Derek Collison
b4a6547a18
report len(ci.subs)
2016-02-04 18:05:50 -08:00
Derek Collison
26185a9722
Support for connection last activity tracking
2016-02-04 17:33:40 -08:00
Ivan Kozlovic
0540df470c
Use values from ClientInfo instead of client when returning ConnInfo.
...
When we are returning ConnInfo, if we use the client's current value, they may be off compared to the values used for the sort.
2016-02-03 22:03:38 -07:00
Ivan Kozlovic
e893d873be
Forgot to use atomic for inMsgs and inBytes in one place.
2016-02-03 21:36:07 -07:00
Ivan Kozlovic
1d6dafc6a7
Fix race on connz monitor (issue #189 )
2016-02-03 21:26:26 -07:00
Derek Collison
02dc7ed668
Merge pull request #186 from wallyqs/unsub-spc-state
...
Add UNSUB_SPC parser state
2016-02-03 18:53:36 -08:00
Ivan Kozlovic
eb0eabff04
Replace all changes with simple 25ms delay after connection close.
2016-02-03 18:58:42 -07:00
Ivan Kozlovic
437458e13e
Fix completeConnection + fix monitor test.
...
Don't check what is sent back. The point is that the client should be fully initialized at this point.
We can't ensure using metrics that the "check" connection is gone since in some tests, the server is started and clients auto-reconnect to it.
For tests that depend on the number of clients connected (such as the monitor one), have specific code for those tests.
2016-02-03 18:08:52 -07:00
Ivan Kozlovic
0a4da78f38
Fix code that checks that server is started + route test
...
- The raw connection used to check that the server is started now consumes the INFO and sends PING and consumes PONG before returning.
- The route test needs to make sure that the client connection has client id 2. Using PING/PONG before creating route connection to make sure of that.
2016-02-03 15:01:00 -07:00
Waldemar Quevedo
86824713c6
Add UNSUB_SPC parser state
2016-02-02 21:39:30 -08:00
Larry McQueary
e737604303
Modified --auth to reflect required token
2016-02-02 15:11:48 -07:00
Larry McQueary
6396455663
Add 'auth' option, make all usage hints uniform with conventions
2016-02-02 11:50:01 -07:00
Derek Collison
59a52ed83a
Documentation updates, minor fixes
2016-01-10 09:14:26 -08:00
Derek Collison
6433e55314
bad test conditional
2016-01-09 10:09:05 -08:00
Derek Collison
6bd8f5fd70
inlined roothtml
2016-01-09 10:04:42 -08:00
Derek Collison
3af90e454f
Track total connections, http request stats
2016-01-09 09:57:04 -08:00
Derek Collison
b0c22e9dfd
Track start and uptime per connection
2016-01-09 08:20:24 -08:00
Derek Collison
1e37a6b23c
Monitoring homepage updates, help and favico
2016-01-09 07:57:58 -08:00
Derek Collison
e9b5839bf0
Merge branch 'discovery'
2015-12-16 14:18:34 -08:00
Derek Collison
8393c3c994
Basic INFO for cluster auto-discovery, Addresses #126
2015-12-16 12:36:24 -08:00
Ivan Kozlovic
b060eb3d5f
Ensure server lock is released in case of failure when resolving port back to options.
2015-12-10 14:11:37 -07:00
Ivan Kozlovic
d133e68338
Adapt tests for Travis GCE.
...
* Add server.GetListenEndpoint() to return options' host and port when server is ready to accept client connections. The server can be asked to pick a random port. This function returns a string of the form "host:port" with the port selected by the net.Listen() call.
* Replace the use of server.Addr() with above function to connect to the starting server (using net.Dial) to check for success. The original issue was that, when no hostname is specified in the configuration, the server uses 0.0.0.0 for the listen address. However, server.Addr() would return "[::]", even on a machine with IPv6 disabled, which would cause the net.Dial call to fail with "network unreachable".
