diff --git a/doc/dev.html b/doc/dev.html index b7fea526a..6709b6a12 100644 --- a/doc/dev.html +++ b/doc/dev.html @@ -2,7 +2,7 @@ "http://www.w3.org/TR/REC-html40/loose.dtd">
-Ejabberd 2.1.x Developers GuideAlexey Shchepin |
Ejabberd 2.1.6 Developers GuideAlexey Shchepin |
Ejabberd 2.1.x Feature SheetSander Devrieze |
Ejabberd 2.1.6 Feature SheetSander Devrieze |
ejabberd 2.1.x |
ejabberd 2.1.6 |
Installation and Operation Guide |
ejabberd is a free and open source instant messaging server written in Erlang/OTP.
ejabberd is cross-platform, distributed, fault-tolerant, and based on open standards to achieve real-time communication.
ejabberd is designed to be a rock-solid and feature rich XMPP server.
ejabberd is suitable for small deployments, whether they need to be scalable or not, as well as extremely big deployments.
@@ -347,6 +348,7 @@ GNU MakeThis is a detailed description of each option allowed by the listening modules:
http://server:port/admin/
. Login and password are the username and
@@ -813,9 +819,12 @@ option specifies that Zlib stream compression (as defined in ejabberd has built-in LDAP support. You can authenticate users against LDAP -server and use LDAP directory as vCard storage. Shared rosters are not supported -yet.
Usually ejabberd treats LDAP as a read-only storage: +server and use LDAP directory as vCard storage.
Usually ejabberd treats LDAP as a read-only storage: it is possible to consult data, but not possible to create accounts or edit vCard that is stored in LDAP. However, it is possible to change passwords if mod_register module is enabled @@ -1928,6 +1936,8 @@ all entries end with a comma:
Examples:
{acl, shortname, {user_glob, "?"}}. {acl, shortname, {user_glob, "??"}}. %% The same using regexp: @@ -3010,7 +3027,10 @@ Next example prohibits the registration of too short account names: {modules, [ ... - {mod_register, [{access, register}]}, + {mod_register, [{access, register}, + {ip_access, [{allow, "127.0.0.0/8"}, + {deny, "0.0.0.0/0"}]} + ]}, ... ]}.
This example configuration enables Roster Versioning with storage of current id:
{modules, [ @@ -3207,15 +3228,232 @@ roster groups as shown in the following table:
This module lets the server administrator +automatically populate users’ rosters (contact lists) with entries based on +users and groups defined in an LDAP-based directory.
+The module accepts the following configuration parameters. Some of them, if +unspecified, default to the values specified for the top level of +configuration. This lets you avoid specifying, for example, the bind password, +in multiple places.
+These parameters specify LDAP filters used to query for shared roster information.
+All of them are run against the ldap_base
.
ldap_groupattr
parameter.
+If unspecified, defaults to the top-level parameter of the same name.
+You must specify it in some place in the configuration, there is no default.ldap_userdesc
and ldap_useruid
.
+If unspecified, defaults to the top-level parameter of the same name.
+If that one also is unspecified, then the filter is assembled from values of
+other parameters as follows ([ldap_SOMETHING]
is used to mean “the
+value of the configuration parameter ldap_SOMETHING”):(&(&([ldap_memberattr]=[ldap_memberattr_format])([ldap_groupattr]=%g))[ldap_filter]) +
Subsequently %u and %g are replaced with a *. This means
+that given the defaults, the filter sent to the LDAP server is would be
+(&(memberUid=*)(cn=*))
. If however the ldap_memberattr_format
+is something like uid=%u,ou=People,o=org
, then the filter will be
+(&(memberUid=uid=*,ou=People,o=org)(cn=*))
.
ldap_groupattr
, ldap_groupdesc
and ldap_memberattr
.
+If unspecified, defaults to the top-level parameter of the same name.
+If that one also is unspecified, then the filter is constructed exactly in the
+same way as User Filter.Note that you will probably need to manually define the User and Group Filters (since the auto-assembled ones will not work) if: +
+An example where it is the case is OpenLDAP and (unique)MemberName attribute from the groupOf(Unique)Names objectClass. +A symptom of this problem is that you will see messages such as the following in your slapd.log: +
get_filter: unknown filter type=130 +filter="(&(?=undefined)(?=undefined)(something=else))" ++
These parameters specify the names of the attributes which hold interesting data +in the entries returned by running filters specified in +section 3.3.23.
The name of the attribute differs depending on the objectClass you use +for your group objects, for example: +
These paramters control the behaviour of the module.
ldap_memberattr
.
