1. 22 Jun, 2014 1 commit
    • Martin Hurton's avatar
      Add support for SOCKS proxies · f06ca69a
      Martin Hurton authored
      This is still raw and experimental.
      To connect through a SOCKS proxy, set ZMQ_SOCKS_PROXY socket option on
      socket before issuing a connect call, e.g.:
      
          zmq_setsockopt (s, ZMQ_SOCKS_PROXY,
              "127.0.0.1:22222", strlen ("127.0.0.1:22222"));
          zmq_connect (s, "tcp://127.0.0.1:5555");
      
      Known limitations:
      - only SOCKS version 5 supported
      - authentication not supported
      - new option is still undocumented
      f06ca69a
  2. 20 Jun, 2014 2 commits
  3. 17 Jun, 2014 3 commits
    • Trevor Bernard's avatar
      Merge pull request #1096 from hintjens/master · cac5e74d
      Trevor Bernard authored
      Problem: API violations are treated as recoverable errors
      cac5e74d
    • Pieter Hintjens's avatar
      d0667461
    • Pieter Hintjens's avatar
      Problem: API violations are treated as recoverable errors · b4ed3f55
      Pieter Hintjens authored
      The example is applications passing invalid arguments to a socket option
      and then failing to check the return code. The results can be very hard
      to diagnose. Here are some threads that show the pain this causes:
      
      * https://github.com/zeromq/zyre/issues/179
      * http://lists.zeromq.org/pipermail/zeromq-dev/2014-June/026388.html
      
      One common argument is that a library should never assert, and should
      pass errors back to the calling application. The counter argument is
      that when an application is broken enough to pass garbage to libzmq,
      it cannot be trusted to handle the resulting errors properly. Empirical
      evidence from CZMQ, where we systematically assert on bad arguments, is
      that this militant approach makes applications more, not less, robust.
      
      I don't see any valid use cases for returning errors on bad arguments,
      with one exception: zmq_setsockopt can be used to probe whether libzmq
      was e.g. built with CURVE security. I'd argue that it's nasty to use a
      side effect like this. If apps need to probe how libzmq was built, this
      should be done explicitly, and for ALL build options, not just CURVE.
      
      There are/were no libzmq test cases that check the return code for an
      invalid option.
      
      For now I've enabled militant assertions using --with-militant at
      configure time. However I'd like to make this the default setting.
      b4ed3f55
  4. 16 Jun, 2014 1 commit
  5. 15 Jun, 2014 2 commits
  6. 11 Jun, 2014 2 commits
  7. 10 Jun, 2014 4 commits
  8. 07 Jun, 2014 2 commits
  9. 06 Jun, 2014 2 commits
  10. 05 Jun, 2014 21 commits