Log

description author age
mod_muc: Remove extra parenthesis (thanks janhouse) Kim Alvefur Sat, 14 Dec 2013 17:25:17 +0100
Merge 0.10->trunk Matthew Wild Fri, 13 Dec 2013 12:53:14 +0000
Merge 0.9->0.10 Matthew Wild Fri, 13 Dec 2013 12:52:39 +0000
mod_muc: Allow admins to always bypass restrict_room_creation (thanks Chris B) Matthew Wild Fri, 13 Dec 2013 12:52:03 +0000
prosody: Store the config file name so the same file can be used when reloading Kim Alvefur Fri, 13 Dec 2013 10:25:40 +0100
Merge 0.10->trunk Matthew Wild Wed, 11 Dec 2013 22:32:17 +0000
Merge 0.9->0.10 Matthew Wild Wed, 11 Dec 2013 22:31:48 +0000
Tagging 0.9.2 (again) Matthew Wild Wed, 04 Dec 2013 15:06:48 +0000
Makefile, configure: Add option for disabling generation of example certificates 0.9.2 Kim Alvefur Sat, 30 Nov 2013 22:26:20 +0100
Merge 0.10->trunk Matthew Wild Fri, 29 Nov 2013 20:11:53 +0000
Merge 0.9->0.10 Matthew Wild Fri, 29 Nov 2013 20:11:06 +0000
Tagging 0.9.2 Matthew Wild Fri, 29 Nov 2013 20:10:13 +0000
Merge 0.10->trunk Kim Alvefur Thu, 28 Nov 2013 16:17:51 +0100
Merge 0.9->0.10 Kim Alvefur Thu, 28 Nov 2013 16:17:21 +0100
util.pposix: Verify that file handle is open Kim Alvefur Thu, 28 Nov 2013 16:12:40 +0100
Merge 0.10->trunk Kim Alvefur Sun, 24 Nov 2013 14:24:53 +0100
Merge 0.9->0.10 Kim Alvefur Sun, 24 Nov 2013 14:24:21 +0100
Makefile, certs: Generate example certificates on build, remove the old static one Kim Alvefur Fri, 22 Nov 2013 15:27:21 +0100
Merge 0.10->trunk Matthew Wild Thu, 21 Nov 2013 02:15:36 +0000
Merge 0.9->0.10 Matthew Wild Thu, 21 Nov 2013 02:14:23 +0000
certmanager: Further cipher string tweaking. Re-enable ciphers required for DSA and ECDH certs/keys. Matthew Wild Thu, 21 Nov 2013 02:11:09 +0000
Merge 0.10->trunk Kim Alvefur Wed, 13 Nov 2013 11:59:43 +0100
util.sql: Fix previous commit Kim Alvefur Tue, 12 Nov 2013 11:38:52 +0100
util.sql: Get character set info from the correct database. Kim Alvefur Tue, 12 Nov 2013 11:13:45 +0100
Merge 0.10->trunk Matthew Wild Tue, 12 Nov 2013 02:23:29 +0000
Merge 0.9->0.10 Matthew Wild Tue, 12 Nov 2013 02:23:02 +0000
Back out 1b0ac7950129, as SSLv3 appears to still be in moderate use on the network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients! Matthew Wild Tue, 12 Nov 2013 02:13:01 +0000
Merge 0.10->trunk Kim Alvefur Mon, 11 Nov 2013 23:28:53 +0100