NOT_ACCEPTABLE}
579 + end.
580 +
581 get_title(StateData) ->
582 case (StateData#state.config)#config.title of
583 "" ->
584 diff -urN ejabberd-2.0.4/src/web/ejabberd_http.erl ejabberd-2.0.4-new/src/web/ejabberd_http.erl
585 --- ejabberd-2.0.4/src/web/ejabberd_http.erl 2009-03-12 09:41:02.000000000 +0100
586 +++ ejabberd-2.0.4-new/src/web/ejabberd_http.erl 2009-03-14 10:57:34.000000000 +0100
587 @@ -106,6 +106,10 @@
588 {value, {request_handlers, H}} -> H;
589 false -> []
590 end ++
591 + case lists:member(captcha, Opts) of
592 + true -> [{["captcha"], ejabberd_captcha}];
593 + false -> []
594 + end ++
595 case lists:member(web_admin, Opts) of
596 true -> [{["admin"], ejabberd_web_admin}];
597 false -> []
598 Binary files ejabberd-2.0.4/tools/.DS_Store and ejabberd-2.0.4-new/tools/.DS_Store differ
599 diff -urN ejabberd-2.0.4/tools/captcha.sh ejabberd-2.0.4-new/tools/captcha.sh
600 --- ejabberd-2.0.4/tools/captcha.sh 1970-01-01 01:00:00.000000000 +0100
601 +++ ejabberd-2.0.4-new/tools/captcha.sh 2009-03-14 11:46:42.000000000 +0100
602 @@ -0,0 +1,21 @@
603 +#!/bin/sh
604 +
605 +SIGN=$(($RANDOM % 2))
606 +
607 +R1=$(($RANDOM % 20))
608 +R2=$(($RANDOM % 10 + 40))
609 +
610 +if [ $SIGN -eq "0" ]; then
611 + S1=$(( -1*($RANDOM % 20 + 50) ))
612 + S2=$(( $RANDOM % 20 + 50 ))
613 +else
614 + S2=$(( -1*($RANDOM % 20 + 50) ))
615 + S1=$(( $RANDOM % 20 + 50 ))
616 +fi
617 +
618 +convert -size 140x60 xc:white \
619 + -pointsize 30 -draw "text 20,30 '$1'" \
620 + -roll -$R2+$R1 -swirl $S1 \
621 + -roll +$R2-$R1 -swirl $S2 \
622 + +repage -resize 120x60 \
623 + -quality 90 -depth 8 png:-
624 --- ejabberd-2.0.5/ChangeLog~ 2009-04-01 19:23:52.000000000 +0400
625 +++ ejabberd-2.0.5/ChangeLog 2009-04-03 23:45:03.174979944 +0400
626 @@ -15,6 +15,15 @@
627 stanza (EJAB-300).
628 * src/ejabberd_c2s.erl: Likewise
629
630 +2009-03-13 Evgeniy Khramtsov <ekhramtsov@process-one.net>
631 +
632 + * src/ejabberd_captcha.erl: XEP-158 (CAPTCHA Forms).
633 + * src/ejabberd_config.erl: likewise.
634 + * src/ejabberd_sup.erl: likewise.
635 + * src/jlib.hrl: likewise.
636 + * src/web/ejabberd_http.erl: likewise.
637 + * src/mod_muc/mod_muc_room.erl: CAPTCHA support.
638 +
639 2009-03-10 Badlop <badlop@process-one.net>
640
641 * doc/release_notes_2.0.4.txt: Added file for new release

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed