Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Merge 0.12->trunk | Matthew Wild | 2024-03-27 | 1 | -0/+51 |
|\ | |||||
| * | prosodyctl check: Warn about invalid domain names in the config file | Matthew Wild | 2024-03-27 | 1 | -0/+51 |
| | | | | | | | | | | This ensures that domain names of virtual hosts and components are valid in XMPP, and that they are encoded correctly. | ||||
* | | util.prosodyctl.check: Disable https cert check if http_external_url set | Kim Alvefur | 2023-11-13 | 1 | -0/+4 |
| | | | | | | | | | | This would indicate that a reverse proxy is used, which gets to be responsible for that since it probably holds the actual cert. | ||||
* | | util.prosodyctl.check: Check cert for HTTPS if http module enabled | Kim Alvefur | 2023-11-13 | 1 | -3/+13 |
| | | |||||
* | | util.prosodyctl.check: Update conditions for s2s cert checks | Kim Alvefur | 2023-11-13 | 1 | -3/+3 |
| | | | | | | | | | | | | The 'anonymous_login' setting is deprecated and prosodyctl check config will tell you to change it to 'authentication = "internal_hashed"', so we shouldn't need to care about here anymore. | ||||
* | | util.prosodyctl.check: Simplify conditions for c2s and s2s cert checks | Kim Alvefur | 2023-11-13 | 1 | -3/+3 |
| | | | | | | | | This code is hard to follow and in need of some refactoring. | ||||
* | | util.prosodyctl.check: Try to clarify check for misplaced k=v in ↵ | Kim Alvefur | 2023-11-11 | 1 | -2/+2 |
| | | | | | | | | modules_enabled (thanks aab and Menel) | ||||
* | | util.prosodyctl.check: Print DANE TLSA records for certificates | Kim Alvefur | 2023-11-03 | 1 | -0/+10 |
| | | | | | | | | Not the prosodyctl check dane I wanted to make but a start. | ||||
* | | util.prosodyctl.check: Wrap each check in a function | Kim Alvefur | 2023-11-03 | 1 | -13/+29 |
| | | | | | | | | | | | | | | One small refactor but one huge step in the right direction Mostly because adding another check would make the line checking for a valid check exceed the column limit. | ||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-08-30 | 1 | -1/+1 |
|\| | |||||
| * | util.prosodyctl.check: Correct modern replacement for 'disallow_s2s'0.12.4 | Kim Alvefur | 2023-08-27 | 1 | -1/+1 |
| | | | | | | | | | | The code would have suggested adding to modules_enabled instead of modules_disabled | ||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-07-17 | 1 | -0/+5 |
|\| | |||||
| * | util.prosodyctl.check: Hint about the 'external_addresses' config option | Kim Alvefur | 2023-07-17 | 1 | -0/+5 |
| | | |||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-07-17 | 1 | -41/+82 |
|\| | |||||
| * | util.prosodyctl.check: Validate format of module list options | Kim Alvefur | 2023-07-17 | 1 | -0/+28 |
| | | | | | | | | Should detect things like misplaced settings inside modules_enabled | ||||
| * | util.prosodyctl.check: Get some config options via minimal moduleapi #896 | Kim Alvefur | 2023-07-17 | 1 | -41/+54 |
| | | | | | | | | | | | | The module API has certain coercion features that are useful. Fixes traceback reported in #1812 and other duplicates | ||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-05-31 | 1 | -4/+5 |
|\| | |||||
| * | util.prosodyctl.check: Fix error where hostname can't be turned into A label | Kim Alvefur | 2023-05-31 | 1 | -4/+5 |
| | | | | | | | | | | | | | | | | | | Where gethostname or tohostname returns an invalid name, e.g. containing underscores or something, to_ascii would reject this and return nil, which triggers an error in the dns lookup. Reported by prova2 in the chat, for whom tohostname returned a long name containing underscores. | ||||
* | | util: Prefix module imports with prosody namespace | Kim Alvefur | 2023-03-17 | 1 | -25/+25 |
| | | |||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-02-22 | 1 | -2/+2 |
|\| | |||||
| * | util.prosodyctl.check: Suggest 'http_cors_override' instead of older CORS ↵ | Kim Alvefur | 2023-02-22 | 1 | -2/+2 |
| | | | | | | | | | | | | | | | | settings The cross_domain_* settings were added here prior to http_cors_override being added back in 17d87fb2312a, so for a time there was no replacement, but now there is. | ||||
* | | Merge 0.12->trunk | Kim Alvefur | 2023-01-14 | 1 | -4/+8 |
|\| | |||||
| * | prosodyctl check dns: Check for Direct TLS SRV records even if not ↵ | Kim Alvefur | 2023-01-14 | 1 | -4/+8 |
| | | | | | | | | | | | | | | configured (fix #1793) Existing such records may cause timeouts or errors in clients and servers trying to connect, despite prosodyctl check saying all is well | ||||
