You can subscribe to this list here.
| 2005 |
Jan
|
Feb
(53) |
Mar
(62) |
Apr
(88) |
May
(55) |
Jun
(204) |
Jul
(52) |
Aug
|
Sep
(1) |
Oct
(94) |
Nov
(15) |
Dec
(68) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2006 |
Jan
(130) |
Feb
(105) |
Mar
(34) |
Apr
(61) |
May
(41) |
Jun
(92) |
Jul
(176) |
Aug
(102) |
Sep
(247) |
Oct
(69) |
Nov
(32) |
Dec
(140) |
| 2007 |
Jan
(58) |
Feb
(51) |
Mar
(11) |
Apr
(20) |
May
(34) |
Jun
(37) |
Jul
(18) |
Aug
(60) |
Sep
(41) |
Oct
(105) |
Nov
(19) |
Dec
(14) |
| 2008 |
Jan
(3) |
Feb
|
Mar
(7) |
Apr
(5) |
May
(123) |
Jun
(5) |
Jul
(1) |
Aug
(29) |
Sep
(15) |
Oct
(21) |
Nov
(51) |
Dec
(3) |
| 2009 |
Jan
|
Feb
(36) |
Mar
(29) |
Apr
|
May
|
Jun
(7) |
Jul
(4) |
Aug
|
Sep
(4) |
Oct
|
Nov
(13) |
Dec
|
| 2010 |
Jan
|
Feb
|
Mar
(9) |
Apr
(11) |
May
(16) |
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
| 2011 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2012 |
Jan
(7) |
Feb
(3) |
Mar
|
Apr
|
May
|
Jun
(3) |
Jul
|
Aug
|
Sep
|
Oct
(92) |
Nov
(28) |
Dec
(16) |
| 2013 |
Jan
(9) |
Feb
(2) |
Mar
|
Apr
(4) |
May
(4) |
Jun
(6) |
Jul
(14) |
Aug
(12) |
Sep
(4) |
Oct
(13) |
Nov
(1) |
Dec
(6) |
| 2014 |
Jan
(23) |
Feb
(19) |
Mar
(10) |
Apr
(14) |
May
(11) |
Jun
(6) |
Jul
(11) |
Aug
(15) |
Sep
(41) |
Oct
(95) |
Nov
(23) |
Dec
(11) |
| 2015 |
Jan
(3) |
Feb
(9) |
Mar
(19) |
Apr
(3) |
May
(1) |
Jun
(3) |
Jul
(11) |
Aug
(1) |
Sep
(15) |
Oct
(5) |
Nov
(2) |
Dec
|
| 2016 |
Jan
(7) |
Feb
(11) |
Mar
(8) |
Apr
(1) |
May
(3) |
Jun
(17) |
Jul
(12) |
Aug
(3) |
Sep
(5) |
Oct
(19) |
Nov
(12) |
Dec
(6) |
| 2017 |
Jan
(30) |
Feb
(23) |
Mar
(12) |
Apr
(32) |
May
(27) |
Jun
(7) |
Jul
(13) |
Aug
(16) |
Sep
(6) |
Oct
(11) |
Nov
|
Dec
(12) |
| 2018 |
Jan
(1) |
Feb
(5) |
Mar
(6) |
Apr
(7) |
May
(23) |
Jun
(3) |
Jul
(2) |
Aug
(1) |
Sep
(6) |
Oct
(6) |
Nov
(10) |
Dec
(3) |
| 2019 |
Jan
(26) |
Feb
(15) |
Mar
(9) |
Apr
|
May
(8) |
Jun
(14) |
Jul
(10) |
Aug
(10) |
Sep
(4) |
Oct
(2) |
Nov
(20) |
Dec
(10) |
| 2020 |
Jan
(10) |
Feb
(14) |
Mar
(29) |
Apr
(11) |
May
(25) |
Jun
(21) |
Jul
(23) |
Aug
(12) |
Sep
(19) |
Oct
(6) |
Nov
(8) |
Dec
(12) |
| 2021 |
Jan
(29) |
Feb
(9) |
Mar
(8) |
Apr
(8) |
May
(2) |
Jun
(2) |
Jul
(9) |
Aug
(9) |
Sep
(3) |
Oct
(4) |
Nov
(12) |
Dec
(13) |
| 2022 |
Jan
(4) |
Feb
|
Mar
(4) |
Apr
(12) |
May
(15) |
Jun
(7) |
Jul
(10) |
Aug
(2) |
Sep
|
Oct
(1) |
Nov
(8) |
Dec
|
| 2023 |
Jan
(15) |
Feb
|
Mar
(23) |
Apr
(1) |
May
(2) |
Jun
(10) |
Jul
|
Aug
(22) |
Sep
(19) |
Oct
(2) |
Nov
(20) |
Dec
|
| 2024 |
Jan
(1) |
Feb
|
Mar
(16) |
Apr
(15) |
May
(6) |
Jun
(4) |
Jul
(1) |
Aug
(1) |
Sep
|
Oct
(13) |
Nov
(18) |
Dec
(6) |
| 2025 |
Jan
(12) |
Feb
|
Mar
(2) |
Apr
(1) |
May
(11) |
Jun
(5) |
Jul
(4) |
Aug
(2) |
Sep
(2) |
Oct
(6) |
Nov
|
Dec
|
|
From: Georg L. <jor...@ma...> - 2025-05-05 17:40:15
|
Hello, Nginx has an "auth_request"[1] module, which allows to offload authentication to an HTTP backend. This is used e.g. with oauth2-proxy[2] to provide OAuth2/OpenID Connect authentication to (reverse proxied) applications which do not implement authentication by themself. See configuration examples with Keycloak[3] or authentik[4] I believe, Naviserver would benefit from a compliant implementation of this "authentication protocol" (and I would put it immediately into operation). How difficult would it be to implement this? Would this go into the nsperm module or be rather implemented as a separate module? - - - Of course, replacing oauth2-proxy directly in Naviserver would be even more efficient. E.g. Apache has its own mod_auth_openidc for this. But I guess that's much harder to implent, and auth_request could also be used with other creatively invented backends. Best Regards, Georg [1] https://nginx.org/en/docs/http/ngx_http_auth_request_module.html [2] https://github.com/oauth2-proxy/oauth2-proxy [3] https://oauth2-proxy.github.io/oauth2-proxy/configuration/providers/keycloak_oidc [4] https://docs.goauthentik.io/docs/add-secure-apps/providers/proxy/server_nginx |
|
From: Wolfgang W. <wol...@di...> - 2025-05-05 15:08:24
|
Yes, now it works with -encoding binary: % set d [ns_crypto::aead::encrypt string -cipher aes-128-gcm -iv 123456789 -key secret -encoding binary "Hello world!"] % set r [ns_crypto::aead::decrypt string -cipher aes-128-gcm -iv 123456789 -key secret -tag [dict get $d tag] -encoding binary [dict get $d bytes]] > Hello World! Regards, Wolfgang Am 05.05.25 um 15:38 schrieb Gustaf Neumann (sslmail): > Please check, if the following helps also for your environment: > > https://github.com/naviserver-project/naviserver/commit/08e5d8ffc22d403bcd31b0be1c9eb592e8e583d0 > > > all the best > -gn > >> On 05.05.2025, at 14:13, Gustaf Neumann (sslmail) <ne...@wu...> >> wrote: >> >> Hi Wolfgang, >> >> At first sight, It looks to me as if there was a change in OpenSSL >> leading to the problem. >> The error is triggered by OpenSSL’s EVP_CIPHER_CTX_ctrl(). The docu >> states [1] >> >> >> /EVP_CIPHER_CTX_ctrl(): This is a legacy method…./ >> >> >> … in versions starting with 3.0. >> >> When time permits, i will check out the details, >> - how the new parameter setting mechanism effect the code (we have 4 >> occurrences of this call) >> - whether replacing it solves the issue, >> - how to make it work with different versions of OpenSSL (pre 3.0.0) >> >> The strange part is that the aead encrypt/decrypt sequence is in the >> regression test, where it continues to work. >> … So, maybe this is (also) related with the handling of binary >> strings in Tcl. >> >> -g >> PS: Is your code for Passkeys and WebAuthn with NaviServer already >> available on GithHub, as you mentioned in January? >> >> >> [1] https://docs.openssl.org/3.5/man3/EVP_EncryptInit/#description >> > > > > _______________________________________________ > naviserver-devel mailing list > nav...@li... > https://lists.sourceforge.net/lists/listinfo/naviserver-devel -- *Wolfgang Winkler* Geschäftsführung wol...@di... mobil +43.699.19971172 dc:*büro* digital concepts Novak Winkler OG Software & Design Landstraße 68, 5. Stock, 4020 Linz www.digital-concepts.com <http://www.digital-concepts.com> tel +43.732.997117.72 tel +43.699.1997117.2 Firmenbuchnummer: 192003h Firmenbuchgericht: Landesgericht Linz |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-05-05 13:38:50
|
Please check, if the following helps also for your environment: https://github.com/naviserver-project/naviserver/commit/08e5d8ffc22d403bcd31b0be1c9eb592e8e583d0 all the best -gn > On 05.05.2025, at 14:13, Gustaf Neumann (sslmail) <ne...@wu...> wrote: > > Hi Wolfgang, > > At first sight, It looks to me as if there was a change in OpenSSL leading to the problem. > The error is triggered by OpenSSL’s EVP_CIPHER_CTX_ctrl(). The docu states [1] > > > EVP_CIPHER_CTX_ctrl(): This is a legacy method…. > > … in versions starting with 3.0. > > When time permits, i will check out the details, > - how the new parameter setting mechanism effect the code (we have 4 occurrences of this call) > - whether replacing it solves the issue, > - how to make it work with different versions of OpenSSL (pre 3.0.0) > > The strange part is that the aead encrypt/decrypt sequence is in the regression test, where it continues to work. > … So, maybe this is (also) related with the handling of binary strings in Tcl. > > -g > PS: Is your code for Passkeys and WebAuthn with NaviServer already available on GithHub, as you mentioned in January? > > > [1] https://docs.openssl.org/3.5/man3/EVP_EncryptInit/#description > |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-05-05 12:14:19
|
Hi Wolfgang, At first sight, It looks to me as if there was a change in OpenSSL leading to the problem. The error is triggered by OpenSSL’s EVP_CIPHER_CTX_ctrl(). The docu states [1] EVP_CIPHER_CTX_ctrl(): This is a legacy method…. … in versions starting with 3.0. When time permits, i will check out the details, - how the new parameter setting mechanism effect the code (we have 4 occurrences of this call) - whether replacing it solves the issue, - how to make it work with different versions of OpenSSL (pre 3.0.0) The strange part is that the aead encrypt/decrypt sequence is in the regression test, where it continues to work. … So, maybe this is (also) related with the handling of binary strings in Tcl. -g PS: Is your code for Passkeys and WebAuthn with NaviServer already available on GithHub, as you mentioned in January? [1] https://docs.openssl.org/3.5/man3/EVP_EncryptInit/#description > On 05.05.2025, at 12:25, Wolfgang Winkler via naviserver-devel <nav...@li...> wrote: > > Dear all, > > when I follow the example of: > > https://naviserver.sourceforge.io/n/naviserver/files/ns_crypto.html#1 > > % set d [ns_crypto::aead::encrypt string -cipher aes-128-gcm -iv 123456789 \ > -key secret -encoding binary \ > "hello world"] > % ns_crypto::aead::decrypt string -cipher aes-128-gcm -iv 123456789 \ > -key secret -tag [dict get $d tag] \ > -encoding binary [dict get $d bytes] > > I get the error: "could not set tag value" > > I've tried it with naviserver 4.99.23 and 5.0 with OpenSSL 3.4.1. > > We'd like to use it, because it is so much faster than any other way of symmetric encryption for tcl or naviserver I'm aware of. > > Regards, > > Wolfgang Winkler > > -- > Wolfgang Winkler > Geschäftsführung > wol...@di... <mailto:wol...@di...> > mobil +43.699.19971172 > > dc:büro > digital concepts Novak Winkler OG > Software & Design > Landstraße 68, 5. Stock, 4020 Linz > www.digital-concepts.com <http://www.digital-concepts.com/> > tel +43.732.997117.72 > tel +43.699.1997117.2 > > Firmenbuchnummer: 192003h > Firmenbuchgericht: Landesgericht Linz > > > > _______________________________________________ > naviserver-devel mailing list > nav...@li... > https://lists.sourceforge.net/lists/listinfo/naviserver-devel |
|
From: Wolfgang W. <wol...@di...> - 2025-05-05 10:50:33
|
Dear all, when I follow the example of: https://naviserver.sourceforge.io/n/naviserver/files/ns_crypto.html#1 % set d [ns_crypto::aead::encrypt string -cipher aes-128-gcm -iv 123456789 \ -key secret -encoding binary \ "hello world"] % ns_crypto::aead::decrypt string -cipher aes-128-gcm -iv 123456789 \ -key secret -tag [dict get $d tag] \ -encoding binary [dict get $d bytes] I get the error: "could not set tag value" I've tried it with naviserver 4.99.23 and 5.0 with OpenSSL 3.4.1. We'd like to use it, because it is so much faster than any other way of symmetric encryption for tcl or naviserver I'm aware of. Regards, Wolfgang Winkler -- *Wolfgang Winkler* Geschäftsführung wol...@di... mobil +43.699.19971172 dc:*büro* digital concepts Novak Winkler OG Software & Design Landstraße 68, 5. Stock, 4020 Linz www.digital-concepts.com <http://www.digital-concepts.com> tel +43.732.997117.72 tel +43.699.1997117.2 Firmenbuchnummer: 192003h Firmenbuchgericht: Landesgericht Linz |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-04-02 17:20:01
|
Dear all, While have dived into CSS, i’ve also added a dark-mode for the default index page, man pages, and nsstats. All the best -g |
|
From: Brian F. <bri...@ai...> - 2025-03-31 09:25:14
|
This looks fantastic! Great job.
