- 28 Oct, 2015 1 commit
-
-
Christian Schudt authored
This is the more correct API and also has very minor performance benefits.
-
- 13 Oct, 2015 1 commit
-
-
Guus der Kinderen authored
-
- 28 Jul, 2015 1 commit
-
-
Dave Cridland authored
After discussion with Jonny, switched the existing Map to a Deque, and in response to Tom's suggestion, added XEP-0203 (and legacy) delay stamping. Tested using Gajim and Swift; testing the delay stamping was done by disabling the acknowledgement handling to force retransmission.
-
- 27 Jul, 2015 1 commit
-
-
JonnyHeavey authored
-
- 24 Jul, 2015 1 commit
-
-
JonnyHeavey authored
This patch adds a basic, non-resumable, XEP-0198 acking solution. It will redirect "lost" messages to offline storage, but does not attempt to suspend the session, so will not allow any resumptions.
-
- 17 Apr, 2015 1 commit
-
-
Guus der Kinderen authored
-
- 09 Apr, 2015 1 commit
-
-
Dave Cridland authored
OF-888 is presumed to be a recursion due to an attempt to bounce a bounce, in other words it's failing to handle a double-bounce. It appears to be caused when routing a stanza from a MUC fails, and for some reason I don't yet understand, the routing of the bounce to the originating MUC source also fails. The test for the double bounce is only present for the IQ case, but this fails in any case because it tests only for the IQ case, and uses a test which checks the IQ's symbolic type; this is not actually set by Packet.setError(), so does not trigger. Tom's fix inserted a sentinel into the original failing stanza, however a new stanza is created for the bounce, which will not contain the sentinel; therefore the fix will not protect from a recursion. Therefore this patch: 1) Removes Tom's fix for OF-888. 2) Tests for the message and presence error types. 3) Tests for the presence of a stanza error (though this is a warning). 4) Explicitly sets the stanza error type.
-
- 06 Mar, 2015 2 commits
- 11 Jan, 2015 2 commits
-
-
Florian Schmaus authored
and remove null checks. Related to OF-855.
-
Tom Evans authored
Check the underlying connection for a given session before delivering a packet; if the connection is missing, clean up session and resend packet
-
- 23 Dec, 2014 1 commit
-
-
Tom Evans authored
Update the advertised stream features to mark the xmpp-session capability as optional (per http://tools.ietf.org/html/draft-cridland-xmpp-session-01). Current implementation is already no-op.
-
- 05 Aug, 2014 1 commit
-
-
Dave Cridland authored
Kim 'Zash' Alvefur commented that an empty authzid in EXTERNAL wasn't working. This patch adds this handling, and also changes authorization checks from a domain.contains() to a domain.equals().
-
- 04 Aug, 2014 1 commit
-
-
Dave Cridland authored
Double-check removed, streamlining logic.
-
- 17 Jun, 2014 3 commits
-
-
Dave Cridland authored
This adds TLS information and Authentication choices to the server session details page. In doing so, it factors out a ServerSession interface, and LocalServerSession class.
-
Dave Cridland authored
A few changes here: 1) Don't recurse up the DNS tree. That's just wrong. 2) Also, don't assume that a subdomain is handled by a parent domain's server. Still wrong. 3) Check certificates post-connect using our new logic, and drop the session if they don't match and we're not meant to be doing dialback. 4) Do use EXTERNAL if offered, even if we're using a self-signed certificate. There's no value in not doing so, it's a bizarre behaviour. 5) Disable S2S Compression; it's currently not working. XPP reset seems to fail, so doing replacement of the input stream instead. 6) Protect against a null features after TLS. Seems unlikely to happen, but still.
-
Dave Cridland authored
See XEP-0220, Dialback Errors. This reduces disconnect in the case of piggybacking errors, and provides better diagnostics.
-
- 07 Jun, 2014 1 commit
-
-
Christian Schudt authored
As per RFC 6121 8.5.2.1.1. Message and XEP-0160
-
- 05 Jun, 2014 1 commit
-
-
Sven Bunge authored
-
- 02 Jun, 2014 1 commit
-
-
Sven Bunge authored
-
- 07 May, 2014 1 commit
-
-
Christian Schudt authored
-
- 06 May, 2014 2 commits
- 05 May, 2014 1 commit
-
-
Tom Evans authored
-
- 26 Apr, 2014 2 commits
- 25 Apr, 2014 1 commit
-
-
Tom Evans authored
Modified older patch submitted by David Horowitz to accommodate more recent changes.
-
- 09 Apr, 2014 1 commit
-
-
- 05 Apr, 2014 1 commit
-
-
csh authored
git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@14012 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 24 Feb, 2014 1 commit
-
-
csh authored
OF-725 Openfire must return a service-unavailable error when blocking an IQ of type get or set because of a privacy list. (1st part) git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13974 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 05 Feb, 2014 1 commit
-
-
Daryl Herzmann authored
git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13902 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 30 Jan, 2014 1 commit
-
-
Florian Schmaus authored
Fixes OF-724 git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13881 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 20 Sep, 2013 1 commit
-
-
Alex Mateescu authored
For some reason, Pidgin will discard presence packets from other clients connected to the same account, but I have tested with a small smack-based client that logs incoming packets and surely enough the presence packet arrived. git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13745 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 21 May, 2013 1 commit
-
-
guus authored
git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13664 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 04 Nov, 2012 1 commit
-
-
guus authored
OF-584: Openfire should not re-use a socket when that has already been closed by a previous connection attempt. git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13341 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 29 Sep, 2012 1 commit
-
-
Tom Evans authored
OF-573: Improve synchronization model for http-bind to reduce thread blocking; include static web context resources for http-bind in RPM build git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@13305 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 01 Jan, 2012 1 commit
-
-
guus authored
OF-443: Stop sending 1.0-version stream attributes to pre-1.0 servers. This appears to reduce issues with federating to domains powered by older domains. Patch by Marcin Cieślak. git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@12941 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 24 Sep, 2011 1 commit
-
-
guus authored
OF-443: No longer use the dialback namespace definition as a trigger to start dialback (but use the db:verify / db:result elements instead). When the reported version of the stream is absent (prevents compatibility issues with openfire before version 3.7.1) or smaller than one, nothing should be sent on the stream before a db:verify / db:result stanza is sent (no stream features, for example). This mimics old behaviour. This way, dialback appears to be triggered by the namespace definition in the stream (even though in actuality it's triggered by a child element) which makes things backwards compatible. git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@12837 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 10 Apr, 2011 1 commit
-
-
guus authored
Re-ordered code that initiates outbound S2S connections. Apart from better logging, we're also preferring SASL over Dialback now (OF-452). git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@12239 b35dd754-fafc-0310-a699-88a17e54d16e
-
- 09 Apr, 2011 1 commit
-
-
guus authored
Stop checking if every certificate in the local certificate chain is self-signed. Only the first certificate from the chain is the local certificate. The rest of them are CA's (OF-405). git-svn-id: http://svn.igniterealtime.org/svn/repos/openfire/trunk@12235 b35dd754-fafc-0310-a699-88a17e54d16e
-