delete message removed from privileged list

This commit is contained in:
2024-10-15 20:14:14 +01:00
parent 7d2560f001
commit 9df566e1e6
51 changed files with 8 additions and 9 deletions

0
.gitmodules vendored Executable file → Normal file
View File

0
appdata/LICENSE Executable file → Normal file
View File

0
appdata/README.md Executable file → Normal file
View File

0
atomic/.codecov.yml Executable file → Normal file
View File

0
atomic/CHANGELOG.md Executable file → Normal file
View File

0
atomic/LICENSE Executable file → Normal file
View File

0
atomic/Makefile Executable file → Normal file
View File

0
atomic/README.md Executable file → Normal file
View File

0
atomic/internal/gen-atomicint/wrapper.tmpl Executable file → Normal file
View File

0
atomic/internal/gen-atomicwrapper/wrapper.tmpl Executable file → Normal file
View File

0
cmd/lerproxy/LICENSE Executable file → Normal file
View File

0
cmd/lerproxy/README.md Executable file → Normal file
View File

View File

@@ -48,6 +48,7 @@ func NewConfig() (cfg *Config, err E) {
if err = env.Load(cfg, &env.Options{Source: e}); chk.E(err) {
return
}
log.I.S(cfg)
// if err = env.Load(cfg, nil); err != nil {
// return
// }

View File

@@ -30,7 +30,6 @@ func main() {
}
log.I.Ln("log level", cfg.LogLevel)
lol.SetLogLevel(cfg.LogLevel)
log.D.S(cfg)
var wg sync.WaitGroup
c, cancel := context.Cancel(context.Bg())
path := filepath.Join(cfg.Root, cfg.Profile)

0
cmd/vainstr/LICENSE Executable file → Normal file
View File

0
cmd/vainstr/README.md Executable file → Normal file
View File

0
ec/LICENSE Executable file → Normal file
View File

0
ec/README.md Executable file → Normal file
View File

0
ec/base58/LICENSE Executable file → Normal file
View File

0
ec/base58/README.md Executable file → Normal file
View File

0
ec/base58/cov_report.sh Executable file → Normal file
View File

0
ec/bech32/README.md Executable file → Normal file
View File

0
ec/chainhash/README.md Executable file → Normal file
View File

0
ec/ecdsa/README.md Executable file → Normal file
View File

0
ec/musig2/data/key_agg_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/key_sort_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/nonce_agg_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/nonce_gen_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/sig_agg_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/sign_verify_vectors.json Executable file → Normal file
View File

0
ec/musig2/data/tweak_vectors.json Executable file → Normal file
View File

0
ec/schnorr/bip/bip-0340.mediawiki Executable file → Normal file
View File

0
ec/schnorr/bip/bip340/reference.py Executable file → Normal file
View File

0
ec/schnorr/bip/bip340/test-vectors.csv Executable file → Normal file
View File

0
ec/schnorr/bip/bip340/test-vectors.py Executable file → Normal file
View File

0
ec/sec2-v2.pdf Executable file → Normal file
View File

0
ec/secp256k1/LICENSE Executable file → Normal file
View File

0
ec/secp256k1/README.md Executable file → Normal file
View File

0
ec/secp256k1/rawbytepoints.bin Executable file → Normal file
View File

0
encryption/README.md Executable file → Normal file
View File

0
event/examples/out.jsonl Executable file → Normal file
View File

0
interrupt/README.md Executable file → Normal file
View File

0
ints/base10k.txt Executable file → Normal file
View File

View File

@@ -41,7 +41,6 @@ var Privileged = []*T{
GiftWrap,
GiftWrapWithKind4,
ApplicationSpecificData,
Deletion,
}
func (k *T) IsPrivileged() (is bool) {

0
lol/README.md Executable file → Normal file
View File

0
p256k/README.md Executable file → Normal file
View File

0
qu/README.md Executable file → Normal file
View File

View File

@@ -138,7 +138,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
normalize.AuthRequired.F("auth required for request processing")).
Write(ws); err != nil {
}
log.T.F("requesting auth from client")
log.T.F("requesting auth from client %s", ws.RealRemote())
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
return
}
@@ -149,7 +149,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
normalize.AuthRequired.F("auth required for storing events")).
Write(ws); err != nil {
}
log.T.F("requesting auth again from client")
log.T.F("requesting auth again from client %s", ws.RealRemote())
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
return
}
@@ -436,7 +436,7 @@ func (s *Server) doReq(c Ctx, ws *web.Socket, req B, sto store.I) (r B) {
if auther, ok := s.relay.(relay.Authenticator); ok && auther.AuthEnabled() {
if f.Kinds.IsPrivileged() {
log.T.Ln("privileged request with auth enabled")
log.T.F("privileged request with auth enabled\n%s", f.Serialize())
senders := f.Authors
receivers := f.Tags.GetAll(tag.New("#p"))
// log.I.S(senders, receivers)

View File

@@ -114,15 +114,15 @@ func (s *Server) Start(host S, port int, adminHost S, adminPort int, started ...
s.httpServer = &http.Server{
Handler: cors.Default().Handler(s),
Addr: addr,
WriteTimeout: 2 * time.Second,
ReadTimeout: 2 * time.Second,
WriteTimeout: 4 * time.Second,
ReadTimeout: 4 * time.Second,
IdleTimeout: 30 * time.Second,
}
s.adminServer = &http.Server{
Handler: cors.Default().Handler(s),
Addr: adminAddr,
WriteTimeout: 2 * time.Second,
ReadTimeout: 2 * time.Second,
WriteTimeout: 4 * time.Second,
ReadTimeout: 4 * time.Second,
IdleTimeout: 30 * time.Second,
}

0
scripts/runtests.sh Executable file → Normal file
View File

0
sha256/test-architectures.sh Executable file → Normal file
View File