Brian
________________________________
From: Gustaf Neumann (sslmail) <ne...@wu...>
Sent: Friday 28 March 2025 5:49 pm
To: nav...@li... <nav...@li...>
Subject: [naviserver-devel] Updated Online Documentation & Styling – Uniform, Responsive Design for NaviServer 5.0
Dear NaviServer Developers,
Over the past few days, I’ve been working on revamping our online documentation and styling. I’m pleased to share that we now have a uniform, responsive design for:
- The plain NaviServer start page
- The nsstats module
- The manual pages
Notably, the new design no longer depends on external libraries (we previously relied on Bootstrap 5 and, in part, on W3.CSS). While the current implementation is responsive to a high degree, there’s always room for further refinement.
You can preview the updated pages via the following links (please note that the man pages on SourceForge may take a short while to propagate to all regions – if something appears off, try reloading your browser):
Main Table of Contents:
https://naviserver.sourceforge.io/5.0/toc.html
Keyword Index:
https://naviserver.sourceforge.io/5.0/index.html
Command List:
https://naviserver.sourceforge.io/5.0/naviserver/files/commandlist.html
Sample Command Man Page (ns_conn):
https://naviserver.sourceforge.io/5.0/naviserver/files/ns_conn.html
Styling the documentation, which is produced by the Tcl doctools, is quite challenging, since the produced markup is widely old-style, and it allows only little influence on the output.
I welcome any feedback or suggestions you might have
All the best
-g
[cid:879...@EU...]
_______________________________________________
naviserver-devel mailing list
nav...@li...
https://lists.sourceforge.net/lists/listinfo/naviserver-devel
|
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-03-28 17:50:16
|
Dear NaviServer Developers,
Over the past few days, I’ve been working on revamping our online documentation and styling. I’m pleased to share that we now have a uniform, responsive design for:
- The plain NaviServer start page
- The nsstats module
- The manual pages
Notably, the new design no longer depends on external libraries (we previously relied on Bootstrap 5 and, in part, on W3.CSS). While the current implementation is responsive to a high degree, there’s always room for further refinement.
You can preview the updated pages via the following links (please note that the man pages on SourceForge may take a short while to propagate to all regions – if something appears off, try reloading your browser):
Main Table of Contents:
https://naviserver.sourceforge.io/5.0/toc.html
Keyword Index:
https://naviserver.sourceforge.io/5.0/index.html
Command List:
https://naviserver.sourceforge.io/5.0/naviserver/files/commandlist.html
Sample Command Man Page (ns_conn):
https://naviserver.sourceforge.io/5.0/naviserver/files/ns_conn.html
Styling the documentation, which is produced by the Tcl doctools, is quite challenging, since the produced markup is widely old-style, and it allows only little influence on the output.
I welcome any feedback or suggestions you might have
All the best
-g
|
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-31 14:16:10
|
Dear all, A stable version of the certificate validation management for outgoing HTTPS requests (ns_http, ns_connchan) for NaviServer 5 is now in the NaviServer repository on GitHub. The current documentation is also online: https://naviserver.sourceforge.io/5.0/manual/files/admin-config.html#subsection13 Let me know, if you have additional requirements in this regard. The newest version of NaviServer runs since this morning on openacs.org <http://openacs.org/>. All the best -gn > On 23.01.2025, at 18:43, Gustaf Neumann (sslmail) <ne...@wu...> wrote: > > Dear all, > > This mail is a warning, that after an upgrade to the newest version from git, some of your configuration files/applications might need adjustments, > > The newest commit to the main repository brings more security, by validating in ns_http client requests always the server certificate. While this is common for browsers, this is not necessarily the case for automated web operations (web services etc.), opening a large attack vector for man-in-the-middle attacks (see below). So far, checking the certificates was per default deactivated, which has the consequence, that in practice, many (most?) application developers just used with the defaults, leading to an unpleasant situation. Now, certificated checking is activated, it can be deactivated by adding the parameter “-insecure” to an “ns_http” request (there are other means, see below). > > The regression test (including self-signed certificates for HTTPS, revproxy, …) works fine. > > Next steps for me: > - check consequences for letsencrypt > - add similar changes to “ns_connchan open|connect" > - documentation of certificate management in detail (covering ns_http, ns_connchan, admin-config) > > We are getting closer to the release candiate... > > all the best > -gn > > > Security by default for HTTP client requests (ns_http) > > Background: Authenticating the peer is a critical part of SSL connection setup when a client connects to a server. In this process, the server presents its public-key certificate. If the results of this authentication is missing, a server might be vulnerable to man-in-the-middle attacks. Protection against this is one of the intentions of HTTPS, and becomes more important when backend transactions are performed via HTTPS (administration of servers, cloud infrastructure, payments, ...), establishing secure network tunnels, or when sending confidential information via HTTPs > > As the paper mentioned below points out, the validation of peer certificates is usually in place for web communication over the browser, but it is often not active for web service interactions. One reason for this is that application developers choose very often the default setup. > > The key instrument of NaviServer for performing HTTP client operations is ns_http, which certainly has the ability for certificate validation, but so far it was per default deactivated. This changes now with NaviServer 5, where the default is now including validation. > > One of the consequences of validating peer certificates is that the administrator has to care about certificates (what certificates are accepted), including management of self-signed certificates. > > We try to make the transition as smooth a possible by providing a reasonable default setup including established root certificates (ca-bundle.crt), providing simple means to add your own trusted certificates (including self-signed certificates). This default setup can be altered for a server via the configuration file, or for every single request via parameters. > > The most important changes are: > > - new parameter "-insecure" for "ns_http run" and "ns_http queue" > This parameter turns off certificate validation for the target HTTPS