changeset 4913:3ddab718f717

mod_privilege: update to v0.4: - now the namespace "urn:xmpp:privilege:2" is exclusively used - IQ permission implementation - README update roster pushes are not implemented yet
author Goffi <goffi@goffi.org>
date Wed, 11 May 2022 12:43:26 +0200
parents b45c23ce24ba
children bc8832c6696b
files mod_privilege/README.markdown mod_privilege/mod_privilege.lua
diffstat 2 files changed, 601 insertions(+), 343 deletions(-) [+]
line wrap: on
line diff
--- a/mod_privilege/README.markdown	Wed Mar 30 17:52:41 2022 +0200
+++ b/mod_privilege/README.markdown	Wed May 11 12:43:26 2022 +0200
@@ -1,6 +1,6 @@
 ---
 labels:
-- 'Stage-Alpha'
+- 'Stage-Beta'
 summary: 'XEP-0356 (Privileged Entity) implementation'
 ...
 
@@ -8,9 +8,9 @@
 ============
 
 Privileged Entity is an extension which allows entity/component to have
-privileged access to server (set/get roster, send message on behalf of
-server, access presence informations). It can be used to build services
-independently of server (e.g.: PEP service).
+privileged access to server (set/get roster, send message on behalf of server,
+send IQ stanza on behalf of user, access presence information). It can be used
+to build services independently of server (e.g.: PEP service).
 
 Details
 =======
@@ -18,6 +18,12 @@
 You can have all the details by reading the
 [XEP-0356](http://xmpp.org/extensions/xep-0356.html).
 
+Only the latest version of the XEP is implemented (using namespace
+`urn:xmpp:privilege:2`), if your component use an older version, please update.
+
+Note that roster permission is not fully implemented yet, roster pushes are not yet sent
+to privileged entity.
+
 Usage
 =====
 
@@ -33,7 +39,7 @@
 
     [...]
 
-    Component "youcomponent.yourdomain.tld"
+    Component "pubsub.yourdomain.tld"
         component_secret = "yourpassword"
         modules_enabled = {"privilege"}
 
@@ -51,22 +57,38 @@
                 message = "outgoing";
                 presence = "roster";
             },
+            ["pubsub.yourdomain.tld"] = {
+                roster = "get";
+                message = "outgoing";
+                presence = "roster";
+                iq = {
+                    ["http://jabber.org/protocol/pubsub"] = "set";
+                };
+            },
         }
 
-Here *romeo@montaigu.lit* can **get** roster of anybody on the host, and
-will **have presence for any user** of the host, while
-*juliet@capulet.lit* can **get** and **set** a roster, **send messages**
-on the behalf of the server, and **access presence of anybody linked to
-the host** (not only people on the server, but also people in rosters of
-users of the server).
+Here *romeo@montaigu.lit* can **get** roster of anybody on the host, and will
+**have presence for any user** of the host, while *juliet@capulet.lit* can
+**get** and **set** a roster, **send messages** on behalf of the server, and
+**access presence of anybody linked to the host** (not only people on the
+server, but also people in rosters of users of the server).
 
-**/! Be extra careful when you give a permission to an entity/component,
-it's a powerful access, only do it if you absoly trust the
-component/entity, and you know where the software is coming from**
+*pubsub.yourdomain.tld* is a Pubsub/PEP component which can **get** roster of
+anybody on the host, **send messages** on the behalf of the server, **access
+presence of anybody linked to the host**, and **send IQ stanza of type "set" for
+the namespace "http://jabber.org/protocol/pubsub"** (this can be used to
+implement XEP-0376 "Pubsub Account Management").
+
+**/!\\ Be extra careful when you give a permission to an entity/component, it's
+a powerful access, only do it if you absolutely trust the component/entity, and
+you know where the software is coming from**
 
 Configuration
 =============
 
+roster
+------
+
 All the permissions give access to all accounts of the virtual host.
 
   -------- ------------------------------------------------ ----------------------
@@ -76,6 +98,9 @@
   both     Allow **read** and **write** access to rosters   
   -------- ------------------------------------------------ ----------------------
 
+Note that roster implementation is incomplete at the moment, roster pushes are not yet
+send to privileged entity.
+
 message
 -------
 
@@ -93,6 +118,22 @@
   roster             Receive all presence stanzas (except subsciptions) from host users and people in their rosters
   ------------------ ------------------------------------------------------------------------------------------------
 
+iq
+--
+
+IQ permission is a table mapping allowed namespaces to allowed stanza type. When
+a namespace is specified, IQ stanza of the specified type (see below) can be
+sent if and only if the first child element of the IQ stanza has the specified
+namespace. See https://xmpp.org/extensions/xep-0356.html#iq for details.
+
+Allowed stanza type:
+
+  -------- -------------------------------------------
+  get      Allow IQ stanza of type **get**
+  set      Allow IQ stanza of type **set**
+  both     Allow IQ stanza of type **get** and **set**
+  -------- -------------------------------------------
+
 Compatibility
 =============
 
@@ -118,13 +159,15 @@
 
 `patch -p1 < /tmp/component.patch`
 
-  ----- ----------------------------------------------------
+  ----- --------------------------------------------------
+  trunk Works
+  0.12  Works
+  0.11  Works
   0.10  Works
   0.9   Need a patched core/mod\_component.lua (see above)
-  ----- ----------------------------------------------------
+  ----- --------------------------------------------------
 
