summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* test1245: make it work with dynamic FTP server portbagder/tests-on-dynportDaniel Stenberg2020-04-181-5/+1
|
* test1055: make it work with dynamic FTP portDaniel Stenberg2020-04-181-5/+1
|
* test1028: make it run on dynamic FTP server portDaniel Stenberg2020-04-181-5/+1
|
* tests: move pingpong server to dynamic listening portDaniel Stenberg2020-04-183-62/+92
| | | | | | | | FTP, IMAP, POP3, SMTP and their IPv6 versions are now all on dynamic ports Test 842-845 are unfortunately a bit hard to move over to this concept right now and require "default port" still...
* test1056: work with dynamic HTTP ipv6 portDaniel Stenberg2020-04-181-6/+2
|
* test1448: work with dynamic HTTP server portDaniel Stenberg2020-04-181-2/+2
|
* tests: introduce preprocessed test casesDaniel Stenberg2020-04-1810-189/+183
| | | | | | | | | | | | The runtests script now always performs variable replacement on the entire test source file before the test gets executed, and saves the updated version in a temporary file (log/test[num]) so that all test case readers/servers can use that version (if present) and thus enjoy the powers of test case variable substitution. This is necessary to allow complete port number freedom. Test 309 is updated to work with a non-fixed port number thanks to this.
* tests: make 2006-2010 handle different port number lengthsDaniel Stenberg2020-04-185-8/+24
|
* tests: run the sws server on "any port"Daniel Stenberg2020-04-183-29/+101
| | | | | | | Makes the test servers for HTTP and Gopher pop up on a currently unused port and runtests adapts to that! Closes #5247
* sockfilt: tidy variable naming and data structure in select_wsMarc Hoersken2020-04-181-113/+112
| | | | | | | This commit does not introduce any logical changes to the code. Reviewed-by: Jay Satiro and Marcel Raad Closes #5238
* libssh: Use new ECDSA key types to check known hostsAnderson Toshiyuki Sasaki2020-04-171-0/+8
| | | | | | | | | From libssh 0.9.0, ssh_key_type() returns different key types for ECDSA keys depending on the curve. Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Fixes #5252 Closes #5253
* appveyor: add Unicode winbuild jobsMarcel Raad2020-04-171-2/+30
| | | | | | These are cheap as they don't build tests. Closes https://github.com/curl/curl/pull/5063
* mqttd: s/errno/SOCKERRNODaniel Stenberg2020-04-161-4/+2
| | | | | | | To behave proper on Windows Reported-by: Gisle Vanem Bug: https://github.com/curl/curl/commit/5e855bbd18f84a02c951be7cac6188276818cdac#r38507132 Closes #5241
* buildconf: use find -execdir instead, remove -print and the ares filesDaniel Stenberg2020-04-151-5/+2
| | | | | | Follow-up to 1e41bec96a6e Suggested-by: Marc Hörsken
* buildconf: avoid using tempfile when removing filesAlexander V. Tikhonov2020-04-151-10/+1
| | | | Closes #5213
* copyright: bump the copyright year rangeDaniel Stenberg2020-04-153-3/+3
|
* scripts/release-notes.pl: accept colon after the Fixes/Closes keywordsDaniel Stenberg2020-04-141-2/+2
|
* docs/MQTT: replace confusing 80 by 75JP Mens2020-04-141-1/+1
| | | | | | | I was a bit surprised by the `80`: first thought: what's HTTP doing here? ;) Closes #5236
* cmake: Avoid MSVC C4273 warnings in send/recv checksBrad King2020-04-141-0/+6