server. The name follows the naming convention of curl. > > - The old parameter "-validate" is a now a no-op. > Per default, all ns_http requests to HTTPS servers are now validated > > - Store certificates in directory ${NSHOME}/certificates instead of ${NSHOME}/etc > > - New configuration parameter "CApath" and "CAfile" for the "httpclient" section of a server to specify default locations for certificate validation. It is possible to override these values via parameters to "ns_http run" and "ns_http queue". > > Default configuration: > > ns/${server}/httpclient { > ns_param CAfile ... ;# default ${NSHOME}/ca-bundle.crt > ns_param CApath ... ;# default ${NSHOME}/certificates > } > > * "CAfile" points to a .pem file containing established root certificates, often named "ca-bundle.crt". This file contains multiple of these certificates. The version shipped with NaviServer is based on Mozilla's root certificates. Also, many operating systems provide these certificates (e.g., on Ubuntu /etc/ssl/certs/ca-certificates.crt). One can certainly use various sources, e.g. via symbolic links or configuration parameters. The file can be manually updated e.g. via > > curl https://curl.se/ca/cacert.pem -o /usr/local/ns/ca-bundle.crt > > * "CApath" points to a directory containing CA certificates in PEM > format. Each of the files must contain exactly one CA certificate (OpenSSL requirement). > > It is possible to add self-signed certificates to this directory to connect via ns_http with an HTTPS URL to this server, after running > > openssl rehash ${NSHOME}/certificates > > The rehash operation is performed automatically in the installation process. > > - New configuration parameter "insecure" for the "httpclient" section of a server > > The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software > https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf > > - Added certificate settings to sample configuration files nsd-config.tcl and openacs-config.tcl > > - Minor cleanup of Makefiles (improve consistency and configurability) > > - similar changes for "ns_connchan connect|open" will follow > |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-23 17:43:32
|
Dear all,
This mail is a warning, that after an upgrade to the newest version from git, some of your configuration files/applications might need adjustments,
The newest commit to the main repository brings more security, by validating in ns_http client requests always the server certificate. While this is common for browsers, this is not necessarily the case for automated web operations (web services etc.), opening a large attack vector for man-in-the-middle attacks (see below). So far, checking the certificates was per default deactivated, which has the consequence, that in practice, many (most?) application developers just used with the defaults, leading to an unpleasant situation. Now, certificated checking is activated, it can be deactivated by adding the parameter “-insecure” to an “ns_http” request (there are other means, see below).
The regression test (including self-signed certificates for HTTPS, revproxy, …) works fine.
Next steps for me:
- check consequences for letsencrypt
- add similar changes to “ns_connchan open|connect"
- documentation of certificate management in detail (covering ns_http, ns_connchan, admin-config)
We are getting closer to the release candiate...
all the best
-gn
Security by default for HTTP client requests (ns_http)
Background: Authenticating the peer is a critical part of SSL connection setup when a client connects to a server. In this process, the server presents its public-key certificate. If the results of this authentication is missing, a server might be vulnerable to man-in-the-middle attacks. Protection against this is one of the intentions of HTTPS, and becomes more important when backend transactions are performed via HTTPS (administration of servers, cloud infrastructure, payments, ...), establishing secure network tunnels, or when sending confidential information via HTTPs
As the paper mentioned below points out, the validation of peer certificates is usually in place for web communication over the browser, but it is often not active for web service interactions. One reason for this is that application developers choose very often the default setup.
The key instrument of NaviServer for performing HTTP client operations is ns_http, which certainly has the ability for certificate validation, but so far it was per default deactivated. This changes now with NaviServer 5, where the default is now including validation.
One of the consequences of validating peer certificates is that the administrator has to care about certificates (what certificates are accepted), including management of self-signed certificates.
We try to make the transition as smooth a possible by providing a reasonable default setup including established root certificates (ca-bundle.crt), providing simple means to add your own trusted certificates (including self-signed certificates). This default setup can be altered for a server via the configuration file, or for every single request via parameters.
The most important changes are:
- new parameter "-insecure" for "ns_http run" and "ns_http queue"
This parameter turns off certificate validation for the target HTTPS server. The name follows the naming convention of curl.
- The old parameter "-validate" is a now a no-op.
Per default, all ns_http requests to HTTPS servers are now validated
- Store certificates in directory ${NSHOME}/certificates instead of ${NSHOME}/etc
- New configuration parameter "CApath" and "CAfile" for the "httpclient" section of a server to specify default locations for certificate validation. It is possible to override these values via parameters to "ns_http run" and "ns_http queue".
Default configuration:
ns/${server}/httpclient {
ns_param CAfile ... ;# default ${NSHOME}/ca-bundle.crt
ns_param CApath ... ;# default ${NSHOME}/certificates
}
* "CAfile" points to a .pem file containing established root certificates, often named "ca-bundle.crt". This file contains multiple of these certificates. The version shipped with NaviServer is based on Mozilla's root certificates. Also, many operating systems provide these certificates (e.g., on Ubuntu /etc/ssl/certs/ca-certificates.crt). One can certainly use various sources, e.g. via symbolic links or configuration parameters. The file can be manually updated e.g. via
curl https://curl.se/ca/cacert.pem -o /usr/local/ns/ca-bundle.crt
* "CApath" points to a directory containing CA certificates in PEM
format. Each of the files must contain exactly one CA certificate (OpenSSL requirement).
It is possible to add self-signed certificates to this directory to connect via ns_http with an HTTPS URL to this server, after running
openssl rehash ${NSHOME}/certificates
The rehash operation is performed automatically in the installation process.
