Releases: SentryPeer/SentryPeer
Releases · SentryPeer/SentryPeer
v4.0.4
Stable release
Fixes
- Switch to
Args::parse_from(), so cli works when using musl libc as per FFI, ALpine, musl and C and aports issue
v4.0.3
v4.0.2
v4.0.1
v4.0.0
Stable release
Changes
- SIP TLS support, using Rust and Tokio-rustls
- If no
cert.pemorkey.pemfiles are found, we automatically create them for you in the current working directory for a seemless start up experience -Noption to revert to old C way withselect()for TCP and UDP- TCP, UDP now all powered by Rust and Tokio
- We now support TLS configuration loaded from config using confy
- If a cert or key file is not found using
-tor-koptions, SentryPeer will
ask you if you'd like to create them - we use the very nice rcgen for this - New
-z, -tand-k` options for SIP TLS support - Command Line Interface (CLI) now powered by Rust using clap-rs
- Environment variables
SENTRYPEER_CERT,SENTRYPEER_KEYandSENTRYPEER_TLS_LISTEN_ADDRESS - We now look for
cargoandrustc, as we are porting parts of SentryPeer to Rust. New features will be written in Rust - SIP TLS support and other Rust-powered features will not be built if Rust is not detected.
make checknow runs Rust testsmake cleancleans up Rust builds--enable-debugargument added to./configureto enable debug mode for Rust code. Default is--release--enable-silent-rulesandmake V=1honoured in Rust code build--disable-rustargument added to./configureso you can disable Rust code buildCMakeLists.txtupdated to build Rust code and run all tests. We're using https://github.com/corrosion-rs/corrosion for this- README.md updated to reflect the new Rust code build options, and CMake build instructions that now also
include Rust code and running our tests - Show
CPPFLAGSandLDFLAGSinconfigurestatus summary as needed to do macOS builds if on arm64
v3.0.2
v3.0.1
Stable release
- Add a check for a response code of 403 to trigger a new access token request for WebHooks in addition to a 401
Changes
-pedantic-errorsis now enabled by default inMakefile.am
Fixes
- Switch to
getsockname()to correctly get destination IP address for SIP TCP mode - Check for a blank
User-agentSIP header and add a test case. Only a missing one was catered for before.
v3.0.0
Stable release
- OAuth2 support for sending events to the SentryPeerHQ RESTful API (client_credentials grant type) with
a Bearer token in the Authorization header
Fixes
- Clean up memory leaks in libcurl code when sending events to a WebHook url
- Fix segfault on parsing part of a 'To' SIP header that could be NULL
- Fix failing sqlite test on macOS
v2.0.1
Stable release
- Re-work dht memory usage
- cppcheck work in tests
- Clearly state that Peer to Peer mode is off by default in the docs and that setting an environment variable to
anything, e.g.0will enable that particular mode. We don't care what you set it to, just that it's set.
Fixes
- Fix config trying to free an OpenDHT member that isn't present if not built with OpenDHT
v2.0.0
Stable release
- Added optional
-w https://my_sentrypeerhq_onprem_or_cloud_url/eventsWebHook cli/env var to set URL for bad actor
JSON to be sent to SentryPeerHQ for the dashboard and other services - Removed local incomplete web gui. This will be replaced by a new FL/OSS project called SentryPeerHQ
Breaking Changes
-wnow requires a URL to be set as it is used for the WebHook to SentryPeerHQ.
Before it enabled the local Web UI which has been removed.
Tests
- Added tests for new WebHook feature