Age | Commit message (Collapse) | Author |
|
function string_hash
|
|
to compute SHA1 hash
This removes dependency on libgcrypt in relay plugin.
|
|
|
|
|
|
in init command but not set in WeeChat (closes #1435)
|
|
|
|
|
|
file weechat.upgrade is not found
|
|
|
|
socket (issue #733)
|
|
socket (issue #733)
|
|
|
|
|
|
|
|
authorized one (issue #733)
|
|
This fixes a compilation warning on FreeBSD.
|
|
|
|
|
|
|
|
|
|
|
|
the socket can not be created
|
|
|
|
relay_config_check_path_length
|
|
relay.port.* and relay.path.* are changed with /set
|
|
|
|
|
|
|
|
relay_config_check_path_cb (not needed)
|
|
|
|
|
|
|
|
relay_config_create_option_port_path
|
|
|
|
|
|
|
|
Allows for custom LIBDIR to specified with cmake builds. WEECHAT_LIBDIR
is used for a custom Weechat directory, or set from LIBDIR (as LIBDIR
used to be set).
|
|
|
|
This fixes a crash when sending "/plugin reload relay" from a relay client.
|
|
options
This option is OFF by default and should be enabled only for tests, to measure
test coverage.
|
|
|
|
The relay client is supposed to be safe by default, and the relay connection
should be protected by the different ways (restriction on IP address, SSL,
strong password, Time-based One-Time Password, local bind address and use of
SSH tunnel…).
So this option lets the user add extra security by allowing only some
commands (whitelist), or allowing any commands except a list of given
commands (blacklist).
|
|
|
|
|
|
(closes #1322)
|
|
Commands were already forbidden (option relay.weechat.commands):
- /exec
- /upgrade
- /quit
These extra commands are now forbidden by default:
- /fset
- /set
- /unset
- /plugin
- /script
- /python
- /perl
- /ruby
- /lua
- /tcl
- /guile
- /javascript
- /php
- /secure
|
|
|
|
|
|
|
|
|