 Note
 ====
 
-This module is often used with mod\_delegation (c.f. XEP for more
-details)
+This module is often used with mod\_delegation (c.f. XEP for more details)
--- a/mod_privilege/mod_privilege.lua	Wed Mar 30 17:52:41 2022 +0200
+++ b/mod_privilege/mod_privilege.lua	Wed May 11 12:43:26 2022 +0200
@@ -1,5 +1,5 @@
 -- XEP-0356 (Privileged Entity)
--- Copyright (C) 2015-2016 Jérôme Poisson
+-- Copyright (C) 2015-2022 Jérôme Poisson
 --
 -- This module is MIT/X11 licensed. Please see the
 -- COPYING file in the source package for more information.
@@ -12,17 +12,17 @@
 local set = require("util.set")
 local st = require("util.stanza")
 local roster_manager = require("core.rostermanager")
-local usermanager_user_exists = require "core.usermanager".user_exists;
+local usermanager_user_exists = require "core.usermanager".user_exists
 local hosts = prosody.hosts
-local full_sessions = prosody.full_sessions;
+local full_sessions = prosody.full_sessions
 
 local priv_session = module:shared("/*/privilege/session")
 
 if priv_session.connected_cb == nil then
-	-- set used to have connected event listeners
-	-- which allows a host to react on events from
-	-- other hosts
-	priv_session.connected_cb = set.new()
+    -- set used to have connected event listeners
+    -- which allows a host to react on events from
+    -- other hosts
+    priv_session.connected_cb = set.new()
 end
 local connected_cb = priv_session.connected_cb
 
@@ -38,17 +38,17 @@
 local _ALLOWED_PRESENCE = set.new({'none', 'managed_entity', 'roster'})
 local _PRESENCE_MANAGED = set.new({'managed_entity', 'roster'})
 local _TO_CHECK = {roster=_ALLOWED_ROSTER, message=_ALLOWED_MESSAGE, presence=_ALLOWED_PRESENCE}
-local _PRIV_ENT_NS = 'urn:xmpp:privilege:1'
+local _PRIV_ENT_NS = 'urn:xmpp:privilege:2'
 local _FORWARDED_NS = 'urn:xmpp:forward:0'
 local _MODULE_HOST = module:get_host()
 
 
-module:log("debug", "Loading privileged entity module ");
+module:log("debug", "Loading privileged entity module ")
 
 
 --> Permissions management <--
 
-local privileges = module:get_option("privileged_entities", {})
+local config_priv = module:get_option("privileged_entities", {})
 
 local function get_session_privileges(session, host)
     if not session.privileges then return nil end
@@ -57,134 +57,170 @@
 
 
 local function advertise_perm(session, to_jid, perms)
-	-- send <message/> stanza to advertise permissions
-	-- as expained in § 4.2
-	local message = st.message({from=module.host, to=to_jid})
-					  :tag("privilege", {xmlns=_PRIV_ENT_NS})
+    -- send <message/> stanza to advertise permissions
+    -- as expained in § 4.2
+    local message = st.message({from=module.host, to=to_jid})
+                      :tag("privilege", {xmlns=_PRIV_ENT_NS})
 
-	for _, perm in pairs({'roster', 'message', 'presence'}) do
-		if perms[perm] then
-			message:tag("perm", {access=perm, type=perms[perm]}):up()
-		end
-	end
-	session.send(message)
+    for _, perm in pairs({'roster', 'message', 'presence'}) do
+        if perms[perm] then
+            message:tag("perm", {access=perm, type=perms[perm]}):up()
+        end
+    end
+    local iq_perm = perms["iq"]
+    if iq_perm ~= nil then
+        message:tag("perm", {access="iq"})
+        for namespace, ns_perm in pairs(iq_perm) do
+                local perm_type
+                if ns_perm.set and ns_perm.get then
+                    perm_type = "both"
+                elseif ns_perm.set then
+                    perm_type = "set"
+                elseif ns_perm.get then
+                    perm_type = "get"
+                else
+                    perm_type = nil
+                end
+                message:tag("namespace", {ns=namespace, type=perm_type})
+        end
+    end
+    session.send(message)
 end
 
 local function set_presence_perm_set(to_jid, perms)
-	-- fill the presence sets according to perms
-	if _PRESENCE_MANAGED:contains(perms.presence) then
-		presence_man_ent:add(to_jid)
-	end
-	if perms.presence == 'roster' then
-		presence_roster:add(to_jid)
-	end
+    -- fill the presence sets according to perms
+    if _PRESENCE_MANAGED:contains(perms.presence) then
+        presence_man_ent:add(to_jid)
+    end
+    if perms.presence == 'roster' then
+        presence_roster:add(to_jid)
+    end
 end
 
