qpid-dispatch git commit: DISPATCH-954 - Fixed issue suggested by coverity scan tool. This closes #277
Repository: qpid-dispatch Updated Branches: refs/heads/master 5ee639374 -> fc7ed088a DISPATCH-954 - Fixed issue suggested by coverity scan tool. This closes #277 Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/fc7ed088 Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/fc7ed088 Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/fc7ed088 Branch: refs/heads/master Commit: fc7ed088a719df0571575d52404314fc70631777 Parents: 5ee6393 Author: Fernando GiorgettiAuthored: Mon Apr 2 16:15:19 2018 -0300 Committer: Ganesh Murthy Committed: Mon Apr 2 15:20:13 2018 -0400 -- router/src/main.c | 9 - 1 file changed, 4 insertions(+), 5 deletions(-) -- http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/fc7ed088/router/src/main.c -- diff --git a/router/src/main.c b/router/src/main.c index b6c9d53..c66ba4f 100644 --- a/router/src/main.c +++ b/router/src/main.c @@ -209,12 +209,11 @@ static void daemon_process(const char *config_path, const char *python_pkgdir, cur_path, !strcmp("/", cur_path)? "":"/", config_path); -} - -// Releasing temporary path variable -memset(cur_path, 0, path_size * sizeof(char)); -free(cur_path); +// Releasing temporary path variable +memset(cur_path, 0, path_size * sizeof(char)); +free(cur_path); +} } // - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org
qpid-dispatch git commit: DISPATCH-951: Show location and version of Proton found by CMake
Repository: qpid-dispatch Updated Branches: refs/heads/master c0996627f -> 5ee639374 DISPATCH-951: Show location and version of Proton found by CMake CMake displays the location and version numbers for python and libwebsockets used in the build. Print that same information for qpid-proton. Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/5ee63937 Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/5ee63937 Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/5ee63937 Branch: refs/heads/master Commit: 5ee639374a5131ac6316f613e9387eecf5e53955 Parents: c099662 Author: Chuck RolkeAuthored: Mon Apr 2 13:51:10 2018 -0400 Committer: Chuck Rolke Committed: Mon Apr 2 13:51:10 2018 -0400 -- CMakeLists.txt | 2 ++ 1 file changed, 2 insertions(+) -- http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/5ee63937/CMakeLists.txt -- diff --git a/CMakeLists.txt b/CMakeLists.txt index 55c6e5f..e13a45c 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -116,6 +116,8 @@ find_library(dl_lib dl) find_library(rt_lib rt) find_package(Proton REQUIRED Core Proactor) +message(STATUS "Found Proton: ${Proton_LIBRARIES} (found version \"${Proton_VERSION}\")" ) + ## Optional dependencies include(FindLibWebSockets) option(USE_LIBWEBSOCKETS "Use libwebsockets for WebSocket support" ${LIBWEBSOCKETS_FOUND}) - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org
[2/2] qpid-broker-j git commit: NO-JIRA: [Broker-J] Bump Qpid JMS client version to 0.31.0
NO-JIRA: [Broker-J] Bump Qpid JMS client version to 0.31.0 Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/0cc2bb7d Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/0cc2bb7d Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/0cc2bb7d Branch: refs/heads/master Commit: 0cc2bb7de79a82f3b138277a4b5a00c9749af948 Parents: d773df7 Author: Alex RudyyAuthored: Mon Apr 2 16:04:02 2018 +0100 Committer: Alex Rudyy Committed: Mon Apr 2 16:51:00 2018 +0100 -- pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/0cc2bb7d/pom.xml -- diff --git a/pom.xml b/pom.xml index acb1f6e..afebdb3 100644 --- a/pom.xml +++ b/pom.xml @@ -149,7 +149,7 @@ 3.5.0 1.0.3 4.5.3 -0.30.0 +0.31.0 6.3.0 1.3.2 - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org
