delete message removed from privileged list
This commit is contained in:
0
.gitmodules
vendored
Executable file → Normal file
0
.gitmodules
vendored
Executable file → Normal file
0
appdata/LICENSE
Executable file → Normal file
0
appdata/LICENSE
Executable file → Normal file
0
appdata/README.md
Executable file → Normal file
0
appdata/README.md
Executable file → Normal file
0
atomic/.codecov.yml
Executable file → Normal file
0
atomic/.codecov.yml
Executable file → Normal file
0
atomic/CHANGELOG.md
Executable file → Normal file
0
atomic/CHANGELOG.md
Executable file → Normal file
0
atomic/LICENSE
Executable file → Normal file
0
atomic/LICENSE
Executable file → Normal file
0
atomic/Makefile
Executable file → Normal file
0
atomic/Makefile
Executable file → Normal file
0
atomic/README.md
Executable file → Normal file
0
atomic/README.md
Executable file → Normal file
0
atomic/internal/gen-atomicint/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicint/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicwrapper/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicwrapper/wrapper.tmpl
Executable file → Normal file
0
cmd/lerproxy/LICENSE
Executable file → Normal file
0
cmd/lerproxy/LICENSE
Executable file → Normal file
0
cmd/lerproxy/README.md
Executable file → Normal file
0
cmd/lerproxy/README.md
Executable file → Normal file
@@ -48,6 +48,7 @@ func NewConfig() (cfg *Config, err E) {
|
||||
if err = env.Load(cfg, &env.Options{Source: e}); chk.E(err) {
|
||||
return
|
||||
}
|
||||
log.I.S(cfg)
|
||||
// if err = env.Load(cfg, nil); err != nil {
|
||||
// return
|
||||
// }
|
||||
|
||||
@@ -30,7 +30,6 @@ func main() {
|
||||
}
|
||||
log.I.Ln("log level", cfg.LogLevel)
|
||||
lol.SetLogLevel(cfg.LogLevel)
|
||||
log.D.S(cfg)
|
||||
var wg sync.WaitGroup
|
||||
c, cancel := context.Cancel(context.Bg())
|
||||
path := filepath.Join(cfg.Root, cfg.Profile)
|
||||
|
||||
0
cmd/vainstr/LICENSE
Executable file → Normal file
0
cmd/vainstr/LICENSE
Executable file → Normal file
0
cmd/vainstr/README.md
Executable file → Normal file
0
cmd/vainstr/README.md
Executable file → Normal file
0
ec/LICENSE
Executable file → Normal file
0
ec/LICENSE
Executable file → Normal file
0
ec/README.md
Executable file → Normal file
0
ec/README.md
Executable file → Normal file
0
ec/base58/LICENSE
Executable file → Normal file
0
ec/base58/LICENSE
Executable file → Normal file
0
ec/base58/README.md
Executable file → Normal file
0
ec/base58/README.md
Executable file → Normal file
0
ec/base58/cov_report.sh
Executable file → Normal file
0
ec/base58/cov_report.sh
Executable file → Normal file
0
ec/bech32/README.md
Executable file → Normal file
0
ec/bech32/README.md
Executable file → Normal file
0
ec/chainhash/README.md
Executable file → Normal file
0
ec/chainhash/README.md
Executable file → Normal file
0
ec/ecdsa/README.md
Executable file → Normal file
0
ec/ecdsa/README.md
Executable file → Normal file
0
ec/musig2/data/key_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_sort_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_sort_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_gen_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_gen_vectors.json
Executable file → Normal file
0
ec/musig2/data/sig_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/sig_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/sign_verify_vectors.json
Executable file → Normal file
0
ec/musig2/data/sign_verify_vectors.json
Executable file → Normal file
0
ec/musig2/data/tweak_vectors.json
Executable file → Normal file
0
ec/musig2/data/tweak_vectors.json
Executable file → Normal file
0
ec/schnorr/bip/bip-0340.mediawiki
Executable file → Normal file
0
ec/schnorr/bip/bip-0340.mediawiki
Executable file → Normal file
0