 local function advertise_presences(session, to_jid, perms)
-	-- send presence status for already conencted entities
-	-- as explained in § 7.1
-	-- people in roster are probed only for active sessions
-	-- TODO: manage roster load for inactive sessions
-	if not perms.presence then return; end
-	local to_probe = {}
-	for _, user_session in pairs(full_sessions) do
-		if user_session.presence and _PRESENCE_MANAGED:contains(perms.presence) then
-			local presence = st.clone(user_session.presence)
-			presence.attr.to = to_jid
-			module:log("debug", "sending current presence for "..tostring(user_session.full_jid))
-			session.send(presence)
-		end
-		if perms.presence == "roster" then
-			-- we reset the cache to avoid to miss a presence that just changed
-			priv_session.last_presence = nil
+    -- send presence status for already connected entities
+    -- as explained in § 7.1
+    -- people in roster are probed only for active sessions
+    -- TODO: manage roster load for inactive sessions
+    if not perms.presence then return; end
+    local to_probe = {}
+    for _, user_session in pairs(full_sessions) do
+        if user_session.presence and _PRESENCE_MANAGED:contains(perms.presence) then
+            local presence = st.clone(user_session.presence)
+            presence.attr.to = to_jid
+            module:log("debug", "sending current presence for "..tostring(user_session.full_jid))
+            session.send(presence)
+        end
+        if perms.presence == "roster" then
+            -- we reset the cache to avoid to miss a presence that just changed
+            priv_session.last_presence = nil
 
-			if user_session.roster then
-				local bare_jid = jid.bare(user_session.full_jid)
-				for entity, item in pairs(user_session.roster) do
-					if entity~=false and entity~="pending" and (item.subscription=="both" or item.subscription=="to") then
-						local _, host = jid.split(entity)
-						if not hosts[host] then -- we don't probe jid from hosts we manage
-							-- using a table with entity as key avoid probing several time the same one
-							to_probe[entity] = bare_jid
-						end
-					end
-				end
-			end
-		end
-	end
+            if user_session.roster then
+                local bare_jid = jid.bare(user_session.full_jid)
+                for entity, item in pairs(user_session.roster) do
+                    if entity~=false and entity~="pending" and (item.subscription=="both" or item.subscription=="to") then
+                        local _, host = jid.split(entity)
+                        if not hosts[host] then -- we don't probe jid from hosts we manage
+                            -- using a table with entity as key avoid probing several time the same one
+                            to_probe[entity] = bare_jid
+                        end
+                    end
+                end
+            end
+        end
+    end
 
-	-- now we probe peoples for "roster" presence permission
-	for probe_to, probe_from in pairs(to_probe) do
-		module:log("debug", "probing presence for %s (on behalf of %s)", tostring(probe_to), tostring(probe_from))
-		local probe = st.presence({from=probe_from, to=probe_to, type="probe"})
-		prosody.core_route_stanza(nil, probe)
-	end
+    -- now we probe peoples for "roster" presence permission
+    for probe_to, probe_from in pairs(to_probe) do
+        module:log("debug", "probing presence for %s (on behalf of %s)", tostring(probe_to), tostring(probe_from))
+        local probe = st.presence({from=probe_from, to=probe_to, type="probe"})
+        prosody.core_route_stanza(nil, probe)
+    end
 end
 
+
 local function on_auth(event)
-	-- Check if entity is privileged according to configuration,
-	-- and set session.privileges accordingly
+    -- Check if entity is privileged according to configuration,
+    -- and set session.privileges accordingly
 
-	local session = event.session
-	local bare_jid = jid.join(session.username, session.host)
+    local session = event.session
+    local bare_jid = jid.join(session.username, session.host)
     if not session.privileges then
         session.privileges = {}
     end
 
-	local ent_priv = privileges[bare_jid]
-	if ent_priv ~= nil then
-		module:log("debug", "Entity is privileged")
-		for perm_type, allowed_values in pairs(_TO_CHECK) do
-			local value = ent_priv[perm_type]
-			if value ~= nil then
-				if not allowed_values:contains(value) then
-					module:log('warn', 'Invalid value for '..perm_type..' privilege: ['..value..']')
-					module:log('warn', 'Setting '..perm_type..' privilege to none')
-					ent_priv[perm_type] = nil
-				end
-				if value == 'none' then
-					ent_priv[perm_type] = nil
-				end
-			end
-		end
-		-- extra checks for presence permission
-		if ent_priv.presence == 'roster' and not _ROSTER_GET_PERM:contains(ent_priv.roster) then
-			module:log("warn", "Can't allow roster presence privilege without roster \"get\" privilege")
-			module:log("warn", "Setting presence permission to none")
-			ent_priv.presence = nil
-		end
+    local conf_ent_priv = config_priv[bare_jid]
+    local ent_priv = {}
+    if conf_ent_priv ~= nil then
+        module:log("debug", "Entity is privileged")
+        for perm_type, allowed_values in pairs(_TO_CHECK) do
+            local value = conf_ent_priv[perm_type]
+            if value ~= nil then
+                if not allowed_values:contains(value) then
+                    module:log('warn', 'Invalid value for '..perm_type..' privilege: ['..value..']')
+                    module:log('warn', 'Setting '..perm_type..' privilege to none')
+                    ent_priv[perm_type] = nil
+                elseif value == 'none' then
+                    ent_priv[perm_type] = nil
+                else
+                    ent_priv[perm_type] = value
+                end
+            else
+                ent_priv[perm_type] = nil
+            end
+        end
+        -- extra checks for presence permission
+        if ent_priv.presence == 'roster' and not _ROSTER_GET_PERM:contains(ent_priv.roster) then
+            module:log("warn", "Can't allow roster presence privilege without roster \"get\" privilege")
+            module:log("warn", "Setting presence permission to none")
+            ent_priv.presence = nil
+        end
+        -- iq permission
+        local iq_perm_config = conf_ent_priv["iq"]
+        if iq_perm_config ~= nil then
+            local iq_perm = {}
+            ent_priv["iq"] = iq_perm
+            for ns, ns_perm_config in pairs(iq_perm_config) do
+                iq_perm[ns] = {
+                    ["get"] = ns_perm_config == "get" or ns_perm_config == "both",
+                    ["set"] = ns_perm_config == "set" or ns_perm_config == "both"
+                }
+            end
+        else
+            ent_priv["iq"] = nil
+        end
 