[1/2] qpid-broker-j git commit: NO-JIRA: [Broker-J] [System Tests] Remove workaround for qpid jms client not respecting reconnectDelay (QPIDJMS-365)
Repository: qpid-broker-j Updated Branches: refs/heads/master d773df7d7 -> b22a1e7ad NO-JIRA: [Broker-J] [System Tests] Remove workaround for qpid jms client not respecting reconnectDelay (QPIDJMS-365) Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/b22a1e7a Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/b22a1e7a Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/b22a1e7a Branch: refs/heads/master Commit: b22a1e7ad898992a60ffb8ef2c66f58735d8ba1e Parents: 0cc2bb7 Author: Alex RudyyAuthored: Mon Apr 2 16:48:54 2018 +0100 Committer: Alex Rudyy Committed: Mon Apr 2 16:51:00 2018 +0100 -- .../server/store/berkeleydb/replication/GroupCreator.java| 8 .../http/endtoend/message/CompressedMessageContentTest.java | 4 +--- .../apache/qpid/systests/QpidJmsClientConnectionBuilder.java | 4 3 files changed, 5 insertions(+), 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java -- diff --git a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java b/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java index 7750a0d..d7e6b7f 100644 --- a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java +++ b/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java @@ -306,14 +306,6 @@ public class GroupCreator connectionBuilder.addFailoverPort(brokerPortNumber); } -if (_testcase.getBrokerProtocol().equals(Protocol.AMQP_1_0)) -{ - connectionBuilder.setOptions(Collections.singletonMap("failover.warnAfterReconnectAttempts", "1")); -// TODO - QPIDJMS-365 - workaround for the fact that the client does not respect reconnectDelay if the -// server closes the connection gracefully. - connectionBuilder.setOptions(Collections.singletonMap("failover.initialReconnectDelay", "15000")); -} - return connectionBuilder; } http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java -- diff --git a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java b/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java index 62a85c6..00b330c 100644 --- a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java +++ b/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java @@ -31,7 +31,6 @@ import java.io.IOException; import java.io.InputStream; import java.net.HttpURLConnection; import java.nio.charset.StandardCharsets; -import java.util.Collections; import java.util.HashMap; import java.util.List; import java.util.Map; @@ -255,8 +254,7 @@ public class CompressedMessageContentTest extends HttpTestBase private Connection getConnection(final boolean compress) throws Exception { -Map options = Collections.singletonMap("compressMessages", String.valueOf(compress)); -return getConnectionBuilder().setOptions(options).build(); + return getConnectionBuilder().setCompress(compress).build(); } } http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java -- diff --git a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java b/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java index 263ff9c..b5be7d2 100644 --- a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java +++ b/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java @@ -286,6 +286,10 @@ public class QpidJmsClientConnectionBuilder implements ConnectionBuilder options.putAll(_options); if (_enableFailover) {
qpid-broker-j git commit: QPID-8151: [Broker-J] [Unit tests] Add missing exclusion when running on an IBM JDK.
