kc3-lang/libevent

Branch :


Log

Author Commit Date CI Message
dd4be76f 2013-04-30 12:02:49 Incremement version to 2.1.3-alpha
c6561efb 2013-04-30 12:02:19 Merge remote-tracking branch 'origin/patches-2.0'
d9917c49 2013-04-30 11:52:55 Add acknowledgements to readme
e6cdd17b 2013-04-30 11:44:39 Start editing the changelog for 2.1.3-alpha
8415b69d 2013-04-30 10:22:40 Mark the finalize stuff as experiemental in case it needs to change
959c1428 2013-04-30 11:42:53 Start a changelog for Libevent 2.0.22-stable
920a5e69 2013-04-26 19:15:50 Clarify an important point about event_base_foreach_event()
702c9aa4 2013-04-26 19:14:05 Fix a bug in the new main/event_foreach test It wasn't making sure that the events weren't internal.
d5967397 2013-04-26 17:51:33 More unit tests for initializing common timeouts. Try with: misformed usecs in inputs, and with initializing common timeouts from other common timeouts.
f09629ea 2013-04-26 17:46:33 A test for event_get_assignment()
30ea2910 2013-04-26 17:28:46 Unit tests for event_base_gettimeofday_cached() and event_base_update_cache_time()
0b096efe 2013-04-26 13:50:22 New tests for event_base_foreach_event() Our dump-events code had exercised this a bit, but only via the nonlocking backend. Also, nothing was checking the "Search for a specific event" code.
a153874d 2013-04-26 13:49:45 New test for active_later->active transition on event_active When event_active is called, an active_later event is supposed to become active now. We had lacked a test for that.
3555befd 2013-04-26 12:27:05 Merge branch '21_deadlock_fix_v2'
5d11f4f3 2013-04-26 11:57:40 Make the event_finalize* functions return an error code
a800b913 2013-04-26 11:36:43 More documentation for finalization feature
4ea4c6a9 2013-04-10 13:44:23 Remove bufferevent_del_generic_timeout_cbs as now unused
25aac697 2013-04-26 12:00:17 Remove a no-longer-true XXXX comment.
e9ebef83 2013-04-09 21:14:52 Always run pending finalizers when event_base_free() is called There was actually a bug in the original version of this: it tried to run the finalizers after (potentially) setting current_base to NULL; but those finalizers could themselves (potentially) be invoking stuff that needed to know about the current event_base. So the right time to do it is _before_ clearing current_base.
02fbf687 2013-04-09 18:16:13 Use finalization feature so bufferevents can avoid deadlocks Since the bufferevents' events are now EV_FINALIZE (name pending), they won't deadlock. To clean up properly, though, we must use the finalization feature. This patch also split bufferevent deallocation into an "unlink" step that happens fast, and a "destruct" step that happens after finalization. More work is needed: there needs to be a way to specify a finalizer for the bufferevent's argument itself. Also, this finalizer business makes lots of the reference counting we were doing unnecessary. Also, more testing is needed.
9d893c97 2013-04-09 18:15:08 Add some verbose notes to bufferevent unit tests
8eedeabe 2013-03-28 14:13:19 Implement event_finalize() and related functions to avoid certain deadlocks
b1b054f0 2013-04-26 12:12:08 Make all tests pass under EVENT_DEBUG_MODE=1 The fix was easy: the tests that were failing were those tests that also enabled debug mode themselves. So, let them know when EVENT_DEBUG_MODE is on, so they won't do that.
b3aca5d9 2013-04-25 15:13:24 Merge branch '21_http_error_cb_squashed'
54cc8005 2013-03-21 17:01:31 Drop extra header http_struct.h from regress_http.c
862c217a 2013-03-22 14:35:47 Add test for EVREQ_HTTP_REQUEST_CANCEL into http_cancel_test()
7b077194 2013-03-21 13:55:40 Add new error_cb for actual reporting of HTTP request errors. It is useful to know why you callback called with NULL (i.e. it failed), for example if you set max_body with evhttp_connection_set_max_body_size() you must know that it failed because of body was longer than this size. (Commit message tweaked by Nick)
ed26561b 2013-04-25 14:48:56 Fix another warning introduced in 0c6ec5d8
eeb700ce 2013-04-25 14:46:46 Fix a warning introduced in 0c6ec5d8
6b94ffce 2013-04-25 13:54:19 Merge remote-tracking branch 'origin/patches-2.0' Conflicts: configure.ac
66dacfa2 2013-04-25 13:43:49 Merge remote-tracking branch 'origin/pr/36' into patches-2.0
eb6b0c1f 2013-04-25 10:47:16 Merge branch '21_evdns_disable_when_inactive'
6b7fa620 2013-03-27 20:15:46 evdns: New flag to make evdns not prevent the event loop from exiting Here is the brief description of problem: When you are use evdns to resolve domains to IP adresses (see ./sample/dns-example) you loop never returns from event_base_dispatch(), and because of this the program will never terminated. Because existing programs may be depending on the old behavior, we only apply the fix when evdns_base_new() is created with a new flag - EVDNS_BASE_DISABLE_WHEN_INACTIVE. (Commit message edited by Nick while squashing the branch.)
