Sat, 07 Sep 2019 17:32:55 +0200 core.s2smanager: Add map of names authenticate for remote on s2sout for parity with s2sin
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 17:32:55 +0200] rev 10248
core.s2smanager: Add map of names authenticate for remote on s2sout for parity with s2sin Making s2sin and -out look more alike in preparation for bidi support
Sat, 07 Sep 2019 17:31:26 +0200 core.s2smanager: Add [direction] boolean flags to s2s connections
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 17:31:26 +0200] rev 10247
core.s2smanager: Add [direction] boolean flags to s2s connections This will allow representing connections that go both directions
Sun, 08 Sep 2019 16:48:53 +0200 mod_offline: Add some debug logging to reduce confusion
Kim Alvefur <zash@zash.se> [Sun, 08 Sep 2019 16:48:53 +0200] rev 10246
mod_offline: Add some debug logging to reduce confusion Where did these messages come from???
Mon, 22 Jul 2019 01:58:57 +0200 util.bitops: Library to find appropriate bitwise library (closes #1395)
Kim Alvefur <zash@zash.se> [Mon, 22 Jul 2019 01:58:57 +0200] rev 10245
util.bitops: Library to find appropriate bitwise library (closes #1395)
Sat, 07 Sep 2019 19:00:37 +0200 mod_s2s: Remove obsolete cleanup code
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 19:00:37 +0200] rev 10244
mod_s2s: Remove obsolete cleanup code These were added by s2sout.lib
Sat, 07 Sep 2019 15:53:05 +0200 mod_admin_telnet: Identify bidi-capable s2sout sessions (fixes #1403)
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 15:53:05 +0200] rev 10243
mod_admin_telnet: Identify bidi-capable s2sout sessions (fixes #1403)
Sat, 07 Sep 2019 00:46:06 +0200 tests: Disable TLS in scansion tests
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 00:46:06 +0200] rev 10242
tests: Disable TLS in scansion tests They were not using TLS before. With a36af4570b39 TLS context creation will succeed even without a certificate, so TLS will be offered, but since there is no certificate it does not work.
Sat, 07 Sep 2019 00:00:40 +0200 core.certmanager: Lower severity for tls config not having cert
Kim Alvefur <zash@zash.se> [Sat, 07 Sep 2019 00:00:40 +0200] rev 10241
core.certmanager: Lower severity for tls config not having cert This is needed for SNI where certificates are in separate per-hostname contexts, not the main one. If there is a cert, it will still require a corresponding key.
Thu, 05 Sep 2019 16:01:16 +0100 Added tag 0.11.3 for changeset dd7e924c74ef 0.11
Matthew Wild <mwild1@gmail.com> [Thu, 05 Sep 2019 16:01:16 +0100] rev 10240
Added tag 0.11.3 for changeset dd7e924c74ef
Sun, 01 Sep 2019 02:05:33 +0200 net.http: Pass server name along for SNI (fixes #1408)
Kim Alvefur <zash@zash.se> [Sun, 01 Sep 2019 02:05:33 +0200] rev 10239
net.http: Pass server name along for SNI (fixes #1408) net.resolver.basic passes this 'extra' field along to server.addclient
(0) -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 +1000 +3000 tip