1. 13 Sep, 2015 1 commit
  2. 11 Sep, 2015 1 commit
  3. 06 Aug, 2015 1 commit
  4. 04 Aug, 2015 2 commits
  5. 08 Jul, 2015 2 commits
  6. 26 Jan, 2015 1 commit
    • Julien Ruffin's avatar
      Added socket option ZMQ_INVERT_MATCHING. · cf2238f8
      Julien Ruffin authored
      ZMQ_INVERT_MATCHING reverses the PUB/SUB prefix matching. The subscription
      list becomes a rejection list. The PUB socket sends messages to all
      connected (X)SUB sockets that do not have any matching subscription.
      
      Whenever the option is used on a PUB/XPUB socket, any connecting SUB
      sockets must also set it or they will reject everything the publisher
      sends them. XSUB sockets are unaffected because they do not filter out
      incoming messages.
      cf2238f8
  7. 09 Jan, 2015 1 commit
  8. 08 Nov, 2014 1 commit
  9. 12 Aug, 2014 1 commit
  10. 20 Jun, 2014 1 commit
  11. 12 May, 2014 1 commit
  12. 09 May, 2014 1 commit
  13. 01 Jan, 2014 2 commits
    • Pieter Hintjens's avatar
      Removed ZMQ_ZAP_IPC_CREDS option · 5bf96f64
      Pieter Hintjens authored
      - This seems redundant; is there a use case for NOT providing
        the IPC credentials to the ZAP authenticator?
      
      - More, why is IPC authentication done via libzmq instead of ZAP?
        Is it because we're missing the transport type on the ZAP request?
      5bf96f64
    • Pieter Hintjens's avatar
      Reordered socket options · adf5b45d
      Pieter Hintjens authored
      - put into alphabetical order
      - there was no consistency in previous ordering
      adf5b45d
  14. 06 Dec, 2013 1 commit
    • Brandon Carpenter's avatar
      Add support for extending ZAP request address with IPC peer credentials. · a018ef5e
      Brandon Carpenter authored
      Another take on LIBZMQ-568 to allow filtering IPC connections, this time
      using ZAP.  This change is backward compatible.  If the
      ZMQ_ZAP_IPC_CREDS option is set, the user, group, and process IDs of the
      peer process are appended to the address (separated by colons) of a ZAP
      request; otherwise, nothing changes.  See LIBZMQ-568 and zmq_setsockopt
      documentation for more information.
      a018ef5e
  15. 25 Nov, 2013 1 commit
  16. 09 Oct, 2013 1 commit
  17. 20 Sep, 2013 1 commit
    • Pieter Hintjens's avatar
      Renamed new socket options to be clearer · 5e609be3
      Pieter Hintjens authored
      * ZMQ_REQ_STRICT was negative option (default 1) which goes against
        the standard, where defaults are zero. I renamed this to
        ZMQ_REQ_RELAXED.
      
      * ZMQ_REQ_REQUEST_IDS felt clumsy and describes the technical solution
        rather than the problem/requirement. I changed to ZMQ_REQ_CORRELATE
        which seems more explicit.
      5e609be3
  18. 12 Sep, 2013 1 commit
    • Pieter Hintjens's avatar
      Fixed overwrite in zmq_getsockopt · 345bf146
      Pieter Hintjens authored
      On ZMQ_CURVE_xxxKEY fetches, would return 41 bytes into caller's 40-byte
      buffer. Now these fetches only return 41 bytes if the caller explicitly
      provides a 41-byte buffer (i.e. the option size is 41).
      345bf146
  19. 09 Sep, 2013 1 commit
    • Pieter Hintjens's avatar
      Added ZMQ_ZAP_DOMAIN socket option · 6725c464
      Pieter Hintjens authored
      * This is passed to the ZAP handler in the 'domain' field
      
      * If not set, or empty, then NULL security does not call the ZAP handler
      
      * This resolves the phantom ZAP request syndrome seen with sockets where
        security was never intended (e.g. in test cases)
      
      * This means if you install a ZAP handler, it will not get any requests
        for new connections until you take some explicit action, which can be
        setting a username/password for PLAIN, a key for CURVE, or the domain
        for NULL.
      6725c464
  20. 28 Jun, 2013 1 commit
    • Pieter Hintjens's avatar
      Added Z85 support · 70417701
      Pieter Hintjens authored
      The use of binary for CURVE keys is painful; you cannot easily copy
      these in e.g. email, or use them directly in source code. There are
      various encoding possibilities. Base16 and Base64 are not optimal.
      Ascii85 is not safe for source (it generates quotes and escapes).
      
      So, I've designed a new Base85 encoding, Z85, which is safe to use
      in code and elsewhere, and I've modified libzmq to use this where
      it also uses binary keys (in get/setsockopt).
      
      Very simply, if you use a 32-byte value, it's Base256 (binary),
      and if you use a 40-byte value, it's Base85 (Z85).
      
