summaryrefslogtreecommitdiff
path: root/src/node/hooks
AgeCommit message (Collapse)Author
2017-05-11Do not use cookie for pad shortcutsLuiza Pagliari
Users still cannot choose which shortcuts they want to enable/disable, so it does not make sense (yet) to have a cookie with that preference. This can be reverted once we create an UI to change shortcuts, but PLEASE PLEASE PLEASE do not read the cookie every time handleKeyEvent is called!!! This is an adjustment to #2891.
2017-05-11Merge pull request #2891 from bhldev/padShortcutDisableLuiza Pagliari
Added pad shortcut disabling feature to settings.json
2017-01-26Remove deprecated commentSjoerd Langkemper
The session key is currently stored in SESSIONKEY.txt, so it is no longer reset every time the server starts.
2016-12-20Merge branch 'develop' into improve_cookiesStefan
2016-09-20Added LibreJS supportNobody Really
2016-09-08Remove the `noDocType` argument, which was only ever passed as `false`.Dan Bornstein
2016-07-10Make express-session cookie scheme dependentStefan
2016-06-20Fixed path checkStefan
2016-06-13Merge pull request #2991 from LokeshN/deactivate-settingsJohn McLear
Issue #2960 - deactivate settings.json
2016-06-08Add secure flag to express-session cookiesStefan
2016-05-22Issue #2960 - deactivate settings.jsonLokeshN
Deactivate settings.json in Admin dashboard
2016-05-16Use fs.statSync instead of fs.existsSync (deprecated)Stefan
2016-01-21Added pad shortcut disabling featureBrian Lim
2016-01-17Set language cookie on initial loadBrian Lim
2015-12-18Use new exportAvailable() check to include check for SOffice along with ↵Chris Birk
Abiword in importexport hook
2015-10-08Fix decode error if pad name contains special characters and is sanitizedStefan
2015-05-19other bits required for read onlyJohn McLear
2015-05-07Use the cookie parser middlewareSimon Gaeremynck
2015-04-24fixes #2547John McLear
2015-04-22Adding support for providing intermediate CA certificates when running ↵Andreas Åkre Solberg
etherpad-lite with ssl through Node/expressjs
2015-04-11fix: only match /javascript/* for caching middlewareTom Hunkapiller
2015-04-10clearer comments about the path handling behaviorTom Hunkapiller
2015-04-10fix an issue in the path handling that allowed directory traversalTom Hunkapiller
2015-04-11Merge pull request #2584 from devoidfury/express4John McLear
Express 4 support
2015-04-11Log version number and git-sha on server startStefan
2015-04-10Add version number to plugins-info pageStefan
2015-04-10fix the rest of the deprecation warningsTom Hunkapiller
2015-04-10fix minify route path; update deprecated callsTom Hunkapiller
2015-04-08update for express 4.xTom Hunkapiller
2015-04-01Merge branch 'feature/append-chat-api' of github.com:derosm2/etherpad-lite ↵John McLear
into append-chat-api
2015-02-16allow for load testing connections to hit by a settingJohn McLear
2015-02-11working, need to test thoughJohn McLear
2015-02-09Adding api call for appending a chat message.Mike DeRosa
2015-01-25tell installer if old etherpad needs updating during plugin installJohn McLear
2015-01-18and this one..John McLear
2014-12-31Merge pull request #2418 from ether/etherpad-export-and-importJohn McLear
Full Pad portability (Export/Import)
2014-12-30hack to avoid warnings in swagger usagewebzwo0i
2014-12-29semi working requires browser refreshJohn McLear
2014-12-29resolve merge conflictJohn McLear
2014-12-27removing dokuwikiJohn McLear
2014-12-16remove more dead requires.webzwo0i
2014-12-16Merge pull request #2373 from webzwo0i/avoid-global-vairablesJohn McLear
dont make local variables global
2014-12-14dont make local variables globalwebzwo0i
2014-11-25really recreate socketio-client in expressCreateServer, fixes #2342luto
When using plugins, the express server gets restarted. When we do that, the socketio-server should also get restarted. It doesn't. That means that all the events in SocketIORouter.js are bound twice, which causes chaos all over etherpad. This changes our socketio.js so it fully recreates the io-instance when we restart the server. introduced in 95e7b0f15609fc850b71717a672abd02237a0f33, but catching that would have been hard.
2014-11-23final commitJohn McLear
2014-11-23fix session managementJohn McLear
2014-11-18hrm I dont trust this securityJohn McLear
2014-11-18stability restored now to handle the auth issuesJohn McLear
2014-11-18template of a semi-fixJohn McLear
2014-11-04working handling of setting client ip and anonymizing etcJohn McLear