Wed, 06 May 2020 18:20:33 +0200 prosodyctl: Add external connectivity check based on observe.jabber.network
Jonas Schäfer <jonas@wielicki.name> [Wed, 06 May 2020 18:20:33 +0200] rev 11783
prosodyctl: Add external connectivity check based on observe.jabber.network This uses the (experimental) observe.jabber.network API to perform external connectivity checks. The idea is to complement the checks prosodyctl can already do with a (nearly) complete s2s/c2s handshake from a remote party to test the entire stack.
Thu, 09 Sep 2021 22:14:43 +0200 mod_c2s: Rename Direct TLS listener 'c2s_direct_tls' for clarity
Kim Alvefur <zash@zash.se> [Thu, 09 Sep 2021 22:14:43 +0200] rev 11782
mod_c2s: Rename Direct TLS listener 'c2s_direct_tls' for clarity And to follow existing naming practices better than 'legacy_ssl' did.
Thu, 09 Sep 2021 22:10:12 +0200 util.prosodyctl.check: Add TODO about replacements for deprecated settings
Kim Alvefur <zash@zash.se> [Thu, 09 Sep 2021 22:10:12 +0200] rev 11781
util.prosodyctl.check: Add TODO about replacements for deprecated settings
Thu, 09 Sep 2021 22:09:41 +0200 util.prosodyctl.check: Check for server-to-server Direct TLS records
Kim Alvefur <zash@zash.se> [Thu, 09 Sep 2021 22:09:41 +0200] rev 11780
util.prosodyctl.check: Check for server-to-server Direct TLS records
Thu, 09 Sep 2021 21:59:02 +0200 mod_s2s: Rename Direct TLS listener 's2s_direct_tls'
Kim Alvefur <zash@zash.se> [Thu, 09 Sep 2021 21:59:02 +0200] rev 11779
mod_s2s: Rename Direct TLS listener 's2s_direct_tls' Following the style of other options like (c2s|s2s)_require_encryption, s2s_secure_auth etc.
Tue, 10 Aug 2021 20:55:43 +0200 mod_s2s: Add a Direct TLS listener
Kim Alvefur <zash@zash.se> [Tue, 10 Aug 2021 20:55:43 +0200] rev 11778
mod_s2s: Add a Direct TLS listener Mirroring the c2s 'direct_tls'. Naming things is hard. direct_tls_s2s_ports = { 5269+1 }
Tue, 10 Aug 2021 20:54:38 +0200 mod_s2s: Handle connections having TLS from the start
Kim Alvefur <zash@zash.se> [Tue, 10 Aug 2021 20:54:38 +0200] rev 11777
mod_s2s: Handle connections having TLS from the start This could be done with multiplexing, or a future additional port definition.
Tue, 10 Aug 2021 20:51:31 +0200 mod_s2s: Factor out procedure for newly encrypted sessions
Kim Alvefur <zash@zash.se> [Tue, 10 Aug 2021 20:51:31 +0200] rev 11776
mod_s2s: Factor out procedure for newly encrypted sessions Goal is to call this if the connection is using Direct TLS, either via multiplexing or a future Direct TLS S2S port.
Mon, 21 Jun 2021 22:50:23 +0200 mod_bosh,mod_websocket: Make into global-shared modules (...again)
Kim Alvefur <zash@zash.se> [Mon, 21 Jun 2021 22:50:23 +0200] rev 11775
mod_bosh,mod_websocket: Make into global-shared modules (...again) Global modules aren't quite considered loaded onto hosts, which causes confusion in some cases. They are also reported in the log as being served on http://*:5280/foo which is also a bit confusing, and can't be clicked. Global modules also have to have their paths configured in the global section, which could be confusing and unexpected. This global+shared method should be the best of both worlds.
Mon, 06 Sep 2021 23:21:25 +0200 mod_c2s,mod_s2s: Indicate stanza size violation with condition from XEP-0205 (thanks mjk)
Kim Alvefur <zash@zash.se> [Mon, 06 Sep 2021 23:21:25 +0200] rev 11774
mod_c2s,mod_s2s: Indicate stanza size violation with condition from XEP-0205 (thanks mjk)
(0) -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 +1000 tip