- New configuration parameter "insecure" for the "httpclient" section of a server
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software
https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
- Added certificate settings to sample configuration files nsd-config.tcl and openacs-config.tcl
- Minor cleanup of Makefiles (improve consistency and configurability)
- similar changes for "ns_connchan connect|open" will follow
|
|
From: Not S. <un...@cr...> - 2025-01-16 11:24:32
|
Hi Gustaf,
It does indeed. All those emails from me can be ignored.
Thank You,
David F
-----Original Message-----
From: Gustaf <ne...@wu...>
To: naviserver-devel <nav...@li...>
Date: Thursday, 16 January 2025 8:48 AM GMT
Subject: Re: [naviserver-devel] Appending to an multi-element dictonary
Dear David,
nsv_dict has mostly the same interface as the Tcl dict.
Wasn’t the question answered sufficiently by Harald in
https://core.tcl-lang.org/tcl/tktview/47fd91176d ?
All the best
-g
> On 15.01.2025, at 20:27, Not Spam <un...@cr...> wrote:
>
> Good evening,
>
> This may be more a coding issue but I'm not sure if this is by design, limited or programmed to, or that if you shouldn't be able to.
> However I've started heavily using dictionaries within as a in-house data-store and taken it out of context of the standard dictionary key-value design.
> On count, I am currently creating an dictionary of seven elements.
>
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "1" "Value 1"
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2" "Value 2"
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "3" "Value 3"
>
> nsv_dict get "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2"
> Result: Value 2
>
> and full store:
> nsv_dict get "MyDictonary" "Store"
> Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}}
>
> but if I was to append a forth value to this:
> nsv_dict append "MyDictonary" "Store" "Set" "Block" "Key" "Field" "4" "Value 4"
>
> this sets up the next result as:
> Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}BlockKeyField4Value 4}
>
> And that then anything afterwards throws the following error:
>
> [15/Jan/2025:19:12:11][17646.3ae1efc15100][-conn:default:default:1:1-] Error: GET /dictTest.ix, PeerAddress: 10.2.1.77
> : dict element in braces followed by "BlockKeyField4Value" instead of space
>
> My workaround which is of obtaining the result and than appending the new data to that and then setting the appended string as the new value to the same dictionary but it feels klunky.
> I'm not sure how to combat this apart from above.
>
> Should appending suppose to work?
>
> P.S: however as just testing after writing this email, It appears to occur in TCL too.
> % dict set MyDictonary store set block key field 1 "hello"
> store {set {block {key {field {1 hello}}}}}
> % dict set MyDictonary store set block key field 2 "hello"
> store {set {block {key {field {1 hello 2 hello}}}}}
> % dict append MyDictonary store set block key field 3 "hello"
> store {set {block {key {field {1 hello 2 hello}}}}setblockkeyfield3hello}
>
> Many Thanks,
> David F
>
> _______________________________________________
> naviserver-devel mailing list
> nav...@li...
> https://lists.sourceforge.net/lists/listinfo/naviserver-devel
_______________________________________________
naviserver-devel mailing list
nav...@li...
https://lists.sourceforge.net/lists/listinfo/naviserver-devel
|
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-16 08:48:27
|
Dear David,
nsv_dict has mostly the same interface as the Tcl dict.
Wasn’t the question answered sufficiently by Harald in
https://core.tcl-lang.org/tcl/tktview/47fd91176d ?
All the best
-g
> On 15.01.2025, at 20:27, Not Spam <un...@cr...> wrote:
>
> Good evening,
>
> This may be more a coding issue but I'm not sure if this is by design, limited or programmed to, or that if you shouldn't be able to.
> However I've started heavily using dictionaries within as a in-house data-store and taken it out of context of the standard dictionary key-value design.
> On count, I am currently creating an dictionary of seven elements.
>
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "1" "Value 1"
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2" "Value 2"
> nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "3" "Value 3"
>
> nsv_dict get "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2"
> Result: Value 2
>
> and full store:
> nsv_dict get "MyDictonary" "Store"
> Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}}
>
> but if I was to append a forth value to this:
> nsv_dict append "MyDictonary" "Store" "Set" "Block" "Key" "Field" "4" "Value 4"
>
> this sets up the next result as:
> Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}BlockKeyField4Value 4}
>
> And that then anything afterwards throws the following error:
>
> [15/Jan/2025:19:12:11][17646.3ae1efc15100][-conn:default:default:1:1-] Error: GET /dictTest.ix, PeerAddress: 10.2.1.77
> : dict element in braces followed by "BlockKeyField4Value" instead of space
>
> My workaround which is of obtaining the result and than appending the new data to that and then setting the appended string as the new value to the same dictionary but it feels klunky.
> I'm not sure how to combat this apart from above.
>
> Should appending suppose to work?
>
> P.S: however as just testing after writing this email, It appears to occur in TCL too.
> % dict set MyDictonary store set block key field 1 "hello"
> store {set {block {key {field {1 hello}}}}}
> % dict set MyDictonary store set block key field 2 "hello"
> store {set {block {key {field {1 hello 2 hello}}}}}
> % dict append MyDictonary store set block key field 3 "hello"
> store {set {block {key {field {1 hello 2 hello}}}}setblockkeyfield3hello}
>
> Many Thanks,
> David F
>
> _______________________________________________
> naviserver-devel mailing list
> nav...@li...
> https://lists.sourceforge.net/lists/listinfo/naviserver-devel
|
|
From: Not S. <un...@cr...> - 2025-01-15 22:09:07
|
Sorry, I mis-explained, what I mean I wish to append to value 4 to index 2
nsv_dict append "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2" "Value 4"
Set {Block {Key {Field {1 {Value 1} 2 {Value 2 Value 4} 3 {Value 3}}}}}
-----Original Message-----
From: Not <un...@cr...>
To: naviserver-devel <nav...@li...>
Date: Wednesday, 15 January 2025 7:46 PM GMT
Subject: [naviserver-devel] Appending to an multi-element dictonary
Good evening,
This may be more a coding issue but I'm not sure if this is by design, limited or programmed to, or that if you shouldn't be able to.
However I've started heavily using dictionaries within as a in-house data-store and taken it out of context of the standard dictionary key-value design.
On count, I am currently creating an dictionary of seven elements.
