W.C.A. Wijngaards
6bee3e77fc
Changelog note for #519 and example.conf edit
...
- Merge #519 : Support for selective enabling tcp-upstream for
stub/forward zones.
- For #519 : note stub-tcp-upstream and forward-tcp-upstream in
the example configuration file.
2021-08-12 15:05:51 +02:00
Wouter Wijngaards
0ace659fe2
Merge pull request #519 from ziollek/tcp_upstream_option
...
Support for selective enabling tcp-upstream for stub/forward zones
2021-08-12 15:03:57 +02:00
W.C.A. Wijngaards
07f70d0745
Changelog note for #523
...
- Merge #523 : fix: free() call more than once with the same pointer.
2021-08-12 13:45:18 +02:00
Wouter Wijngaards
79df099f4c
Merge pull request #523 from Shchelk/bugfix
...
fix: free() call more than once with the same pointer
2021-08-12 13:45:00 +02:00
W.C.A. Wijngaards
20febc2179
Changelog note for #521
...
- Merge #521 : Update mini_event.c.
2021-08-12 13:24:15 +02:00
Wouter Wijngaards
6780a0844d
Merge pull request #521 from liheng562653799/master
...
Update mini_event.c
2021-08-12 13:24:03 +02:00
W.C.A. Wijngaards
f8ddcc15b8
- Add test tool readzone to .gitignore.
2021-08-12 13:17:29 +02:00
W.C.A. Wijngaards
c5ceee22a9
- And 1.13.2rc1 became the 1.13.2 with the fix for the python module
...
build. The current code repository continues with version 1.13.3.
2021-08-12 10:04:20 +02:00
Shchelkunov Artem
e20b2c1aaf
fix: free() call more than once with the same pointer
2021-08-11 15:14:43 +05:00
liheng562653799
edbf9c21ee
Update mini_event.c
...
When in heavy load, unbound opens many outside_network sockets for out going queries to delegation servers, which may result in a big fd(maxfd) value(for thread A 65500, for thread B 65501, for thread C ...).
There are situations when thread A has a max fd num 65500 where maxfd is of course 65500, thread B has max fd num 20 for now but maxfd is still 65501. Though linux kernel checks whether maxfd+1 passed by select syscall is really the process' maxfd+1. Linux kernel can not tell maxfd+1 passed by thread B select syscall is much bigger(65501+1 or 65500+1 after trimed by kerne) than it should be (20+1).
In this situation, when kernel do_select() for thread B, much work is wasted.
2021-08-06 12:00:56 +08:00
W.C.A. Wijngaards
8e538dcaa8
- Fix #520 : Unbound 1.13.2rc1 fails to build python module.
2021-08-05 17:10:56 +02:00
Tomasz Ziolkowski
ae45f46b9e
Add (stub|forward)-tcp-upstream options which enable using tcp transport only for specified stub/forward zones
2021-08-05 08:44:18 +02:00
W.C.A. Wijngaards
4518bb1158
For 1.13.2rc1.
2021-08-05 08:37:20 +02:00
W.C.A. Wijngaards
5d349dbcf3
- Tag for 1.13.2 release.
2021-08-05 08:36:24 +02:00
W.C.A. Wijngaards
77fdd8836d
- Fix unit test zonemd_reload for use in run_vm.
2021-08-04 16:26:21 +02:00
W.C.A. Wijngaards
822a96b29a
- Fix libnettle zonemd unit test.
2021-08-04 14:04:31 +02:00
W.C.A. Wijngaards
067954fe8d
- Fix out of sourcedir run of zonemd unit tests.
2021-08-04 13:54:38 +02:00
W.C.A. Wijngaards
592cfe3afc
- Fix readzone compile under debug config.
2021-08-04 11:43:29 +02:00
W.C.A. Wijngaards
6dd270d625
- Fix missing locks in zonemd unit test.
2021-08-04 11:05:51 +02:00
W.C.A. Wijngaards
c9bb0604db
- Fix static analysis warnings about localzone locks that are unused.
2021-08-04 10:58:08 +02:00
George Thessalonikefs
8878680898
- Bump MAX_RESTART_COUNT to 11 from 8; in relation to #438 . This allows
...
longer CNAME chains in Unbound.
2021-08-04 10:53:22 +02:00
George Thessalonikefs
efa15747a2
Changelog note for #415 :
...
- Merge PR #415 from sibeream: Use /proc/sys/net/ipv4/ip_local_port_range
to determine available outgoing ports.
2021-08-04 10:47:38 +02:00
gthess
bdaecd942d
Merge pull request #415 from sibeream/master
...
Use /proc/sys/net/ipv4/ip_local_port_range to determine available outgoing ports
2021-08-04 10:42:12 +02:00
W.C.A. Wijngaards
f5d53928a3
- In unit test use openssl set security level to allow keys in test.
2021-08-04 09:58:38 +02:00
W.C.A. Wijngaards
c639dc956a
- Fix sign comparison warning on FreeBSD.
