Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | util.prosodyctl.shell: Close state on exit to fix saving shell history | Kim Alvefur | 2023-01-22 | 1 | -2/+2 |
| | | | | | | | | | | | | | | | | | | This ensures a last round of garbage collection and finalizers, which should include flushing the readline history file. Test procedure: ``` $ ./prosodyctl shell prosody> s2s:show() -- any command that is not the last in history ... output prosody> bye $ ./prosodyctl shell prosody> ^P ``` After this, the shell prompt should contain the last command from before the "bye". Before this patch, recent history is gone most of the time. | ||||
* | prosodyctl check dns: Check for Direct TLS SRV records even if not ↵ | Kim Alvefur | 2023-01-14 | 1 | -4/+8 |
| | | | | | | | configured (fix #1793) Existing such records may cause timeouts or errors in clients and servers trying to connect, despite prosodyctl check saying all is well | ||||
* | util.prosodyctl.check: Remove now redundant unbound config tweak | Kim Alvefur | 2022-05-26 | 1 | -4/+0 |
| | | | | | | | This is now done in net.unbound itself Turning it back on in the config may still cause the problem of entries there masking the DNS values. | ||||
* | util.prosodyctl.check: turn: Report lack of TURN services as a problem #1749 | Kim Alvefur | 2022-05-03 | 1 | -0/+1 |
| | | | | | Rationale: It seems unlikely that someone who has not configured any TURN service runs 'prosodyctl check turn' expecting this to be okay. | ||||
* | util.prosodyctl: check turn: ensure a result is always returned from a check ↵ | Matthew Wild | 2022-04-13 | 1 | -2/+2 |
| | | | | (thanks eTaurus) | ||||
* | prosodyctl: check config: Report paths of loaded configuration files (fixed ↵ | Matthew Wild | 2022-03-28 | 1 | -0/+7 |
| | | | | #1729) | ||||
* | prosodyctl: check turn: Fail with error if our own address is supplied for ↵ | Matthew Wild | 2022-03-19 | 1 | -0/+6 |
| | | | | the ping test | ||||
* | prosodyctl: check config: Skip bare JID components in orphan check | Matthew Wild | 2022-03-19 | 1 | -1/+1 |
| | |||||
* | prosodyctl: check turn: warn about external port mismatches behind NAT | Matthew Wild | 2022-03-11 | 1 | -5/+11 |
| | | | | | | | Some NATs don't preserve port numbers, which can cause the TURN server's reported relay address to be incorrect (the TURN server has no way to predict what the external port is, so it can't be corrected in config like an IP mismatch can). | ||||
* | Spelling: Fix various spelling mistakes (thanks timeless) | Kim Alvefur | 2022-03-07 | 1 | -1/+1 |
| | | | | | | Words, sometimes I wonder how they even work Maybe I missed something. | ||||
* | prosodyctl: check turn: compare correct addresses for relay mismatch ↵ | Matthew Wild | 2022-03-05 | 1 | -2/+5 |
| | | | | detection (thanks Zash) | ||||
* | prosodyctl: check turn: Add check for private IP returned from STUN. | Matthew Wild | 2022-03-05 | 1 | -0/+4 |
| | |||||
* | prosodyctl: check turn: improve warning text to suggest issues | Matthew Wild | 2022-03-05 | 1 | -1/+5 |
| | |||||
* | prosodyctl: check turn: fix traceback when server does not provide realm/nonce | Matthew Wild | 2022-03-05 | 1 | -4/+12 |
| | | | | As coturn when installed out of the box on Debian (because auth isn't enabled?) | ||||
* | prosodyctl: check turn: fix formatting of multiple warnings | Matthew Wild | 2022-03-05 | 1 | -2/+3 |
| | |||||
* | prosodyctl: check turn: always show debug info even if test fails | Matthew Wild | 2022-03-05 | 1 | -11/+15 |
| | |||||
* | prosodyctl: check turn: Clearer error when unable to resolve external ↵ | Matthew Wild | 2022-03-05 | 1 | -1/+1 |
| | | | | service host | ||||
* | prosodyctl: check: include TURN checks by default | Matthew Wild | 2022-03-05 | 1 | -2/+2 |
| | |||||
* | prosodyctl: check: Slightly improved argument handling | Matthew Wild | 2022-03-05 | 1 | -1/+11 |
| | |||||
* | prosodyctl: check turn: show relayed address(es) in verbose mode | Matthew Wild | 2022-03-05 | 1 | -0/+7 |
| | |||||
* | prosodyctl: check turn: Allow specifying port for the ping service | Matthew Wild | 2022-03-05 | 1 | -2/+9 |
| | |||||
* | prosodyctl: check turn: Add support for testing data relay with an external ↵ | Matthew Wild | 2022-03-05 | 1 | -4/+88 |
| | | | | STUN server via --ping | ||||
* | Merge config-updates+check-turn from timber | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
|\ | |||||
| * | util.prosodyctl: check turn: New command to verify STUN/TURN service is ↵ | Matthew Wild | 2022-03-04 | 1 | -2/+163 |
| | | | | | | | | operational | ||||
* | | prosodyctl: check dns: Allow admin to specify undiscoverable external IPs in ↵ | Matthew Wild | 2022-03-02 | 1 | -0/+5 |
| | | | | | | | | config | ||||
* | | prosodyctl: check dns: List discovered addresses for diagnostic purposes | Matthew Wild | 2022-03-02 | 1 | -0/+16 |
| | | | | | | | | | | | | It is very common to get the "unknown address" warning with this command, but people do not always understand it, or know how to debug it. Now we clearly show the addresses that prosodyctl discovered. | ||||
* | | util.prosodyctl: check: warn about unreferenced components, suggest disco_items | Matthew Wild | 2022-03-02 | 1 | -0/+35 |
