Wouter Wijngaards
0ace659fe2
Merge pull request #519 from ziollek/tcp_upstream_option
...
Support for selective enabling tcp-upstream for stub/forward zones
2021-08-12 15:03:57 +02:00
W.C.A. Wijngaards
07f70d0745
Changelog note for #523
...
- Merge #523 : fix: free() call more than once with the same pointer.
2021-08-12 13:45:18 +02:00
Wouter Wijngaards
79df099f4c
Merge pull request #523 from Shchelk/bugfix
...
fix: free() call more than once with the same pointer
2021-08-12 13:45:00 +02:00
W.C.A. Wijngaards
20febc2179
Changelog note for #521
...
- Merge #521 : Update mini_event.c.
2021-08-12 13:24:15 +02:00
Wouter Wijngaards
6780a0844d
Merge pull request #521 from liheng562653799/master
...
Update mini_event.c
2021-08-12 13:24:03 +02:00
W.C.A. Wijngaards
f8ddcc15b8
- Add test tool readzone to .gitignore.
2021-08-12 13:17:29 +02:00
W.C.A. Wijngaards
c5ceee22a9
- And 1.13.2rc1 became the 1.13.2 with the fix for the python module
...
build. The current code repository continues with version 1.13.3.
2021-08-12 10:04:20 +02:00
Shchelkunov Artem
e20b2c1aaf
fix: free() call more than once with the same pointer
2021-08-11 15:14:43 +05:00
Chih-Hsuan Yen
98087a051e
- Reduce unnecessary linking
...
- Link to libpython only when needed, fixes #242
When pyunbound is enabled while pythonmodule is not (i.e., ./configure
--without-pythonmodule --with-pyunbound), only the Python library
_unbound.so uses Python functions, and main programs (unbound,
unbound-anchor, ...) and libunbound.so do not. This patch removes
unneeded linking.
- Link the Python library _unbound.so to Python only. _unbound.so does
not directly use libraries used by libunbound. This patch removes
unneeded linking mentioned in [1]
[1] https://github.com/NLnetLabs/unbound/pull/511#issuecomment-886072003
2021-08-06 22:33:22 +08:00
Artem Egorenkov
0d8dd6ec33
- memory management violations fixed
2021-08-06 14:11:12 +02:00
liheng562653799
edbf9c21ee
Update mini_event.c
...
When in heavy load, unbound opens many outside_network sockets for out going queries to delegation servers, which may result in a big fd(maxfd) value(for thread A 65500, for thread B 65501, for thread C ...).
There are situations when thread A has a max fd num 65500 where maxfd is of course 65500, thread B has max fd num 20 for now but maxfd is still 65501. Though linux kernel checks whether maxfd+1 passed by select syscall is really the process' maxfd+1. Linux kernel can not tell maxfd+1 passed by thread B select syscall is much bigger(65501+1 or 65500+1 after trimed by kerne) than it should be (20+1).
In this situation, when kernel do_select() for thread B, much work is wasted.
2021-08-06 12:00:56 +08:00
W.C.A. Wijngaards
8e538dcaa8
- Fix #520 : Unbound 1.13.2rc1 fails to build python module.
2021-08-05 17:10:56 +02:00
W.C.A. Wijngaards
f232562430
Merge branch 'master' into rpz-triggers
2021-08-05 13:37:22 +02:00
Tomasz Ziolkowski
ae45f46b9e
Add (stub|forward)-tcp-upstream options which enable using tcp transport only for specified stub/forward zones
2021-08-05 08:44:18 +02:00
W.C.A. Wijngaards
4518bb1158
For 1.13.2rc1.
2021-08-05 08:37:20 +02:00
W.C.A. Wijngaards
5d349dbcf3
- Tag for 1.13.2 release.
2021-08-05 08:36:24 +02:00
W.C.A. Wijngaards
77fdd8836d
- Fix unit test zonemd_reload for use in run_vm.
2021-08-04 16:26:21 +02:00
W.C.A. Wijngaards
822a96b29a
- Fix libnettle zonemd unit test.
2021-08-04 14:04:31 +02:00
W.C.A. Wijngaards
067954fe8d
- Fix out of sourcedir run of zonemd unit tests.
2021-08-04 13:54:38 +02:00
Tomasz Ziolkowski
59552a7a76
reformat
2021-08-04 13:05:21 +02:00
Tomasz Ziolkowski
1900ea3bb3
Revert changes in files managed by maintainers, move docker do contrib dir
2021-08-04 13:02:38 +02:00
Tomasz Ziolkowski
a922c6d525
merge master
2021-08-04 13:02:20 +02:00
W.C.A. Wijngaards
592cfe3afc
- Fix readzone compile under debug config.
2021-08-04 11:43:29 +02:00
W.C.A. Wijngaards
6dd270d625
- Fix missing locks in zonemd unit test.
2021-08-04 11:05:51 +02:00
W.C.A. Wijngaards
c9bb0604db
- Fix static analysis warnings about localzone locks that are unused.
