Skip to main content
aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)AuthorFilesLines
2023-02-21[Releng] Update copyrightsreleases/4.22.0Eike Stepper8-8/+8
2023-02-04[Releng] Fix package export versionsEike Stepper2-11/+11
https://bugs.eclipse.org/bugs/show_bug.cgi?id=581487
2022-11-21[Releng] Re-enable WebSocket tests after move to Jetty 10.0.12Maxime Porhel2-1/+7
Configure the Jetty servlet context handler to avoid IllegalException during Net4JWebSocketServlet initialization leading to cmoent side exception on each attempt to open a websocket. Client side exception: org.eclipse.net4j.util.lifecycle.LifecycleException: java.util.concurrent.ExecutionException: org.eclipse.jetty.websocket.api.exceptions.UpgradeException: org.eclipse.jetty.websocket.core.exception.UpgradeException: Failed to upgrade to websocket: Unexpected HTT Response Status Code: 500 Server Error at org.eclipse.net4j.util.lifecycle.Lifecycle.internalActivate Change-Id: I7f942ee2dcff7e50d154760b84c19180a17e2dfa Signed-off-by: Maxime Porhel <maxime.porhel@obeo.fr>
2022-11-06[Releng] Use assertNoTimeout() instead of PollingTimeOuterEike Stepper1-8/+1
2022-11-05[580991] Outdated lock state when releasing a durable lockEike Stepper1-6/+50
https://bugs.eclipse.org/bugs/show_bug.cgi?id=580991
2022-10-31[Releng] Ignore .tycho-consumer-pom.xml filesEike Stepper2-2/+11
2022-10-31[Releng] Upgrade to Jetty 10.0.12 and disable WebSocket testsEike Stepper3-11/+10
2022-05-05[Releng] Fix new compiler warnings caused by IDE upgrade to 2022-06Eike Stepper1-0/+2
2022-02-02[Releng] Update copyrightsEike Stepper6-13/+13
2021-12-02[577300] Optimize CDOLockState cachingreleases/4.16.0Eike Stepper5-7/+209
https://bugs.eclipse.org/bugs/show_bug.cgi?id=577300
2021-11-17[Releng] Update copyrightsEike Stepper1-1/+1
2021-11-17[577300] Optimize CDOLockState cachingEike Stepper2-18/+71
https://bugs.eclipse.org/bugs/show_bug.cgi?id=577300
2021-11-15[577260] Upgrade org.eclipse.net4j.ws to Jetty 10 / javax.servlet 4.0Eike Stepper1-14/+14
https://bugs.eclipse.org/bugs/show_bug.cgi?id=577260
2021-11-13[Releng] Add StringUtil.replace()Eike Stepper1-0/+16
2021-11-09[Releng] Change Entry to Map.EntryEike Stepper1-2/+1
2021-11-02[Releng] Update copyrightsEike Stepper2-2/+3
2021-11-02[Releng] Use inherited assertXyz() methodsEike Stepper2-3/+2
2021-11-01[Releng] Fix Javadoc typoEike Stepper3-11/+11
2021-08-28[Releng] Update copyrightsEike Stepper2-2/+2
2021-08-27[575477] Remove Net4j HTTP plugins and featuresEike Stepper2-11/+9
https://bugs.eclipse.org/bugs/show_bug.cgi?id=575477
2021-05-17[Releng] Ignore compilers.p.exec-env-too-low warnings (for Java-11 dependencies)Eike Stepper1-1/+5
2021-02-02[570833] Provide a facility for clients to contribute global URI handlersEike Stepper1-0/+1
https://bugs.eclipse.org/bugs/show_bug.cgi?id=570833
2021-01-18[Releng] Update copyrightsEike Stepper4-11/+11
2020-11-04[Releng] Update copyrightsEike Stepper1-1/+1
2020-11-04[568426] Provide more control over local lock states while lock ↵Eike Stepper3-15/+52
notifications are disabled https://bugs.eclipse.org/bugs/show_bug.cgi?id=568426
2020-08-25[Releng] Update copyrightsEike Stepper1-1/+1
2020-08-25[297491] Provide support for storing named branch points, also called tagsEike Stepper3-9/+16
https://bugs.eclipse.org/bugs/show_bug.cgi?id=297491
2020-06-09[Releng] Add schema access tracking optionEike Stepper1-0/+2
2020-03-30[Releng] Update copyrightsEike Stepper26-26/+26
2020-03-29[561532] java.nio.BufferUnderFlowException (Take Four)Eike Stepper5-6/+266
https://bugs.eclipse.org/bugs/show_bug.cgi?id=561532
2020-03-29[561551] Eliminate Channel.receiveSerializerEike Stepper1-0/+49
https://bugs.eclipse.org/bugs/show_bug.cgi?id=561551
2020-03-21[561308] Optimize bulk read/write operations in buffer streamsEike Stepper3-2/+160
https://bugs.eclipse.org/bugs/show_bug.cgi?id=561308
2020-03-21[561115] Implement a Websocket-based transport for Net4jEike Stepper30-1573/+1484
https://bugs.eclipse.org/bugs/show_bug.cgi?id=561115
2020-03-14[Releng] Prepare 4.9 developmentEike Stepper3-9/+8
2020-03-11[Releng] Update copyrightsreleases/4.9.0Eike Stepper3-3/+3
2020-02-26[560280] Possible deadlock during the session invalidationEike Stepper1-1/+1
https://bugs.eclipse.org/bugs/show_bug.cgi?id=560280
2020-02-21[560280] Possible deadlock during the session invalidationEike Stepper1-1/+1
https://bugs.eclipse.org/bugs/show_bug.cgi?id=560280
2019-12-14[Releng] Use Java 8 diamond operator where possibleEike Stepper1-0/+3
2019-12-14[Releng] Use Java 8 diamond operator where possibleEike Stepper14-56/+67
