aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* mod_component: Set module status to indicate whether component is connectedMatthew Wild2019-03-191-0/+2
|
* .luacheckrc: Update to reflect new module API methodsMatthew Wild2019-03-191-1/+4
|
* mod_admin_telnet: Show module status in module:list()Matthew Wild2019-03-191-1/+6
|
* modulemanager: Set module status on successful or failed module loadMatthew Wild2019-03-191-0/+5
|
* moduleapi: New API for modules to set a statusMatthew Wild2019-03-191-0/+31
|
* util.serialization: Use util.hexKim Alvefur2019-03-171-9/+2
|
* util.serialization: Allow overriding table iteratorKim Alvefur2019-03-171-1/+6
| | | | | | | Could be useful to eg swap it out with sorted_pairs to get a stable serialization. Default to next() wrapper to avoid metatable tricks from pairs().
* util.serialization: Optimize handling of last table separatorKim Alvefur2019-03-171-7/+5
| | | | Fewer next() calls and a step towards allowing use of a different iterator.
* MUC: Update error message for consistencyMatthew Wild2019-03-181-1/+1
|
* configure: Enable more compiler warningsKim Alvefur2019-03-161-1/+1
|
* configure: Separate flags related to compiler warningsKim Alvefur2019-03-161-1/+2
| | | | This should make it more obvious that these are related
* Actually remove coding_style.txtMatthew Wild2019-03-141-33/+0
|
* doc/coding_style.{txt,md}: Update coding style guideMatthew Wild2019-03-142-1/+806
|
* Merge 0.11->trunkMatthew Wild2019-03-141-0/+4
|\
| * prosodyctl about: Report network backend in useMatthew Wild2019-03-141-0/+4
| |
* | net.server_epoll: Optimize timer handlingKim Alvefur2019-03-121-53/+30
| |
* | mod_tls: Restore querying for certificates on s2sKim Alvefur2019-03-112-3/+7
| | | | | | | | | | The 'ssl_config' setting in the mod_s2s network service is not used. Only direct TLS ports use this currently.
* | net.server: Only add alternate SNI contexts if at least one is providedKim Alvefur2019-03-113-3/+3
| | | | | | | | Fixes use of <starttls/> when a client sends SNI, which would send no certificate otherwise.
* | core.certmanager: Do not ask for client certificates by defaultKim Alvefur2019-03-103-4/+4
| | | | | | | | | | | | Since it's mostly only mod_s2s that needs to request client certificates it makes some sense to have mod_s2s ask for this, instead of having eg mod_http ask to disable it.
* | net.server_select: SNI support (#409)Kim Alvefur2019-03-101-0/+10
| |
* | net.server_event: Add SNI support (#409)Kim Alvefur2019-03-101-0/+10
| | | | | | | | Snippet adapted from server_epoll
* | core.portmanager: Collect per-host certificates for SNIKim Alvefur2018-09-141-0/+41
| |
* | core.portmanager: Record TLS config for each portKim Alvefur2018-10-101-2/+4
| |
* | net.server_epoll: Add support for SNI (#409)Kim Alvefur2019-03-101-0/+8
| |
* | doc/net.server: Document the new server.listen() APIKim Alvefur2019-03-101-0/+21
| |
* | Merge 0.11->trunkKim Alvefur2019-03-043-2/+55
|\|
| * mod_muc_mam: Add comment about the tricks done with the 'with' fieldKim Alvefur2019-03-041-0/+1
| |
| * mod_muc_mam: Move a comment to the line it describesKim Alvefur2019-03-041-1/+1
| |
| * mod_muc_mam: Strip the stanza 'to' attribute (fixes #1259)Kim Alvefur2019-03-041-0/+2
| |
| * util.pubsub: Validate node configuration on node creation (fixes #1328)Kim Alvefur2019-03-032-1/+51
| |
* | mod_muc_mam: Validate that the FORM_TYPE of a query is as expectedKim Alvefur2019-03-041-1/+6
| |
* | Merge 0.11->trunkKim Alvefur2019-03-021-1/+2
|\|
| * mod_storage_memory: Generate ID using standard util (fixes #1326)Kim Alvefur2019-03-021-1/+2
| | | | | | | | | | The previous method relied on tostring(table) returning the pointer address, which might not be portable.
* | core.portmanager: Reduce scope of variableKim Alvefur2018-10-101-2/+2
| | | | | | | | | | Not sure why it was all the way out there, seems like there would have been unexpected behaviour from that
* | core.portmanager: Use server.listen APIKim Alvefur2018-09-131-1/+5
| |
* | net.server: New API for creating server listenersKim Alvefur2018-09-133-18/+52
| | | | | | | | server.listen(interface, port, listeners, options);
* | Merge 0.11->trunkKim Alvefur2019-02-272-31/+253
|\|
| * spec: Add test case for #1322Kim Alvefur2019-02-271-0/+202
| |
| * mod_storage_memory: Replace query function with one based on ↵Kim Alvefur2019-02-271-31/+51
| | | | | | | | | | | | | | storage_internal (fixes #1322) The :find method in storage_internal works and is easier to read and understand. Future changes should be simpler to apply to both modules.
* | MUC: Fire an event to allow affecting decision of whether to allow a role changeKim Alvefur2019-02-241-0/+12
| |
* | MUC: Factor out role change permission check into its own methodKim Alvefur2019-02-241-18/+27
| | | | | | | | | | | | I would like to invert this logic so that it checks if the role change is allowed instead of checking if it is not allowed as it does now, in order to make it easier to understand.
* | Merge 0.11->trunkKim Alvefur2019-02-222-2/+6
|\|
| * mod_pubsub: Simplify configuration for node data (see #1302)Kim Alvefur2019-02-221-1/+3
| |
| * mod_pep: Simplify configuration for node data (fixes #1320)Kim Alvefur2019-02-221-1/+3
| |
* | prosodyctl: about: Report the current operating system according to unameKim Alvefur2018-12-081-0/+7
| |
* | net.server_epoll: Increase send_timeout to 3 minutes (to match server_event)Kim Alvefur2019-02-091-1/+1
| | | | | | | | The separate connect_timeout means we can afford a longer send_timeout
* | net.server_epoll: Separate timeout for initial connection attemptsKim Alvefur2019-02-091-1/+4
| | | | | | | | server_event has this separation already
* | Merge 0.11->trunkKim Alvefur2019-02-091-5/+5
|\|
| * net.server_epoll: Rename handshake_timeout to ssl_handshake_timeout (fixes ↵Kim Alvefur2019-02-091-3/+3
| | | | | | | | | | | | #1319) This is to match server_event, see 430797a8fc81
| * net.server_epoll: Use send_timeout for write timout like other ↵Kim Alvefur2019-02-071-2/+2
| | | | | | | | implementations (fixes #1316)