ec/schnorr/bip/bip340/reference.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/reference.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.csv
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.csv
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.py
Executable file → Normal file
0
ec/sec2-v2.pdf
Executable file → Normal file
0
ec/sec2-v2.pdf
Executable file → Normal file
0
ec/secp256k1/LICENSE
Executable file → Normal file
0
ec/secp256k1/LICENSE
Executable file → Normal file
0
ec/secp256k1/README.md
Executable file → Normal file
0
ec/secp256k1/README.md
Executable file → Normal file
0
ec/secp256k1/rawbytepoints.bin
Executable file → Normal file
0
ec/secp256k1/rawbytepoints.bin
Executable file → Normal file
0
encryption/README.md
Executable file → Normal file
0
encryption/README.md
Executable file → Normal file
0
event/examples/out.jsonl
Executable file → Normal file
0
event/examples/out.jsonl
Executable file → Normal file
0
interrupt/README.md
Executable file → Normal file
0
interrupt/README.md
Executable file → Normal file
0
ints/base10k.txt
Executable file → Normal file
0
ints/base10k.txt
Executable file → Normal file
@@ -41,7 +41,6 @@ var Privileged = []*T{
|
||||
GiftWrap,
|
||||
GiftWrapWithKind4,
|
||||
ApplicationSpecificData,
|
||||
Deletion,
|
||||
}
|
||||
|
||||
func (k *T) IsPrivileged() (is bool) {
|
||||
|
||||
0
lol/README.md
Executable file → Normal file
0
lol/README.md
Executable file → Normal file
0
p256k/README.md
Executable file → Normal file
0
p256k/README.md
Executable file → Normal file
0
qu/README.md
Executable file → Normal file
0
qu/README.md
Executable file → Normal file
@@ -138,7 +138,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
|
||||
normalize.AuthRequired.F("auth required for request processing")).
|
||||
Write(ws); err != nil {
|
||||
}
|
||||
log.T.F("requesting auth from client")
|
||||
log.T.F("requesting auth from client %s", ws.RealRemote())
|
||||
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
||||
return
|
||||
}
|
||||
@@ -149,7 +149,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
|
||||
normalize.AuthRequired.F("auth required for storing events")).
|
||||
Write(ws); err != nil {
|
||||
}
|
||||
log.T.F("requesting auth again from client")
|
||||
log.T.F("requesting auth again from client %s", ws.RealRemote())
|
||||
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
||||
return
|
||||
}
|
||||
@@ -436,7 +436,7 @@ func (s *Server) doReq(c Ctx, ws *web.Socket, req B, sto store.I) (r B) {
|
||||
if auther, ok := s.relay.(relay.Authenticator); ok && auther.AuthEnabled() {
|
||||
if f.Kinds.IsPrivileged() {
|
||||
|
||||
log.T.Ln("privileged request with auth enabled")
|
||||
log.T.F("privileged request with auth enabled\n%s", f.Serialize())
|
||||
senders := f.Authors
|
||||
receivers := f.Tags.GetAll(tag.New("#p"))
|
||||
// log.I.S(senders, receivers)
|
||||
|
||||
@@ -114,15 +114,15 @@ func (s *Server) Start(host S, port int, adminHost S, adminPort int, started ...
|
||||
s.httpServer = &http.Server{
|
||||
Handler: cors.Default().Handler(s),
|
||||
Addr: addr,
|
||||
WriteTimeout: 2 * time.Second,
|
||||
ReadTimeout: 2 * time.Second,
|
||||
WriteTimeout: 4 * time.Second,
|
||||
ReadTimeout: 4 * time.Second,
|
||||
IdleTimeout: 30 * time.Second,
|
||||
}
|
||||
s.adminServer = &http.Server{
|
||||
Handler: cors.Default().Handler(s),
|
||||
Addr: adminAddr,
|
||||
WriteTimeout: 2 * time.Second,
|
||||
ReadTimeout: 2 * time.Second,
|
||||
WriteTimeout: 4 * time.Second,
|
||||
ReadTimeout: 4 * time.Second,
|
||||
IdleTimeout: 30 * time.Second,
|
||||
}
|
||||
|
||||
|
||||
0
scripts/runtests.sh
Executable file → Normal file
0
scripts/runtests.sh
Executable file → Normal file
0
sha256/test-architectures.sh
Executable file → Normal file
0
sha256/test-architectures.sh
Executable file → Normal file
Reference in New Issue
Block a user