qpid-dispatch git commit: DISPATCH-954 - Fixed issue suggested by coverity scan tool. This closes #277

2018-04-02 Thread gmurthy
Repository: qpid-dispatch
Updated Branches:
  refs/heads/master 5ee639374 -> fc7ed088a


DISPATCH-954 - Fixed issue suggested by coverity scan tool. This closes #277


Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/fc7ed088
Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/fc7ed088
Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/fc7ed088

Branch: refs/heads/master
Commit: fc7ed088a719df0571575d52404314fc70631777
Parents: 5ee6393
Author: Fernando Giorgetti 
Authored: Mon Apr 2 16:15:19 2018 -0300
Committer: Ganesh Murthy 
Committed: Mon Apr 2 15:20:13 2018 -0400

--
 router/src/main.c | 9 -
 1 file changed, 4 insertions(+), 5 deletions(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/fc7ed088/router/src/main.c
--
diff --git a/router/src/main.c b/router/src/main.c
index b6c9d53..c66ba4f 100644
--- a/router/src/main.c
+++ b/router/src/main.c
@@ -209,12 +209,11 @@ static void daemon_process(const char *config_path, const 
char *python_pkgdir,
  cur_path,
  !strcmp("/", cur_path)? "":"/",
  config_path);
-}
-
-// Releasing temporary path variable
-memset(cur_path, 0, path_size * sizeof(char));
-free(cur_path);
 
+// Releasing temporary path variable
+memset(cur_path, 0, path_size * sizeof(char));
+free(cur_path);
+}
 }
 
 //


-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org



qpid-dispatch git commit: DISPATCH-951: Show location and version of Proton found by CMake

2018-04-02 Thread chug
Repository: qpid-dispatch
Updated Branches:
  refs/heads/master c0996627f -> 5ee639374


DISPATCH-951: Show location and version of Proton found by CMake

CMake displays the location and version numbers for python and
libwebsockets used in the build. Print that same information for
qpid-proton.


Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/5ee63937
Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/5ee63937
Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/5ee63937

Branch: refs/heads/master
Commit: 5ee639374a5131ac6316f613e9387eecf5e53955
Parents: c099662
Author: Chuck Rolke 
Authored: Mon Apr 2 13:51:10 2018 -0400
Committer: Chuck Rolke 
Committed: Mon Apr 2 13:51:10 2018 -0400

--
 CMakeLists.txt | 2 ++
 1 file changed, 2 insertions(+)
--


http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/5ee63937/CMakeLists.txt
--
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 55c6e5f..e13a45c 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -116,6 +116,8 @@ find_library(dl_lib dl)
 find_library(rt_lib rt)
 find_package(Proton REQUIRED Core Proactor)
 
+message(STATUS "Found Proton: ${Proton_LIBRARIES} (found version 
\"${Proton_VERSION}\")" )
+
 ## Optional dependencies
 include(FindLibWebSockets)
 option(USE_LIBWEBSOCKETS "Use libwebsockets for WebSocket support" 
${LIBWEBSOCKETS_FOUND})


-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org



[2/2] qpid-broker-j git commit: NO-JIRA: [Broker-J] Bump Qpid JMS client version to 0.31.0

2018-04-02 Thread orudyy
NO-JIRA: [Broker-J] Bump Qpid JMS client version to 0.31.0


Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/0cc2bb7d
Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/0cc2bb7d
Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/0cc2bb7d

Branch: refs/heads/master
Commit: 0cc2bb7de79a82f3b138277a4b5a00c9749af948
Parents: d773df7
Author: Alex Rudyy 
Authored: Mon Apr 2 16:04:02 2018 +0100
Committer: Alex Rudyy 
Committed: Mon Apr 2 16:51:00 2018 +0100

--
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/0cc2bb7d/pom.xml
--
diff --git a/pom.xml b/pom.xml
index acb1f6e..afebdb3 100644
--- a/pom.xml
+++ b/pom.xml
@@ -149,7 +149,7 @@
 3.5.0
 1.0.3
 4.5.3
-0.30.0
+0.31.0
 6.3.0
 
 1.3.2


-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org



[1/2] qpid-broker-j git commit: NO-JIRA: [Broker-J] [System Tests] Remove workaround for qpid jms client not respecting reconnectDelay (QPIDJMS-365)

2018-04-02 Thread orudyy
Repository: qpid-broker-j
Updated Branches:
  refs/heads/master d773df7d7 -> b22a1e7ad


