- 09 Jun, 2014 5 commits
-
-
dwd authored
OF-397 Do not deliver offline messages to clients with negative priority
-
dwd authored
OF-818 Message routing to bare JID can route to negative priority resour...
-
dwd authored
Fix 'RFC 6121 8.5.1. No Such User' for IQ stanzas
-
dwd authored
OF-805 [MUC] OF does not return all affiliated users when requesting mul...
-
dwd authored
Remove dispensable logic in the IQOwnerHandler, which deals with MUC aff...
-
- 08 Jun, 2014 3 commits
-
-
Christian Schudt authored
Fixes to javadocs to allow rpmbuild to work
-
Christian Schudt authored
MUC affiliations are managed in the #admin namespace, not in the #owner namespace. This is already a minor contribution to OF-178 (Updating MUC to latest version).
-
Christian Schudt authored
When requesting: <iq type="get" to="6ace0fd2f59f13c2484336dd06b4462a@bizmanager.msz006" id="getRoomMemberList"> <query xmlns="http://jabber.org/protocol/muc#admin"> <item affiliation="member"/> <item affiliation="owner"/> <item affiliation="admin"/> </query> </iq> Openfire does only return admins (the last requested affiliation). This fix rectifies this.
-
- 07 Jun, 2014 5 commits
-
-
Christian Schudt authored
This commit fixes the regression, that was introduced with the addition of Message Carbons. Message Carbons are delivered to all non-negative sessions. If there's no Message Carbons-enabled session, it will be delivered to the highest priority session only.
-
Christian Schudt authored
As per RFC 6121 8.5.2.1.1. Message and XEP-0160
-
Christian Schudt authored
IQ stanzas, which were routed to a non-existent user were falsely replied to with an IQ-result (e.g. ping). This fix checks for the existence of the user and returns an error, in case the user does not exist.
-
dwd authored
OF-405 - TLS certificate validation and authentication issues
-
dwd authored
OF-819 IQs of type error get falsely routed to IQ.createResult() which r...
-
- 06 Jun, 2014 4 commits
-
-
Christian Schudt authored
OF-819 IQs of type error get falsely routed to IQ.createResult() which results in an Exception and connection termination This can happen, if the session is in wrong status (e.g. if the user has not yet authenticated) and the client responds with an error IQ. Only reply to an IQ if it is type get or set.
-
Dave Cridland authored
-
dwd authored
Update Junit to 4.11
-
dwd authored
Update Slf4J to version 1.7.7
-
- 05 Jun, 2014 7 commits
-
-
Sven Bunge authored
Update Junit to 4.11 and add hamcrest - because the method assertThat is working with hamcrest matchers
-
Sven Bunge authored
-
Dele Olajide authored
-
dwd authored
Extract more properties related to connections
-
Sven Bunge authored
-
akrherz authored
Some small javadoc fixes to remove warnings during build
-
Dave Cridland authored
- Always check validity of EE Cert - Change variable name (and flip sense).
-
- 04 Jun, 2014 14 commits
-
-
Dele Olajide authored
-
-
Dele Olajide authored
-
Florian Schmaus authored
-
Dave Cridland authored
-
dwd authored
OF-709: Replace servlet.jar (2.5) with servlet-api.jar (3.1)
-
Sven Bunge authored
-
dwd authored
Codecleanup
-
Florian Schmaus authored
-
Florian Schmaus authored
and add some comments.
-
dwd authored
OF-810 RFC 6121 Routing Compliance Fix
-
dwd authored
OF-709: Update Jetty from 7.4 to 9.1.5
-
Dave Cridland authored
What this patch actually does is place existing certificates into a CertStore, including those from its (untrusted) keystore, the trust store, and any from the chain supplied by the peer, and then rebuild a chain back to a known trust anchor (from the trust store). This strategy will cope with unknown ICAs in chains, abbreviated chains, and so on, and replaces attempts to specifically handle self-signed certificates. That last said, there is an explicit shortcut to handle self-signed certificates which are supplied as end-entity certificates. These are simply checked against the trust store without any attempt to build a path.
-
Dave Cridland authored
I don't think we should be maintaining our own set if at all possible, this patch was created by creating a new keystore and inserting every certificate from an Ubuntu system's Mozilla ca-certificates set: rm -f ./src/security/truststore for x in /usr/share/ca-certificates/mozilla/*.crt; do y=`basename -s .crt $x` keytool -import -storepass changeit -keystore ./src/security/truststore -alias $y -file $x -noprompt done
-
- 02 Jun, 2014 2 commits
-
-
dwd authored
Fix OF-799: Select correct input radio on click into the text field.
-
Florian Schmaus authored
-