2019-12-13[558310] [Releng] Update Bundle-RequiredExecutionEnvironment to JavaSE-1.8Eike Stepper17-30/+102
https://bugs.eclipse.org/bugs/show_bug.cgi?id=558310
2019-10-29[Releng] Update copyrightsEike Stepper4-4/+4
2019-02-01[544045] Various concurrency improvements (IWorkSerializer, ThreadPool, ↵Eike Stepper2-12/+244
RWOLockManager) https://bugs.eclipse.org/bugs/show_bug.cgi?id=544045
2018-09-22[Releng] Update wrong IU versionsEike Stepper2-8/+8
2018-09-21[538239] Fix SSL mode and update certificatesMaxime Porhel2-0/+0
The SSLBuffer must not call the the flip() method inherited from its super class in startGetting (l.80 and l.100) nor in write (l.161) but continue to call getByteBuffer().flip() as before. The previous certificates used to test the SSL acceptor/connector were no more valid. The current commit provide new keystore and trustore to replace them: the validity has been set to 20 years and the The algorithm is now SHA256withRSA (prev: SHA1withRSA), the lenght of the key moves from 1024 to 2048 bits. The key store contains the private and public parts of the certificate whereas the trust store contains only the public part of the certificate. The certificate has been generated with the IP 127.0.0.1 so that it can only be used by anyone. It is supposed that the server is launched on the same machine as the client. The same password has been used (see launch configurations). Keystore creation: keytool -genkey -ext SAN=IP:127.0.0.1 -keyalg "RSA" -alias CDO_SSL_Tests -keystore testKeys -storepass ab987c -validity 7300 Certificate export: keytool -export -keystore testKeys -alias cdo_ssl_tests -file test.cer Trustore creation: keytool -import -file test.cer -alias cdo_ssl_tests -keystore testTrust -storepass ab987c Certicate checks: keytool -list -v -keystore testkeys On previous testkeys file: Type de fichier de clés : JKS Fournisseur de fichier de clés : SUN Votre fichier de clés d'accès contient 1 entrée Nom d'alias : wat Date de création : 13 déc. 2010 Type d'entrée : PrivateKeyEntry Longueur de chaîne du certificat : 1 Certificat[1]: Propriétaire : CN=wat, OU=nma, O=nomagicasia, L=ca, ST=us, C=us Emetteur : CN=wat, OU=nma, O=nomagicasia, L=ca, ST=us, C=us Numéro de série : 4d060507 Valide du : Mon Dec 13 12:35:35 CET 2010 au : Sun Mar 13 12:35:35 CET 2011 Empreintes du certificat : MD5 : 51:14:6D:ED:B7:F2:74:AE:2C:FF:91:B2:6F:3C:28:E2 SHA1 : 46:FD:7A:E4:0C:15:3A:7B:9C:FE:44:E7:1E:1B:30:72:C4:9E:D8:EC SHA256 : E7:81:21:DF:DE:CE:C1:C5:08:48:EC:47:76:D9:9E:6F:83:A8:A4:8B:27:F7:37:D3:01:EF:D5:60:39:57:BC:0D Nom de l'algorithme de signature : SHA1withRSA Algorithme de clé publique du sujet : Clé RSA 1024 bits Version : 3 ________________________________________________________________________ On current file: Type de fichier de clés : JKS Fournisseur de fichier de clés : SUN Votre fichier de clés d'accès contient 1 entrée Nom d'alias : cdo_ssl_tests Date de création : 27 août 2018 Type d'entrée : PrivateKeyEntry Longueur de chaîne du certificat : 1 Certificat[1]: Propriétaire : CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown Emetteur : CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown Numéro de série : 66887244 Valide du : Mon Aug 27 15:02:41 CEST 2018 au : Sun Aug 22 15:02:41 CEST 2038 Empreintes du certificat : MD5 : 18:2C:39:15:83:19:8D:C6:E1:1A:FD:2F:83:14:42:2D SHA1 : 80:30:1C:E2:E5:07:B0:61:CE:CB:5A:90:D5:2C:74:65:78:DC:C4:53 SHA256 : CD:20:26:F0:E7:BE:B1:71:16:17:A9:43:11:C0:DB:FC:16:2C:A6:13:55:E8:72:55:11:44:D2:5C:AA:95:7D:08 Nom de l'algorithme de signature : SHA256withRSA Algorithme de clé publique du sujet : Clé RSA 2048 bits Version : 3 Extensions : SubjectAlternativeName [ IPAddress: 127.0.0.1 ] SubjectKeyIdentifier [ KeyIdentifier [ 0000: C4 7A C5 ED C2 E1 1B D5 98 C8 4A 66 83 F8 D9 A3 .z........Jf.... 0010: 07 FA 55 50 ..UP ] ] Bug: https://bugs.eclipse.org/bugs/show_bug.cgi?id=538239 Change-Id: I747bc08d3882558bbcd481c3381a2582be0fe06e Signed-off-by: Maxime Porhel <maxime.porhel@obeo.fr>
2018-05-29[Releng] Adjust copyrightsEike Stepper68-69/+69
2018-05-27[535161] Implement a buffer tracerEike Stepper6-45/+570
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535161
2018-05-17[Releng] Adjust CopyrightsEike Stepper4-4/+4
2018-04-25[Releng] Provide AbstractOMTest.await(CountDownLatch) helperEike Stepper1-3/+17
2018-04-25[534014] ReconnectingSession fails to reconnect the second timeEike Stepper1-0/+8
https://bugs.eclipse.org/bugs/show_bug.cgi?id=534014
2018-03-27[Releng] Detect leaked JDBC connections in H2 testsEike Stepper1-3/+9

Back to the top