Deprecate WSS via feature flag

This commit is contained in:
Christien Rioux 2025-09-07 17:25:25 -04:00
parent 88e0d420b4
commit dbc5bd495b
34 changed files with 441 additions and 1517 deletions

View file

@ -123,28 +123,6 @@ class VeilidConfigTLS(ConfigBase):
connection_initial_timeout_ms: int
@dataclass
class VeilidConfigHTTPS(ConfigBase):
enabled: bool
listen_address: str
path: str
url: Optional[str]
@dataclass
class VeilidConfigHTTP(ConfigBase):
enabled: bool
listen_address: str
path: str
url: Optional[str]
@dataclass
class VeilidConfigApplication(ConfigBase):
https: VeilidConfigHTTPS
http: VeilidConfigHTTP
@dataclass
class VeilidConfigUDP(ConfigBase):
enabled: bool
@ -172,14 +150,14 @@ class VeilidConfigWS(ConfigBase):
url: Optional[str]
@dataclass
class VeilidConfigWSS(ConfigBase):
connect: bool
listen: bool
max_connections: int
listen_address: str
path: str
url: Optional[str]
# @dataclass
# class VeilidConfigWSS(ConfigBase):
# connect: bool
# listen: bool
# max_connections: int
# listen_address: str
# path: str
# url: Optional[str]
@dataclass
@ -187,7 +165,7 @@ class VeilidConfigProtocol(ConfigBase):
udp: VeilidConfigUDP
tcp: VeilidConfigTCP
ws: VeilidConfigWS
wss: VeilidConfigWSS
# wss: VeilidConfigWSS
@dataclass
@ -214,7 +192,6 @@ class VeilidConfigNetwork(ConfigBase):
detect_address_changes: Optional[bool]
restricted_nat_retries: int
tls: VeilidConfigTLS
application: VeilidConfigApplication
protocol: VeilidConfigProtocol
privacy: VeilidConfigPrivacy

View file

@ -4015,22 +4015,6 @@
"network"
]
},
"VeilidConfigApplication": {
"description": "Application configuration.\n\nConfigure web access to the Progressive Web App (PWA).\n\nTo be implemented...",
"type": "object",
"properties": {
"http": {
"$ref": "#/$defs/VeilidConfigHTTP"
},
"https": {
"$ref": "#/$defs/VeilidConfigHTTPS"
}
},
"required": [
"https",
"http"
]
},
"VeilidConfigBlockStore": {
"type": "object",
"properties": {
@ -4206,64 +4190,9 @@
"max_watch_expiration_ms"
]
},
"VeilidConfigHTTP": {
"description": "Enable and configure HTTP access to the Veilid node.\n\n```yaml\nhttp:\n enabled: false\n listen_address: ':5150'\n path: 'app\"\n url: 'https://localhost:5150'\n```",
"type": "object",
"properties": {
"enabled": {
"type": "boolean"
},
"listen_address": {
"type": "string"
},
"path": {
"type": "string"
},
"url": {
"type": [
"string",
"null"
]
}
},
"required": [
"enabled",
"listen_address",
"path"
]
},
"VeilidConfigHTTPS": {
"description": "Enable and configure HTTPS access to the Veilid node.\n\n```yaml\nhttps:\n enabled: false\n listen_address: ':5150'\n path: 'app'\n url: 'https://localhost:5150'\n```",
"type": "object",
"properties": {
"enabled": {
"type": "boolean"
},
"listen_address": {
"type": "string"
},
"path": {
"type": "string"
},
"url": {
"type": [
"string",
"null"
]
}
},
"required": [
"enabled",
"listen_address",
"path"
]
},
"VeilidConfigNetwork": {
"type": "object",
"properties": {
"application": {
"$ref": "#/$defs/VeilidConfigApplication"
},
"client_allowlist_timeout_ms": {
"type": "integer",
"format": "uint32",
@ -4364,7 +4293,6 @@
"upnp",
"restricted_nat_retries",
"tls",
"application",
"protocol",
"privacy"
]
@ -4426,16 +4354,12 @@
},
"ws": {
"$ref": "#/$defs/VeilidConfigWS"
},
"wss": {
"$ref": "#/$defs/VeilidConfigWSS"
}
},
"required": [
"udp",
"tcp",
"ws",
"wss"
"ws"
]
},
"VeilidConfigRPC": {
@ -4693,42 +4617,6 @@
"path"
]
},
"VeilidConfigWSS": {
"description": "Enable and configure Secure Web Sockets.\n\n```yaml\nwss:\n connect: true\n listen: false\n max_connections: 32\n listen_address: ':5150'\n path: 'ws'\n url: ''",
"type": "object",
"properties": {
"connect": {
"type": "boolean"
},
"listen": {
"type": "boolean"
},
"listen_address": {
"type": "string"
},
"max_connections": {
"type": "integer",
"format": "uint32",
"minimum": 0
},
"path": {
"type": "string"
},
"url": {
"type": [
"string",
"null"
]
}
},
"required": [
"connect",
"listen",
"max_connections",
"listen_address",
"path"
]
},
"VeilidLog": {
"description": "A VeilidCore log message with optional backtrace.",
"type": "object",