-		if session.type == "component" then
-			-- we send the message stanza only for component
-			-- it will be sent at first <presence/> for other entities
-			advertise_perm(session, bare_jid, ent_priv)
-			set_presence_perm_set(bare_jid, ent_priv)
-			advertise_presences(session, bare_jid, ent_priv)
-		end
-	end
+        if session.type == "component" then
+            -- we send the message stanza only for component
+            -- it will be sent at first <presence/> for other entities
+            advertise_perm(session, bare_jid, ent_priv)
+            set_presence_perm_set(bare_jid, ent_priv)
+            advertise_presences(session, bare_jid, ent_priv)
+        end
+    end
 
-	session.privileges[_MODULE_HOST] = ent_priv
+    session.privileges[_MODULE_HOST] = ent_priv
 end
 
 local function on_presence(event)
-	-- Permission are already checked at this point,
-	-- we only advertise them to the entity
-	local session = event.origin
+    -- Permission are already checked at this point,
+    -- we only advertise them to the entity
+    local session = event.origin
     local session_privileges = get_session_privileges(session, _MODULE_HOST)
-	if session_privileges then
-		advertise_perm(session, session.full_jid, session_privileges)
-		set_presence_perm_set(session.full_jid, session_privileges)
-		advertise_presences(session, session.full_jid, session_privileges)
-	end
+    if session_privileges then
+        advertise_perm(session, session.full_jid, session_privileges)
+        set_presence_perm_set(session.full_jid, session_privileges)
+        advertise_presences(session, session.full_jid, session_privileges)
+    end
 end
 
 local function on_component_auth(event)
-	-- react to component-authenticated event from this host
-	-- and call the on_auth methods from all other hosts
-	-- needed for the component to get delegations advertising
-	for callback in connected_cb:items() do
-		callback(event)
-	end
+    -- react to component-authenticated event from this host
+    -- and call the on_auth methods from all other hosts
+    -- needed for the component to get delegations advertising
+    for callback in connected_cb:items() do
+        callback(event)
+    end
 end
 
 if module:get_host_type() ~= "component" then
@@ -199,267 +235,446 @@
 
 -- get
 module:hook("iq-get/bare/jabber:iq:roster:query", function(event)
-	local session, stanza = event.origin, event.stanza;
-	if not stanza.attr.to then
-		-- we don't want stanzas addressed to /self
-		return;
-	end
-    local node, host = jid.split(stanza.attr.to);
+    local session, stanza = event.origin, event.stanza
+    if not stanza.attr.to then
+        -- we don't want stanzas addressed to /self
+        return
+    end
+    local node, host = jid.split(stanza.attr.to)
     local session_privileges = get_session_privileges(session, host)
 
-	if session_privileges and _ROSTER_GET_PERM:contains(session_privileges.roster) then
-		module:log("debug", "Roster get from allowed privileged entity received")
-		-- following code is adapted from mod_remote_roster
-		local roster = roster_manager.load_roster(node, host);
+    if session_privileges and _ROSTER_GET_PERM:contains(session_privileges.roster) then
+        module:log("debug", "Roster get from allowed privileged entity received")
+        -- following code is adapted from mod_remote_roster
+        local roster = roster_manager.load_roster(node, host)
 
-		local reply = st.reply(stanza):query("jabber:iq:roster");
-		for entity_jid, item in pairs(roster) do
-			if entity_jid and entity_jid ~= "pending" then
-				reply:tag("item", {
-					jid = entity_jid,
-					subscription = item.subscription,
-					ask = item.ask,
-					name = item.name,
-				});
-				for group in pairs(item.groups) do
-					reply:tag("group"):text(group):up();
-				end
-				reply:up(); -- move out from item
-			end
-		end
-		-- end of code adapted from mod_remote_roster
-		session.send(reply);
-	else
-	    module:log("warn", "Entity "..tostring(session.full_jid).." try to get roster without permission")
-		session.send(st.error_reply(stanza, 'auth', 'forbidden'))
-	end
+        local reply = st.reply(stanza):query("jabber:iq:roster")
+        for entity_jid, item in pairs(roster) do
+            if entity_jid and entity_jid ~= "pending" then
+                reply:tag("item", {
+                    jid = entity_jid,
+                    subscription = item.subscription,
+                    ask = item.ask,
+                    name = item.name,
+                })
+                for group in pairs(item.groups) do
+                    reply:tag("group"):text(group):up()
+                end
+                reply:up(); -- move out from item
+            end
+        end
+        -- end of code adapted from mod_remote_roster
+        session.send(reply)
+    else
+        module:log("warn", "Entity "..tostring(session.full_jid).." try to get roster without permission")
+        session.send(st.error_reply(stanza, 'auth', 'forbidden'))
+    end
 
-	return true
-end);
+    return true
+end)
 