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "1" "Value 1"
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2" "Value 2"
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "3" "Value 3"
nsv_dict get "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2"
Result: Value 2
and full store:
nsv_dict get "MyDictonary" "Store"
Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}}
but if I was to append a forth value to this:
nsv_dict append "MyDictonary" "Store" "Set" "Block" "Key" "Field" "4" "Value 4"
this sets up the next result as:
Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}BlockKeyField4Value 4}
And that then anything afterwards throws the following error:
[15/Jan/2025:19:12:11][17646.3ae1efc15100][-conn:default:default:1:1-] Error: GET /dictTest.ix, PeerAddress: 10.2.1.77
: dict element in braces followed by "BlockKeyField4Value" instead of space
My workaround which is of obtaining the result and than appending the new data to that and then setting the appended string as the new value to the same dictionary but it feels klunky.
I'm not sure how to combat this apart from above.
Should appending suppose to work?
P.S: however as just testing after writing this email, It appears to occur in TCL too.
% dict set MyDictonary store set block key field 1 "hello"
store {set {block {key {field {1 hello}}}}}
% dict set MyDictonary store set block key field 2 "hello"
store {set {block {key {field {1 hello 2 hello}}}}}
% dict append MyDictonary store set block key field 3 "hello"
store {set {block {key {field {1 hello 2 hello}}}}setblockkeyfield3hello}
Many Thanks,
David F
_______________________________________________
naviserver-devel mailing list
nav...@li...
https://lists.sourceforge.net/lists/listinfo/naviserver-devel
|
|
From: Not S. <un...@cr...> - 2025-01-15 19:46:40
|
Good evening,
This may be more a coding issue but I'm not sure if this is by design, limited or programmed to, or that if you shouldn't be able to.
However I've started heavily using dictionaries within as a in-house data-store and taken it out of context of the standard dictionary key-value design.
On count, I am currently creating an dictionary of seven elements.
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "1" "Value 1"
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2" "Value 2"
nsv_dict set "MyDictonary" "Store" "Set" "Block" "Key" "Field" "3" "Value 3"
nsv_dict get "MyDictonary" "Store" "Set" "Block" "Key" "Field" "2"
Result: Value 2
and full store:
nsv_dict get "MyDictonary" "Store"
Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}}
but if I was to append a forth value to this:
nsv_dict append "MyDictonary" "Store" "Set" "Block" "Key" "Field" "4" "Value 4"
this sets up the next result as:
Set {Block {Key {Field {1 {Value 1} 2 {Value 2} 3 {Value 3}}}}BlockKeyField4Value 4}
And that then anything afterwards throws the following error:
[15/Jan/2025:19:12:11][17646.3ae1efc15100][-conn:default:default:1:1-] Error: GET /dictTest.ix, PeerAddress: 10.2.1.77
: dict element in braces followed by "BlockKeyField4Value" instead of space
My workaround which is of obtaining the result and than appending the new data to that and then setting the appended string as the new value to the same dictionary but it feels klunky.
I'm not sure how to combat this apart from above.
Should appending suppose to work?
P.S: however as just testing after writing this email, It appears to occur in TCL too.
% dict set MyDictonary store set block key field 1 "hello"
store {set {block {key {field {1 hello}}}}}
% dict set MyDictonary store set block key field 2 "hello"
store {set {block {key {field {1 hello 2 hello}}}}}
% dict append MyDictonary store set block key field 3 "hello"
store {set {block {key {field {1 hello 2 hello}}}}setblockkeyfield3hello}
Many Thanks,
David F
|
|
From: Wolfgang W. <wol...@di...> - 2025-01-07 06:51:49
|
We will still need some testing, but it shouldn't take too long. The code depends on our session handling, but it can be refactored to include more generic procedures and an example using NSV as session storage. The result can be made available on GitHub. Cheers, Wolfgang Am 03.01.25 um 12:49 schrieb Gustaf Neumann (sslmail): > > >> Wow, this was fast. > A good architecture pays off in such cases! >> >> If anyone is interested in Passkeys and WebAuthn: I can provide the >> Javascript/Tcl/Naviserver details. Integration in any kind of >> framework should be quite easy. >> > > Yes, please! I think, this would be very helpful for many. > If this is appropriate, i could create a modules in the naviserver > space on github and provide you with the necessary rights… > > all the best -g > > > _______________________________________________ > naviserver-devel mailing list > nav...@li... > https://lists.sourceforge.net/lists/listinfo/naviserver-devel -- |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-03 11:50:14
|
> Wow, this was fast. A good architecture pays off in such cases! > If anyone is interested in Passkeys and WebAuthn: I can provide the Javascript/Tcl/Naviserver details. Integration in any kind of framework should be quite easy. > Yes, please! I think, this would be very helpful for many. If this is appropriate, i could create a modules in the naviserver space on github and provide you with the necessary rights… all the best -g |
|
From: Wolfgang W. <wol...@di...> - 2025-01-03 11:43:43
|
Wow, this was fast. It was meant as a question but it's really nice to have. If anyone is interested in Passkeys and WebAuthn: I can provide the Javascript/Tcl/Naviserver details. Integration in any kind of framework should be quite easy. Thank you, Wolfgang Winkler Am 03.01.25 um 10:43 schrieb Gustaf Neumann (sslmail): > >>> For this I currently write the .pem file to disk (after conversion from .der to .pem). Is it possible to circumvent this? We store the public key data in the database and it would be nice to use it as string. >> If this is meant as a feature requests, …. > In the updated version of NaviServer, one can now provide PEM content as strings, wherever PEM content is used for reading. Examples are in the regression test. > All the best > .g > > > > _______________________________________________ > naviserver-devel mailing list > nav...@li... > https://lists.sourceforge.net/lists/listinfo/naviserver-devel -- *Wolfgang Winkler* Geschäftsführung wol...@di... mobil +43.699.19971172 dc:*büro* digital concepts Novak Winkler OG Software & Design Landstraße 68, 5. Stock, 4020 Linz www.digital-concepts.com <http://www.digital-concepts.com> tel +43.732.997117.72 tel +43.699.1997117.2 Firmenbuchnummer: 192003h Firmenbuchgericht: Landesgericht Linz |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-03 09:44:15
|
>> For this I currently write the .pem file to disk (after conversion from .der to .pem). Is it possible to circumvent this? We store the public key data in the database and it would be nice to use it as string. > > If this is meant as a feature requests, …. In the updated version of NaviServer, one can now provide PEM content as strings, wherever PEM content is used for reading. Examples are in the regression test. All the best .g |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2025-01-03 09:09:20
|
> For this I currently write the .pem file to disk (after conversion from .der to .pem). Is it possible to circumvent this? We store the public key data in the database and it would be nice to use it as string. if this is meant as a question, the answer is no, currently NaviServer is using the file-based OpenSSL API. If this is meant as a feature requests, …. i had this as well on my agenda but no urge for it, since writing a PEM to the file is pretty fast and can be done on the Tcl layer as well. -g |
|
From: Wolfgang W. <wol...@di...> - 2025-01-03 08:50:15
|
Dear all,
I am currently writing a client for integrating webauthn into
naviserver. It's a bunch of Javascript, a lot of encoding/decoding and
some crypthography.
