Simplify documentation.
Remove duplicate instances of the JAMS manual.
Consolidate Jami/JAMS manuals.
JAMS manual is available at https://docs.jami.net/jams/ and contains
improvements.
Change-Id: I00b1203d262493c024de63bee4a8a13913f456f6
searchUserProfiles does a LIKE SQL query, which may return multiple user profiles.
It then selects the first result, which could belong to a different user with a longer name.
e.g. if both Michel and Michelle are registered, Michel is incorrectly resolved as Michelle.
GitLab: #135
Change-Id: Ib9bacb8e6cb2fc747ea7d4acd206b0841deea37d
use test server ns-test.jami.net instead of ns.jami.net
Name registration had 2 issues :
wrong adress: it should be 40 characters long and be unique
signature and publickey can be "" but not null
Change-Id: I7c160de816b8527316111af8f1489b564f546986
Add publicKey and signature in the nameserver with user registration.
Disabled test RegisterUserFlowTest.java because the user is not correctly created and user.getCertificate() is null causing the test to fail
Gitlab: #150
Change-Id: I5735e578b775aea9a934b1889c833aa5e14a1cc4
Change the return API to avoid displaying "null" as name in every client
Usefull when first and/or last name is left blank during LDAP/AD creation
GitLab: #145
Change-Id: I48270ad514d6ffaa33c58678354b2fc146d5d18f
If a first or last name is not defined during LDAP/AD user creation,
it is not displayed, instead of showing "undefined"
Change-Id: I8cef34d504c14739ae958caec35754ca83aa8228
Disable account discorvery and publish in default setup and default blueprint
For privacy reasons, account discovery and publish should be false by default
Change-Id: I7d906433bc53222e7bd8befd7d789477884e80aa
Removed empty conversation filter error log.
This log was triggered even when there were no conversation requests,
which is normal behavior.
Change-Id: Ibed0cc595470660abeb1885263be657d14e7537f
this commit fix the error when creating user while using the public nameserver
replace http by https in the nameserver address
add Publickey and Signature to the registration request
Gitlab: #150
Change-Id: I124fe47a7d6f3c263f441dc8a3fe454a23c91742
During the Certificate Authority creation, the admin must choose a country.
This is required and locked, but the property was missing, so the "*" was not displayed.
However, it was already not possible to create a CA without a country; this change is purely visual.
Change-Id: I7a852ccb9d6f13a1552d4d17cab1a8bc1696a463
Extensions object cannot be constructed with empty Extension.
However, an extension is not required in addResponse function
Corrected the issue by splitting the function between those two cases
Gitlab: #151
Change-Id: I584329ee88457d88198ab3d1457ff41c2b00c40a
This button was not effective, this is the implementation
Add an atribute in UserProfile to check if revoked
Change-Id: I40a80c177e323627d1d76ceab8a41d2bf3f47594
Removed the manual KeyStore creation and switched to SSLContexts.createSystemDefault()
to rely on Java’s built-in truststore for validating SSL certificates.
It fixes the SSLHandshakeException.
Change-Id: I4cc8afda87825c2da95ddc8f2b74d3d93d0994e6
Are you sure you → Do you really → Do you
community version of JAMS → JAMS Community Edition
purchase → buy
Would you like → Do you want
Change-Id: I78a99471fb06722fef8f4b434cfd73c242962a26
GitLab: https://git.jami.net/savoirfairelinux/jami-client-qt/-/issues/1730
The LDAP and the AD connector now falls back to its internal database
whenever it is not able to access its authentication server. This fixes
a null pointer exception that was otherwise raised in the SearchDirectoryServlet.
Ticket: https://redmine.savoirfairelinux.com/issues/7666
Change-Id: Ifa0df8956d14c9715730e389a1cd6ae68e6bfb48
If the config.json file is corrupted, JAMS may start even though its CA
is null. In this state, the server cannot authenticate any user and is
not operational.
Ticket: https://redmine.savoirfairelinux.com/issues/7668
Change-Id: I61e69200af1089a085991176fa6bb6273ecc2e82
Fix f037a08d didn't work for active directory since
UserProfileService.getUserProfile returns an empty array instead of null
for Active Directory. In this case we must also check for an empty array
in order to identify that the AD server is down.
Ticket: https://redmine.savoirfairelinux.com/issues/7656
Change-Id: Icda219ec5f85b5b40e7a0c56957b2eb1dcd4f866
UserProfileFieldsList component: max-width: 50%; should be removed on info fields
Contact:
ConversationId icon should be outlined
Building should be a suitcase for company name
UiCustomization
Separate with a line with margin top and bottom 3 sections: title/description, background and logo
Show color picker directly instead of a button that then displays a color picker
Fix customization overflowing on mobile
Put action back in the right column table
Ticket: https://redmine.savoirfairelinux.com/issues/7465
Change-Id: I07d5ea053faaabc8dc6847726a8b9fb3ba11b27c
Modifications to the keystore.jks file are not taken into account by the jvm until jams is restarted once after setup. The issue turned out to be an underlying tomcat bug that is now resolved by bumping its version.
https: //redmine.savoirfairelinux.com/users/329
Change-Id: I4408d89e4241afb9a7a179ea3d7e415f6a575a2e
fixing a bug where users that should not be revoked are getting revoked
automatically with Active Directory
Ticket: https://redmine.savoirfairelinux.com/issues/7520
Change-Id: Icb7a0292eb195cdab6dec1af642211ca1ee69f09
Fixed general text alignements and margins
Set all icons with wired styles
Fixed responsive styles
Fix form errors display
Ticket: https://redmine.savoirfairelinux.com/issues/7437
Change-Id: I04b84ed40a24579c4d1d3dbf1e9ba2ba1e60c2a3
Fixes holes in the contact list where contact that are revoked user where still attempted to be
displayed
Ticket: https://redmine.savoirfairelinux.com/issues/7449
Change-Id: Ib3fddf6c4b24bbd90e30d15b00c45cb306443bec
Fixed add contact in admin and authenticated state
Fixed Blueprints permissions, configuration and UI customization state not being saved
Ticket: https://redmine.savoirfairelinux.com/issues/7360
Change-Id: I5dff06247b9384ea5d1882ca1152214c95ee3d29