      I've put the Z85 codec into z85_codec.hpp, it's not elegant C++
      but it is minimal and it works. Feel free to rewrap as a real class
      if this annoys you.
      70417701
  21. 15 May, 2013 1 commit
    • Pieter Hintjens's avatar
      Added configuration for PLAIN security · e1f797b0
      Pieter Hintjens authored
      * ZMQ_PLAIN_SERVER, ZMQ_PLAIN_USERNAME, ZMQ_PLAIN_PASSWORD options
      * Man page changes to zmq_setsockopt and zmq_getsockopt
      * Man pages for ZMQ_NULL, ZMQ_PLAIN, and ZMQ_CURVE
      * Test program test_security
      e1f797b0
  22. 15 Apr, 2013 1 commit
  23. 17 Mar, 2013 1 commit
  24. 31 Jan, 2013 1 commit
  25. 31 Oct, 2012 1 commit
  26. 12 Jun, 2012 2 commits
    • Ian Barber's avatar
      Allow blocking while connect() is completing · e5904e63
      Ian Barber authored
      This patch, salvaged from a trainwreck accidental merge earlier, adds a
      new sockopt, ZMQ_DELAY_ATTACH_ON_CONNECT which prevents a end point
      being available to push messages to until it has fully connected, making
      connect work more like bind. This also applies to reconnecting sockets,
      which may cause message loss of in-queue messages, so it is sensible to
      use this in conjunction with a low HWM and potentially an alternative
      acknowledgement path.
      
      Notes on most of the individual commits can be found the repository log.
      e5904e63
    • Ian Barber's avatar
      Revert "After speaking with Ben Gray and the discussion on the mailing list,… · 95cbad38
      Ian Barber authored
      Revert "After speaking with Ben Gray and the discussion on the mailing list, this is an attempt to create a sockopt to allow connecting pipes to not immediately be available for traffic. The problem is in a PUSH to many PULL situation, where there is a connect to a PULL which is not there. This connect will immediately create a pipe (unlike bind), and traffic will be load balanced to that pipe. This means if there is a persistently unavailable end point then the traffic will queue until HWM is hit, and older messages will be lost."
      
      This reverts commit fe3fb419.
      95cbad38
  27. 01 Jun, 2012 1 commit
    • Ian Barber's avatar
      After speaking with Ben Gray and the discussion on the mailing list, this is an… · fe3fb419
      Ian Barber authored
      After speaking with Ben Gray and the discussion on the mailing list, this is an attempt to create a sockopt to allow connecting pipes to not immediately be available for traffic. The problem is in a PUSH to many PULL situation, where there is a connect to a PULL which is not there. This connect will immediately create a pipe (unlike bind), and traffic will be load balanced to that pipe. This means if there is a persistently unavailable end point then the traffic will queue until HWM is hit, and older messages will be lost.
      
      This patch adds a sockopt ZMQ_DELAY_ATTACH_ON_CONNECT, which if set to 1 will attempt to preempt this behavior. It does this by extending the use of the session_base to include in the outbound as well as the inbound pipe, and only associates the pipe with the socket once it receives the connected callback via a process_attach message. This works, and a test has been added to show so, but may introduce unexpected complications. The shutdown logic in this class has become marginally more awkward because of this, requiring the session to serve as the sink for both pipes if shutdown occurs with a still-connecting pipe in place. It is also possible there could be issues around flushing the messages, but as I could not directly think how to create such an issue I have not written any code with regards to that.
      
      The documentation has been updated to reflect the change, but please do check over the code and test and review.
      fe3fb419
  28. 22 May, 2012 1 commit
  29. 20 May, 2012 1 commit
  30. 13 May, 2012 1 commit
    • KennyTM~'s avatar
      Allow the ZMQ_MONITOR code compilable on gcc 4.7 on Linux. · c995de65
      KennyTM~ authored
      The current ZMQ_MONITOR code does not compile in gcc 4.7, as -pedantic
      and -Werror are enabled, and ISO C++ doesn't allow casting between
      normal pointers (void*) and function pointers, as pedantically their
      size could be different. This caused the library not compilable. This
      commit workaround the problem by introducing one more indirection, i.e.
      instead of calling
      
          (void *)listener
      
      which is an error, we have to use
      
          *(void **)&listener
      
      which is an undefined behavior :) but works on most platforms
      
      Also, `optval_ = monitor` will not set the parameter in getsockopt(),
      and the extra casting caused the LHS to be an rvalue which again makes
      the code not compilable. The proper way is to pass a pointer of function
      pointer and assign with indirection, i.e. `*optval_ = monitor`.
      
      Also, fixed an asciidoc error in zmq_getsockopt.txt because the `~~~~`
      is too long.
      c995de65
  31. 04 May, 2012 1 commit
  32. 27 Apr, 2012 2 commits
  33. 09 Apr, 2012 1 commit
  34. 06 Apr, 2012 1 commit
  35. 20 Mar, 2012 1 commit