No description, website, or topics provided.
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.settings
app-graphics
doc
platforms/ubuntu
proto_src/org/waveprotocol
src
test
thumbnail_patterns
tools
war
.classpath
.dockerignore
.gitignore
.project
.project_template
CHANGES
DISCLAIMER
Dockerfile
KEYS
LICENSE.bin
LICENSE.src
NOTICE.bin
NOTICE.src
README
README.export-import
README.profiling
RELEASE-NOTES
THANKS
build-classpath.xml
build-common.xml
build-libraries-proto.xml
build-macros.xml
build-proto.properties.example
build-proto.xml
build.properties
build.xml
check-certificates.sh
jaas.config
jsongadgets.json
make_cert.sh
migrate-attachments.xml
process-script-args.sh
prosody.cfg.lua.example
run-data-migration.sh
run-export.sh
run-import.sh
run-server.bat
run-server.sh
sandstorm-files.list
sandstorm-pkgdef.capnp
server-config.xml
server.config.example
server.federation.config
server.federation.config.example
wiab-logging.conf

README

Apache Wave
------------
The Apache Wave project is a stand alone wave server and rich web client
that serves as a Wave reference implementation.
Apache Wave site: http://incubator.apache.org/wave/
This project lets developers and enterprise users run wave servers and
host waves on their own hardware. And then share those waves with other
wave servers.

Cryptographic Software Notice
-----------------------------
This distribution includes cryptographic software.  The country in
which you currently reside may have restrictions on the import,
possession, use, and/or re-export to another country, of
encryption software.  BEFORE using any encryption software, please
check your country's laws, regulations and policies concerning the
import, possession, or use, and re-export of encryption software, to
see if this is permitted.  See <http://www.wassenaar.org/> for more
information.

The U.S. Government Department of Commerce, Bureau of Industry and
Security (BIS), has classified this software as Export Commodity
Control Number (ECCN) 5D002.C.1, which includes information security
software using or performing cryptographic functions with asymmetric
algorithms.  The form and manner of this Apache Software Foundation
distribution makes it eligible for export under the License Exception
ENC Technology Software Unrestricted (TSU) exception (see the BIS
Export Administration Regulations, Section 740.13) for both object
code and source code.

The following provides more details on the included cryptographic
software:

  Wave requires the BouncyCastle Java cryptography APIs:
    http://www.bouncycastle.org/java.html

Build
------

Wave in a Box uses Ant to build.

To run the tests (optional), run:

<code>
  ant get-third-party test
</code>

To build the client and server run:
<code>
  ant get-third-party compile-gwt dist-server
</code>
It will be created in dist/wave-in-a-box-server-X.Y-incubating.jar.

You need to configure your instance before you can use it. To create a default simple configuration run:
<code>
  ant -f server-config.xml
</code>

To override default values pass them to the ant script. 
For example, to override wave_server_domain run : ant -f server-config.xml -Dwave_server_domain=example.com
Take a look at the server.config.example to learn about configuration and possible/default values.

The server can be started (on Linux/MacOS) by running
./run-server.sh
Or on Windows by running
run-server.bat
Or, you can run the server from the compiled classes with ant:
<code>
  ant run-server
</code>
The web client will be accessible by default at http://localhost:9898/

To learn more about Wave in a Box and Wave Federation Protocol:
1. Look at the white papers folder - the information is a bit old but still usable.
2. Watch the Wave Summit videos on YouTube, find the links at: https://cwiki.apache.org/confluence/display/WAVE/Wave+Summit+Talks
3. Subscribe to the wave-dev mailing list, find instructions at http://incubator.apache.org/wave/mailing-lists.html

Wave Protocol communicates using Protocol Buffers 
<http://code.google.com/p/protobuf/>
Because of the difficulty of distributing binaries, we do not include the 
protocol compiler in this distribution. Therefore, to rebuild updated 
protocol buffer files, you will need to install the binary protoc 
in your environment by fetching the protobuf code from the website 
above.

Additionally, you will have to update the build-proto.properties file to
point to the unpacked source distribution of the protocol buffers release.

Then, after updating a proto file, run

<code>
  ant -f build-proto.xml compile compile_json
</code>

Note: this generates files into proto_src. If files here exist without
write permission, you will get permission denied errors from this step.

Note also that you don't need protoc unless you want to change the proto
files.


To enable SSL:

Create a Java keystore for your server (e.g. using http://portecle.sourceforge.net/).
You will need a key (e.g. called "server") whose subject Common Name (CN) is
the hostname of your server.

Set enable_ssl = true and set the ssl_keystore_path and ssl_keystore_password options.


To enable X.509 client authentication:

If your users have X.509 certificates which include their email address, you can have
them logged in automatically (with their wave ID being the same as their email address):
You can get X.509 certificates issued from any normal CA (e.g. StartSSL offer them for free).
You can get your CA's certficate from their website, though note they might provide more than 1 certificate which you need to chain before your client certificates are considered trusted.

1. Add the signing CA to your keystore file.
2. Set enable_clientauth = true
3. Set clientauth_cert_domain (to the part after the "@" in your email addresses).
4. (optional) Set disable_loginpage = true to prevent password-based logins.

Users will be automatically logged in when they access the site, with the
username taken from the email address in their certificate.