Software /
code /
prosody
Graph
-
mod_muc: Allow admins to always bypass restrict_room_creation (thanks Chris B)Fri, 13 Dec 2013 12:52:03 +0000, by Matthew Wild
-
prosody: Store the config file name so the same file can be used when reloadingFri, 13 Dec 2013 10:25:40 +0100, by Kim Alvefur
-
Merge 0.10->trunkWed, 11 Dec 2013 22:32:17 +0000, by Matthew Wild
-
Merge 0.9->0.10Wed, 11 Dec 2013 22:31:48 +0000, by Matthew Wild
-
Tagging 0.9.2 (again)Wed, 04 Dec 2013 15:06:48 +0000, by Matthew Wild
-
Makefile, configure: Add option for disabling generation of example certificates 0.9.2Sat, 30 Nov 2013 22:26:20 +0100, by Kim Alvefur
-
Merge 0.10->trunkFri, 29 Nov 2013 20:11:53 +0000, by Matthew Wild
-
Merge 0.9->0.10Fri, 29 Nov 2013 20:11:06 +0000, by Matthew Wild
-
Tagging 0.9.2Fri, 29 Nov 2013 20:10:13 +0000, by Matthew Wild
-
Merge 0.10->trunkThu, 28 Nov 2013 16:17:51 +0100, by Kim Alvefur
-
Merge 0.9->0.10Thu, 28 Nov 2013 16:17:21 +0100, by Kim Alvefur
-
util.pposix: Verify that file handle is openThu, 28 Nov 2013 16:12:40 +0100, by Kim Alvefur
-
Merge 0.10->trunkSun, 24 Nov 2013 14:24:53 +0100, by Kim Alvefur
-
Merge 0.9->0.10Sun, 24 Nov 2013 14:24:21 +0100, by Kim Alvefur
-
Makefile, certs: Generate example certificates on build, remove the old static oneFri, 22 Nov 2013 15:27:21 +0100, by Kim Alvefur
-
Merge 0.10->trunkThu, 21 Nov 2013 02:15:36 +0000, by Matthew Wild
-
Merge 0.9->0.10Thu, 21 Nov 2013 02:14:23 +0000, by Matthew Wild
-
certmanager: Further cipher string tweaking. Re-enable ciphers required for DSA and ECDH certs/keys.Thu, 21 Nov 2013 02:11:09 +0000, by Matthew Wild
-
Merge 0.10->trunkWed, 13 Nov 2013 11:59:43 +0100, by Kim Alvefur
-
util.sql: Fix previous commitTue, 12 Nov 2013 11:38:52 +0100, by Kim Alvefur
-
util.sql: Get character set info from the correct database.Tue, 12 Nov 2013 11:13:45 +0100, by Kim Alvefur
-
Merge 0.10->trunkTue, 12 Nov 2013 02:23:29 +0000, by Matthew Wild
-
Merge 0.9->0.10Tue, 12 Nov 2013 02:23:02 +0000, by Matthew Wild
-
Back out 1b0ac7950129, as SSLv3 appears to still be in moderate use on the network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients!Tue, 12 Nov 2013 02:13:01 +0000, by Matthew Wild
Scroll all the way down to load more.