Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | net.server: Require IP address as argument to addclient (no DNS names) | Kim Alvefur | 2018-10-11 | 3 | -19/+34 | |
| | | | | The net.connect API should be used to resolve DNS names first | |||||
* | net.server_epoll: Log error number from wait() | Kim Alvefur | 2018-10-07 | 1 | -1/+1 | |
| | ||||||
* | net.server_epoll: Pass error number to logging | Kim Alvefur | 2018-10-06 | 1 | -1/+1 | |
| | | | | Why do we ignore unused secondaries? | |||||
* | net.server_epoll: Fix luacheck annotation | Kim Alvefur | 2018-10-06 | 1 | -1/+1 | |
| | ||||||
* | net.server_epoll: Make :set_send a noop, should fix net.adns | Kim Alvefur | 2018-10-06 | 1 | -4/+3 | |
| | | | | | | This is also a noop in server_event. Supposedly meant to prevent buffered writes from being sent to the socket, but that path becomes unreachable when net.adns replaces the public send method | |||||
* | net.server_epoll: Inherit Direct TLS flag from servers to their clients | Kim Alvefur | 2018-09-14 | 1 | -1/+2 | |
| | ||||||
* | net.server_epoll: Catch errors from luasec.wrap | Kim Alvefur | 2018-09-14 | 1 | -1/+5 | |
| | | | | It throws if given an invalid TLS context | |||||
* | net.server_epoll: Delay wrapping sockets in TLS until just before first ↵ | Kim Alvefur | 2018-09-14 | 1 | -14/+21 | |
| | | | | handshake | |||||
* | net.resolvers.service: Sort SRV records in correct direction | Kim Alvefur | 2018-09-30 | 1 | -1/+1 | |
| | ||||||
* | net.resolvers.service: Fix sorting SRV record | Kim Alvefur | 2018-09-30 | 1 | -1/+1 | |
| | ||||||
* | net.resolvers.service: Rename internal variable since net.connect uses it ↵ | Kim Alvefur | 2018-09-29 | 1 | -4/+4 | |
| | | | | for __tostring | |||||
* | net.resolvers.service: Add support for fallback to bare domain and default port | Kim Alvefur | 2018-09-29 | 1 | -0/+3 | |
| | | | | The default port must be configured separately to enable this behavior | |||||
* | net.resolvers.service: Early return on empty result set | Kim Alvefur | 2018-09-29 | 1 | -0/+5 | |
| | ||||||
* | net.resolvers.service: Understand when service is explicitly unavailable | Kim Alvefur | 2018-09-29 | 1 | -0/+5 | |
| | | | | | | RFC2782 states: > A Target of "." means that the service is decidedly not available at > this domain. | |||||
* | net.resolvers.service: net.connect resolver that uses SRV records | Kim Alvefur | 2018-09-27 | 1 | -0/+57 | |
| | ||||||
* | net.connect: Fix passing request table to new listener | Kim Alvefur | 2018-09-26 | 4 | -7/+7 | |
| | | | | This could be a return value from ondetach | |||||
* | net.connect: Remove manual onattach callback invocation | Kim Alvefur | 2018-09-26 | 1 | -3/+0 | |
| | ||||||
* | net.server: Call a 'onattach' callback when replacing listeners | Kim Alvefur | 2018-09-26 | 3 | -0/+8 | |
| | ||||||
* | net.server_epoll: Include errno in log messages | Kim Alvefur | 2018-09-26 | 1 | -6/+6 | |
| | ||||||
* | net.server_epoll: Factor out IP/port detection into its own method | Kim Alvefur | 2018-09-26 | 1 | -5/+10 | |
| | ||||||
* | net.server_epoll: Protect from errors in get{peer,sock}name | Kim Alvefur | 2018-09-26 | 1 | -4/+6 | |
| | ||||||
* | net.server_epoll: Watching instead of registering, seems more understandable | Kim Alvefur | 2018-09-24 | 1 | -2/+2 | |
| | ||||||
* | net.http.server: Delay host checks until after host-less event | Kim Alvefur | 2018-09-23 | 1 | -9/+18 | |
| | | | | This allows handling events without any hosts enabled. | |||||
* | net.http.server: Fire an event without host | Kim Alvefur | 2018-09-21 | 1 | -3/+8 | |
| | ||||||
* | Revert 2dc7490899ae::5d6b252bc36f: Unfinished and broken | Kim Alvefur | 2018-09-21 | 1 | -2/+2 | |
| | ||||||
* | net.http.server: Fix default host logic | Kim Alvefur | 2018-09-21 | 1 | -1/+1 | |
| | | | | This was used to construct the event name previously | |||||
* | net.http.server: Move handling of hosts to mod_http | Kim Alvefur | 2018-09-21 | 1 | -1/+1 | |
