Wed, 25 Aug 2021 19:04:40 +0200 mod_spam_reporting: Refactor to deduplicate code
Kim Alvefur <zash@zash.se> [Wed, 25 Aug 2021 19:04:40 +0200] rev 4664
mod_spam_reporting: Refactor to deduplicate code Same event firing code regardless of protocol now.
Wed, 25 Aug 2021 18:56:45 +0200 mod_spam_reporting: Rename variable avoid name clash with global function
Kim Alvefur <zash@zash.se> [Wed, 25 Aug 2021 18:56:45 +0200] rev 4663
mod_spam_reporting: Rename variable avoid name clash with global function
Wed, 25 Aug 2021 16:32:11 +0200 mod_spam_reporting: Make 'reason' text an optional value
Kim Alvefur <zash@zash.se> [Wed, 25 Aug 2021 16:32:11 +0200] rev 4662
mod_spam_reporting: Make 'reason' text an optional value Enables downstream modules that watch these events to distinguish between no reason given and reason being a literal "no reason given".
Wed, 25 Aug 2021 16:31:10 +0200 mod_watch_spam_reports: Prepare for changing 'reason' to an optional value
Kim Alvefur <zash@zash.se> [Wed, 25 Aug 2021 16:31:10 +0200] rev 4661
mod_watch_spam_reports: Prepare for changing 'reason' to an optional value
Wed, 25 Aug 2021 15:05:56 +0200 mod_spam_reporting: Handle unknown or future report types
Kim Alvefur <zash@zash.se> [Wed, 25 Aug 2021 15:05:56 +0200] rev 4660
mod_spam_reporting: Handle unknown or future report types An unrecognised value in the 'reason' attribute would have caused an error. This change makes it mirror the behavior for the previous XEP version.
Wed, 25 Aug 2021 16:05:09 +0200 mod_tos: Initial draft
Jonas Schäfer <jonas@wielicki.name> [Wed, 25 Aug 2021 16:05:09 +0200] rev 4659
mod_tos: Initial draft
Wed, 25 Aug 2021 12:52:33 +0200 mod_http_upload: Prevent the module from starting without TLS
Emmanuel Gil Peyrot <linkmauve@linkmauve.fr> [Wed, 25 Aug 2021 12:52:33 +0200] rev 4658
mod_http_upload: Prevent the module from starting without TLS
Wed, 25 Aug 2021 10:22:37 +0200 mod_http_upload: Don’t send http: URIs to clients, this is forbidden by the XEP
Emmanuel Gil Peyrot <linkmauve@linkmauve.fr> [Wed, 25 Aug 2021 10:22:37 +0200] rev 4657
mod_http_upload: Don’t send http: URIs to clients, this is forbidden by the XEP
Mon, 23 Aug 2021 14:28:40 +0200 mod_http_muc_kick: Missing local keyword
Seve Ferrer <seve@delape.net> [Mon, 23 Aug 2021 14:28:40 +0200] rev 4656
mod_http_muc_kick: Missing local keyword
Sun, 22 Aug 2021 13:22:59 +0200 mod_cloud_notify_encrypted: Ensure body substring remains valid UTF-8
Kim Alvefur <zash@zash.se> [Sun, 22 Aug 2021 13:22:59 +0200] rev 4655
mod_cloud_notify_encrypted: Ensure body substring remains valid UTF-8 The `body:sub()` call risks splitting the string in the middle of a multi-byte UTF-8 sequence. This should have been caught by util.stanza validation, but that would have caused some havoc, at the very least causing the notification to not be sent. There have been no reports of this happening. Likely because this module isn't widely deployed among users with languages that use many longer UTF-8 sequences. The util.encodings.utf8.valid() function is O(n) where only the last sequence really needs to be checked, but it's in C and expected to be fast.
(0) -3000 -1000 -300 -100 -10 +10 +100 +300 +1000 tip