Sun, 08 Dec 2019 13:38:48 +0100 mod_admin_telnet: Avoid using LuaSocket for timestamps
Kim Alvefur <zash@zash.se> [Sun, 08 Dec 2019 13:38:48 +0100] rev 10493
mod_admin_telnet: Avoid using LuaSocket for timestamps Using util.time will make it easier to move away from LuaSocket if we ever wanted to do that.
Sat, 07 Dec 2019 22:55:51 +0100 mod_saslauth: Set a nicer bounce error explaining SASL EXTERNAL failures
Kim Alvefur <zash@zash.se> [Sat, 07 Dec 2019 22:55:51 +0100] rev 10492
mod_saslauth: Set a nicer bounce error explaining SASL EXTERNAL failures Better than the previous string concatenation of SASL failure condition and optional text sent by the remote server. Would be nice to have a text per condition, other than the probably most common 'not-authorized'.
Sat, 07 Dec 2019 22:51:43 +0100 mod_saslauth: Collect SASL EXTERNAL failures into an util.error object
Kim Alvefur <zash@zash.se> [Sat, 07 Dec 2019 22:51:43 +0100] rev 10491
mod_saslauth: Collect SASL EXTERNAL failures into an util.error object Will be easier than that concatenated string to extract info out of for use elsewhere.
Sat, 07 Dec 2019 19:05:10 +0100 net.server_epoll: Add debug logging for delayed reading
Kim Alvefur <zash@zash.se> [Sat, 07 Dec 2019 19:05:10 +0100] rev 10490
net.server_epoll: Add debug logging for delayed reading In :onreadable, if there is still buffered incoming data after reading from the socket (as indicated by the :dirty method, usually because LuaSocket has an 8k buffer that's full but it read a smaller amount), another attempt to read is scheduled via this :pausefor method. This is also called from some other places where it would be pointless to read because there shouldn't be any data. In the delayed read case, this should report that the socket is "dirty". If it reports that the socket is "clean" then the question is where the buffer contents went? If this doesn't get logged after the scheduled time (0.000001s by default) then this would suggests a problem with timer or scheduling.
Sat, 07 Dec 2019 17:39:29 +0100 net.connect: Mention RFC 6724 regression
Kim Alvefur <zash@zash.se> [Sat, 07 Dec 2019 17:39:29 +0100] rev 10489
net.connect: Mention RFC 6724 regression Default Address Selection algorithm is not applied, resulting in a strong bias towards IPv4.
Sat, 07 Dec 2019 17:05:00 +0100 net.connect: Add some TODOs and FIXMEs
Kim Alvefur <zash@zash.se> [Sat, 07 Dec 2019 17:05:00 +0100] rev 10488
net.connect: Add some TODOs and FIXMEs And mention issue numbers: #1246, #1428 and #1429
Wed, 04 Dec 2019 22:37:20 +0100 mod_s2s: Invert condition to return early and reduce indentation
Kim Alvefur <zash@zash.se> [Wed, 04 Dec 2019 22:37:20 +0100] rev 10487
mod_s2s: Invert condition to return early and reduce indentation
Tue, 03 Dec 2019 17:29:43 +0100 mod_s2s: Fix mistake in 28755107c2f4
Kim Alvefur <zash@zash.se> [Tue, 03 Dec 2019 17:29:43 +0100] rev 10486
mod_s2s: Fix mistake in 28755107c2f4
Mon, 02 Dec 2019 16:00:16 +0100 mod_saslauth: Advertise correct set of mechanisms
Kim Alvefur <zash@zash.se> [Mon, 02 Dec 2019 16:00:16 +0100] rev 10485
mod_saslauth: Advertise correct set of mechanisms Mistakenly iterates over the set of all supported mechanisms instead of the one without insecure mechanisms if the connection is insecure. Not a problem if c2s_require_encryption is true Introduced in 56a0f68b7797
Sun, 01 Dec 2019 20:25:20 +0100 util.*.c: Add static qualifiers everywhere
Emmanuel Gil Peyrot <linkmauve@linkmauve.fr> [Sun, 01 Dec 2019 20:25:20 +0100] rev 10484
util.*.c: Add static qualifiers everywhere
(0) -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 +1000 +3000 tip