1. 13 Jul, 2020 2 commits
  2. 09 Jul, 2020 7 commits
    • Adrien Béraud's avatar
      OAuth: invalidate token if current scope was concerned · 0275bead
      Adrien Béraud authored
      Change-Id: Iec1bb9a287d97dff8cc4342fe5ebf7d2238f10b4
      0275bead
    • Sébastien Blin's avatar
      dbus: fix annotation · da642afc
      Sébastien Blin authored
      Change-Id: I67971c024245e95e870bfed320db160a9142ff39
      da642afc
    • Adrien Béraud's avatar
      jamiaccount: cleanup · b0397fe0
      Adrien Béraud authored
      Change-Id: I990948900098449e37338bc6eed4ae4c4e110249
      b0397fe0
    • Adrien Béraud's avatar
      OAuth: manage token expiration · 455be6db
      Adrien Béraud authored
      Change-Id: Ic1f124297a2f5cc7f8409e3ff064a444ebe04a1a
      455be6db
    • Adrien Béraud's avatar
      OAuth: remember token scope · 343ef14c
      Adrien Béraud authored
      Change-Id: I5da233b3792215626fd82e827509ef95528e5be8
      343ef14c
    • Sébastien Blin's avatar
      pjproject: fix crash in pj_turn_session_on_rx_pkt2() · 7c8491ba
      Sébastien Blin authored
      Instead of letting the TURN session destroy itself when finished, the current
      code is overriding the user_data attached to the session. This is not needed
      because the turn session will be stopped when the timer will complete and
      this can cause some crashes in pj_turn_session_on_rx_pkt2 because the data
      is erased while not protected via turn_sock->grp_lock() (mostly in turn_sock.c,
      on_data_read)
      
      Change-Id: Ia4a12917711b5534b372cb3a26e9141e5393c569
      Gitlab: #299
      7c8491ba
    • Sébastien Blin's avatar
      pjproject: avoid to declare check valid too soon · 3f598a6a
      Sébastien Blin authored
      The relay candidate was declared as suceeded even if not in the valid list.
      Because of this, some negotiations were successful but no valid candidates
      were given to the app.
      
      Moreover, the connection timeout checks were using the wrong timer. This
      avoids to cancel successful negotiations to check a connection timeout.
      
      Finally, some clean is done with this patch
      
      Change-Id: Iacfbf3b9f5faafe1bd05f66157485226761c30bf
      Gitlab: #256
      3f598a6a
  3. 08 Jul, 2020 2 commits
  4. 07 Jul, 2020 8 commits
  5. 06 Jul, 2020 6 commits
  6. 03 Jul, 2020 2 commits
  7. 02 Jul, 2020 6 commits
  8. 01 Jul, 2020 1 commit
  9. 30 Jun, 2020 2 commits
  10. 29 Jun, 2020 2 commits
    • Sébastien Blin's avatar
      pjproject: fix TCP sockets death detection · 93f85f37
      Sébastien Blin authored
      TCP_KEEPALIVE are not enough to detect that TCP connections are dead or not.
      Some routers doesn't seems to support TCP_KEEPALIVE and moreover, sometimes
      the settings is just not enough as described in this article:
      https://blog.cloudflare.com/when-tcp-sockets-refuse-to-die/
      
      RFC 5482 describe a new option for sockets: TCP_USER_TIMEOUT which must be used
      with keep alives to detect closed connection in a better way.
      
      In this patch we set TCP_USER_TIMEOUT to 30 seconds (like the keep alive). This is
      a TCP level socket option used to specify the max time in ms that transmitted data
      can be unacknowledged before a force close.
      
      Change-Id: I217616b9b9e08adfa5a044a451fbbc97faf1939e
      Gitlab: #243
      93f85f37
    • Sébastien Blin's avatar
      file transfer: add some tests · 8473608f
      Sébastien Blin authored
      Change-Id: I64783d990cf463a5a873314c978e42a7b19bb55b
      Gitlab: #228
      8473608f
  11. 28 Jun, 2020 1 commit
  12. 27 Jun, 2020 1 commit
    • Sébastien Blin's avatar
      call: avoid multiple fallback requests · 3a72e386
      Sébastien Blin authored
      Because multiple state changes can occurs while the call is in connecting,
      only start the fallback check once. Also, only fallback on parent calls, we
      do not care about subcall here.
      
      Change-Id: I1ae758d8a6f9aacc2057f736c7b4173f21add11e
      Gitlab: #247
      3a72e386