2015-12-10 13:06:18 -07:00
Derek Collison
7046d54881
Release 0.7.2
2015-12-09 11:23:37 -08:00
Ivan Kozlovic
9b25a379b8
Increase TLS timeout in config files
...
We would get failures on Travis, I would think because of small TLS timeout. Increase (or set) the TLS timeout to 2 seconds in most configuration files. Update tests that relied on the original value.
2015-12-08 15:20:20 -07:00
Ivan Kozlovic
5036bbbf36
Fix TLS issue where server started to receive TLS data on non TLS connection.
...
Without the server fix, tls_test.go would likely report an error. The server would show a parser error with protocol snippet containing "random" bytes, likely encrypted data.
2015-12-07 19:44:12 -07:00
Ivan Kozlovic
1851ffa162
Temporary fix for Travis issues on new GCE
2015-12-07 18:22:53 -07:00
Waldemar Quevedo
c1ebd4efd8
Fix and tests for proto snippet function
2015-12-06 22:05:35 -08:00
Derek Collison
0b22a145d8
no cert for https monitoring, use JoinHostPort
2015-12-03 15:37:26 -08:00
Derek Collison
850da72adc
Added in TLS/Bcrypt documentation, bumped version
2015-12-03 12:43:00 -08:00
Derek Collison
d1a333c713
Add in tls for connection details
2015-12-01 19:23:42 -08:00
Derek Collison
b61da04ef7
Enable HTTPS for monitoring
2015-12-01 19:01:56 -08:00
Derek Collison
0ae71a1f2c
Merge pull request #149 from nats-io/bcrypt
...
Bcrypt Support
2015-12-01 17:49:15 -08:00
Derek Collison
a63293db6b
root page cleanup
2015-12-01 15:43:37 -08:00
Vanilla Hsu
a1bda5cad5
add freebsd support.
2015-12-01 14:37:14 +08:00
Derek Collison
6b8e8d89c8
Use smaller cost function for test, fix race
2015-11-30 18:29:53 -08:00
Waldemar Quevedo
4958f0f684
Add --cluster_listen flag to set cluster addr and port for others to solicit routes
2015-11-30 14:30:11 -08:00
Derek Collison
e16fc7f8d5
Merge pull request #146 from wallyqs/incomplete-pub-arg
...
Avoid `cap out of range` error when handling split buffer
2015-11-29 19:26:44 -10:00
Waldemar Quevedo
498df401af
Return empty string when can't take slice for snippet from buffer
2015-11-29 20:47:47 -08:00
Waldemar Quevedo
18f932620f
Avoid cap out of range error when handling split buffer
2015-11-29 11:11:17 -08:00
Derek Collison
a873191169
usage arg update
2015-11-29 07:11:42 -10:00
Derek Collison
9d0695ec47
Merge pull request #143 from nats-io/tls_strict_route
...
TLS strict route verifications
2015-11-23 12:18:41 -08:00
Derek Collison
40c8cb13ea
Strict verification for route TLS
2015-11-23 10:19:47 -08:00
Colin Sullivan
bb286ba424
Merge branch 'master' into tls_add_cipher
2015-11-23 10:55:43 -07:00
Colin Sullivan
790578f3f4
Add negative tests for cipher_suite configurations.
2015-11-22 17:21:22 -07:00
Derek Collison
647213b1d7
TLS timeout handling for routes
2015-11-22 15:07:44 -08:00
Derek Collison
3b64567f00
tls flags, proper timeouts
2015-11-22 14:43:16 -08:00
Derek Collison
055f1dccb3
Allow test to use correct default ciphers
2015-11-22 08:34:06 -08:00
Derek Collison
ef43c19fce
Use better ciphers available under 1.5
2015-11-22 08:29:18 -08:00
Colin Sullivan
936259e0d6
Removed the requirement for cipher_suites configuration in TLS and added default ciphers.
2015-11-21 21:15:35 -07:00
Colin Sullivan
c56b3677da
Fixed formatting
2015-11-20 16:08:13 -07:00