| | | |||||
* | | util.prosodyctl: Warn about enabled public registration in 'check config' | Matthew Wild | 2022-03-02 | 1 | -0/+28 |
|/ | |||||
* | util.prosodyctl.check: Fix reset of libunbound before DNS checks | Kim Alvefur | 2022-02-01 | 1 | -1/+1 |
| | | | | | | | Probably worked anyway but settings might not always have been applied depending on what order things happens in. Error was hidden by the pcall, which was sorta intentional... | ||||
* | util.prosodyctl.check: Fix A/AAAA check for proxy65 and http | Kim Alvefur | 2022-01-30 | 1 | -2/+2 |
| | | | | | | When there are no records to return the return value from dns.lookup() might be nil or might be a table containing zero records, depending on which DNS library is used | ||||
* | util.prosodyctl.check: Include multiplexed ports in DNS checks #1704 | Kim Alvefur | 2022-01-30 | 1 | -0/+13 |
| | |||||
* | util.prosodyctl.cert: Look for certs matching 'http_host' | Kim Alvefur | 2022-01-27 | 1 | -0/+4 |
| | | | | | This should ensure any certificate needed for HTTP services will also be included in the certificate import. | ||||
* | util.prosodyctl.check: Fix use of LuaSocket URL parser | Kim Alvefur | 2022-01-27 | 1 | -1/+1 |
| | |||||
* | util.prosodyctl.check: Add HTTP related DNS checks | Kim Alvefur | 2022-01-27 | 1 | -8/+41 |
| | | | | | Since XEP-0363 is essentially mandatory now this will hopefully help diagnose some common issues. | ||||
* | util.prosodyctl.cert: Look for certificates in a consistent order | Kim Alvefur | 2022-01-26 | 1 | -0/+9 |
| | | | | | | | | | Shortest first, then alphabetically, so that it prefers the base domain over subdomains. Fixes that it might otherwise pick a random sub-domain for filename on each run, cluttering the certs directory and potentially tricking Prosody into using an older certificate that might be about to expire. | ||||
* | util.prosodyctl.cert: Check success of copy operations, warn on fail | Kim Alvefur | 2022-01-19 | 1 | -4/+9 |
| | | | | | Debugging a case where certs are not imported correctly but prosodyctl still reports success. Hoping this will shed some light on it. | ||||
* | util.prosodyctl.cert: Pass variables via formatting instead of concatenation | Kim Alvefur | 2022-01-19 | 1 | -5/+5 |
| | | | | | Prevents potential weirdness in case there's any %s or such in a host, file or directory name, since show_warning() is printf(). | ||||
* | util.prosodyctl.cert: Fix boolean logic bug | Kim Alvefur | 2022-01-09 | 1 | -1/+1 |
| | | | | | | | Boolean logic, never correct on the first try. We want to skip copying the same cert if it _has_ been imported already, not if it has not. | ||||
* | util.prosodyctl.check: Parameterize replacement instructions | Kim Alvefur | 2022-01-08 | 1 | -11/+25 |
| | | | | | This ought to make it easier to translate in the future. And easier to reword, now! | ||||
* | util.prosodyctl.check: Move word to ease future translations | Kim Alvefur | 2022-01-08 | 1 | -13/+13 |
| | | | | | | | | | | | Recent experience with translations in the context of Snikket highlighted that sentences spread across concatenated strings like this makes the experience less than pleasant for translators. We don't have translation yet, but it is a future goal and why not? The duplication can be solved with a parameterized function for the common cases. | ||||
* | util.prosodyctl.check: Use same wording about 'daemonize' and 'no_daemonize' | Kim Alvefur | 2022-01-08 | 1 | -1/+1 |
| | | | | Why would they use different wording? | ||||
* | util.prosodyctl.check: Remove obsolete settings from known globals | Kim Alvefur | 2021-12-25 | 1 | -2/+0 |
| | |||||
* | util.prosodyctl.check: Add some more obsolete settings | Kim Alvefur | 2021-12-25 | 1 | -0/+6 |
| | |||||
* | util.prosodyctl.cert: Copy SAN/wildcard certs only once | Kim Alvefur | 2021-12-22 | 1 | -1/+5 |
| | |||||
* | prosodyctl cert: use the indexing functions for better UX | Jonas Schäfer | 2021-12-21 | 1 | -13/+15 |
| | | | | | | These provide (a) a way to deal with random assortments of certs and (b) avoid unnecessary error messages and warnings, according to #1669 anyway, which this fixes. | ||||
* | core.certmanager: Rename preset option to 'tls_preset' | Kim Alvefur | 2021-12-22 | 1 | -0/+1 |
| | | | | TLS good, SSL bad. | ||||
* | util.prosodyctl.check: Support direct TLS connectivity checks | Kim Alvefur | 2021-11-28 | 1 | -0/+6 |
| | | | | | | Currently only supported with OJN Assumption: the direct_tls_ports are not empty when set. | ||||
* | util.prosodyctl.check: Add mod_http_openmetrics settings to known globals | Kim Alvefur | 2021-11-25 | 1 | -0/+2 |
| | |||||
* | util.prosodyctl.check: Highlight inconsistency of AAAA records and ↵ | Kim Alvefur | 2021-11-20 | 1 | -0/+4 |
| | | | | use_ipv6=false | ||||
* | util.prosodyctl.check: Respect use_ipv4/v6 in proxy65 check | Kim Alvefur | 2021-11-20 | 1 | -4/+4 |
| | | | | | | | Previously it would complain about lack of an AAAA record for proxy65_target even in an IPv6-less environment. Thanks to libertas for unintentionally calling attention to this. |