* | | prosodyctl: check turn: More clearly indicate the error is from TURN server | Matthew Wild | 2022-10-06 | 1 | -1/+1 |
|/ | |||||
* | util.prosodyctl.check: Remove now redundant unbound config tweak | Kim Alvefur | 2022-05-26 | 1 | -4/+0 |
| | | | | | | | This is now done in net.unbound itself Turning it back on in the config may still cause the problem of entries there masking the DNS values. | ||||
* | util.prosodyctl.check: turn: Report lack of TURN services as a problem #1749 | Kim Alvefur | 2022-05-03 | 1 | -0/+1 |
| | | | | | Rationale: It seems unlikely that someone who has not configured any TURN service runs 'prosodyctl check turn' expecting this to be okay. | ||||
* | util.prosodyctl: check turn: ensure a result is always returned from a check ↵ | Matthew Wild | 2022-04-13 | 1 | -2/+2 |
| | | | | (thanks eTaurus) | ||||
* | prosodyctl: check config: Report paths of loaded configuration files (fixed ↵ | Matthew Wild | 2022-03-28 | 1 | -0/+7 |
| | | | | #1729) | ||||
* | prosodyctl: check turn: Fail with error if our own address is supplied for ↵ | Matthew Wild | 2022-03-19 | 1 | -0/+6 |
| | | | | the ping test | ||||
* | prosodyctl: check config: Skip bare JID components in orphan check | Matthew Wild | 2022-03-19 | 1 | -1/+1 |
| | |||||
* | prosodyctl: check turn: warn about external port mismatches behind NAT | Matthew Wild | 2022-03-11 | 1 | -5/+11 |
| | | | | | | | Some NATs don't preserve port numbers, which can cause the TURN server's reported relay address to be incorrect (the TURN server has no way to predict what the external port is, so it can't be corrected in config like an IP mismatch can). | ||||
* | prosodyctl: check turn: compare correct addresses for relay mismatch ↵ | Matthew Wild | 2022-03-05 | 1 | -2/+5 |
| | | | | detection (thanks Zash) | ||||
* | prosodyctl: check turn: Add check for private IP returned from STUN. | Matthew Wild | 2022-03-05 | 1 | -0/+4 |
| | |||||
* | prosodyctl: check turn: improve warning text to suggest issues | Matthew Wild | 2022-03-05 | 1 | -1/+5 |
| | |||||
* | prosodyctl: check turn: fix traceback when server does not provide realm/nonce | Matthew Wild | 2022-03-05 | 1 | -4/+12 |
| | | | | As coturn when installed out of the box on Debian (because auth isn't enabled?) | ||||
* | prosodyctl: check turn: fix formatting of multiple warnings | Matthew Wild | 2022-03-05 | 1 | -2/+3 |
| | |||||
* | prosodyctl: check turn: always show debug info even if test fails | Matthew Wild | 2022-03-05 | 1 | -11/+15 |
| | |||||
* | prosodyctl: check turn: Clearer error when unable to resolve external ↵ | Matthew Wild | 2022-03-05 | 1 | -1/+1 |
| | | | | service host | ||||
* | prosodyctl: check: include TURN checks by default | Matthew Wild | 2022-03-05 | 1 | -2/+2 |
| | |||||
* | prosodyctl: check: Slightly improved argument handling | Matthew Wild | 2022-03-05 | 1 | -1/+11 |
| | |||||
* | prosodyctl: check turn: show relayed address(es) in verbose mode | Matthew Wild | 2022-03-05 | 1 | -0/+7 |
| | |||||
* | prosodyctl: check turn: Allow specifying port for the ping service | Matthew Wild | 2022-03-05 | 1 | -2/+9 |
| | |||||
* | prosodyctl: check turn: Add support for testing data relay with an external ↵ | Matthew Wild | 2022-03-05 | 1 | -4/+88 |
| | | | | STUN server via --ping | ||||
* | Merge config-updates+check-turn from timber | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
|\ | |||||
| * | util.prosodyctl: check turn: New command to verify STUN/TURN service is ↵ | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
| | | | | | | | | operational | ||||
* | | prosodyctl: check dns: Allow admin to specify undiscoverable external IPs in ↵ | Matthew Wild | 2022-03-02 | 1 | -0/+5 |
| | | | | | | | | config | ||||
* | | prosodyctl: check dns: List discovered addresses for diagnostic purposes | Matthew Wild | 2022-03-02 | 1 | -0/+16 |
| | | | | | | | | | | | | It is very common to get the "unknown address" warning with this command, but people do not always understand it, or know how to debug it. Now we clearly show the addresses that prosodyctl discovered. | ||||
* | | util.prosodyctl: check: warn about unreferenced components, suggest disco_items | Matthew Wild | 2022-03-02 | 1 | -0/+35 |
| | | |||||
* | | util.prosodyctl: Warn about enabled public registration in 'check config' | Matthew Wild | 2022-03-02 | 1 | -0/+28 |
|/ | |||||
* | util.prosodyctl.check: Fix reset of libunbound before DNS checks | Kim Alvefur | 2022-02-01 | 1 | -1/+1 |
| | | | | | | | Probably worked anyway but settings might not always have been applied depending on what order things happens in. Error was hidden by the pcall, which was sorta intentional... |