passwd: Don't ask for the password twice
Remove redundant shuffle() in gen_salt()
Print dry run output to stdout
Create tempfile in the same dir as passwdfile
write_wrapper() uses a tempfile to write the new contents of thepasswdfile and then atomically renames / moves it to the original passwdfile. os.rename() won't work if the tempfile is not created on the same...
Bump version to 1.5rc2
Bump version to 1.5~rc1-1~wheezy
Signed-off-by: Stratos Psomadakis <psomas@grnet.gr>
Merge branch 'release-1.5' into debian-release-1.5
Bump version to 1.5rc1
Revert "Prompt user for user configuration"
This reverts commit c5654215e038560cc95938df3cd57f3598f0b1e5.
docs fix
Merge branch 'debian-feature-auth' into debian-develop
Merge branch 'feature-auth' into debian-feature-auth
Merge branch 'feature-auth' into develop
Change the auth file format
Switch to a 'passwd'/crypt-style format for the authentication file andprovide a tool to easily add / update / delete users from the file.
Fix pylint warnings, typos and docs
Improve logging during startup and shutdown
Fix error handling in parse_auth_file
Don't check for SSL arg inside the event loop
Prompt user for user configuration
Remove examples debian file
Fix dirs permissions
Don't delete usr/bin in rules file
usr/bin/ now contains the vncauthproxy-passwd file and the rules fileshouldn't delete any more.
Add /var/run/vncauthproxy to dirs
Fix typo
Fix typo in Manifest
Fix lintian warnings
Prepare docs for 1.5 release
Fix typo in client
Fix some pylint warns
Fix typos in docs
Enable ci docs building
Add README, Changelog and docs
Add docs build dir to .gitignore
Add logging support in client
Fix typo in control
Merge branch 'develop' into debian-develop
Bind to 127.0.0.1 and disable SSL by default
Remove extra blank line from changelog
Merge branch 'debian' into debian-develop
Various fixes from pyflakes
Bump version to 1.4-1~wheezy
Signed-off-by: Christos Stavrakakis <cstavr@grnet.gr>
Parse auth file using regexp
Fix auth file parsing
Minor fix for status case in init script
Improve logging in request_forwarding
Support server SSL cert auth in client
Redirect delgroup output to /dev/null in postrm
Improve logging / exception handling
Merge branch 'debian-feature-async-control' into debian-develop
Conflicts: debian/control debian/dirs debian/vncauthproxy.default debian/vncauthproxy.init
Merge branch 'feature-async-control' into develop
Merge branch 'feature-async-control' into debian-feature-async-control
Fix error in auth file handling
Don't crash on an empy auth file
Don't crash on an empty auth file. Also correct a typo with the `no_ssl`opt.
Add vncauthproxy user/group
Bump version to 1.4~rc2-1
Add DAEMON_OPTS variable in vncauthproxy.default
Add example user auth file
Minor change to pkg descr
Add /var/lib/vncauthproxy/ to dirs
Initial Debian packaging
Drop daemon's privileges
Since there is no support for this in the daemon itself nor a properconfiguration file, do that in the (Debian) init script by using a/etc/default/vncauthproxy file plus start-stop-daemon.
Minor fixes to the Debian packaging
Update debian packaging after script name change
Update debian packaging to reflect console script name changevncauthproxy.py -> vncauthproxy in setup.py.
Update maintainer field in Synnefo branch
Add the `snf-' prefix to the package name
Install default and init.d file as `vncauthproxy'
This is done to ensure there is an upgrade path, if package`vncauthproxy' is already installed
Update debian/changelog before release
Add example users file and users file checks
Add an example users file and fail if there are no users defined in thefile.
Add support for control connection authentication
Since vncauthproxy no longer uses Unix domain sockets for the controlconnection handling, authentication handling, which was done with POSIXfile permissions, must be implemented in vncauthproxy.
The /var/lib/vncauthproxy/users file (configurable) acts as an...
Use SSL/TLS for control connections
Control connections now use SSL/TLS by default. Since, vncauthproxy controlconnections now use TCP/IP instead of Unix domain sockets, sensitiveinformation could be sent over possibly untrusted / insecure channels.
Set SO_REUSEADDR for the control socket
Fix typos/mistakes introduced by the refactoring
Code refactoring
Minor lexical fixes
Use TCP instead of UNIX sockets (first try)
Initial 'implementation' of vncauthproxy using TCP sockets instead ofUNIX domain sockets for control connections.
By default, it will bind to 127.0.0.1:24999 (forwarding ports start atTCP 25000). The client was changed accordingly....
Make control connection handling async
For every incoming control connection, accept() inside the main loop anddispatch the connection handling/establishment to a new greenlet.
The async handling of the control connections ensures that vncauhtproxy won't...
Bump version to 1.4-1
Merge branch 'master' into debian-master
Merge branch 'release-1.4' into develop
Update version to 1.4
Merge branch 'release-1.4' into debian-release-1.4
Modify default port range for port pool
The default port range used for automatic port selectionwas chosen to be the ephemeral port range. This was the wrongthing to do, because it may conflict with ports used for outgoingconnections from the host on which vncauthproxy runs,...
Bump version to rc2
Update version to 1.4rc1 (release branch)
Bump version for next release
Create a docs stub to keep the CI system happy
Use single setup.py in ci/install.sh
Use devflow-update-version in ci/install.sh
1 2 Next » (1-100/160) | Per page: 25, 50, 100
Also available in: Atom