 -- set
 module:hook("iq-set/bare/jabber:iq:roster:query", function(event)
-	local session, stanza = event.origin, event.stanza;
-	if not stanza.attr.to then
-		-- we don't want stanzas addressed to /self
-		return;
-	end
-    local from_node, from_host = jid.split(stanza.attr.to);
+    local session, stanza = event.origin, event.stanza
+    if not stanza.attr.to then
+        -- we don't want stanzas addressed to /self
+        return
+    end
+    local from_node, from_host = jid.split(stanza.attr.to)
     local session_privileges = get_session_privileges(session, from_host)
 
-	if session_privileges and _ROSTER_SET_PERM:contains(session_privileges.roster) then
-		module:log("debug", "Roster set from allowed privileged entity received")
-		-- following code is adapted from mod_remote_roster
-		if not(usermanager_user_exists(from_node, from_host)) then return; end
-		local roster = roster_manager.load_roster(from_node, from_host);
-		if not(roster) then return; end
+    if session_privileges and _ROSTER_SET_PERM:contains(session_privileges.roster) then
+        module:log("debug", "Roster set from allowed privileged entity received")
+        -- following code is adapted from mod_remote_roster
+        if not(usermanager_user_exists(from_node, from_host)) then return; end
+        local roster = roster_manager.load_roster(from_node, from_host)
+        if not(roster) then return; end
 
-		local query = stanza.tags[1];
-		for _, item in ipairs(query.tags) do
-			if item.name == "item"
-				and item.attr.xmlns == "jabber:iq:roster" and item.attr.jid
-					-- Protection against overwriting roster.pending, until we move it
-				and item.attr.jid ~= "pending" then
+        local query = stanza.tags[1]
+        for _, item in ipairs(query.tags) do
+            if item.name == "item"
+                and item.attr.xmlns == "jabber:iq:roster" and item.attr.jid
+                    -- Protection against overwriting roster.pending, until we move it
+                and item.attr.jid ~= "pending" then
 
-				local item_jid = jid.prep(item.attr.jid);
-				local _, host, resource = jid.split(item_jid);
-				if not resource then
-					if item_jid ~= stanza.attr.to then -- not self-item_jid
-						if item.attr.subscription == "remove" then
-							local r_item = roster[item_jid];
-							if r_item then
-								roster[item_jid] = nil;
-								if roster_manager.save_roster(from_node, from_host, roster) then
-									session.send(st.reply(stanza));
-									roster_manager.roster_push(from_node, from_host, item_jid);
-								else
-									roster[item_jid] = item;
-									session.send(st.error_reply(stanza, "wait", "internal-server-error", "Unable to save roster"));
-								end
-							else
-								session.send(st.error_reply(stanza, "modify", "item-not-found"));
-							end
-						else
-							local subscription = item.attr.subscription;
-							if subscription ~= "both" and subscription ~= "to" and subscription ~= "from" and subscription ~= "none" then -- TODO error on invalid
-								subscription = roster[item_jid] and roster[item_jid].subscription or "none";
-							end
-							local r_item = {name = item.attr.name, groups = {}};
-							if r_item.name == "" then r_item.name = nil; end
-							r_item.subscription = subscription;
-							if subscription ~= "both" and subscription ~= "to" then
-								r_item.ask = roster[item_jid] and roster[item_jid].ask;
-							end
-							for _, child in ipairs(item) do
-								if child.name == "group" then
-									local text = table.concat(child);
-									if text and text ~= "" then
-										r_item.groups[text] = true;
-									end
-								end
-							end
-							local olditem = roster[item_jid];
-							roster[item_jid] = r_item;
-							if roster_manager.save_roster(from_node, from_host, roster) then -- Ok, send success
-								session.send(st.reply(stanza));
-								-- and push change to all resources
-								roster_manager.roster_push(from_node, from_host, item_jid);
-							else -- Adding to roster failed
-								roster[item_jid] = olditem;
-								session.send(st.error_reply(stanza, "wait", "internal-server-error", "Unable to save roster"));
-							end
-						end
-					else -- Trying to add self to roster
-						session.send(st.error_reply(stanza, "cancel", "not-allowed"));
-					end
-				else -- Invalid JID added to roster
-					module:log("warn", "resource: %s , host: %s", tostring(resource), tostring(host))
-					session.send(st.error_reply(stanza, "modify", "bad-request")); -- FIXME what's the correct error?
-				end
-			else -- Roster set didn't include a single item, or its name wasn't  'item'
-				session.send(st.error_reply(stanza, "modify", "bad-request"));
-			end
-		end -- for loop end
-		-- end of code adapted from mod_remote_roster
-	else -- The permission is not granted
-	    module:log("warn", "Entity "..tostring(session.full_jid).." try to set roster without permission")
-		session.send(st.error_reply(stanza, 'auth', 'forbidden'))
-	end
+                local item_jid = jid.prep(item.attr.jid)
+                local _, host, resource = jid.split(item_jid)
+                if not resource then
+                    if item_jid ~= stanza.attr.to then -- not self-item_jid
+                        if item.attr.subscription == "remove" then
+                            local r_item = roster[item_jid]
+                            if r_item then
+                                roster[item_jid] = nil
+                                if roster_manager.save_roster(from_node, from_host, roster) then
+                                    session.send(st.reply(stanza))
+                                    roster_manager.roster_push(from_node, from_host, item_jid)
+                                else
+                                    roster[item_jid] = item
+                                    session.send(st.error_reply(stanza, "wait", "internal-server-error", "Unable to save roster"))
+                                end
+                            else
+                                session.send(st.error_reply(stanza, "modify", "item-not-found"))
+                            end
+                        else
+                            local subscription = item.attr.subscription
+                            if subscription ~= "both" and subscription ~= "to" and subscription ~= "from" and subscription ~= "none" then -- TODO error on invalid
+                                subscription = roster[item_jid] and roster[item_jid].subscription or "none"
+                            end
+                            local r_item = {name = item.attr.name, groups = {}}
+                            if r_item.name == "" then r_item.name = nil; end
+                            r_item.subscription = subscription
+                            if subscription ~= "both" and subscription ~= "to" then
+                                r_item.ask = roster[item_jid] and roster[item_jid].ask
+                            end
+                            for _, child in ipairs(item) do
+                                if child.name == "group" then
+                                    local text = table.concat(child)
+                                    if text and text ~= "" then
+                                        r_item.groups[text] = true
+                                    end
+                                end
+                            end
+                            local olditem = roster[item_jid]
+                            roster[item_jid] = r_item
+                            if roster_manager.save_roster(from_node, from_host, roster) then -- Ok, send success
+                                session.send(st.reply(stanza))
+                                -- and push change to all resources
+                                roster_manager.roster_push(from_node, from_host, item_jid)
+                            else -- Adding to roster failed
+                                roster[item_jid] = olditem
+                                session.send(st.error_reply(stanza, "wait", "internal-server-error", "Unable to save roster"))
+                            end
+                        end
+                    else -- Trying to add self to roster
+                        session.send(st.error_reply(stanza, "cancel", "not-allowed"))
+                    end
+                else -- Invalid JID added to roster
+                    module:log("warn", "resource: %s , host: %s", tostring(resource), tostring(host))
+                    session.send(st.error_reply(stanza, "modify", "bad-request")); -- FIXME what's the correct error?
+                end
+            else -- Roster set didn't include a single item, or its name wasn't  'item'
+                session.send(st.error_reply(stanza, "modify", "bad-request"))
+            end
+        end -- for loop end
+        -- end of code adapted from mod_remote_roster
+    else -- The permission is not granted
+        module:log("warn", "Entity "..tostring(session.full_jid).." try to set roster without permission")
+        session.send(st.error_reply(stanza, 'auth', 'forbidden'))
+    end
 
