UbitUmarov
|
713c222ec8
remove some redundancy
|
%!s(int64=4) %!d(string=hai) anos |
UbitUmarov
|
c99014991b
cosmetics
|
%!s(int64=4) %!d(string=hai) anos |
UbitUmarov
|
67cd5efab3
replace external httpserver by embedded one (based on same code) - This may still be very bad; clean solution and runprebuild, or clone to clan folder
|
%!s(int64=4) %!d(string=hai) anos |
Melanie Thielker
|
b16abc8166
Massive tab and trailing space cleanup
|
%!s(int64=8) %!d(string=hai) anos |
teravus
|
85593d8d25
* Add an initial complete frame timeout to the WebSocket processor to make it easier to write WebSocket service code that is resistant to Denial of Service attacks.
|
%!s(int64=11) %!d(string=hai) anos |
Justin Clark-Casey (justincc)
|
a33b6eed6d
minor: remove mono compiler warnings in WebsocketServerHandler.cs
|
%!s(int64=11) %!d(string=hai) anos |
teravus
|
69fbcdf14c
* Add a Max Payload size property to the Websocket Server Handler. If you would like to restrict the maximum packet size, (and therefore protect against Memory DOSing) then you should set this. I defaulted it to 40MB. This means that in theory, a malicious user could connect and send a packet that claims that the payload is up to 40 mb (even if it doesn't actually turn out to be 40mb. More testing needs to be done on it where the packets are maliciously malformed.
|
%!s(int64=11) %!d(string=hai) anos |
teravus
|
c22276a169
* gracefully handle a Situation where a double close is called on the WebSocket handler
|
%!s(int64=11) %!d(string=hai) anos |
teravus
|
4867a7cbbf
This is the final commit that enables the Websocket handler
|
%!s(int64=11) %!d(string=hai) anos |