Commit Graph

322 Commits

Author SHA1 Message Date
Derek Collison
59a52ed83a Documentation updates, minor fixes 2016-01-10 09:14:26 -08:00
Derek Collison
6433e55314 bad test conditional 2016-01-09 10:09:05 -08:00
Derek Collison
6bd8f5fd70 inlined roothtml 2016-01-09 10:04:42 -08:00
Derek Collison
3af90e454f Track total connections, http request stats 2016-01-09 09:57:04 -08:00
Derek Collison
b0c22e9dfd Track start and uptime per connection 2016-01-09 08:20:24 -08:00
Derek Collison
1e37a6b23c Monitoring homepage updates, help and favico 2016-01-09 07:57:58 -08:00
Derek Collison
e9b5839bf0 Merge branch 'discovery' 2015-12-16 14:18:34 -08:00
Derek Collison
8393c3c994 Basic INFO for cluster auto-discovery, Addresses #126 2015-12-16 12:36:24 -08:00
Ivan Kozlovic
b060eb3d5f Ensure server lock is released in case of failure when resolving port back to options. 2015-12-10 14:11:37 -07:00
Ivan Kozlovic
d133e68338 Adapt tests for Travis GCE.
* Add server.GetListenEndpoint() to return options' host and port when server is ready to accept client connections. The server can be asked to pick a random port. This function returns a string of the form "host:port" with the port selected by the net.Listen() call.
* Replace the use of server.Addr() with above function to connect to the starting server (using net.Dial) to check for success. The original issue was that, when no hostname is specified in the configuration, the server uses 0.0.0.0 for the listen address. However, server.Addr() would return "[::]", even on a machine with IPv6 disabled, which would cause the net.Dial call to fail with "network unreachable".
2015-12-10 13:06:18 -07:00
Derek Collison
7046d54881 Release 0.7.2 2015-12-09 11:23:37 -08:00
Ivan Kozlovic
9b25a379b8 Increase TLS timeout in config files
We would get failures on Travis, I would think because of small TLS timeout. Increase (or set) the TLS timeout to 2 seconds in most configuration files. Update tests that relied on the original value.
2015-12-08 15:20:20 -07:00
Ivan Kozlovic
5036bbbf36 Fix TLS issue where server started to receive TLS data on non TLS connection.
Without the server fix, tls_test.go would likely report an error. The server would show a parser error with protocol snippet containing "random" bytes, likely encrypted data.
2015-12-07 19:44:12 -07:00
Ivan Kozlovic
1851ffa162 Temporary fix for Travis issues on new GCE 2015-12-07 18:22:53 -07:00
Waldemar Quevedo
c1ebd4efd8 Fix and tests for proto snippet function 2015-12-06 22:05:35 -08:00
Derek Collison
0b22a145d8 no cert for https monitoring, use JoinHostPort 2015-12-03 15:37:26 -08:00
Derek Collison
850da72adc Added in TLS/Bcrypt documentation, bumped version 2015-12-03 12:43:00 -08:00
Derek Collison
d1a333c713 Add in tls for connection details 2015-12-01 19:23:42 -08:00
Derek Collison
b61da04ef7 Enable HTTPS for monitoring 2015-12-01 19:01:56 -08:00
Derek Collison
0ae71a1f2c Merge pull request #149 from nats-io/bcrypt
Bcrypt Support
2015-12-01 17:49:15 -08:00
Derek Collison
a63293db6b root page cleanup 2015-12-01 15:43:37 -08:00
Vanilla Hsu
a1bda5cad5 add freebsd support. 2015-12-01 14:37:14 +08:00
Derek Collison
6b8e8d89c8 Use smaller cost function for test, fix race 2015-11-30 18:29:53 -08:00
Waldemar Quevedo
4958f0f684 Add --cluster_listen flag to set cluster addr and port for others to solicit routes 2015-11-30 14:30:11 -08:00
Derek Collison
e16fc7f8d5 Merge pull request #146 from wallyqs/incomplete-pub-arg
Avoid `cap out of range` error when handling split buffer
2015-11-29 19:26:44 -10:00
Waldemar Quevedo
498df401af Return empty string when can't take slice for snippet from buffer 2015-11-29 20:47:47 -08:00
Waldemar Quevedo