Repository: qpid-broker-j Updated Branches: refs/heads/master 988e5c960 -> d773df7d7 QPID-8151: [Broker-J] [Unit tests] Add missing exclusion when running on an IBM JDK. Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/d773df7d Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/d773df7d Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/d773df7d Branch: refs/heads/master Commit: d773df7d7c78480de02d8a0feab7d7401df22e50 Parents: 988e5c9 Author: Keith WallAuthored: Mon Apr 2 16:30:48 2018 +0100 Committer: Keith Wall Committed: Mon Apr 2 16:31:15 2018 +0100 -- .../qpid/server/transport/TCPandSSLTransportTest.java | 7 +++ test-profiles/IBMJDKExcludes | 14 -- 2 files changed, 7 insertions(+), 14 deletions(-) -- http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/d773df7d/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java -- diff --git a/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java b/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java index d3fd34d..53d81f5 100644 --- a/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java +++ b/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java @@ -20,7 +20,12 @@ */ package org.apache.qpid.server.transport; +import static org.apache.qpid.test.utils.JvmVendor.IBM; +import static org.hamcrest.CoreMatchers.equalTo; +import static org.hamcrest.CoreMatchers.is; +import static org.hamcrest.CoreMatchers.not; import static org.junit.Assert.fail; +import static org.junit.Assume.assumeThat; import static org.mockito.Matchers.any; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.when; @@ -60,6 +65,7 @@ public class TCPandSSLTransportTest extends UnitTestBase @Test public void testNoSSLv3SupportOnSSLOnlyPort() throws Exception { +assumeThat("The IBM JDK has different TLS defaults", getJvmVendor(), is(not(equalTo(IBM; try { checkSSLExcluded("SSLv3", Transport.SSL); @@ -105,6 +111,7 @@ public class TCPandSSLTransportTest extends UnitTestBase @Test public void testNoSSLv3SupportOnSharedPort() throws Exception { +assumeThat("The IBM JDK has different TLS defaults", getJvmVendor(), is(not(equalTo(IBM; try { checkSSLExcluded("SSLv3", Transport.TCP, Transport.SSL); http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/d773df7d/test-profiles/IBMJDKExcludes -- diff --git a/test-profiles/IBMJDKExcludes b/test-profiles/IBMJDKExcludes index 353c739..969b927 100644 --- a/test-profiles/IBMJDKExcludes +++ b/test-profiles/IBMJDKExcludes @@ -17,17 +17,3 @@ // under the License. // -org.apache.qpid.server.transport.TCPandSSLTransportTest#* - -# Transformer on IBM JDK has different whitespace behaviour -org.apache.qpid.disttest.results.ResultsXmlWriterTest#* - -# THe IBMJSSE2 trust factory (IbmX509) validates the entire certificate chain, including trusted certificates. -# https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/knowndiffsun.html -org.apache.qpid.server.security.FileTrustStoreTest#testUseOfExpiredTrustAnchorAllowed - -# (QPID-7955) Behaviourial difference between the IBM JDK and the Open JDK -# https://www.ibm.com/developerworks/community/forums/html/topic?id=8482d948-665c-47a2-862e-457e49ac71a4=25 -org.apache.qpid.server.logging.logback.Logback1027WorkaroundTurboFilterTest#testSuppressedExceptionRecursion -org.apache.qpid.server.logging.logback.Logback1027WorkaroundTurboFilterTest#testInitCauseRecursion - - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org
qpid-dispatch git commit: Fix minor doc issue with heading level
Repository: qpid-dispatch Updated Branches: refs/heads/master 03c000eb6 -> c0996627f Fix minor doc issue with heading level Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/c0996627 Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/c0996627 Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/c0996627 Branch: refs/heads/master Commit: c0996627f4a8deafea0c1bf062a52345cd9f80be Parents: 03c000e Author: Ben HardestyAuthored: Thu Mar 29 15:46:54 2018 -0400 Committer: Ben Hardesty Committed: Thu Mar 29 15:46:54 2018 -0400 -- doc/new-book/configuration-security.adoc | 22 +++--- 1 file changed, 11 insertions(+), 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/c0996627/doc/new-book/configuration-security.adoc -- diff --git a/doc/new-book/configuration-security.adoc b/doc/new-book/configuration-security.adoc index 92f60c3..2cdcec4 