Commit Graph

134 Commits

Author SHA1 Message Date
Neil Twigg
3becc840d9 Allow more time in TestFileStoreNumPendingLargeNumBlks, improve logging on failure
Signed-off-by: Neil Twigg <neil@nats.io>
2023-09-12 11:02:43 +01:00
Derek Collison
c3648d27bd Update to dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-09-01 09:54:16 -07:00
Derek Collison
2e48b54d14 Update dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-07-23 11:43:51 -07:00
Derek Collison
232294c3af go mod tidy to update go.sum
Signed-off-by: Derek Collison <derek@nats.io>
2023-06-12 17:16:35 -07:00
Derek Collison
0980384c97 Update dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-06-11 12:25:44 -07:00
Derek Collison
4ac45ff6f3 When consumers were R1 and the same name was reused, server restarts could try to cleanup old ones and effect the new ones.
These changes allow consumer name reuse more effectively during server restarts.

Signed-off-by: Derek Collison <derek@nats.io>
2023-06-05 12:48:18 -07:00
Derek Collison
acc8e69f23 Update to the compress lib
Signed-off-by: Derek Collison <derek@nats.io>
2023-04-21 14:18:54 -07:00
Derek Collison
a6029a090c Update pkg dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-04-16 14:25:33 -07:00
Derek Collison
5980cbf861 Update to latest dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-03-01 05:23:37 -08:00
Derek Collison
12a49859e9 Update pkg dependencies
Signed-off-by: Derek Collison <derek@nats.io>
2023-01-31 09:33:01 -08:00
Friedrich Wilken
735ce64a7f Upgrade the dependency golang.org/x/crypto to v0.5.0. 2023-01-05 14:53:18 +01:00
Derek Collison
a746b578e7 Update Go client to release 1.19.0
Signed-off-by: Derek Collison <derek@nats.io>
2022-10-27 13:03:54 -07:00
Derek Collison
1a193fe8a6 Updated Go client
Signed-off-by: Derek Collison <derek@nats.io>
2022-10-27 08:55:43 -07:00
Ivan Kozlovic
1039df088c [UPDATED] Dependencies
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-09-29 15:00:44 -06:00
Ivan Kozlovic
f88f2265d2 [UPDATED] Dependencies
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-09-22 14:13:40 -06:00
Derek Collison
f190b6b6f4 Upgrade packages
Signed-off-by: Derek Collison <derek@nats.io>
2022-09-06 13:33:39 -07:00
Ivan Kozlovic
68e74e1d1c Update nats.go mod to be able to run tests
Will then update nats.go to remove temp code and then have
another server PR to point to nats.go latest.

Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-08-10 13:26:06 -06:00
Derek Collison
e52c7cd3da Update client for direct get in KV
Signed-off-by: Derek Collison <derek@nats.io>
2022-08-03 20:20:56 -07:00
Derek Collison
6e0d3eaa9d Update compress dependency
Signed-off-by: Derek Collison <derek@nats.io>
2022-07-25 11:31:12 -07:00
Ivan Kozlovic
dac8b0959b [UPDATED] Compression library
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-07-14 10:33:38 -06:00
Matthias Hanel
6e52608936 [added] support for jwt account option DisallowBearer (#3127)
* [added] support for jwt account option DisallowBearer

change 3 out of 3. Fixes #3084
corresponds to:
https://github.com/nats-io/jwt/pull/177
https://github.com/nats-io/nsc/pull/495

update jwt library to 2.3.0

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-06-29 18:19:14 +02:00
Parham Alvani
253ff6b517 chore: go mod tidy 2022-06-28 07:39:10 +04:30
Parham Alvani
baf0506b78 feat: add automaxprocs 2022-06-25 19:59:04 +04:30
Ivan Kozlovic
725ea8a5ed Update go.mod dependencies
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-05-26 17:16:37 -06:00
Ivan Kozlovic
f423f07134 Release v2.8.3
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-05-23 14:48:19 -06:00
Ivan Kozlovic
3cdbba16cb Revert "[added] support for jwt operator option DisallowBearerToken" 2022-05-04 11:11:25 -06:00
Matthias Hanel
bd2883122e [added] support for jwt operator option DisallowBearerToken
I modified an existing data structure that held a similar attribute already.
Instead this data structure references the claim.

change 3 out of 3. Fixes #3084
corresponds to:
https://github.com/nats-io/jwt/pull/177
https://github.com/nats-io/nsc/pull/495