The various kinks are ironed out, and I can register users and verify
webauthn.get responses.
Here's my question: I am using
::ns_crypto::md string -digest sha256 -verify ${req}.pem -signature
$signature -binary $data_to_sign
to verify the signature of the data I get from the webauthn provider.
For this I currently write the .pem file to disk (after conversion from
.der to .pem). Is it possible to circumvent this? We store the public
key data in the database and it would be nice to use it as string.
Thanks for your input,
Wolfgang Winkler
--
*Wolfgang Winkler*
Geschäftsführung
wol...@di...
mobil +43.699.19971172
dc:*büro*
digital concepts Novak Winkler OG
Software & Design
Landstraße 68, 5. Stock, 4020 Linz
www.digital-concepts.com <http://www.digital-concepts.com>
tel +43.732.997117.72
tel +43.699.1997117.2
Firmenbuchnummer: 192003h
Firmenbuchgericht: Landesgericht Linz
|
|
From: Brian F. <bri...@ai...> - 2024-12-30 13:46:57
|
Hello This is still an issue for us. Would this be a possible feature to add? thanks Brian ________________________________ From: Brian Fenton <bri...@ai...> Sent: Friday 27 October 2023 5:56 pm To: nav...@li... <nav...@li...> Subject: [naviserver-devel] Proposal: config file boolean parameter "showserverheader" to show/hide "Server:" response header Hi all Recently during a client security audit, the "Server: NaviServer/4.99.28" response header was flagged as an issue. The client has asked us to remove the header, if possible. The RFC suggests that the "Server: " header is optional, so I believe this should be OK to remove. https://www.rfc-editor.org/rfc/rfc7231#section-7.4.2 We would like to propose a new config file boolean parameter "showserverheader" with default true. Ns_ConnConstructHeaders in return.c could then check this parameter before outputting the "Server: " header e.g. something like this: if (Ns_ConfigBool(path, "showserverheader", NS_TRUE) == NS_TRUE) { Ns_DStringVarAppend(dsPtr, "Server: ", Ns_InfoServerName(), "/", Ns_InfoServerVersion(), "\r\n"); } Thoughts? Alternatives? thanks Brian _______________________________________________ naviserver-devel mailing list nav...@li... https://lists.sourceforge.net/lists/listinfo/naviserver-devel |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2024-12-10 13:56:33
|
I have addressed the work items below, all changes are in the repository. The “keyl*” commands are now deprecated. Furthermore, i added a section to admin-tuning explaining the spooling threads (in essence the driver and writer threads) and worked as well through the other sections, removed some SGI stuff, etc. https://naviserver.sourceforge.io/5.0/manual/files/admin-tuning.html Altogether, we have 90 commands/subcommands deprecated. I am still planning for the release to add an option to build NaviServer without the deprecated commands (default is with deprecated commands). Why should every NaviServer binary carry these around? Esp. for constraint environments, this is not desired. All the best -g > The statistics refer just to the commands starting with “ns” to leave out some of the internals, which are not too many. > We have 6 C implemented commands not starting with the usual NaviServer prefix, and one command which was intentionally not documented: > > - I will document “ns_crash”, If no one objects. > > - the keyl* commands are inherited from TclX. From my point of view, there is little reason to use in new programs, since it resembles in essence the Tcl “dict” functionality with a different syntax. > (correct me, if I'm wrong am wrong). > > I see the following options > * deprecate it > * put it into a separate module > * drop it, since tclx is still maintained by flightaware (https://github.com/flightaware/tclx/), so people can load it via “package require”. > > I am in favor of deprecating it in NaviServer 5, such that users get warned about its usage. > > - _ns_adp_include: In my understanding, the only reason for having a command “ns_adp_include” and a separate command “_ns_adp_include” is the proc call-frame on the top-level to keep local variables. It should be possible to create this call-frame via the public API of Tcl. I will look into this. > > As always, feedback is welcome. > > -g |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2024-12-08 16:17:14
|
>
> ------------> 48 occurrences of deprecated commands in documentation
>
> so, cleanup item 6 is
>
> 6) documentation should not be based on deprecated commands
>
The mentioned issues are fixed.
Here is the summary of the current state of the cleanup:
Tested commands
------------> 709 tested commands, 86 deprecated, 639 documented, 0 NOT documented
------------> 0 usage message differ from doc, 639 are identical
Documented commands
------------> 639 documented commands, 639 tested, 0 NOT tested
Deprecated commands
------------> 0 deprecated commands are documented
------------> 0 occurrences of deprecated commands in documentation
------------> 38 deprecated commands are tested
C-implemented commands:
C-implemented command is not documented: _ns_adp_include
C-implemented command is not documented: exit
C-implemented command is not documented: chilled
C-implemented command is not documented: keylget
C-implemented command is not documented: keylkeys
C-implemented command is not documented: keylset
C-implemented command is not documented: ns_crash
The statistics refer just to the commands starting with “ns” to leave out some of the internals, which are not too many.
We have 6 C implemented commands not starting with the usual NaviServer prefix, and one command which was intentionally not documented:
- I will document “ns_crash”, If no one objects.
- the keyl* commands are inherited from TclX. From my point of view, there is little reason to use in new programs, since it resembles in essence the Tcl “dict” functionality with a different syntax.
(correct me, if I'm wrong am wrong).
I see the following options
* deprecate it
* put it into a separate module
* drop it, since tclx is still maintained by flightaware (https://github.com/flightaware/tclx/), so people can load it via “package require”.
I am in favor of deprecating it in NaviServer 5, such that users get warned about its usage.
- _ns_adp_include: In my understanding, the only reason for having a command “ns_adp_include” and a separate command “_ns_adp_include” is the proc call-frame on the top-level to keep local variables. It should be possible to create this call-frame via the public API of Tcl. I will look into this.
