summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAttila Molnar <attilamolnar@hush.com>2014-02-17 00:41:36 +0100
committerAttila Molnar <attilamolnar@hush.com>2014-02-17 00:41:36 +0100
commit9c0134ee2c76fe7ff1509501b3904f9db9b29454 (patch)
tree0412d074ec4216fe6dd7b7fb5e977cf109bbbf4b
parent959fee59377edc4eaf285d8e72d3c2c41e9fe3ab (diff)
Rename m_ssl to m_ssl_openssl and update docs
-rw-r--r--data/example.conf2
-rw-r--r--data/modules.example.conf45
-rw-r--r--data/stats.standalone.example.conf2
-rw-r--r--docs/Changes.conf1
-rw-r--r--docs/WIN32.txt7
-rw-r--r--include/service.h2
-rw-r--r--modules/extra/m_ssl_openssl.cpp (renamed from modules/extra/m_ssl.cpp)4
-rw-r--r--modules/m_httpd.cpp3
8 files changed, 33 insertions, 33 deletions
diff --git a/data/example.conf b/data/example.conf
index fbb7e310e..4d4ba6b17 100644
--- a/data/example.conf
+++ b/data/example.conf
@@ -168,7 +168,7 @@ uplink
/*
* Enable if Services should connect using SSL.
- * You must have m_ssl loaded for this to work.
+ * You must have an SSL module loaded for this to work.
*/
ssl = no
diff --git a/data/modules.example.conf b/data/modules.example.conf
index e58ebea88..e4eeda802 100644
--- a/data/modules.example.conf
+++ b/data/modules.example.conf
@@ -201,7 +201,7 @@ module { name = "help" }
/* Time before connections to this server are timed out. */
timeout = 30
- /* Listen using SSL. Requires m_ssl. */
+ /* Listen using SSL. Requires an SSL module. */
#ssl = yes
/* If you are using a reverse proxy that sends one of the
@@ -469,6 +469,28 @@ module { name = "help" }
#module { name = "m_sasl_dh-blowfish" }
/*
+ * m_ssl_openssl [EXTRA]
+ *
+ * This module provides SSL services to Anope using OpenSSL, for example to
+ * connect to the uplink server(s) via SSL.
+ */
+#module
+{
+ name = "m_ssl_openssl"
+
+ /*
+ * An optional certificate and key for m_openssl to give to the uplink.
+ *
+ * You can generate your own certificate and key pair by using:
+ *
+ * openssl genrsa -out anope.key 2048
+ * openssl req -new -x509 -key anope.key -out anope.crt -days 1095
+ */
+ cert = "data/anope.crt"
+ key = "data/anope.key"
+}
+
+/*
* m_sql_authentication [EXTRA]
*
* This module allows authenticating users against an external SQL database using a custom
@@ -663,27 +685,6 @@ module { name = "help" }
}
/*
- * m_ssl [EXTRA]
- *
- * This module uses SSL to connect to the uplink server(s).
- */
-#module
-{
- name = "m_ssl"
-
- /*
- * An optional certificate and key for m_ssl to give to the uplink.
- *
- * You can generate your own certificate and key pair by using:
- *
- * openssl genrsa -out anope.key 2048
- * openssl req -new -x509 -key anope.key -out anope.crt -days 1095
- */
- cert = "data/anope.crt"
- key = "data/anope.key"
-}
-
-/*
* m_xmlrpc
*
* Allows remote applications (websites) to execute queries in real time to retrieve data from Anope.
diff --git a/data/stats.standalone.example.conf b/data/stats.standalone.example.conf
index 7ba985e19..8db7c9999 100644
--- a/data/stats.standalone.example.conf
+++ b/data/stats.standalone.example.conf
@@ -168,7 +168,7 @@ uplink
/*
* Enable if Services should connect using SSL.
- * You must have m_ssl loaded for this to work.
+ * You must have an SSL module loaded for this to work.