+Defaults to %u, which means that the whole value is the member ID. If
+you change it to something different, you may also need to specify the User
+and Group Filters manually — see section 3.3.23.ldap_memberattr
.An example value "CN=(\\w*),(OU=.*,)*DC=company,DC=com" works for user IDs such as the following: +
In case: +
+then instead of a regular expression, a simple format specified by ldap_memberattr_format is used. Also, in the last two cases an error +message is logged during the module initialization.
Also, note that in all cases ldap_memberattr_format (and not the +regex version) is used for constructing the default “User/Group Filter” — +see section 3.3.23.
The module also accepts the connection parameters, all of which default to the +top-level parameter of the same name, if unspecified. See 3.2.5 +for more information about them.
+When the module is called to retrieve the shared roster for a user, the +following algorithm is used:
This step is here for historical reasons. If you have a tidy DIT and +properly defined “Roster Filter” and “Group Filter”, it is safe to +disable it by setting ldap_auth_check to off — it will +speed up the roster retrieval.
Since there are many possible +DIT +layouts, it will probably be easiest to understand how to configure the module +by looking at an example for a given DIT (or one resembling it).
+This seems to be the kind of DIT for which this module was initially designed. +Basically there are just user objects, and group membership is stored in an +attribute individually for each user. For example in a layout shown in +figure 3.1, the group of each user is stored in its ou attribute.
Such layout has a few downsides, including: +
This however seems to be a common DIT layout, so the module keeps supporting it. +You can use the following configuration…
{mod_shared_roster_ldap,[ + {ldap_base, "ou=flat,dc=nodomain"}, + {ldap_rfilter, "(objectClass=inetOrgPerson)"}, + {ldap_groupattr, "ou"}, + {ldap_memberattr, "cn"}, + {ldap_filter, "(objectClass=inetOrgPerson)"}, + {ldap_userdesc, "displayName"} + ]}, +
…to be provided with a roster as shown in figure 3.2 upon connecting as user czesio.
+
This type of DIT contains distinctly typed objects for users and groups – see figure 3.3. +They are shown separated into different subtrees, but it’s not a requirement.
If you use the following example module configuration with it: +
{mod_shared_roster_ldap,[ + {ldap_base, "ou=deep,dc=nodomain"}, + {ldap_rfilter, "(objectClass=groupOfUniqueNames)"}, + {ldap_filter, ""}, + {ldap_gfilter, "(&(objectClass=groupOfUniqueNames)(cn=%g))"}, + {ldap_groupdesc, "description"}, + {ldap_memberattr, "uniqueMember"}, + {ldap_memberattr_format, "cn=%u,ou=people,ou=deep,dc=nodomain"}, + {ldap_ufilter, "(&(objectClass=inetOrgPerson)(cn=%u))"}, + {ldap_userdesc, "displayName"} + ]}, +
…and connect as user czesio, then ejabberd will provide you with +the roster shown in figure 3.4.
+
This module adds support for Server IP Check (XEP-0279). This protocol enables a client to discover its external IP address.
Options:
This module adds support for Statistics Gathering (XEP-0039). This protocol allows you to retrieve next statistics from your ejabberd deployment:
This module features support for Entity Time (XEP-0202). By using this XEP, you are able to discover the time at another entity’s location.
Options:
This module allows end users to store and retrieve their vCard, and to retrieve other users vCards, as defined in vcard-temp (XEP-0054). The module also implements an uncomplicated Jabber User Directory based on the vCards of @@ -3309,7 +3547,7 @@ and that all virtual hosts will be searched instead of only the current one: ... ]}.
-ejabberd can map LDAP attributes to vCard fields. This behaviour is implemented in the mod_vcard_ldap module. This module does not depend on the authentication method (see 3.2.5).
Usually ejabberd treats LDAP as a read-only storage: @@ -3491,7 +3729,7 @@ searching his info in LDAP.
The user’s client can store an avatar in the user vCard. The vCard-Based Avatars protocol (XEP-0153) provides a method for clients to inform the contacts what is the avatar hash value. @@ -3505,7 +3743,7 @@ and each presence sent by a client produces hash retrieval and a presence stanza rewrite. For this reason, enabling this module will introduce a computational overhead in servers with clients that change frequently their presence.
-This module implements Software Version (XEP-0092). Consequently, it answers ejabberd’s version when queried.
Options:
With the ejabberdctl command line administration script +
With the ejabberdctl command line administration script you can execute ejabberdctl commands (described in the next section, 4.1.1) and also many general ejabberd commands (described in section 4.2). This means you can start, stop and perform many other administrative tasks @@ -3527,7 +3765,7 @@ and other codes may be used for specific results. This can be used by other scripts to determine automatically if a command succeeded or failed, for example using: echo $?