NO-JIRA: [Broker-J] [System Tests] Remove workaround for qpid jms client not 
respecting reconnectDelay (QPIDJMS-365)


Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/b22a1e7a
Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/b22a1e7a
Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/b22a1e7a

Branch: refs/heads/master
Commit: b22a1e7ad898992a60ffb8ef2c66f58735d8ba1e
Parents: 0cc2bb7
Author: Alex Rudyy 
Authored: Mon Apr 2 16:48:54 2018 +0100
Committer: Alex Rudyy 
Committed: Mon Apr 2 16:51:00 2018 +0100

--
 .../server/store/berkeleydb/replication/GroupCreator.java| 8 
 .../http/endtoend/message/CompressedMessageContentTest.java  | 4 +---
 .../apache/qpid/systests/QpidJmsClientConnectionBuilder.java | 4 
 3 files changed, 5 insertions(+), 11 deletions(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java
--
diff --git 
a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java
 
b/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java
index 7750a0d..d7e6b7f 100644
--- 
a/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java
+++ 
b/bdbstore/systests/src/test/java/org/apache/qpid/server/store/berkeleydb/replication/GroupCreator.java
@@ -306,14 +306,6 @@ public class GroupCreator
 connectionBuilder.addFailoverPort(brokerPortNumber);
 }
 
-if (_testcase.getBrokerProtocol().equals(Protocol.AMQP_1_0))
-{
-
connectionBuilder.setOptions(Collections.singletonMap("failover.warnAfterReconnectAttempts",
 "1"));
-// TODO - QPIDJMS-365 - workaround for the fact that the client 
does not respect reconnectDelay if the
-// server closes the connection gracefully.
-
connectionBuilder.setOptions(Collections.singletonMap("failover.initialReconnectDelay",
 "15000"));
-}
-
 return connectionBuilder;
 }
 

http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java
--
diff --git 
a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java
 
b/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java
index 62a85c6..00b330c 100644
--- 
a/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java
+++ 
b/systests/qpid-systests-http-management/src/test/java/org/apache/qpid/tests/http/endtoend/message/CompressedMessageContentTest.java
@@ -31,7 +31,6 @@ import java.io.IOException;
 import java.io.InputStream;
 import java.net.HttpURLConnection;
 import java.nio.charset.StandardCharsets;
-import java.util.Collections;
 import java.util.HashMap;
 import java.util.List;
 import java.util.Map;
@@ -255,8 +254,7 @@ public class CompressedMessageContentTest extends 
HttpTestBase
 
 private Connection getConnection(final boolean compress) throws Exception
 {
-Map options = 
Collections.singletonMap("compressMessages", String.valueOf(compress));
-return getConnectionBuilder().setOptions(options).build();
+   return getConnectionBuilder().setCompress(compress).build();
 }
 
 }

http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/b22a1e7a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java
--
diff --git 
a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java
 
b/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java
index 263ff9c..b5be7d2 100644
--- 
a/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java
+++ 
b/systests/qpid-systests-jms-core/src/main/java/org/apache/qpid/systests/QpidJmsClientConnectionBuilder.java
@@ -286,6 +286,10 @@ public class QpidJmsClientConnectionBuilder implements 
ConnectionBuilder
 options.putAll(_options);
 if (_enableFailover)
 {

qpid-broker-j git commit: QPID-8151: [Broker-J] [Unit tests] Add missing exclusion when running on an IBM JDK.

2018-04-02 Thread kwall
Repository: qpid-broker-j
Updated Branches:
  refs/heads/master 988e5c960 -> d773df7d7


QPID-8151: [Broker-J] [Unit tests] Add missing exclusion when running on an IBM 
JDK.


Project: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/commit/d773df7d
Tree: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/tree/d773df7d
Diff: http://git-wip-us.apache.org/repos/asf/qpid-broker-j/diff/d773df7d

Branch: refs/heads/master
Commit: d773df7d7c78480de02d8a0feab7d7401df22e50
Parents: 988e5c9
Author: Keith Wall 
Authored: Mon Apr 2 16:30:48 2018 +0100
Committer: Keith Wall 
Committed: Mon Apr 2 16:31:15 2018 +0100

--
 .../qpid/server/transport/TCPandSSLTransportTest.java |  7 +++
 test-profiles/IBMJDKExcludes  | 14 --
 2 files changed, 7 insertions(+), 14 deletions(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/d773df7d/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java
--
diff --git 
a/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java
 
b/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java
index d3fd34d..53d81f5 100644
--- 
a/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java
+++ 
b/broker-core/src/test/java/org/apache/qpid/server/transport/TCPandSSLTransportTest.java
@@ -20,7 +20,12 @@
  */
 package org.apache.qpid.server.transport;
 
