delete message removed from privileged list
This commit is contained in:
0
.gitmodules
vendored
Executable file → Normal file
0
.gitmodules
vendored
Executable file → Normal file
0
appdata/LICENSE
Executable file → Normal file
0
appdata/LICENSE
Executable file → Normal file
0
appdata/README.md
Executable file → Normal file
0
appdata/README.md
Executable file → Normal file
0
atomic/.codecov.yml
Executable file → Normal file
0
atomic/.codecov.yml
Executable file → Normal file
0
atomic/CHANGELOG.md
Executable file → Normal file
0
atomic/CHANGELOG.md
Executable file → Normal file
0
atomic/LICENSE
Executable file → Normal file
0
atomic/LICENSE
Executable file → Normal file
0
atomic/Makefile
Executable file → Normal file
0
atomic/Makefile
Executable file → Normal file
0
atomic/README.md
Executable file → Normal file
0
atomic/README.md
Executable file → Normal file
0
atomic/internal/gen-atomicint/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicint/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicwrapper/wrapper.tmpl
Executable file → Normal file
0
atomic/internal/gen-atomicwrapper/wrapper.tmpl
Executable file → Normal file
0
cmd/lerproxy/LICENSE
Executable file → Normal file
0
cmd/lerproxy/LICENSE
Executable file → Normal file
0
cmd/lerproxy/README.md
Executable file → Normal file
0
cmd/lerproxy/README.md
Executable file → Normal file
@@ -48,6 +48,7 @@ func NewConfig() (cfg *Config, err E) {
|
|||||||
if err = env.Load(cfg, &env.Options{Source: e}); chk.E(err) {
|
if err = env.Load(cfg, &env.Options{Source: e}); chk.E(err) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
log.I.S(cfg)
|
||||||
// if err = env.Load(cfg, nil); err != nil {
|
// if err = env.Load(cfg, nil); err != nil {
|
||||||
// return
|
// return
|
||||||
// }
|
// }
|
||||||
|
|||||||
@@ -30,7 +30,6 @@ func main() {
|
|||||||
}
|
}
|
||||||
log.I.Ln("log level", cfg.LogLevel)
|
log.I.Ln("log level", cfg.LogLevel)
|
||||||
lol.SetLogLevel(cfg.LogLevel)
|
lol.SetLogLevel(cfg.LogLevel)
|
||||||
log.D.S(cfg)
|
|
||||||
var wg sync.WaitGroup
|
var wg sync.WaitGroup
|
||||||
c, cancel := context.Cancel(context.Bg())
|
c, cancel := context.Cancel(context.Bg())
|
||||||
path := filepath.Join(cfg.Root, cfg.Profile)
|
path := filepath.Join(cfg.Root, cfg.Profile)
|
||||||
|
|||||||
0
cmd/vainstr/LICENSE
Executable file → Normal file
0
cmd/vainstr/LICENSE
Executable file → Normal file
0
cmd/vainstr/README.md
Executable file → Normal file
0
cmd/vainstr/README.md
Executable file → Normal file
0
ec/LICENSE
Executable file → Normal file
0
ec/LICENSE
Executable file → Normal file
0
ec/README.md
Executable file → Normal file
0
ec/README.md
Executable file → Normal file
0
ec/base58/LICENSE
Executable file → Normal file
0
ec/base58/LICENSE
Executable file → Normal file
0
ec/base58/README.md
Executable file → Normal file
0
ec/base58/README.md
Executable file → Normal file
0
ec/base58/cov_report.sh
Executable file → Normal file
0
ec/base58/cov_report.sh
Executable file → Normal file
0
ec/bech32/README.md
Executable file → Normal file
0
ec/bech32/README.md
Executable file → Normal file
0
ec/chainhash/README.md
Executable file → Normal file
0
ec/chainhash/README.md
Executable file → Normal file
0
ec/ecdsa/README.md
Executable file → Normal file
0
ec/ecdsa/README.md
Executable file → Normal file
0
ec/musig2/data/key_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_sort_vectors.json
Executable file → Normal file
0
ec/musig2/data/key_sort_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_gen_vectors.json
Executable file → Normal file
0
ec/musig2/data/nonce_gen_vectors.json
Executable file → Normal file
0
ec/musig2/data/sig_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/sig_agg_vectors.json
Executable file → Normal file
0
ec/musig2/data/sign_verify_vectors.json
Executable file → Normal file
0
ec/musig2/data/sign_verify_vectors.json
Executable file → Normal file
0
ec/musig2/data/tweak_vectors.json
Executable file → Normal file
0
ec/musig2/data/tweak_vectors.json
Executable file → Normal file
0
ec/schnorr/bip/bip-0340.mediawiki
Executable file → Normal file
0
ec/schnorr/bip/bip-0340.mediawiki
Executable file → Normal file
0
ec/schnorr/bip/bip340/reference.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/reference.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.csv
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.csv
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.py
Executable file → Normal file
0
ec/schnorr/bip/bip340/test-vectors.py
Executable file → Normal file