-	return true
-end);
+    return true
+end)
 
 
 --> message permission <--
 
 local function clean_xmlns(node)
-	-- Recursively remove "jabber:client" attribute from node.
-	-- In Prosody internal routing, xmlns should not be set.
-	-- Keeping xmlns would lead to issues like mod_smacks ignoring the outgoing stanza,
-	-- so we remove all xmlns attributes with a value of "jabber:client"
-	if node.attr.xmlns == 'jabber:client' then
-		for childnode in node:childtags() do
-			clean_xmlns(childnode);
-		end
-		node.attr.xmlns = nil;
-	end
+    -- Recursively remove "jabber:client" attribute from node.
+    -- In Prosody internal routing, xmlns should not be set.
+    -- Keeping xmlns would lead to issues like mod_smacks ignoring the outgoing stanza,
+    -- so we remove all xmlns attributes with a value of "jabber:client"
+    if node.attr.xmlns == 'jabber:client' then
+        for childnode in node:childtags() do
+            clean_xmlns(childnode)
+        end
+        node.attr.xmlns = nil
+    end
 end
 
 module:hook("message/host", function(event)
-	local session, stanza = event.origin, event.stanza;
-	local privilege_elt = stanza:get_child('privilege', _PRIV_ENT_NS)
-	if privilege_elt==nil then return; end
+    local session, stanza = event.origin, event.stanza
+    local privilege_elt = stanza:get_child('privilege', _PRIV_ENT_NS)
+    if privilege_elt==nil then return; end
     local _, to_host = jid.split(stanza.attr.to)
     local session_privileges = get_session_privileges(session, to_host)
 
-	if session_privileges and session_privileges.message=="outgoing" then
-		if #privilege_elt.tags==1 and privilege_elt.tags[1].name == "forwarded"
-			and privilege_elt.tags[1].attr.xmlns==_FORWARDED_NS then
-			local message_elt = privilege_elt.tags[1]:get_child('message', 'jabber:client')
-			if message_elt ~= nil then
-				local _, from_host, from_resource = jid.split(message_elt.attr.from)
-				if from_resource == nil and hosts[from_host] then -- we only accept bare jids from one of the server hosts
-					clean_xmlns(message_elt);  -- needed do to proper routing
-					-- at this point everything should be alright, we can send the message
-					prosody.core_route_stanza(nil, message_elt)
-				else -- trying to send a message from a forbidden entity
-	    			module:log("warn", "Entity "..tostring(session.full_jid).." try to send a message from "..tostring(message_elt.attr.from))
-					session.send(st.error_reply(stanza, 'auth', 'forbidden'))
-				end
-			else -- incorrect message child
-				session.send(st.error_reply(stanza, "modify", "bad-request", "invalid forwarded <message/> element"));
-			end
-		else -- incorrect forwarded child
-			session.send(st.error_reply(stanza, "modify", "bad-request", "invalid <forwarded/> element"));
-		end;
-	else -- The permission is not granted
-	    module:log("warn", "Entity "..tostring(session.full_jid).." try to send message without permission")
-		session.send(st.error_reply(stanza, 'auth', 'forbidden'))
-	end
+    if session_privileges and session_privileges.message=="outgoing" then
+        if #privilege_elt.tags==1 and privilege_elt.tags[1].name == "forwarded"
+            and privilege_elt.tags[1].attr.xmlns==_FORWARDED_NS then
+            local message_elt = privilege_elt.tags[1]:get_child('message', 'jabber:client')
+            if message_elt ~= nil then
+                local _, from_host, from_resource = jid.split(message_elt.attr.from)
+                if from_resource == nil and hosts[from_host] then -- we only accept bare jids from one of the server hosts
+                    clean_xmlns(message_elt);  -- needed do to proper routing
+                    -- at this point everything should be alright, we can send the message
+                    prosody.core_route_stanza(nil, message_elt)
+                else -- trying to send a message from a forbidden entity
+                    module:log("warn", "Entity "..tostring(session.full_jid).." try to send a message from "..tostring(message_elt.attr.from))
+                    session.send(st.error_reply(stanza, 'auth', 'forbidden'))
+                end
+            else -- incorrect message child
+                session.send(st.error_reply(stanza, "modify", "bad-request", "invalid forwarded <message/> element"))
+            end
+        else -- incorrect forwarded child
+            session.send(st.error_reply(stanza, "modify", "bad-request", "invalid <forwarded/> element"))
+        end
+    else -- The permission is not granted
+        module:log("warn", "Entity "..tostring(session.full_jid).." try to send message without permission")
+        session.send(st.error_reply(stanza, 'auth', 'forbidden'))
+    end
 