*/
ssl = no
diff --git a/docs/Changes.conf b/docs/Changes.conf
index aae151fd9..8b41ad2be 100644
--- a/docs/Changes.conf
+++ b/docs/Changes.conf
@@ -2,6 +2,7 @@ Anope Version 2.0.0
-------------------
options:passlen, enforceruser, enforcerhost, releasetimeout, and guestnickprefix moved to nickserv's module configuration
options:hideregisteredcommands added
+m_ssl renamed to m_ssl_openssl
Anope Version 1.9.9
-------------------
diff --git a/docs/WIN32.txt b/docs/WIN32.txt
index 7922523f4..018b898d2 100644
--- a/docs/WIN32.txt
+++ b/docs/WIN32.txt
@@ -71,9 +71,10 @@ Anope for Windows
our IRC Support channel for assistance.
Some Anope modules require third party libraries, such as m_mysql and
- m_ssl. If these libraries are installed in nonstandard locations, cmake
- will probably not find them and should be told where they are by passing
- additional search paths to the last question in Config, such as:
+ the SSL modules. If these libraries are installed in nonstandard
+ locations, cmake will probably not find them and should be told where
+ they are by passing additional search paths to the last question in
+ Config, such as:
-DEXTRA_INCLUDE:STRING=c:/openssl/include;c:/mysql/include
-DEXTRA_LIBS:STRING=c:/openssl/lib;c:/mysql/lib
diff --git a/include/service.h b/include/service.h
index db0b2af4b..8142363d6 100644
--- a/include/service.h
+++ b/include/service.h
@@ -20,7 +20,7 @@
/** Anything that inherits from this class can be referred to
* using ServiceReference. Any interfaces provided by modules,
* such as commands, use this. This is also used for modules
- * that publish a service (m_ssl, etc).
+ * that publish a service (m_ssl_openssl, etc).
*/
class CoreExport Service : public virtual Base
{
diff --git a/modules/extra/m_ssl.cpp b/modules/extra/m_ssl_openssl.cpp
index 44971908c..a274dc78d 100644
--- a/modules/extra/m_ssl.cpp
+++ b/modules/extra/m_ssl_openssl.cpp
@@ -137,7 +137,7 @@ class SSLModule : public Module
if (!SSL_CTX_use_certificate_file(client_ctx, this->certfile.c_str(), SSL_FILETYPE_PEM) || !SSL_CTX_use_certificate_file(server_ctx, this->certfile.c_str(), SSL_FILETYPE_PEM))
throw ConfigException("Error loading certificate");
else
- Log(LOG_DEBUG) << "m_ssl: Successfully loaded certificate " << this->certfile;
+ Log(LOG_DEBUG) << "m_ssl_openssl: Successfully loaded certificate " << this->certfile;
}
else
Log() << "Unable to open certificate " << this->certfile;
@@ -147,7 +147,7 @@ class SSLModule : public Module
if (!SSL_CTX_use_PrivateKey_file(client_ctx, this->keyfile.c_str(), SSL_FILETYPE_PEM) || !SSL_CTX_use_PrivateKey_file(server_ctx, this->keyfile.c_str(), SSL_FILETYPE_PEM))
throw ConfigException("Error loading private key");
else
- Log(LOG_DEBUG) << "m_ssl: Successfully loaded private key " << this->keyfile;
+ Log(LOG_DEBUG) << "m_ssl_openssl: Successfully loaded private key " << this->keyfile;
}
else
{
diff --git a/modules/m_httpd.cpp b/modules/m_httpd.cpp
index e08452d81..f3d0677a9 100644
--- a/modules/m_httpd.cpp
+++ b/modules/m_httpd.cpp
@@ -454,9 +454,6 @@ class HTTPD : public Module
void OnModuleLoad(User *u, Module *m) anope_override
{
- if (m->name != "m_ssl")
- return;
-
for (std::map<Anope::string, MyHTTPProvider *>::iterator it = this->providers.begin(), it_end = this->providers.end(); it != it_end; ++it)
{
MyHTTPProvider *p = it->second;