Fri, 06 May 2022 17:08:49 +0100 mod_invites_adhoc: Fall back to generic allow_user_invites for role-less users 0.12
Matthew Wild <mwild1@gmail.com> [Fri, 06 May 2022 17:08:49 +0100] rev 12495
mod_invites_adhoc: Fall back to generic allow_user_invites for role-less users Fixes #1752
Thu, 05 May 2022 14:15:15 +0200 Merge 0.12->trunk
Kim Alvefur <zash@zash.se> [Thu, 05 May 2022 14:15:15 +0200] rev 12494
Merge 0.12->trunk
Thu, 05 May 2022 14:10:59 +0200 mod_cron: Fix recording last task run time #1751 0.12
Kim Alvefur <zash@zash.se> [Thu, 05 May 2022 14:10:59 +0200] rev 12493
mod_cron: Fix recording last task run time #1751 The type checks, they do nothing! Observed: Tasks that were supposed to run weekly or daily were running each hour.
Tue, 03 May 2022 19:36:17 +0200 util.prosodyctl.check: turn: Report lack of TURN services as a problem #1749 0.12
Kim Alvefur <zash@zash.se> [Tue, 03 May 2022 19:36:17 +0200] rev 12492
util.prosodyctl.check: turn: Report lack of TURN services as a problem #1749 Rationale: It seems unlikely that someone who has not configured any TURN service runs 'prosodyctl check turn' expecting this to be okay.
Wed, 27 Apr 2022 21:45:36 +0200 net.server_select: Restore dependency on LuaSec to soft for tests
Kim Alvefur <zash@zash.se> [Wed, 27 Apr 2022 21:45:36 +0200] rev 12491
net.server_select: Restore dependency on LuaSec to soft for tests server_select is used in e.g. storagemanager tests, and some of the CI runners are lacking LuaSec, which resulted in failures.
Wed, 27 Apr 2022 21:34:35 +0200 net.tls_luasec: Harden dependency on LuaSec
Kim Alvefur <zash@zash.se> [Wed, 27 Apr 2022 21:34:35 +0200] rev 12490
net.tls_luasec: Harden dependency on LuaSec We at some point decided that it was okay to have a hard dependency the TLS library. Especially here since this module is meant to contain all LuaSec specifics.
Wed, 27 Apr 2022 21:12:25 +0200 Merge 0.12->trunk
Kim Alvefur <zash@zash.se> [Wed, 27 Apr 2022 21:12:25 +0200] rev 12489
Merge 0.12->trunk
Fri, 17 Sep 2021 21:43:54 +0200 mod_tls: pass target hostname to starttls
Jonas Schäfer <jonas@wielicki.name> [Fri, 17 Sep 2021 21:43:54 +0200] rev 12488
mod_tls: pass target hostname to starttls In case the network backend needs it for outgoing SNI or something.
Sat, 02 Apr 2022 11:18:57 +0200 mod_tls: tell network backend to stop reading while preparing TLS
Jonas Schäfer <jonas@wielicki.name> [Sat, 02 Apr 2022 11:18:57 +0200] rev 12487
mod_tls: tell network backend to stop reading while preparing TLS
Fri, 17 Sep 2021 21:18:30 +0200 mod_tls: Do not offer TLS if the connection is considered secure
Jonas Schäfer <jonas@wielicki.name> [Fri, 17 Sep 2021 21:18:30 +0200] rev 12486
mod_tls: Do not offer TLS if the connection is considered secure This may be necessary if the session.conn object is not exchanged by the network backend when establishing TLS. In that case, the starttls method will always exist and thus that is not a good indicator for offering TLS. However, the secure bit already tells us that TLS has been established or is not to be established on the connection, so we use that instead.
(0) -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 tip