-	return true
-end);
+    return true
+end)
 
 
 --> presence permission <--
 
 local function same_tags(tag1, tag2)
-	-- check if two tags are equivalent
+    -- check if two tags are equivalent
 
     if tag1.name ~= tag2.name then return false; end
 
-	if #tag1 ~= #tag2 then return false; end
+    if #tag1 ~= #tag2 then return false; end
 
-	for name, value in pairs(tag1.attr) do
-		if tag2.attr[name] ~= value then return false; end
-	end
+    for name, value in pairs(tag1.attr) do
+        if tag2.attr[name] ~= value then return false; end
+    end
 
-	for i=1,#tag1 do
-		if type(tag1[i]) == "string" then
-			if tag1[i] ~= tag2[i] then return false; end
-		else
-			if not same_tags(tag1[i], tag2[i]) then return false; end
-		end
-	end
+    for i=1,#tag1 do
+        if type(tag1[i]) == "string" then
+            if tag1[i] ~= tag2[i] then return false; end
+        else
+            if not same_tags(tag1[i], tag2[i]) then return false; end
+        end
+    end
 
-	return true
+    return true
 end
 
 local function same_presences(presence1, presence2)
-	-- check that 2 <presence/> stanzas are equivalent (except for "to" attribute)
-	-- /!\ if the id change but everything else is equivalent, this method return false
-	-- this behaviour may change in the future
-	if presence1.attr.from ~= presence2.attr.from or presence1.attr.id ~= presence2.attr.id
-		or presence1.attr.type ~= presence2.attr.type then
-		return false
-	end
+    -- check that 2 <presence/> stanzas are equivalent (except for "to" attribute)
+    -- /!\ if the id change but everything else is equivalent, this method return false
+    -- this behaviour may change in the future
+    if presence1.attr.from ~= presence2.attr.from or presence1.attr.id ~= presence2.attr.id
+        or presence1.attr.type ~= presence2.attr.type then
+        return false
+    end
 
-	if presence1.attr.id and presence1.attr.id == presence2.attr.id then return true; end
+    if presence1.attr.id and presence1.attr.id == presence2.attr.id then return true; end
 
-	if #presence1 ~= #presence2 then return false; end
+    if #presence1 ~= #presence2 then return false; end
 
-	for i=1,#presence1 do
-		if type(presence1[i]) == "string" then
-			if presence1[i] ~= presence2[i] then return false; end
-		else
-			if not same_tags(presence1[i], presence2[i]) then return false; end
-		end
-	end
+    for i=1,#presence1 do
+        if type(presence1[i]) == "string" then
+            if presence1[i] ~= presence2[i] then return false; end
+        else
+            if not same_tags(presence1[i], presence2[i]) then return false; end
+        end
+    end
 
-	return true
+    return true
 end
 
 local function forward_presence(presence, to_jid)
-	local presence_fwd = st.clone(presence)
-	presence_fwd.attr.to = to_jid
-	module:log("debug", "presence forwarded to "..to_jid..": "..tostring(presence_fwd))
-	module:send(presence_fwd)
-	-- cache used to avoid to send several times the same stanza
-	priv_session.last_presence = presence
+    local presence_fwd = st.clone(presence)
+    presence_fwd.attr.to = to_jid
+    module:log("debug", "presence forwarded to "..to_jid..": "..tostring(presence_fwd))
+    module:send(presence_fwd)
+    -- cache used to avoid to send several times the same stanza
+    priv_session.last_presence = presence
 end
 