100644 --- a/doc/new-book/configuration-security.adoc +++ b/doc/new-book/configuration-security.adoc @@ -30,7 +30,7 @@ You can configure {RouterName} to communicate with clients, routers, and brokers * _SASL_ for authentication and payload encryption [id='setting-up-ssl-for-encryption-and-authentication'] -== Setting Up SSL/TLS for Encryption and Authentication +=== Setting Up SSL/TLS for Encryption and Authentication Before you can secure incoming and outgoing connections using SSL/TLS encryption and authentication, you must first set up the SSL/TLS profile in the router's configuration file. @@ -120,7 +120,7 @@ For information about additional `sslProfile` attributes, see link:{qdrouterdCon -- [id='setting-up-sasl-for-authentication-and-payload-encryption'] -== Setting Up SASL for Authentication and Payload Encryption +=== Setting Up SASL for Authentication and Payload Encryption If you plan to use SASL to authenticate connections, you must first add the SASL attributes to the `router` entity in the router's configuration file. These attributes define a set of SASL parameters that can be used by the router's incoming and outgoing connections. @@ -173,7 +173,7 @@ saslConfigName: qdrouterd_sasl -- [id='securing-incoming-connections'] -== Securing Incoming Connections +=== Securing Incoming Connections You can secure incoming connections by configuring each connection's `listener` entity for encryption, authentication, or both. @@ -189,7 +189,7 @@ Before securing incoming connections, the security protocols you plan to use sho * xref:adding-sasl-payload-encryption-to-incoming-connection[Add SASL payload encryption] [id='adding-ssl-encryption-to-incoming-connection'] -=== Adding SSL/TLS Encryption to an Incoming Connection + Adding SSL/TLS Encryption to an Incoming Connection You can configure an incoming connection to accept encrypted connections only. By adding SSL/TLS encryption, to connect to this router, a remote peer must first start an SSL/TLS handshake with the router and be able to validate the server certificate received by the router during the handshake. @@ -213,7 +213,7 @@ listener { -- [id='adding-sasl-authentication-to-incoming-connection'] -=== Adding SASL Authentication to an Incoming Connection + Adding SASL Authentication to an Incoming Connection You can configure an incoming connection to authenticate the client using SASL. You can use SASL authentication with or without SSL/TLS encryption. @@ -239,7 +239,7 @@ For a full list of supported Cyrus SASL authentication mechanisms, see link:http -- [id='adding-ssl-client-authentication-to-incoming-connection'] -=== Adding SSL/TLS Client Authentication to an Incoming Connection + Adding SSL/TLS Client Authentication to an Incoming Connection You can configure an incoming connection to authenticate the client using SSL/TLS. @@ -266,7 +266,7 @@ listener { -- [id='adding-sasl-payload-encryption-to-incoming-connection'] -=== Adding SASL Payload Encryption to an Incoming Connection + Adding SASL Payload Encryption to an Incoming Connection If you do not use SSL/TLS, you can still encrypt the incoming connection by using SASL payload encryption. @@ -292,7 +292,7 @@ For a full list of supported Cyrus SASL authentication mechanisms, see link:http -- [id='securing-outgoing-connections'] -== Securing Outgoing Connections +=== Securing Outgoing Connections You can secure outgoing connections by configuring each connection's `connector` entity for encryption, authentication, or both. @@ -306,7 +306,7 @@ Before securing outgoing connections, the security protocols you plan to use sho *
qpid-dispatch git commit: Fix minor doc issue with heading level
Repository: qpid-dispatch Updated Branches: refs/heads/PR275 [created] c0996627f Fix minor doc issue with heading level Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/c0996627 Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/c0996627 Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/c0996627 Branch: refs/heads/PR275 Commit: c0996627f4a8deafea0c1bf062a52345cd9f80be Parents: 03c000e Author: Ben HardestyAuthored: Thu Mar 29 15:46:54 2018 -0400 Committer: Ben Hardesty Committed: Thu Mar 29 15:46:54 2018 -0400 -- doc/new-book/configuration-security.adoc | 22 +++--- 1 file changed, 11 insertions(+), 