Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | prosodyctl check: Warn about invalid domain names in the config file | Matthew Wild | 2024-03-27 | 1 | -0/+51 |
| | | | | | This ensures that domain names of virtual hosts and components are valid in XMPP, and that they are encoded correctly. | ||||
* | util.prosodyctl.check: Correct modern replacement for 'disallow_s2s'0.12.4 | Kim Alvefur | 2023-08-27 | 1 | -1/+1 |
| | | | | | The code would have suggested adding to modules_enabled instead of modules_disabled | ||||
* | util.prosodyctl.check: Hint about the 'external_addresses' config option | Kim Alvefur | 2023-07-17 | 1 | -0/+5 |
| | |||||
* | util.prosodyctl.check: Validate format of module list options | Kim Alvefur | 2023-07-17 | 1 | -0/+28 |
| | | | | Should detect things like misplaced settings inside modules_enabled | ||||
* | util.prosodyctl.check: Get some config options via minimal moduleapi #896 | Kim Alvefur | 2023-07-17 | 1 | -41/+54 |
| | | | | | | The module API has certain coercion features that are useful. Fixes traceback reported in #1812 and other duplicates | ||||
* | util.prosodyctl.check: Fix error where hostname can't be turned into A label | Kim Alvefur | 2023-05-31 | 1 | -4/+5 |
| | | | | | | | | | Where gethostname or tohostname returns an invalid name, e.g. containing underscores or something, to_ascii would reject this and return nil, which triggers an error in the dns lookup. Reported by prova2 in the chat, for whom tohostname returned a long name containing underscores. | ||||
* | util.prosodyctl.check: Suggest 'http_cors_override' instead of older CORS ↵ | Kim Alvefur | 2023-02-22 | 1 | -2/+2 |
| | | | | | | | | settings The cross_domain_* settings were added here prior to http_cors_override being added back in 17d87fb2312a, so for a time there was no replacement, but now there is. | ||||
* | prosodyctl check dns: Check for Direct TLS SRV records even if not ↵ | Kim Alvefur | 2023-01-14 | 1 | -4/+8 |
| | | | | | | | configured (fix #1793) Existing such records may cause timeouts or errors in clients and servers trying to connect, despite prosodyctl check saying all is well | ||||
* | util.prosodyctl.check: Remove now redundant unbound config tweak | Kim Alvefur | 2022-05-26 | 1 | -4/+0 |
| | | | | | | | This is now done in net.unbound itself Turning it back on in the config may still cause the problem of entries there masking the DNS values. | ||||
* | util.prosodyctl.check: turn: Report lack of TURN services as a problem #1749 | Kim Alvefur | 2022-05-03 | 1 | -0/+1 |
| | | | | | Rationale: It seems unlikely that someone who has not configured any TURN service runs 'prosodyctl check turn' expecting this to be okay. | ||||
* | util.prosodyctl: check turn: ensure a result is always returned from a check ↵ | Matthew Wild | 2022-04-13 | 1 | -2/+2 |
| | | | | (thanks eTaurus) | ||||
* | prosodyctl: check config: Report paths of loaded configuration files (fixed ↵ | Matthew Wild | 2022-03-28 | 1 | -0/+7 |
| | | | | #1729) | ||||
* | prosodyctl: check turn: Fail with error if our own address is supplied for ↵ | Matthew Wild | 2022-03-19 | 1 | -0/+6 |
| | | | | the ping test | ||||
* | prosodyctl: check config: Skip bare JID components in orphan check | Matthew Wild | 2022-03-19 | 1 | -1/+1 |
| | |||||
* | prosodyctl: check turn: warn about external port mismatches behind NAT | Matthew Wild | 2022-03-11 | 1 | -5/+11 |
| | | | | | | | Some NATs don't preserve port numbers, which can cause the TURN server's reported relay address to be incorrect (the TURN server has no way to predict what the external port is, so it can't be corrected in config like an IP mismatch can). | ||||
* | prosodyctl: check turn: compare correct addresses for relay mismatch ↵ | Matthew Wild | 2022-03-05 | 1 | -2/+5 |
| | | | | detection (thanks Zash) | ||||
* | prosodyctl: check turn: Add check for private IP returned from STUN. | Matthew Wild | 2022-03-05 | 1 | -0/+4 |
| | |||||
* | prosodyctl: check turn: improve warning text to suggest issues | Matthew Wild | 2022-03-05 | 1 | -1/+5 |
| | |||||
* | prosodyctl: check turn: fix traceback when server does not provide realm/nonce | Matthew Wild | 2022-03-05 | 1 | -4/+12 |
| | | | | As coturn when installed out of the box on Debian (because auth isn't enabled?) | ||||
* | prosodyctl: check turn: fix formatting of multiple warnings | Matthew Wild | 2022-03-05 | 1 | -2/+3 |
| | |||||
* | prosodyctl: check turn: always show debug info even if test fails | Matthew Wild | 2022-03-05 | 1 | -11/+15 |
| | |||||
* | prosodyctl: check turn: Clearer error when unable to resolve external ↵ | Matthew Wild | 2022-03-05 | 1 | -1/+1 |
| | | | | service host | ||||
* | prosodyctl: check: include TURN checks by default | Matthew Wild | 2022-03-05 | 1 | -2/+2 |
| | |||||
* | prosodyctl: check: Slightly improved argument handling | Matthew Wild | 2022-03-05 | 1 | -1/+11 |
