|
@@ -478,7 +478,7 @@ type Config struct {
|
478
|
478
|
Listeners map[string]listenerConfigBlock
|
479
|
479
|
UnixBindMode os.FileMode `yaml:"unix-bind-mode"`
|
480
|
480
|
TorListeners TorListenersConfig `yaml:"tor-listeners"`
|
481
|
|
- Websockets struct {
|
|
481
|
+ WebSockets struct {
|
482
|
482
|
AllowedOrigins []string `yaml:"allowed-origins"`
|
483
|
483
|
allowedOriginRegexps []*regexp.Regexp
|
484
|
484
|
}
|
|
@@ -844,12 +844,12 @@ func LoadConfig(filename string) (config *Config, err error) {
|
844
|
844
|
return nil, fmt.Errorf("failed to prepare listeners: %v", err)
|
845
|
845
|
}
|
846
|
846
|
|
847
|
|
- for _, glob := range config.Server.Websockets.AllowedOrigins {
|
|
847
|
+ for _, glob := range config.Server.WebSockets.AllowedOrigins {
|
848
|
848
|
globre, err := utils.CompileGlob(glob)
|
849
|
849
|
if err != nil {
|
850
|
850
|
return nil, fmt.Errorf("invalid websocket allowed-origin expression: %s", glob)
|
851
|
851
|
}
|
852
|
|
- config.Server.Websockets.allowedOriginRegexps = append(config.Server.Websockets.allowedOriginRegexps, globre)
|
|
852
|
+ config.Server.WebSockets.allowedOriginRegexps = append(config.Server.WebSockets.allowedOriginRegexps, globre)
|
853
|
853
|
}
|
854
|
854
|
|
855
|
855
|
if config.Server.STS.Enabled {
|