0
ec/sec2-v2.pdf
Executable file → Normal file
0
ec/sec2-v2.pdf
Executable file → Normal file
0
ec/secp256k1/LICENSE
Executable file → Normal file
0
ec/secp256k1/LICENSE
Executable file → Normal file
0
ec/secp256k1/README.md
Executable file → Normal file
0
ec/secp256k1/README.md
Executable file → Normal file
0
ec/secp256k1/rawbytepoints.bin
Executable file → Normal file
0
ec/secp256k1/rawbytepoints.bin
Executable file → Normal file
0
encryption/README.md
Executable file → Normal file
0
encryption/README.md
Executable file → Normal file
0
event/examples/out.jsonl
Executable file → Normal file
0
event/examples/out.jsonl
Executable file → Normal file
0
interrupt/README.md
Executable file → Normal file
0
interrupt/README.md
Executable file → Normal file
0
ints/base10k.txt
Executable file → Normal file
0
ints/base10k.txt
Executable file → Normal file
@@ -41,7 +41,6 @@ var Privileged = []*T{
|
|||||||
GiftWrap,
|
GiftWrap,
|
||||||
GiftWrapWithKind4,
|
GiftWrapWithKind4,
|
||||||
ApplicationSpecificData,
|
ApplicationSpecificData,
|
||||||
Deletion,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k *T) IsPrivileged() (is bool) {
|
func (k *T) IsPrivileged() (is bool) {
|
||||||
|
|||||||
0
lol/README.md
Executable file → Normal file
0
lol/README.md
Executable file → Normal file
0
p256k/README.md
Executable file → Normal file
0
p256k/README.md
Executable file → Normal file
0
qu/README.md
Executable file → Normal file
0
qu/README.md
Executable file → Normal file
@@ -138,7 +138,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
|
|||||||
normalize.AuthRequired.F("auth required for request processing")).
|
normalize.AuthRequired.F("auth required for request processing")).
|
||||||
Write(ws); err != nil {
|
Write(ws); err != nil {
|
||||||
}
|
}
|
||||||
log.T.F("requesting auth from client")
|
log.T.F("requesting auth from client %s", ws.RealRemote())
|
||||||
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -149,7 +149,7 @@ func (s *Server) doEvent(c Ctx, ws *web.Socket, req B, sto store.I) (msg B) {
|
|||||||
normalize.AuthRequired.F("auth required for storing events")).
|
normalize.AuthRequired.F("auth required for storing events")).
|
||||||
Write(ws); err != nil {
|
Write(ws); err != nil {
|
||||||
}
|
}
|
||||||
log.T.F("requesting auth again from client")
|
log.T.F("requesting auth again from client %s", ws.RealRemote())
|
||||||
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
if err = authenvelope.NewChallengeWith(ws.Challenge()).Write(ws); err != nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -436,7 +436,7 @@ func (s *Server) doReq(c Ctx, ws *web.Socket, req B, sto store.I) (r B) {
|
|||||||
if auther, ok := s.relay.(relay.Authenticator); ok && auther.AuthEnabled() {
|
if auther, ok := s.relay.(relay.Authenticator); ok && auther.AuthEnabled() {
|
||||||
if f.Kinds.IsPrivileged() {
|
if f.Kinds.IsPrivileged() {
|
||||||
|
|
||||||
log.T.Ln("privileged request with auth enabled")
|
log.T.F("privileged request with auth enabled\n%s", f.Serialize())
|
||||||
senders := f.Authors
|
senders := f.Authors
|
||||||
receivers := f.Tags.GetAll(tag.New("#p"))
|
receivers := f.Tags.GetAll(tag.New("#p"))
|
||||||
// log.I.S(senders, receivers)
|
// log.I.S(senders, receivers)
|
||||||
|
|||||||
@@ -114,15 +114,15 @@ func (s *Server) Start(host S, port int, adminHost S, adminPort int, started ...
|
|||||||
s.httpServer = &http.Server{
|
s.httpServer = &http.Server{
|
||||||
Handler: cors.Default().Handler(s),
|
Handler: cors.Default().Handler(s),
|
||||||
Addr: addr,
|
Addr: addr,
|
||||||
WriteTimeout: 2 * time.Second,
|
WriteTimeout: 4 * time.Second,
|
||||||
ReadTimeout: 2 * time.Second,
|
ReadTimeout: 4 * time.Second,
|
||||||
IdleTimeout: 30 * time.Second,
|
IdleTimeout: 30 * time.Second,
|
||||||
}
|
}
|
||||||
s.adminServer = &http.Server{
|
s.adminServer = &http.Server{
|
||||||
Handler: cors.Default().Handler(s),
|
Handler: cors.Default().Handler(s),
|
||||||
Addr: adminAddr,
|
Addr: adminAddr,
|
||||||
WriteTimeout: 2 * time.Second,
|
WriteTimeout: 4 * time.Second,
|
||||||
ReadTimeout: 2 * time.Second,
|
ReadTimeout: 4 * time.Second,
|
||||||
IdleTimeout: 30 * time.Second,
|
IdleTimeout: 30 * time.Second,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
0
scripts/runtests.sh
Executable file → Normal file
0
scripts/runtests.sh
Executable file → Normal file
0
sha256/test-architectures.sh
Executable file → Normal file
0
sha256/test-architectures.sh
Executable file → Normal file
Reference in New Issue
Block a user