| | | | | | | | | | | | | | | We use `check_c_source_compiles` to check possible send/recv signatures by reproducing the forward declarations from system headers. On Windows the `winsock2.h` header adds dll linkage settings to its forward declaration. If ours does not match the compiler warns: warning C4273: 'recv': inconsistent dll linkage Add `WINSOCK_API_LINKAGE` to our test signatures when it is defined so that our linkage is consistent with that from `winsock2.h`. Fixes #4764 Closes #5232
* KNOWN_BUGS: Add entry 'Blocking socket operations'Jay Satiro2020-04-142-2/+17
| | | | | | | | | | | | | | - Add threaded resolver cleanup and GSSAPI for FTP to the TODO list of known blocking operations. - New known bugs entry 'Blocking socket operations in non-blocking API' that directs to the TODO's list of known blocking operations. Ref: https://github.com/curl/curl/pull/5214#issuecomment-612488021 Reported-by: Marc Hoersken Closes https://github.com/curl/curl/pull/5216
* test2043: use revoked.badssl.com instead of revoked.grc.comMarc Hoersken2020-04-141-1/+1
| | | | | | | | The certificate of revoked.grc.com has expired on 2020-04-13. Reviewed-by: Jay Satiro Closes #5233
* sockfilt: fix broken pipe on Windows to be ready in select_wsMarc Hoersken2020-04-141-3/+6
| | | | Closes #5228
* RELEASE-NOTES: syncedDaniel Stenberg2020-04-141-11/+40
|
* scripts/release-notes: fix duplicate output headerDaniel Stenberg2020-04-141-0/+1
|
* github/workflow: enable MQTT in the macOS debug buildDaniel Stenberg2020-04-141-1/+1
|
* azure: add mqtt support to one of the Windows buildsDaniel Stenberg2020-04-141-1/+1
|
* travis: add mqtt job on LinuxDaniel Stenberg2020-04-141-0/+5
|
* tests: add four MQTT tests 1190 - 1193Daniel Stenberg2020-04-145-0/+236
|
* tests: add the mqtt test server mqttdDaniel Stenberg2020-04-144-7/+1001
|
* tests: support hex encoded data and mqtt serverDaniel Stenberg2020-04-144-8/+132
| | | | The mqtt server is started using a "random" port.
* mqtt: add new experimental protocolBjorn Stenberg2020-04-1418-57/+766
| | | | Closes #5173
* TODO: Consider convenience options for JSON and XML?Daniel Stenberg2020-04-141-0/+15
| | | | Closes #5203
* tool: do not declare functions with Curl_ prefixDaniel Stenberg2020-04-144-47/+41
| | | | | | | | | To avoid collision risks with private libcurl symbols when linked with static versions (or just versions not hiding internal symbols). Reported-by: hydra3333 on github Fixes #5219 Closes #5234
* cmake: add aliases so exported target names are available in treeNathaniel R. Lewis2020-04-132-2/+12
| | | | | Reviewed-by: Brad King Closes #5206
* version: increase buffer space for ssl version outputDaniel Stenberg2020-04-131-2/+2
| | | | | | | | | To avoid it getting truncated, especially when several SSL backends are built-in. Reported-by: Gisle Vanem Fixes #5222 Closes #5226
* cirrus: no longer ignore test 504 which is working againMarc Hoersken2020-04-131-1/+1
| | | | The test is working again, because TCP blackholing is disabled.
* appveyor: completely disable tests that fail to timeout earlyMarc Hoersken2020-04-131-2/+2
| | | | | | | The tests changed from ignored to disabled are tests that are about connecting to non-listening socket. On AppVeyor these tests are not reliable, because for some unknown reason the connect is not timing out before the test time limit is reached.