-When ejabberdctl is executed without any parameter, +
When ejabberdctl is executed without any parameter, it displays the available options. If there isn’t an ejabberd server running, the available parameters are:
ejabberd is an Erlang/OTP application that runs inside an Erlang runtime system. +
ejabberd is an Erlang/OTP application that runs inside an Erlang runtime system. This system is configured using environment variables and command line parameters. The ejabberdctl administration script uses many of those possibilities. You can configure some of them with the file ejabberdctl.cfg, @@ -3640,7 +3878,7 @@ not “Simple Authentication and Security Layer”.
Note that some characters need to be escaped when used in shell scripts, for instance "
and {}
.
You can find other options in the Erlang manual page (erl -man erl).
An ejabberd command is an abstract function identified by a name, +
An ejabberd command is an abstract function identified by a name, with a defined number and type of calling arguments and type of result that is registered in the ejabberd_commands service. Those commands can be defined in any Erlang module and executed using any valid frontend.
ejabberd includes a frontend to execute ejabberd commands: the script ejabberdctl. @@ -3648,7 +3886,7 @@ Other known frontends that can be installed to execute ejabberd commands in diff ejabberd_xmlrpc (XML-RPC service), mod_rest (HTTP POST service), mod_shcommands (ejabberd WebAdmin page).
-ejabberd includes a few ejabberd Commands by default. +
ejabberd includes a few ejabberd Commands by default. When more modules are installed, new commands may be available in the frontends.
The easiest way to get a list of the available commands, and get help for them is to use the ejabberdctl script:
$ ejabberdctl help @@ -3700,7 +3938,7 @@ is very high.
The frontends can be configured to restrict access to certain commands. +
The frontends can be configured to restrict access to certain commands. In that case, authentication information must be provided. In each frontend the AccessCommands option is defined in a different place. But in all cases the option syntax is the same: @@ -3745,7 +3983,7 @@ and the provided arguments do not contradict Arguments.
As an example to u {_bot_reg_test, [register, unregister], [{host, "test.org"}]} ]
-The ejabberd Web Admin allows to administer most of ejabberd using a web browser.
This feature is enabled by default: a ejabberd_http listener with the option web_admin (see section 3.1.3) is included in the listening ports. Then you can open @@ -3822,13 +4060,13 @@ The file is searched by default in The directory of the documentation can be specified in the environment variable EJABBERD_DOC_PATH. See section 4.1.2.
-If you enable mod_configure and mod_adhoc, +
If you enable mod_configure and mod_adhoc, you can perform several administrative tasks in ejabberd with a XMPP client. The client must support Ad-Hoc Commands (XEP-0050), and you must login in the XMPP server with an account with proper privileges.
-ejabberd uses the distributed Mnesia database. +
ejabberd uses the distributed Mnesia database. Being distributed, Mnesia enforces consistency of its file, so it stores the name of the Erlang node in it (see section 5.4). The name of an Erlang node includes the hostname of the computer. @@ -3874,8 +4112,8 @@ mv /var/lib/ejabberd/*.* /var/lib/ejabberd/oldfiles/
You need to take the following TCP ports in mind when configuring your firewall:
-
@@ -3886,7 +4124,7 @@ After you finish, remember to delete the temporary backup files from public dire Port Description port range Used for connections between Erlang nodes. This range is configurable (see section 5.2).
epmd (Erlang Port Mapper Daemon) +
epmd (Erlang Port Mapper Daemon) is a small name server included in Erlang/OTP and used by Erlang programs when establishing distributed Erlang communications. ejabberd needs epmd to use ejabberdctl and also when clustering ejabberd nodes. @@ -3911,7 +4149,7 @@ but can be configured in the file ejabberdctl.cfg. The Erlang command-line parameter used internally is, for example:
erl ... -kernel inet_dist_listen_min 4370 inet_dist_listen_max 4375-
The Erlang cookie is a string with numbers and letters. +
The Erlang cookie is a string with numbers and letters. An Erlang node reads the cookie at startup from the command-line parameter -setcookie. If not indicated, the cookie is read from the cookie file $HOME/.erlang.cookie. If this file does not exist, it is created immediately with a random cookie. @@ -3925,7 +4163,7 @@ to prevent unauthorized access or intrusion to an Erlang node. The communication between Erlang nodes are not encrypted, so the cookie could be read sniffing the traffic on the network. The recommended way to secure the Erlang node is to block the port 4369.
