aboutsummaryrefslogtreecommitdiffstats
path: root/net
Commit message (Collapse)AuthorAgeFilesLines
* net.server_epoll: Make :set_send a noop, should fix net.adnsKim Alvefur2018-10-061-4/+3
| | | | | | This is also a noop in server_event. Supposedly meant to prevent buffered writes from being sent to the socket, but that path becomes unreachable when net.adns replaces the public send method
* net.server_epoll: Inherit Direct TLS flag from servers to their clientsKim Alvefur2018-09-141-1/+2
|
* net.server_epoll: Catch errors from luasec.wrapKim Alvefur2018-09-141-1/+5
| | | | It throws if given an invalid TLS context
* net.server_epoll: Delay wrapping sockets in TLS until just before first ↵Kim Alvefur2018-09-141-14/+21
| | | | handshake
* net.resolvers.service: Sort SRV records in correct directionKim Alvefur2018-09-301-1/+1
|
* net.resolvers.service: Fix sorting SRV recordKim Alvefur2018-09-301-1/+1
|
* net.resolvers.service: Rename internal variable since net.connect uses it ↵Kim Alvefur2018-09-291-4/+4
| | | | for __tostring
* net.resolvers.service: Add support for fallback to bare domain and default portKim Alvefur2018-09-291-0/+3
| | | | The default port must be configured separately to enable this behavior
* net.resolvers.service: Early return on empty result setKim Alvefur2018-09-291-0/+5
|
* net.resolvers.service: Understand when service is explicitly unavailableKim Alvefur2018-09-291-0/+5
| | | | | | RFC2782 states: > A Target of "." means that the service is decidedly not available at > this domain.
* net.resolvers.service: net.connect resolver that uses SRV recordsKim Alvefur2018-09-271-0/+57
|
* net.connect: Fix passing request table to new listenerKim Alvefur2018-09-264-7/+7
| | | | This could be a return value from ondetach
* net.connect: Remove manual onattach callback invocationKim Alvefur2018-09-261-3/+0
|
* net.server: Call a 'onattach' callback when replacing listenersKim Alvefur2018-09-263-0/+8
|
* net.server_epoll: Include errno in log messagesKim Alvefur2018-09-261-6/+6
|
* net.server_epoll: Factor out IP/port detection into its own methodKim Alvefur2018-09-261-5/+10
|
* net.server_epoll: Protect from errors in get{peer,sock}nameKim Alvefur2018-09-261-4/+6
|
* net.server_epoll: Watching instead of registering, seems more understandableKim Alvefur2018-09-241-2/+2
|
* net.http.server: Delay host checks until after host-less eventKim Alvefur2018-09-231-9/+18
| | | | This allows handling events without any hosts enabled.
* net.http.server: Fire an event without hostKim Alvefur2018-09-211-3/+8
|
* Revert 2dc7490899ae::5d6b252bc36f: Unfinished and brokenKim Alvefur2018-09-211-2/+2
|
* net.http.server: Fix default host logicKim Alvefur2018-09-211-1/+1
| | | | This was used to construct the event name previously
* net.http.server: Move handling of hosts to mod_httpKim Alvefur2018-09-211-1/+1
| | | | | Now an event like `GET /path` is fired at first, and mod\_http dispatches the old `GET host/path` events.
* net.server_epoll: Simplify minimal string representationKim Alvefur2018-09-151-1/+1
| | | | .conn might just be the FD sometimes
* net.server_epoll: Add back setflags API for compatKim Alvefur2018-09-151-0/+13
|
* net.server_epoll: Fix write signal handling in watchfd APIKim Alvefur2018-09-151-3/+3
| | | | The main loop calls :onwritable but here it was spelled :onwriteable
* net.server_epoll: Use util.pollKim Alvefur2018-05-161-69/+74
|
* net.server_epoll: Make read_size a server-wide optionKim Alvefur2018-09-131-1/+2
| | | | Can still be overriden per connection
* net.server_epoll: Rename pattern to read_sizeKim Alvefur2018-09-131-10/+10
|
* net.server_epoll: Refactor Direct TLS assumptions outwardsKim Alvefur2018-09-131-8/+17
| | | | | | | | | | The assumption that connections are "Direct TLS" when a TLS context is supplided should be broken. The goal is to make it easy to add a new API that can be given a TLS context at creation even if it should do STARTTLS. With this commit, only the exposed server_select-compatible API assumes Direct TLS when a TLS context is included.
* net.server_epoll: Factor Direct TLS handling out of connection initializationKim Alvefur2018-09-131-6/+6
| | | | | Eventually it should be possible to create a socket that has a TLS context but that does not automatically start TLS on connect.
* net.server_epoll: Remove coercion of connections to stringsKim Alvefur2018-09-131-8/+8
| | | | No longer needed since util.logger does this now
* net.server_epoll: Rename all variables holding TLS contexts for consistencyKim Alvefur2018-09-131-13/+13
|
* net.server: Throw error when loading outside Prosody or Prosody config not ↵Matthew Wild2018-08-191-2/+9
| | | | loaded
* net.http.codes: "Correct" range of unassigned codes (thanks pep.)Kim Alvefur2018-08-121-1/+1
|
* net.http.codes: Regenerate from IANA registry with toolKim Alvefur2018-08-111-47/+59
|
* net.server: Set default read timeout to 14 minutes (fixes #971)Kim Alvefur2018-07-063-3/+3
|
* Merge 0.10->trunkKim Alvefur2018-06-101-2/+10
|\
| * net.dns: Lazily generate unknown RR type namesKim Alvefur2018-06-101-3/+12
| |
| * Backed out changeset eae606b9266c: Used a lot of memoryKim Alvefur2018-06-101-5/+4
| |
* | net.dns: Expand table of known RR types from IANA registryKim Alvefur2018-06-091-5/+93
| |
* | Merge 0.10->trunkKim Alvefur2018-06-091-6/+11
|\|
| * net.dns: Syntesize type names for the full rangeKim Alvefur2018-06-091-4/+5
| | | | | | | | | | | | | | | | Otherwise unknown records are identified as A records. This also fixes various tracebacks unearthed by previous commits and mis-identified records. Related to #1056 #976 #819
| * net.dns: Don't attempt to cache unparsed data (fixes #1056)Kim Alvefur2018-06-091-1/+1
| | | | | | | | | | | | | | rr[qtype:lower()] can be nil. I think this happens if the type does not have a parser. Also see #819 #976
| * net.dns: Also cache records from the 'additional' sectionKim Alvefur2018-06-031-0/+4
| | | | | | | | Could be getting A/AAAA records here when asking for SRV
| * net.dns: Cache all records from the 'answer' section (fixes #487)Kim Alvefur2018-06-091-1/+1
| | | | | | | | This should preserve CNAME records included here
* | net.websocket: Honour ex.insecure to match net.http's new parameter for thatMatthew Wild2018-06-081-0/+1
| |
* | net.websocket: Fix incompatibility with net.http changesMatthew Wild2018-06-081-21/+21
| | | | | | | | I was unable to pinpoint the exact revision that broke this.
* | net.server: Add watchfd, a simple API for watching file descriptorsKim Alvefur2018-05-093-0/+93
| |
* | net.server_epoll: Guard against connection missing the getpeername method ↵Kim Alvefur2018-05-021-1/+1
| | | | | | | | (thanks LuaSec)