| | | | | | Now an event like `GET /path` is fired at first, and mod\_http dispatches the old `GET host/path` events. | |||||
* | net.server_epoll: Simplify minimal string representation | Kim Alvefur | 2018-09-15 | 1 | -1/+1 | |
| | | | | .conn might just be the FD sometimes | |||||
* | net.server_epoll: Add back setflags API for compat | Kim Alvefur | 2018-09-15 | 1 | -0/+13 | |
| | ||||||
* | net.server_epoll: Fix write signal handling in watchfd API | Kim Alvefur | 2018-09-15 | 1 | -3/+3 | |
| | | | | The main loop calls :onwritable but here it was spelled :onwriteable | |||||
* | net.server_epoll: Use util.poll | Kim Alvefur | 2018-05-16 | 1 | -69/+74 | |
| | ||||||
* | net.server_epoll: Make read_size a server-wide option | Kim Alvefur | 2018-09-13 | 1 | -1/+2 | |
| | | | | Can still be overriden per connection | |||||
* | net.server_epoll: Rename pattern to read_size | Kim Alvefur | 2018-09-13 | 1 | -10/+10 | |
| | ||||||
* | net.server_epoll: Refactor Direct TLS assumptions outwards | Kim Alvefur | 2018-09-13 | 1 | -8/+17 | |
| | | | | | | | | | | The assumption that connections are "Direct TLS" when a TLS context is supplided should be broken. The goal is to make it easy to add a new API that can be given a TLS context at creation even if it should do STARTTLS. With this commit, only the exposed server_select-compatible API assumes Direct TLS when a TLS context is included. | |||||
* | net.server_epoll: Factor Direct TLS handling out of connection initialization | Kim Alvefur | 2018-09-13 | 1 | -6/+6 | |
| | | | | | Eventually it should be possible to create a socket that has a TLS context but that does not automatically start TLS on connect. | |||||
* | net.server_epoll: Remove coercion of connections to strings | Kim Alvefur | 2018-09-13 | 1 | -8/+8 | |
| | | | | No longer needed since util.logger does this now | |||||
* | net.server_epoll: Rename all variables holding TLS contexts for consistency | Kim Alvefur | 2018-09-13 | 1 | -13/+13 | |
| | ||||||
* | net.server: Throw error when loading outside Prosody or Prosody config not ↵ | Matthew Wild | 2018-08-19 | 1 | -2/+9 | |
| | | | | loaded | |||||
* | net.http.codes: "Correct" range of unassigned codes (thanks pep.) | Kim Alvefur | 2018-08-12 | 1 | -1/+1 | |
| | ||||||
* | net.http.codes: Regenerate from IANA registry with tool | Kim Alvefur | 2018-08-11 | 1 | -47/+59 | |
| | ||||||
* | net.server: Set default read timeout to 14 minutes (fixes #971) | Kim Alvefur | 2018-07-06 | 3 | -3/+3 | |
| | ||||||
* | Merge 0.10->trunk | Kim Alvefur | 2018-06-10 | 1 | -2/+10 | |
|\ | ||||||
| * | net.dns: Lazily generate unknown RR type names | Kim Alvefur | 2018-06-10 | 1 | -3/+12 | |
| | | ||||||
| * | Backed out changeset eae606b9266c: Used a lot of memory | Kim Alvefur | 2018-06-10 | 1 | -5/+4 | |
| | | ||||||
* | | net.dns: Expand table of known RR types from IANA registry | Kim Alvefur | 2018-06-09 | 1 | -5/+93 | |
| | | ||||||
* | | Merge 0.10->trunk | Kim Alvefur | 2018-06-09 | 1 | -6/+11 | |
|\| | ||||||
| * | net.dns: Syntesize type names for the full range | Kim Alvefur | 2018-06-09 | 1 | -4/+5 | |
| | | | | | | | | | | | | | | | | Otherwise unknown records are identified as A records. This also fixes various tracebacks unearthed by previous commits and mis-identified records. Related to #1056 #976 #819 | |||||
| * | net.dns: Don't attempt to cache unparsed data (fixes #1056) | Kim Alvefur | 2018-06-09 | 1 | -1/+1 | |
| | | | | | | | | | | | | | | rr[qtype:lower()] can be nil. I think this happens if the type does not have a parser. Also see #819 #976 | |||||
| * | net.dns: Also cache records from the 'additional' section | Kim Alvefur | 2018-06-03 | 1 | -0/+4 | |
| | | | | | | | | Could be getting A/AAAA records here when asking for SRV | |||||
| * | net.dns: Cache all records from the 'answer' section (fixes #487) | Kim Alvefur | 2018-06-09 | 1 | -1/+1 | |
| | | | | | | | | This should preserve CNAME records included here |