As always, feedback is welcome.
-g |
|
From: Gustaf N. (sslmail) <ne...@wu...> - 2024-12-08 11:15:09
|
Many thanks for the feedback. There are actually multiple forks around. i’ve tried to summarize the situation about the availability in the new man page and added basic support for NaviServer 5. Based on the implementation, NaviServer sever supported the TclPro Debugger (function missing, the leftovers from AOLserver were broken, etc.). Details for the state and installation is now in the man page: https://naviserver.sourceforge.io/5.0/naviserver/files/ns_adp_debug.html all the best -g > On 07.12.2024, at 22:40, Georg Lehner <jor...@ma...> wrote: > FWIW: At some moment Flighaware issued a bounty on reactivating the TclPro Debugger. I found an email from Steve Bennet from 3rd of July of 2017, when he announces that they made it available on github in the repo flightaware/TclProDebug. That's all I can add. I don't use debuggers a lot and have not used TclProDebug. > > Best Regards, > > Georg > |
|
From: Georg L. <jor...@ma...> - 2024-12-07 22:06:53
|
Hello Gustaf, Your dedication is impressive, thank you! FWIW: At some moment Flighaware issued a bounty on reactivating the TclPro Debugger. I found an email from Steve Bennet from 3rd of July of 2017, when he announces that they made it available on github in the repo flightaware/TclProDebug. That's all I can add. I don't use debuggers a lot and have not used TclProDebug. Best Regards, Georg On 12/4/24 13:57, Gustaf Neumann (sslmail) wrote: > Dear fellow NaviServer users and developers, > > this is a progress report on the cleanup. Points 1-5 are done, no all > the parameters implemented are also documented in the manual pages, > the last days I fixed the documentation of 330 API calls, where the > implementation and the documentation differed. > >> > 1) all commands tested in the regression test should be documented >> > 2) all documented commands should be tested (at least syntax-tested) >> > 3) all implemented commands should be tested >> > 4) the parameters of the implemented commands should be >> documented and vice versa. >> > 5) deprecated commands should be listed in the deprecated section >> of the command listing in the documentation, but not advertised in >> the documentation > > While going through the man pages, I had to rewrite several of these, > since it was describing what the documentation does, and sometimes, it > was not clear to me, what the commands were exactly about, and how it > can/should be used. Therefore, I added several examples that should > help users. The mostly rewritten man pages include: > > https://naviserver.sourceforge.io/5.0/naviserver/files/ns_adp_register.html > https://naviserver.sourceforge.io/5.0/naviserver/files/ns_set.html > https://naviserver.sourceforge.io/5.0/naviserver/files/ns_upload_stats.html > https://naviserver.sourceforge.io/5.0/naviserver/files/ns_urlspace.html > > > These are links to the new NaviServer 5 man pages. Please check. > In case, you are aware of more unclear documentation, or you would > like to see usage examples in the manual please, please contact me. I > will see what i can do. > > As discussed before, I have marked the former TDB calls mentioned > before as deprecated: > > ns_browsermatch > ns_choosecharset > ns_cookiecharset > ns_formfieldcharset > ns_formvalueput > ns_paren > ns_tagelement > ns_tagelementset > > Based on the no overwhelming feedback concerning > > ns_requestauthorize > ns_checkurl > > > My plan is to mark the latter one as deprecated and update the > documentation of the first one. > > The commands which are deprecated are not advertised as commands in > man pages anymore. However, I realized still some long-time burden: > Some parts of the documentation are still referring to deprecated > commands. > > ------------> 48 occurrences of deprecated commands in documentation > > > so, cleanup item 6 is > > 6) documentation should not be based on deprecated commands > > > After having modified a few hundred man pages, these figures don’t > shock me anymore, … but it will need again some more time. > > One more API call requiring decisions is > > ns_adp_debug > > > The call provides an interface to the TclPro debugger. I don’t have > it, so i can’t test it. Has anyone experiences with this? > > After digging around the state is: > - After Scriptics went down the TclPro suite of tools became the > ActiveState TclDevKit suite of tools > - After ActiveState stopped managing the TDK, all the sources became > open https://github.com/activestate/tdk > - There are a few forks including > https://github.com/puremourning/TclProDebug and > https://github.com/apnadkarni/TclProDebug > > The newer forks show some activity, the fork of Ashok has Tcl9 support > (but Ashok is not using it). > > My current state of mind is that we keep maintaining the interface, we > improve on the documentation and i’ll check, if the interfaces are > still the same. > > All the best > -g > > PS: I got several other mails concerning NaviServer. These are not > ignored, i will come back to you on these. > >> >> At least 1 and 2 are finished by today. This week, i have added over >> 700 tests to the regression test, which was hard work and took all my >> resources. We have now 2608 tests in the NaviServer 5 regression test >> vs. 1893 in the newest 4.99 branch: >> >> % egrep -r --include=*.test '^test ' /usr/local/src/naviserver/ >> |wc -l >> 2608 >> >> % egrep -r --include=*.test '^test ' >> /usr/local/src/naviserver-4.99/ |wc -l >> 1893 >> >> >> The current state is not perfect, but a progress. >> >> Tested commands not documented >> ------------> 706 tested commands, 72 deprecated, 648 >> documented, 0 NOT documented >> >> Documented commands not tested >> ------------> 648 documented commands, 648 tested, 0 NOT tested >> >> Deprecated commands which are documented >> ------------> 0 deprecated commands are documented >> >> >> The next goal is to check the alignment of the argument lists of the >> implementation with the documentation. >> >> On my wishlist is also a non-deprecated mode switchable via >> configuration file, where NaviServer offers only non-deprecated commands. >> >> In the meanwhile, something to think about for you: We have still a >> bunch of commands, which have a questionable future. These commands >> are in a "TBD" state for 19 years. >> >> I think, we should deprecate these commands (see below for the list) >> in the NaviServer 5 release. >> Please speak up, if your applications need these: >> >> ns_browsermatch >> ns_choosecharset >> ns_cookiecharset >> ns_formfieldcharset >> ns_formvalueput >> ns_paren >> ns_tagelement >> ns_tagelementset >> >> All the best >> -g > > > > _______________________________________________ > naviserver-devel mailing list > nav...@li... > https://lists.sourceforge.net/lists/listinfo/naviserver-devel |