| | |||||
* | prosodyctl: check turn: show relayed address(es) in verbose mode | Matthew Wild | 2022-03-05 | 1 | -0/+7 |
| | |||||
* | prosodyctl: check turn: Allow specifying port for the ping service | Matthew Wild | 2022-03-05 | 1 | -2/+9 |
| | |||||
* | prosodyctl: check turn: Add support for testing data relay with an external ↵ | Matthew Wild | 2022-03-05 | 1 | -4/+88 |
| | | | | STUN server via --ping | ||||
* | Merge config-updates+check-turn from timber | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
|\ | |||||
| * | util.prosodyctl: check turn: New command to verify STUN/TURN service is ↵ | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
| | | | | | | | | operational | ||||
* | | prosodyctl: check dns: Allow admin to specify undiscoverable external IPs in ↵ | Matthew Wild | 2022-03-02 | 1 | -0/+5 |
| | | | | | | | | config | ||||
* | | prosodyctl: check dns: List discovered addresses for diagnostic purposes | Matthew Wild | 2022-03-02 | 1 | -0/+16 |
| | | | | | | | | | | | | It is very common to get the "unknown address" warning with this command, but people do not always understand it, or know how to debug it. Now we clearly show the addresses that prosodyctl discovered. | ||||
* | | util.prosodyctl: check: warn about unreferenced components, suggest disco_items | Matthew Wild | 2022-03-02 | 1 | -0/+35 |
| | | |||||
* | | util.prosodyctl: Warn about enabled public registration in 'check config' | Matthew Wild | 2022-03-02 | 1 | -0/+28 |
|/ | |||||
* | util.prosodyctl.check: Fix reset of libunbound before DNS checks | Kim Alvefur | 2022-02-01 | 1 | -1/+1 |
| | | | | | | | Probably worked anyway but settings might not always have been applied depending on what order things happens in. Error was hidden by the pcall, which was sorta intentional... | ||||
* | util.prosodyctl.check: Fix A/AAAA check for proxy65 and http | Kim Alvefur | 2022-01-30 | 1 | -2/+2 |
| | | | | | | When there are no records to return the return value from dns.lookup() might be nil or might be a table containing zero records, depending on which DNS library is used | ||||
* | util.prosodyctl.check: Include multiplexed ports in DNS checks #1704 | Kim Alvefur | 2022-01-30 | 1 | -0/+13 |
| | |||||
* | util.prosodyctl.check: Fix use of LuaSocket URL parser | Kim Alvefur | 2022-01-27 | 1 | -1/+1 |
| | |||||
* | util.prosodyctl.check: Add HTTP related DNS checks | Kim Alvefur | 2022-01-27 | 1 | -8/+41 |
| | | | | | Since XEP-0363 is essentially mandatory now this will hopefully help diagnose some common issues. | ||||
* | util.prosodyctl.check: Parameterize replacement instructions | Kim Alvefur | 2022-01-08 | 1 | -11/+25 |
| | | | | | This ought to make it easier to translate in the future. And easier to reword, now! | ||||
* | util.prosodyctl.check: Move word to ease future translations | Kim Alvefur | 2022-01-08 | 1 | -13/+13 |
| | | | | | | | | | | | Recent experience with translations in the context of Snikket highlighted that sentences spread across concatenated strings like this makes the experience less than pleasant for translators. We don't have translation yet, but it is a future goal and why not? The duplication can be solved with a parameterized function for the common cases. | ||||
* | util.prosodyctl.check: Use same wording about 'daemonize' and 'no_daemonize' | Kim Alvefur | 2022-01-08 | 1 | -1/+1 |
| | | | | Why would they use different wording? | ||||
* | util.prosodyctl.check: Remove obsolete settings from known globals | Kim Alvefur | 2021-12-25 | 1 | -2/+0 |
| | |||||
* | util.prosodyctl.check: Add some more obsolete settings | Kim Alvefur | 2021-12-25 | 1 | -0/+6 |
| | |||||
* | core.certmanager: Rename preset option to 'tls_preset' | Kim Alvefur | 2021-12-22 | 1 | -0/+1 |
| | | | | TLS good, SSL bad. | ||||
* | util.prosodyctl.check: Support direct TLS connectivity checks | Kim Alvefur | 2021-11-28 | 1 | -0/+6 |
| | | | | | | Currently only supported with OJN Assumption: the direct_tls_ports are not empty when set. | ||||
* | util.prosodyctl.check: Add mod_http_openmetrics settings to known globals | Kim Alvefur | 2021-11-25 | 1 | -0/+2 |
| | |||||
* | util.prosodyctl.check: Highlight inconsistency of AAAA records and ↵ | Kim Alvefur | 2021-11-20 | 1 | -0/+4 |
| | | | | use_ipv6=false | ||||
* | util.prosodyctl.check: Respect use_ipv4/v6 in proxy65 check | Kim Alvefur | 2021-11-20 | 1 | -4/+4 |
| | | | | | | | Previously it would complain about lack of an AAAA record for proxy65_target even in an IPv6-less environment. Thanks to libertas for unintentionally calling attention to this. | ||||
* | util.prosodyctl.check: Take IPv6 support in LuaSocket into account | Kim Alvefur | 2021-11-20 | 1 | -1/+1 |
| | | | | Shouldn't really matter these days, but portmanager checks this way. | ||||
* | util.prosodyctl.check: Add two known globals from mod_http | Kim Alvefur | 2021-10-03 | 1 | -0/+2 |
| |