Skip to content
Snippets Groups Projects
  1. Feb 24, 2024
  2. Feb 23, 2024
  3. Feb 21, 2024
  4. Feb 17, 2024
  5. Feb 10, 2024
  6. Feb 09, 2024
  7. Feb 08, 2024
  8. Feb 06, 2024
  9. Feb 05, 2024
    • Deucе's avatar
      Make libcl depend on GNUmakefile · 41ab907e
      Deucе authored
      This will trigger more builds of libcl, but at least I won't have
      to make people touch(1) a patch to do a rebuild.
      
      As an aside, cleanall.sh doesn't clean 3rdp, no idea if this is
      intentional or not.
      41ab907e
    • Deucе's avatar
      Redirect stderr to stdout *after* stdout is /dev/null, not before. · 26713a84
      Deucе authored
      Should fix the OpenBSD pipeline.
      26713a84
    • Deucе's avatar
      Rejigger the md5 calc a bit · cc8c90b4
      Deucе authored
      cc8c90b4
    • Deucе's avatar
      Allow RWX pages on NetBSD and OpenBSD. · d3a1c675
      Deucе authored
      By default, both NetBSD and OpenBSD will not allow pages to be mapped
      both writable and executable.
      
      On OpenBSD, if the filesystem is mounted with the wxallowed option,
      this would work, and before v6.0, passing -z wxallowed to the linker
      would allow it on a per-binary basis.  However, since this is not
      the default, and since the JS engine can use mprotect() to switch
      between RW and RX, I've decided to enable this instead.  This will
      slow things down, but it will work "out of the box".
      
      For NetBSD, the situation is different, you can't switch between
      RW and RX using mprotect()... instead, you need to use mremap() to
      get a separate mapping for each set of perms.  This does *not*
      appear to be present in the 1.8.5 source, so we can't do the same
      fix as OpenBSD.  Instead, NetBSD allows paxctl to add an elf note
      indicating that RWX is needed, and it "just works" (by default).
      d3a1c675
    • Deucе's avatar
      Don't build the JS shell. · dc440697
      Deucе authored
      We don't need it (I hope), and it plays fast and loose with the config
      options so it won't compile with some sets of them, making it hard
      to troubleshoot stuff.
      dc440697
  10. Feb 04, 2024
  11. Jan 23, 2024
  12. Jan 22, 2024
  13. Jan 21, 2024
  14. Dec 31, 2023
  15. Dec 30, 2023
    • Deucе's avatar
      Fix up patch... · ba877839
      Deucе authored
      Don't count read closed channels against "is this the last one?" checks
      Fix checking of channel attributes are present.
      Fully close readclose channel if it's the last one.
      ba877839
  16. Dec 29, 2023
    • Deucе's avatar
      Add a new channel state · d111be34
      Deucе authored
      Previously, there were (basically) three states... active, closed,
      and writeclosed where writeclosed indicated that a channel close
      message was sent, no more writes are allowed, and it's waiting for
      the close to be acked.
      
      This adds a readclosed state where we have received a close request
      from the remote (and acked it), but have not deactivated the channel
      ourselves.
      
      This fixes a race condition where we could select a channel, then,
      when we write data to it, we receive a close and the channel becomes
      inactive so a new active channel is selected (effectively at random).
      
      This is a bit suboptimal though since we still don't get a
      notification when a channel is closed by the remote.  Instead, if
      we use more than one channel, we need to periodically make the
      channel active for writes and explicitly check if it's closed.
      d111be34
    • Deucе's avatar
      Allow retrying SSH client auth. · 4a1d2222
      Deucе authored
      If you initially try private key auth for example, allow retrying
      with password auth and vice-versa.  This is needed for reasonable
      fallback from private-key auth since we don't know in advance
      which will work, and we don't want to disconnect an reconnect.
      
      This takes the guardrails of adding a password.  Previously, it was
      ensured that a password was always added immediately after a username.
      This is to ensure when using the server for example and stuffing a
      list full of all the user/pw pairs, each pw goes with a user.
      
      Instead of returning an error, this now allows adding passwords
      without a corrsponding user that won't be used, and there will be
      no indication of why.
      
      Death Star mode for this feature is better than not having fallback
      in my opinion.
      4a1d2222
  17. Dec 28, 2023
Loading