-An Erlang node may have a node name. +
An Erlang node may have a node name. The name can be short (if indicated with the command-line parameter -sname) or long (if indicated with the parameter -name). Starting an Erlang node with -sname limits the communication between Erlang nodes to the LAN.
Using the option -sname instead of -name is a simple method @@ -3934,7 +4172,7 @@ However, it is not ultimately effective to prevent access to the Erlang node, because it may be possible to fake the fact that you are on another network using a modified version of Erlang epmd. The recommended way to secure the Erlang node is to block the port 4369.
-ejabberd stores sensitive data in the file system either in plain text or binary files. +
ejabberd stores sensitive data in the file system either in plain text or binary files. The file system permissions should be set to only allow the proper user to read, write and execute those files and directories.
A XMPP domain is served by one or more ejabberd nodes. These nodes can be run on different machines that are connected via a network. They all must have the ability to connect to port 4369 of all another nodes, and must @@ -3970,29 +4208,29 @@ router,
This module is the main router of XMPP packets on each node. It routes them based on their destination’s domains. It uses a global routing table. The domain of the packet’s destination is searched in the routing table, and if it is found, the packet is routed to the appropriate process. If not, it is sent to the s2s manager.
-This module routes packets which have a destination domain equal to one of this server’s host names. If the destination JID has a non-empty user part, it is routed to the session manager, otherwise it is processed depending on its content.
-This module routes packets to local users. It looks up to which user resource a packet must be sent via a presence table. Then the packet is either routed to the appropriate c2s process, or stored in offline storage, or bounced back.
-This module routes packets to other XMPP servers. First, it checks if an opened s2s connection from the domain of the packet’s source to the domain of the packet’s destination exists. If that is the case, the s2s manager routes the packet to the process serving this connection, otherwise a new connection is opened.
-Suppose you already configured ejabberd on one machine named (first), and you need to setup another one to make an ejabberd cluster. Then do following steps:
access
’ options because they will be taken from
enabled only on one machine in the cluster.
You can repeat these steps for other machines supposed to serve this domain.
-ejabberd includes an algorithm to load balance the components that are plugged on an ejabberd cluster. It means that you can plug one or several instances of the same component on each ejabberd cluster and that the traffic will be automatically distributed.
The default distribution algorithm try to deliver to a local instance of a component. If several local instances are available, one instance is chosen randomly. If no instance is available locally, one instance is chosen randomly among the remote component instances.
If you need a different behaviour, you can change the load balancing behaviour with the option domain_balancing. The syntax of the option is the following:
Several balancing criteria are available:
When there is a risk of failure for a given component, domain balancing can cause service trouble. If one component is failing the service will not work correctly unless the sessions are rebalanced.
In this case, it is best to limit the problem to the sessions handled by the failing component. This is what the domain_balancing_component_number option does, making the load balancing algorithm not dynamic, but sticky on a fix number of component instances.
The syntax is:
An ejabberd node writes two log files: +
An ejabberd node writes two log files:
The Debug Console is an Erlang shell attached to an already running ejabberd server. +
The Debug Console is an Erlang shell attached to an already running ejabberd server. With this Erlang shell, an experienced administrator can perform complex tasks.
This shell gives complete control over the ejabberd server, so it is important to use it with extremely care. There are some simple and safe examples in the article Interconnecting Erlang Nodes
To exit the shell, close the window or press the keys: control+c control+c.
-ejabberd includes a watchdog mechanism that may be useful to developers when troubleshooting a problem related to memory usage. If a process in the ejabberd server consumes more memory than the configured threshold, @@ -4097,7 +4335,7 @@ or in a conversation with the watchdog alert bot.
The syntax is: To remove all watchdog admins, set the option with an empty list:
{watchdog_admins, []}.-
The source code of ejabberd supports localization. The translators can edit the gettext .po files @@ -4132,21 +4370,22 @@ HTTP header ‘Accept-Language: ru’
Release notes are available from ejabberd Home Page
-Thanks to all people who contributed to this guide: +
Thanks to all people who contributed to this guide:
Ejabberd Installation and Operation Guide.
+
Ejabberd Installation and Operation Guide.
Copyright © 2003 — 2010 ProcessOne
This document is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 diff --git a/doc/version.tex b/doc/version.tex index 905ac86f2..10a0da534 100644 --- a/doc/version.tex +++ b/doc/version.tex @@ -1,2 +1,2 @@ % ejabberd version (automatically generated). -\newcommand{\version}{2.1.x} +\newcommand{\version}{2.1.6}