2021-08-03 14:13:37 +02:00
W.C.A. Wijngaards
2a0df9e72e
- Annotate assertion into error printout; we think it may be an
...
error, but the situation looks harmless.
2021-08-03 14:08:30 +02:00
W.C.A. Wijngaards
dd7dc30294
Changelog note for #517
...
- Merge PR #517 from dyunwei: #420 breaks the mesh reply list
function that need to reuse the dns answer.
2021-08-03 13:11:18 +02:00
Wouter Wijngaards
5196ee03e6
Merge pull request #517 from dyunwei/master
...
#420 breaks the mesh reply list function that need to reuse the dns answer.
2021-08-03 13:11:01 +02:00
George Thessalonikefs
a519009378
Merge branch 'master' of github.com:NLnetLabs/unbound
2021-08-03 12:20:45 +02:00
George Thessalonikefs
ca67691092
- Listen to read or write events after the SSL handshake.
...
Sticky events on windows would stick on read when write was needed.
2021-08-03 12:18:58 +02:00
daiyunwei
0784ad7a11
#420
...
clear the c->buffer in the comm_point_send_reply does resolve the "can't fit qbuffer in c->buffer" issue, but it breaks the mesh reply list function that need to reuse the answer. because the c->buffer is cleared in the comm_point_send_reply, it cannot be resued again. it means that it is not inappropriate to clear c->buffer in the comm_point_send_reply.
After some investigation, i found it is appropriate to clear c->buffer before use in the http2_query_read_done.
2021-08-03 11:40:30 +08:00
W.C.A. Wijngaards
3ed5b62578
- Fix verbose printout failure in tcp reuse unit test.
2021-08-02 16:06:36 +02:00
W.C.A. Wijngaards
89e2f2f753
- iana portlist update.
2021-08-02 15:26:20 +02:00
W.C.A. Wijngaards
0bdcbc80b9
- Move ECDSA functions to use OpenSSL 3.0.0 API.
2021-08-02 15:06:26 +02:00
W.C.A. Wijngaards
d242bfb73b
- Move RSA and DSA to use OpenSSL 3.0.0 API.
2021-08-02 14:43:51 +02:00
W.C.A. Wijngaards
60663c766a
Review fixup for keyraw pkey function use.
2021-08-02 13:39:48 +02:00
W.C.A. Wijngaards
ca00814e67
- Prepare for OpenSSL 3.0.0 provider API usage, move the sldns
...
keyraw functions to produce EVP_PKEY results.
2021-08-02 13:33:32 +02:00
W.C.A. Wijngaards
b6abcb1508
- For #515 : Fix compilation with openssl 3.0.0 beta2, lib64 dir and
...
SSL_get_peer_certificate.
- Move acx_nlnetlabs.m4 to version 41, with lib64 openssl dir check.
2021-07-30 13:54:43 +02:00
W.C.A. Wijngaards
11caae256b
- Fix #515 : Compilation against openssl 3.0.0 beta2 is failing to
...
build unbound.
2021-07-30 13:35:23 +02:00
George Thessalonikefs
dd254137f1
- Changelog entry for #513 : Stream reuse, attempt to fix #411 , #439 ,
...
#469 .
2021-07-26 16:55:32 +02:00
gthess
dcd75814b9
Merge pull request #513 from NLnetLabs/tcp_reuse_fix
...
Stream reuse, attempt to fix #411 , #439 , #469
2021-07-26 16:54:34 +02:00
W.C.A. Wijngaards
e8d28f0a55
- Fix readzone unknown type print for memory resize.
2021-07-26 16:45:33 +02:00
George Thessalonikefs
8ee5aa312f
- Fix unittcpreuse.c: properly initialise outnet.
2021-07-26 16:29:57 +02:00
George Thessalonikefs
ad2bd61ed4
- Remove redundant log_assert and fix error messages.
2021-07-26 16:12:55 +02:00
George Thessalonikefs
de73af2da2
- stream reuse, do not explicitly wait for a free pending_tcp if a reuse
...
could be used.
2021-07-26 10:47:20 +02:00
W.C.A. Wijngaards
fc462aa15d
Changelog note for #512
...
- Merge #512 : unbound.service.in: upgrade hardening to latest
standards.
2021-07-26 09:47:24 +02:00
Wouter Wijngaards
1e17b8f67c
Merge pull request #512 from ArchangeGabriel/patch-1
...
unbound.service.in: upgrade hardening to latest standards
2021-07-26 09:47:12 +02:00
Bruno Pagani
c32b9e4ba9
unbound.service.in: upgrade hardening to latest standards
...
Systemd gradually introduced new protection bits, let’s enable them.
2021-07-25 05:27:22 +02:00
George Thessalonikefs
ab318a8b95
- Add unittest for tcp_reuse functions.
2021-07-24 01:15:00 +02:00
George Thessalonikefs
1b7358e85c
- stream reuse, move log_assert to the correct location.
2021-07-23 20:51:14 +02:00