2021-08-04 10:58:08 +02:00
George Thessalonikefs
8878680898
- Bump MAX_RESTART_COUNT to 11 from 8; in relation to #438 . This allows
...
longer CNAME chains in Unbound.
2021-08-04 10:53:22 +02:00
George Thessalonikefs
efa15747a2
Changelog note for #415 :
...
- Merge PR #415 from sibeream: Use /proc/sys/net/ipv4/ip_local_port_range
to determine available outgoing ports.
2021-08-04 10:47:38 +02:00
gthess
bdaecd942d
Merge pull request #415 from sibeream/master
...
Use /proc/sys/net/ipv4/ip_local_port_range to determine available outgoing ports
2021-08-04 10:42:12 +02:00
W.C.A. Wijngaards
f5d53928a3
- In unit test use openssl set security level to allow keys in test.
2021-08-04 09:58:38 +02:00
W.C.A. Wijngaards
c639dc956a
- Fix sign comparison warning on FreeBSD.
2021-08-03 14:13:37 +02:00
W.C.A. Wijngaards
2a0df9e72e
- Annotate assertion into error printout; we think it may be an
...
error, but the situation looks harmless.
2021-08-03 14:08:30 +02:00
W.C.A. Wijngaards
dd7dc30294
Changelog note for #517
...
- Merge PR #517 from dyunwei: #420 breaks the mesh reply list
function that need to reuse the dns answer.
2021-08-03 13:11:18 +02:00
Wouter Wijngaards
5196ee03e6
Merge pull request #517 from dyunwei/master
...
#420 breaks the mesh reply list function that need to reuse the dns answer.
2021-08-03 13:11:01 +02:00
George Thessalonikefs
a519009378
Merge branch 'master' of github.com:NLnetLabs/unbound
2021-08-03 12:20:45 +02:00
George Thessalonikefs
ca67691092
- Listen to read or write events after the SSL handshake.
...
Sticky events on windows would stick on read when write was needed.
2021-08-03 12:18:58 +02:00
daiyunwei
0784ad7a11
#420
...
clear the c->buffer in the comm_point_send_reply does resolve the "can't fit qbuffer in c->buffer" issue, but it breaks the mesh reply list function that need to reuse the answer. because the c->buffer is cleared in the comm_point_send_reply, it cannot be resued again. it means that it is not inappropriate to clear c->buffer in the comm_point_send_reply.
After some investigation, i found it is appropriate to clear c->buffer before use in the http2_query_read_done.
2021-08-03 11:40:30 +08:00
W.C.A. Wijngaards
3ed5b62578
- Fix verbose printout failure in tcp reuse unit test.
2021-08-02 16:06:36 +02:00
W.C.A. Wijngaards
89e2f2f753
- iana portlist update.
2021-08-02 15:26:20 +02:00
W.C.A. Wijngaards
0bdcbc80b9
- Move ECDSA functions to use OpenSSL 3.0.0 API.
2021-08-02 15:06:26 +02:00
W.C.A. Wijngaards
d242bfb73b
- Move RSA and DSA to use OpenSSL 3.0.0 API.
2021-08-02 14:43:51 +02:00
W.C.A. Wijngaards
60663c766a
Review fixup for keyraw pkey function use.
2021-08-02 13:39:48 +02:00
W.C.A. Wijngaards
ca00814e67
- Prepare for OpenSSL 3.0.0 provider API usage, move the sldns
...
keyraw functions to produce EVP_PKEY results.
2021-08-02 13:33:32 +02:00
W.C.A. Wijngaards
b6abcb1508
- For #515 : Fix compilation with openssl 3.0.0 beta2, lib64 dir and
...
SSL_get_peer_certificate.
- Move acx_nlnetlabs.m4 to version 41, with lib64 openssl dir check.
2021-07-30 13:54:43 +02:00
W.C.A. Wijngaards
11caae256b
- Fix #515 : Compilation against openssl 3.0.0 beta2 is failing to
...
build unbound.
2021-07-30 13:35:23 +02:00
Tomasz Ziolkowski
3e310a17be
Docker environment for run tests + enhancement for ssl_handshake
2021-07-27 12:06:08 +02:00
George Thessalonikefs
dd254137f1
- Changelog entry for #513 : Stream reuse, attempt to fix #411 , #439 ,
...
#469 .
2021-07-26 16:55:32 +02:00
gthess
dcd75814b9
Merge pull request #513 from NLnetLabs/tcp_reuse_fix
...
Stream reuse, attempt to fix #411 , #439 , #469
2021-07-26 16:54:34 +02:00
W.C.A. Wijngaards
e8d28f0a55
- Fix readzone unknown type print for memory resize.
2021-07-26 16:45:33 +02:00
George Thessalonikefs
8ee5aa312f
- Fix unittcpreuse.c: properly initialise outnet.
2021-07-26 16:29:57 +02:00
George Thessalonikefs
ad2bd61ed4
- Remove redundant log_assert and fix error messages.
2021-07-26 16:12:55 +02:00