 module:hook("presence/bare", function(event)
-	if presence_man_ent:empty() and presence_roster:empty() then return; end
+    if presence_man_ent:empty() and presence_roster:empty() then return; end
+
+    local stanza = event.stanza
+    if stanza.attr.type == nil or stanza.attr.type == "unavailable" then
+        if not stanza.attr.to then
+            for entity in presence_man_ent:items() do
+                if stanza.attr.from ~= entity then forward_presence(stanza, entity); end
+            end
+        else -- directed presence
+            -- we ignore directed presences from our own host, as we already have them
+            local _, from_host = jid.split(stanza.attr.from)
+            if hosts[from_host] then return; end
+
+            -- we don't send several time the same presence, as recommended in §7 #2
+            if priv_session.last_presence and same_presences(priv_session.last_presence, stanza) then
+               return
+            end
+
+            for entity in presence_roster:items() do
+                if stanza.attr.from ~= entity then forward_presence(stanza, entity); end
+            end
+        end
+    end
+end, 150)
+
+--> IQ permission <--
+
+module:hook("iq/bare/".._PRIV_ENT_NS..":privileged_iq", function(event)
+    local session, stanza = event.origin, event.stanza
+    if not stanza.attr.to then
+        -- we don't want stanzas addressed to /self
+        return
+    end
+    local from_node, from_host, from_resource = jid.split(stanza.attr.to)
+
+    if from_resource ~= nil or not usermanager_user_exists(from_node, from_host) then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                "wrapping <IQ> stanza recipient must be a bare JID of a local user"
+            )
+        )
+        return true
+    end
+
+    local session_privileges = get_session_privileges(session, from_host)
+
+    if session_privileges == nil then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                "no privilege granted"
+            )
+        )
+        return true
+    end
+
+    local iq_privileges = session_privileges["iq"]
+    if iq_privileges == nil then
+        session.send(
+            session.send(st.error_reply(stanza, "auth", "forbidden", "you are not allowed to send privileged <IQ> stanzas"))
+        )
+        return true
+    end
+
+    local privileged_iq = stanza:get_child("privileged_iq", _PRIV_ENT_NS)
+
+    local wrapped_iq = privileged_iq.tags[1]
+    if wrapped_iq == nil then
+        session.send(
+            st.error_reply(stanza, "auth", "forbidden", "missing <IQ> stanza to send")
+        )
+        return true
+    end
+
+    if wrapped_iq.attr.xmlns ~= "jabber:client" then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'wrapped <IQ> must have a xmlns of "jabber:client"'
+                )
+        )
+        return true
+    end
+
+    clean_xmlns(wrapped_iq)
 
-	local stanza = event.stanza
-	if stanza.attr.type == nil or stanza.attr.type == "unavailable" then
-		if not stanza.attr.to then
-			for entity in presence_man_ent:items() do
-				if stanza.attr.from ~= entity then forward_presence(stanza, entity); end
-			end
-		else -- directed presence
-			-- we ignore directed presences from our own host, as we already have them
-			local _, from_host = jid.split(stanza.attr.from)
-			if hosts[from_host] then return; end
+    if #wrapped_iq.tags ~= 1 then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'invalid payload in wrapped <IQ>'
+                )
+        )
+        return true
+    end
+
+    local payload = wrapped_iq.tags[1]
+
+    local priv_ns = payload.attr.xmlns
+    if priv_ns == nil then
+        session.send(
+            st.error_reply(stanza, "auth", "forbidden", "xmlns not set in privileged <IQ>")
+        )
+        return true
+    end
+
+    local ns_perms = iq_privileges[priv_ns]
+    local iq_type = stanza.attr.type
+    if ns_perms == nil or iq_type == nil or not ns_perms[iq_type] then
+        session.send(
+            session.send(st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                "you are not allowed to send privileged <IQ> stanzas of this type and namespace")
+            )
+        )
+        return true
+    end
+
+    if wrapped_iq.attr.from ~= nil and wrapped_iq.attr.from ~= stanza.attr.to then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'wrapped <IQ> "from" attribute is inconsistent with main <IQ> "to" attribute'
+            )
+        )
+        return true
+    end
+
+    wrapped_iq.attr.from = stanza.attr.to
 
-			-- we don't send several time the same presence, as recommended in §7 #2
-			if priv_session.last_presence and same_presences(priv_session.last_presence, stanza) then
-			   return
-			end
+    if wrapped_iq.attr.to == nil then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'wrapped <IQ> "to" attribute is missing'
+            )
+        )
+        return true
+    end
+
+    if wrapped_iq.attr.type ~= iq_type then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'invalid wrapped <IQ>: type mismatch'
+            )
+        )
+        return true
+    end
 
-			for entity in presence_roster:items() do
-				if stanza.attr.from ~= entity then forward_presence(stanza, entity); end
-			end
-		end
-	end
-end, 150)
+    if wrapped_iq.attr.id == nil then
+        session.send(
+            st.error_reply(
+                stanza,
+                "auth",
+                "forbidden",
+                'invalid wrapped <IQ>: missing "id" attribute'
+            )
+        )
+        return true
+    end
+
+    -- at this point, wrapped_iq is considered valid, and privileged entity is allowed to send it
+
+    module:send_iq(wrapped_iq)
+        :next(function (response)
+            local reply = st.reply(stanza);
+            response.stanza.attr.xmlns = 'jabber:client'
+            reply:tag("privilege", {xmlns = _PRIV_ENT_NS})
+            :tag("forwarded", {xmlns = _FORWARDED_NS})
+            :add_child(response.stanza)
+            session.send(reply)
+        end,
+        function(response)
+            module:log("error", "Error while sending privileged <IQ>: %s", response);
+            session.send(
+                st.error_reply(
+                    stanza,
+                    "cancel",
+                    "internal-server-error"
+                )
+            )
+        end)
+
+    return true
+end)