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/c0996627/doc/new-book/configuration-security.adoc -- diff --git a/doc/new-book/configuration-security.adoc b/doc/new-book/configuration-security.adoc index 92f60c3..2cdcec4 100644 --- a/doc/new-book/configuration-security.adoc +++ b/doc/new-book/configuration-security.adoc @@ -30,7 +30,7 @@ You can configure {RouterName} to communicate with clients, routers, and brokers * _SASL_ for authentication and payload encryption [id='setting-up-ssl-for-encryption-and-authentication'] -== Setting Up SSL/TLS for Encryption and Authentication +=== Setting Up SSL/TLS for Encryption and Authentication Before you can secure incoming and outgoing connections using SSL/TLS encryption and authentication, you must first set up the SSL/TLS profile in the router's configuration file. @@ -120,7 +120,7 @@ For information about additional `sslProfile` attributes, see link:{qdrouterdCon -- [id='setting-up-sasl-for-authentication-and-payload-encryption'] -== Setting Up SASL for Authentication and Payload Encryption +=== Setting Up SASL for Authentication and Payload Encryption If you plan to use SASL to authenticate connections, you must first add the SASL attributes to the `router` entity in the router's configuration file. These attributes define a set of SASL parameters that can be used by the router's incoming and outgoing connections. @@ -173,7 +173,7 @@ saslConfigName: qdrouterd_sasl -- [id='securing-incoming-connections'] -== Securing Incoming Connections +=== Securing Incoming Connections You can secure incoming connections by configuring each connection's `listener` entity for encryption, authentication, or both. @@ -189,7 +189,7 @@ Before securing incoming connections, the security protocols you plan to use sho * xref:adding-sasl-payload-encryption-to-incoming-connection[Add SASL payload encryption] [id='adding-ssl-encryption-to-incoming-connection'] -=== Adding SSL/TLS Encryption to an Incoming Connection + Adding SSL/TLS Encryption to an Incoming Connection You can configure an incoming connection to accept encrypted connections only. By adding SSL/TLS encryption, to connect to this router, a remote peer must first start an SSL/TLS handshake with the router and be able to validate the server certificate received by the router during the handshake. @@ -213,7 +213,7 @@ listener { -- [id='adding-sasl-authentication-to-incoming-connection'] -=== Adding SASL Authentication to an Incoming Connection + Adding SASL Authentication to an Incoming Connection You can configure an incoming connection to authenticate the client using SASL. You can use SASL authentication with or without SSL/TLS encryption. @@ -239,7 +239,7 @@ For a full list of supported Cyrus SASL authentication mechanisms, see link:http -- [id='adding-ssl-client-authentication-to-incoming-connection'] -=== Adding SSL/TLS Client Authentication to an Incoming Connection + Adding SSL/TLS Client Authentication to an Incoming Connection You can configure an incoming connection to authenticate the client using SSL/TLS. @@ -266,7 +266,7 @@ listener { -- [id='adding-sasl-payload-encryption-to-incoming-connection'] -=== Adding SASL Payload Encryption to an Incoming Connection + Adding SASL Payload Encryption to an Incoming Connection If you do not use SSL/TLS, you can still encrypt the incoming connection by using SASL payload encryption. @@ -292,7 +292,7 @@ For a full list of supported Cyrus SASL authentication mechanisms, see link:http -- [id='securing-outgoing-connections'] -== Securing Outgoing Connections +=== Securing Outgoing Connections You can secure outgoing connections by configuring each connection's `connector` entity for encryption, authentication, or both. @@ -306,7 +306,7 @@ Before securing outgoing connections, the security protocols you plan to use sho *
[qpid-proton] Git Push Summary
Repository: qpid-proton Updated Tags: refs/tags/0.22.0 [created] aa99abb7f - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org
svn commit: r26080 - /release/qpid/proton/0.22.0/
Author: robbie Date: Mon Apr 2 10:52:31 2018 New Revision: 26080 Log: add files for qpid-proton-0.22.0 Added: release/qpid/proton/0.22.0/ - copied from r26079, dev/qpid/proton/0.22.0-rc1/ - To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org For additional commands, e-mail: commits-h...@qpid.apache.org