+import static org.apache.qpid.test.utils.JvmVendor.IBM;
+import static org.hamcrest.CoreMatchers.equalTo;
+import static org.hamcrest.CoreMatchers.is;
+import static org.hamcrest.CoreMatchers.not;
 import static org.junit.Assert.fail;
+import static org.junit.Assume.assumeThat;
 import static org.mockito.Matchers.any;
 import static org.mockito.Mockito.mock;
 import static org.mockito.Mockito.when;
@@ -60,6 +65,7 @@ public class TCPandSSLTransportTest extends UnitTestBase
 @Test
 public void testNoSSLv3SupportOnSSLOnlyPort() throws Exception
 {
+assumeThat("The IBM JDK has different TLS defaults", getJvmVendor(), 
is(not(equalTo(IBM;
 try
 {
 checkSSLExcluded("SSLv3", Transport.SSL);
@@ -105,6 +111,7 @@ public class TCPandSSLTransportTest extends UnitTestBase
 @Test
 public void testNoSSLv3SupportOnSharedPort() throws Exception
 {
+assumeThat("The IBM JDK has different TLS defaults", getJvmVendor(), 
is(not(equalTo(IBM;
 try
 {
 checkSSLExcluded("SSLv3", Transport.TCP, Transport.SSL);

http://git-wip-us.apache.org/repos/asf/qpid-broker-j/blob/d773df7d/test-profiles/IBMJDKExcludes
--
diff --git a/test-profiles/IBMJDKExcludes b/test-profiles/IBMJDKExcludes
index 353c739..969b927 100644
--- a/test-profiles/IBMJDKExcludes
+++ b/test-profiles/IBMJDKExcludes
@@ -17,17 +17,3 @@
 // under the License.
 //
 
-org.apache.qpid.server.transport.TCPandSSLTransportTest#*
-
-# Transformer on IBM JDK has different whitespace behaviour
-org.apache.qpid.disttest.results.ResultsXmlWriterTest#*
-
-# THe IBMJSSE2 trust factory (IbmX509) validates the entire certificate chain, 
including trusted certificates.
-# 
https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/knowndiffsun.html
-org.apache.qpid.server.security.FileTrustStoreTest#testUseOfExpiredTrustAnchorAllowed
-
-# (QPID-7955) Behaviourial difference between the IBM JDK and the Open JDK
-# 
https://www.ibm.com/developerworks/community/forums/html/topic?id=8482d948-665c-47a2-862e-457e49ac71a4=25
-org.apache.qpid.server.logging.logback.Logback1027WorkaroundTurboFilterTest#testSuppressedExceptionRecursion
-org.apache.qpid.server.logging.logback.Logback1027WorkaroundTurboFilterTest#testInitCauseRecursion
-


-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org



qpid-dispatch git commit: Fix minor doc issue with heading level

2018-04-02 Thread chug
Repository: qpid-dispatch
Updated Branches:
  refs/heads/master 03c000eb6 -> c0996627f


Fix minor doc issue with heading level


Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/c0996627
Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/c0996627
Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/c0996627

Branch: refs/heads/master
Commit: c0996627f4a8deafea0c1bf062a52345cd9f80be
Parents: 03c000e
Author: Ben Hardesty 
Authored: Thu Mar 29 15:46:54 2018 -0400
Committer: Ben Hardesty 
Committed: Thu Mar 29 15:46:54 2018 -0400

--
 doc/new-book/configuration-security.adoc | 22 +++---
 1 file changed, 11 insertions(+), 11 deletions(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/c0996627/doc/new-book/configuration-security.adoc
--
diff --git a/doc/new-book/configuration-security.adoc 
b/doc/new-book/configuration-security.adoc
index 92f60c3..2cdcec4 100644
--- a/doc/new-book/configuration-security.adoc
+++ b/doc/new-book/configuration-security.adoc
@@ -30,7 +30,7 @@ You can configure {RouterName} to communicate with clients, 
routers, and brokers
 * _SASL_ for authentication and payload encryption
 
 [id='setting-up-ssl-for-encryption-and-authentication']
-== Setting Up SSL/TLS for Encryption and Authentication
+=== Setting Up SSL/TLS for Encryption and Authentication
 
 Before you can secure incoming and outgoing connections using SSL/TLS 
encryption and authentication, you must first set up the SSL/TLS profile in the 
router's configuration file.
 