5e6fa2a3 2013-04-24 13:23:15 event_base_update_cache_time should be a no-op if the loop isn't running
1c3147f5 2013-04-10 18:03:16 Add a test with an active_later event at event_base_free time.
95acdaa3 2013-04-10 17:56:54 Another tweak to https-client.c
8a90a850 2013-04-10 13:53:44 Remove http_struct.h usage in sample/https-client.c
2fad0f3d 2013-04-05 15:06:54 Add an environment variable (EVENT_DEBUG_MODE) to run unit tests in debug mode Not all tests currently pass with debug mode on.
33398008 2013-04-01 11:59:26 Merge branch '21_empty_strlcpy'
49146200 2013-03-31 14:05:26 Do not build strlcpy.c when it will have no code.
e834006b 2013-03-29 09:39:52 Merge pull request #75 from altf4/master Header update to specify evbuffer_pullup() behavior
cf8d1cdb 2013-03-29 09:28:35 Specify return behavior in header for evbuffer_pullup() in corner case Function returns NULL when told to pullup more data than exists
81ea0c4c 2013-03-28 05:57:07 Merge pull request #47 from ppelleti/https HTTPS example adapted from Catalin
1bc4a8f9 2013-03-25 21:14:10 Merge remote-tracking branch 'origin/patches-2.0'
773b0a5d 2013-03-25 21:12:49 Fix a typo in a comment in buffer.h. Spotted by Alt_F4
f935e215 2013-03-15 09:33:28 build test/test-script.sh on systems with a less-featureful $<
787fd748 2013-03-15 09:33:13 Make --disable-libevent-regress work again
9443868d 2013-03-05 11:29:33 Double-check next timeout when adding events When resuming the system from a suspended state, the ev_timeout field of a scheduled timer event may be in the past. This leads to unexpected behavior when scheduling a short-duration timer event immediately after returning from suspension, because the new event does not land on top of the timeout minheap and so the event loop (blocked on a possibly long-duration timeout) is not notified. This patch checks for this condition and, if it obtains, notifies the event loop.
13676535 2013-03-01 12:01:42 Test: decoding just part of string with evhttp_decode_uri_internal()
de8101a8 2013-03-01 12:00:24 Move prototype of evhttp_decode_uri_internal() to http-internal.h Make it non static, that can be called from tests
e1903e3a 2013-02-28 23:10:02 uri decode: changed the test for the existence of the next character Fix for 64b6eceaba1a4 More info here https://github.com/azat/libevent/commit/64b6eceaba1a40ab0b175fa9fd9329d3e978ce6e#commitcomment-2714685
64b6ecea 2013-02-28 17:19:44 uri decode: fix for warning "use of uninitialised value" This patch add check in evhttp_decode_uri_internal() that next 2 symbols are exists in array of chars for decoding, if don't have two next 2 symbols don't try to decode '%FF'
4db9da6b 2013-02-27 21:12:53 pull in wildcard matching code from cURL Now, https-client accepts both: https://ip.appspot.com/ (matching wildcard certificate) https://github.com/ (matching non-wildcard certificate) but still rejects https://www.kegel.com/ (non-matching wildcard certificate) which should match the behavior of these sites in a web browser.