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-04-29 14:18:11 -04:00
pgvishnuram
5cc4d0ca4a fix for CVE-2022-27191
* our CVE scanner has detected crypto go module vulnerability in nats exporter this PR fixes that issue by updating the module version
2022-04-21 10:19:35 +05:30
Derek Collison
efb91c4ade Upgrade to latest released client
Signed-off-by: Derek Collison <derek@nats.io>
2022-04-10 08:03:11 -07:00
Matthias Hanel
92f4dc986a added max_ack_pending setting to js account limits (#2982)
* added max_ack_penind setting to js account limits

because of the addition, defaults now have to be set later (depend on
these new limits now)

also re-organized the code to closer track how stream create looks

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-03-31 14:17:16 -04:00
Matthias Hanel
1445153130 Adding max stream bytes check (#2970)
* Adding max stream bytes check

Also start checking on  stream update

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-03-30 15:50:28 -04:00
Matthias Hanel
0c5f3688a7 [ADDED] Tiered limits and fix limit issues on updates (#2945)
* Adding tiered limits and fix limit issues on updates

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-03-28 20:47:54 -04:00
Derek Collison
7fd5f4dc24 Update Go client
Signed-off-by: Derek Collison <derek@nats.io>
2022-03-24 17:45:15 -06:00
Matthias Hanel
9a2da9ed8c Adding denies $KV.>/$OBJ.> along leaf connections on differing domain (#2916)
* Adding denies $KV.>/$OBJ.> along leaf connections on differing domain

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-03-09 13:17:59 -05:00
Ivan Kozlovic
26a8dc8add Update compress and highwayhash dependencies
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-02-22 17:09:05 -07:00
Matthias Hanel
fa12d096cd Fix jwt based user/activation token revocation and revocation granularity
user and activation token did not honor the jwt value for all * on
connect.

activation token where not re evaluated when the export revoked a key.
In part this is a consistency measure so servers that already have an
account and servers that don't behave the same way.

in jwt activation token revocations are stored per export.
The server stored them per account, thus effectively merging
revocations. Now they are stored per export inside the server too.

fixes nats-io/nsc/issues/442

Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-01-25 13:48:12 -05:00
Derek Collison
56870e4ddb Update Go client
Signed-off-by: Derek Collison <derek@nats.io>
2022-01-24 10:24:49 -08:00
Ivan Kozlovic
2ba6d97dc1 Update deps
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2022-01-13 16:17:46 -07:00
Derek Collison
7dc99c3840 Merge from main
Signed-off-by: Derek Collison <derek@nats.io>
2022-01-13 10:01:33 -08:00
Matthias Hanel
78bbcd791f [Adding] support for JS MaxBytesRequired
Signed-off-by: Matthias Hanel <mh@synadia.com>
2022-01-12 22:57:34 -05:00
Derek Collison
42818f06c1 Update client
Signed-off-by: Derek Collison <derek@nats.io>
2022-01-10 16:58:52 -08:00
Ivan Kozlovic
cbfa93e4a8 [UPDATED] golang.org/x/crypto dependency
They just released some fix that is not affecting the NATS Server
but could cause some security vulnerability reports.

Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-12-02 13:48:21 -07:00
Ivan Kozlovic
9f30bf00e0 [FIXED] Corrupted headers receiving from consumer with meta-only
When a consumer is configured with "meta-only" option, and the
stream was backed by a memory store, a memory corruption could
happen causing the application to receive corrupted headers.

Also replaced most of usage of `append(a[:0:0], a...)` to make
copies. This was based on this wiki:
https://github.com/go101/go101/wiki/How-to-efficiently-clone-a-slice%3F

But since Go 1.15, it is actually faster to call make+copy instead.

Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-12-01 10:50:15 -07:00
Ivan Kozlovic
ede8124fb2 [FIXED/CHANGED] Add leafnode websocket connection type
This was missing since WEBSOCKET allowed connection type is really
used for client connections.
If one wants to limit a configured user to leafnode connections,
including if the connection is over websocket, but does not
want an application to connect over websocket using this user,
this would have been impossible to configure.

The JWT library has been updated to add LEAFNODE_WS and MQTT_WS for
future work.

Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-11-22 10:32:58 -07:00
Derek Collison
ab91da8f9b Upgrade Go client
Signed-off-by: Derek Collison <derek@nats.io>
2021-10-25 17:13:05 -07:00
Ivan Kozlovic
831c8254e3 Release v2.6.2
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-10-12 15:19:17 -06:00
Waldemar Quevedo
b96f731f1a Update nats-io/jwt dependency
Signed-off-by: Waldemar Quevedo <wally@synadia.com>
2021-09-28 13:24:24 -07:00
Ivan Kozlovic
f34156e411 Release v2.6.0
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-09-21 16:17:27 -06:00
Waldemar Quevedo
0bef39ab5b Update nats.go version
Signed-off-by: Waldemar Quevedo <wally@synadia.com>
2021-09-16 15:58:41 -07:00
Ivan Kozlovic
bc1b3a1884 Release v2.5.0
Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2021-09-09 15:29:53 -06:00