@@ -120,7 +120,7 @@ For information about additional `sslProfile` attributes, 
see link:{qdrouterdCon
 --
 
 [id='setting-up-sasl-for-authentication-and-payload-encryption']
-== Setting Up SASL for Authentication and Payload Encryption
+=== Setting Up SASL for Authentication and Payload Encryption
 
 If you plan to use SASL to authenticate connections, you must first add the 
SASL attributes to the `router` entity in the router's configuration file. 
These attributes define a set of SASL parameters that can be used by the 
router's incoming and outgoing connections.
 
@@ -173,7 +173,7 @@ saslConfigName: qdrouterd_sasl
 --
 
 [id='securing-incoming-connections']
-== Securing Incoming Connections
+=== Securing Incoming Connections
 
 You can secure incoming connections by configuring each connection's 
`listener` entity for encryption, authentication, or both.
 
@@ -189,7 +189,7 @@ Before securing incoming connections, the security 
protocols you plan to use sho
 * xref:adding-sasl-payload-encryption-to-incoming-connection[Add SASL payload 
encryption]
 
 [id='adding-ssl-encryption-to-incoming-connection']
-=== Adding SSL/TLS Encryption to an Incoming Connection
+ Adding SSL/TLS Encryption to an Incoming Connection
 
 You can configure an incoming connection to accept encrypted connections only. 
By adding SSL/TLS encryption, to connect to this router, a remote peer must 
first start an SSL/TLS handshake with the router and be able to validate the 
server certificate received by the router during the handshake.
 
@@ -213,7 +213,7 @@ listener {
 --
 
 [id='adding-sasl-authentication-to-incoming-connection']
-=== Adding SASL Authentication to an Incoming Connection
+ Adding SASL Authentication to an Incoming Connection
 
 You can configure an incoming connection to authenticate the client using 
SASL. You can use SASL authentication with or without SSL/TLS encryption.
 
@@ -239,7 +239,7 @@ For a full list of supported Cyrus SASL authentication 
mechanisms, see link:http
 --
 
 [id='adding-ssl-client-authentication-to-incoming-connection']
-=== Adding SSL/TLS Client Authentication to an Incoming Connection
+ Adding SSL/TLS Client Authentication to an Incoming Connection
 
 You can configure an incoming connection to authenticate the client using 
SSL/TLS.
 
@@ -266,7 +266,7 @@ listener {
 --
 
 [id='adding-sasl-payload-encryption-to-incoming-connection']
-=== Adding SASL Payload Encryption to an Incoming Connection
+ Adding SASL Payload Encryption to an Incoming Connection
 
 If you do not use SSL/TLS, you can still encrypt the incoming connection by 
using SASL payload encryption.
 
@@ -292,7 +292,7 @@ For a full list of supported Cyrus SASL authentication 
mechanisms, see link:http
 --
 
 [id='securing-outgoing-connections']
-== Securing Outgoing Connections
+=== Securing Outgoing Connections
 
 You can secure outgoing connections by configuring each connection's 
`connector` entity for encryption, authentication, or both.
 
@@ -306,7 +306,7 @@ Before securing outgoing connections, the security 
protocols you plan to use sho
 * 

qpid-dispatch git commit: Fix minor doc issue with heading level

2018-04-02 Thread chug
Repository: qpid-dispatch
Updated Branches:
  refs/heads/PR275 [created] c0996627f


Fix minor doc issue with heading level


Project: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/repo
Commit: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/commit/c0996627
Tree: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/tree/c0996627
Diff: http://git-wip-us.apache.org/repos/asf/qpid-dispatch/diff/c0996627

Branch: refs/heads/PR275
Commit: c0996627f4a8deafea0c1bf062a52345cd9f80be
Parents: 03c000e
Author: Ben Hardesty 
Authored: Thu Mar 29 15:46:54 2018 -0400
Committer: Ben Hardesty 
Committed: Thu Mar 29 15:46:54 2018 -0400

--
 doc/new-book/configuration-security.adoc | 22 +++---
 1 file changed, 11 insertions(+), 11 deletions(-)
--


http://git-wip-us.apache.org/repos/asf/qpid-dispatch/blob/c0996627/doc/new-book/configuration-security.adoc
--
diff --git a/doc/new-book/configuration-security.adoc 
b/doc/new-book/configuration-security.adoc
index 92f60c3..2cdcec4 100644
--- a/doc/new-book/configuration-security.adoc
+++ b/doc/new-book/configuration-security.adoc
@@ -30,7 +30,7 @@ You can configure {RouterName} to communicate with clients, 
routers, and brokers
 * _SASL_ for authentication and payload encryption
 
