about summary refs log tree commit diff
Commit message (Collapse)AuthorAge
* Replace freenode with tilde.chatJune McEnroe2021-05-19
|
* notify: Reword pounce-notify manualJune McEnroe2021-05-04
|
* Clean up Makefiles, configure scriptsJune McEnroe2021-05-02
| | | | | | Default MANDIR to ${PREFIX}/man since it turns out man-db includes /usr/local/man by default. Add support for BINDIR. Separate libs out into LDADD variables.
* palaver: Exit on getopt failureJune McEnroe2021-04-30
| | | | Oops.
* notify: Implement pounce-notifyJune McEnroe2021-04-30
|
* notify: Add prospective manual page for pounce-notifyJune McEnroe2021-04-30
|
* Rename contrib to extraJune McEnroe2021-04-30
|
* palaver: Add -s flag for case-sensitive matchingJune McEnroe2021-04-30
|
* palaver: Remove last vestiges of rc scriptsJune McEnroe2021-04-29
|
* palaver: Track badge count per connection in SQLiteJune McEnroe2021-04-29
| | | | And send an accurate total badge count.
* palaver: Drop no longer used network fieldJune McEnroe2021-04-27
|
* Don't use :trailing parameter for JOINJune McEnroe2021-04-09
| | | | | It seems some IRCds don't even parse this correctly. It also should never have been done this way since it breaks sending channel keys.
* Add donation link to README 2.3June McEnroe2021-02-05
|
* Drop pledge capabilities after binding and connectingJune McEnroe2021-02-01
|
* Add Repology links to READMEJune McEnroe2021-01-28
| | | | | LibreTLS in particular is gaining traction in packaging, so point to Repology pages to make users' lives easier.
* Clarify configuration path interpretationsJune McEnroe2021-01-28
|
* Tighten up XDG base directory path handlingJune McEnroe2021-01-28
| | | | | | | Don't search base directories if path starts with "/", "./" or "../", but still do if the path simply starts with ".". Bail early if HOME is needed but unset. Don't attempt to open the original path in configOpen and dataOpen.
* Refactor hasTag to be usable in more placesJune McEnroe2021-01-24
|
* Support echo-message capabilityJune McEnroe2021-01-24
| | | | | | | Only request it with labeled-response, since it is impossible to correlate messages to clients without. For clients without echo-message, synthesize a label on PRIVMSG/NOTICE/TAGMSG, then filter out received messages with that label.
* Add -o and -t options to trust self-signed certificates 2.2June McEnroe2021-01-11
|
* Make SYNOPSIS arguments consistent with option namesJune McEnroe2021-01-11
|
* Allow interspersing flags and config filesJune McEnroe2021-01-11
| | | | | | Don't wait for getopt_long to move all the arguments to the end. This allows overriding options set by config files by placing flags after them on the command line.
* Send CAP END if CAP LS response is emptyJune McEnroe2020-12-21
| | | | | Or only unsupported caps. Or, as the corresponding commit in catgirl says, "if CAP LS doesn't list anything good."
* Alphabetize STANDARDS sectionsJune McEnroe2020-12-18
|
* Handle 437 ERR_UNAVAILRESOURCE like ERR_NICKNAMEINUSEJune McEnroe2020-12-05
| | | | | Not totally clear under what conditions 437 is returned, but if it happens during registration, we should pick a new nick.
* Use uint64_t for save file signature 2.1p1June McEnroe2020-11-28
| | | | This fixes building on 32-bit platforms.
* Unlink existing UNIX socket if it can't be connected to 2.1June McEnroe2020-11-23
| | | | | | I think this emulates SO_REUSEADDR, which for some reason doesn't work on PF_UNIX. If the socket exists, check if connect(2) works, rather than clobbering the socket being used by a still-running instance.
* Clean up main loop loopsJune McEnroe2020-11-21
|
* Add lazy client registration timeoutJune McEnroe2020-11-20
| | | | | | I don't think this is worth adding a configuration option for since real clients will definitely accomplish registration faster than 10s and it's long enough to even type out manually for testing.
* Only allow clients to AUTHENTICATE if using a certJune McEnroe2020-11-16
| | | | | | Otherwise the successful authentication message can leak information to unauthenticated clients when both certificate and password authentication are enabled.
* Set client sockets non-blockingJune McEnroe2020-11-16
| | | | | | | | | | | | | | | | | | | | | Except for during writes. This prevents pounce getting blocked on a client sending only a partial TLS record, for example. Writes still need to block because pounce doesn't have a way to resume them. (And it would do so by having a buffer, but sockets already have a send buffer, so what would be the point of that?) I don't think it should be a problem since outside of stateSync, writes only happen when poll returns POLLOUT. I feel like ideally SO_SNDLOWAT would be set to guarantee a full IRC message can always be written on POLLOUT, but since it's actually TLS records being sent, it's not obvious what the size would be. I'm also making an assumption here that tls_read returning TLS_WANT_POLLOUT is unlikely to happen, since I don't actually set pollfd.events based on that. I'm not sure how wanting to resume a tls_read after a POLLOUT could be cleanly handled. I'm just going to hope that if it does happen, the regular poll loop will eventually sort it out...
* Swap localAccept parameter orderJune McEnroe2020-11-14
|
* Only send shutdown QUIT and ERROR to registered clientsJune McEnroe2020-11-14
|
* Make struct Client publicJune McEnroe2020-11-14
|
* Wait for POLLIN to do client tls_handshakeJune McEnroe2020-11-13
| | | | | | | | | | | Otherwise a client could cause pounce to hang (since the sockets are left blocking) by opening a connection without handshaking! Oops, that's pretty bad. Since the sockets are still blocking, a hang can still be caused by a client sending a partial handshake then waiting. More fixes to follow. pounce is slightly protected from this when used with calico, as it applies a timeout to waiting for the ClientHello.
* Use a fixed size pollfd array in calicoJune McEnroe2020-11-13
| | | | | My thinking here is that it's better to not allocate in response to incoming connections. This also just makes the code a little simpler.
* Disallow / anywhere in server nameJune McEnroe2020-11-13
|
* Check bounds of ClientHello extensions lengthJune McEnroe2020-11-12
|
* Report paths in unveil errorsJune McEnroe2020-11-10
|
* contrib/palaver: Use open_memstream instead of fmemopenJune McEnroe2020-10-24
| | | | | Somehow I never knew about this function. Much better than fmemopen with mode "w".
* Handle signals before the main loopJune McEnroe2020-10-11
| | | | This is a long-standing issue I ignored.
* Fix possibliy uninitialized error 2.0June McEnroe2020-09-09
| | | | It won't be, but gcc thinks it might.
* Refactor reserialization and client self-producingJune McEnroe2020-08-31
|
* Add chmod+chown to certbot exampleJune McEnroe2020-08-30
|
* Rearrange bounce.c, move non-main mains below mainJune McEnroe2020-08-30
|
* Sandbox pounce with unveil(2)June McEnroe2020-08-30
|
* Refactor certificate loading and load all certs from config pathsJune McEnroe2020-08-28
|
* Sandbox pounce with pledge(2)June McEnroe2020-08-27
| | | | | unveil(2) is a bit complicated to apply to this, I'll have to think about it more.
* Sandbox calico with pledge(2) and unveil(2)June McEnroe2020-08-27
|
* Add support for OpenBSDJune McEnroe2020-08-27
|