18f932620f Avoid cap out of range error when handling split buffer 2015-11-29 11:11:17 -08:00
Derek Collison
a873191169 usage arg update 2015-11-29 07:11:42 -10:00
Derek Collison
9d0695ec47 Merge pull request #143 from nats-io/tls_strict_route
TLS strict route verifications
2015-11-23 12:18:41 -08:00
Derek Collison
40c8cb13ea Strict verification for route TLS 2015-11-23 10:19:47 -08:00
Colin Sullivan
bb286ba424 Merge branch 'master' into tls_add_cipher 2015-11-23 10:55:43 -07:00
Colin Sullivan
790578f3f4 Add negative tests for cipher_suite configurations. 2015-11-22 17:21:22 -07:00
Derek Collison
647213b1d7 TLS timeout handling for routes 2015-11-22 15:07:44 -08:00
Derek Collison
3b64567f00 tls flags, proper timeouts 2015-11-22 14:43:16 -08:00
Derek Collison
055f1dccb3 Allow test to use correct default ciphers 2015-11-22 08:34:06 -08:00
Derek Collison
ef43c19fce Use better ciphers available under 1.5 2015-11-22 08:29:18 -08:00
Colin Sullivan
936259e0d6 Removed the requirement for cipher_suites configuration in TLS and added default ciphers. 2015-11-21 21:15:35 -07:00
Colin Sullivan
c56b3677da Fixed formatting 2015-11-20 16:08:13 -07:00
Colin Sullivan
0ff1b55fa9 Require cipher suites to be specified in the configuration.
* Configuration requires a cipher suite
* Removed default cipher suites
* Added help to assist with TLS configuration and list available cipher suites.
2015-11-20 16:00:25 -07:00
Colin Sullivan
0675a8fd1f Update test to include expanded cipher suite. 2015-11-19 16:22:57 -07:00
Colin Sullivan
9ff1c9a12c Expand the cipher suite options. This allows older clients (e.g. .NET on Windows 7) to more easily use TLS. 2015-11-19 15:58:46 -07:00
Ivan Kozlovic
97da466312 Fix races, add a test and adjust others.
* There was a race during unsubscribe()
* 'go test -race' reports a race in TestSetLogger test. This one could be ignored since we normally invoke SetLogger only on server startup. That being said, Travis failed when I tried to submit a PR for the fix of the unsubscribe race. So proposing to fix the logger too.
2015-11-18 20:39:56 -07:00
Derek Collison
200f2d95c6 Merge pull request #139 from nats-io/issue-138
Fix possible non-propagation of subscription interest to routed server.
2015-11-17 22:01:21 -08:00
Ivan Kozlovic
b62835363a Fix possible non-propagation of subscription interest to routed server.
If processRoute executes before createRoute finishes registering the route, and before a subscriber has connected (or reconnected), and the subscriber connects (or reconnects) before the route is registered, then this subscription will stay local and not be forwarded to the route.
2015-11-17 21:36:18 -07:00
Ivan Kozlovic
17d231361d Fix handling of duplicate SUB protocol.
This is issue #136. With routes, it is possible that a subscriber connects (or reconnects) and is about to broadcast the SUB protocol to the routed server, and at the same time, the server sends the list of the local subscriptions. This would result in a SUB processed twice, adding the same sub in the sublist twice. If the server sending the subscription list is restarted, this will leave "detached" subscriptions in the sublist which would trigger the "Bad or Missing ROUTER info" for every message published on that subject.
2015-11-17 20:58:54 -07:00
Derek Collison
1145d9c731 TLS beta 2015-11-08 14:40:29 -08:00
Derek Collison
e563f64458 Merge pull request #133 from nats-io/tls
TLS
2015-11-08 14:39:29 -08:00
Derek Collison
b8af53e67a Added in clustered TLS 2015-11-08 14:20:01 -08:00
Derek Collison
1c7f708217 Added in support for requiring client certificates 2015-11-08 10:48:39 -08:00
Derek Collison
ec258ac18d Moved certs and changed to simple hostname 2015-11-05 15:35:50 -08:00