* test1908: avoid using fixed port number in test dataDaniel Stenberg2020-04-131-1/+1
| | | | Closes #5225
* schannel: Fix blocking timeout logicAndrew Kurushin2020-04-121-6/+6
| | | | | | | | | | | | | | | - Fix schannel_send for the case when no timeout was set. Prior to this change schannel would error if the socket was not ready to send data and no timeout was set. This commit is similar to parent commit 89dc6e0 which recently made the same change for SOCKS, for the same reason. Basically it was not well understood that when Curl_timeleft returns 0 it is not a timeout of 0 ms but actually means no timeout. Fixes https://github.com/curl/curl/issues/5177 Closes https://github.com/curl/curl/pull/5221
* socks: Fix blocking timeout logicJay Satiro2020-04-122-6/+7
| | | | | | | | | | | | | | | | - Document in Curl_timeleft's comment block that returning 0 signals no timeout (ie there's infinite time left). - Fix SOCKS' Curl_blockread_all for the case when no timeout was set. Prior to this change if the timeout had a value of 0 and that was passed to SOCKET_READABLE it would return right away instead of blocking. That was likely because it was not well understood that when Curl_timeleft returns 0 it is not a timeout of 0 ms but actually means no timeout. Ref: https://github.com/curl/curl/pull/5214#issuecomment-612512360 Closes https://github.com/curl/curl/pull/5220
* gopher: check remaining time left during write busy loopMarc Hoersken2020-04-121-4/+17
| | | | | | | | | | | Prior to this change gopher's blocking code would block forever, ignoring any set timeout value. Assisted-by: Jay Satiro Reviewed-by: Daniel Stenberg Similar to #5220 and #5221 Closes #5214
* gnutls: ensure TLS 1.3 when SRP isn't requestedDirkjan Bussink2020-04-131-36/+45
| | | | | | | | | | | | | When SRP is requested in the priority string, GnuTLS will disable support for TLS 1.3. Before this change, curl would always add +SRP to the priority list, effectively always disabling TLS 1.3 support. With this change, +SRP is only added to the priority list when SRP authentication is also requested. This also allows updating the error handling here to not have to retry without SRP. This is because SRP is only added when requested and in that case a retry is not needed. Closes #5223
* tests/server: add hidden window to gracefully handle WM_CLOSEMarc Hoersken2020-04-121-0/+88
| | | | Forward Window events as signals to existing signal event handler.
* tests/server: add CTRL event handler for Win32 consolesMarc Hoersken2020-04-121-0/+48
| | | | Forward CTRL events as signals to existing signal event handler.
* tests/server: move all signal handling routines to util.[ch]Marc Hoersken2020-04-127-647/+158
| | | | Avoid code duplication to prepare for portability enhancements.
* compressed.d: stress that the headers are not modifiedDaniel Stenberg2020-04-121-2/+4
| | | | | | | Suggested-by: Michael Osipov Assisted-by: Jay Satiro Bug: https://github.com/curl/curl/issues/5182#issuecomment-611638008 Closes #5217
* tests/server/util.c: use curl_off_t instead of long for pidMarc Hoersken2020-04-111-3/+3
| | | | | | | Avoid potential overflow of huge PIDs on Windows. Related to #5188 Assisted-by: Marcel Raad
* tests: use Cygwin/msys PIDs for stunnel and sshd on WindowsMarc Hoersken2020-04-112-4/+35
| | | | | | | | | | | | Since the Windows versions of both programs would write Windows PIDs to their pidfiles which we cannot handle, we need to use our known perl.exe Cygwin/msys PID together with exec() in order to tie the spawned processes to the existance of our perl.exe The perl.exe that is executing secureserver.pl and sshserver.pl has a Cygwin/msys PID, because it is started inside Cygwin/msys. Related to #5188
* tests: add Windows compatible pidwait like pidkill and pidtermMarc Hoersken2020-04-113-11/+33
| | | | Related to #5188
* tests: fix conflict between Cygwin/msys and Windows PIDsMarc Hoersken2020-04-115-33/+79
| | | | | | | | | | | | | | Add 65536 to Windows PIDs to allow Windows specific treatment by having disjunct ranges for Cygwin/msys and Windows PIDs. See also: - https://cygwin.com/git/?p=newlib-cygwin.git;a=commit; ↵ h=b5e1003722cb14235c4f166be72c09acdffc62ea - https://cygwin.com/git/?p=newlib-cygwin.git;a=commit; ↵ h=448cf5aa4b429d5a9cebf92a0da4ab4b5b6d23fe Replaces #5178 Closes #5188