6021cb50 2013-02-27 21:19:16 avoid sign mismatch warning in openssl_hostname_validation.c sample/openssl_hostname_validation.c: In function 'matches_common_name': sample/openssl_hostname_validation.c:80: warning: comparison between signed and unsigned integer expressions sample/openssl_hostname_validation.c: In function 'matches_subject_alternative_name': sample/openssl_hostname_validation.c:124: warning: comparison between signed and unsigned integer expressions
64d9f161 2013-02-27 17:16:27 use iSECPartners code to validate hostname in certificate The problem is that if you go to a website whose certificate does not match its hostname, it should fail. Try this in a web browser for https://www.kegel.com/ for example. Your web browser will say the certificate is for *.pair.com, not for www.kegel.com, and won't let you visit it without clicking through a bunch of scary warnings. However, prior to this commit, https-client was happy to fetch https://www.kegel.com/ without complaining. That is bad. Now, with this commit, it will properly complain, which is good: pelletier@chives:~/src/libevent/sample$ ./https-client https://www.kegel.com/ Got 'MatchNotFound' for hostname 'www.kegel.com' and certificate: /C=US/postalCode=15203/ST=Pennsylvania/L=Pittsburgh/street=Suite 210/street=2403 Sidney Street/O=pair Networks, Inc./OU=Provided by pair Networks, Inc./OU=PairWildcardSSL $250,000/CN=*.pair.com some request failed - no idea which one though! error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed ppelletier@chives:~/src/libevent/sample$ It will still succeed for sites with an exactly-matching certificate, such as https://github.com/ and that is also good! However, the problem is that the iSECPartners code doesn't handle wildcards, which means we reject https://ip.appspot.com/ even though it is perfectly legitimate, because we don't understand the wildcard: ppelletier@chives:~/src/libevent/sample$ ./https-client https://ip.appspot.com/ Got 'MatchNotFound' for hostname 'ip.appspot.com' and certificate: /C=US/ST=California/L=Mountain View/O=Google Inc/CN=*.appspot.com some request failed - no idea which one though! error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed ppelletier@chives:~/src/libevent/sample$ So, we need to fix this. In other words, "to be continued..."
aacd674c 2013-02-26 00:06:50 use Debian's default root certificate location as suggested here: http://archives.seul.org/libevent/users/Feb-2013/msg00034.html although curl's acinclude.m4 reveals many other possibilities: dnl /etc/ssl/certs/ca-certificates.crt Debian systems dnl /etc/pki/tls/certs/ca-bundle.crt Redhat and Mandriva dnl /usr/share/ssl/certs/ca-bundle.crt old(er) Redhat dnl /usr/local/share/certs/ca-root.crt FreeBSD dnl /etc/ssl/cert.pem OpenBSD dnl /etc/ssl/certs/ (ca path) SUSE And none of these cover Windows :(
5754d96a 2013-02-25 23:43:05 better handling of OpenSSL errors
42d7441a 2013-02-25 23:14:26 https-client was putting newlines at 256-byte boundaries presumably this was meant to put a ">" before every line, but that isn't what it does, since evbuffer_remove is simply returning fixed-size chunks. So, when retrieving a document of more than 256 bytes (e. g. any nontrivial document), we got "> " and newlines thrown in at very arbitrary places.
bf31fa5d 2013-02-27 16:31:17 use ${OPENSSL_LIBS} instead of -lssl -lcrypto This made the difference between segfaulting and not segfaulting for me when I run https-client, when I've built libevent using an OpenSSL in a non-standard location. In the same spirit as 1d9d5110a4aebf5833f6fd78bd0252affde0f4d0 and d70af27d0152d0a87a25127faf215604beb8ffe0.
be46c99b 2013-02-19 12:22:31 Add sample/https-client.c, an example of stacking evhttp as a client on top of bufferevent_ssl. Signed-off-by: Catalin Patulea <catalinp@google.com>
87c56727 2013-02-26 15:22:03 Merge pull request #41 from ppelleti/winsock-errs FormatMessage for winsock errors
c9ad3af2 2013-02-25 20:13:01 test filling up the hash table a bit
4ccdd53f 2013-02-25 19:02:32 use hashtable instead of linked list to cache winsock errors as discussed here: https://github.com/libevent/libevent/pull/41#issuecomment-13611817
2078e9b4 2013-02-14 20:14:37 make sure caching works, and we don't leak memory
0c6ec5d8 2013-02-07 17:20:08 use FormatMessage for winsock errors as discussed here: http://archives.seul.org/libevent/users/Feb-2013/msg00004.html
72965126 2013-02-07 17:06:49 a program to print out the error strings for winsock errors
97094614 2013-02-14 14:13:11 Merge remote-tracking branch 'origin/patches-2.0'
b6182042 2013-02-14 09:54:56 fix #73 and fix http_connection_fail_test to catch it
96150dd0 2013-02-13 11:38:57 Unit test for event_remove_timer with EV_PERSIST. Patch from dcicppin on sourceforge.