 [id='setting-up-ssl-for-encryption-and-authentication']
-== Setting Up SSL/TLS for Encryption and Authentication
+=== Setting Up SSL/TLS for Encryption and Authentication
 
 Before you can secure incoming and outgoing connections using SSL/TLS 
encryption and authentication, you must first set up the SSL/TLS profile in the 
router's configuration file.
 
@@ -120,7 +120,7 @@ For information about additional `sslProfile` attributes, 
see link:{qdrouterdCon
 --
 
 [id='setting-up-sasl-for-authentication-and-payload-encryption']
-== Setting Up SASL for Authentication and Payload Encryption
+=== Setting Up SASL for Authentication and Payload Encryption
 
 If you plan to use SASL to authenticate connections, you must first add the 
SASL attributes to the `router` entity in the router's configuration file. 
These attributes define a set of SASL parameters that can be used by the 
router's incoming and outgoing connections.
 
@@ -173,7 +173,7 @@ saslConfigName: qdrouterd_sasl
 --
 
 [id='securing-incoming-connections']
-== Securing Incoming Connections
+=== Securing Incoming Connections
 
 You can secure incoming connections by configuring each connection's 
`listener` entity for encryption, authentication, or both.
 
@@ -189,7 +189,7 @@ Before securing incoming connections, the security 
protocols you plan to use sho
 * xref:adding-sasl-payload-encryption-to-incoming-connection[Add SASL payload 
encryption]
 
 [id='adding-ssl-encryption-to-incoming-connection']
-=== Adding SSL/TLS Encryption to an Incoming Connection
+ Adding SSL/TLS Encryption to an Incoming Connection
 
 You can configure an incoming connection to accept encrypted connections only. 
By adding SSL/TLS encryption, to connect to this router, a remote peer must 
first start an SSL/TLS handshake with the router and be able to validate the 
server certificate received by the router during the handshake.
 
@@ -213,7 +213,7 @@ listener {
 --
 
 [id='adding-sasl-authentication-to-incoming-connection']
-=== Adding SASL Authentication to an Incoming Connection
+ Adding SASL Authentication to an Incoming Connection
 
 You can configure an incoming connection to authenticate the client using 
SASL. You can use SASL authentication with or without SSL/TLS encryption.
 
@@ -239,7 +239,7 @@ For a full list of supported Cyrus SASL authentication 
mechanisms, see link:http
 --
 
 [id='adding-ssl-client-authentication-to-incoming-connection']
-=== Adding SSL/TLS Client Authentication to an Incoming Connection
+ Adding SSL/TLS Client Authentication to an Incoming Connection
 
 You can configure an incoming connection to authenticate the client using 
SSL/TLS.
 
@@ -266,7 +266,7 @@ listener {
 --
 
 [id='adding-sasl-payload-encryption-to-incoming-connection']
-=== Adding SASL Payload Encryption to an Incoming Connection
+ Adding SASL Payload Encryption to an Incoming Connection
 
 If you do not use SSL/TLS, you can still encrypt the incoming connection by 
using SASL payload encryption.
 
@@ -292,7 +292,7 @@ For a full list of supported Cyrus SASL authentication 
mechanisms, see link:http
 --
 
 [id='securing-outgoing-connections']
-== Securing Outgoing Connections
+=== Securing Outgoing Connections
 
 You can secure outgoing connections by configuring each connection's 
`connector` entity for encryption, authentication, or both.
 
@@ -306,7 +306,7 @@ Before securing outgoing connections, the security 
protocols you plan to use sho
 * 

[qpid-proton] Git Push Summary

2018-04-02 Thread robbie
Repository: qpid-proton
Updated Tags:  refs/tags/0.22.0 [created] aa99abb7f

-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org



svn commit: r26080 - /release/qpid/proton/0.22.0/

2018-04-02 Thread robbie
Author: robbie
Date: Mon Apr  2 10:52:31 2018
New Revision: 26080

Log:
add files for qpid-proton-0.22.0

Added:
release/qpid/proton/0.22.0/
  - copied from r26079, dev/qpid/proton/0.22.0-rc1/


-
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org