5623e803 2013-02-12 15:10:50 Make event_remove_timer behave correctly with persistent timers
74e52db4 2013-02-11 11:25:25 Merge remote-tracking branch 'ppelleti/nmake-clean-exes'
2863c837 2013-02-08 22:10:05 Avoid using $(top_srcdir) in TESTS. Newer automakes don't like this.
ebf278b2 2013-02-08 13:03:29 Use AC_CONFIG_HEADERS in place of AM_CONFIG_HEADERS for autmake 1.13 compat Patch from cazfi.
d670e3bd 2013-02-08 22:09:00 Merge remote-tracking branch 'origin/patches-2.0' This is an "ours" commit: I'm not taking the recent autotools changes from patches-2.0, since they'd conflict with master.
a55514ee 2013-02-08 22:08:18 Avoid using top_srcdir in TESTS-new automakes do not like this
0c79787a 2013-02-08 22:07:43 Rename configure.in to configure.ac to appease newer autoconfs
817ea369 2013-02-08 13:03:29 Use AC_CONFIG_HEADERS in place of AM_CONFIG_HEADERS for autmake 1.13 compat Patch from cazfi.
a452811e 2013-01-30 16:07:30 "buffer" spelling
974bfa07 2013-02-07 17:14:18 remove all exes on "make clean", not just regress.exe
29015427 2013-02-05 15:09:31 Merge remote-tracking branch 'origin/patches-2.0'
0a5eb2eb 2013-02-05 15:07:32 Fix a locking error in bufferevent_socket_get_dns_error. Patch from Ka-Hing Cheung.
19583a5f 2013-02-04 13:50:58 Merge pull request #30 from ppelleti/valgrind-epoll avoid valgrind false positive by zeroing epoll_event
2ecd8947 2013-02-04 13:49:08 Merge pull request #39 from azat/fix-http-for-ipv6 Fix ipv6 support for http. When URL contain domain, not IP address.
f0a68a25 2013-02-04 13:33:10 Merge pull request #37 from ppelleti/fix-indentation fix some hinky indentation in evhttp_make_request
0dda56a4 2013-02-03 19:08:37 Preliminary changes for Minix3.
9ec88bdf 2013-01-27 02:17:02 Add regress test ipv6_for_domain. Written for commit 71e709c7829275a594f767b27468b1b52e8b5bb9. Fix ipv6 support for http. When URL contain domain, not IP address.
42aaf4dc 2013-01-23 16:55:09 Implement EVUTIL_ERR_IS_EAGAIN on windows.
71e709c7 2013-01-23 02:45:32 Fix ipv6 support for http. When URL contain domain, not IP address. Before this patch socket created before domain was resolved, and it always create with AF_INET (ipv4), but we must create socket only after domain was resolved to understad which protocol family have domain address. Thank to Patrick Pelletier, who found this bug.
f324b1df 2013-01-22 17:10:07 Merge remote-tracking branch 'origin/patches-2.0'
c322c207 2013-01-22 16:59:07 Fix a mistake in evbuffer_remove() arguments in example http server code (commit message by nickm)
80e220ee 2013-01-18 20:25:41 fix some hinky indentation in evhttp_make_request
0c2bacca 2013-01-17 15:01:32 Fix typo : Dispatching instead of Dispaching
74d4c44c 2011-01-03 15:09:21 Backport libevent to vanilla Autoconf 2.59 (as used in RHEL5) This is a backport of ad03952.
9ab2b3f7 2013-01-15 12:52:08 Fix missing AC_PROG_SED on older Autoconfs For pre-2.59b Autoconfs, AC_PROG_SED is not available [1]; on such systems, avoid calling AC_PROG_SED, while providing a sensible SED. This aids backporting to Autoconf 2.59. [1] http://lists.gnu.org/archive/html/autotools-announce/2004-08/msg00002.html
bf7a0ff2 2013-01-11 16:37:34 When EWOULDBLOCK is not EAGAIN, treat it as equivalent to it Acording to http://stackoverflow.com/questions/7003234/which-systems-define-eagain-and-ewouldblock-as-different-values there are some older unixes that distinguish these error.s
b452a434 2012-12-31 18:29:56 Fix harmless clang enum warning
9e8cdf3d 2012-09-21 08:38:56 Fix comment to refer to sample/include.am correctly
21c962e0 2012-12-20 11:50:23 Merge remote-tracking branch 'origin/patches-2.0'
0a822a64 2012-12-20 11:48:05 Avoid double-close on getsockname error in evutil_ersatz_socketpair Found by coverity; CID 739726
69db2610 2012-12-20 11:47:09 Avoid leaking fds on evconnlistener with no callback set There's no way to retrieve an fd from an evconnlistener whose callback has been cleared, so we had better close any such fd. Found by coverity; CID 739725.